Exam Logo

Cisco (300-410-ENARSI) Exam Questions And Answers page 24

With respect to modifying an OSPF router ID to a loopback address, which of the following statements are true?
Layer 3 Technologies
You are configuring BGP speakers RouterA and RouterB to authenticate one another. The following conditions exist:
• RouterA has an IP address of 192.168.5.3
• RouterB has an IP address of 192.168.5.2
• Both routers reside in AS 6550.

Which of the following commands will result in successful authentication?
Layer 3 Technologies Infrastructure Security and Services
You are configuring EIGRP on a spoke router in a hub-and-spoke topology. In an effort to keep the routing table small, the hub router has been configured to send only a default route to the remote routers.

What command would you use on the spoke routers to enable them to send only connected and summary routes to the hub router, and prevent the hub router from sending a query to the spoke router when a route is lost elsewhere?
Layer 3 Technologies Infrastructure Services
You are configuring NAT64 to allow communication between a host running IPv6 and a server running IPv4. The router R1 sits between the host and the server. The router's Fa0/2/7 interface is connected to the IPv6 host, and the Fa0/2/6 interface is connected to the IPv4 server.

The IPv6 host has an IPv6 address of 2001::a00:1/128 and the IPv4 server is at 10.0.0.1. Below is the relevant configuration on R1:


When the IPv4 server responds to the IPv6 host, what IPv6 address will be in the source address in the packet?
Layer 3 Technologies VPN Technologies
You are implementing IP SLA and would like to use it to measure hop-by-hop response time between a Cisco router and any IP device on the network.

Which of the following IP SLA operations would you use for this?
Layer 3 Technologies VPN Technologies
You are planning the configuration of Easy Virtual Networking (EVN).

Which of the following statements is true of an interface that will be an EVN trunk?
Layer 3 Technologies Infrastructure Security and Services
You are the network administrator for a large software organization. You designed the LAN in the organization's main building for connecting the internal LAN to a WAN as shown below:


You have configured EIGRP with the variance parameter set to 3 on all the routers to enable unequal load balancing from the 172.16.1.0 network to the WAN. The delay configured on each of the routers is shown in the LAN diagram, and the K values are set as follows:

K1 = 0
K2 = 0
K3 = 1
K4 = 0
K5 = 0

Which of the following paths are entered into the routing tables as a result of the unequal load balancing configured on the routers? (Choose all that apply.)
Layer 3 Technologies Infrastructure Security and Services
You can use a variety of commands to verify and troubleshoot the operation of route redistribution on your network.

Which command should you NOT use on routers that are overloaded?
Layer 3 Technologies Infrastructure Security and Services
You configured a device as an IP SLA responder using the following configuration:


Which line indicates that the device is not a Cisco device?
Layer 3 Technologies Infrastructure Security and Services
You executed the following commands to assign an IPv6 link-local address to the Fa0/0 interface of the R1 router:

R1(config)# interface Fa0/0
R1(config-if)# ipv6 ospf 1 area 1

When you executed the show running-config command on the R1 router, you observed that OSPF for IPv6 is not running on the router.

Which of the following commands should be added to the interface configuration?
Layer 3 Technologies VPN Technologies