Cisco (300-510-SPRI) Exam Questions And Answers page 13
Refer to the exhibit. All routers on this network have been configured with PIM-SM, and R1 is the rendezvous point. However, when asymmetric routing is implemented to modify link usage, the network begins to drop certain multicast traffic. Which action corrects the problem?
Remove the asymmetric routing and use spanning tree to manage link usage
Add a static mroute for routes that are failing
Configure the routers to use PIM-DM instead of PIM-SM
Routing Protocols
QoS and Traffic Engineering
Refer to the exhibit. An engineer has configured all routers in the environment to run IS-IS Level 1 and Level 2 routing. The engineer wants traffic from R1 to R5 to pass via R2, but IS-IS routing has calculated the best path via R4. Which action corrects the problem?
Set the link metric on R2 for the links from router R2 to routers R3 and R4 to 30 or more
Set the link metric for the link from router R1 to router R4 to 30 or more
Configure routers R1, R4, and R5 for Level 2 routing only
Configure routers R1, R2, and R5 for Level 1 routing only
Routing Protocols
Infrastructure Security and Services
Refer to the exhibit. The green policy is designed with low delay, and the pink policy is designed with low cost. What is the next hop for node A on its way to node D, with the objective of achieving a low delay?
192.168.1.2
192.168.3.2
192.168.3.6
192.168.1.6
Routing Protocols
QoS and Traffic Engineering
Refer to the exhibit. Which attribute can router 1 alter so that only other iBGP peers prefer to use 192.168.4.2 as the next hop for route 192.168.3.0/24?
MED
local preference
origin
weight
Routing Protocols
QoS and Traffic Engineering
Refer to the exhibit. A network operator must inject a Level 1 route from XR2 (10.16.16.0/24) into the ISIS topology. Which configuration allows the injection in a way that XR3 and XR1 have a valid and working route for 10.16.16.0/24?
Routing Protocols
Infrastructure Security and Services
Refer to the exhibit. After troubleshooting an OSPF adjacency issue, routers 1, 2, and 3 have formed OSPF neighbor relationships. Which statement about the configuration is true?
Router 2 receives a Type 5 LSAs from router 1 for its connected subnets
Router 2 uses router 3 as the next hop for 192.168.0.0/24
Router 2 uses router 1 as the next hop for 192.168.0.0/24
Router 2 receives a Type 7 LSAs from router 3 for its connected subnets
Routing Protocols
Refer to the exhibit. What is the relationship between Router 1 and Router 2?
Router 1 centrally learns the topology of the network to aid in SR-TE path selection, and Router 2 is a node that feeds Router 1 topology information
Router 1 and Router 2 are participating in SR-TE tunnels and are both head-end routers
Router 1 and Router 2 centrally learn the topology of the network to aid in SR-TE path selection for peers
Router 2 is the head-end router in an SR-TE tunnel, and it is learning topology of the network from the PCE enabled on Router 1
Routing Protocols
Which two differences should be considered when deciding whether to implement routing policies or route maps? (Choose two.)
Sequences are added after implementing a route map, but routing policies must be reconfigured when change is needed
Route maps are supported in Cisco IOS Software and routing policies are supported in Cisco IOS XR Software
Route maps are implemented using hierarchical policies, but routing policies must be implemented sequentially
Route maps require an explicit deny at the end of the sequence, but routing policies have an implicit deny at the end of the program
Route policies require sequence numbers, but route maps are implemented without sequencing
Routing Protocols
Infrastructure Security and Services
In a PIM-SM environment, which mechanism determines the traffic that a receiver receives?
The receiver explicitly requests its desired traffic from the RP on the shared tree.
The receiver explicitly requests traffic from a single source, which responds by forwarding all traffic.
The RP on the shared tree floods traffic out of all PIM configured interfaces.
The receiver explicitly requests traffic from each desired source, which responds by sending all traffic.
Routing Protocols
QoS and Traffic Engineering
Refer to the exhibit. A network operator must stop 10.33.33.33/32 from being redistributed into Level 1 router XR1. Which configuration meets this need?
Infrastructure Security and Services
High Availability and Fast Convergence
Comments