300-101 Exam Questions - Online Test


300-101 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Master the 300 101 dumps ROUTE Implementing Cisco IP Routing content and be ready for exam day success quickly with this Pass4sure ccnp route 300 101 dumps pdf exam price. We guarantee it!We make it a reality and give you real cisco 300 101 dump questions in our Cisco 300 101 route pdf braindumps.Latest 100% VALID Cisco ccnp 300 101 dumps Exam Questions Dumps at below page. You can use our Cisco ccnp dumps 300 101 braindumps and pass your exam.

P.S. Vivid 300-101 pack are available on Google Drive, GET MORE: https://drive.google.com/open?id=1lWZpAR5vb8lOApmzhHWMzXffOPhCR-LL


New Cisco 300-101 Exam Dumps Collection (Question 8 - Question 17)

Question No: 8

Into which two types of areas would an area border router (ABR) inject a default route? (Choose two.)

A. stub

B. the autonomous system of an exterior gateway protocol (EGP)

C. NSSA

D. totally stubby

E. the autonomous system of a different interior gateway protocol (IGP)

F. area 0

Answer: A,D

Explanation:

Both stub area & totally stubby area allow an ABR to inject a default route. The main difference between these 2 types of areas is:

+ Stub area replaces LSA Type 5 (External LSA u2013 created by an ASBR to advertise network from another autonomous system) with a default route + Totally stubby area replaces both LSA Type 5 and LSA Type 3 (Summary LSA u2013 created by an ABR to advertise network from other areas, but still within the AS, sometimes called interarea routes) with a default route.

Below summarizes the LSA Types allowed and not allowed in area types:



Question No: 9

Refer to the exhibit.

A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. What did the TAC engineer configure incorrectly?

A. The crypto isakmp configuration is not correct.

B. The crypto map configuration is not correct.

C. The network 172.16.1.0 is not included in the OSPF process.

D. The interface tunnel configuration is not correct.

Answer: D



Question No: 10

You have been asked to evaluate how EIGRP is functioning in a customer network.

What percent of R1u2021s interfaces bandwidth is EIGRP allowed to use?

A. 10

B. 20

C. 30

D. 40

Answer: B



Question No: 11

Which three route filtering statements are true? (Choose three)

A. After the router rip and passive-interface s0/0 commands have been issued, the s0/0

interface will not send any RIP updates, but will receive routing updates on that interface.

B. After the router eigrp 10 and passive-interface s0/0 commands have been issued, the s0/0 interface will not send any EIGRP updates, but will receive routing updates on that interface

C. After the router ospf 10 and passive-interface s0/0 commands have been issued , the s0/0 interface will not send any OSPF updates, but will receive routing updates on that interface

D. When you use the passive-interface command with RIPv2, multicasts are sent out the specified interface

E. When you use the passive-interface command with EIGRP, hello messages are not sent out the specified interface

F. When you use the passive-interface command with OSPF, hello messages are not sent out the specified interface

Answer: A,E,F

Explanation:

Passive-interface command is used in all routing protocols to disable sending updates out from a specific interface. However the command behavior varies from o ne protocol to anotheru201d

- In RIP, this command will not allow sending multicast updates via a specific interface but will allow listening to incoming updates from other RIP speaking neighbors. This means that the router will still be able to receive updates o n that passive interface and use them in its routing table.

In EIGRP and OSPF the passive-interface command stops sending outgoing hello packets, hence the router can not form any neighbor relationship via the passive interface. This behavior stops both outgoing and incoming routing updates.

Topic 6, Infrastructure Services

85.After a recent DoS attack on a network, senior management asks you to implement better logging functionality on all IOS-based devices. Which two actions can you take to provide enhanced logging results? (Choose two.)

A. Use the msec option to enable service time stamps.

B. Increase the logging history.

C. Set the logging severity level to 1.

D. Specify a logging rate limit.

E. Disable event logging on all noncritical items.

Answer: A,B



Question No: 12

Which two statements about password-protecting device access are true (choose two)

A. The more system:running-config command displays encrypted passwords in clear text

B. The service password-encryption command forces a remote device to encrypt the password

C. A network administrator can recover an encrypted password

D. The privilege level command controls the commands a specific user can execute

E. The password can be encrypted in the running configuration

Answer: D,E



Question No: 13

Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)

A. DMVPN

B. MPLS VPN

C. Virtual Tunnel Interface (VTI)

D. SSL VPN

E. PPPoE

Answer: A,C



Question No: 14

Router E is configured with the EIGRP variance 2 command.

What path will Router E take to reach Router A?

A. only E-D-A

B. only E-B-A

C. only E-C-A

D. both E-B-A and E-C-A

E. both E-B-A and E-D-A

F. all available paths.

Answer: D

Explanation:

By using the u201cvariance 2 command we can share traffic to other feasible successor routes. But by default, EIGRP only shares traffic to 4 paths. So we need to use the u201cmaximum- paths 6 to make sure all of these routes are used.



Question No: 15

An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters:

mac address C601.420F.0007 subnet 2001:DB8:0:1::/64

Which IPv6 addresses should the engineer add to the documentation?

A. 2001:DB8:0:1:C601:42FF:FE0F:7

B. 2001:DB8:0:1:FFFF:C601:420F:7

C. 2001:DB8:0:1:FE80:C601:420F:7

D. 2001:DB8:0:1:C601:42FE:800F:7

Answer: A



Question No: 16

A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output? (Choose three.)

A. inbound crypto map

B. remaining key lifetime

C. path MTU

D. tagged packets

E. untagged packets

F. invalid identity packets

Answer: A,B,C



Question No: 17

A user is having issues accessing file shares on a network. The network engineer advises the user to open a web browser, input a prescribed IP address, and follow the instructions. After doing this, the user is able to access company shares. Which type of remote access did the engineer enable?

A. EZVPN

B. IPsec VPN client access

C. VPDN client access

D. SSL VPN client access

Answer: D



100% Leading Cisco 300-101 Questions & Answers shared by 2passeasy, Get HERE: https://www.2passeasy.com/dumps/300-101/ (New 487 Q&As)