The Secret of 300-101 exam cost

There is an interactive forum at Ucertify.com, you can visit that and chat along with other candidates. There are also valuable records or tips given by the former candidates who have handed the exam. A number of them have summarized the key items and possible questions that you may encounter throughout the preparation. Make complete use of these kinds of great valued preparation supplies. Take activities right now and you can find access in your desired result quickly. Then you can by means of away the usefulness books and concentrate about the original Cisco Cisco exam demos through Ucertify. Just keep at home and obtain your Cisco certification because easy because possible.


The article at Testaimer.com going over http://www.testaimer.com/300-101-test is very comprehensive.

2017 Mar 300-101 testing engine

Q1. Refer to the following access list. 

access-list 100 permit ip any any log 

After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this? 

A. A packet that matches access-list with the "log" keyword is Cisco Express Forwarding switched. 

B. A packet that matches access-list with the "log" keyword is fast switched. 

C. A packet that matches access-list with the "log" keyword is process switched. 

D. A large amount of IP traffic is being permitted on the router. 

Answer:

Explanation: 

Logging-enabled access control lists (ACLs) provide insight into traffic as it traverses the

network or is dropped by network devices. Unfortunately, ACL logging can be CPU intensive and can

negatively affect other functions of the network device. There are two primary factors that contribute to the

CPU load increase from ACL logging: process switching of packets that match log-enabled access control

entries (ACEs) and the generation and transmission of log messages. Reference: http://www.cisco.com/

web/about/security/intelligence/acl-logging.html#4


Q2. Which IPv6 address type is seen as the next-hop address in the output of the show ipv6 rip RIPng database command? 

A. link-local 

B. global 

C. site-local 

D. anycast 

E. multicast 

Answer:

Explanation: 


Q3. Two aspects of an IP SLA operation can be tracked: state and reachability. Which statement about state tracking is true? 

A. When tracking state, an OK return code means that the track's state is up; any other return code means that the track's state is down. 

B. When tracking state, an OK or over threshold return code means that the track's state is up; any other return code means that the track's state is down. 

C. When tracking state, an OK return code means that the track's state is down; any other return code means that the track's state is up. 

D. When tracking state, an OK or over threshold return code means that the track's state is down; any other return code means that the track's state is up. 

Answer:

Explanation: 


Q4. Which traffic characteristic is the reason that UDP traffic that carries voice and video is assigned to the queue only on a link that is at least 768 kbps? 

A. typically is not fragmented 

B. typically is fragmented 

C. causes windowing 

D. causes excessive delays for video traffic 

Answer:

Explanation: 


Q5. Which prefix is matched by the command ip prefix-list name permit 10.8.0.0/16 ge 24 le 24? 

A. 10.9.1.0/24 

B. 10.8.0.0/24 

C. 10.8.0.0/16 

D. 10.8.0.0/23 

Answer:

Explanation: 

With prefix lists, the ge 24 term means greater than or equal to a /24 and the le 24 means less than or

equal to /24, so only a /24 is both greater than or equal to 24 and less than or equal to 24. This translate to any prefix in the 10.8.x.0/24 network, where X is any value in the 0-255 range.

Only the choice of 10.8.0.0.24 matches this.


Replace 300-101 exam engine:

Q6. After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of "FFFE" inserted into the address. Based on this information, what do you conclude about these IPv6 addresses? 

A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device. 

B. The addresses were misconfigured and will not function as intended. 

C. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast. 

D. The IPv6 universal/local flag (bit 7) was flipped. 

E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled. 

Answer:

Explanation: 

Extended Unique Identifier (EUI), as per RFC2373, allows a host to assign iteslf a unique 64-

Bit IP Version 6 interface identifier (EUI-64). This feature is a key benefit over IPv4 as it eliminates the

need of manual configuration or DHCP as in the world of IPv4. The IPv6 EUI-64 format address is obtained

through the 48-bit MAC address. The Mac address is first separated into two 24-bits, with one being OUI

(Organizationally Unique Identifier) and the other being NIC specific. The 16-bit 0xFFFE is then inserted

between these two 24-bits to for the 64-bit EUI address. IEEE has chosen FFFE as a reserved value which

can only appear in EUI-64 generated from the an EUI-48 MAC address. Here is an example showing how

a the Mac Address is used to generate EUI.

Next, the seventh bit from the left, or the universal/local (U/L) bit, needs to be inverted. This bit identifies whether this interface identifier is universally or locally administered. If 0, the address is locally

administered and if 1, the address is globally unique. It is worth noticing that in the OUI portion, the globally

unique addresses assigned by the IEEE has always been set to 0 whereas the locally created addresses

has 1 configured. Therefore, when the bit is inverted, it maintains its original scope (global unique address

is still global unique and vice versa). The reason for inverting can be found in RFC4291 section 2.5.1.

Once the above is done, we have a fully functional EUI-64 format address. 

Reference: https://

supportforums.cisco.com/document/100566/understanding-ipv6-eui-64-bit- address


Q7. Which type of BGP AS number is 64591? 

A. a private AS number 

B. a public AS number 

C. a private 4-byte AS number 

D. a public 4-byte AS number 

Answer:

Explanation: 


Q8. CORRECT TEXT [SIMULATION] 

Route.com is a small IT corporation that is attempting to implement the network shown in the exhibit. Currently the implementation is partially completed. OSPF has been configured on routers Chicago and NewYork. The SO/O interface on Chicago and the SO/1 interface on NewYork are in Area 0. The loopbackO interface on NewYork is in Area 1. However, they cannot ping from the serial interface of the Seattle router to the loopback interface of the NewYork router. You have been asked to complete the implementation to allow this ping. 

ROUTE.com's corporate implementation guidelines require: 

. The OSPF process ID for all routers must be 10. 

. The routing protocol for each interface must be enabled under the routing process. 

. The routing protocol must be enabled for each interface using the most specific wildcard mask possible. 

.The serial link between Seattle and Chicago must be in OSPF area 21. 

.OSPF area 21 must not receive any inter-area or external routes. 

Network Information 

Seattle 

S0/0 192.168.16.5/30 - Link between Seattle and Chicago 

Secret Password: cisco 

Chicago 

S0/0 192.168.54.9/30 - Link between Chicago and NewYork 

S0/1 192.168.16.6/30 - Link between Seattle and Chicago Secre Password: cisco 

NewYork 

S0/1 192.168.54.10/30 - Link between Chicago and NewYork 

Loopback0 172.16.189.189 

Secret Password: cisco 

Answer: Here is the solution below: 

Explanation: 

Note: In actual exam, the IP addressing, OSPF areas and process ID, and router hostnames may change, but the overall solution is the same. 

Seattle’s S0/0 IP Address is 192.168.16.5/30. So, we need to find the network address and wildcard mask of 192.168.16.5/30 in order to configure the OSPF. 

IP Address: 192.168.16.5 /30 

Subnet Mask: 255.255.255.252 

Here subtract 252 from 2565, 256-252 = 4, hence the subnets will increment by 4. 

First, find the 4th octet of the Network Address: 

The 4th octet of IP address (192.168.16.5) belongs to subnet 1 (4 to 7). 

Network Address: 192.168.16.4 

Broadcast Address: 192.168.16.7 

Lets find the wildcard mask of /30. 

Subnet Mask: (Network Bits – 1’s, Host Bits – 0’s) 

Lets find the wildcard mask of /30: 

Now we configure OSPF using process ID 10 (note the process ID may change to something else in real exam). 

Seattle>enable 

Password: cisco

Seattle#conf t 

Seattle(config)#router ospf 10 

Seattle(config-router)#network 192.168.16.4 0.0.0.3 area 21 

One of the tasks states that area 21 should not receive any external or inter-area routes (except 

the default route). 

Seattle(config-router)#area 21 stub 

Seattle(config-router)#end 

Seattle#copy run start 

Chicago Configuration: 

Chicago>enable 

Password: cisco 

Chicago#conf t 

Chicago(config)#router ospf 10 

We need to add Chicago’s S0/1 interface to Area 21 

Chicago(config-router)#network 192.168.16.4 0.0.0.3 area 21 

Again, area 21 should not receive any external or inter-area routes (except the default route). 

In order to accomplish this, we must stop LSA Type 5 if we don’t want to send external routes. And 

if we don’t want to send inter-area routes, we have to stop LSA Type 3 and Type 4. Therefore we 

want to configure area 21 as a totally stubby area. 

Chicago(config-router)#area 21 stub no-summary 

Chicago(config-router)#end 

Chicago#copy run start 

The other interface on the Chicago router is already configured correctly in this scenario, as well 

as the New York router so there is nothing that needs to be done on that router. 


Q9. Refer to the following output: 

Router#show ip nhrp detail 

10.1.1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47 

TypE. dynamic, Flags: authoritative unique nat registered used 

NBMA address: 10.12.1.2 

What does the authoritative flag mean in regards to the NHRP information? 

A. It was obtained directly from the next-hop server. 

B. Data packets are process switches for this mapping entry. 

C. NHRP mapping is for networks that are local to this router. 

D. The mapping entry was created in response to an NHRP registration request. 

E. The NHRP mapping entry cannot be overwritten. 

Answer:

Explanation: 

Show NHRP: Examples

The following is sample output from the show ip nhrp command:

Router# show ip nhrp

10.0.0.2 255.255.255.255, tunnel 100 created 0:00:43 expire 1:59:16 Type: dynamic Flags: authoritative

NBMA address: 10.1111.1111.1111.1111.1111.1111.1111.1111.1111.11 10.0.0.1 255.255.255.255,

Tunnel0 created 0:10:03 expire 1:49:56 Type: static Flags: authoritative NBMA address: 10.1.1.2 The

fields in the sample display are as follows:

The IP address and its network mask in the IP-to-NBMA address cache. The mask is always

255.255.255.255 because Cisco does not support aggregation of NBMA information through NHRP.

The interface type and number and how long ago it was created (hours:minutes:seconds).

The time in which the positive and negative authoritative NBMA address will expire

(hours:minutes:seconds). This value is based on the ip nhrp holdtime

command.

Type of interface:

dynamic--NBMA address was obtained from the NHRP Request packet.

static--NBMA address was statically configured.

Flags:

authoritative--Indicates that the NHRP information was obtained from the Next Hop Server or router that

maintains the NBMA-to-IP address mapping for a particular destination. Reference: http://www.cisco.com/

c/en/us/td/docs/ios/12_4/ip_addr/configuration/guide/hadnhrp.html


Q10. A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to 172.20.14.225. Which command should be applied to the configuration to allow this? 

A. router(config-if)#ip helper-address 172.20.14.225 

B. router(config-if)#udp helper-address 172.20.14.225 

C. router(config-if)#ip udp helper-address 172.20.14.225 

D. router(config-if)#ip helper-address 172.20.14.225 69 53 49 

Answer:

Explanation: 

To let a router forward broadcast packet the command ip helper-address can be used. The broadcasts will

be forwarded to the unicast address which is specified with the ip helper command.

ip helper-address {ip address}

When configuring the ip helper-address command, the following broadcast packets will be forwarded by

the router by default:

TFTP - UDP port 69

Domain Name System (DNS) UDP port 53

Time service - port 37

NetBIOS Name Server - port 137

NetBIOS Datagram Server - port 138

Bootstrap Protocol (BOOTP) - port 67

TACACS UDP port 49 Reference: http://www.cisco-faq.com/163/forward_udp_broadcas.html

Topic 6, Infrastructure Services 

61. A network engineer is configuring SNMP on network devices to utilize one-way SNMP notifications. However, the engineer is not concerned with authentication or encryption. Which command satisfies the requirements of this scenario? 

A. router(config)#snmp-server host 172.16.201.28 traps version 2c CISCORO 

B. router(config)#snmp-server host 172.16.201.28 informs version 2c CISCORO 

C. router(config)#snmp-server host 172.16.201.28 traps version 3 auth CISCORO 

D. router(config)#snmp-server host 172.16.201.28 informs version 3 auth CISCORO 

Answer:

Explanation: 

Most network admins and engineers are familiar with SNMPv2c which has become the

dominant SNMP version of the past decade. It's simple to configure on both the router/switch-side and just

as easy on the network monitoring server. The problem of course is that the SNMP statistical payload is

not encrypted and authentication is passed in cleartext. Most companies have decided that the information

being transmitted isn't valuable enough to be worth the extra effort in upgrading to SNMPv3, but I would

suggest otherwise. Like IPv4 to IPv6, there are some major changes under the hood. SNMP version 2

uses community strings (think cleartext passwords, no encryption) to authenticate polling and trap delivery.

SNMP version 3 moves away from the community string approach in favor of user- based authentication

and view-based access control. The users are not actual local user accounts, rather they are simply a

means to determine who can authenticate to the device. The view is used to define what the user account

may access on the IOS device. Finally, each user is added to a group, which determines the access policy

for its users. Users, groups, views. Reference: http://www.ccnpguide.com/snmp-version-3/