Top 10 discount pack 300-101 for candidates (11 to 20)

The article at going over is very comprehensive.

Q11. What is the primary service that is provided when you implement Cisco Easy Virtual Network? 

A. It requires and enhances the use of VRF-Lite. 

B. It reduces the need for common services separation. 

C. It allows for traffic separation and improved network efficiency. 

D. It introduces multi-VRF and label-prone network segmentation. 



Q12. Which switching method is used when entries are present in the output of the command show ip cache? 

A. fast switching 

B. process switching 

C. Cisco Express Forwarding switching 

D. cut-through packet switching 



Fast switching allows higher throughput by switching a packet using a cache created by the initial packet

sent to a particular destination. Destination addresses are stored in the high-speed cache to expedite forwarding. Routers offer better packet-transfer performance when fast switching is enabled. Fast switching is enabled by default on all interfaces that support fast switching.

To display the routing table cache used to fast switch IP traffic, use the "show ip cache" EXEC command.



Q13. What is the result of the command ip flow-export destination 5858? 

A. It configures the router to export cache flow information to IP on port UDP/5858. 

B. It configures the router to export cache flow information about flows with destination IP and port UDP/5858. 

C. It configures the router to receive cache flow information from IP on port UDP/5858. 

D. It configures the router to receive cache flow information about flows with destination IP and port UDP/5858. 



To enable the exporting of information in NetFlow cache entries, use the ip flow-export destination

command in global configuration mode.

Syntax Description

ip- IP address of the workstation to which you want to send the address NetFlow information.

udp-port UDP protocol-specific port number.


Q14. A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no interesting traffic exists. Which feature can be used to accomplish this task? 

A. TCP Adjust 

B. Dialer Persistent 

C. PPPoE Groups 

D. half-bridging 

E. Peer Neighbor Route 



A new interface configuration command, dialer persistent, allows a dial-on-demand routing (DDR) dialer

profile connection to be brought up without being triggered by interesting traffic. When configured, the dialer persistent command starts a timer when the dialer interface starts up and starts the connection when the timer expires. If interesting traffic arrives before the timer expires, the connection is still brought up and set as persistent. The command provides a default timer interval, or you can set a custom timer interval. To configure a dialer interface as persistent, use the following commands beginning in global configuration mode:

Command Purpose

Step 1 Router(config)# interface dialer Creates a dialer interface and number enters interface

Configuration mode.

Step 2 Router(config-if)# ip address Specifies the IP address and mask address mask of the dialer

interface as a node in the destination network to be called.

Step 3 Router(config-if)# encapsulation Specifies the encapsulation type.


Step 4 Router(config-if)# dialer string Specifies the remote destination to dial-string class class-name call

and the map class that defines characteristics for calls to this destination.

Step 5 Router(config-if)# dialer pool Specifies the dialing pool to use number for calls to this destination.

Step 6 Router(config-if)# dialer-group Assigns the dialer interface to a group-number dialer group.

Step 7 Router(config-if)# dialer-list Specifies an access list by list dialer-group protocol protocol- number or

by protocol and list name {permit | deny | list number to define the interesting access-list-number} packets that can trigger a call. Step 8 Router(config-if)# dialer

(Optional) Specifies the remote-name user-name

authentication name of the remote router on the destination subnetwork for a dialer interface.

Step 9 Router(config-if)# dialer Forces a dialer interface to be persistent [delay [initial] connected at all

times, even in seconds | max-attempts the absence of interesting traffic.




Q15. What are the three modes of Unicast Reverse Path Forwarding? 

A. strict mode, loose mode, and VRF mode 

B. strict mode, loose mode, and broadcast mode 

C. strict mode, broadcast mode, and VRF mode 

D. broadcast mode, loose mode, and VRF mode 



Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit

the malicious traffic on an enterprise network. This security feature works by enabling a router to verify the

reachability of the source address in packets being forwarded. This capability can limit the appearance of

spoofed addresses on a network. If the source IP address is not valid, the packet is discarded. Unicast

RPF works in one of three different modes: strict mode, loose mode, or VRF mode. Note that not all

network devices support all three modes of operation. Unicast RPF in VRF mode will not be covered in this

document. When administrators use Unicast RPF in strict mode, the packet must be received on the

interface that the router would use to forward the return packet. Unicast RPF configured in strict mode may

drop legitimate traffic that is received on an interface that was not the router's choice for sending return

traffic. Dropping this legitimate traffic could occur when asymmetric routing paths are present in the

network. When administrators use Unicast RPF in loose mode, the source address must appear in the

routing table. Administrators can change this behavior using the allow-default option, which allows the use

of the default route in the source verification process. Additionally, a packet that contains a source address

for which the return route points to the Null 0 interface will be dropped. An access list may also be

specified that permits or denies certain source addresses in Unicast RPF loose mode. Care must be taken

to ensure that the appropriate Unicast RPF mode (loose or strict) is configured during the deployment of

this feature because it can drop legitimate traffic. Although asymmetric traffic flows may be of concern

when deploying this feature, Unicast RPF loose mode is a scalable option for networks that contain

asymmetric routing paths. Reference:


Q16. You have been asked to evaluate how EIGRP is functioning in a customer network. 

Traffic from R1 to R61 s Loopback address is load shared between R1-R2-R4-R6 and R1-R3-R5-R6 paths. What is the ratio of traffic over each path? 

A. 1:1 

B. 1:5 

C. 6:8 

D. 19:80 



Q17. You have been asked to evaluate how EIGRP is functioning in a customer network. 

Which key chain is being used for authentication of EIGRP adjacency between R4 and R2? 



C. key 

D. MD5 


Explanation: R4 and R2 configs are as shown below: 

Clearly we see the actual key chain is named CISCO. 

Q18. A network engineer finds that a core router has crashed without warning. In this situation, which feature can the engineer use to create a crash collection? 

A. secure copy protocol 

B. core dumps 

C. warm reloads 


E. NetFlow 



When a router crashes, it is sometimes useful to obtain a full copy of the memory image (called a core

dump) to identify the cause of the crash. Core dumps are generally very useful to your technical support representative.

Four basic ways exist for setting up the router to generate a core dump:

Using Trivial File Transfer Protocol (TFTP)

Using File Transfer Protocol (FTP)

Using remote copy protocol (rcp)

Using a Flash disk Reference:


Q19. Which Cisco VPN technology uses AAA to implement group policies and authorization and is also used for the XAUTH authentication method? 


B. Cisco Easy VPN 





Q20. Which NetFlow component is applied to an interface and collects information about flows? 

A. flow monitor 

B. flow exporter 

C. flow sampler 

D. flow collector 



Flow monitors are the NetFlow component that is applied to interfaces to perform network

traffic monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor

after you create the flow monitor. The flow monitor cache is automatically created at the time the flow

monitor is applied to the first interface. Flow data is collected from the network traffic during the monitoring

process based on the key and nonkey fields in the record, which is configured for the flow monitor and

stored in the flow monitor cache. Reference:

reference/fnf_book/fnf_01.html#w p1314030