An Expert interview about ccnp routing and switching route 300 101

100% Correct of 300 101 vce exam answers materials and resource for Cisco certification for IT engineers, Real Success Guaranteed with Updated 300 101 route pdf pdf dumps vce Materials. 100% PASS Implementing Cisco IP Routing exam Today!


The article at Testaimer.com going over http://www.testaimer.com/300-101-test is very comprehensive.

Q21. When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication? 

A. username 

B. password 

C. community-string 

D. encryption-key 

Answer:

Explanation: 

The following security models exist: SNMPv1, SNMPv2, SNMPv3. The following security

levels exits: "noAuthNoPriv" (no authentiation and no encryption noauth keyword in CLI),

"AuthNoPriv" (messages are authenticated but not encrypted auth keyword in CLI), "AuthPriv" (messages

are authenticated and encrypted priv keyword in CLI). SNMPv1 and SNMPv2 models only support the

"noAuthNoPriv" model since they use plain community string to match the incoming packets. The SNMPv3

implementations could be configured to use either of the models on per-group basis (in case if

"noAuthNoPriv" is configured, username serves as a replacement for community string). Reference: http://

blog.ine.com/2008/07/19/snmpv3-tutorial/


Q22. The following configuration is applied to a router at a branch site: 

ipv6 dhcp pool dhcp-pool 

dns-server 2001:DB8:1:B::1 

dns-server 2001:DB8:3:307C::42 

domain-name example.com 

If IPv6 is configured with default settings on all interfaces on the router, which two dynamic IPv6 addressing mechanisms could you use on end hosts to provide end-to-end connectivity? (Choose two.) 

A. EUI-64 

B. SLAAC 

C. DHCPv6 

D. BOOTP 

Answer: A,B 

Explanation: 


Q23. Which PPP authentication method sends authentication information in cleartext? 

A. MS CHAP 

B. CDPCP 

C. CHAP 

D. PAP 

Answer:

Explanation: 


Q24. A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two.) 

A. IP routing 

B. FIB 

C. ARP cache 

D. MAC address table 

E. Cisco Express Forwarding table 

F. topology table 

Answer: A,B 

Explanation: 

To clear one or more entries in the IP routing table, use the following commands in any mode:

Command Purpose

clear ip route {* |

Clears one or more routes from both the

{route |

unicast RIB and all the module FIBs. The

prefix/length}[next-hop route options are as follows:

interface]}

· *--All routes.

[vrf vrf-name]

Example:

· route--An individual IP route.

switch(config)# clear ip

· prefix/length--Any IP prefix.

route

10.2.2.2 · next-hop--The next-hop address · interface--The interface to reach the next-hop address.

The vrf-name can be any case-sensitive, al-phanumeric string up to 32 characters.

Reference:

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/unicast/5_0_3_N1_1/Ci

sco_n5k_layer3_ucast_cfg_rel_503_N1_1/l3_manage-routes.html


Q25. Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the routing table? 

A. source address 

B. destination address 

C. router interface 

D. default gateway 

Answer:

Explanation: 

The Unicast RPF feature helps to mitigate problems that are caused by the introduction of

malformed or forged (spoofed) IP source addresses into a network by discarding IP packets that lack a

verifiable IP source address. For example, a number of common types of denial-of-service (DoS) attacks,

including Smurf and Tribal Flood Network (TFN), can take advantage of forged or rapidly changing source

IP addresses to allow attackers to thwart efforts to locate or filter the attacks. For Internet service providers

(ISPs) that provide public access, Unicast RPF deflects such attacks by forwarding only packets that have

source addresses that are valid and consistent with the IP routing table. This action protects the network of

the ISP, its customer, and the rest of the Internet. Reference: http://www.cisco.com/en/US/docs/ios/12_2/

security/configuration/guide/scfrpf.html


Q26. Refer to the exhibit. 

Which statement about the output of the show flow-sampler command is true? 

A. The sampler matched 10 packets, each packet randomly chosen from every group of 100 packets. 

B. The sampler matched 10 packets, one packet every 100 packets. 

C. The sampler matched 10 packets, each one randomly chosen from every 100-second interval. 

D. The sampler matched 10 packets, one packet every 100 seconds. 

Answer:

Explanation: 

The sampling mode determines the algorithm that selects a subset of traffic for NetFlow

processing. In the random sampling mode that Random Sampled NetFlow uses, incoming packets are

randomly selected so that one out of each n sequential packets is selected on average for NetFlow

processing. For example, if you set the sampling rate to 1 out of 100 packets, then NetFlow might sample

the 5th, 120th, 199th, 302nd, and so on packets. This sample configuration provides NetFlow data on 1

percent of total traffic. The n value is a parameter from 1 to 65535 packets that you can configure. Table 2

show flow-sampler Field Descriptions Field Description Sampler Name of the flow sampler id Unique ID of

the flow sampler packets matched Number of packets matched for the flow sampler mode Flow sampling

mode sampling interval is Flow sampling interval (in packets) Reference: http://www.cisco.com/c/en/us/td/

docs/ios/12_0s/feature/guide/nfstatsa.html#wp1084291


Q27. You have been asked to evaluate how EIGRP is functioning in a customer network. 

What is the advertised distance for the 192.168.46.0 network on R1? 

A. 333056 

B. 1938688 

C. 1810944 

D. 307456 

Answer:

Explanation: 


Q28. You have been asked to evaluate how EIGRP is functioning in a customer network. 

What percent of R1’s interfaces bandwidth is EIGRP allowed to use? 

A. 10 

B. 20 

C. 30 

D. 40 

Answer:

Explanation: 


Q29. Which technology was originally developed for routers to handle fragmentation in the path between end points? 

A. PMTUD 

B. MSS 

C. windowing 

D. TCP 

E. global synchronization 

Answer:

Explanation: 


Q30. A network engineer is investigating the cause of a service disruption on a network segment and executes the debug condition interface fastethernet f0/0 command. In which situation is the debugging output generated? 

A. when packets on the interface are received and the interface is operational 

B. when packets on the interface are received and logging buffered is enabled 

C. when packets on the interface are received and forwarded to a configured syslog server 

D. when packets on the interface are received and the interface is shut down 

Answer:

Explanation: