P.S. Accurate 300-101 interactive bootcamp are available on Google Drive, GET MORE: https://drive.google.com/open?id=1rlPNNoD0ZdgZsqoRN-j_tpudN825BWM5
Q12. Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)
A. DMVPN
B. MPLS VPN
C. Virtual Tunnel Interface (VTI)
D. SSL VPN
E. PPPoE
Answer: A,C
Q13. A network engineer executes the show crypto ipsec sa command. Which three pieces of information are displayed in the output? (Choose three.)
A. inbound crypto map
B. remaining key lifetime
C. path MTU
D. tagged packets
E. untagged packets
F. invalid identity packets
Answer: A,B,C
Q14. What are the three modes of Unicast Reverse Path Forwarding?
A. strict mode, loose mode, and VRF mode
B. strict mode, loose mode, and broadcast mode
C. strict mode, broadcast mode, and VRF mode
D. broadcast mode, loose mode, and VRF mode
Answer: A
Q15. Which type of traffic does DHCP snooping drop?
A. discover messages
B. DHCP messages where the source MAC and client MAC do not match
C. traffic from a trusted DHCP server to client
D. DHCP messages where the destination MAC and client MAC do not match
Answer: B
Q16. Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process?
A. dual-stack method
B. 6to4 tunneling
C. GRE tunneling
D. NAT-PT
Answer: A
Q17. When a packet is denied by an IPv6 traffic filter, which additional action does the device perform?
A. It scans the rest of the ACL for a permit entry matching the destination
B. It generates a TCP Fin bit and sends it to the source.
C. A creates a null route for the destination and adds it to the route table
D. It generates an ICMP unreachable message for the frame.
Answer: A
Q18. When policy-based routing (PBR) is being configured,
Which three criteria can the set command specify? (Choose three.)
A. all interfaces through which the packets can be routed
B. all interfaces in the path toward the destination
C. adjacent next hop router in the path toward the destination
D. all routers in the path toward the destination
E. all networks in the path toward the destination
F. type of service and precedence in the IP packets
Answer: A,C,F
Explanation:
Configuring Policy-Based Routing (PBR):
You can configure PBR by following these steps. Some of the steps may be omitted depending on your application for PBR. For this example, note the set condition options listed is step 3 (answers are bolded).
Step1
Define and configure the route map needed for the policy. This is accomplished with the route-map command, as discussed previously.
Step2
Define and configure the match statements the route map will use. The most common
match statements used are the following: match ip address [access-list number]
The match ip address is used to call a standard, extended, or expanded-range ACL. match length [min_packet_length_0-2147483647] [max_packet_length_0-2147483647]
The match length is used to match the Layer 3 packet length, in bytes, with all associated headers and trailers included. You must enter the minimum and maximum packet length. Use the match length command to policy route traffic based on packet size. You can deploy this to route traffic with large or small packet sizes to specific areas of the network. Step3
Configure and define the new routing policy with set commands. Multiple set commands may be used; if multiple commands are used, they are executed in the following order:
set ip {precedence [value_0-7 | name] | tos [value_0-8 | name]} set ip next-hop ip_address
set interface interface_name
set ip default next-hop ip_address set default interface interface_name
Set ip precedence {[1-7]|[routine|critical|flash|flash- override|immediate|internet|network|priority]}
Q19. You have been asked to evaluate how EIGRP is functioning in a customer network.
What is the advertised distance for the 192.168.46.0 network on R1?
A. 333056
B. 1938688
C. 1810944
D. 307456
Answer: A
Q20. After you review the output of the command show ipv6 interface brief, you see that several IPv6 addresses have the 16-bit hexadecimal value of "FFFE" inserted into the address. Based on this information, what do you conclude about these IPv6 addresses?
A. IEEE EUI-64 was implemented when assigning IPv6 addresses on the device.
B. The addresses were misconfigured and will not function as intended.
C. IPv6 addresses containing "FFFE" indicate that the address is reserved for multicast.
D. The IPv6 universal/local flag (bit 7) was flipped.
E. IPv6 unicast forwarding was enabled, but IPv6 Cisco Express Forwarding was disabled.
Answer: A
Q21. A network engineer is modifying RIPng timer configuration. Which configuration mode should the engineer use?
A. router(config-rtr)#
B. router(config-ripng)#
C. router(config-if)#
D. router(config)#
Answer: C
Explanation:
http://www.cisco.com/c/en/us/td/docs/ios/12_2/ip/configuration/guide/fipr_c/1cfrip.html
Recommend!! Get the Accurate 300-101 dumps in VCE and PDF From Examcollectionplus, Welcome to download: https://www.examcollectionplus.net/vce-300-101/ (New 745 Q&As Version)