aiotestking uk

300-101 Exam Questions - Online Test


300-101 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. A network engineer notices that transmission rates of senders of TCP traffic sharply increase and decrease simultaneously during periods of congestion. Which condition causes this? 

A. global synchronization 

B. tail drop 

C. random early detection 

D. queue management algorithm 

Answer:

Explanation: 

TCP global synchronization in computer networks can happen to TCP/IP flows during periods of

congestion because each sender will reduce their transmission rate at the same time when packet loss

occurs. Routers on the Internet normally have packet queues, to allow them to hold packets when the

network is busy, rather than discarding them. Because routers have limited resources, the size of these

queues is also limited. The simplest technique to limit queue size is known as tail drop. The queue is

allowed to fill to its maximum size, and then any new packets are simply discarded, until there is space in

the queue again. This causes problems when used on TCP/IP routers handling multiple TCP streams,

especially when bursty traffic is present. While the network is stable, the queue is constantly full, and there

are no problems except that the full queue results in high latency. However, the introduction of a sudden

burst of traffic may cause large numbers of established, steady streams to lose packets simultaneously.

Reference: http://en.wikipedia.org/wiki/TCP_global_synchronization

Q2. Which traffic characteristic is the reason that UDP traffic that carries voice and video is assigned to the queue only on a link that is at least 768 kbps? 

A. typically is not fragmented 

B. typically is fragmented 

C. causes windowing 

D. causes excessive delays for video traffic 

Answer:

Explanation: 

Q3. An engineer executes the ip flow ingress command in interface configuration mode. What is the result of this action? 

A. It enables the collection of IP flow samples arriving to the interface. 

B. It enables the collection of IP flow samples leaving the interface. 

C. It enables IP flow while disabling IP CEF on the interface. 

D. It enables IP flow collection on the physical interface and its subinterfaces. 

Answer:

Explanation: 

Q4. A network engineer is trying to modify an existing active NAT configuration on an IOS router by using the following command: 

(config)# no ip nat pool dynamic-nat-pool 192.1.1.20 192.1.1.254 netmask 255.255.255.0 

Upon entering the command on the IOS router, the following message is seen on the console: 

%Dynamic Mapping in Use, Cannot remove message or the %Pool outpool in use, cannot destroy 

What is the least impactful method that the engineer can use to modify the existing IP NAT configuration? 

A. Clear the IP NAT translations using the clear ip nat traffic * " command, then replace the NAT configuration quickly, before any new NAT entries are populated into the translation table due to active NAT traffic. 

B. Clear the IP NAT translations using the clear ip nat translation * " command, then replace the NAT configuration quickly, before any new NAT entries are populated into the translation table due to active NAT traffic. 

C. Clear the IP NAT translations using the reload command on the router, then replace the NAT configuration quickly, before any new NAT entries are populated into the translation table due to active NAT traffic. 

D. Clear the IP NAT translations using the clear ip nat table * " command, then replace the NAT configuration quickly, before any new NAT entries are populated into the translation table due to active NAT traffic. 

Answer:

Explanation: 

Q5. The following configuration is applied to a router at a branch site: 

ipv6 dhcp pool dhcp-pool 

dns-server 2001:DB8:1:B::1 

dns-server 2001:DB8:3:307C::42 

domain-name example.com 

If IPv6 is configured with default settings on all interfaces on the router, which two dynamic IPv6 addressing mechanisms could you use on end hosts to provide end-to-end connectivity? (Choose two.) 

A. EUI-64 

B. SLAAC 

C. DHCPv6 

D. BOOTP 

Answer: A,B 

Explanation: 

Q6. Refer to the exhibit. 

Which statement about the output of the show flow-sampler command is true? 

A. The sampler matched 10 packets, each packet randomly chosen from every group of 100 packets. 

B. The sampler matched 10 packets, one packet every 100 packets. 

C. The sampler matched 10 packets, each one randomly chosen from every 100-second interval. 

D. The sampler matched 10 packets, one packet every 100 seconds. 

Answer:

Explanation: 

The sampling mode determines the algorithm that selects a subset of traffic for NetFlow

processing. In the random sampling mode that Random Sampled NetFlow uses, incoming packets are

randomly selected so that one out of each n sequential packets is selected on average for NetFlow

processing. For example, if you set the sampling rate to 1 out of 100 packets, then NetFlow might sample

the 5th, 120th, 199th, 302nd, and so on packets. This sample configuration provides NetFlow data on 1

percent of total traffic. The n value is a parameter from 1 to 65535 packets that you can configure. Table 2

show flow-sampler Field Descriptions Field Description Sampler Name of the flow sampler id Unique ID of

the flow sampler packets matched Number of packets matched for the flow sampler mode Flow sampling

mode sampling interval is Flow sampling interval (in packets) Reference: http://www.cisco.com/c/en/us/td/

docs/ios/12_0s/feature/guide/nfstatsa.html#wp1084291

Q7. PPPoE is composed of which two phases? 

A. Active Authentication Phase and PPP Session Phase 

B. Passive Discovery Phase and PPP Session Phase 

C. Active Authorization Phase and PPP Session Phase 

D. Active Discovery Phase and PPP Session Phase 

Answer:

Explanation: 

PPPoE is composed of two main phases:

Active Discovery Phase--In this phase, the PPPoE client locates a PPPoE server, called an access

concentrator. During this phase, a Session ID is assigned and the PPPoE layer is established.

PPP Session Phase--In this phase, PPP options are negotiated and authentication is performed. Once the

link setup is completed, PPPoE functions as a Layer 2 encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers.

Reference: 

http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn- cli/vpn-pppoe.html

Topic 3, Layer 3 Technologies 

20. Refer to the exhibit. 

Which one statement is true? 

A. Traffic from the 172.16.0.0/16 network will be blocked by the ACL. 

B. The 10.0.0.0/8 network will not be advertised by Router B because the network statement for the 10.0.0.0/8 network is missing from Router B. 

C. The 10.0.0.0/8 network will not be in the routing table on Router B. 

D. Users on the 10.0.0.0/8 network can successfully ping users on the 192.168.5.0/24 network, but users on the 192.168.5.0/24 cannot successfully ping users on the 10.0.0.0/8 network. 

E. Router B will not advertise the 10.0.0.0/8 network because it is blocked by the ACL. 

Q8. A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password. Which technology, in combination with PPPoE, can be used for authentication in this manner? 

A. PAP 

B. dot1x 

C. IPsec 

D. CHAP 

E. ESP 

Answer:

Explanation: 

With PPPoE, the two authentication options are PAP and CHAP. When CHAP is enabled on

an interface and a remote device attempts to connect to it, the access server sends a CHAP packet to the

remote device. The CHAP packet requests or "challenges" the remote device to respond. The challenge

packet consists of an ID, a random number, and the host name of the local router. When the remote device

receives the challenge packet, it concatenates the ID, the remote device's password, and the random

number, and then encrypts all of it using the remote device's password. The remote device sends the

results back to the access server, along with the name associated with the password used in the

encryption process. When the access server receives the response, it uses the name it received to retrieve

a password stored in its user database. The retrieved password should be the same password the remote

device used in its encryption process. The access server then encrypts the concatenated information with

the newly retrieved password--if the result matches the result sent in the response packet, authentication

succeeds. The benefit of using CHAP authentication is that the remote device's password is never

transmitted in clear text (encrypted). This prevents other devices from stealing it and gaining illegal access

to the ISP's network. Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/

guide/fsecur_c/scfathen.ht ml

Q9. Which parameter in an SNMPv3 configuration offers authentication and encryption? 

A. auth 

B. noauth 

C. priv 

D. secret 

Answer:

Explanation: 

Q10. Refer to the exhibit. Which statement about the command output is true? 

A. The router exports flow information to 10.10.10.1 on UDP port 5127. 

B. The router receives flow information from 10.10.10.2 on UDP port 5127. 

C. The router exports flow information to 10.10.10.1 on TCP port 5127. 

D. The router receives flow information from 10.10.10.2 on TCP port 5127. 

Answer:

Explanation: