Q1. What is a reason for an EIGRP router to send an SIA reply to a peer?
A. to respond to an SIA query with the alternative path requested
B. to respond to a query reporting that the prefix has gone stuck-in-active
C. to respond to an SIA query that the router is still waiting on replies from its peers
D. to respond to a reply reporting that the prefix has gone stuck-in-active
Answer: C
Q2. Which statement about LISP encapsulation in an EIGRP OTP implementation is true?
A. OTP uses LISP encapsulation for dynamic multipoint tunneling.
B. OTP maintains the LISP control plane.
C. OTP uses LISP encapsulation to obtain routes from neighbors.
D. LISP learns the next hop.
Answer: A
Q3. Refer to the exhibit.
Assume that Cisco Discovery Protocol is supported and enabled only on switches A and C.
Which information is returned when you issue the command show cdp neighbors on switch C?
A. a limited amount of information about switch B
B. neighbor details for switch A
C. neighbor details for switch B
D. neighbor details for switch C
Answer: B
Q4. Which two options are the two main phases of PPPoE? (Choose two.)
A. Active Discovery Phase
B. IKE Phase
C. Main Mode Phase
D. PPP Session Phase
E. Aggressive Mode Phase
F. Negotiation Phase
Answer: A,D
Explanation:
PPPoE is composed of two main phases:
Active Discovery Phase — In this phase, the PPPoE client locates a PPPoE server, called an access concentrator. During this phase, a Session ID is assigned and the PPPoE layer is established.
PPP Session Phase — In this phase, PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation method, allowing data to be transferred over the PPP link within PPPoE headers.
Reference: http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/vpn/asa-vpn-cli/vpn-pppoe.html
Q5. Which statement describes the effect of the configuration line redistribute maximum-prefix 1500 90 withdraw?
A. After the 1500th route is redistributed, a warning is posted in the log file and 90 more routes are redistributed before further routes are discarded.
B. After the 1350th route is redistributed, a warning is posted in the log file until the 1500th route is redistributed, and then further routes are discarded.
C. After the 1500th route is redistributed, further routes are discarded only if the CPU is above 90%.
D. The routing protocol receives 1500 routes. After the routing process has redistributed 90% of the routes, the process supernets routes and injects a NULL route to prevent black-hole routing.
Answer: B
Q6. DRAG DROP
Drag and drop the EIGRP query condition on the left to the corresponding action taken by the router on the right.
Answer:
Q7. Which two parameters does the Tunnel Mode Auto Selection feature select automatically? (Choose two.)
A. the tunneling protocol
B. the transport protocol
C. the ISAKMP profile
D. the transform-set
E. the tunnel peer
Answer: A,B
Explanation:
The Tunnel Mode Auto Selection feature eases the configuration and spares you about knowing the responder’s details. This feature automatically applies the tunneling protocol (GRE or IPsec) and transport protocol (IPv4 or IPv6) on the virtual template as soon as the IKE profile creates the virtual access interface. This feature is useful on dual stack hubs aggregating multivendor remote access, such as Cisco AnyConnect VPN Client, Microsoft Windows7 Client, and so on.
Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-3s/sec-sec-for-vpns-w-ipsec-xe-3s-book/sec-ipsec-virt-tunnl.html
Q8. Which configuration sets a minimum quality of service on a Layer 2 access switch?
A. mls qos cos override
mls qos cos 2
B. mls qos cos 2
C. mls qos trust cos
mls qos cos 2
D. mls qos trust cos
E. mls qos trust dscp
Answer: A
Explanation:
The mls qos cos override interface command must be used to ensure that untrusted CoS values are explicitly set 0 (default).
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/Qo S-SRND-Book/QoSDesign.html
Q9. Refer to the exhibit.
Which statement about the debug behavior of the device is true?
A. The device debugs all IP events for 172.16.129.4.
B. The device sends all debugging information for 172.16.129.4.
C. The device sends only NTP debugging information to 172.16.129.4.
D. The device sends debugging information every five seconds.
Answer: A
Explanation:
This is an example of a conditional debug, where there is a single condition specified of IP address 172.16.129.4. So, all IP events for that address will be output in the debug.
Q10. Refer to the exhibit.
Video Source S is sending interactive video traffic to Video Receiver R. Router R1 has multiple routing table entries for destination R. Which load-balancing mechanism on R1 can cause out-of-order video traffic to be received by destination R?
A. per-flow load balancing on R1 for destination R
B. per-source-destination pair load balancing on R1 for destination R
C. CEF load balancing on R1 for destination R
D. per-packet load balancing on R1 for destination R
Answer: D
Explanation:
Per-packet load balancing guarantees equal load across all links, however potentially the packets may arrive out-of-order at the destination as differential delay may exist within the network.
Reference: http://www.cisco.com/en/US/products/hw/modules/ps2033/prod_technical_reference09186 a00800afeb7.html