CCNP ENARSI PART 13
|
|
Title of test:
![]() CCNP ENARSI PART 13 Description: CCNP ENARSI |



| New Comment |
|---|
NO RECORDS |
|
What are two features of BFD? (Choose two.). A. reliable. B. replaces hello messages. C. requires routing protocols. D. scalable. E. intensive on CPU for Layer 2 links. What is the role of LDP in MPLS networks?. A. It creates MPLS packet forwarding along with the IGP routes. B. It enables label binding information to exchange with peer LSRs. C. It disables label binding information to exchange with peer LSRs. D. It enables label binding that exchanges route descriptors. Which Layer 3 VPN attribute allows different customers to connect to the same MPLS network with overlapping IP ranges?. A. RT. B. RD. C. VRF. D. MP-BGP. Refer to the exhibit. An engineer configured IP SLA to monitor a next hop on a router for reachability. When the next hop is unreachable, the router is executing tracking and falling over another route, but packet loss is experienced because the reachability is flapping. Which action resolves the issue?. A. Increase the frequency of the sla probe to 60. B. Append delay up 60 down 60 to the track command. C. Append delay up 0 down 0vto the track command. D. Increase the timeout of the sla probe to 6000. Refer to the exhibit. The services at branch B are down. An engineer notices that router A and router B are not exchanging any routes. Which configuration resolves the issue on router B?. A. router eigrp 100 network 192.168.168.0 key-chain EIGRP key 1 key-string CCNP interface serial0/0/0 ip address 192.168.168.2 255.255.255.0 ip authentication key-chain eigrp 100 EIGRP negotiation auto. B. router eigrp 100 network 192.168.168.0 key-chain CCNP key 1 key-string EIGRP interface serial0/0/0 ip address 192.168.168.2 255.255.255.0 ip authentication mode eigrp 100 md5 ip authentication key-chain eigrp 100 EIGRP negotiation auto. C. router eigrp 100 network 192.168.168.0 key-chain EIGRP key 1 key-string CCNP interface serial0/0/0 ip address 192.168.168.2 255.255.255.0 ip authentication mode eigrp 100 md5 negotiation auto. D. router eigrp 100 network 192.168.168.0 key-chain EIGRP key 1 key-string CCNP interface serial0/0/0 ip address 192.168.168.2 255.255.255.0 ip authentication mode eigrp 100 md5 ip authentication key-chain eigrp 100 EIGRP negotiation auto. What is the use of IPv6 snooping?. A. captures IPv6 routing protocol packets to analyze. B. requires an external IPv6 packet analyzer. C. required for the operation of IPv6 RA Guard. D. captures any type of user traffic to create a binding table. Refer to the exhibit. An engineer must troubleshoot a connectivity issue impacting the redistribution of the subnet 172.16.2.48/28 into the OSPF domain. Which configuration on router R1 advertises this subnet into the OSPF domain?. A. R1(config)#route-map CCNP permit 10 R1(config-route-map)#match tag 200 R1(conflg-route-map)#exit - R1(config)#router ospf 10 - R1(config-router)#redistribute eigrp 100 subnets route-map CCNP. B. R1(config)#route-map CCNP deny 10 R1(conflg-route-map)#match tag 200 R1(config)#route-map CCNP permit 10 R1(config)#router ospf 10 - R1(conflg-router)#redistrlbute eigrp 100 subnets route-map CCNP. C. R1(config)#route-map CCNP permit 10 R1(config-route-map)#match route-type internal R1(config)#router ospf 10 - R1(config-router)#redistribute eigrp 100 subnets route-map CCNP. D. R1(config)#route-map CCNP permit 10 R1(config-route-map)#match route-type level-2 R1(config)#router ospf 10 - R1(config-router)#redistribute eigrp 100 subnets route-map CCNP. Which feature drops packets if the source address is not found in the snooping table?. A. IPv6 Destination Guard. B. IPv6 Source Guard. C. Binding Table Recovery. D. IPv6 Prefix Guard. Refer to the exhibit. An engineer must advertise LAN network 192.168.1.0 of router A to router B through OSPF. The engineer notices that router B was configured, but the LAN network of router A is not in the routing table of router B. Which configuration on router A resolves the problem?. A. interface GigabitEthernet0/0/0 ip address 192.168.1.254 255.255.255.0 negotiation auto ipv6 enable interface serial0/0/0 ip address 10.0.0.1 255.255.255.0 negotiation auto ipv6 enable ospfv3 1 ipv4 area 1 router ospfv3 1 address-family ipv4 unicast router-id 1.1.1.1 exit-address-family. B. interface GigabitEthernet0/0/0 ip address 192.168.1.254 255.255.255.0 negotiation auto ipv6 enable ospfv3 1 ipv4 area 1 interface serial0/0/0 ip address 10.0.0.1 255.255.255.0 negotiation auto ipv6 enable ospfv3 1 ipv4 area 1 router ospfv3 1 address-family ipv4 unicast router-id 1.1.1.1 exit-address-family. C. interface serial0/0/0 ip address 10.0.0.1 255.255.255.0 negotiation auto ipv6 enable ospfv3 1 ipv4 area 1 router ospfv3 1 address-family ipv4 unicast area 1 range 192.168.1.0 255.255.255.0 router-id 1.1.1.1 exit-address-family interface GigabitEthernet0/0/0 ip address 192.168.1.254 255.255.255.0 negotiation auto ipv6 enable ospfv3 1 ipv4 area 1. D. interface serial0/0/0 ip address 10.0.0.1 255.255.255.0 negotiation auto ipv6 enable router ospfv3 1 address-family ipv4 unicast router-id 1.1.1.1 exit-address-family. Refer to the exhibit. R1 is multihomed to ISP1 and ISP2. uRPF strict mode has been configured on both interfaces uplinked to the ISPs. Traffic destined to the Internet over ISP1 returns to R1 via ISP2 and is immediately dropped. Which configuration changes address this issue and allow return traffic from the other ISP?. A. R1(config)#interface fastethernet 0/1 R1(config-if)# ip verify unicast source reachable-via any. B. R1(config)#interface fastethernet 0/1 R1(config-if)# ip verify unicast source reachable-via any allow-default. C. R1(config)#interface fastethernet 0/0 R1(config-if)# no ip verify unicast source reachable-via any allow-default. D. R1(config)#interface fastethernet 0/0 R1 (config-if)# ip verify unicast source reachable-via rx. Refer to the exhibit. Routers R1 and R2 exchange routes to each other's loopback through OSPF. Telnet traffic must be blocked from R2 Lo0 to R1 Lo2. Which configuration resolves the issue?. A. R1 interface loopback1 no ip address ipv6 address 100A:0:100C::1/64 ipv6 enable ipv6 ospf 1 area 0 ! interface loopback2 no ip address ipv6 address 200A:0:200C::1/64 ipv6 enable ipv6 ospf 1 area 0 ipv6 access-class DENY_TELNET_Lo2 in ! interface GigabitEthernet 0/0 no ip address ipv6 address AB01:2011:8:100::/64 eui-64 ipv6 enable ipv6 ospf network point-to-point ipv6 ospf 1 area 0 ! ipv6 access-list DENY_TELNET_Lo2 sequence 20 deny tcp host 100B:1:310B::1 host 200A:0:210C::1 eq telnet permit ipv6 any any. B. R1 interface loopback1 no ip address ipv6 address 100A:0:100C::1/64 ipv6 enable ipv6 ospf 1 area 0 ! interface loopback2 no ip address ipv6 address 200A:0:200C::1/64 ipv6 enable ipv6 ospf 1 area 0 ! interface GigabitEthernet 0/0 no ip address ipv6 address AB01:2011:8:100::/64 eui-64 ipv6 enable ipv6 ospf network point-to-point ipv6 ospf 1 area 0 ipv6 access-class DENY_TELNET_Lo2 in ! ipv6 access-list DENY_TELNET_Lo2 sequence 20 deny tcp host 100B:1:310B::1 host 200A:0:210C::1 eq telnet permit ipv6 any any. C. R1 interface loopback1 no ip address ipv6 address 100A:0:100C::1/64 ipv6 enable ipv6 ospf 1 area 0 ! interface loopback2 no ip address ipv6 address 200A:0:200C::1/64 ipv6 enable ipv6 ospf 1 area 0 ! interface GigabitEthernet 0/0 no ip address ipv6 address AB01:2011:8:100::/64 eui-64 ipv6 enable ipv6 ospf network point-to-point ipv6 ospf 1 area 0 ipv6 traffic-filter DENY_TELNET_Lo2 in ! ipv6 access-list DENY_TELNET_Lo2 sequence 20 deny tcp host 100B:1:310B::1 host 200A:0:210C::1 eq telnet permit ipv6 any any. D. R1 interface loopback1 no ip address ipv6 address 100A:0:100C::1/64 ipv6 enable ipv6 ospf 1 area 0 ! interface loopback2 no ip address ipv6 address 200A:0:200C::1/64 ipv6 enable ipv6 ospf 1 area 0 ! interface GigabitEthernet 0/0 no ip address ipv6 address AB01:2011:8:100::/64 eui-64 ipv6 enable ipv6 ospf network point-to-point ipv6 ospf 1 area 0 ! ipv6 access-list DENY_TELNET_Lo2 sequence 20 deny tcp host 100B:1:310B::1 host 200A:0:210C::1 eq telnet permit ipv6 any any. Refer to the exhibit. After an engineer configured a new Cisco router as a DHCP server, users reported two primary issues: • Devices in the HR subnet have intermittent connectivity problems. • Workstations in the LEGAL subnet cannot obtain IP addresses. Which configurations must the engineer apply to ROUTER_1 to restore connectivity for the affected devices?. A. interface GigabitEthernet0/0.5 encapsulation dot1Q 5 ip address 192.168.5.10 255.255.255.0 ip helper-address 192.168.39.100 ! interface GigabitEthernet0/0.80 encapsulation dot1Q 80 ip address 192.168.80.10 255.255.255.128 ip helper-address 192.168.39.100 ! ip dhcp excluded-address 192.168.5.1 192.168.5.5 ip dhcp excluded-address 192.168.80.1 192.168.80.110 ! ip dhcp pool LEGAL network 192.168.80.0 255.255.255.128 default-router 192.168.80.10 ! ip dhcp pool HR network 192.168.5.0 255.255.255.0 default-router 192.168.5.10. B. interface GigabitEthernet0/0.5 encapsulation dot1Q 5 ip address 192.168.5.10 255.255.255.0 ip helper-address 192.168.93.100 ! interface GigabitEthernet0/0.80 encapsulation dot1Q 80 ip address 192.168.80.10 255.255.255.128 ip helper-address 192.168.93.100 ! ip dhcp excluded-address 192.168.5.1 192.168.5.1 ip dhcp excluded-address 192.168.80.1 192.168.80.10 ! ip dhcp pool LEGAL network 192.168.80.0 255.255.255.128 default-router 192.168.80.10 ! ip dhcp pool HR network 192.168.5.0 255.255.255.0 default-router 192.168.5.10. C. interface GigabitEthernet0/0.5 encapsulation dot1Q 5 ip address 192.168.5.10 255.255.255.0 ip helper-address 192.168.39.100 ! interface GigabitEthernet0/0.80 encapsulation dot1Q 80 ip address 192.168.80.10 255.255.255.128 ip helper-address 192.168.39.100 ! ip dhcp excluded-address 192.168.80.1 192.168.80.10 ! ip dhcp pool LEGAL network 192.168.80.0 255.255.255.128 default-router 192.168.80.10 ! ip dhcp pool HR network 192.168.5.0 255.255.255.0 default-router 192.168.5.10. D. interface GigabitEthernet0/0.5 encapsulation dot1Q 5 ip address 192.168.5.10 255.255.255.0 ip helper-address 192.168.39.100 ! interface GigabitEthernet0/0.80 encapsulation dot1Q 80 ip address 192.168.80.10 255.255.255.128 ip helper-address 192.168.39.100 ! ip dhcp excluded-address 192.168.5.1 192.168.5.10 ip dhcp excluded-address 192.168.80.1 192.168.80.10 ! ip dhcp pool LEGAL network 192.168.80.0 255.255.255.128 default-router 192.168.80.10 ! ip dhcp pool HR network 192.168.5.0 255.255.255.0 default-router 192.168.5.10. Refer to the exhibit. The default route from R1 must be withdrawn from the routing table if R1 cannot ping 10.1.1.1, but it is not working correctly. Which configuration resolves the issue?. A. ip sla 2 icmp-echo 10.1.1.1 timeout 3000 threshold 1000 frequency 5 ! ip sla schedule 2 life forever start-time now ! track 2 ip sla 2 reachability delay down 30 up 180 ! ip route 0.0.0.0 0.0.0.0 10.1.1.1 track 2. B. ip sla 2 icmp-echo 10.1.1.1 timeout 3000 threshold 1000 frequency 5 ! ip sla schedule 2 life forever start-time now ! track 2 ip sla 200 reachability delay down 30 up 180 ! ip route 0.0.0.0 0.0.0.0 10.1.1.1 track 2. C. ip sla 2 icmp-echo 10.1.1.1 timeout 3000 threshold 1000 frequency 5 ! track 2 ip sla 2 reachability delay down 30 up 180 ! ip route 0.0.0.0 0.0.0.0 10.1.1.1 track 2. D. ip sla 2 icmp-echo 10.1.1.1 timeout 3000 threshold 1000 frequency 5 ! ip sla schedule 2 life forever start-time now ! track 2 ip sla 200 reachability delay down 30 up 180 ! ip route 0.0.0.0 0.0.0.0 10.1.1.1 track 250. What is the purpose of the DHCPv6 Guard?. A. It messages between a DHCPv6 server and a DHCPv6 client (or relay agent). B. It allows DHCPv6 reply and advertisements from (rogue) DHCPv6 servers. C. It shows that clients of a DHCPv6 server are affected. D. It blocks DHCPv6 messages from relay agents to a DHCPv6 server. An engineer must configure encrypted packets for a single router OSPF neighborship. Which configuration meets this requirement?. A. interface Ethernet0/2 ip ospf authentication-key exam. B. interface Ethernet0/2 ip ospf authentication message-digest ip ospf message-digest-key 1 md5 exam. C. router ospf 100 area 0 authentication message-digest-key 1 md5 exam ! interface Ethernet0/2 ip ospf message-digest-key 1 md5 exam. D. router ospf 100 area 0 authentication ! interface Ethernet0/2 ip ospf authentication-key exam. Refer to the exhibit. Customer B has decided not to receive any routes from R1 that originated outside the AS 100. Which AS path access list must the engineer choose to meet this requirement?. A. ip as-path access-list 1 permit ^10[0-9]*$. B. ip as-path access-list 1 permit ^100$. C. ip as-path access-list 1 permit _100$. D. ip as-path access-list 1 permit _100_. Refer to the exhibit. An engineer is troubleshooting an issue using the debug ip packet command and notices that no time stamps are shown on R4 to establish the event time. Which configuration resolves this issue by showing time stamps regardless of the time zone in R4 logs?. A. service timestamps log datetime localtime msec. B. service timestamps debug datetime localtime msec. C. service timestamps log datetime msec show-timezone. D. service timestamps debug datetime msec show-timezone. How do devices operate in MPLS L3VPN topology?. A. P routers provide connectivity between PE devices with MPLS switching. B. P and associated PE routers with IGP populate the VRF table in different VPNs. C. CE routers connect to the provider network and perform LSP functionality. D. P routers support PE to PE VPN tunnel without LSP functionality. Refer to the exhibit. The engineer is reviewing the logs on the DENVER router and notices that this error message repeats constantly: *Jun 12 13:42:03.399: %TCP-6-BADAUTH: No MD5 digest from 10.40.1.1(27174) to 10.40.1.2(179) tableid - 0 Which action resolves the issue?. A. Configure OSPF link authentication on the router with IP address 10.40.1.1. B. Configure NTP authentication on the router with IP address 10.40.1.1. C. Configure BGP authentication on the router with IP address 10.40.1.2. D. Configure BGP authentication on the router with IP address 10.40.1.1. |





