CCNP-ENARSI PART 9
|
|
Title of test:
![]() CCNP-ENARSI PART 9 Description: CCNP ENARSI |



| New Comment |
|---|
NO RECORDS |
|
Refer to the exhibit. The route to 192.168.200.0 is flapping between R1 and R2. Which set of configuration changes resolves the flapping route?. A. R2(config)#router ospf 100 - R2(config-router)#no redistribute eigrp 100 R2(config-router)#redistribute eigrp 100 metric 1 subnets. B. R1(config)#no router rip - R1(config)#ip route 192.168.200.0 255.255.255.0 10.40.0.2. C. R2(config)#router eigrp 100 - R2(config-router)#no redistribute ospf 100 R2(config-router)#redistribute rip. D. R1(config)#router ospf 100 - R1(config-router)#redistribute rip metric 1 metric-type 1 subnets. Refer to the exhibit. Which action installs route 192.168.2.2/32 in the routing table?. A. Redistribute connected networks into BGP on the local router. B. Configure NAT on the local router to translate private IP addresses. C. Configure the next-hop-self attribute for the peering on the local router. D. Configure the next-hop-self attribute for the peering on the peer router. Refer to the exhibit. An engineer is trying to log in to R1 via R3 loopback address. Which action resolves the issue?. A. Add transport input SCP. B. Remove the IPv6 traffic filter from R1, which is blocking the SSH. C. Remove the IPv6 traffic filter from R1, which is blocking the Telnet. D. Add transport input none. Refer to the exhibit. Which action restores the routes from neighbors while still filtering 1.1.1.0/24?. A. Add a second line in the access list to permit any. B. Modify the route map to permit the access list instead of deny it. C. Modify the access list to deny instead of permit it. D. Add a second sequence in the route map permit 20. Refer to the exhibit. An administrator must upload the packages.conf file to an FTP server. However, the FTP server rejected anonymous service and required users to authenticate. What are the two ways to resolve the issue? (Choose two.). A. Use the copy flash:packages.conf scp: command instead, and enter the FTP server credentials when prompted. B. Use the copy flash:packages.conf ftp: command instead, and enter the FTP server credentials when prompted. C. Enter the FTP server credentials directly in the FTP URL using the ftp://username:password@192.0.2.40/ syntax. D. Create a user on the router matching the username and password on the FTP server and log in before attempting the copy. E. Use ip ftp username and ip ftp password configuration commands to specify valid FTP server credentials. An engineer configured VRF-Lite on a router for VRF blue and VRF red. OSPF must be enabled on each VRF to peer to a directly connected router in each VRF. Which configuration forms OSPF neighbors over the network 10.10.10.0/28 for VRF blue and 192.168.0.0/30 for VRF red?. A. router ospf 1 vrf blue network 10.10.10.0 0.0.0.252 area 0 router ospf 2 vrf red network 192.168.0.0 0.0.0.240 area 0. B. router ospf 1 vrf blue network 10.10.10.0 0.0.0.15 area 0 router ospf 2 vrf red network 192.168.0.0 0.0.0.3 area 0. C. router ospf 1 vrf blue network 10.10.10.0 0.0.0.240 area 0 router ospf 2 vrf red network 192.168.0.0 0.0.0.252 area 0. D. router ospf 1 vrf blue network 10.10.10.0 0.0.0.3 area 0 router ospf 2 vrf red network 192 168.0.0 0.0.0.15 are 0. The network administrator must implement IPv6 in the network to allow only devices that not only have registered IP addresses but are also connecting from assigned locations. Which security feature must be implemented?. A. IPv6 Snooping. B. IPv6 Destination Guard. C. IPv6 Router Advertisement Guard. D. IPv6 Prefix Guard. Refer to the exhibit. An administrator can log in to the device using Telnet, but the attempts to log in to the same device using SSH with the same credentials fail. Which action resolves this issue?. A. Configure the VTY lines with login local. B. Configure transport input all on the VTY lines to allow SSH. C. Configure SSH service on the router. D. Configure to use the Telnet user database for SSH as well. Refer to the exhibit. Which action limits access to R2 from 192.168.12.1?. A. Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100. B. Swap sequence 10 with sequence 20 in access-list 100. C. Swap sequence 20 with sequence 10 in access-list 100. D. Modify sequence 10 to deny tcp any eq 22 any to access-list 100. Refer to the exhibit. The ACL is placed on the inbound Gigabit 0/1 interface of the router. Host 192.168.10.10 cannot SSH to host 192.168.100.10 even though the flow is permitted. Which action resolves the issue without opening full access to this router?. A. Temporarily move the permit ip any any line to the beginning of the ACL to see if the flow works. B. Temporarily remove the ACL from the interface to see if the flow works. C. Move the SSH entry to the beginning of the ACL. D. Run the show access-list FILTER command to view if the SSH entry has any hit statistics associated with it. |





