CCNP-ENARSI PART 9
|
|
Title of test:
![]() CCNP-ENARSI PART 9 Description: CCNP ENARSI |



| New Comment |
|---|
NO RECORDS |
|
Refer to the exhibit. The route to 192.168.200.0 is flapping between R1 and R2. Which set of configuration changes resolves the flapping route?. A. R2(config)#router ospf 100 - R2(config-router)#no redistribute eigrp 100 R2(config-router)#redistribute eigrp 100 metric 1 subnets. B. R1(config)#no router rip - R1(config)#ip route 192.168.200.0 255.255.255.0 10.40.0.2. C. R2(config)#router eigrp 100 - R2(config-router)#no redistribute ospf 100 R2(config-router)#redistribute rip. D. R1(config)#router ospf 100 - R1(config-router)#redistribute rip metric 1 metric-type 1 subnets. Refer to the exhibit. Which action installs route 192.168.2.2/32 in the routing table?. A. Redistribute connected networks into BGP on the local router. B. Configure NAT on the local router to translate private IP addresses. C. Configure the next-hop-self attribute for the peering on the local router. D. Configure the next-hop-self attribute for the peering on the peer router. Refer to the exhibit. An engineer is trying to log in to R1 via R3 loopback address. Which action resolves the issue?. A. Add transport input SCP. B. Remove the IPv6 traffic filter from R1, which is blocking the SSH. C. Remove the IPv6 traffic filter from R1, which is blocking the Telnet. D. Add transport input none. Refer to the exhibit. Which action restores the routes from neighbors while still filtering 1.1.1.0/24?. A. Add a second line in the access list to permit any. B. Modify the route map to permit the access list instead of deny it. C. Modify the access list to deny instead of permit it. D. Add a second sequence in the route map permit 20. Refer to the exhibit. An administrator must upload the packages.conf file to an FTP server. However, the FTP server rejected anonymous service and required users to authenticate. What are the two ways to resolve the issue? (Choose two.). A. Use the copy flash:packages.conf scp: command instead, and enter the FTP server credentials when prompted. B. Use the copy flash:packages.conf ftp: command instead, and enter the FTP server credentials when prompted. C. Enter the FTP server credentials directly in the FTP URL using the ftp://username:password@192.0.2.40/ syntax. D. Create a user on the router matching the username and password on the FTP server and log in before attempting the copy. E. Use ip ftp username and ip ftp password configuration commands to specify valid FTP server credentials. An engineer configured VRF-Lite on a router for VRF blue and VRF red. OSPF must be enabled on each VRF to peer to a directly connected router in each VRF. Which configuration forms OSPF neighbors over the network 10.10.10.0/28 for VRF blue and 192.168.0.0/30 for VRF red?. A. router ospf 1 vrf blue network 10.10.10.0 0.0.0.252 area 0 router ospf 2 vrf red network 192.168.0.0 0.0.0.240 area 0. B. router ospf 1 vrf blue network 10.10.10.0 0.0.0.15 area 0 router ospf 2 vrf red network 192.168.0.0 0.0.0.3 area 0. C. router ospf 1 vrf blue network 10.10.10.0 0.0.0.240 area 0 router ospf 2 vrf red network 192.168.0.0 0.0.0.252 area 0. D. router ospf 1 vrf blue network 10.10.10.0 0.0.0.3 area 0 router ospf 2 vrf red network 192 168.0.0 0.0.0.15 are 0. The network administrator must implement IPv6 in the network to allow only devices that not only have registered IP addresses but are also connecting from assigned locations. Which security feature must be implemented?. A. IPv6 Snooping. B. IPv6 Destination Guard. C. IPv6 Router Advertisement Guard. D. IPv6 Prefix Guard. Refer to the exhibit. An administrator can log in to the device using Telnet, but the attempts to log in to the same device using SSH with the same credentials fail. Which action resolves this issue?. A. Configure the VTY lines with login local. B. Configure transport input all on the VTY lines to allow SSH. C. Configure SSH service on the router. D. Configure to use the Telnet user database for SSH as well. Refer to the exhibit. Which action limits access to R2 from 192.168.12.1?. A. Modify sequence 20 to permit tcp host 192.168.12.1 eq 22 any to access-list 100. B. Swap sequence 10 with sequence 20 in access-list 100. C. Swap sequence 20 with sequence 10 in access-list 100. D. Modify sequence 10 to deny tcp any eq 22 any to access-list 100. Refer to the exhibit. The ACL is placed on the inbound Gigabit 0/1 interface of the router. Host 192.168.10.10 cannot SSH to host 192.168.100.10 even though the flow is permitted. Which action resolves the issue without opening full access to this router?. A. Temporarily move the permit ip any any line to the beginning of the ACL to see if the flow works. B. Temporarily remove the ACL from the interface to see if the flow works. C. Move the SSH entry to the beginning of the ACL. D. Run the show access-list FILTER command to view if the SSH entry has any hit statistics associated with it. Refer to the exhibit. A CoPP policy is implemented to allow specific control traffic, but the traffic is not matching as expected and is getting unexpected behavior of control traffic. Which action resolves the issue?. A. Use match-any instruction in class-map. B. Create a separate class map against each ACL. C. Create a separate class map for ICMP traffic. D. Use default-class to match ICMP traffic. Refer to the exhibit. An engineer sets up a DMVPN connection to connect branch 1 and branch 2 to HQ. Branch 1 and branch 2 cannot communicate with each other. Which change must be made to resolve this issue?. A. R1(config)#int eth1/1 - R1(config-if)#no ip split-horizon eigrp 100. B. R2(config)#router eigrp 100 - R2(config-router)#tneighbor 172.16.1.3. C. R3(config)#router eigrp 100 - R3(config-router)#neighbor 172.16.1.2. D. R1(config)#int tunnel 1 - R1(config-if)#no ip split-horizon eigrp 100. The network administrator is tasked to configure R1 to authenticate telnet connections based on Cisco ISE using RADIUS. ISE has been configured with an IP address of 192.168.1.5 and with a network device pointing towards R1 (192.168.1.1) with a shared secret password of Cisco123. If ISE is down, the administrator should be able to connect using the local database with a username and password combination of admin/cisco123. The administrator has configured the following on R1: aaa new-model ! username admin password cisco123 ! radius server ISE1 address ipv4 192.168.1.5 key Cisco123 ! aaa group server tacacs+ RAD-SERV server name ISE1 ! aaa authentication login RAD-LOCAL group RAD-SERV ISE has gone down. The Network Administrator is not able to Telnet to R1 when ISE went down. Which two configuration changes will fix the issue? (Choose two.). A. aaa authentication login RAD-SERV group RAD-LOCAL local. B. aaa authentication login RAD-LOCAL group RAD-SERV local. C. line vty 0 4 login authentication RAD-LOCAL. D. line vty 0 4 login authentication default. E. line vty 0 4 login authentication RAD-SERV. The network administrator deployed the Binding Table Recovery feature. Which two devices recover the missing binding table entries? (Choose two.). A. DHCP client. B. destination host. C. DHCP relay agent. D. source host. E. DHCP server. Which two components are needed for a service provider to utilize the L3VPN MPLS application? (Choose two.). A. The P routers must be configured with RSVP. B. The PE routers must be configured for MP-eBGP to connect to CEs. C. The P routers must be configured for MP-iBGP toward the PE routers. D. The PE routers must be configured for MP-iBGP with other PE routers. E. The P and PE routers must be configured with LDP or RSVP. Refer to the exhibit. A network is configured for EIGRP equal-cost load balancing, but the traffic destined to the servers is not load balanced. Link metrics from router R2 to R3 and R4 are the same. Which delay value must be configured to resolve the issue?. A. 2200 on R4 E0/1. B. 200 on R3 E0/1. C. 120 on R3 E0/1. D. 120 on R4 E0/1. Refer to the exhibit. An engineer notices a connectivity problem between routers R1 and R2. The frequency of this problem is high during peak business hours. Which action resolves the issue?. A. Increase the available bandwidth between R1 and R2. B. Decrease the EIGRP keepalive and hold down timers on R1 and R2. C. Increase the MTU on the interfaces that connect R1 and R2. D. Set static EIGRP neighborship between R1 and R2. Refer to the exhibit. A network administrator configured name resolution for IPv6 traffic to be allowed through an inbound access list. After the access list is applied to resolve the issue, name resolution still did not work. Which action does the network administrator take to resolve the name resolution problem?. A. Add permit udp any eq domain 53 any log in the access list. B. Remove ipv6 inspect ipv6-firewall in from interface gi0/1. C. Add permit udp any eq domain any log in the access list. D. Inspect ipv6 inspect name ipv6-firewall udp 53 in global config. Refer to the exhibit. PC2 is directly connected to R1. A user at PC2 cannot Telnet to 2001:db8:a:b::10. The user can ping 2001:db8:a:b::10 and receive DHCP-related information from the DHCP server. Which action resolves the issue?. A. Remove sequence 30 and put it back as sequence 5. B. Remove sequence 10 and put it back as sequence 25. C. Remove sequence 40 and put it back as sequence 15. D. Remove sequence 20 and put it back as sequence 45. What is an advantage of implementing BFD?. A. BFD is deployed without the need to run any routing protocol. B. BFD provides faster updates for any flapping route. C. BFD provides millisecond failure detection. D. BFD provides better capabilities to maintain the routing table. Refer to the exhibit. A network engineer finds that PC1 is accessing the hotel website to do the booking but fails to make payment. Which action resolves the issue?. A. Increase the AD to 200 of static route 192.168.94.0 on R3. B. Configure a reverse route on R1 for PC1 172.16.1.0/24. C. Decrease the AD to 5 of OSPF route 192.168.94.0 on R1. D. Allow stub network 10.10.202.168/30 on router R3 OSPF. Refer to the exhibit. The administrator can see the traps for the failed login attempts, but cannot see the traps of successful login attempts. Which action fixes this issue?. A. Configure logging history 4. B. Configure logging history 3. C. Configure logging history 2. D. Configure logging history 5. An engineer creates a default static route on a router with a next hop of 10.1.1.1. On inspection, the engineer finds the router has two VRFs, Red and Blue. The next hop is valid for both VRFs and exists in each assigned VRF. Which configuration achieves connectivity?. A. ip route vrf Red 0.0.0.0 0.0.0.0 10.1.1.1 ip route vrf Blue 0.0.0.0 0.0.0.0 10.1.1.1. B. ip route vrf BLUE 0.0.0.0 255.255.255.255 10.1.1.1 ip route vrf RED 0.0.0.0 255.255.255.255 10.1.1.1. C. ip route vrf Red 0.0.0.0 255.255.255.255 10.1.1.1. D. ip route vrf Blue 0.0.0.0 255.255. Refer to the exhibit. Bangkok is using ECMP to reach to the 192.168.5.0/24 network. The administrator must configure Bangkok in such a way that Telnet traffic from 192.168.3.0/24 and 192.168.4.0/24 networks use the Hong Kong router as the preferred route. Which set of configurations accomplishes this task?. A. access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23 access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23 ! route-map PBR1 permit 10 match ip address 101 set ip next-hop 172.18.1.2 ! interface Ethernet0/1 ip policy route-map PBR1. B. access-list 101 permit tcp 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23 access-list 101 permit tcp 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 eq 23 ! route-map PBR1 permit 10 match ip address 101 set ip next-hop 172.18.1.2 ! interface Ethernet0/3 ip policy route-map PBR1. C. access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 access-list 101 permit ip 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 ! route-map PBR1 permit 10 match ip address 101 set ip next-hop 172.18.1.2 ! interface Ethernet0/3 ip policy route-map PBR1. D. access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.5.0 0.0.0.255 access-list 101 permit ip 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255 ! route-map PBR1 permit 10 match ip address 101 set ip next-hop 172.18.1.2 ! interface Ethernet0/1 ip policy route-map PBR1. Refer to the exhibit. An engineer configured route exchange between two different companies for a migration project. EIGRP routes were learned in router C, but no OSPF routes were learned in router A. Which configuration allows router A to receive OSPF routes?. A. (config-router-af-topology)#no redistribute ospf 10 match external 1 external 2 metric 1000000 10 255 1 1500. B. (config-router-af)#redistribute ospf 10 1000000 10 255 1 1500. C. (config-router-af-topology)#redistribute connected. D. (config-router-af-topology)#redistribute ospf 10 metric 1000000 10 255 1 1500. Refer to the exhibit. An engineer must filter incoming EIGRP updates to allow only a set of specific prefixes. The distribute list is tested, and it filters out all routes except network 10.10.10.0/24. How should the engineer temporarily allow all prefixes to be learned by the router again without adjusting the existing access list?. A. A permit any statement should be added before completing the ACL with the required prefixes, and then the permit any statement can be removed. B. A permit 20 statement should be added before completing the ACL with the required prefixes, and then the permit 20 statement can be removed. C. A continue statement should be added within the permit 10 statement before completing the ACL with the required prefixes, and then the continue statement can be removed. D. An extended access list must be used instead of a standard access list to accomplish the task. What is a function of the IPv6 DHCP Guard feature for DHCP messages?. A. If the device is configured as a DHCP server, no message is switched. B. All client messages are always switched regardless of the device role. C. It blocks only DHCP request messages. D. Only access lists are supported for matching traffic. Refer to the exhibit. An administrator is troubleshooting a time synchronization problem for the router's time to another Cisco IOS XE-based device that has recently undergone security hardening. Which action resolves the issue?. A. NTP service is disabled and must be enabled on 10.1.255.40. B. Ensure that the CPE router has a valid route to 10.1.255.40 for NTP and rectify if not reachable. C. Allow NTP in the ingress ACL on 10.1.255.40 by permitting UDP destined to port 123. D. Allow NTP in the ingress ACL on 10.1.255.40 by permitting TCP destined to port 123. Refer to the exhibit. The traffic from spoke to hub is dropping. The operations team observes: • R2-R3 link is down due to the fiber cut. • R2 and R5 receive traffic from R1 in AS 65101. • R3 and R6 receive traffic from R4 in AS 65201. Which configuration resolves the issue?. A. R5(config)#router bgp 65101 - R5(config-router)#neighbor 10.10.10.6 remote-as 65201 R5(config-router)#neighbor 10.10.10.6 update-source Loopback0 R5(config-router)#neighbor 10.10.10.6 ebgp-multihop 3. B. R5(config)#router bgp 65101 - R5(config-router)#no neighbor 10.0.0.18 update-source Loopback0. C. R6(config)#router bgp 65101 - R6(config-router)#no neighbor 10.0.0.17 update-source Loopback0. D. R6(config)#router bgp 65201 - R6(config-router)#neighbor 10.10.10.5 remote-as 65101 R6(config-router)#neighbor 10.10.10.5 update-source Loopback0 R6(config-router)#neighbor 10.10.10.5 ebgp-multihop 3. What is a function of an end device configured with DHCPv6 guard?. A. If it is configured as a client, messages are switched regardless of the assigned role. B. If it is configured as a client, only DHCP requests are permitted. C. If it is configured as a relay agent, only prefix assignments are permitted. D. If it is configured as a server, only prefix assignments are permitted. The network administrator configured CoPP so that all SNMP traffic from Cisco Prime located at 192.168.1.11 toward the router CPU is limited to 1000 kbps. Any traffic that exceeds this limit must be dropped. access-list 100 permit udp any any eq 161 ! class-map CM-SNMP match access-group 100 ! policy-map PM-COPP class CM-SNMP police 1000 conform-action transmit ! control-plane service-policy input PM-COPP The network administrator is not getting the desired result for the SNMP traffic and SNMP traffic is getting dropped frequently. Which set of configurations resolves the issue?. A. no access-list 100 access-list 100 permit tcp host 192.168.1.11 any eq 161. B. no access-list 100 access-list 100 permit udp host 192.168.1.11 any eq 161 ! policy-map PM-COPP class CM-SNMP no police 1000 conform-action transmit police 1000000 conform-action transmit ! control-plane no service-policy input PM-COPP ! interface E 0/0 service-policy input PM-COPP ! interface E 0/1 service-policy input PM-COPP. C. no access-list 100 access-list 100 permit udp host 192.168.1.11 any eq 161 ! policy-map PM-COPP class CM-SNMP no police 1000 conform-action transmit police 1000000 conform-action transmit. D. policy-map PM-COPP class CM-SNMP no police 1000 conform-action transmit police 1000000 conform-action transmit. Which protocol must be secured with MD-5 authentication across the MPLS cloud to prevent hackers from introducing bogus routers?. A. RSVP. B. ALSO. C. LDP. D. MP-BGP. Refer to the exhibit R3 cannot authenticate via TACACS. Which configuration resolves the issue?. A. tacacs server SITE6_TACACS key C!sc0TACACS. B. tacacs server SITE6_TACACS key C!scoTACACS. C. tacacs server SITE6_TACACS address ipv4 10.60.66.66 key C!scoTACACS. D. tacacs server SITE6_TACACS address ipv4 10.66.66.66 key CiscoTACACS. A customer is running an mGRE DMVPN tunnel over WAN infrastructure between hub and spoke sites. The existing configuration allows NHRP to add spoke routers automatically to the multicast NHRP mappings. The customer is migrating the network from IPv4 to the IPv6 addressing scheme for those spokes' routers that support IPv6 and can run DMVPN tunnel over the IPv6 network. Which configuration must be applied to support IPv4 and IPv6 DMVPN tunnels on spoke routers?. A. tunnel mode ipv6ip 6to4. B. tunnel mode ipv6ip auto-tunnel. C. tunnel mode ipv6ip 6rd. D. tunnel mode ipv6ip isatap. Refer to the exhibit. Which action ensures that 10.10.10.0/24 reaches 10.10.20.0/24 through the direct link between R1 and R2?. A. Configure R1 and R2 LAN links as nonpassive. B. Configure R1 and R2 links under area 1. C. Configure OSPF link cost to 1 between R1 and R2. D. Configure OSPF path cost to 3 between R1 and R2. The summary route is not shown in the Router_B routing table after this below configuration on Router_A: interface ethernet 0 description location ID:S4318T3E77F02 ip address 192.168.3.1 255.255.255.0 ip summary-address eigrp 1 172.16.80.0 255.255.240.0 Which Router_A configuration resolves the issue by advertising the summary route to Router_B?. A. interface loopback 0 ip address 172.18.81.1 255.255.255.0 interface Ethernet 0 ip address 192.168.3.1 255.255.255.0 ip summary-address eigrp 1 172.16.80.0 255.255.240.0. B. interface loopback 0 ip address 172.16.79.1 255.255.255.0 interface Ethernet 0 ip address 192.168.3.1 255.255.255.0 ip summary-address eigrp 1 172.16.80.0 255.255.240.0. C. interface loopback 0 ip address 172.16.81.1 255.255.255.0 interface Ethernet 0 ip address 192.168.3.1 255.255.255.0 ip summary-address eigrp 1 172.16.80.0 255.255.240.0. D. interface loopback 0 ip address 172.16.96.1 255.255.255.0 interface Ethernet 0 ip address 192.168.3.1 255.255.255.0 ip summary-address eigrp 1 172.16.80.0 255.255.240.0. Refer to the exhibit. Which action resolves the authentication problem?. A. Configure the same password between the TACACS+ server and router. B. Configure the TCP port 49 to be reachable by the router. C. Configure the UDP port 1812 to be allowed on the TACACS+ server. D. Configure the user name on the TACACS+ server. Refer to the exhibit. R1 is configured with uRPF, and ping to R1 is failing from a source present in the R1 routing table via the GigabitEthernet 0/0 interface. Which action resolves the issue?. A. Enable Cisco Express Forwarding to ensure that uRPF is functioning correctly. B. Modify the uRPF mode from strict to loose. C. Add a floating static route to the source on R1 to the GigabitEthernet0/1 interface. D. Remove the access list from the interface GigabitEthernet 0/0. Refer to the exhibit. A bank ATM site has difficulty connecting with the bank server. A network engineer troubleshoots the issue and finds that R4 has no active route to the bank ATM site. Which action resolves the issue?. A. EIGRP peering between R1 and R2 to be fixed. B. Advertise 10.10.30.0/24 subnet in R3 EIGRP AS. C. Advertise 10.10.30.0/24 subnet in R1 EIGRP AS. D. EIGRP peering between R3 and R4 to be fixed. Refer to the exhibit. The BGP neighbor is not coming up. Which action resolves the issue?. A. Configure the ebgp-multihop 2 command on R1 toward the neighbor. B. Configure a valid router ID on the neighbor that shows an invalid router ID of 0.0.0.0. C. The route map on eBGP sessions must allow the prefixes from the neighbor. D. Enable synchronization between the neighbors to bring the neighborship up. Refer to the exhibit. After recovering from a power failure, Ethernet0/1 stayed down while Ethernet0/0 returned to the up/up state. The default route through ISP1 was not reinstated in the routing table until Ethernet0/1 also came up. Which action resolves the issue?. A. Add a static route to the 8.8.8.8/32 destination through the next hop 203.0.113.1. B. Remove the references to the interface names from both static default routes. C. Reference the track object 1 in both static default routes. D. Configure the default route through ISP1 with a higher administrative distance than 2. Refer to the exhibit. Which action resolves the issue?. A. Configure host IP address in access-list 16. B. Configure SNMPv3 on the router. C. Configure SNMP authentication on the router. D. Configure a valid SNMP community string. Refer to the exhibit. An administrator is attempting to disable the automatic logout after a period of inactivity. After logging out, the console stopped responding to all keyboard inputs. Remote access through SSH still works. Which action resolves the issue?. A. Configure the no exec-timeout command on line con 0. B. Configure the absolute-timeout command on line con 0. C. Configure the exec command on line con 0. D. Configure the default exec-timeout command on line con 0. Refer to the exhibit. Routers R1 and R2 have established a network adjacency using EIGRP, and both routers are advertising subnets to its neighbor. After issuing the show ip EIGRP topology all-links command in R1, some prefixes are not showing R2 as a successor. Which action resolves the issue?. A. Configure the network statement on the neighbor. B. Rectify the incorrect router ID in R2. C. Resolve the incorrect metric on the link. D. Enable split-horizon. An engineer configures PBR on R5 and wants to create a policy that matches traffic destined toward 10.10.10.0/24 and forwards it toward 10.1.1.1. This traffic must also have its IP precedence set to 5. All other traffic should be forwarded toward 10.1.1.2 and have its IP precedence set to 0. Which configuration meets the requirements?. A. access-list 100 permit ip any 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 100 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 0. B. access-list 100 permit ip any 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 100 set ip next-hop 10.1.1.1 set ip precedence 0 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 5 ! route-map CCNP permit 30. C. access-list 1 permit 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 1 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 0. D. access-list 1 permit 10.10.10.0 0.0.0.255 access-list 2 permit any route-map CCNP permit 10 match ip address 1 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 match ip address 2 set ip next-hop 10.1.1.2 set ip precedence 0 ! route-map CCNP permit 30. Refer to the exhibit. An engineer is troubleshooting a failed Telnet session from PC to the DHCP server. Which action resolves the issue?. A. Remove sequence 30 and add it back to the IPv6 traffic filter as sequence 5. B. Remove sequence 20 for sequence 40 in the access list to allow Telnet. C. Remove sequence 10 to add the PC source IP address and add it back as sequence 10. D. Remove sequence 20 and add it back to the IPv6 traffic filter as sequence 5. Refer to the exhibit. Traffic from the branch network should route through HQ_R1 unless the path is unavailable. An engineer tests this functionality by shutting down interface on the BRANCH router toward HQ_R1 router, but 192.168.20.0/24 is no longer reachable from the branch router. Which set of configurations resolves the issue?. A. HQ_R1(config)# ip sla responder - HQ_R1(config)# ip sla responder icmp-echo 172.16.35.2. B. BRANCH(config)# ip sla 1 - BRANCH(config-ip-sla)# icmp-echo 172.16.35.1. C. HQ_R2(config)# ip sla responder - HQ_R2(config)# ip sla responder icmp-echo 172.16.35.5. D. BRANCH(config)# ip sla 1 - BRANCH(config-ip-sla)# icmp-echo 172.16.35.2. Refer to the exhibit. An engineer configures router B to direct all traffic from host 192.168.1.3 to router C. All other traffic must be routed through normal routing-protocol operations. Which configuration accomplishes the task?. A. interface g0/0/0 ip address 192.168.1.254 255.255.255.0 ! access-list 101 permit ip host 192.168.1.3 any access-list 101 permit ip any any ! route-map CCNP permit 10 match ip address 101 set ip next-hop 10.0.1.2. B. interface g0/0/0 ip address 192.168.1.254 255.255.255.0 ip policy route-map CCNP ! access-list 101 permit ip host 192.168.1.3 any ! route-map CCNP permit 10 match ip address 101 set ip next-hop 10.0.2.1. C. interface g0/0/0 ip address 192.168.1.254 255.255.255.0 ip policy route-map CCNP ! access-list 101 permit ip any host 192.168.1.3 ! route-map CCNP permit 10 match ip address 101 set ip next-hop 10.0.1.2. D. interface g0/0/0 ip address 192.168.1.254 255.255.255.0 ip policy route-map CCNP ! access-list 101 permit ip host 192.168.1.3 any ! route-map CCNP permit 10 match ip address 101 set ip next-hop 10.0.1.2. Which protocol supports labeled paths between PE routers in an MPLS network?. A. LDP. B. RSVP. C. MP-BGP. D. IGP. Refer to the exhibit. The administrator is troubleshooting a BGP peering between PE1 and PE3 that is unable to establish. Which action resolves the issue?. A. Disable sending ICMP unreachables on P2 to allow PE1 to establish a session with PE3. B. P2 must have a route to PE3 to establish a BGP session to PE1. C. Remove the traffic filtering rules on P2 blocking the BGP communication between PE1 and PE3. D. Ensure that the PE3 loopback address is used as a source for BGP peering to PE1. |





