300-410 VOL2 Flashcards

1
Q

In a typical MPLS VPN, routers act as the MPLS label imposition and disposition points in
the network?

A

C. PE Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In an MPLS network, which of the following describes the role of the Provider (P) router?

A

B. To connect to PE routers and act as transit routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The MPLS LDP autoconfiguration feature allows you to enable LDP on every interface that is
associated with an IGP instance. Which of the following Interior Gateway Protocols support this?
(Choose two)

A

A. OSPF
B. IS-IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In an MPLS VPN network, how are customer routes controlled and distributed?

A

D. It is distributed through the use of route targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At which layer of the OSI model is an MPLS label imposed?

A

C. Between layers 2 and 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are valid IPv6 Router Advertisement (RA) Guard modes? (Select two)

A

B. Host mode
C. Router mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements are true regarding the e IPv6 RA Guard feature?

A

B. This feature is supported on private VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unicast Reverse Path Forwarding (uRPF) has been configured on a service provider network to
protect itself from spoofed-based attacks. Which of the following are valid uRPF modes? (Select
two)

A

A. Strict mode
E. Loose mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are commonly used ports when implementing RADIUS-based
authentication and accounting? Select two)

A

B. UDP port 1812 for authentication
D. UDP port 1813 for accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are valid restrictions when configuring Control Plane Policing (CoPP) on
Cisco devices? (Choose two)

A

A. You can not use the “log” keyword with CoPP on the access list entries
C. The only match types supported with CoPP is ip precedence, ip dscp, and access-group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are used to validate the source of IPv6 traffic and are considered IPv6
layer 2 snooping features?

A

C. IPv6 Source Guard
D. IPv6 Prefix Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are used to validate the source of IPv6 traffic and are considered IPv6
layer 2 snooping features?

A

C. IPv6 Source Guard
D. IPv6 Prefix Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You want to implement AAA on router R1 for a more robust authentication and authorization
system. What is typically the first global command used to do this?

A

A. aaa new-model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A time-based access list has been configured on R1 to allow SSH access to the device only on
weekdays. Which of the following are valid options when using the time range command?
(Select two)

A

C. absolute
D. periodic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

First-Hop Security (FHS) is a set of features to optimize IPv6 link operation and help with scale in
large L2 domains. Which of the following are valid First-Hop Security features supported by
Cisco? (Select three)

A

A. IPv6 RA Guard
C. DHCPv6 Guard
D. IPv6 Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the four stages of obtaining an IP address from a DHCP server that corresponds to the
acronym DORA?

A

D. Discover, Offer, Request, Acknowledge

16
Q

SNMPv2 has been used throughout a network to manage all of the network devices. You have
been asked to migrate to an SNMPv3 solution instead. What is the biggest advantage to
migrating from SNMPv2 to SNMPv3?

A

A. Enhanced security, including encryption of passwords

17
Q

You are configuring Netflow on various network elements in order to gain visibility into the traffic
types used. How many export destinations can this Network data be sent to?

A

A. Up to 2

18
Q

A Cisco router has just been configured for NTP and is synchronized with the configured NTP
server. However, log messages still show an incorrect time. What else should be done to match
the log messages time stamps with the NTP based time?

A

B. Configure the “service timestamps log datetime localtime” command in global mode.

19
Q

There is an issue between two nodes within your network, and you are using Cisco DNA Center
Path Trace to help troubleshoot the problem. Which of the following statements are true
regarding the Path Trace tool?

A

C. Path trace between a wired client and a wireless client is supported

20
Q

Which of the following are valid DHCP options that DHCP servers can be configured to use with
DHCP clients when offering a lease? (Choose two)

A

A. DHCP Option 1: subnet mask