Practice Free 300-410 Exam Online Questions
Refer to the exhibit.
An engineer has configured policy-based routing and applied the configured to the correct interface.
How is the configuration applied to the traffic that matches the access list?
- A . It is sent to 209.165.202.131.
- B . It is sent to 209.165.202.129.
- C . It is dropped.
- D . It is forwarded using the routing table lookup.
Refer to the exhibit.
A bank ATM site has difficulty connecting with the bank server. A network engineer troubleshoots the issue and finds that R4 has no active route to the bank ATM site.
Which action resolves the issue?
- A . Advertise 10.10.30.0/24 subnet in R1 EIGRP AS.
- B . EIGRP peering between R3 and R4 to be fixed.
- C . EIGRP peering between R1 and R2 to be fixed.
- D . Advertise 10.10.30.0/24 subnet in R3 EIGRP AS.
Refer to Exhibit.
A network administrator enables DHCP snooping on the Cisco Catalyst 3750-X switch and configures the uplink port (Port-channel2) as a trusted port. Clients are not receiving an IP address, but when DHCP snooping is disabled, clients start receiving IP addresses.
Which global command resolves the issue?
- A . No ip dhcp snooping information option
- B . ip dhcp snooping
- C . ip dhcp relay information trust portchannel2
- D . ip dhcp snooping trust
Refer to the exhibit.
An engineer configured route exchange between two different companies for a migration project EIGRP routes were learned in router C but no OSPF routes were learned in router A.
Which configuration allows router A to receive OSPF routes?
- A . (config-router-af)#redistribute ospf 10 1000000 10 255 1 1500
- B . (config-routeraf-topology)#redistribute ospf 10 metric 1000000 10 255 1 1500
- C . (config-router-af-topology)#redistribute connected
- D . (config-router-af-topology )£no redistribute ospf 10 match external 1 external 2 metric 1000000
10 255 1 1500
Refer to the exhibits.
When DMVPN is configured, which configuration allows spoke-to-spoke communication using loopback as a tunnel source?
- A . Configure crypto isakmp key cisco address 0.0.0.0 on the hub.
- B . Configure crypto isakmp key Cisco address 200.1.0.0 255.255.0.0 on the hub.
- C . Configure crypto isakmp key cisco address 200.1.0.0 255.255.0.0 on the spokes.
- D . Configure crypto isakmp key cisco address 0.0.0.0 on the spokes.
Refer to the exhibit.
R1 and R2 cannot establish an EIGRP adjacency.
Which action establishes EIGRP adjacency?
- A . Remove the current autonomous system number on one of the routers and change to a different value.
- B . Remove the passive-interface command from the R2 configuration so that it matches the R1 configuration.
- C . Add the no auto-summary command to the R2 configuration so that it matches the R1 configuration.
- D . Add the passive-interface command to the R1 configuration so that it matches the R2 configuration.
What are two purposes of using IPv4 and VPNv4 address-family configurations in a Layer 3 MPLS VPN? (Choose two.)
- A . The VPNv4 address is used to advertise the MPLS VPN label.
- B . RD is prepended to the IPv4 route to make it unique.
- C . MP-BGP is used to allow overlapping IPv4 addresses between customers to advertise through the network.
- D . The IPv4 address is needed to tag the MPLS label.
- E . The VPNv4 address consists of a 64-bit route distinguisher that is prepended to the IPv4 prefix.
Refer to the exhibit.
An engineer receives this error message when trying to access another router in-band from the serial interface connected to the console of R1.
Which configuration is needed on R1 to resolve this issue?
Option A
R1(config)#line console 0
R1(config-line)#transport preferred ssh
Option B
R1(config)#line vty 0
R1(config-line)#transport output ssh
Option C
R1(config)#line vty 0
R1(config-line)#transport output ssh
R1(config-line)#transport preferred ssh
Option D
R1(config)#line console 0
R1(config-line)#transport output ssh
- A . Option A
- B . Option B
- C . Option C
- D . Option D
Refer to the exhibit.
SW100 cannot receive routes from R1.
Which configuration resolves the issue?
- A . Option A
- B . Option B
- C . Option C
- D . Option C
How are MPLS Layer 3 VPN services deployed?
- A . The RD and RT values must match under the VRR
- B . The RD and RT values under a VRF must match on the remote PE router
- C . The import and export RT values under a VRF must always be the same.
- D . The label switch path must be available between the local and remote PE routers.