Practice Free 300-410 Exam Online Questions
Refer to the exhibit.
The output of the trace route from R5 shows a loop in the network.
Which configuration prevents this loop?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
Refer to the exhibit.
R1 is configured with uRPF, and ping to R1 is failing from a source present in the R1 routing table via the GigatxtEthernet 0/0 interface.
Which action resolves the issue?
- A . Remove the access list from the interface GigabrtEthernet 0/0
- B . Modify the uRPF mode from strict to loose
- C . Enable Cisco Express Forwarding to ensure that uRPF is functioning correctly
- D . Add a floating static route to the source on R1 to the GigabitEthernet 0/1 interface
Refer to the exhibit.
An engineer configured BGP and wants to select the path from 10.77.255.57 as the best path instead of current best path.
Which action resolves the issue?
- A . Configure AS_PATH prepend for the desired best path
- B . Configure higher MED to select as the best path.
- C . Configure lower LOCAL_PREF to select as the best path.
- D . Configure AS_PATH prepend for the current best path
Refer to the exhibit.
The Internet traffic should always prefer Site-A ISP-1 if the link and BGP connection are up; otherwise, all Internet traffic should go to ISP-2 Redistribution is configured between BGP and OSPF routing protocols and it is not working as expected.
What action resolves the issue?
- A . Set metric-type 2 at Site-A RTR1, and set metric-type 1 at Site-B RTR2
- B . Set OSPF cost 100 at Site-A RTR1, and set OSPF Cost 200 at Site-B RTR2
- C . Set OSPF cost 200 at Site: A RTR1 and set OSPF Cost 100 at Site-B RTR2
- D . Set metric-type 1 at Site-A RTR1, and set metric-type 2 at Site-B RTR2
How is a preshared key "Test’’ for all the remote VPN rooters configured In a DMVPN using GRE over IPsec set up?
- A . authentication pre-share Test address 0.0.0.0 0.0.0.0
- B . set pre-share Test address 0.0.0.0 0.0.0.0
- C . crypto Ipsec key Test address 0.0.0.0 0.0.0.0
- D . crypto isakmp key Test address 0.0.0.0 0.0.0.0
An engineer configured policy-based routing for a destination IP address that does not exist in the routing table.
How is the packet treated through the policy for configuring the set ip default next-hop command?
- A . Packets are not forwarded to the specific next hop.
- B . Packets are forwarded based on the routing table.
- C . Packets are forwarded based on a static route.
- D . Packets are forwarded to the specific next hop.
What is the purpose of an OSPF sham-link?
- A . to allow intra-area routing when OSPF is used as the PE-CE connection protocol in an MPLS VPN network
- B . to correct OSPF backdoor routing when OSPF is used as the PE-CE connection protocol *i an MPLS VPN network
- C . to correct OSPF backdoor routing when OSPF is used as the PE-PE connection protocol m an MPLS VPN network
- D . to allow inter-area routing when OSPF is used as the PE-CE connection protocol in a MPLS VPN network
Refer to the exhibit.
An engineer is trying to connect to R1 via Telnet with no success.
Which configuration resolves the issue?
- A . Option A
- B . Option B
- C . Option C
- D . Option D
How does LDP operate in an MPLS network?
- A . When topology changes occur such as a router failure, LDP generates peer discovery messages that terminate the LDP season to propagate an LSP change.
- B . When an adjacent LSR receives LDP discovery messages. TCP two-way handshake ensures that the LDP session has unidirectional connectivity.
- C . Peer routers establish the LDP session, and the LDP neighbors maintain and terminate the session by exchanging messages
- D . LDP notification messages allow LERs to exchange label information to determine the next hops within a particular LSP.
Which security feature can protect DMVPN tunnels?
- A . IPsec
- B . TACACS+
- C . RTBH
- D . RADIUS