Exam Code | 300-410 |
Exam Name | Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) |
Questions | 575 Questions Answers With Explanation |
Update Date | November 10,2024 |
Price |
Was : |
Welcome to Certsleader, your ultimate source for top-quality 300-410 dumps tailored for Cisco 300-410 exam. Our comprehensive resources are designed to help you excel in your exam preparations and achieve your certification goals. Whether you are a beginner looking to start a career in Cisco or an experienced professional seeking to advance your skills, Certsleader has the right tools to support your journey.
At Certsleader, we are committed to your success. Our practice questions answers are designed to improve your knowledge and help you pass your exams on the first attempt with high scores. In the rare event that you do not succeed, we offer a full refund, taking responsibility for your satisfaction.
Join thousands of satisfied learners who have successfully passed their certification exams with Certsleader. Explore our study materials, download your PDF files, and take the first step towards a rewarding IT career today.
The network administrator configured CoPP so that all routing protocol traffic toward the router CPU is limited to 1 mbps. All traffic that exceeds this limit must be dropped. The router is running BGP and OSPF Management traffic for Telnet and SSH must be limited to 500kbps.access-list 100 permit tcp any any eq 179access-list 100 permit tcp any any range 22 23access-list 100 permit ospf any any!class-map CM-ROUTINGmatch access-group 100class-map CM-MGMTmatch access-group 100!policy-map PM-COPPclass CM-ROUTINGpolice 1000000 conform-action transmitclass CM-MGMTpolice 500000 conform-action transmit!control-planeservice-policy output PM-COPPNo traffic is filtering through CoPP,which is resulting in high CPU utilization,which configuration resolves the issue ?
A. no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101
B. control-planeno service-policy output PM-COPPservice-policy input PM-COPP
C. No access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit tcp any any range eq 22access-list 100 permit tcp any any range eq 23access-list 100 permit ospf any any
D. no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101!control-planeno service-policy output PM-COPPservice-policy input PM-COPP
A network administrator is troubleshooting a high utilization issue on the route processor of a router that was reported by NMS The administrator logged into the router to check the control plane policing and observed that the BGP process is dropping a high number of routing packets and causing thousands of routes to recalculate frequently. Which solution resolves this issue?
A. Police the cir for BGP, conform-action transmit, and exceed action transmit.
B. Shape the pir for BGP, conform-action set-prec-transmit, and exceed action set-frdetransmit.
C. Shape the cir for BGP. conform-action transmit, and exceed action transmit.
D. Police the pir for BGP, conform-action set-prec-transmit, and exceed action set-clptransmit.
What is a function of BFD?
A. peer recovery after a Layer 3 protocol adjacency failure
B. peer recovery after a Layer 2 adjacency failure
C. failure detection independent of routing protocols and media types
D. failure detection dependent on routing protocols and media types
Which method provides failure detection in BFD?
A. short duration, high overhead
B. short duration, low overhead
C. long duration, high overhead
D. long duration, low overhead
Which IPv6 feature enables a device to reject traffic when it is originated from an address that is not stored in the device binding table?
A. IPv6 Snooping
B. IPv6 Source Guard
C. IPv6 DAD Proxy
D. IPv6 RA Guard
Which feature minimizes DoS attacks on an IPv6 network?
A. IPv6 Binding Security Table
B. IPv6 Router Advertisement Guard
C. IPv6 Prefix Guard
D. IPv6 Destination Guard
A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?
A.
ip tcp adjust-mss 1360
crypto ipsec fragmentation after-encryption
B.
ip tcp adjust-mtu 1360
crypto ipsec fragmentation after-encryption
C.
ip tcp adjust-mss 1360
crypto ipsec fragmentation mtu-discovery
D.
ip tcp adjust-mtu 1360
crypto ipsec fragmentation mtu-discovery
What are two characteristics of IPv6 Source Guard? (Choose two.)
A. requires IPv6 snooping on Layer 2 access or trunk ports
B. used in service provider deployments to protect DDoS attacks
C. requires the user to configure a static binding
D. requires that validate prefix be enabled
E. recovers missing binding table entries
An engineer configured a router with this configuration ip access-hst DENY TELNET 10 deny tcp any any eq 23 log-inputThe router console starts receiving log message :%SEC-6-IPACCESSLOGP: listDENY_TELNET denied tcp 192.168.1.10(1022)(FastEthernet1/0 D508.89gb.003f) - >192.168.2.20(23), 1 packet" Which action stops messages on the console while still denying Telnet?
A. Configure a 20 permit ip any any command
B. Remove log-Input keyword from the access list.
C. Replace log-input keyword with the log keyword in the access list.
D. Configure a 20 permit ip any any log-input command.
What must be configured by the network engineer to circumvent AS_PATH prevention mechanism in IP/VPN Hub and Spoke deployment scenarios?
A. Use allows in and as-override at all Pes.
B. Use allowas in and as-override at the PE-Hub.
C. Use Allowas-in the PE_Hub
D. Use as-override at the PE_Hub
In a DMVPN network, the Spoke1 user observed that the voice traffic is coming to Spoke2 users via the hub router. Which command is required on both spoke routers to communicate directly to one another?
A. ip nhrp map dynamic
B. ip nhrp shortcut
C. ip nhrp nhs multicast
D. ip nhrp redirect
Which IPv6 first hop security feature controls the traffic necessary for proper discovery of neighbor device operation and performance?
A. RA Throttling
B. Source or Destination Guard
C. ND Multicast Suppression
D. IPv6 Snooping
What are the two goals of micro BFD sessions? (Choose two.)
A. The high bandwidth member link of a link aggregation group must run BFD
B. Run the BFD session with 3x3 ms hello timer
C. Continuity for each member link of a link aggregation group must be verified
D. Eny member link on a link aggregation group must run BFD
E. Each member link of a link aggregation group must run BFD.
What is an advantage of implementing BFD?
A. BFD provides faster updates for any flapping route.
B. BFD provides millisecond failure detection
C. BFD is deployed without the need to run any routing protocol
D. BFD provides better capabilities to maintain the routing table
What is a function of an end device configured with DHCPv6 guard?
A. If it is configured as a server, only prefix assignments are permitted.
B. If it is configured as a relay agent, only prefix assignments are permitted.
C. If it is configured as a client, messages are switched regardless of the assigned role.
D. If it is configured as a client, only DHCP requests are permitted.
What is a characteristic of Layer 3 MPLS VPNs?
A. LSP signaling requires the use of unnumbered IP links for traffic engineering.
B. Traffic engineering supports multiple IGP instances
C. Traffic engineering capabilities provide QoS and SLAs.
D. Authentication is performed by using digital certificates or preshared keys.
An engineer configures PBR on R5 and wants to create a policy that matches traffic destined toward 10.10.10.0/24 and forward 10.1.1.1. The traffic must also have its IP precedence set to 5.All other trafficshould be forward toward 10.1.1.2 and have its IP precedence set to 0.Which configuration meets the requirements?
A. access-list 1 permit 10.10.10.0 0.0.0.255
access-list 2 permit any
route-map CCNP permit 10
match ip address 1
set ip next-hop 10.1.1.1
set ip precedence 5
!
route-map CCNP permit 20
match ip address 2
set ip next-hop 10.1.1.2
set ip precedence 0route-map CCNP permit 30
B. access-list 100 permit ip any 10.10.10.0 0.0.0.255
route-map CCNP permit 10
match ip address 100
set ip next-hop 10.1.1.1
set ip precedence 0
!
route-map CCNP permit 20
set ip next-hop 10.1.1.2
set ip precedence 5
!
route-map CCNP permit 30
C. access-list 1 permit 10.10.10.0 0.0.0.255
route-map CCNP permit 10
match ip address 1
set ip next-hop 10.1.1.1
set ip precedence 5
!
route-map CCNP permit 20
set ip next-hop 10.1.1.2
set ip precedence 0
D. access-list 100 permit ip any 10.10.10.0 0.0.0.255
route-map CCNP permit 10
match ip address 100
set ip next-hop 10.1.1.1
set ip precedence 5
!
route-map CCNP permit 20 set ip next-hop 10.1.1.2
set ip precedence 0
Which mechanism must be chosen to optimize the reconvergence time for OSPF at company location 407173257 that is less CPU-intensive than reducing the hello and dead timers?
A. BFD
B. Dead Peer Detection keepalives
C. SSO
D. OSPF demand circuit
What is the purpose of the DHCPv6 Guard?
A. It messages between a DHCPv6 server and a DHCPv6 client ( or relay agent).
B. It shows that clients of a DHCPv5 server are affected.
C. It block DHCPv6 messages from relay agents to a DHCPv6 server.
D. It allows DHCPv6 replay and advertisements from (rouge) DHCPv6 servers.
Which table is used to map the packets in an MPLS LSP that exit from the same interface, via the same next hop, and have the same queuing policies?
A. RIB
B. FEC
C. LDP
D. CEF