Ensurepass.com : Ensure you pass the IT Exams
2018 July Cisco Official New Released 300-101
100% Free Download! 100% Pass Guaranteed!
Implementing Cisco IP Routing
Question No: 81 – (Topic 5)
What are the three modes of Unicast Reverse Path Forwarding?
-
strict mode, loose mode, and VRF mode
-
strict mode, loose mode, and broadcast mode
-
strict mode, broadcast mode, and VRF mode
-
broadcast mode, loose mode, and VRF mode
Answer: A
Question No: 82 – (Topic 5)
Refer to the exhibit.
Which two statements are correct regarding the routes to be redistributed into OSPF? (Choose two.)
-
The network 192.168.1.0 will be allowed and assigned a metric of 100.
-
The network 192.168.1.0 will be allowed and assigned a metric of 200.
-
All networks except 10.0.0.0/8 will be allowed and assigned a metric of 200.
-
The network 172.16.0.0/16 will be allowed and assigned a metric of 200.
-
The network 10.0.10.0/24 will be allowed and assigned a metric of 200.
Answer: A,D
Question No: 83 – (Topic 5)
A network administrator is troubleshooting a redistribution of OSPF routes into EIGRP.
router eigrp 1
network 10.0.0.0
!
router ospf 1
network 172.10.0.0 0.0.255.255 area 0
redistribute eigrp 1
Given the exhibited commands, which statement is true?
-
Redistributed routes will have an external type of 1 and a metric of 1.
-
Redistributed routes will have an external type of 2 and a metric of 20.
-
Redistributed routes will maintain their original OSPF routing metric.
-
Redistributed routes will have a default metric of 0 and will be treated as reachable and advertised.
-
Redistributed routes will have a default metric of 0 but will be treated as unreachable and not advertised.
Answer: B Explanation:
By default, all routes redistributed into OSPF will be tagged as external type 2 (E2) with a metric of 20, except for BGP routes (with a metric of 1).
Note: The cost of a type 2 route is always the external cost, irrespective of the interior cost to reach that route. A type 1 cost is the addition of the external cost and the internal cost used to reach that route.
Question No: 84 – (Topic 5)
To configure 6to4 on a dual-stack edge router. Which three of the following are valid in 6to4
Tunneling configuration? (Choose three)
-
IPv4 Tunnel IP address
-
Tunnel mode (6to4)
-
Tunnel Keepalives
-
IPv4 Tunnel Destination
-
IPv4 Tunnel Source.
-
6to4 IPv6 address (within 2002 /16)
Answer: B,E,F
Topic 6, Infrastructure Services
Question No: 85 – (Topic 6)
A network engineer is asked to configure a quot;site-to-sitequot; IPsec VPN tunnel. One of the last things that the engineer does is to configure an access list (access-list 1 permit any) along with the command ip nat inside source list 1 int s0/0 overload. Which functions do the two commands serve in this scenario?
-
The command access-list 1 defines interesting traffic that is allowed through the tunnel.
-
The command ip nat inside source list 1 int s0/0 overload disables quot;many-to-onequot; access for all devices on a defined segment to share a single IP address upon exiting the external interface.
-
The command access-list 1 permit any defines only one machine that is allowed through the tunnel.
-
The command ip nat inside source list 1 int s0/0 overload provides quot;many-to-onequot; access for all devices on a defined segment to share a single IP address upon exiting the external interface.
Answer: D
Question No: 86 – (Topic 6)
Which two statements about Frame Relay Point-to-Point connections are true? (Choose Two)
-
Changing a point-to-point sub interface to a different type requires the device to be reloaded.
-
They use two DLCIs to communicate with multiple endpoints over the Frame Relay cloud.
-
The device can establish a point-to-point connection to the cloud without a DLCI.
-
They can operate normally without a DLCI map.
-
Each physical interface that extends to the Frame Relay cloud can support a single SVC.
Answer: A,B
Question No: 87 – (Topic 6)
Refer to the exhibit.
A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up.
What did the TAC engineer configure incorrectly?
-
The crypto isakmp configuration is not correct.
-
The crypto map configuration is not correct.
-
The interface tunnel configuration is not correct.
-
The network configuration is not correct; network 172.16.1.0 is missing.
Answer: A
Question No: 88 – (Topic 6)
Refer to the exhibit.
Which statement about the output of the show flow-sampler command is true?
-
The sampler matched 10 packets, each packet randomly chosen from every group of 100 packets.
-
The sampler matched 10 packets, one packet every 100 packets.
-
The sampler matched 10 packets, each one randomly chosen from every 100-second interval.
-
The sampler matched 10 packets, one packet every 100 seconds.
Answer: A
Question No: 89 – (Topic 6)
Which cisco Express Forwarding component maintains Layer 2 addressing information?
-
dCEF
-
adjacency table.
-
FIB
-
fast switching
-
RIB
Answer: B
Explanation: Adjacency TablesNodes in the network are said to be adjacent if they can reach each other with a single hop across a link layer. In addition to the FIB, CEF uses
adjacency tables to prepend Layer 2 addressing information. The adjacency table maintains Layer 2 next-hop addresses for all FIB entries. http://www.cisco.com/c/en/us/td/docs/ios/12_2/switch/configuration/guide/fswtch_c/xcfcef.ht ml
Question No: 90 – (Topic 6)
Which two methods of deployment can you use when implementing NAT64? (Choose two.)
-
stateless
-
stateful
-
manual
-
automatic
-
static
-
functional
-
dynamic
Answer: A,B
100% Ensurepass Free Download!
–Download Free Demo:300-101 Demo PDF
100% Ensurepass Free Guaranteed!
–300-101 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |