Download Cisco.PracticeDumps.300-101.2018-05-27.1e.320q.vcex

Download Exam

File Info

Exam Implementing Cisco IP Routing (ROUTE v2.0)
Number 300-101
File Name Cisco.PracticeDumps.300-101.2018-05-27.1e.320q.vcex
Size 10.04 Mb
Posted May 27, 2018
Downloads 102
Download Cisco.PracticeDumps.300-101.2018-05-27.1e.320q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1

A network engineer has left a NetFlow capture enabled over the weekend to gather information regarding excessive bandwidth utilization. The following command is entered:
switch#show flow exporter Flow_Exporter-1 
What is the expected output?

  • A: configuration of the specified flow exporter
  • B: current status of the specified flow exporter
  • C: status and statistics of the specified flow monitor
  • D: configuration of the specified flow monitor

Correct Answer: B



Question 2

A company‚Äôs corporate policy has been updated to require that stateless, 1-to-1, and Ipv6 to Ipv6 translations at the Internet edge are performed. 
What is the best solution to ensure compliance with this new policy?

  • A: NAT64
  • B: NAT44
  • C: NATv6
  • D: NPTv4
  • E: NPTv6

Correct Answer: E

NPTv6 provides a mechanism to translate the private internal organization prefixes to public globally reachable addresses. The translation mechanism is stateless and provides a 1:1 relationship between the internal addresses and external addresses. The use cases for NPTv6 outlined in the RFC include peering with partner networks, multi homing, and redundancy and load sharing.

Question 3

Which two functions are completely independent when implementing NAT64 over NAT-PT? (Choose two.)

  • A: DNS
  • B: NAT
  • C: port redirection
  • D: stateless translation
  • E: session handling

Correct Answer: AB

Work Address Translation IPv6 to IPv4, or NAT64, technology facilitates communication between IPv6-only and IPv4-only hosts and networks (whether in a transit, an access, or an edge network). This solution allows both enterprises and ISPs to accelerate IPv6 adoption while simultaneously handling IPv4 address depletion. The DnS64 and NAT64 functions are completely separated, which is essential to the superiority of NAT64 over NAT-PT. 

Question 4

Which two methods of deployment can you use when implementing NAT64? (Choose two.)

  • A: stateless
  • B: stateful
  • C: manual
  • D: automatic
  • E: static
  • F: functional
  • G: dynamic

Correct Answer: AB

While stateful and stateless NAT64 perform the task of translating IPv4 packets into IPv6 packets and vice versa, there are important differences. The following table provides a high-level overview of the most relevant differences. 
Table 2. Differences Between Stateless NAT64 and Stateful NAT64 


Question 5

Which NetFlow component is applied to an interface and collects information about flows?

  • A: flow monitor
  • B: flow exporter
  • C: flow sampler
  • D: flow collector

Correct Answer: A

Flow monitors are the NetFlow component that is applied to interfaces to perform network traffic monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after you create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is applied to the first interface. Flow data is collected from the network traffic during the monitoring process based on the key and nonkey fields in the record, which is configured for the flow monitor and stored in the flow monitor cache. 

Question 6

Refer to the exhibit. 

Which statement about the output of the show flow-sampler command is true?

  • A: The sampler matched 10 packets, each packet randomly chosen from every group of 100 packets.
  • B: The sampler matched 10 packets, one packet every 100 packets.
  • C: The sampler matched 10 packets, each one randomly chosen from every 100-second interval.
  • D: The sampler matched 10 packets, one packet every 100 seconds.

Correct Answer: A

The sampling mode determines the algorithm that selects a subset of traffic for NetFlow processing. In the random sampling mode that Random Sampled NetFlow uses, incoming packets are randomly selected so that one out of each n sequential packets is selected on average for NetFlow processing. For example, if you set the sampling rate to 1 out of 100 packets, then NetFlow might sample the 5th, 120th, 199th, 302nd, and so on packets. This sample configuration provides NetFlow data on 1 percent of total traffic. The n value is a parameter from 1 to 65535 packets that you can configure. 


Question 7

What is the result of the command ip flow-export destination 5858?

  • A: It configures the router to export cache flow information to IP on port UDP/5858.
  • B: It configures the router to export cache flow information about flows with destination IP and port UDP/5858.
  • C: It configures the router to receive cache flow information from IP on port UDP/5858.
  • D: It configures the router to receive cache flow information about flows with destination IP and port UDP/5858.

Correct Answer: A

To enable the exporting of information in NetFlow cache entries, use the ip flow-export destination command in global configuration mode.  
Syntax Description 

Question 8

Which type of traffic does DHCP snooping drop?

  • A: discover messages
  • B: DHCP messages where the source MAC and client MAC do not match
  • C: traffic from a trusted DHCP server to client
  • D: DHCP messages where the destination MAC and client MAC do not match

Correct Answer: B

The switch validates DHCP packets received on the untrusted interfaces of VLANs with DHCP snooping enabled. The switch forwards the DHCP packet unless any of the following conditions occur (in which case the packet is dropped):
The switch receives a packet (such as a DHCPOFFER, DHCPACK, DHCPNAK, or DHCPLEASEQUERY packet) from a DHCP server outside the network or firewall.  
The switch receives a packet on an untrusted interface, and the source MAC address and the DHCP client hardware address do not match. This check is performed only if the DHCP snooping MAC address verification option is turned on.  
The switch receives a DHCPRELEASE or DHCPDECLINE message from an untrusted host with an entry in the DHCP snooping binding table, and the interface information in the binding table does not match the interface on which the message was received. 
The switch receives a DHCP packet that includes a relay agent IP address that is not  
To support trusted edge switches that are connected to untrusted aggregation-switch ports, you can enable the DHCP option-82 on untrusted port feature, which enables untrusted aggregation-switch ports to accept DHCP packets that include option-82 information. Configure the port on the edge switch that connects to the aggregation switch as a trusted port. 

Question 9

Which two commands would be used to troubleshoot high memory usage for a process? (Choose two.)

  • A: router#show memory allocating-process table
  • B: router#show memory summary
  • C: router#show memory dead
  • D: router#show memory events
  • E: router#show memory processor statistics

Correct Answer: AB

Question 10

The following configuration is applied to a router at a branch site:


If IPv6 is configured with default settings on all interfaces on the router, which two dynamic IPv6 addressing mechanisms could you use on end hosts to provide end-to-end connectivity? (Choose two.)

  • A: EUI-64
  • B: SLAAC
  • C: DHCPv6
  • D: BOOTP

Correct Answer: AB





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX and EXAM files