Download Implementing Cisco IP Routing (ROUTE v2-0).passit4sure.300-101.2018-09-25.1e.377q.vcex

Download Exam

File Info

Exam Implementing Cisco IP Routing (ROUTE v2.0)
Number 300-101
File Name Implementing Cisco IP Routing (ROUTE v2-0).passit4sure.300-101.2018-09-25.1e.377q.vcex
Size 11.86 Mb
Posted September 25, 2018
Downloads 175
Download Implementing Cisco IP Routing (ROUTE v2-0).passit4sure.300-101.2018-09-25.1e.377q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

  
  
Refer to the exhibit. A network engineer has configured GRE between two IOS routers. The state of the tunnel interface is continuously oscillating between up and down. What is the solution to this problem?

  • A: Create a more specific ARP entry to define how to reach the remote router.
  • B: Save the configuration and reload the router.
  • C: Create a more specific static route to define how to reach the remote router.
  • D: Check whether the Internet service provider link is stable,

Correct Answer: C

References:
http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/22327-gre-flap.html




Question 2

Other than a working EIGRP configuration, which option must be the same on all routers for EIGRP authentication key role over to work correctly?

  • A: SMTP
  • B: SNMP
  • C: passwords
  • D: time

Correct Answer: D

Requirements for EIGRP authentication 
The time must be properly configured on all routers. Refer to Configuring NTP for more information. 
A working EIGRP configuration is recommended. 
If we have option "Key-Chain", instead of "Passwords" then option C would also be correct. 
References: https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/82110-eigrp-authentication.html




Question 3

Which two statements about NTP operation are true? (Choose two.)

  • A: Locally configured time overrides time received from an NTP server.
  • B: If multiple NTP servers are configured, the one with the lowest stratum is preferred.
  • C: If multiple NTP servers are configured, the one with the highest stratum is preferred.
  • D: “Stratum” refers to the number of hops between the NTP client and the NTP server.
  • E: By default, NTP communications use UDP port 123.

Correct Answer: BE

NTP is designed to synchronize the time on a network of machines. NTP runs over the User Datagram Protocol (UDP), using port 123 as both the source and destination, which in turn runs over IP. NTP Version 3 RFC 1305 leavingcisco.com is used to synchronize timekeeping among a set of distributed time servers and clients. A set of nodes on a network are identified and configured with NTP and the nodes form a synchronization subnet, sometimes referred to as an overlay network. While multiple masters (primary servers) may exist, there is no requirement for an election protocol. 
An NTP network usually gets its time from an authoritative time source, such as a radio clock or an atomic clock attached to a time server. NTP then distributes this time across the network. An NTP client makes a transaction with its server over its polling interval (from 64 to 1024 seconds) which dynamically changes over time depending on the network conditions between the NTP server and the client. The other situation occurs when the router communicates to a bad NTP server (for example, NTP server with large dispersion); the router also increases the poll interval. No more than one NTP transaction per minute is needed to synchronize two machines. It is not possible to adjust the NTP poll interval on a router. 
NTP uses the concept of a stratum to describe how many NTP hops away a machine is from an authoritative time source. For example, a stratum 1 time server has a radio or atomic clock directly attached to it. It then sends its time to a stratum 2 time server through NTP, and so on. A machine running NTP automatically chooses the machine with the lowest stratum number that it is configured to communicate with using NTP as its time source. This strategy effectively builds a self-organizing tree of NTP speakers. NTP performs well over the non-deterministic path lengths of packet-switched networks, because it makes robust estimates of the following three key variables in the relationship between a client and a time server  
Reference: 
http://www.cisco.com/c/en/us/support/docs/availability/high-availability/19643-ntpm.html




Question 4

Which type of IPv6 address is an identifier for a single interface on a single node?

  • A: broadcast
  • B: multicast
  • C: anycast
  • D: unicast

Correct Answer: D

An IPv6 unicast address is an identifier for a single interface,on a single node. A packet that is sent to a unicast address is delivered to the interface identified by that address. 




Question 5

Refer to the exhibit. Which three NTP features can be deduced on the router? (Choose three.) 

  

  • A: only updates its time from 192.168.1.4
  • B: only accepts time requests from 192.168.1.1
  • C: only updates its time from 192.168.1.1
  • D: only accepts time requests from 192.168.1.4
  • E: only handles four requests at a time
  • F: only is in stratum 4

Correct Answer: ABF

The access group options are scanned in the following order, from least restrictive to most restrictive. However, if NTP matches a deny ACL rule in a configured peer, ACL processing stops and does not continue to the next access group option. 
The peer keyword enables the device to receive time requests and NTP control queries and to synchronize itself to the servers specified in the access list. 
The serve keyword enables the device to receivetime requests and NTP control queries from the servers specified in the access list but not to synchronize itself to the specified servers. 
The serve-only keyword enables the device to receive only time requests from servers specified in the access list. 
The query-only keyword enables the device to receive only NTP control queries from the servers specified in the access list.




Question 6

What command can you enter to configure an enable password that users an encrypted password from another configuration?

  • A: enable secret $abc%!#.Cd34$!ao0
  • B: enable secret 7 $abc%!#.Cd34$!ao0
  • C: enable secret 0 $abc%!#.Cd34$!ao0
  • D: enable secret 5 $abc%!#.Cd34$!ao0
  • E: enable secret 15 $abc%!#.Cd34$!ao0
  • F: enable secret 6 $abc%!#.Cd34$!ao0

Correct Answer: D

References:




Question 7

A network engineer receives reports about poor voice quality issues at a remote site. The network engineer does a packet capture and sees out-of-order packets being delivered. 
Which option can cause the VoIP quality to suffer?

  • A: speed duplex link issues
  • B: misconfigured voice VLAN
  • C: load balancing over redundant links
  • D: traffic over backup redundant links

Correct Answer: C

In traditional packet forwarding systems, using different paths have varying latencies that cause out of order packets, eventually resulting in far lower performance for the network application. Also , if some packets are process switched quickly by the routing engine of the router while others are interrupt switched (which takes more time) then it could result in out of order packets. The other options would cause packet drops or latency, but not out of order packets.




Question 8

  
  
Refer to the exhibit. A network engineer is troubleshooting a DMVPN setup between the hub and the spoke. The engineer executes the command show crypto isakmp sa and observes the output that is displayed. What is the problem?

  • A: that ISAKMP is using default settings
  • B: an incompatible ISAKMP policy
  • C: an incompatible IPsec transform set
  • D: that ISAKMP is not enabled

Correct Answer: A

Reference: 
http://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html




Question 9

Which two attributes describe UDP within a TCP/IP network? (Choose two.)

  • A: acknowledgments
  • B: unreliable delivery
  • C: connection-oriented communication
  • D: increased headers
  • E: connectionless communication

Correct Answer: BE

UDP Characteristics 
presents the structure of a UDP segment header. Because UDP is considered to be an unreliable protocol, it lacks the sequence numbering, window size, and connectionless acknowledgment numbering present in the header of a TCP segment. 
Rather the UDP segment's 
Because a UDP segment header is so much smaller than a TCP segment header, UDP becomes a good candidate for the transport layer protocol serving applications that need to maximize bandwidth and do not require acknowledgments.




Question 10

Which three IP SLA performance metrics can you use to monitor enterprise-class networks? (Choose three.)

  • A: packet loss
  • B: delay
  • C: bandwidth
  • D: connectivity
  • E: reliability
  • F: traps

Correct Answer: ABD

Cisco IOS IP SLAs collects a unique subset of the following performance metrics:
Delay (both round-trip and one-way) 
Jitter (directional) 
Packet loss (directional) 
Packet sequencing (packet ordering) 
Path(per hop) 
Connectivity (directional) 
Server or website download time 
Voice quality scores










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files