[Free] 2018(Aug) Ensurepass Cisco 300-101 Dumps with VCE and PDF 221-230

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 300-101
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco IP Routing

Question No: 221 – (Topic 7)

What are three reasons to control routing updates via route filtering? (Choose three).

  1. to hide certain networks from the rest of the organization

  2. for easier implementation

  3. to control network overhead on the wire

  4. for simple security

  5. to prevent adjacencies from forming

Answer: A,C,D Explanation:

Route filtering hide certain networks from the rest of the organization and it also controls network overhead. Not only this, it also provides security to the routing updates.

Question No: 222 – (Topic 7)

What following parameters for the EIGRP authentication need to match in order for EIGRP neighbors to establish a neighbor relationship?

  1. Autonomous System number.

  2. K-Values

  3. If authentication is used both: the key number, the password, and the date/time.

  4. The neighbors must be on common subnet (all IGPs follow this rule).

Answer: C

Question No: 223 – (Topic 7)

To configure SNMPv3 implementation, a network engineer is using the AuthNoPriv security level. What effect does this action have on the SNMP messages?

  1. They become unauthenticated and unencrypted.

  2. They become authenticated and unencrypted.

  3. They become authenticated and encrypted.

  4. They become unauthenticated and encrypted.

Answer: B

Question No: 224 – (Topic 7)

A network engineer is troubleshooting connectivity issues with a directly connected RIPng neighbor. Which command should directly connected RIPng neighbor adjacencies only?

  1. router#show ipv6 rip next-hops

  2. router#show ip rip neighbors

  3. router#show ipv6 routers

  4. router#show ipv6 rip database

Answer: A

Question No: 225 – (Topic 7)

After testing various dynamic IPv6 address assignment methods, an engineer decides that more control is needed when distributing addresses to clients. Which two advantages does DHCPv6 have over EUI-64 (Choose two.)

  1. DHCPv6 requires less planning and configuration than EUI-64 requires.

  2. DHCPv6 allows for additional parameters to be sent to the client, such as the domain name and DNS server.

  3. DHCPv6 providers tighter control over the IPv6 addresses that are distributed to clients.

  4. DHCPv6 does not require the configuration of prefix pools.

  5. DHCPv6 does not require neighbor and router discovery on the network segment.

Answer: A,B

Question No: 226 – (Topic 7)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

A network engineer has configured GRE between two IOS routers. The state of the tunnel interface is continuously oscillating between up and down. What is the solution to this problem?

  1. Create a more specific static route to define how to reach the remote router.

  2. Create a more specific ARP entry to define how to reach the remote router.

  3. Save the configuration and reload the router.

  4. Check whether the internet service provider link is stable

Answer: A

Question No: 227 DRAG DROP – (Topic 7)

Drag and drop the Cisco Express Forwarding adjacency types from the left to the correct type of processing on the right.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Question No: 228 – (Topic 7)

What are three IPv6 transition mechanisms? (Choose three)

  1. 6to4 tunneling

  2. VPN tunneling

  3. GRE tunneling

  4. ISATAP tunneling

  5. PPP tunneling

  6. Teredo tunneling

Answer: A,D,F Explanation:

Below is a summary of IPv6 transition technologies:

6 to 4 tunneling: This mechanism allows IPv6 sites to communicate with each other over the IPv4 network without explicit tunnel setup. The main advantage of this technology is that it requires no end-node reconfiguration and minimal router configuration but it is not intended as a permanent solution.

ISATAP tunneling (Intra-Site Automatic Tunnel Addressing Protocol): is a mechanism for transmitting IPv6 packets over IPv4 network. The word 鈥渁utomatic鈥?means that once an

ISATAP server/router has been set up, only the clients must be configured to connect to it. Teredo tunneling: This mechanism tunnels IPv6 datagrams within IPv4 UDP datagrams, allowing private IPv4 address and IPv4 NAT traversal to be used.

In fact, GRE tunneling is also a IPv6 transition mechanism but is not mentioned in BSCI so we shouldn’t choose it (there are 4 types of IPv6 transition mechanisms mentioned in BSCI; they are manual, 6-to-4, Teredo and ISATAP).

Question No: 229 – (Topic 7)

What are the default timers for RIPng?

  1. Update: 30 seconds Expire: 180 seconds Flush: 240 seconds

  2. Update: 20 seconds Expire: 120 seconds Flush: 160 seconds

  3. Update: 10 seconds Expire: 60 seconds Flush: 80 seconds

  4. Update: 5 seconds Expire: 30 seconds Flush: 40 seconds

Answer: A

Question No: 230 – (Topic 7)

Which security feature can you enable to control access to the vty lines on a router?

  1. exec-time out

  2. logging

  3. username and password

  4. transport output

Answer: C

100% Ensurepass Free Download!
300-101 PDF
100% Ensurepass Free Guaranteed!
300-101 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No
         

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com