$0.00
Cisco 300-410 Dumps

Cisco 300-410 Exam Dumps

Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)

Total Questions : 575
Update Date : July 15, 2024
PDF + Test Engine
$65.5 $95.5
Test Engine
$55.5 $85.5
PDF Only
$45 $75



Last Week 300-410 Exam Results

139

Customers Passed Cisco 300-410 Exam

93%

Average Score In Real 300-410 Exam

97%

Questions came from our 300-410 dumps.



Choosing the Right Path for Your 300-410 Exam Preparation

Welcome to PassExamHub's comprehensive study guide for the Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) exam. Our 300-410 dumps is designed to equip you with the knowledge and resources you need to confidently prepare for and succeed in the 300-410 certification exam.

What Our Cisco 300-410 Study Material Offers

PassExamHub's 300-410 dumps PDF is carefully crafted to provide you with a comprehensive and effective learning experience. Our study material includes:

In-depth Content: Our study guide covers all the key concepts, topics, and skills you need to master for the 300-410 exam. Each topic is explained in a clear and concise manner, making it easy to understand even the most complex concepts.
Online Test Engine: Test your knowledge and build your confidence with a wide range of practice questions that simulate the actual exam format. Our test engine cover every exam objective and provide detailed explanations for both correct and incorrect answers.
Exam Strategies: Get valuable insights into exam-taking strategies, time management, and how to approach different types of questions.
Real-world Scenarios: Gain practical insights into applying your knowledge in real-world scenarios, ensuring you're well-prepared to tackle challenges in your professional career.

Why Choose PassExamHub?

Expertise: Our 300-410 exam questions answers are developed by experienced Cisco certified professionals who have a deep understanding of the exam objectives and industry best practices.
Comprehensive Coverage: We leave no stone unturned in covering every topic and skill that could appear on the 300-410 exam, ensuring you're fully prepared.
Engaging Learning: Our content is presented in a user-friendly and engaging format, making your study sessions enjoyable and effective.
Proven Success: Countless students have used our study materials to achieve their 300-410 certifications and advance their careers.
Start Your Journey Today!

Embark on your journey to Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) success with PassExamHub. Our study material is your trusted companion in preparing for the 300-410 exam and unlocking exciting career opportunities.

Cisco 300-410 Sample Question Answers

Question # 1

The network administrator configured CoPP so that all routing protocol traffic toward the router CPU is limited to 1 mbps. All traffic that exceeds this limit must be dropped. The router is running BGP and OSPF Management traffic for Telnet and SSH must be limited to 500kbps.access-list 100 permit tcp any any eq 179access-list 100 permit tcp any any range 22 23access-list 100 permit ospf any any!class-map CM-ROUTINGmatch access-group 100class-map CM-MGMTmatch access-group 100!policy-map PM-COPPclass CM-ROUTINGpolice 1000000 conform-action transmitclass CM-MGMTpolice 500000 conform-action transmit!control-planeservice-policy output PM-COPPNo traffic is filtering through CoPP,which is resulting in high CPU utilization,which configuration resolves the issue ?

A. no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101
B. control-planeno service-policy output PM-COPPservice-policy input PM-COPP
C. No access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit tcp any any range eq 22access-list 100 permit tcp any any range eq 23access-list 100 permit ospf any any 
D. no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101!control-planeno service-policy output PM-COPPservice-policy input PM-COPP 



Question # 2

A network administrator is troubleshooting a high utilization issue on the route processor of a router that was reported by NMS The administrator logged into the router to check the control plane policing and observed that the BGP process is dropping a high number of routing packets and causing thousands of routes to recalculate frequently. Which solution resolves this issue?

A. Police the cir for BGP, conform-action transmit, and exceed action transmit.
B. Shape the pir for BGP, conform-action set-prec-transmit, and exceed action set-frdetransmit.
C. Shape the cir for BGP. conform-action transmit, and exceed action transmit.
D. Police the pir for BGP, conform-action set-prec-transmit, and exceed action set-clptransmit. 



Question # 3

What is a function of BFD?

A. peer recovery after a Layer 3 protocol adjacency failure
B. peer recovery after a Layer 2 adjacency failure
C. failure detection independent of routing protocols and media types
D. failure detection dependent on routing protocols and media types 



Question # 4

Which method provides failure detection in BFD?

A. short duration, high overhead
B. short duration, low overhead
C. long duration, high overhead
D. long duration, low overhead 



Question # 5

Which IPv6 feature enables a device to reject traffic when it is originated from an address that is not stored in the device binding table?

A. IPv6 Snooping
B. IPv6 Source Guard
C. IPv6 DAD Proxy
D. IPv6 RA Guard



Question # 6

Which feature minimizes DoS attacks on an IPv6 network?

A. IPv6 Binding Security Table
B. IPv6 Router Advertisement Guard
C. IPv6 Prefix Guard
D. IPv6 Destination Guard 



Question # 7

A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE? 

A. ip tcp adjust-mss 1360 crypto ipsec fragmentation after-encryption 
B. ip tcp adjust-mtu 1360 crypto ipsec fragmentation after-encryption 
C. ip tcp adjust-mss 1360 crypto ipsec fragmentation mtu-discovery 
D. ip tcp adjust-mtu 1360 crypto ipsec fragmentation mtu-discovery 



Question # 8

What are two characteristics of IPv6 Source Guard? (Choose two.) 

A. requires IPv6 snooping on Layer 2 access or trunk ports  
B. used in service provider deployments to protect DDoS attacks  
C. requires the user to configure a static binding  
D. requires that validate prefix be enabled  
E. recovers missing binding table entries  



Question # 9

An engineer configured a router with this configuration ip access-hst DENY TELNET 10 deny tcp any any eq 23 log-inputThe router console starts receiving log message :%SEC-6-IPACCESSLOGP: listDENY_TELNET denied tcp 192.168.1.10(1022)(FastEthernet1/0 D508.89gb.003f) - >192.168.2.20(23), 1 packet" Which action stops messages on the console while still denying Telnet?  

A. Configure a 20 permit ip any any command  
B. Remove log-Input keyword from the access list.  
C. Replace log-input keyword with the log keyword in the access list.  
D. Configure a 20 permit ip any any log-input command.  



Question # 10

What must be configured by the network engineer to circumvent AS_PATH prevention mechanism in IP/VPN Hub and Spoke deployment scenarios? 

A. Use allows in and as-override at all Pes.  
B. Use allowas in and as-override at the PE-Hub.  
C. Use Allowas-in the PE_Hub  
D. Use as-override at the PE_Hub  



Question # 11

In a DMVPN network, the Spoke1 user observed that the voice traffic is coming to Spoke2 users via the hub router. Which command is required on both spoke routers to communicate directly to one another? 

A. ip nhrp map dynamic  
B. ip nhrp shortcut  
C. ip nhrp nhs multicast  
D. ip nhrp redirect  



Question # 12

Which IPv6 first hop security feature controls the traffic necessary for proper discovery of neighbor device operation and performance? 

A. RA Throttling  
B. Source or Destination Guard  
C. ND Multicast Suppression  
D. IPv6 Snooping  



Question # 13

What are the two goals of micro BFD sessions? (Choose two.) 

A. The high bandwidth member link of a link aggregation group must run BFD  
B. Run the BFD session with 3x3 ms hello timer  
C. Continuity for each member link of a link aggregation group must be verified  
D. Eny member link on a link aggregation group must run BFD  
E. Each member link of a link aggregation group must run BFD.  



Question # 14

What is an advantage of implementing BFD? 

A. BFD provides faster updates for any flapping route.  
B. BFD provides millisecond failure detection  
C. BFD is deployed without the need to run any routing protocol  
D. BFD provides better capabilities to maintain the routing table  



Question # 15

What is a function of an end device configured with DHCPv6 guard? 

A. If it is configured as a server, only prefix assignments are permitted.  
B. If it is configured as a relay agent, only prefix assignments are permitted.  
C. If it is configured as a client, messages are switched regardless of the assigned role.  
D. If it is configured as a client, only DHCP requests are permitted.  



Question # 16

What is a characteristic of Layer 3 MPLS VPNs? 

A. LSP signaling requires the use of unnumbered IP links for traffic engineering.  
B. Traffic engineering supports multiple IGP instances  
C. Traffic engineering capabilities provide QoS and SLAs.  
D. Authentication is performed by using digital certificates or preshared keys.  



Question # 17

An engineer configures PBR on R5 and wants to create a policy that matches traffic destined toward 10.10.10.0/24 and forward 10.1.1.1. The traffic must also have its IP precedence set to 5.All other trafficshould be forward toward 10.1.1.2 and have its IP precedence set to 0.Which configuration meets the requirements?

A. access-list 1 permit 10.10.10.0 0.0.0.255 access-list 2 permit any route-map CCNP permit 10 match ip address 1 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 match ip address 2 set ip next-hop 10.1.1.2 set ip precedence 0route-map CCNP permit 30
B. access-list 100 permit ip any 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 100 set ip next-hop 10.1.1.1 set ip precedence 0 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 5 ! route-map CCNP permit 30
C. access-list 1 permit 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 1 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 0 
D. access-list 100 permit ip any 10.10.10.0 0.0.0.255 route-map CCNP permit 10 match ip address 100 set ip next-hop 10.1.1.1 set ip precedence 5 ! route-map CCNP permit 20 set ip next-hop 10.1.1.2 set ip precedence 0



Question # 18

Which mechanism must be chosen to optimize the reconvergence time for OSPF at company location 407173257 that is less CPU-intensive than reducing the hello and dead timers? 

A. BFD  
B. Dead Peer Detection keepalives  
C. SSO  
D. OSPF demand circuit  



Question # 19

What is the purpose of the DHCPv6 Guard? 

A. It messages between a DHCPv6 server and a DHCPv6 client ( or relay agent).  
B. It shows that clients of a DHCPv5 server are affected.  
C. It block DHCPv6 messages from relay agents to a DHCPv6 server.  
D. It allows DHCPv6 replay and advertisements from (rouge) DHCPv6 servers.  



Question # 20

Which table is used to map the packets in an MPLS LSP that exit from the same interface, via the same next hop, and have the same queuing policies? 

A. RIB  
B. FEC  
C. LDP  
D. CEF  



Question # 21

What does the MP-BGP OPEN message contain? 

A. MPLS labels and the IP address of the router that receives the message  
B. the version number and the AS number to which the router belongs  
C. IP routing information and the AS number to which the router belongs  
D. NLRI, path attributes, and IP addresses of the sending and receiving routers  



Question # 22

What is a function of IPv6 Source Guard? 

A. It works with address glean or ND to find existing addresses.  
B. It inspects ND and DHCP packets to build an address binding table.  
C. It denies traffic from known sources and allocated addresses.  
D. It notifies the ND protocol to inform hosts if the traffic is denied by it.  



Question # 23

A customer reports that traffic is not passing on an EIGRP enabled multipoint interface on a router configured as below: interface Serial0/0 no ip address interface Server0/0/0.9 multipoint ip address 10.1.1.1 255.255.255.248 ip split-horizon eigrp 1 Which action resolves the issue?

A. Enable poison reverse 
B. Enable split horizon 
C. Disable poison reverse 
D. Disable split horizon 



Question # 24

How does an MPLS Layer 3 VPN differentiate the IP address space used between each VPN? 

A. by RD 
B. by address family 
C. by MP-BGP 
D. byRT 



Question # 25

What are two characteristics of a VRF instance? (Choose two)

 A. It is defined by the VPN membership of a customer site attached to a P device. 
B. Each VRF has a different set of routing and CEF tables. 
C. AII VRFS share customers routing and CEF tables. 
D. An interface must be associated to one VRF 
E. A customer site can be associated to different VRFs. 



Question # 26

An engineer failed to run diagnostic commands on devices using Cisco DNA Center. Which action in Cisco DNA Center resolves the issue? 

A. Enable Command Runner 
B. Enable APIs 
C. Enable CDP 
D. Enable Secure Shell



Question # 27

A network administrator performed a Compact Flash Memory upgrade on a Cisco Catalyst 6509 Switch. Everything is functioning normally except SNMP, which was configured to monitor the bandwidth of key interfaces but the interface indexes are changed. Which global configuration resolves the issue? 

A. snmp-server ifindex permanent 
B. snmp ifindex permanent 
C. snmp-server ifindex persist 
D. snmp ifindex persist 



Question # 28

Which two components are required for MPLS Layer 3 VPN configuration? (Choose two) 

A. Use pseudowire for Layer 2 routes 
B. Use MP-BGP for customer routes 
C. Use OSPF between PE and CE 
D. Use a unique RD per customer VRF 
E. Use LDP for customer routes 



Question # 29

What is the function of BFD? 

A. It provides uniform failure detection regardless of media type. 
B. It creates high CPU utilization on hardware deployments. 
C. It negotiates to the highest version if the neighbor version differs. 
D. It provides uniform failure detection on the same media type. 



Question # 30

Refer to the exhibit. A network engineer receives a fault ticket about traffic drops from BANK SITE to BANK Users can reach BANK SITE Y from router RA as a source. Routers RB and RD are acting as route reflectors. Which configuration resolves the issue?

A. RC(config)#router bgp 65201 RC(config-router)#neighbor 10.10.10.4 route-reflector-client 
B. RF(config)#router bgp 65201 RF(config-router)#neighbor 10.10.10.6 route-reflector-client 
C. RC(config)#router bgp 65201 RC(config-router)#neighbor 10.10.10.2 route-reflector-client 
D. RB(config)router bgp 65201 RB(config-router)#neighbor 10.10.10.3 route-reflector-client 



Question # 31

Refer to the exhibit. An engineer is trying to log in to R1 via R3 loopback address. Which action resolves the issue? 

A. Add transport input SCP
 B. Add transport input none 
C. Remove the IPv6 traffic filter from R1, which is blocking the Telnet. 
D. Remove the IPv6 traffic from R1, which is blocking the SSH 



Question # 32

A customer is running an mGRE DMVPN tunnel over WAN infrastructure between hub and spoke sites. The existing configuration allows NHRP to add spoke routers automatically to the multicast NHRP mappings. The customer is migrated the network from IPv4 to the IPv6 addressing scheme for those spokes’ routers that support IPv6 and can run DMVPN tunnel over the IPv6 network. Which configuration must be applied to support IPv4 and IPv6 DMVPN tunnel on spoke routers?

 A. Tunnel mode ipv6ip 6to4 
B. Tunnel mode ipv6ip isatap 
C. Tunnel mode ipv6ip auto-tunnel 
D. Tunnel mode ipv6ip 6rd



Question # 33

IPv6 is enabled in the infrastructure to support customers with an IPv6 network over WAN and to connect the head office to branch offices in the local network. One of the customers is already running IPv6 and wants to enable IPv6 over the DMVPN network infrastructure between the headend and branch sites. Which configuration command must be applied to establish an mGRE IPv6 tunnel neighborship? 

A. tunnel protection mode ipv6 
B. ipv6 unicast-routing 
C. ipv6 nhrp holdtime 30 
D. tunnel mode gre multipoint ipv6 



Question # 34

Which MPLS value is combined with the IP prefix to convert to a VPNv4 prefix?

A. 16-byte Route Distinguisher 
B. 8-byte Route Target 
C. 16-byte Route Target 
D. 8-byte Route Distinguisher 



Question # 35

Which two solutions are used to overcome a flapping link that causes a frequent label binding exchange between MPLS routers? (Choose two) 

A. Create link dampening on links to protect the session. 
B. Increase input queue on links to protect the session. 
C. Create targeted hellos to protect the session. 
D. Increase a hold-timer to protect the session. 
E. Increase a session delay to protect the session. 



Question # 36

What is a function of the IPv6 DHCP Guard feature for DHCP messages? 

A. Only access lists are supported for matching traffic. 
B. All client messages are always switched regardless of the device role. 
C. It blocks only DHCP request messages. 
D. If the device is configured as a DHCP server, no message is switched. 



Question # 37

Which 0S1 model is used to insert an MPLS label?

 A. between Layer 5 and Layer 6 
B. between Layer 1 and Layer 2 
C. between Layer 3 and Layer 4 
D. between Layer 2 and Layer 3 



Question # 38

What are the two prerequisites to enable BFD on Cisco routers? (Choose two) 

A. A supported IP routing protocol must be configured on the participating routers. 
B. OSPF Demand Circuit must run BFD on all participating routers. 
C. ICMP must be allowed on all participating routers. 
D. UDP port 1985 must be allowed on all participating routers. 
E. Cisco Express Forwarding and IP Routing must be enabled on all participating routers. 



Question # 39

Which mechanism provides traffic segmentation within a DMVPN network? 

A. RSVP 
B. BGP 
C. MPLS 
D. iPsec 



Question # 40

An engineer received a ticket about a router that has reloaded. The monitoring system graphs show different traffic patterns between logical and physical interfaces when the router is rebooted. Which action resolves the issue?

 A. Configure the snmp ifindex persist command globally. 
B. Clear the logical interfaces with snmp ifindex clear command 
C. Configure the snmp ifindex persist command on the physical interfaces. 
D. Trigger a new snmpwalk from the monitoring system to synchronize interface OlDs 



Question # 41

Which feature is used by LDP in the forwarding path within the MPLS cloud? 

A. IP forwarding 
B. TTL 
C. TDP 
D. LSP 



Question # 42

How is VPN routing information distributed in an MPLS network? 

A. The top level of the customer data packet directs it to the correct CE device 
B. It is established using VPN IPsec peers. 
C. It is controlled using of VPN target communities. 
D. It is controlled through the use of RD. 



Question # 43

A network administrator added a new spoke site with dynamic IP on the DMVPN network. Which configuration command passes traffic on the DMVPN tunnel from the spoke router? 

A. ip nhrp registration ignore 
B. ip nhrp registration no-registration 
C. ip nhrp registration dynamic
 D. ip nhrp registration no-unique 



Question # 44

Which function does LDP provide in an MPLS topology? 

A. It enables a MPLS topology to connect multiple VPNs to P routers. 
B. It provides hop-by-hop forwarding in an MPLS topology for LSRs. 
C. It exchanges routes for MPLS VPNs across different VRFs. 
D. It provides a means for LSRs to exchange IP routes.



Question # 45

A customer requested a GRE tunnel through the provider network between two customer sites using loopback to hide internal networks. Which configuration on R2 establishes the tunnel with R1? 

A. R2(config)# interface Tunnel 1 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1400 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 192.168.20.1 R2(config-if)# tunnel destination 192.168.10.1 
B. R2(config)# interface Tunnel 1 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1400 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 10.10.2.2 R2(config-if)# tunnel destination 10.10.1.1
C. R2(config)# interface Tunnel 1 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1500 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 192.168.20.1 R2(config-if)# tunnel destination 10.10.1.1 
D. R2(config)# interface Tunnel 1 R2(config-if)# ip address 172.20.1.2 255.255.255.0 R2(config-if)# ip mtu 1500 R2(config-if)# ip tcp adjust-mss 1360 R2(config-if)# tunnel source 10.10.2.2 R2(config-if)# tunnel destination 10.10.1.1 



Question # 46

What is an MPLS LDP targeted session? 

A. session between neighbors that are connected no more than one hop away 
B. LDP session established between LSRs by exchanging TCP hello packets 
C. label distribution session between non-directly connected neighbors 
D. LDP session established by exchanging multicast hello packets 



Question # 47

An engineer is creating a policy that overrides normal routing behavior.if the route to a destination of 10.100.100.0/24 is withdrawn from the routing Table, the policy must direct traffic to a next hop of 10.1 1.1. if the route is present in the routing table, then normal forwarding must occur. Which configuration meets the requirements?

A. access-list 100 permit ip any any ! route-map POLICY permit 10 match ip address 100 set ip next-hop recursive 10.1.1.1 
B. access-list 100 permit ip any 10.100.100.0 0.0.0.255 ! Route-map POLICY permit 10 match ip address 100 set ip default next-hop 10.1.1.1 
C. access-list 100 permit ip any 10.100.100.0 0.0.0.255 ! route-map POLICY permit 10 match ip address 100 set ip next-hop 10.1.1.1 ! route map POLICY permit 20 
D. access-list 100 permit ip any 10.100.100.0 0.0.0.255 ! route map POLICY permit 10 match ip address 100 Set ip next-hop recursive 10.1.1.1  ! route-map POLICY permit 20 



Question # 48

An engineer creates a Cisco DNA Center cluster with three nodes, but all the services are running on one host node. Which action resolves this issue?

 A. Restore the link on the switch interface that is connected to a cluster link on the Cisco DNA Center 
B. Click the master host node with all the services and select services to be moved to other hosts 
C. Enable service distribution from the Systems 360 page. 
D. Click system updates, and upgrade to the latest version of Cisco DNA Center. 



Question # 49

The network administrator configured CoPP so that all HTTP and HTTPS traffic from the administrator device located at 172.16 1.99 toward the router CPU is limited to 500 kbps. Any traffic that exceeds this limit must be dropped. access-list 100 permit ip host 172.16.1.99 any ! class-map CM-ADMIN match access-group 100 ! policy-map PM-COPP class CM-ADMIN police 500000 conform-action transmit ! interface E0/0 service-policy input PM-COPP CoPP failed to capture the desired traffic and the CPU load is getting higher. Which two configurations resolve the issue? (Choose two.) 

A. interface E0/0 no service-policy input PM-COPP ! control-plane service-policy input PM-COPP 
B. policy-map PM-COPP class CM-ADMIN no police 500000 conform-action transmit police 500 conform-action transmit ! control-plane service-policy input PM-COPP 
C. no access-list 100 access-list 100 permit tcp host 172.16.1.99 any eq 80 
D. no access-list 100 access-list 100 permit tcp host 172.16.1.99 any eq 80 access-list 100 permit tcp host 172.16.1.99 any eq 443 
E. policy-map PM-COPP class CM-ADMIN no police 500000 conform-action transmit police 500 conform-action transmit 



Question # 50

How do devices operate in MPLS L3VPN topology? 

A. P and associated PE routers with IGP populate the VRF table in different VPNs.
 B. CE routers connect to the provider network and perform LSP functionality 
C. P routers provide connectivity between PE devices with MPLS switching. 
D. P routers support PE to PE VPN tunnel without LSP functionality 



Question # 51

How does LDP operate in an MPLS network? 

A. When topology changes occur such as a router failure, LDP generates peer discovery messages that terminate the LDP season to propagate an LSP change. 
B. When an adjacent LSR receives LDP discovery messages. TCP two-way handshake ensures that the LDP session has unidirectional connectivity. 
C. Peer routers establish the LDP session, and the LDP neighbors maintain and terminate the session by exchanging messages 
D. LDP notification messages allow LERs to exchange label information to determine the next hops within a particular LSP. 



Question # 52

A CoPP policy is applied for receiving SSH traffic from the WAN interface on a Cisco ISR4321 router. However, the SSH response from the router is abnormal and stuck during the high link utilization. The problem is identified as SSH traffic does not match in the ACL. Which action resolves the issue? 

A. Rate-limit SSH traffic to ensure dedicated bandwidth. 
B. Apply CoPP on the control plane interface. 
C. Increase the IP precedence value of SSH traffic to 6. 
D. Apply CoPP on the WAN interface inbound direction. 



Question # 53

Users report issues with reachability between areas as soon as an engineer configured summary routes between areas in a multiple area OSPF autonomous system. Which action resolves the issue? 

A. Configure the summary-address command on the ASBR. 
B. Configure the summary-address command on the ABR. 
C. Configure the area range command on the ABR. 
D. Configure the area range command on the ASBR. 



Question # 54

The network administrator must implement IPv6 in the network to allow only devices that not only have registered IP addresses but are also connecting from assigned locations. Which security feature must be implemented?

A. IPv6 Snooping 
B. IPv6 Destination Guard 
C. IPv6 Prefix Guard 
D. IPv6 Router Advertisement Guard 



Question # 55

When configuring Control Plane Policing on a router to protect it from malicious traffic, an engineer observes that the configured routing protocols start flapping on that device. Which action in the Control Plane Policy prevents this problem in a production environment while achieving the security objective? 

A. Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the output direction 
B. Set the conform-action and exceed-action to transmit initially to test the ACLs and transmit rates and apply the Control Plane Policy in the input direction 
C. Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the input direction 
D. Set the conform-action to transmit and exceed-action to drop to test the ACLs and transmit rates and apply the Control Plane Policy m the output direction 



Question # 56

An engineer configured two routers connected to two different service providers using BGP with default attributes. One of the links is presenting high delay, which causes slowness in the network. Which BGP attribute must the engineer configure to avoid using the highdelay ISP link if the second ISP link is up? 

A. LOCAL_PREF 
B. MED C. WEIGHT 
D. AS-PATH 



Question # 57

How does an MPLS Layer 3 VPN function?

A. set of sites use multiprotocol BGP at the customer site for aggregation 
B. multiple customer sites interconnect through service provider network to create securetunnels between customer edge devices 
C. set of sites interconnect privately over the Internet for security 
D. multiple customer sites interconnect through a service provider network using customeredge to provider edge connectivity 



Question # 58

What statement about route distinguishes in an MPLS network is true?

A. Route distinguishes make a unique VPNv4 address across the MPLS network. 
B. Route distinguishers allow multiple instances of a routing table to coexist within the edgerouter. 
C. Route distinguishes are used for label bindings 
D. Route distinguishes define which prefixes are imported and exported on the edge router