[Free] 2017(Aug) EnsurePass Examcollection Cisco 300-101 Dumps with VCE and PDF 101-110

Ensurepass.com : Ensure you pass the IT Exams
2017 Aug Cisco Official New Released 300-101
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco IP Routing

Question No: 101 – (Topic 6)

What is a function of NPTv6?

  1. It interferes with encryption of the full IP payload.

  2. It maintains a per-node state.

  3. It is checksum-neutral.

  4. It rewrites transport layer headers.

Answer: C

Question No: 102 – (Topic 6)

A company#39;s corporate policy has been updated to require that stateless, 1-to-1, and IPv6 to IPv6 translations at the Internet edge are performed. What is the best solution to ensure compliance with this new policy?

  1. NAT64

  2. NAT44

  3. NATv6

  4. NPTv4

  5. NPTv6

Answer: E

Question No: 103 – (Topic 6)

When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication?

  1. username

  2. password

  3. community-string

  4. encryption-key

Answer: A

Question No: 104 – (Topic 6)

A network engineer executes the 鈥渋pv6 flowset鈥?command. What is the result?

  1. Flow-label marking in 1280-byte or larger packets is enabled.

  2. Flow-set marking in 1280-byte or larger packets is enabled.

  3. IPv6 PMTU is enabled on the router.

  4. IPv6 flow control is enabled on the router.

Answer: A

Question No: 105 – (Topic 6)

When policy-based routing (PBR) is being configured,


Which three criteria can the set command specify? (Choose three.)

  1. all interfaces through which the packets can be routed

  2. all interfaces in the path toward the destination

  3. adjacent next hop router in the path toward the destination

  4. all routers in the path toward the destination

  5. all networks in the path toward the destination

  6. type of service and precedence in the IP packets

Answer: A,C,F Explanation:

Configuring Policy-Based Routing (PBR):

You can configure PBR by following these steps. Some of the steps may be omitted depending on your application for PBR. For this example, note the set condition options listed is step 3 (answers are bolded).


Define and configure the route map needed for the policy. This is accomplished with the route-map command, as discussed previously.


Define and configure the match statements the route map will use. The most common match statements used are the following:

match ip address [access-list number]

The match ip address is used to call a standard, extended, or expanded-range ACL. match length [min_packet_length_0-2147483647] [max_packet_length_0-2147483647]

The match length is used to match the Layer 3 packet length, in bytes, with all associated headers and trailers included. You must enter the minimum and maximum packet length. Use the match length command to policy route traffic based on packet size. You can deploy this to route traffic with large or small packet sizes to specific areas of the network. Step3

Configure and define the new routing policy with set commands. Multiple set commands may be used; if multiple commands are used, they are executed in the following order:

set ip {precedence [value_0-7 | name] | tos [value_0-8 | name]} set ip next-hop ip_address

set interface interface_name

set ip default next-hop ip_address set default interface interface_name

Set ip precedence {[1-7]|[routine|critical|flash|flash- override|immediate|internet|network|priority]}

Question No: 106 – (Topic 6)

Refer to the exhibit.


In the network diagram, Area 1 is defined as a stub area. Because redistribution is not allowed in the stub area, EIGRP routes cannot be propagated into the OSPF domain. How does defining area 1 as a not-so-stubby area (NSSA) make it possible to inject EIGRP routes into the OSPF NSSA domain?

  1. by creating type 5 LSAs

  2. by creating type 7 LSAs

  3. by creating a link between the EIGRP domain and the RIP domain, and redistributing EIGRP into RIP

  4. by manually changing the routing metric of EIGRP so that it matches the routing metric of OSPF

Answer: B

Question No: 107 – (Topic 6)

A network engineer finds that a core router has crashed without warning. In this situation, which feature can the engineer use to create a crash collection?

  1. secure copy protocol

  2. core dumps

  3. warm reloads

  4. SNMP

  5. NetFlow

Answer: B

Question No: 108 – (Topic 6)

Refer to the exhibit.


A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. What did the TAC engineer configure incorrectly?

  1. The crypto isakmp configuration is not correct.

  2. The crypto map configuration is not correct.

  3. The network is not included in the OSPF process.

  4. The interface tunnel configuration is not correct.

Answer: D

Question No: 109 – (Topic 6)

What two features are benefits of using GRE tunnels with IPsec over using an IPsec tunnel alone in building-to-building site-to-site VPNs? (Choose two.)

  1. allows dynamic routing securely over the tunnel

  2. IKE keepalives are unidirectional and sent every ten seconds

  3. reduces IPsec headers overhead since tunnel mode is used

  4. supports non-IP traffic over the tunnel

  5. uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

Answer: A,D

Question No: 110 – (Topic 6)

Which of the below mentioned conditions form a neighbor relationship in EIGRP? (Choose three)

  1. Hello or ACK received

  2. AS number match

  3. Hello timer match

  4. Identical metric (k values)

  5. Dead Timer Match

Answer: A,B,D

100% Ensurepass Free Download!
Download Free Demo:300-101 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass 300-101 Dumps
Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.07.01-2017.07.31]

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply