Implementing Cisco IP Routing
Question No: 151 – (Topic 7)
When unicast reverse path forwarding is configured on an interface, which action does the interface take first when it receives a packet?
it verifies that the source has a valid VEF adjacency.
It checks the egress access lists.
it verifies a reverse path via the FIB to the source.
It checks the ingress access lists.
Question No: 152 – (Topic 7)
Which mode of uRPF causes a router interface to accept a packet, if the network to which the packet’s source IP address belongs is found in the router’s FIB?
Answer: B Explanation:
A number of common types of DoS attacks take advantage of forged or rapidly changing source IP addresses, allowing attackers to thwart efforts by ISPs to locate or filter these attacks. Unicast RPF was originally created to help mitigate such attacks by providing an automated, scalable mechanism to implement the Internet Engineering Task Force (IETF) Best Common Practices 38/Request for Comments 2827 (BCP 38/RFC 2827) anti-spoofing filtering on the customer-to-ISP network edge. By taking advantage of the information stored in the Forwarding Information Base (FIB) that is created by the CEF switching process, Unicast RPF can determine whether IP packets are spoofed or malformed by matching the IP source address
and ingress interface against the FIB entry that reaches back to this source (a so-called reverse lookup). Packets that are received from one of the best reverse path routes back out of the same interface are forwarded as normal. If there is no reverse path route on the sam e interface from which the packet was received, it might mean that the source address was modified, and the packet is dropped (by default).
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_urpf/configuration/xe-3s/sec- data-urpf-xe-3s-book/sec-unicast-rpf-loose- mode.html?referring_site=REamp;pos=1amp;page=http://www.cisco.com/c/en/us/td/docs/ios/12_0 s/feature/guide/srpf_gsr.html#GUID-FFFA94D5- EEFB-4215-9EE1-DB37CD01C2CA
Question No: 153 – (Topic 7)
Which type of address does OSPFv3 use to form neighbor adjacencies and to send LSAs?
unicast IPv6 addresses
multicast address FF02::5
unicast IPv4 addresses
Question No: 154 – (Topic 7)
Refer to the exhibit.
How would you confirm on R1 that load balancing is actually occurring on the default- network (0.0.0.0)?
Use ping and the show ip route command to confirm the timers for each default network resets to 0.
Load balancing does not occur over default networks; the second route will only be used for failover.
Use an extended ping along with repeated show ip route commands to confirm the gateway of last resort address toggles back and forth.
Use the traceroute command to an address that is not explicitly in the routing table.
Answer: D Explanation: Explanation
The most simple method to test load balancing is to use the 鈥渢raceroute鈥?command. If load balancing is working correctly, we will see different paths to reach the destination each time we use that command.
Unknown address will be routed via the default-network 0.0.0.0 so we must use an address that is not explicitly in the routing table.
Question No: 155 – (Topic 7)
If the total bandwidth is 64 kbps and the RTT is 3 seconds, what is the bandwidth delay product?
Question No: 156 – (Topic 7)
Which alerts will be seen on the console when running the command: logging console warnings.?
warnings, notifications, error, debugging, informational
warnings, errors, critical, alerts, emergencies
notifications, warnings, errors
warnings, errors, critical, alerts
Question No: 157 – (Topic 7)
Which IP SLA operation can be used to measure round-trip delay for the full path and hop- by-hop round-trip delay on the network?
ICMP path echo
Question No: 158 DRAG DROP – (Topic 7)
Drag each statement about authentication, authorization, and accounting on the left to the matching category on right.
Question No: 159 – (Topic 7)
What are three IPv6 transition mechanisms? (Choose three)
Answer: A,D,F Explanation:
Below is a summary of IPv6 transition technologies:
6 to 4 tunneling: This mechanism allows IPv6 sites to communicate with each other over the IPv4 network without explicit tunnel setup. The main advantage of this technology is that it requires no end-node reconfiguration and minimal router configuration but it is not intended as a permanent solution.
ISATAP tunneling (Intra-Site Automatic Tunnel Addressing Protocol): is a mechanism for transmitting IPv6 packets over IPv4 network. The word 鈥渁utomatic鈥?means that once an ISATAP server/router has been set up, only the clients must be configured to connect to it. Teredo tunneling: This mechanism tunnels IPv6 datagrams within IPv4 UDP datagrams, allowing private IPv4 address and IPv4 NAT traversal to be used.
In fact, GRE tunneling is also a IPv6 transition mechanism but is not mentioned in BSCI so we shouldn’t choose it (there are 4 types of IPv6 transition mechanisms mentioned in BSCI; they are manual, 6-to-4, Teredo and ISATAP).
Question No: 160 – (Topic 7)
Which PPP authentication method sends authentication information in cleartext?
100% Ensurepass Free Download!
Download Free Demo:300-101 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass 300-101 Dumps
Get 10% off your purchase! Copy it:TJDN-947R-9CCD [2017.07.01-2017.07.31]
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|