It is more faster and easier to pass the Cisco ccnp 300 101 exam by using Refined Cisco Implementing Cisco IP Routing questuins and answers. Immediate access to the Avant-garde route 300 101 Exam and find the same core area examcollection 300 101 questions with professionally verified answers, then PASS your exam with a high score now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/300-101-exam-dumps.html

Q41. A network administrator is troubleshooting a DMVPN setup between the hub and the spoke. Which action should the administrator take before troubleshooting the IPsec configuration? 

A. Verify the GRE tunnels. 

B. Verify ISAKMP. 

C. Verify NHRP. 

D. Verify crypto maps. 

Answer:

Explanation: 


Q42. A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for performance gauging. Which type of statistics does the engineer see? 

A. connectionless-oriented 

B. service-oriented 

C. connection-oriented 

D. application-oriented 

Answer:

Explanation: 

Configuration Examples for IP SLAs TCP Connect Operations The following example shows

how to configure a TCP Connection-oriented operation from Device B to the Telnet port (TCP port 23) of IP

Host 1 (IP address 10.0.0.1), as shown in the "TCP Connect Operation" figure in the "Information About

the IP SLAs TCP Connect Operation" section. The operation is scheduled to start immediately. In this

example, the control protocol is disabled on the source (Device B). IP SLAs uses the control protocol to

notify the IP SLAs responder to enable the target port temporarily. This action allows the responder to reply

to the TCP Connect operation. In this example, because the target is not a Cisco device and a well- known

TCP port is used, there is no need to send the control message. Device A (target device) Configuration

configure terminal ip sla responder tcp-connect ipaddress 10.0.0.1 port 23 

Reference: http://

www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15- mt-book/ sla_tcp_conn.html


Q43. Which protocol uses dynamic address mapping to request the next-hop protocol address for a specific connection? 

A. Frame Relay inverse ARP 

B. static DLCI mapping 

C. Frame Relay broadcast queue 

D. dynamic DLCI mapping 

Answer:

Explanation: 

Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a

specific connection, given its known DLCI. Responses to

Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server; the

table is then used to supply the next-hop protocol

address or the DLCI for outgoing traffic.

Reference:

http://www.cisco.com/c/en/us/td/docs/ios/12_2/wan/configuration/guide/fwan_c/wcffrely.html


Q44. CORRECT TEXT 

You are a network engineer with ROUTE.com, a small IT company. They have recently merged two organizations and now need to merge their networks as shown in the topology exhibit. One network is using OSPF as its IGP and the other is using EIGRP as its IGP. R4 has been added to the existing OSPF network to provide the interconnect between the OSPF and EIGRP networks. Two links have been added that will provide redundancy. 

The network requirements state that you must be able to ping and telnet from loopback 101 on R1 to the OPSF domain test address of 172.16.1.100. All traffic must use the shortest path that provides the greatest bandwidth. The redundant paths from the OSPF network to the EIGRP network must be available in case of a link failure. No static or default routing is allowed in either network. 

A previous network engineer has started the merger implementation and has successfully assigned and verified all IP addressing and basic IGP routing. You have been tasked with completing the implementation and ensuring that the network requirements are met. You may not remove or change any of the configuration commands currently on any of the routers. You may add new commands or change default values. 

Answer: First we need to find out 5 parameters (Bandwidth, Delay, Reliability, Load, MTU) of the s0/0/0 interface (the interface of R2 connected to R4) for redistribution: 

R2#show interface s0/0/0 

Write down these 5 parameters, notice that we have to divide the Delay by 10 because the metric unit is in tens of microsecond. For example, we get Bandwidth=1544 Kbit, Delay=20000 us, Reliability=255, Load=1, MTU=1500 bytes then we would redistribute as follows: 

R2#config terminal 

R2(config)# router ospf 1 

R2(config-router)# redistribute eigrp 100 metric-type 1 subnets 

R2(config-router)#exit 

R2(config-router)#router eigrp 100 

R2(config-router)#redistribute ospf 1 metric 1544 2000 255 1 1500 

Note: In fact, these parameters are just used for reference and we can use other parameters with 

no problem. 

If the delay is 20000us then we need to divide it by 10, that is 20000 / 10 = 2000) 

For R3 we use the show interface fa0/0 to get 5 parameters too 

R3#show interface fa0/0 

For example we get Bandwidth=10000 Kbit, Delay=1000 us, Reliability=255, Load=1, MTU=1500 bytes 

R3#config terminal 

R3(config)#router ospf 1 

R3(config-router)#redistribute eigrp 100 metric-type 1 subnets 

R3(config)#exit 

R3(config-router)#router eigrp 100 

R3(config-router)#redistribute ospf 1 metric 10000 100 255 1 1500 

Finally you should try to “show ip route” to see the 172.16.100.1 network (the network behind R4) 

in the routing table of R1 and make a ping from R1 to this network. 

Note: If the link between R2 and R3 is FastEthernet link, we must put the command below under 

EIGRP process to make traffic from R1 to go through R3 (R1 -> R2 -> R3 -> R4), which is better 

than R1 -> R2 -> R4. 

R2(config-router)# distance eigrp 90 105 

This command sets the Administrative Distance of all EIGRP internal routes to 90 and all EIGRP external routes to 105, which is smaller than the Administrative Distance of OSPF (110) -> the link between R2 & R3 will be preferred to the serial link between R2 & R4. Note: The actual OPSF and EIGRP process numbers may change in the actual exam so be sure to use the actual correct values, but the overall solution is the same. 


Q45. Refer to the exhibit. Which statement about the command output is true? 

A. The router exports flow information to 10.10.10.1 on UDP port 5127. 

B. The router receives flow information from 10.10.10.2 on UDP port 5127. 

C. The router exports flow information to 10.10.10.1 on TCP port 5127. 

D. The router receives flow information from 10.10.10.2 on TCP port 5127. 

Answer:

Explanation: 


Q46. Refer to the exhibit. The network setup is running the RIP routing protocol. Which two events will occur following link failure between R2 and R3? (Choose two.) 

A. R2 will advertise network 192.168.2.0/27 with a hop count of 16 to R1. 

B. R2 will not send any advertisements and will remove route 192.168.2.0/27 from its routing table. 

C. R1 will reply to R2 with the advertisement for network 192.168.2.0/27 with a hop count of 16. 

D. After communication fails and after the hold-down timer expires, R1 will remove the 192.168.2.0/27 route from its routing table. 

E. R3 will not accept any further updates from R2, due to the split-horizon loop prevention mechanism. 

Answer: A,C 

Explanation: 


Q47. What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish? 

router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log 

router (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log 

router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log 

router (config)#access-list 101 permit ip any any 

router (config)#interface fastEthernet 1/0 

router (config-if)#ip access-group 101 in 

A. It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts. 

B. It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet. 

C. It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts. 

D. It prevents private internal addresses to be accessed directly from outside. 

Answer:

Explanation: 

The private IP address ranges defined in RFC 1918 are as follows:

10.0.0.0 - 10.255.255.255

172.16.0.0 - 172.31.255.255

192.168.0.0 - 192.168.255.255 

These IP addresses should never be allowed from external networks into a

corporate network as they would only be able to reach the network from the outside via routing problems or

if the IP addresses were spoofed. This ACL is used to prevent all packets with a spoofed reserved private

source IP address to enter the network. The log keyword also enables logging of this intrusion attempt.


Q48. A network engineer is notified that several employees are experiencing network performance related issues, and bandwidth-intensive applications are identified as the root cause. In order to identify which specific type of traffic is causing this slowness, information such as the source/destination IP and Layer 4 port numbers is required. Which feature should the engineer use to gather the required information? 

A. SNMP 

B. Cisco IOS EEM 

C. NetFlow 

D. Syslog 

E. WCCP 

Answer:

Explanation: 

NetFlow Flows Key Fields

A network flow is identified as a unidirectional stream of packets between a given source and destination--

both are defined by a network-layer IP address and

transport-layer source and destination port numbers. Specifically, a flow is identified as the combination of

the following key fields:

Source IP address

Destination IP address

Source Layer 4 port number

Destination Layer 4 port number

Layer 3 protocol type

Type of service (ToS)

Input logical interface Reference: http://www.cisco.com/en/US/docs/ios-xml/ios/netflow/configuration/12-4t/

cfg-nflow- data-expt.html


Q49. Which parameter in an SNMPv3 configuration offers authentication and encryption? 

A. auth 

B. noauth 

C. priv 

D. secret 

Answer:

Explanation: 


Q50. A network engineer executes the “ipv6 flowset” command. What is the result? 

A. Flow-label marking in 1280-byte or larger packets is enabled. 

B. Flow-set marking in 1280-byte or larger packets is enabled. 

C. IPv6 PMTU is enabled on the router. 

D. IPv6 flow control is enabled on the router. 

Answer:

Explanation: 

Enabling Flow-Label Marking in Packets that Originate from the Device This feature allows the device to

track destinations to which the device has sent packets that

are 1280 bytes or larger.

SUMMARY STEPS

1.enable

2.configure terminal

3.ipv6 flowset

4.exit

5.clear ipv6 mtu

DETAILED STEPS

Command or Action Purpose

Step 1 enable Enables privileged EXEC mode.

Enter your password if prompted.

Example:

Device> enable

Step 2 configure terminal Enters global configuration mode.

Example:

Device# configure

terminal

Step 3 ipv6 flowset Configures flow-label marking in 1280-byte or larger packets sent by the device.

Example:

Device# configure

terminal

Step 3 ipv6 flowset Configures flow-label marking in 1280-byte or larger packets sent by the device.

Example:

Device(config)# ipv6

flowset

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/15- mt/ip6b-15-mtbook/ip6-mtu-path-disc.html