Among the finest alternatives for they may be the 300-101 official certifications training course with the Cisco. Cisco official certifications courses are among the list of top official certifications classes that are sent on the individuals all over the world identified incredible importance inside mindset of the people whos talking to you actually. This can be mostly because they generate prospects the people today to whom they think will be able to help condition of their providers by inventing new stuff and also they think which at the very least the particular choice must have a few fretting hand with experience with the respected field.

2021 Nov ccnp route dumps 300-101:

Q31. CORRECT TEXT [SIMULATION] 

Route.com is a small IT corporation that is attempting to implement the network shown in the exhibit. Currently the implementation is partially completed. OSPF has been configured on routers Chicago and NewYork. The SO/O interface on Chicago and the SO/1 interface on NewYork are in Area 0. The loopbackO interface on NewYork is in Area 1. However, they cannot ping from the serial interface of the Seattle router to the loopback interface of the NewYork router. You have been asked to complete the implementation to allow this ping. 

ROUTE.com's corporate implementation guidelines require: 

. The OSPF process ID for all routers must be 10. 

. The routing protocol for each interface must be enabled under the routing process. 

. The routing protocol must be enabled for each interface using the most specific wildcard mask possible. 

.The serial link between Seattle and Chicago must be in OSPF area 21. 

.OSPF area 21 must not receive any inter-area or external routes. 

Network Information 

Seattle 

S0/0 192.168.16.5/30 - Link between Seattle and Chicago 

Secret Password: cisco 

Chicago 

S0/0 192.168.54.9/30 - Link between Chicago and NewYork 

S0/1 192.168.16.6/30 - Link between Seattle and Chicago Secre Password: cisco 

NewYork 

S0/1 192.168.54.10/30 - Link between Chicago and NewYork 

Loopback0 172.16.189.189 

Secret Password: cisco 

Answer: Here is the solution below: 

Explanation: 

Note: In actual exam, the IP addressing, OSPF areas and process ID, and router hostnames may change, but the overall solution is the same. 

Seattle’s S0/0 IP Address is 192.168.16.5/30. So, we need to find the network address and wildcard mask of 192.168.16.5/30 in order to configure the OSPF. 

IP Address: 192.168.16.5 /30 

Subnet Mask: 255.255.255.252 

Here subtract 252 from 2565, 256-252 = 4, hence the subnets will increment by 4. 

First, find the 4th octet of the Network Address: 

The 4th octet of IP address (192.168.16.5) belongs to subnet 1 (4 to 7). 

Network Address: 192.168.16.4 

Broadcast Address: 192.168.16.7 

Lets find the wildcard mask of /30. 

Subnet Mask: (Network Bits – 1’s, Host Bits – 0’s) 

Lets find the wildcard mask of /30: 

Now we configure OSPF using process ID 10 (note the process ID may change to something else in real exam). 

Seattle>enable 

Password: cisco

Seattle#conf t 

Seattle(config)#router ospf 10 

Seattle(config-router)#network 192.168.16.4 0.0.0.3 area 21 

One of the tasks states that area 21 should not receive any external or inter-area routes (except 

the default route). 

Seattle(config-router)#area 21 stub 

Seattle(config-router)#end 

Seattle#copy run start 

Chicago Configuration: 

Chicago>enable 

Password: cisco 

Chicago#conf t 

Chicago(config)#router ospf 10 

We need to add Chicago’s S0/1 interface to Area 21 

Chicago(config-router)#network 192.168.16.4 0.0.0.3 area 21 

Again, area 21 should not receive any external or inter-area routes (except the default route). 

In order to accomplish this, we must stop LSA Type 5 if we don’t want to send external routes. And 

if we don’t want to send inter-area routes, we have to stop LSA Type 3 and Type 4. Therefore we 

want to configure area 21 as a totally stubby area. 

Chicago(config-router)#area 21 stub no-summary 

Chicago(config-router)#end 

Chicago#copy run start 

The other interface on the Chicago router is already configured correctly in this scenario, as well 

as the New York router so there is nothing that needs to be done on that router. 


Q32. You have been asked to evaluate how EIGRP is functioning in a customer network. 

Traffic from R1 to R61 s Loopback address is load shared between R1-R2-R4-R6 and R1-R3-R5-R6 paths. What is the ratio of traffic over each path? 

A. 1:1 

B. 1:5 

C. 6:8 

D. 19:80 

Answer:

Explanation: 


Q33. A network engineer has left a NetFlow capture enabled over the weekend to gather information regarding excessive bandwidth utilization. The following command is entered: 

switch#show flow exporter Flow_Exporter-1 What is the expected output? 

A. configuration of the specified flow exporter 

B. current status of the specified flow exporter 

C. status and statistics of the specified flow monitor 

D. configuration of the specified flow monitor 

Answer:

Explanation: 

show flow exporter exporter-name (Optional) Displays the current status of the specified flow exporter.

Example:

Device# show flow exporter

FLOW_EXPORTER-1

Reference: http://www.cisco.com/en/US/docs/ios-xml/ios/fnetflow/configuration/15-mt/cfg-de- fnflowexprts.

html


Q34. IPv6 has just been deployed to all of the hosts within a network, but not to the servers. Which feature allows IPv6 devices to communicate with IPv4 servers? 

A. NAT 

B. NATng 

C. NAT64 

D. dual-stack NAT 

E. DNS64 

Answer:

Explanation: 

NAT64 is a mechanism to allow IPv6 hosts to communicate with IPv4 servers. The NAT64 server is the

endpoint for at least one IPv4 address and an IPv6 network segment of 32-bits (for instance 64:ff9b::/96, see RFC 6052, RFC 6146). The IPv6 client embeds the IPv4 address it wishes to communicate with using these bits, and sends its packets to the resulting address. The NAT64 server then creates a NAT-mapping between the IPv6 and the IPv4 address, allowing them to communicate.

Reference: http://en.wikipedia.org/wiki/NAT64


Q35. Scenario: 

You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has disabled your access to the show running-config command. 

Areas of Router 5 and 6 are not normal areas, inspect their routing tables and determine which statement is true? 

A. R5's Loopback and R6's Loopback are both present in R5's Routing table 

B. R5's Loopback and R6's Loopback are both present in R6's Routing table 

C. Only R5's loopback is present in R5's Routing table 

D. Only R6's loopback is present in R5's Routing table 

E. Only R5's loopback is present in R6's Routing table 

Answer:

Explanation: 

Topic 4, VPN Technologies 

45. A company has just opened two remote branch offices that need to be connected to the corporate network. Which interface configuration output can be applied to the corporate router to allow communication to the remote sites? 

A. interface Tunnel0 

bandwidth 1536 

ip address 209.165.200.230 255.255.255.224 

tunnel source Serial0/0 

tunnel mode gre multipoint 

B. interface fa0/0 

bandwidth 1536 

ip address 209.165.200.230 255.255.255.224 

tunnel mode gre multipoint 

C. interface Tunnel0 

bandwidth 1536 

ip address 209.165.200.231 255.255.255.224 

tunnel source 209.165.201.1 

tunnel-mode dynamic 

D. interface fa 0/0 

bandwidth 1536 

ip address 209.165.200.231 255.255.255.224 

tunnel source 192.168.161.2 

tunnel destination 209.165.201.1 

tunnel-mode dynamic 

Answer:

Explanation: 

The configuration of mGRE allows a tunnel to have multiple destinations. The configuration of

mGRE on one side of a tunnel does not have any relation to the tunnel properties that might exist tunnel

source Serial0/0 tunnel mode gre multipoint

B. interface fa0/0 bandwidth 1536 ip address 209.165.200.230 255.255.255.224 tunnel mode gre

multipoint

C. interface Tunnel0 bandwidth 1536 ip address 209.165.200.231 255.255.255.224 tunnel source

209.165.201.1 tunnel-mode dynamic

D. interface fa 0/0 bandwidth 1536 ip address 209.165.200.231 255.255.255.224 tunnel source

192.168.161.2 tunnel destination 209.165.201.1 tunnel-mode dynamic

Answer: A Explanation: The configuration of mGRE allows a tunnel to have multiple destinations. The

configuration of mGRE on one side of a tunnel does not have any relation to the tunnel properties that

might exist at the exit points. This means that an mGRE tunnel on the hub may connect to a p2p tunnel on

the branch. Conversely, a p2p GRE tunnel may connect to an mGRE tunnel. The distinguishing feature

between an mGRE interface and a p2p GRE interface is the tunnel destination. An mGRE interface does

not have a configured destination. Instead the GRE tunnel is configured with the command tunnel mode

gre multipoint. This command is used instead of the tunnel destination x.x.x.x found with p2p GRE tunnels.

Besides allowing for multiple destinations, an mGRE tunnel requires NHRP to resolve the tunnel

endpoints. Note, tunnel interfaces by default are point-to-point (p-p) using GRE encapsulation, effectively they have the tunnel mode gre command, which is not seen in the configuration because it is the default.

The mGRE configuration is as follows: ! interface Tunnel0 bandwidth 1536 ip address 10.62.1.10

255.255.255.0 tunnel source Serial0/0 tunnel mode gre multipoint Reference: http://www.cisco.com/c/en/

us/td/docs/solutions/Enterprise/WAN_and_MAN/DMVPDG/DMVP N_2_Phase2.html


Far out ccnp route 300-101 exam questions:

Q36. Two aspects of an IP SLA operation can be tracked: state and reachability. Which statement about state tracking is true? 

A. When tracking state, an OK return code means that the track's state is up; any other return code means that the track's state is down. 

B. When tracking state, an OK or over threshold return code means that the track's state is up; any other return code means that the track's state is down. 

C. When tracking state, an OK return code means that the track's state is down; any other return code means that the track's state is up. 

D. When tracking state, an OK or over threshold return code means that the track's state is down; any other return code means that the track's state is up. 

Answer:

Explanation: 


Q37. For security purposes, an IPv6 traffic filter was configured under various interfaces on the local router. However, shortly after implementing the traffic filter, OSPFv3 neighbor adjacencies were lost. What caused this issue? 

A. The traffic filter is blocking all ICMPv6 traffic. 

B. The global anycast address must be added to the traffic filter to allow OSPFv3 to work properly. 

C. The link-local addresses that were used by OSPFv3 were explicitly denied, which caused the neighbor relationships to fail. 

D. IPv6 traffic filtering can be implemented only on SVIs. 

Answer:

Explanation: 

OSPFv3 uses link-local IPv6 addresses for neighbor discovery and other features, so if any IPv6 traffic

filters are implemented be sure to include the link local address so that it is permitted in the filter list.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx- os/unicast/configuration/

guide/l3_cli_nxos/l3_ospfv3.html


Q38. What is the result of the command ip flow-export destination 10.10.10.1 5858? 

A. It configures the router to export cache flow information to IP 10.10.10.1 on port UDP/5858. 

B. It configures the router to export cache flow information about flows with destination IP 10.10.10.1 and port UDP/5858. 

C. It configures the router to receive cache flow information from IP 10.10.10.1 on port UDP/5858. 

D. It configures the router to receive cache flow information about flows with destination IP 10.10.10.1 and port UDP/5858. 

Answer:

Explanation: 

To enable the exporting of information in NetFlow cache entries, use the ip flow-export destination

command in global configuration mode.

Syntax Description

ip- IP address of the workstation to which you want to send the address NetFlow information.

udp-port UDP protocol-specific port number.

Reference:

http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12s_mdnf.html#wp1023091


Q39. An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters: 

mac address C601.420F.0007 

subnet 2001:DB8:0:1::/64 

Which IPv6 addresses should the engineer add to the documentation? 

A. 2001:DB8:0:1:C601:42FF:FE0F:7 

B. 2001:DB8:0:1:FFFF:C601:420F:7 

C. 2001:DB8:0:1:FE80:C601:420F:7 

D. 2001:DB8:0:1:C601:42FE:800F:7 

Answer:

Explanation: 

Explanation: Extended Unique Identifier (EUI), as per RFC2373, allows a host to assign iteslf a unique 64-

Bit IP Version 6 interface identifier (EUI-64). This feature is a key benefit over IPv4 as it eliminates the

need of manual configuration or DHCP as in the world of IPv4. The IPv6 EUI-64 format address is obtained

through the 48-bit MAC address. The Mac address is first separated into two 24-bits, with one being OUI

(Organizationally Unique Identifier) and the other being NIC specific. The 16-bit 0xFFFE is then inserted

between these two 24-bits to for the 64-bit EUI address. IEEE has chosen FFFE as a reserved value which

can only appear in EUI-64 generated from the EUI-48 MAC address. Here is an example showing how the

Mac Address is used to generate EUI.

Next, the seventh bit from the left, or the universal/local (U/L) bit, needs to be inverted. This bit identifies

whether this interface identifier is universally or locally administered. If 0, the address is locally

administered and if 1, the address is globally unique. It is worth noticing that in the OUI portion, the globally

unique addresses assigned by the IEEE has always been set to 0 whereas the locally created addresses

has 1 configured. Therefore, when the bit is inverted, it maintains its original scope (global unique address

is still global unique and vice versa). The reason for inverting can be found in RFC4291 section 2.5.1.

Reference: https:// supportforums.cisco.com/document/100566/understanding-ipv6-eui-64-bit- address


Q40. A network administrator is troubleshooting a DMVPN setup between the hub and the spoke. Which action should the administrator take before troubleshooting the IPsec configuration? 

A. Verify the GRE tunnels. 

B. Verify ISAKMP. 

C. Verify NHRP. 

D. Verify crypto maps. 

Answer:

Explanation: