♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-101 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/300-101-exam-dumps.html

Q11. The enterprise network WAN link has been receiving several denial of service attacks from both IPv4 and IPv6 sources. Which three elements can you use to identify an IPv6 packet via its header, in order to filter future attacks? (Choose three.) 

A. Traffic Class 

B. Source address 

C. Flow Label 

D. Hop Limit 

E. Destination Address 

F. Fragment Offset 

Answer: A,C,D 

Explanation: 


Q12. You have been asked to evaluate how EIGRP is functioning in a customer network. 

What type of route filtering is occurring on R6 

A. Distribute-list using an ACL 

B. Distribute-list using a prefix-list 

C. Distribute-list using a route-map 

D. An ACL using a distance of 255 

Answer:

Explanation: 


Q13. A network engineer is trying to implement broadcast-based NTP in a network and executes the ntp broadcast client command. Assuming that an NTP server is already set up, what is the result of the command? 

A. It enables receiving NTP broadcasts on the interface where the command was executed. 

B. It enables receiving NTP broadcasts on all interfaces globally. 

C. It enables a device to be an NTP peer to another device. 

D. It enables a device to receive NTP broadcast and unicast packets. 

Answer:

Explanation: 

The NTP service can be activated by entering any ntp command. When you use the ntp broadcast client

command, the NTP service is activated (if it has not already been activated) and the device is configured to receive NTP broadcast packets on a specified interface simultaneously.

Command Description

ntp broadcast Allows the system to receive NTP broadcast packets on an client interface.

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bsm/command/bsm-xe-3se-3850- cr-book/

bsm-xe-3se-3850-cr-book_chapter_00.html


Q14. After a recent DoS attack on a network, senior management asks you to implement better logging functionality on all IOS-based devices. Which two actions can you take to provide enhanced logging results? (Choose two.) 

A. Use the msec option to enable service time stamps. 

B. Increase the logging history . 

C. Set the logging severity level to 1. 

D. Specify a logging rate limit. 

E. Disable event logging on all noncritical items. 

Answer: A,B 

Explanation: 

The optional msec keyword specifies the date/time format should include milliseconds. This can aid in

pinpointing the exact time of events, or to correlate the order that the events happened. To limit syslog messages sent to the router's history table and to an SNMP network management station based on severity, use the logging history command in global configuration mode. By default, Cisco devices Log error messages of severity levels 0 through 4 (emergency, alert, critical, error, and warning levels); in other words, "saving level warnings or higher." By increasing the severity level, more granular monitoring can occur, and SNMP messages will be sent by the less sever (5-7) messages.


Q15. A network engineer initiates the ip sla responder tcp-connect command in order to gather statistics for performance gauging. Which type of statistics does the engineer see? 

A. connectionless-oriented 

B. service-oriented 

C. connection-oriented 

D. application-oriented 

Answer:

Explanation: 

Configuration Examples for IP SLAs TCP Connect Operations The following example shows

how to configure a TCP Connection-oriented operation from Device B to the Telnet port (TCP port 23) of IP

Host 1 (IP address 10.0.0.1), as shown in the "TCP Connect Operation" figure in the "Information About

the IP SLAs TCP Connect Operation" section. The operation is scheduled to start immediately. In this

example, the control protocol is disabled on the source (Device B). IP SLAs uses the control protocol to

notify the IP SLAs responder to enable the target port temporarily. This action allows the responder to reply

to the TCP Connect operation. In this example, because the target is not a Cisco device and a well- known

TCP port is used, there is no need to send the control message. Device A (target device) Configuration

configure terminal ip sla responder tcp-connect ipaddress 10.0.0.1 port 23 

Reference: http://

www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipsla/configuration/15-mt/sla-15- mt-book/ sla_tcp_conn.html


Q16. Which technology was originally developed for routers to handle fragmentation in the path between end points? 

A. PMTUD 

B. MSS 

C. windowing 

D. TCP 

E. global synchronization 

Answer:

Explanation: 


Q17. Refer to the exhibit. When summarizing these routes, which route is the summarized route? 

A. OI 2001:DB8::/48 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

B. OI 2001:DB8::/24 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

C. OI 2001:DB8::/32 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

D. OI 2001:DB8::/64 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

Answer:

Explanation: 


Q18. A network administrator uses IP SLA to measure UDP performance and notices that packets on one router have a higher one-way delay compared to the opposite direction. Which UDP characteristic does this scenario describe? 

A. latency 

B. starvation 

C. connectionless communication 

D. nonsequencing unordered packets 

E. jitter 

Answer:

Explanation: 

Cisco IOS IP SLAs provides a proactive notification feature with an SNMP trap. Each measurement

operation can monitor against a pre-set performance threshold.

Cisco IOS IP SLAs generates an SNMP trap to alert management applications if this threshold is crossed.

Several SNMP traps are available: round trip time, average jitter, one-way latency, jitter, packet loss, MOS, and connectivity tests.

Here is a partial sample output from the IP SLA statistics that can be seen:

router#show ip sla statistics 1

Round Trip Time (RTT) for Index 55

Latest RTT: 1 ms

Latest operation start time: *23:43:31.845 UTC Thu Feb 3 2005 Latest operation return code: OK

RTT Values:

Number Of RTT: 10 RTT Min/Avg/Max: 1/1/1 milliseconds Latency one-way time:

Number of Latency one-way Samples: 0

Source to Destination Latency one way Min/Avg/Max: 0/0/0 milliseconds Destination to Source Latency

one way Min/Avg/Max: 0/0/0 milliseconds 

Reference:

http://www.cisco.com/en/US/technologies/tk648/tk362/tk920/technologies_white_paper09186a0

0802d5efe.html


Q19. Which NetFlow component is applied to an interface and collects information about flows? 

A. flow monitor 

B. flow exporter 

C. flow sampler 

D. flow collector 

Answer:

Explanation: 

Flow monitors are the NetFlow component that is applied to interfaces to perform network

traffic monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor

after you create the flow monitor. The flow monitor cache is automatically created at the time the flow

monitor is applied to the first interface. Flow data is collected from the network traffic during the monitoring

process based on the key and nonkey fields in the record, which is configured for the flow monitor and

stored in the flow monitor cache. Reference: http://www.cisco.com/c/en/us/td/docs/ios/fnetflow/command/

reference/fnf_book/fnf_01.html#w p1314030


Q20. What is a function of NPTv6? 

A. It interferes with encryption of the full IP payload. 

B. It maintains a per-node state. 

C. It is checksum-neutral. 

D. It rewrites transport layer headers. 

Answer:

Explanation: 

RFC 6296 describes a stateless IPv6-to-IPv6 Network Prefix Translation (NPTv6) function,

designed to provide address independence to the edge network. It is transport-agnostic with respect to

transports that do not checksum the IP header, such as SCTP, and to transports that use the TCP/UDP/

DCCP (Datagram Congestion Control Protocol) pseudo-header and checksum NPTv6 provides a simple

and compelling solution to meet the address-independence requirement in IPv6. The addressindependence

benefit stems directly from the translation function of the network prefix translator. To avoid

as many of the issues associated with NAPT44 as possible, NPTv6 is defined to include a two-way,

checksum-neutral, algorithmic translation function, and nothing else. Reference: http://tools.ietf.org/html/

rfc6296