Verified of 300-101 free exam materials and braindumps for Cisco certification for consumer, Real Success Guaranteed with Updated 300-101 pdf dumps vce Materials. 100% PASS Implementing Cisco IP Routing exam Today!

2016 Oct 300-101 pdf download:

Q51. A network engineer executes the “ipv6 flowset” command. What is the result? 

A. Flow-label marking in 1280-byte or larger packets is enabled. 

B. Flow-set marking in 1280-byte or larger packets is enabled. 

C. IPv6 PMTU is enabled on the router. 

D. IPv6 flow control is enabled on the router. 

Answer:

Explanation: 

Enabling Flow-Label Marking in Packets that Originate from the Device This feature allows the device to

track destinations to which the device has sent packets that

are 1280 bytes or larger.

SUMMARY STEPS

1.enable

2.configure terminal

3.ipv6 flowset

4.exit

5.clear ipv6 mtu

DETAILED STEPS

Command or Action Purpose

Step 1 enable Enables privileged EXEC mode.

Enter your password if prompted.

Example:

Device> enable

Step 2 configure terminal Enters global configuration mode.

Example:

Device# configure

terminal

Step 3 ipv6 flowset Configures flow-label marking in 1280-byte or larger packets sent by the device.

Example:

Device# configure

terminal

Step 3 ipv6 flowset Configures flow-label marking in 1280-byte or larger packets sent by the device.

Example:

Device(config)# ipv6

flowset

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/15- mt/ip6b-15-mtbook/ip6-mtu-path-disc.html


Q52. Which type of BGP AS number is 64591? 

A. a private AS number 

B. a public AS number 

C. a private 4-byte AS number 

D. a public 4-byte AS number 

Answer:

Explanation: 


Q53. CORRECT TEXT 

ROUTE.com is a small IT corporation that has an existing enterprise network that is running IPv6 0SPFv3. Currently OSPF is configured on all routers. However, R4's loopback address (FEC0:4:4) cannot be seen in R1's IPv6 routing table. You are tasked with identifying the cause of this fault and implementing the needed corrective actions that uses OPSF features and does not change the current area assignments. You will know that you have corrected the fault when R4's loopback address (FEC0:4:4) can be seen in RTs IPv6 routing table. 

Special Note: To gain the maximum number of points you must remove all incorrect or unneeded configuration statements related to this issue. 

Answer: Here is the solution below: 

Explanation: 

To troubleshoot the problem, first issue the show running-config on all of 4 routers. Pay more attention to the outputs of routers R2 and R3 The output of the "show running-config" command of R2: 

The output of the "show running-config" command of R3: 

We knew that all areas in an Open Shortest Path First (OSPF) autonomous system must be physically connected to the backbone area (Area 0). In some cases, where this is not possible, we can use a virtual link to connect to the backbone through a non-backbone area. The area through which you configure the virtual link is known as a transit area. In this case, the area 11 will become the transit area. Therefore, routers R2 and R3 must be configured with the area <area id> virtual-link <neighbor router-id>command. + Configure virtual link on R2 (from the first output above, we learned that the OSPF process ID of R2 is 1): 

R2>enable 

R2#configure terminal 

R2(config)#ipv6 router ospf 1 

R2(config-rtr)#area 11 virtual-link 3.3.3.3 

Save the configuration: 

R2(config-rtr)#end 

R2#copy running-config startup-config 

(Notice that we have to use neighbor router-id 3.3.3.3, not R2's router-id 2.2.2.2) + Configure virtual link on R3 (from the second output above, we learned that the OSPF process ID of R3 is 1 and we have to disable the wrong configuration of "area 54 virtual-link 4.4.4.4"): 

R3>enable 

R3#configure terminal 

R3(config)#ipv6 router ospf 1 

R3(config-rtr)#no area 54 virtual-link 4.4.4.4 

R3(config-rtr)#area 11 virtual-link 2.2.2.2 

Save the configuration: 

R3(config-rtr)#end 

R3#copy running-config startup-config 

You should check the configuration of R4, too. Make sure to remove the incorrect configuration statements to get the full points. 

R4(config)#ipv6 router ospf 1 

R4(config-router)#no area 54 virtual-link 3.3.3.3 

R4(config-router)#end 

After finishing the configuration doesn’t forget to ping between R1 and R4 to make sure they work. 

Note. If you want to check the routing information, use the show ipv6 route command, not "show ip route". 


Q54. Scenario: 

You have been asked to evaluate an OSPF network setup in a test lab and to answer questions a customer has about its operation. The customer has disabled your access to the show running-config command. 

How many times was SPF algorithm executed on R4 for Area 1? 

A. 1 

B. 5 

C. 9 

D. 20 

E. 54 

F. 224 

Answer:

Explanation: 


Q55. A network engineer is configuring a routed interface to forward broadcasts of UDP 69, 53, and 49 to 172.20.14.225. Which command should be applied to the configuration to allow this? 

A. router(config-if)#ip helper-address 172.20.14.225 

B. router(config-if)#udp helper-address 172.20.14.225 

C. router(config-if)#ip udp helper-address 172.20.14.225 

D. router(config-if)#ip helper-address 172.20.14.225 69 53 49 

Answer:

Explanation: 

To let a router forward broadcast packet the command ip helper-address can be used. The broadcasts will

be forwarded to the unicast address which is specified with the ip helper command.

ip helper-address {ip address}

When configuring the ip helper-address command, the following broadcast packets will be forwarded by

the router by default:

TFTP - UDP port 69

Domain Name System (DNS) UDP port 53

Time service - port 37

NetBIOS Name Server - port 137

NetBIOS Datagram Server - port 138

Bootstrap Protocol (BOOTP) - port 67

TACACS UDP port 49 Reference: http://www.cisco-faq.com/163/forward_udp_broadcas.html

Topic 6, Infrastructure Services 

61. A network engineer is configuring SNMP on network devices to utilize one-way SNMP notifications. However, the engineer is not concerned with authentication or encryption. Which command satisfies the requirements of this scenario? 

A. router(config)#snmp-server host 172.16.201.28 traps version 2c CISCORO 

B. router(config)#snmp-server host 172.16.201.28 informs version 2c CISCORO 

C. router(config)#snmp-server host 172.16.201.28 traps version 3 auth CISCORO 

D. router(config)#snmp-server host 172.16.201.28 informs version 3 auth CISCORO 

Answer:

Explanation: 

Most network admins and engineers are familiar with SNMPv2c which has become the

dominant SNMP version of the past decade. It's simple to configure on both the router/switch-side and just

as easy on the network monitoring server. The problem of course is that the SNMP statistical payload is

not encrypted and authentication is passed in cleartext. Most companies have decided that the information

being transmitted isn't valuable enough to be worth the extra effort in upgrading to SNMPv3, but I would

suggest otherwise. Like IPv4 to IPv6, there are some major changes under the hood. SNMP version 2

uses community strings (think cleartext passwords, no encryption) to authenticate polling and trap delivery.

SNMP version 3 moves away from the community string approach in favor of user- based authentication

and view-based access control. The users are not actual local user accounts, rather they are simply a

means to determine who can authenticate to the device. The view is used to define what the user account

may access on the IOS device. Finally, each user is added to a group, which determines the access policy

for its users. Users, groups, views. Reference: http://www.ccnpguide.com/snmp-version-3/


Up to date 300-101 price:

Q56. Refer to the exhibit. When summarizing these routes, which route is the summarized route? 

A. OI 2001:DB8::/48 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

B. OI 2001:DB8::/24 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

C. OI 2001:DB8::/32 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

D. OI 2001:DB8::/64 [110/100] via FE80::A8BB:CCFF:FE00:6F00, Ethernet0/0 

Answer:

Explanation: 


Q57. To configure SNMPv3 implementation, a network engineer is using the AuthNoPriv security level. What effect does this action have on the SNMP messages? 

A. They become unauthenticated and unencrypted. 

B. They become authenticated and unencrypted. 

C. They become authenticated and encrypted. 

D. They become unauthenticated and encrypted. 

Answer:

Explanation: 


Q58. Which two actions must you perform to enable and use window scaling on a router? (Choose two.) 

A. Execute the command ip tcp window-size 65536. 

B. Set window scaling to be used on the remote host. 

C. Execute the command ip tcp queuemax. 

D. Set TCP options to "enabled" on the remote host. 

E. Execute the command ip tcp adjust-mss. 

Answer: A,B 

Explanation: 

The TCP Window Scaling feature adds support for the Window Scaling option in RFC 1323,

TCP Extensions for High Performance . A larger window size is recommended to improve TCP performance in network paths with large bandwidth-delay product characteristics that are called Long Fat

Networks (LFNs). 

The TCP Window Scaling enhancement provides that support. The window scaling extension in Cisco IOS software expands the definition of the TCP window to 32 bits and then uses a scale factor to carry this 32-bit value in the 16-bit window field of the TCP header. 

The window size can increase to a scale factor of 14. Typical applications use a scale factor of 3 when deployed in LFNs. 

The TCP Window Scaling feature complies with RFC 1323. The larger scalable window size will allow TCP to perform better over LFNs. 

Use the ip tcp window-size command in global configuration mode to configure the TCP window size. In order for this to work, the remote host must also support this feature and its window size must be increased. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/

configuration/12-4t/iap-12- 4t-book/iap-tcp.html#GUID-BD998AC6-F128-47DD-B5F7-B226546D4B08


Q59. A network engineer is investigating the cause of a service disruption on a network segment and executes the debug condition interface fastethernet f0/0 command. In which situation is the debugging output generated? 

A. when packets on the interface are received and the interface is operational 

B. when packets on the interface are received and logging buffered is enabled 

C. when packets on the interface are received and forwarded to a configured syslog server 

D. when packets on the interface are received and the interface is shut down 

Answer:

Explanation: 


Q60. Refer to the following access list. 

access-list 100 permit ip any any log 

After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this? 

A. A packet that matches access-list with the "log" keyword is Cisco Express Forwarding switched. 

B. A packet that matches access-list with the "log" keyword is fast switched. 

C. A packet that matches access-list with the "log" keyword is process switched. 

D. A large amount of IP traffic is being permitted on the router. 

Answer:

Explanation: 

Logging-enabled access control lists (ACLs) provide insight into traffic as it traverses the

network or is dropped by network devices. Unfortunately, ACL logging can be CPU intensive and can

negatively affect other functions of the network device. There are two primary factors that contribute to the

CPU load increase from ACL logging: process switching of packets that match log-enabled access control

entries (ACEs) and the generation and transmission of log messages. Reference: http://www.cisco.com/

web/about/security/intelligence/acl-logging.html#4