Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

300-410 Premium Exam Questions

Page: 14 / 46
Total 615 questions

Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) Questions and Answers

Question 53

Refer to the exhibit.

After a security audit, the administrator implemented an ACL in the route reflector. The RR became unreachable from any router in the network. Which two actions resolve the issue? (Choose two.)

Options:

A.

Enable the ND proxy feature on the default gateway.

B.

Configure a link-local address on the Ethernet0/1 interface.

C.

Permit ICMPv6 neighbor discovery traffic in the ACL.

D.

Remove the ACL entry 80.

E.

Change the next hop of the default route to the link-local address of the default gateway.

Question 54

What is a function of the IPv6 DHCP Guard feature for DHCP messages?

Options:

A.

Only access lists are supported for matching traffic.

B.

All client messages are always switched regardless of the device role.

C.

It blocks only DHCP request messages.

D.

If the device is configured as a DHCP server, no message is switched.

Question 55

Refer to the exhibit.

The network engineer configured the summarization of the RIP routes into the OSPF domain on R5 but

still sees four different 172.16.0.0/24 networks on R4. Which action resolves the issue?

Options:

A.

R5(config)#router ospf 1R5(config-router)#no areaR5(config-router)#summary-address 172.16.0.0 255.255.252.0

B.

R4(config)#router ospf 99R4(config-router)#network 172.16.0.0 0.255.255.255 area 56R4(config-router)#area 56 range 172.16.0.0 255,255.255.0

C.

R4(config)#router ospf 1R4(config-router)#no areaR4(config-router)#summary-address 172.16.0.0 255.255.252.0

D.

R5(config)#router ospf 99R5(config-router)#network 172.16.0.0 0.255.255.255 area 56R5(config-router)#area 56 range 172.16.0.0 255.255.255.0

Question 56

What are two characteristics of IPv6 Source Guard? (Choose two.)

Options:

A.

requires IPv6 snooping on Layer 2 access or trunk ports

B.

used in service provider deployments to protect DDoS attacks

C.

requires the user to configure a static binding

D.

requires that validate prefix be enabled

E.

recovers missing binding table entries

Page: 14 / 46
Total 615 questions