getcertified4sure.com

Get Smart with ccnp routing and switching route 300 101 complete video course




Act now and download your Cisco ccnp route 300 101 pdf test today! Do not waste time for the worthless Cisco 300 101 vce tutorials. Download Up to the minute Cisco ROUTE Implementing Cisco IP Routing exam with real questions and answers and begin to learn Cisco route 300 101 with a classic professional.

P.S. Pinpoint 300-101 lab are available on Google Drive, GET MORE: https://drive.google.com/open?id=1lWZpAR5vb8lOApmzhHWMzXffOPhCR-LL


New Cisco 300-101 Exam Dumps Collection (Question 6 - Question 15)

Q6. Refer to the Exhibit.

A network engineer has configured NTP on a Cisco router, but the time on the router is still incorrect. What is the reason for this problem?

A. The router is not syncing with the peer, even though the NTP request and response packets are being exchanged.

B. The router is not syncing with peer, and the NTP request and response packets are not being exchanged.

C. The router is syncing with the peer, and the NTP request and response packets are being exchanged.

D. The router is dropping all NTP packets.

Answer: A



Q7. Into which two types of areas would an area border router (ABR) inject a default route? (Choose two.)

A. stub

B. the autonomous system of an exterior gateway protocol (EGP)

C. NSSA

D. totally stubby

E. the autonomous system of a different interior gateway protocol (IGP)

F. area 0

Answer: A,D

Explanation:

Both stub area & totally stubby area allow an ABR to inject a default route. The main difference between these 2 types of areas is:

+ Stub area replaces LSA Type 5 (External LSA u2013 created by an ASBR to advertise network from another autonomous system) with a default route + Totally stubby area replaces both LSA Type 5 and LSA Type 3 (Summary LSA u2013 created by an ABR to advertise network from other areas, but still within the AS, sometimes called interarea routes) with a default route.

Below summarizes the LSA Types allowed and not allowed in area types:



Q8. A company has just opened two remote branch offices that need to be connected to the corporate network. Which interface configuration output can be applied to the corporate router to allow communication to the remote sites?

A. interface Tunnel0 bandwidth 1536

ip address 209.165.200.230 255.255.255.224

tunnel source Serial0/0 tunnel mode gre multipoint

B. interface fa0/0 bandwidth 1536

ip address 209.165.200.230 255.255.255.224

tunnel mode gre multipoint

C. interface Tunnel0 bandwidth 1536

ip address 209.165.200.231 255.255.255.224

tunnel source 209.165.201.1 tunnel-mode dynamic

D. interface fa 0/0 bandwidth 1536

ip address 209.165.200.231 255.255.255.224

tunnel source 192.168.161.2

tunnel destination 209.165.201.1 tunnel-mode dynamic

Answer: A



Q9. Refer to the exhibit.

R1 and R2 belong to the RIP routing domain that includes the networks 10.20.0.0/16 and 10.21.0.0/16. R3 and R4 are performing two-way route redistribution between OSPF and RIP. A network administrator has discovered that R2 is receiving OSPF routes for the networks 10.20.0.0/16 and 10.21.0.0/16 and a routing loop has occurred.

Which action will correct this problem?

A. Apply an inbound ACL to the R2 serial interface.

B. Change the RIP administrative distance on R3 to 110.

C. Configure distribute-lists on R3 and R4.

D. Set the OSPF default metric to 20.

E. Change the OSPF administrative distance on R3 to 110.

Answer: C

Explanation:

Distribute List is Like an access-list, use to deny or permit the routing update to pass through a router/interface. Distribute List allow you apply an access list to a routing updates.

It can be apply on in or out bond of an interface under a routing process. e.g in fig. R1 want to send a routing update to it neighbor, this update will go through from interface S0/0, router will check, is there some Distribute List apply to this interface. If there is a Distribute List which would contain the allow route to pass through this interface.



Q10. What is the benefit of deploying IPv6 in a campus network using dual stack mode?

A. Dual Stack Mode takes advantage of IPv6 over IPv4 tunnel within a network.

B. IPv4 and IPv6 run alongside one another and have no dependency on each other to function

C. IPv4 and IPv6 share network resources.

D. IPv6 can depend on existing IPv4 routing, QoS, security, and multicast policies.

Answer: B

Explanation:

Deploying IPv6 in the campus using the dual-stack model offers several advantages over the hybrid and service block models. The primary advantage of a dual stack model is that it does not require tunneling within the campus network. The dual stack model runs the two protocols as ships in the night, meaning that IPv4 and IPv6 run alongside one another and have no dependency on each other to function except that they share network resources. Both have independent routing.



Q11. Which statement is true about the PPP Session Phase of PPPoE?

A. PPP options are negotiated and authentication is not performed. Once the link setup is completed, PPPoE functions as a Layer 3 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers.

B. PPP options are not negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 4 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers.

C. PPP options are automatically enabled and authorization is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation method that allows data to be encrypted over the PPP link within PPPoE headers.

D. PPP options are negotiated and authentication is performed. Once the link setup is completed, PPPoE functions as a Layer 2 encapsulation method that allows data to be transferred over the PPP link within PPPoE headers.

Answer: D



Q12. During which DMVPN phase is spoke-to-spoke communication enabled?

A. Phase 1

B. Phase 6

C. Phase 5

D. Phase 2

E. Phase 4

Answer: D



Q13. You have been asked to evaluate how EIGRP is functioning in a customer network.

Which key chain is being used for authentication of EIGRP adjacency between R4 and R2?

A. CISCO

B. EIGRP

C. key

D. MD5

Answer: A

Explanation: R4 and R2 configs are as shown below:

Clearly we see the actual key chain is named CISCO.



Q14. Which two statements about NetFlow version 9 are true?

A. IT supports ingress flows only.

B. It is cisco proprietary technology.

C. It supports ingress and egress flows.

D. It is IETF standards based.

E. IT supports egress flows only.

F. It is IEEE standards based.

Answer: B,C



Q15. What two situations could require the use of multiple routing protocols? (Choose two)

A. when using UNIX host-based routers

B. when smaller broadcast domains are desired

C. because having multiple routing protocols confuses hackers

D. when migrating from an older Interior Gateway Protocol (IGP) to a new IGP

E. when all equipment is manufactured by Cisco

F. when there are multiple paths to destination networks

Answer: A,D

Explanation:

Simple routing protocols work well for simple networks, but networks grow and become more complex. While running a single routing protocol throughout your entire IP internetwork is desirable, multiprotocol routing is common for a number of reasons, including company mergers, multiple departments managed by multiple network administrators, multivendor environments, or simply because the original routing protocol is no longer the best choice. Often, the multiple protocols are redistributed into each other during a migration period from one protocol to the other.



Recommend!! Get the Pinpoint 300-101 dumps in VCE and PDF From Examcollection, Welcome to download: http://www.examcollectionuk.com/300-101-vce-download.html (New 745 Q&As Version)