[Free] 2018(Aug) Ensurepass Cisco 300-101 Dumps with VCE and PDF 131-140

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 300-101
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco IP Routing

Question No: 131 – (Topic 6)

When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication?

  1. username

  2. password

  3. community-string

  4. encryption-key

Answer: A

Question No: 132 – (Topic 6)

Which option is a prerequisite for stateful NAT64?

  1. IPsec for IPv6

  2. DNS64

  3. application level gateway

  4. ICMP64

Answer: B

Question No: 133 – (Topic 6)

Which two statements about NetFlow templates are true? (Choose two)

  1. Only NetFlow version 9 is template based.

  2. NetFlow Version 5 and version 9 are template based.

  3. Only NetFlow version 5 is template based.

  4. Template can increased bandwidth usage

  5. They can increase overall performance.

  6. They can reduce bandwidth usage.

Answer: A,D Explanation:

https://www.cisco.com/en/US/technologies/tk648/tk362/technologies_white_paper09186a0 0800a3db9.html

Question No: 134 – (Topic 6)

Which two addresses types are included in NAT?

  1. inside global

  2. global outside

  3. outside internet

  4. inside internet

  5. outside local

Answer: A,E

Question No: 135 – (Topic 6)

Which two options are limitations of stateful NAT64? (Choose two)

  1. It is unable to route VRF traffic.

  2. IT is unable to route multicast traffic.

  3. It supports FTP traffic only with an ALG.

  4. It supports DNS64 only.

  5. Layer 4 supports TCP only

Answer: B,E

Question No: 136 – (Topic 6)

Which three statements about SNMP are true? (Choose Three)

  1. The manager configures and send traps to the agent.

  2. The manager sends GET and SET messages.

  3. SNMPv3 supports authentication and encryption.

  4. The manager polls the agent using UDP port 161

  5. The MIB database can be altered only by the SNMP agent.

  6. The agent is the monitoring device.

Answer: C,D,F

Question No: 137 – (Topic 6)

Refer to exhibit.

Ensurepass 2018 PDF and VCE

A user calls from another branch office with a request to establish a simple VPN tunel to test a new router’s tunneling capability Based on the configuration in the exhibit, which type of tunnel was configured?

  1. PPTP

  2. IPsec site-to-site

  3. 6to4

  4. EZVPN

Answer: B

Question No: 138 – (Topic 6)

An EUI-64 bit address is formed by adding a reserved 16-bit value in which position of the Mac address?

  1. between the vendor OID and the NIC-specific part of the MAC address.

  2. after the NIC-specific part of the MAC address.

  3. before the vendor OID part of the MAC address.

  4. anywhere in the Mac address, because the value that is added is reserved.

Answer: A

Question No: 139 – (Topic 6)

A network engineer needs to verify IP SLA operations on an interface that shows an indication of excessive traffic. Which action use to complete this action?

  1. show track

  2. show frequency

  3. show reachability

  4. show threshold

Answer: A

Question No: 140 – (Topic 6)

When policy-based routing (PBR) is being configured,

Ensurepass 2018 PDF and VCE

Which three criteria can the set command specify? (Choose three.)

  1. all interfaces through which the packets can be routed

  2. all interfaces in the path toward the destination

  3. adjacent next hop router in the path toward the destination

  4. all routers in the path toward the destination

  5. all networks in the path toward the destination

  6. type of service and precedence in the IP packets

Answer: A,C,F Explanation:

Configuring Policy-Based Routing (PBR):

You can configure PBR by following these steps. Some of the steps may be omitted depending on your application for PBR. For this example, note the set condition options listed is step 3 (answers are bolded).

Step1

Define and configure the route map needed for the policy. This is accomplished with the route-map command, as discussed previously.

Step2

Define and configure the match statements the route map will use. The most common match statements used are the following:

match ip address [access-list number]

The match ip address is used to call a standard, extended, or expanded-range ACL. match length [min_packet_length_0-2147483647] [max_packet_length_0-2147483647]

The match length is used to match the Layer 3 packet length, in bytes, with all associated headers and trailers included. You must enter the minimum and maximum packet length. Use the match length command to policy route traffic based on packet size. You can deploy this to route traffic with large or small packet sizes to specific areas of the network. Step3

Configure and define the new routing policy with set commands. Multiple set commands may be used; if multiple commands are used, they are executed in the following order:

set ip {precedence [value_0-7 | name] | tos [value_0-8 | name]} set ip next-hop ip_address

set interface interface_name

set ip default next-hop ip_address set default interface interface_name

Set ip precedence {[1-7]|[routine|critical|flash|flash- override|immediate|internet|network|priority]}

100% Ensurepass Free Download!
300-101 PDF
100% Ensurepass Free Guaranteed!
300-101 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No