300-101 | The Up to date Guide To 300-101 exam


P.S. Downloadable 300-101 preparation labs are available on Google Drive, GET MORE: https://drive.google.com/open?id=1g3xBE0KhVLL-l1SXbBZMbJhQ4SK2THNQ


New Cisco 300-101 Exam Dumps Collection (Question 5 - Question 14)

Question No: 5

Which traffic does the following configuration allow?

ipv6 access-list cisco

permit ipv6 host 2001:DB8:0:4::32 any eq ssh line vty 0 4

ipv6 access-class cisco in

A. all traffic to vty 0 4 from source 2001:DB8:0:4::32

B. only ssh traffic to vty 0 4 from source all

C. only ssh traffic to vty 0 4 from source 2001:DB8:0:4::32

D. all traffic to vty 0 4 from source all

Answer: C

Question No: 6

Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in the Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet-directed traffic?

A. By not enabling NAT on the IPsec tunnel interface

B. By not enabling NAT on the GRE tunnel interface

C. By configuring the NAT-referenced ACL to not permit the Enterprise traffic

D. By asking the ISP to perform NAT in the cloud

Answer: C

Explanation:

The NAT configuration acts only on packets permitted by a referenced ACL. As a result, the ACL can permit packets destined for the Internet, performing NAT on those packets. The ACL also denies packets going to the Enterprise, meaning that the router does not apply NAT to those packets.

New Questions

190.Which action can you take to mitigate unicast flooding in a network?

A. Configure VLANs to span multiple access-layer switches.

B. Implement a nonlooped network topology.

C. Set the ARP timer value to less than the CAM timer value.

D. Set the CAM timer value to less than the ARP timer value.

Answer: C

Question No: 7

Based on the configuration command below, which statement is true? Router(config)#service timestamps log datetime msec

A. All IOS services will indicate the date and time when the service was started.

B. All syslog messages that are generated will indicate the date and time when the event occurred.

C. All IOS services will indicate the date and time when the service was last used.

D. All high-priority syslog messages that are generated will indicate the date and time when the event occurred.

Answer: B

Question No: 8

For security purposes, an IPv6 traffic filter was configured under various interfaces on the local router. However, shortly after implementing the traffic filter, OSPFv3 neighbor adjacencies were lost. What caused this issue?

A. The traffic filter is blocking all ICMPv6 traffic.

B. The global anycast address must be added to the traffic filter to allow OSPFv3 to work properly.

C. The link-local addresses that were used by OSPFv3 were explicitly denied, which caused the neighbor relationships to fail.

D. IPv6 traffic filtering can be implemented only on SVIs.

Answer: C

Question No: 9

An EUI-64 bit address is formed by inserting which 16-bit value into the MAC address of a device?

A. 3FFE

B. FFFE

C. FF02

D. 2001

Answer: B

Question No: 10

What is the benefit of deploying IPv6 in a campus network using dual stack mode?

A. Dual Stack Mode takes advantage of IPv6 over IPv4 tunnel within a network.

B. IPv4 and IPv6 run alongside one another and have no dependency on each other to function

C. IPv4 and IPv6 share network resources.

D. IPv6 can depend on existing IPv4 routing, QoS, security, and multicast policies.

Answer: B

Explanation:

Deploying IPv6 in the campus using the dual-stack model offers several advantages over the hybrid and service block models. The primary advantage of a dual stack model is that it does not require tunneling within the campus network. The dual stack model runs the two protocols as ships in the night, meaning that IPv4 and IPv6 run alongside one another and have no dependency on each other to function except that they share network resources. Both have independent routing.

Question No: 11

If you want to migrate to IS-IS network to another routing protocol with?

A. UDP

B. EIGRP

C. OSPF

D. RIP

E. internal BGP

F. TCP/IP

Answer: B,C

Question No: 12

Which technology is required on an EVN trunk interface?

A. 802.1q

B. NAT

C. VRF-Lite

D. IS-IS

Answer: A

Question No: 13

Refer to the exhibit.

Which statement about the output of the show flow-sampler command is true?

A. The sampler matched 10 packets, each packet randomly chosen from every group of 100 packets.

B. The sampler matched 10 packets, one packet every 100 packets.

C. The sampler matched 10 packets, each one randomly chosen from every 100-second interval.

D. The sampler matched 10 packets, one packet every 100 seconds.

Answer: A

Question No: 14

What is the function of the snmp-server enable traps and snmp-server host 192.168.1.3 trap version 1c public commands?

A. to allow only 192.168.1.3 to access the system using the community-string public.

B. to collect information about the system on a network management server.

C. to disable all SNMP informs that are on the system

D. to allow private communications between the router and the host.

Answer: A

Recommend!! Get the Downloadable 300-101 dumps in VCE and PDF From Thedumpscentre, Welcome to download: http://www.thedumpscentre.com/300-101-dumps/ (New 487 Q&As Version)