What Does 300-101 testing engine Mean?


♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-101 Exam Dumps (PDF & VCE):
Available on: http://www.certleader.com/300-101-dumps.html


Testking always provides the most exact and official Cisco Cisco exam dumps. Each of our professionals are focused to providing a person with the higher technical exam questions and answers. Theyve got rich encounter in compiling your Cisco Cisco 300-101 exam demos. Your accomplishment and satisfaction will be our major goal.

2017 Mar 300-101 study guide

Q21. The enterprise network WAN link has been receiving several denial of service attacks from both IPv4 and IPv6 sources. Which three elements can you use to identify an IPv6 packet via its header, in order to filter future attacks? (Choose three.) 

A. Traffic Class 

B. Source address 

C. Flow Label 

D. Hop Limit 

E. Destination Address 

F. Fragment Offset 

Answer: A,C,D 

Explanation: 


Q22. For troubleshooting purposes, which method can you use in combination with the “debug ip packet” command to limit the amount of output data? 

A. You can disable the IP route cache globally. 

B. You can use the KRON scheduler. 

C. You can use an extended access list. 

D. You can use an IOS parser. 

E. You can use the RITE traffic exporter. 

Answer:

Explanation: 

The debug ip packet command generates a substantial amount of output and uses a substantial amount of

system resources. This command should be used with caution in production networks. Always use with the access-list command to apply an extended ACL to the debug output. Reference: http://www.cisco.com/c/en/us/support/docs/security/dynamic-multipoint-vpn-dmvpn/111976-dmvpn-troubleshoot-00.html


Q23. CORRECT TEXT 

You are a network engineer with ROUTE.com, a small IT company. ROUTE.com has two connections to the Internet; one via a frame relay link and one via an EoMPLS link. IT policy requires that all outbound HTTP traffic use the frame relay link when it is available. All other traffic may use either link. No static or default routing is allowed. 

Choose and configure the appropriate path selection feature to accomplish this task. You may use the Test Workstation to generate HTTP traffic to validate your solution. 

Answer: We need to configure policy based routing to send specific traffic along a path that is different from the best path in the routing table. Here are the step by Step Solution for this: 

1) First create the access list that catches the HTTP traffic: R1(config)#access-list 101 permit tcp any any eq www 

2) Configure the route map that sets the next hop address to be ISP1 and permits the rest of the traffic: R1(config)#route-map pbr permit 10 

R1(config-route-map)#match ip address 101 

R1(config-route-map)#set ip next-hop 10.1.100.2 

R1(config-route-map)#exit 

R1(config)#route-map pbr permit 20 

3) Apply the route-map on the interface to the server in the EIGRP Network: 

R1(config-route-map)#exit 

R1(config)#int fa0/1 

R1(config-if)#ip policy route-map pbr 

R1(config-if)#exit 

R1(config)#exit 

Explanation: 

First you need to configure access list to HTTP traffic and then configure that access list. After that configure the route map and then apply it on the interface to the server in EIGRP network. 


Q24. Which two actions must you perform to enable and use window scaling on a router? (Choose two.) 

A. Execute the command ip tcp window-size 65536. 

B. Set window scaling to be used on the remote host. 

C. Execute the command ip tcp queuemax. 

D. Set TCP options to "enabled" on the remote host. 

E. Execute the command ip tcp adjust-mss. 

Answer: A,B 

Explanation: 

The TCP Window Scaling feature adds support for the Window Scaling option in RFC 1323,

TCP Extensions for High Performance . A larger window size is recommended to improve TCP performance in network paths with large bandwidth-delay product characteristics that are called Long Fat

Networks (LFNs). 

The TCP Window Scaling enhancement provides that support. The window scaling extension in Cisco IOS software expands the definition of the TCP window to 32 bits and then uses a scale factor to carry this 32-bit value in the 16-bit window field of the TCP header. 

The window size can increase to a scale factor of 14. Typical applications use a scale factor of 3 when deployed in LFNs. 

The TCP Window Scaling feature complies with RFC 1323. The larger scalable window size will allow TCP to perform better over LFNs. 

Use the ip tcp window-size command in global configuration mode to configure the TCP window size. In order for this to work, the remote host must also support this feature and its window size must be increased. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/

configuration/12-4t/iap-12- 4t-book/iap-tcp.html#GUID-BD998AC6-F128-47DD-B5F7-B226546D4B08


Q25. When using SNMPv3 with NoAuthNoPriv, which string is matched for authentication? 

A. username 

B. password 

C. community-string 

D. encryption-key 

Answer:

Explanation: 

The following security models exist: SNMPv1, SNMPv2, SNMPv3. The following security

levels exits: "noAuthNoPriv" (no authentiation and no encryption noauth keyword in CLI),

"AuthNoPriv" (messages are authenticated but not encrypted auth keyword in CLI), "AuthPriv" (messages

are authenticated and encrypted priv keyword in CLI). SNMPv1 and SNMPv2 models only support the

"noAuthNoPriv" model since they use plain community string to match the incoming packets. The SNMPv3

implementations could be configured to use either of the models on per-group basis (in case if

"noAuthNoPriv" is configured, username serves as a replacement for community string). Reference: http://

blog.ine.com/2008/07/19/snmpv3-tutorial/


Latest 300-101 exam cram:

Q26. Two aspects of an IP SLA operation can be tracked: state and reachability. Which statement about state tracking is true? 

A. When tracking state, an OK return code means that the track's state is up; any other return code means that the track's state is down. 

B. When tracking state, an OK or over threshold return code means that the track's state is up; any other return code means that the track's state is down. 

C. When tracking state, an OK return code means that the track's state is down; any other return code means that the track's state is up. 

D. When tracking state, an OK or over threshold return code means that the track's state is down; any other return code means that the track's state is up. 

Answer:

Explanation: 


Q27. Which three benefits does the Cisco Easy Virtual Network provide to an enterprise network? (Choose three.) 

A. simplified Layer 3 network virtualization 

B. improved shared services support 

C. enhanced management, troubleshooting, and usability 

D. reduced configuration and deployment time for dot1q trunking 

E. increased network performance and throughput 

F. decreased BGP neighbor configurations 

Answer: A,B,C 

Explanation: 


Q28. A company's corporate policy has been updated to require that stateless, 1-to-1, and IPv6 to IPv6 translations at the Internet edge are performed. What is the best solution to ensure compliance with this new policy? 

A. NAT64 

B. NAT44 

C. NATv6 

D. NPTv4 

E. NPTv6 

Answer:

Explanation: 

NPTv6 provides a mechanism to translate the private internal organization prefixes to public globally

reachable addresses. The translation mechanism is stateless and provides a 1:1 relationship between the internal addresses and external addresses. The use cases for NPTv6 outlined in the RFC include peering with partner networks, multi homing, and redundancy and load sharing.

Reference:

http://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/August2012/Cisco_SBA_BN_IPv6AddressingGuide-Aug2012.pdf


Q29. Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process? 

A. dual-stack method 

B. 6to4 tunneling 

C. GRE tunneling 

D. NAT-PT 

Answer:

Explanation: 

Dual stack means that devices are able to run IPv4 and IPv6 in parallel. It allows hosts to simultaneously

reach IPv4 and IPv6 content, so it offers a very flexible coexistence strategy. For sessions that support IPv6, IPv6 is used on a dual stack endpoint. If both

endpoints support IPv4 only, then IPv4 is used.

Benefits:

Native dual stack does not require any tunneling mechanisms on internal networks

Both IPv4 and IPv6 run independent of each other

Dual stack supports gradual migration of endpoints, networks, and applications. Reference: http://

www.cisco.com/web/strategy/docs/gov/IPV6at_a_glance_c45-625859.pdf


Q30. An engineer executes the ip flow ingress command in interface configuration mode. What is the result of this action? 

A. It enables the collection of IP flow samples arriving to the interface. 

B. It enables the collection of IP flow samples leaving the interface. 

C. It enables IP flow while disabling IP CEF on the interface. 

D. It enables IP flow collection on the physical interface and its subinterfaces. 

Answer:

Explanation: 



see more Implementing Cisco IP Routing