Foolproof 300 101 vce tips

♥♥ 2017 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-101 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-101 Exam Dumps (PDF & VCE):
Available on:

It is impossible to pass Cisco 300 101 pdf exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed Cisco ccnp routing and switching route 300 101 practice questions. You will get a surprising result by our Latest Implementing Cisco IP Routing practice guides.

Q1. Under which condition does UDP dominance occur? 

A. when TCP traffic is in the same class as UDP 

B. when UDP flows are assigned a lower priority queue 

C. when WRED is enabled 

D. when ACLs are in place to block TCP traffic 



Explanation: Mixing TCP with UDP It is a general best practice to not mix TCP-based traffic with UDPbased

traffic (especially Streaming-Video) within a single service-provider class because of the behaviors

of these protocols during periods of congestion. Specifically, TCP transmitters throttle back flows when

drops are detected. Although some UDP applications have application-level windowing, flow control, and

retransmission capabilities, most UDP transmitters are completely oblivious to drops and, thus, never lower

transmission rates because of dropping. When TCP flows are combined with UDP flows within a single

service-provider class and the class experiences congestion, TCP flows continually lower their

transmission rates, potentially giving up their bandwidth to UDP flows that are oblivious to drops. This

effect is called TCP starvation/UDP dominance. TCP starvation/UDP dominance likely occurs if (TCP-based) Mission-Critical Data is assigned to the same service-provider class as (UDP-based) Streaming-

Video and the class experiences sustained congestion. Even if WRED is enabled on the service-provider

class, the same behavior would be observed because WRED (for the most part) manages congestion only

on TCP-based flows. Reference:


Topic 2, Layer 2 Technologies 

13. Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed? 

A. Disable CDP on the interface. 

B. Execute the vpdn enable command. 

C. Execute the no switchport command. 

D. Enable QoS FIFO for PPPoE support. 



Enabling PPPoE in a VPDN Group

Perform this task to enable PPPoE in a virtual private dial-up network (VPDN) group.


This task applies only to releases prior to Cisco IOS Release 12.2(13)T.



2.configure terminal

3.vpdn enable

4.vpdn-group name


6.protocol pppoe DETAILED STEPS Command or Action Purpose Step 1 enable Enables privileged EXEC

mode. Example: · Enter your password if Router> enable prompted. Step 2 configure terminal Enters

global configuration mode. Example: Router# configure terminal Step 3 vpdn enable Enables virtual private

dialup Example: networking. Router(config)# vpdn enable Step 4 vpdn-group name Associates a VPDN

group with a Example: customer or VPDN profile. Router(config)# vpdn-group group1 Step 5 request-dialin

Creates a request-dialin VPDN Example: subgroup. Router(config-vpdn)# request-dialin Step 6 protocol

pppoe Enables the VPDN subgroup to Example: establish PPPoE Router(config-vpdn-req-in)# pro tocol




Q2. CORRECT TEXT [SIMULATION] is a small IT corporation that is attempting to implement the network shown in the exhibit. Currently the implementation is partially completed. OSPF has been configured on routers Chicago and NewYork. The SO/O interface on Chicago and the SO/1 interface on NewYork are in Area 0. The loopbackO interface on NewYork is in Area 1. However, they cannot ping from the serial interface of the Seattle router to the loopback interface of the NewYork router. You have been asked to complete the implementation to allow this ping.'s corporate implementation guidelines require: 

. The OSPF process ID for all routers must be 10. 

. The routing protocol for each interface must be enabled under the routing process. 

. The routing protocol must be enabled for each interface using the most specific wildcard mask possible. 

.The serial link between Seattle and Chicago must be in OSPF area 21. 

.OSPF area 21 must not receive any inter-area or external routes. 

Network Information 


S0/0 - Link between Seattle and Chicago 

Secret Password: cisco 


S0/0 - Link between Chicago and NewYork 

S0/1 - Link between Seattle and Chicago Secre Password: cisco 


S0/1 - Link between Chicago and NewYork 


Secret Password: cisco 

Answer: Here is the solution below: 


Note: In actual exam, the IP addressing, OSPF areas and process ID, and router hostnames may change, but the overall solution is the same. 

Seattle’s S0/0 IP Address is So, we need to find the network address and wildcard mask of in order to configure the OSPF. 

IP Address: /30 

Subnet Mask: 

Here subtract 252 from 2565, 256-252 = 4, hence the subnets will increment by 4. 

First, find the 4th octet of the Network Address: 

The 4th octet of IP address ( belongs to subnet 1 (4 to 7). 

Network Address: 

Broadcast Address: 

Lets find the wildcard mask of /30. 

Subnet Mask: (Network Bits – 1’s, Host Bits – 0’s) 

Lets find the wildcard mask of /30: 

Now we configure OSPF using process ID 10 (note the process ID may change to something else in real exam). 


Password: cisco

Seattle#conf t 

Seattle(config)#router ospf 10 

Seattle(config-router)#network area 21 

One of the tasks states that area 21 should not receive any external or inter-area routes (except 

the default route). 

Seattle(config-router)#area 21 stub 


Seattle#copy run start 

Chicago Configuration: 


Password: cisco 

Chicago#conf t 

Chicago(config)#router ospf 10 

We need to add Chicago’s S0/1 interface to Area 21 

Chicago(config-router)#network area 21 

Again, area 21 should not receive any external or inter-area routes (except the default route). 

In order to accomplish this, we must stop LSA Type 5 if we don’t want to send external routes. And 

if we don’t want to send inter-area routes, we have to stop LSA Type 3 and Type 4. Therefore we 

want to configure area 21 as a totally stubby area. 

Chicago(config-router)#area 21 stub no-summary 


Chicago#copy run start 

The other interface on the Chicago router is already configured correctly in this scenario, as well 

as the New York router so there is nothing that needs to be done on that router. 

Q3. IPv6 has just been deployed to all of the hosts within a network, but not to the servers. Which feature allows IPv6 devices to communicate with IPv4 servers? 


B. NATng 

C. NAT64 

D. dual-stack NAT 

E. DNS64 



NAT64 is a mechanism to allow IPv6 hosts to communicate with IPv4 servers. The NAT64 server is the

endpoint for at least one IPv4 address and an IPv6 network segment of 32-bits (for instance 64:ff9b::/96, see RFC 6052, RFC 6146). The IPv6 client embeds the IPv4 address it wishes to communicate with using these bits, and sends its packets to the resulting address. The NAT64 server then creates a NAT-mapping between the IPv6 and the IPv4 address, allowing them to communicate.


Q4. A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no interesting traffic exists. Which feature can be used to accomplish this task? 

A. TCP Adjust 

B. Dialer Persistent 

C. PPPoE Groups 

D. half-bridging 

E. Peer Neighbor Route 



A new interface configuration command, dialer persistent, allows a dial-on-demand routing (DDR) dialer

profile connection to be brought up without being triggered by interesting traffic. When configured, the dialer persistent command starts a timer when the dialer interface starts up and starts the connection when the timer expires. If interesting traffic arrives before the timer expires, the connection is still brought up and set as persistent. The command provides a default timer interval, or you can set a custom timer interval. To configure a dialer interface as persistent, use the following commands beginning in global configuration mode:

Command Purpose

Step 1 Router(config)# interface dialer Creates a dialer interface and number enters interface

Configuration mode.

Step 2 Router(config-if)# ip address Specifies the IP address and mask address mask of the dialer

interface as a node in the destination network to be called.

Step 3 Router(config-if)# encapsulation Specifies the encapsulation type.


Step 4 Router(config-if)# dialer string Specifies the remote destination to dial-string class class-name call

and the map class that defines characteristics for calls to this destination.

Step 5 Router(config-if)# dialer pool Specifies the dialing pool to use number for calls to this destination.

Step 6 Router(config-if)# dialer-group Assigns the dialer interface to a group-number dialer group.

Step 7 Router(config-if)# dialer-list Specifies an access list by list dialer-group protocol protocol- number or

by protocol and list name {permit | deny | list number to define the interesting access-list-number} packets that can trigger a call. Step 8 Router(config-if)# dialer

(Optional) Specifies the remote-name user-name

authentication name of the remote router on the destination subnetwork for a dialer interface.

Step 9 Router(config-if)# dialer Forces a dialer interface to be persistent [delay [initial] connected at all

times, even in seconds | max-attempts the absence of interesting traffic.





JS Industries has expanded their business with the addition of their first remote office. The remote office router (R3) was previously configured and all corporate subnets were reachable from R3. JS Industries is interested in using route summarization along with the EIGRP Stub Routing feature to increase network stability while reducing the memory usage and bandwidth utilization to R3. Another network professional was tasked with implementing this solution. However, in the process of configuring EIGRP stub routing connectivity with the remote network devices off of R3 has been lost. 

Currently EIGRP is configured on all routers R2, R3, and R4 in the network. Your task is to identify and resolve the cause of connectivity failure with the remote office router R3. Once the issue has been resolved you should complete the task by configuring route summarization only to the remote office router R3. 

You have corrected the fault when pings from R2 to the R3 LAN interface are successful, and the R3 IP routing table only contains 2 subnets. 

Answer: Here are the solution as below: 


First we have to figure out why R3 and R4 can not communicate with each other. Use the show running-config command on router R3. 

Notice that R3 is configured as a stub receive-only router. The receive-only keyword will restrict the router from sharing any of its routes with any other router in that EIGRP autonomous system. This keyword will also prevent any type of route from being sent. Therefore we will remove this command and replace it with the eigrp stub command: 

R3# configure terminal 

R3(config)# router eigrp 123 

R3(config-router)# no eigrp stub receive-only 

R3(config-router)# eigrp stub 

R3(config-router)# end 

Now R3 will send updates containing its connected and summary routes to other routers. Notice that the eigrp stub command equals to the eigrp stub connected summary because the connected and summary options are enabled by default. Next we will configure router R3 so that it has only 2 subnets of network. Use the show ip route command on R3 to view its routing table: 

Because we want the routing table of R3 only have 2 subnets so we have to summary sub-networks at the interface which is connected with R3, the s0/0 interface of R4. 

There is one interesting thing about the output of the show ip route shown above: the, which is a directly connected network of R3. We can’t get rid of it in the routing table no matter what technique we use to summary the networks. Therefore, to make the routing table of R3 has only 2 subnets we have to summary other subnets into one subnet. 

In the output if we don’t see the summary line (like is a summary…) then we should use the command ip summary-address eigrp 123 so that all the ping can work well. 

In conclusion, we will use the ip summary-address eigrp 123 at the interface s0/0 of R4 to summary. 

R4> enable 

R4# conf t 

R4(config)# interface s0/0 

R4(config-if)# ip summary-address eigrp 123 

Now we jump back to R3 and use the show ip route command to verify the effect, the output is shown below: 

Note: Please notice that the IP addresses and the subnet masks in your real exam might be different so you might use different ones to solve this question. Just for your information, notice that if you use another network than to summary, for example, if you use the command ip summary-address eigrp 123 you will leave a /16 network in the output of the show ip route command. 

But in your real exam, if you don’t see the line " is a summary, Null0" then you can summarize using the network This summarization is better because all the pings can work well. Finally don’t forget to use the copy run start command on routers R3 and R4 to save the configurations. R3(config-if)# end R3# copy run start R4(config-if)# end R4# copy run start 

If the “copy run start” command doesn’t work then use “write memory.” 

Q6. Refer to the exhibit. 

A network administrator checks this adjacency table on a router. What is a possible cause for the incomplete marking? 

A. incomplete ARP information 

B. incorrect ACL 

C. dynamic routing protocol failure 

D. serial link congestion 



To display information about the Cisco Express Forwarding adjacency table or the hardware Layer 3-

switching adjacency table, use the show adjacency command.

Reasons for Incomplete Adjacencies

There are two known reasons for an incomplete adjacency:

The router cannot use ARP successfully for the next-hop interface.

After a clear ip arp or a clear adjacency command, the router marks the adjacency as incomplete. Then it

fails to clear the entry.

In an MPLS environment, IP CEF should be enabeled for Label Switching. Interface level command ip

route-cache cef No ARP Entry When CEF cannot locate a valid adjacency for a destination prefix, it punts

the packets to the CPU for ARP resolution and, in turn, for completion of the adjacency.



Q7. A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two.) 

A. IP routing 


C. ARP cache 

D. MAC address table 

E. Cisco Express Forwarding table 

F. topology table 

Answer: A,B 


To clear one or more entries in the IP routing table, use the following commands in any mode:

Command Purpose

clear ip route {* |

Clears one or more routes from both the

{route |

unicast RIB and all the module FIBs. The

prefix/length}[next-hop route options are as follows:


· *--All routes.

[vrf vrf-name]


· route--An individual IP route.

switch(config)# clear ip

· prefix/length--Any IP prefix.

route · next-hop--The next-hop address · interface--The interface to reach the next-hop address.

The vrf-name can be any case-sensitive, al-phanumeric string up to 32 characters.



Q8. A network engineer has set up VRF-Lite on two routers where all the interfaces are in the same VRF. At a later time, a new loopback is added to Router 1, but it cannot ping any of the existing interfaces. Which two configurations enable the local or remote router to ping the loopback from any existing interface? (Choose two.) 

A. adding a static route for the VRF that points to the global route table 

B. adding the loopback to the VRF 

C. adding dynamic routing between the two routers and advertising the loopback 

D. adding the IP address of the loopback to the export route targets for the VRF 

E. adding a static route for the VRF that points to the loopback interface 

F. adding all interfaces to the global and VRF routing tables 

Answer: A,B 


Q9. Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the routing table? 

A. source address 

B. destination address 

C. router interface 

D. default gateway 



The Unicast RPF feature helps to mitigate problems that are caused by the introduction of

malformed or forged (spoofed) IP source addresses into a network by discarding IP packets that lack a

verifiable IP source address. For example, a number of common types of denial-of-service (DoS) attacks,

including Smurf and Tribal Flood Network (TFN), can take advantage of forged or rapidly changing source

IP addresses to allow attackers to thwart efforts to locate or filter the attacks. For Internet service providers

(ISPs) that provide public access, Unicast RPF deflects such attacks by forwarding only packets that have

source addresses that are valid and consistent with the IP routing table. This action protects the network of

the ISP, its customer, and the rest of the Internet. Reference:


Q10. The following configuration is applied to a router at a branch site: 

ipv6 dhcp pool dhcp-pool 

dns-server 2001:DB8:1:B::1 

dns-server 2001:DB8:3:307C::42 


If IPv6 is configured with default settings on all interfaces on the router, which two dynamic IPv6 addressing mechanisms could you use on end hosts to provide end-to-end connectivity? (Choose two.) 

A. EUI-64 


C. DHCPv6 


Answer: A,B 


Click to learn more regarding