Exambible provides you with the particular Cisco Cisco practice questions and answers along with best good quality. And each of our free downloadable examination engine may make you experience that you are generally taking the particular real Cisco 300-101 exam. Should you not know the way to prepare for your Cisco 300-101 exam, please seek our research guide for help. Therefore download the Exambible Cisco Cisco exam items and become ready for your Cisco 300-101 actual examination preparation. [vendor].com features abundant training source for the Cisco 300-101 exam. You can be assured to acquire certified on the initial try. The actual Cisco Cisco test questions as well as answers are composed by each of our senior experts whore working in this field for many years. It really is never a great easy process to pass the particular Cisco 300-101 exam. We promise that you will get a satisfied outcome by having advantage of each of our Cisco Cisco exam demos.

2017 Mar 300-101 braindumps

Q31. After a recent DoS attack on a network, senior management asks you to implement better logging functionality on all IOS-based devices. Which two actions can you take to provide enhanced logging results? (Choose two.) 

A. Use the msec option to enable service time stamps. 

B. Increase the logging history . 

C. Set the logging severity level to 1. 

D. Specify a logging rate limit. 

E. Disable event logging on all noncritical items. 

Answer: A,B 

Explanation: 

The optional msec keyword specifies the date/time format should include milliseconds. This can aid in

pinpointing the exact time of events, or to correlate the order that the events happened. To limit syslog messages sent to the router's history table and to an SNMP network management station based on severity, use the logging history command in global configuration mode. By default, Cisco devices Log error messages of severity levels 0 through 4 (emergency, alert, critical, error, and warning levels); in other words, "saving level warnings or higher." By increasing the severity level, more granular monitoring can occur, and SNMP messages will be sent by the less sever (5-7) messages.


Q32. Which protocol uses dynamic address mapping to request the next-hop protocol address for a specific connection? 

A. Frame Relay inverse ARP 

B. static DLCI mapping 

C. Frame Relay broadcast queue 

D. dynamic DLCI mapping 

Answer:

Explanation: 

Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a

specific connection, given its known DLCI. Responses to

Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server; the

table is then used to supply the next-hop protocol

address or the DLCI for outgoing traffic.

Reference:

http://www.cisco.com/c/en/us/td/docs/ios/12_2/wan/configuration/guide/fwan_c/wcffrely.html


Q33. Two aspects of an IP SLA operation can be tracked: state and reachability. Which statement about state tracking is true? 

A. When tracking state, an OK return code means that the track's state is up; any other return code means that the track's state is down. 

B. When tracking state, an OK or over threshold return code means that the track's state is up; any other return code means that the track's state is down. 

C. When tracking state, an OK return code means that the track's state is down; any other return code means that the track's state is up. 

D. When tracking state, an OK or over threshold return code means that the track's state is down; any other return code means that the track's state is up. 

Answer:

Explanation: 


Q34. Refer to the exhibit. 

Which command only announces the 1.2.3.0/24 network out of FastEthernet 0/0? 

A. distribute list 1 out 

B. distribute list 1 out FastEthernet0/0 

C. distribute list 2 out 

D. distribute list 2 out FastEthernet0/0 

Answer:

Explanation: 

Access list 2 is more specific, allowing only 1.2.3.0/24, whereas access list 1 permits all 1.0.0.0/8

networks. This question also asks us to apply this distribute list only to the outbound direction of the fast Ethernet 0/0 interface, so the correct command is "distribute list 2

out FastEthernet0/0."


Q35. CORRECT TEXT 

JS Industries has expanded their business with the addition of their first remote office. The remote office router (R3) was previously configured and all corporate subnets were reachable from R3. JS Industries is interested in using route summarization along with the EIGRP Stub Routing feature to increase network stability while reducing the memory usage and bandwidth utilization to R3. Another network professional was tasked with implementing this solution. However, in the process of configuring EIGRP stub routing connectivity with the remote network devices off of R3 has been lost. 

Currently EIGRP is configured on all routers R2, R3, and R4 in the network. Your task is to identify and resolve the cause of connectivity failure with the remote office router R3. Once the issue has been resolved you should complete the task by configuring route summarization only to the remote office router R3. 

You have corrected the fault when pings from R2 to the R3 LAN interface are successful, and the R3 IP routing table only contains 2 10.0.0.0 subnets. 

Answer: Here are the solution as below: 

Explanation: 

First we have to figure out why R3 and R4 can not communicate with each other. Use the show running-config command on router R3. 

Notice that R3 is configured as a stub receive-only router. The receive-only keyword will restrict the router from sharing any of its routes with any other router in that EIGRP autonomous system. This keyword will also prevent any type of route from being sent. Therefore we will remove this command and replace it with the eigrp stub command: 

R3# configure terminal 

R3(config)# router eigrp 123 

R3(config-router)# no eigrp stub receive-only 

R3(config-router)# eigrp stub 

R3(config-router)# end 

Now R3 will send updates containing its connected and summary routes to other routers. Notice that the eigrp stub command equals to the eigrp stub connected summary because the connected and summary options are enabled by default. Next we will configure router R3 so that it has only 2 subnets of 10.0.0.0 network. Use the show ip route command on R3 to view its routing table: 

Because we want the routing table of R3 only have 2 subnets so we have to summary sub-networks at the interface which is connected with R3, the s0/0 interface of R4. 

There is one interesting thing about the output of the show ip route shown above: the 10.2.3.0/24, which is a directly connected network of R3. We can’t get rid of it in the routing table no matter what technique we use to summary the networks. Therefore, to make the routing table of R3 has only 2 subnets we have to summary other subnets into one subnet. 

In the output if we don’t see the summary line (like 10.0.0.0/8 is a summary…) then we should use the command ip summary-address eigrp 123 10.2.0.0 255.255.0.0 so that all the ping can work well. 

In conclusion, we will use the ip summary-address eigrp 123 10.2.0.0 255.255.0.0 at the interface s0/0 of R4 to summary. 

R4> enable 

R4# conf t 

R4(config)# interface s0/0 

R4(config-if)# ip summary-address eigrp 123 10.2.0.0 255.255.0.0 

Now we jump back to R3 and use the show ip route command to verify the effect, the output is shown below: 

Note: Please notice that the IP addresses and the subnet masks in your real exam might be different so you might use different ones to solve this question. Just for your information, notice that if you use another network than 10.0.0.0/8 to summary, for example, if you use the command ip summary-address eigrp 123 10.2.0.0 255.255.0.0 you will leave a /16 network in the output of the show ip route command. 

But in your real exam, if you don’t see the line "10.0.0.0/8 is a summary, Null0" then you can summarize using the network 10.2.0.0/16. This summarization is better because all the pings can work well. Finally don’t forget to use the copy run start command on routers R3 and R4 to save the configurations. R3(config-if)# end R3# copy run start R4(config-if)# end R4# copy run start 

If the “copy run start” command doesn’t work then use “write memory.” 


Renewal 300-101 real exam:

Q36. For security purposes, an IPv6 traffic filter was configured under various interfaces on the local router. However, shortly after implementing the traffic filter, OSPFv3 neighbor adjacencies were lost. What caused this issue? 

A. The traffic filter is blocking all ICMPv6 traffic. 

B. The global anycast address must be added to the traffic filter to allow OSPFv3 to work properly. 

C. The link-local addresses that were used by OSPFv3 were explicitly denied, which caused the neighbor relationships to fail. 

D. IPv6 traffic filtering can be implemented only on SVIs. 

Answer:

Explanation: 

OSPFv3 uses link-local IPv6 addresses for neighbor discovery and other features, so if any IPv6 traffic

filters are implemented be sure to include the link local address so that it is permitted in the filter list.

Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/nx- os/unicast/configuration/

guide/l3_cli_nxos/l3_ospfv3.html


Q37. A network engineer has set up VRF-Lite on two routers where all the interfaces are in the same VRF. At a later time, a new loopback is added to Router 1, but it cannot ping any of the existing interfaces. Which two configurations enable the local or remote router to ping the loopback from any existing interface? (Choose two.) 

A. adding a static route for the VRF that points to the global route table 

B. adding the loopback to the VRF 

C. adding dynamic routing between the two routers and advertising the loopback 

D. adding the IP address of the loopback to the export route targets for the VRF 

E. adding a static route for the VRF that points to the loopback interface 

F. adding all interfaces to the global and VRF routing tables 

Answer: A,B 

Explanation: 


Q38. Which two actions must you perform to enable and use window scaling on a router? (Choose two.) 

A. Execute the command ip tcp window-size 65536. 

B. Set window scaling to be used on the remote host. 

C. Execute the command ip tcp queuemax. 

D. Set TCP options to "enabled" on the remote host. 

E. Execute the command ip tcp adjust-mss. 

Answer: A,B 

Explanation: 

The TCP Window Scaling feature adds support for the Window Scaling option in RFC 1323,

TCP Extensions for High Performance . A larger window size is recommended to improve TCP performance in network paths with large bandwidth-delay product characteristics that are called Long Fat

Networks (LFNs). 

The TCP Window Scaling enhancement provides that support. The window scaling extension in Cisco IOS software expands the definition of the TCP window to 32 bits and then uses a scale factor to carry this 32-bit value in the 16-bit window field of the TCP header. 

The window size can increase to a scale factor of 14. Typical applications use a scale factor of 3 when deployed in LFNs. 

The TCP Window Scaling feature complies with RFC 1323. The larger scalable window size will allow TCP to perform better over LFNs. 

Use the ip tcp window-size command in global configuration mode to configure the TCP window size. In order for this to work, the remote host must also support this feature and its window size must be increased. 

Reference: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp/

configuration/12-4t/iap-12- 4t-book/iap-tcp.html#GUID-BD998AC6-F128-47DD-B5F7-B226546D4B08


Q39. Refer to the exhibit. Which statement about the command output is true? 

A. The router exports flow information to 10.10.10.1 on UDP port 5127. 

B. The router receives flow information from 10.10.10.2 on UDP port 5127. 

C. The router exports flow information to 10.10.10.1 on TCP port 5127. 

D. The router receives flow information from 10.10.10.2 on TCP port 5127. 

Answer:

Explanation: 


Q40. CORRECT TEXT 

You are a network engineer with ROUTE.com, a small IT company. ROUTE.com has two connections to the Internet; one via a frame relay link and one via an EoMPLS link. IT policy requires that all outbound HTTP traffic use the frame relay link when it is available. All other traffic may use either link. No static or default routing is allowed. 

Choose and configure the appropriate path selection feature to accomplish this task. You may use the Test Workstation to generate HTTP traffic to validate your solution. 

Answer: We need to configure policy based routing to send specific traffic along a path that is different from the best path in the routing table. Here are the step by Step Solution for this: 

1) First create the access list that catches the HTTP traffic: R1(config)#access-list 101 permit tcp any any eq www 

2) Configure the route map that sets the next hop address to be ISP1 and permits the rest of the traffic: R1(config)#route-map pbr permit 10 

R1(config-route-map)#match ip address 101 

R1(config-route-map)#set ip next-hop 10.1.100.2 

R1(config-route-map)#exit 

R1(config)#route-map pbr permit 20 

3) Apply the route-map on the interface to the server in the EIGRP Network: 

R1(config-route-map)#exit 

R1(config)#int fa0/1 

R1(config-if)#ip policy route-map pbr 

R1(config-if)#exit 

R1(config)#exit 

Explanation: 

First you need to configure access list to HTTP traffic and then configure that access list. After that configure the route map and then apply it on the interface to the server in EIGRP network.