Discount Offer! Use Coupon Code to get 20% OFF DO2022
Our 300-410 dumps are key to get access. More than 1136+ satisfied customers.
Customers Passed 300-410 Exam Today
Maximum Passing Score in Real 300-410 Exam
Guaranteed Questions came from our 300-410 dumps
The network administrator configured CoPP so that all routing protocol traffic toward the router CPU is limited to 1 mbps. All traffic that exceeds this limit must be dropped. The router is running BGP and OSPF Management traffic for Telnet and SSH must be limited to 500kbps.access-list 100 permit tcp any any eq 179access-list 100 permit tcp any any range 22 23access-list 100 permit ospf any any!class-map CM-ROUTINGmatch access-group 100class-map CM-MGMTmatch access-group 100!policy-map PM-COPPclass CM-ROUTINGpolice 1000000 conform-action transmitclass CM-MGMTpolice 500000 conform-action transmit!control-planeservice-policy output PM-COPPNo traffic is filtering through CoPP,which is resulting in high CPU utilization,which configuration resolves the issue ?
A. no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101
B. control-planeno service-policy output PM-COPPservice-policy input PM-COPP
C. No access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit tcp any any range eq 22access-list 100 permit tcp any any range eq 23access-list 100 permit ospf any any
D. no access-list 100access-list 100 permit tcp any any eq 179access-list 100 permit ospf any anyaccess-list 101 Permit tcp any any range 22 23!class-map CM-MGMTno match access-group 100match access-group 101!control-planeno service-policy output PM-COPPservice-policy input PM-COPP
A network administrator is troubleshooting a high utilization issue on the route processor of a router that was reported by NMS The administrator logged into the router to check the control plane policing and observed that the BGP process is dropping a high number of routing packets and causing thousands of routes to recalculate frequently. Which solution resolves this issue?
A. Police the cir for BGP, conform-action transmit, and exceed action transmit.
B. Shape the pir for BGP, conform-action set-prec-transmit, and exceed action set-frdetransmit.
C. Shape the cir for BGP. conform-action transmit, and exceed action transmit.
D. Police the pir for BGP, conform-action set-prec-transmit, and exceed action set-clptransmit.
What is a function of BFD?
A. peer recovery after a Layer 3 protocol adjacency failure
B. peer recovery after a Layer 2 adjacency failure
C. failure detection independent of routing protocols and media types
D. failure detection dependent on routing protocols and media types
Which method provides failure detection in BFD?
A. short duration, high overhead
B. short duration, low overhead
C. long duration, high overhead
D. long duration, low overhead
Which IPv6 feature enables a device to reject traffic when it is originated from an address that is not stored in the device binding table?
A. IPv6 Snooping
B. IPv6 Source Guard
C. IPv6 DAD Proxy
D. IPv6 RA Guard
Which feature minimizes DoS attacks on an IPv6 network?
A. IPv6 Binding Security Table
B. IPv6 Router Advertisement Guard
C. IPv6 Prefix Guard
D. IPv6 Destination Guard
A newly installed spoke router is configured for DMVPN with the ip mtu 1400 command. Which configuration allows the spoke to use fragmentation with the maximum negotiated TCP MTU over GRE?
ip tcp adjust-mss 1360
crypto ipsec fragmentation after-encryption
B. ip tcp adjust-mtu 1360 crypto ipsec fragmentation after-encryption
C. ip tcp adjust-mss 1360 crypto ipsec fragmentation mtu-discovery
D. ip tcp adjust-mtu 1360 crypto ipsec fragmentation mtu-discovery
What are two characteristics of IPv6 Source Guard? (Choose two.)
A. requires IPv6 snooping on Layer 2 access or trunk ports
B. used in service provider deployments to protect DDoS attacks
C. requires the user to configure a static binding
D. requires that validate prefix be enabled
E. recovers missing binding table entries
An engineer configured a router with this configuration ip access-hst DENY TELNET 10 deny tcp any any eq 23 log-inputThe router console starts receiving log message :%SEC-6-IPACCESSLOGP: listDENY_TELNET denied tcp 192.168.1.10(1022)(FastEthernet1/0 D508.89gb.003f) - >192.168.2.20(23), 1 packet" Which action stops messages on the console while still denying Telnet?
A. Configure a 20 permit ip any any command
B. Remove log-Input keyword from the access list.
C. Replace log-input keyword with the log keyword in the access list.
D. Configure a 20 permit ip any any log-input command.
What must be configured by the network engineer to circumvent AS_PATH prevention mechanism in IP/VPN Hub and Spoke deployment scenarios?
A. Use allows in and as-override at all Pes.
B. Use allowas in and as-override at the PE-Hub.
C. Use Allowas-in the PE_Hub
D. Use as-override at the PE_Hub