Free Download New Updated Cisco CCIE R&S 400-101 Real Exam Questions and Answers 251-260

Ensurepass

QUESTION 251

Which two tunneling techniques determine the IPv4 destination address on a per-packet basis? (Choose two.)

 

A.

6to4 tunneling

B.

ISATAP tunneling

C.

manual tunneling

D.

GRE tunneling

 

Correct Answer: AB

 

 

QUESTION 252

Refer to the exhibit. Which two statements about this configuration are true? (Choose two.)

 

clip_image002

 

A.

Spoke devices will be dynamically added to the NHRP mappings.

B.

The next-hop server address must be configured to 172.168.1.1 on all spokes.

C.

The next-hop server address must be configured to 192.168.1.1 on all spokes.

D.

R1 will create a static mapping for each spoke.

 

Correct Answer: AC

 

 

QUESTION 253

Which two services are used to transport Layer 2 frames across a packet-switched network? (Choose two.)

 

A.

Frame Relay

B.

ATM

C.

AToM

D.

L2TPv3

 

Correct Answer: CD

 

 

QUESTION 254

Which two statements about the C-bit and PW type are true? (Choose two.)

 

A.

The C-bit is 1 byte and the PW type is 15 bytes.

B.

The PW type indicates the type of pseudowire.

C.

The C-bit is 3 bits and the PW type is 10 bits.

D.

The C-bit set to 1 indicates a control word is present.

E.

The PW type indicates the encryption type.

 

Correct Answer: BD

 

 

QUESTION 255

Which statement describes the function of rekey messages?

 

A.

They prevent unencrypted traffic from passing through a group member before registration.

B.

They refresh IPsec SAs when the key is about to expire.

C.

They trigger a rekey from the server when configuring the rekey ACL.

D.

They authenticate traffic passing through a particular group member.

 

Correct Answer: B

 

 

QUESTION 256

Which three statements about GET VPN are true? (Choose three.)

 

A.

It encrypts WAN traffic to increase data security and provide transport authentication.

B.

It provides direct communication between sites, which reduces latency and jitter.

C.

It can secure IP multicast, unicast, and broadcast group traffic.

D.

It uses a centralized key server for membership control.

E.

It enables the router to configure tunnels.

F.

It maintains full-mesh connectivity for IP networks.

 

Correct Answer: ABD

 

 

QUESTION 257

Which service is disabled by the no service tcp-small-servers command?

 

A.

the finger service

B.

the Telnet service

C.

the Maintenance Operation Protocol service

D.

the chargen service

 

Correct Answer: D

 

 

QUESTION 258

What is the ip dhcp snooping information option command used for?

 

A.

It displays information about the DHCP snooping table.

B.

It sends a syslog and an SNMP trap for a DHCP snooping violation.

C.

It enables the DHCP snooping host tracking feature.

D.

It enables DHCP option 82 data insertion.

 

Correct Answer: D

 

 

 

QUESTION 259

Refer to the exhibit. If the traffic flowing from network 192.168.254.0 to 172.16.250.0 is unencrypted, which two actions must you take to enable encryption? (Choose two).

 

clip_image004

 

A.

Configure the transform-set on R2 to match the configuration on R1.

B.

Configure the crypto map on R2 to include the correct subnet.

C.

Configure the ISAKMP policy names to match on R1 and R2.

D.

Configure the crypto map names to match on R1 and R2.

E.

Configure the Diffie-Hellman keys used in the ISAKMP policies to be different on R1 and R2.

 

Correct Answer: AB

 

 

QUESTION 260

Which two statements are true about unicast RPF? (Choose two.)

 

A.

Unicast RPF requires CEF to be enabled.

B.

Unicast RPF strict mode works better with multihomed networks.

C.

Unicast RPF strict mode supports symmetric paths.

D.

Unicast RPF strict mode supports asymmetric paths.

E.

CEF is optional with Unicast RPF, but when CEF is enabled it provides better performance.

 

Correct Answer: AC

 

Instant Access to Download Latest Complete Collection of Cisco CCIE R&S 400-101 Real Exam

Try Cisco CCIE R&S 400-101 Free Demo

Comments are closed.