Exam Code: 300-101 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Cisco IP Routing
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 300-101 Exam.

2021 Mar 300-101 real exam

Q41. After a recent DoS attack on a network, senior management asks you to implement better logging functionality on all IOS-based devices. Which two actions can you take to provide enhanced logging results? (Choose two.) 

A. Use the msec option to enable service time stamps. 

B. Increase the logging history . 

C. Set the logging severity level to 1. 

D. Specify a logging rate limit. 

E. Disable event logging on all noncritical items. 

Answer: A,B 

Explanation: 

The optional msec keyword specifies the date/time format should include milliseconds. This can aid in

pinpointing the exact time of events, or to correlate the order that the events happened. To limit syslog messages sent to the router's history table and to an SNMP network management station based on severity, use the logging history command in global configuration mode. By default, Cisco devices Log error messages of severity levels 0 through 4 (emergency, alert, critical, error, and warning levels); in other words, "saving level warnings or higher." By increasing the severity level, more granular monitoring can occur, and SNMP messages will be sent by the less sever (5-7) messages.


Q42. Two aspects of an IP SLA operation can be tracked: state and reachability. Which statement about state tracking is true? 

A. When tracking state, an OK return code means that the track's state is up; any other return code means that the track's state is down. 

B. When tracking state, an OK or over threshold return code means that the track's state is up; any other return code means that the track's state is down. 

C. When tracking state, an OK return code means that the track's state is down; any other return code means that the track's state is up. 

D. When tracking state, an OK or over threshold return code means that the track's state is down; any other return code means that the track's state is up. 

Answer:

Explanation: 


Q43. Which two methods of deployment can you use when implementing NAT64? (Choose two.) 

A. stateless 

B. stateful 

C. manual 

D. automatic 

E. static 

F. functional 

G. dynamic 

Answer: A,B 

Explanation: 

While stateful and stateless NAT64 perform the task of translating IPv4 packets into IPv6 packets and vice

versa, there are important differences. The following

table provides a high-level overview of the most relevant differences.

Table 2. Differences Between Stateless NAT64 and Stateful NAT64

Stateless NAT64 Stateful NAT64

1:1 translation 1:N translation

No conservation of IPv4 address Conserves IPv4 address

Assures end-to-end address Uses address overloading, hence transparency and scalability lacks in endto-

end address transparency

No state or bindings created on the State or bindings are created on every translation unique translation

Requires IPv4-translatable IPv6 No requirement on the nature of IPv6 addresses assignment (mandatory

address assignment requirement)

Requires either manual or DHCPv6 Free to choose any mode of IPv6 based address assignment for IPv6

address assignment viz. Manual, hosts DHCPv6, SLAAC Reference: http://www.cisco.com/c/en/us/

products/collateral/ios-nx-os-software/enterprise-ipv6- solution/white_paper_c11-676277.html


Q44. A network engineer is asked to configure a "site-to-site" IPsec VPN tunnel. One of the last things that the engineer does is to configure an access list (access-list 1 permit any) along with the command ip nat inside source list 1 int s0/0 overload. Which functions do the two commands serve in this scenario? 

A. The command access-list 1 defines interesting traffic that is allowed through the tunnel. 

B. The command ip nat inside source list 1 int s0/0 overload disables "many-to-one" access for all devices on a defined segment to share a single IP address upon exiting the external interface. 

C. The command access-list 1 permit any defines only one machine that is allowed through the tunnel. 

D. The command ip nat inside source list 1 int s0/0 overload provides "many-to-one" access for all devices on a defined segment to share a single IP address upon exiting the external interface. 

Answer:

Explanation: 

Configuring NAT to Allow Internal Users to Access the Internet Using Overloading NAT Router

interface ethernet 0

ip address 10.10.10.1 255.255.255.0

ip nat inside

!--- Defines Ethernet 0 with an IP address and as a NAT inside interface.

interface ethernet 1

ip address 10.10.20.1 255.255.255.0

ip nat inside

!--- Defines Ethernet 1 with an IP address and as a NAT inside interface.

interface serial 0

ip address 172.16.10.64 255.255.255.0

ip nat outside

!--- Defines serial 0 with an IP address and as a NAT outside interface.

ip nat pool ovrld 172.16.10.1 172.16.10.1 prefix 24 !

!--- Defines a NAT pool named ovrld with a range of a single IP

!--- address, 172.16.10.1.

ip nat inside source list 7 pool ovrld overload

!

!

!

!

!--- Indicates that any packets received on the inside interface that

!--- are permitted by access-list 7 has the source

address

!--- translated to an address out of the NAT pool named ovrld.

!--- Translations are overloaded, which allows multiple inside

!--- devices to be translated to the same valid IP

address.

access-list 7 permit 10.10.10.0 0.0.0.31

access-list 7 permit 10.10.20.0 0.0.0.31

!--- Access-list 7 permits packets with source addresses ranging from

!--- 10.10.10.0 through 10.10.10.31 and 10.10.20.0

through 10.10.20.31.

Note in the previous second configuration, the NAT pool "ovrld"only has a range of one address. The

keyword overload used in the ip nat inside source list 7 pool

ovrld overload command allows NAT to translate multiple inside devices to the single address in the pool.

Reference:

http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094e77.shtml


Q45. Refer to the exhibit. 

Based on this FIB table, which statement is correct? 

A. There is no default gateway. 

B. The IP address of the router on FastEthernet is 209.168.201.1. 

C. The gateway of last resort is 192.168.201.1. 

D. The router will listen for all multicast traffic. 

Answer:

Explanation: 

The 0.0.0.0/0 route is the default route and is listed as the first CEF entry. Here we see the next hop for this default route lists 192.168.201.1 as the default router (gateway of last resort).


Regenerate 300-101 download:

Q46. A router with an interface that is configured with ipv6 address autoconfig also has a link-local address assigned. Which message is required to obtain a global unicast address when a router is present? 

A. DHCPv6 request 

B. router-advertisement 

C. neighbor-solicitation 

D. redirect 

Answer:

Explanation: 

Autoconfiguration is performed on multicast-enabled links only and begins when a multicastenabled

interface is enabled (during system startup or manually). Nodes (both, hosts and routers) begin

the process by generating a link-local address for the interface. It is formed by appending the interface

identifier to well-known link-local prefix FE80 :: 0. The interface identifier replaces the right-most zeroes of

the link-local prefix. Before the link-local address can be assigned to the interface, the node performs the

Duplicate Address Detection mechanism to see if any other node is using the same link-local address on

the link. It does this by sending a Neighbor Solicitation message with target address as the "tentative"

address and destination address as the solicited-node multicast address corresponding to this tentative

address. If a node responds with a Neighbor Advertisement message with tentative address as the target

address, the address is a duplicate address and must not be used. Hence, manual configuration is

required. Once the node verifies that its tentative address is unique on the link, it assigns that link-local

address to the interface. At this stage, it has IP-connectivity to other neighbors on this link. The

autoconfiguration on the routers stop at this stage, further tasks are performed only by the hosts. The

routers will need manual configuration (or stateful configuration) to receive site-local or global addresses.

The next phase involves obtaining Router Advertisements from routers if any routers are present on the

link. If no routers are present, a stateful configuration is required. If routers are present, the Router

Advertisements notify what sort of configurations the hosts need to do and the hosts receive a global

unicast IPv6 address. Reference: https://sites.google.com/site/amitsciscozone/home/important-tips/ipv6/

ipv6-stateless- autoconfiguration


Q47. A network engineer finds that a core router has crashed without warning. In this situation, which feature can the engineer use to create a crash collection? 

A. secure copy protocol 

B. core dumps 

C. warm reloads 

D. SNMP 

E. NetFlow 

Answer:

Explanation: 

When a router crashes, it is sometimes useful to obtain a full copy of the memory image (called a core

dump) to identify the cause of the crash. Core dumps are generally very useful to your technical support representative.

Four basic ways exist for setting up the router to generate a core dump:

Using Trivial File Transfer Protocol (TFTP)

Using File Transfer Protocol (FTP)

Using remote copy protocol (rcp)

Using a Flash disk Reference: http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/

tr19aa.html


Q48. Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process? 

A. dual-stack method 

B. 6to4 tunneling 

C. GRE tunneling 

D. NAT-PT 

Answer:

Explanation: 

Dual stack means that devices are able to run IPv4 and IPv6 in parallel. It allows hosts to simultaneously

reach IPv4 and IPv6 content, so it offers a very flexible coexistence strategy. For sessions that support IPv6, IPv6 is used on a dual stack endpoint. If both

endpoints support IPv4 only, then IPv4 is used.

Benefits:

Native dual stack does not require any tunneling mechanisms on internal networks

Both IPv4 and IPv6 run independent of each other

Dual stack supports gradual migration of endpoints, networks, and applications. Reference: http://

www.cisco.com/web/strategy/docs/gov/IPV6at_a_glance_c45-625859.pdf


Q49. Which statement about the NPTv6 protocol is true? 

A. It is used to translate IPv4 prefixes to IPv6 prefixes. 

B. It is used to translate an IPv6 address prefix to another IPv6 prefix. 

C. It is used to translate IPv6 prefixes to IPv4 subnets with appropriate masks. 

D. It is used to translate IPv4 addresses to IPv6 link-local addresses. 

Answer:

Explanation: 


Q50. CORRECT TEXT 

You are a network engineer with ROUTE.com, a small IT company. ROUTE.com has two connections to the Internet; one via a frame relay link and one via an EoMPLS link. IT policy requires that all outbound HTTP traffic use the frame relay link when it is available. All other traffic may use either link. No static or default routing is allowed. 

Choose and configure the appropriate path selection feature to accomplish this task. You may use the Test Workstation to generate HTTP traffic to validate your solution. 

Answer: We need to configure policy based routing to send specific traffic along a path that is different from the best path in the routing table. Here are the step by Step Solution for this: 

1) First create the access list that catches the HTTP traffic: R1(config)#access-list 101 permit tcp any any eq www 

2) Configure the route map that sets the next hop address to be ISP1 and permits the rest of the traffic: R1(config)#route-map pbr permit 10 

R1(config-route-map)#match ip address 101 

R1(config-route-map)#set ip next-hop 10.1.100.2 

R1(config-route-map)#exit 

R1(config)#route-map pbr permit 20 

3) Apply the route-map on the interface to the server in the EIGRP Network: 

R1(config-route-map)#exit 

R1(config)#int fa0/1 

R1(config-if)#ip policy route-map pbr 

R1(config-if)#exit 

R1(config)#exit 

Explanation: 

First you need to configure access list to HTTP traffic and then configure that access list. After that configure the route map and then apply it on the interface to the server in EIGRP network.