Q121. Which two statements about VRRP are true? (Choose two.)
A. It is assigned multicast address 184.108.40.206.
B. The TTL for VRRP packets must be 255.
C. It is assigned multicast address 220.127.116.11.
D. Its IP protocol number is 115.
E. Three versions of the VRRP protocol have been defined.
F. It supports both MD5 and SHA1 authentication.
Q122. An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters:
mac address C601.420F.0007
Q123. Which two statements best describes the difference between active mode monitoring and passive mode monitoring? (Choose two.)
A. Active mode monitoring is the act of Cisco PfR gathering information on user packets assembled into flows by NetFlow.
B. Active mode monitoring uses IP SLA probes for obtaining performance characteristics of the current exit WAN link.
C. Passive mode monitoring uses IP SLA to generate probes for the purpose of obtaining information regarding the characteristics of the WAN links.
D. Passive mode monitoring uses NetFlow for obtaining performance characteristics of the exit WAN links.
Q124. Which two tunneling techniques determine the IPv4 destination address on a per-packet basis? (Choose two.)
A. 6to4 tunneling
B. ISATAP tunneling
C. manual tunneling
D. GRE tunneling
Explanation: Tunnel Configuration Parameters by Tunneling Type
Tunnel Configuration Parameter
Interface Prefix or Address
An IPv4 address, or a reference to an interface on which IPv4 is configured.
An IPv4 address.
An IPv6 address.
An IPv4 address.
An IPv6 address.
Not required. These are all point-to-multipoint tunneling types. The IPv4 destination address is calculated, on a per-packet basis, from the IPv6 destination.
Not required. The interface address is generated as ::tunnel-source/96.
An IPv6 address. The prefix must embed the tunnel source IPv4 address
An IPv6 prefix in modified eui-64 format. The IPv6 address is generated from the prefix and the tunnel source IPv4 address.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/ipv6/configuration/guide/12_4t/ipv6_12_4t_book/i p6-tunnel.html
Q125. Which three statements about DMVPN are true? (Choose three.)
A. It facilitates zero-touch configuration for addition of new spokes.
B. It supports dynamically addressed spokes using DHCP.
C. It features automatic IPsec triggering for building an IPsec tunnel.
D. It requires uses of IPsec to build the DMVPN cloud.
E. Spokes can build tunnels to other spokes and exchange traffic directly.
F. It supports server load balancing on the spokes.
Q126. A configuration includes the line ip nbar port-map SSH tcp 22 23 443 8080. Which option describes the effect of this configuration line?
A. It configures NBAR to search for SSH using ports 22, 23, 443, and 8080.
B. It configures NBAR to allow SSH connections only on ports 22, 23, 443, and 8080.
C. It enables NBAR to inspect for SSH connections.
D. It creates a custom NBAR port-map named SSH and associates TCP ports 22, 23, 443, and 8080 to itself.
The ip nbar-port-map command configures NBAR to search for a protocol or protocol name using a port number other than the well-known port.
Reference: http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/command/reference/fqos_r/qrfcmd10.pd f
Q127. Which multicast protocol uses source trees and RPF?
B. PIM sparse mode
DVMRP builds a parent-child database using a constrained multicast model to build a forwarding tree rooted at the source of the multicast packets. Multicast packets are initially flooded down this source tree. If redundant paths are on the source tree, packets are not forwarded along those paths. Forwarding occurs until prune messages are received on those parent-child links, which further constrains the broadcast of multicast packets.
Reference: DVMRP and dense-mode PIM use only source trees and use RPF as previously described.
Q128. DRAG DROP
What is the correct order of the VSS initialization process? Drag the actions on the left to the correct initialization step on the right.
Q129. DRAG DROP
Drag and drop the OSPFv3 LSA type on the left to the functionality it provides on the right.
Q130. What are two reasons to use the ip ospf database filter all out command? (Choose two.)
A. to maintain a centralized OSPF database on a single master device
B. to avoid flooding LSAs on low-speed links
C. to ensure a consistent OSPF database across the network
D. to selectively filter OSPF routes without disrupting the SPF algorithm
E. to filter only type 7 LSAs from an OSPF area
F. to enable OSPF to send triggered updates