Menu

Skip to content
New Updated Lead2pass ExamCollection

New Updated Lead2pass ExamCollection

100% pass by training Lead2pass latest exam dumps

[PDF&VCE] Latest 300-101 Dumps PDF Free Download In Lead2pass 100% 300-101 Pass Guaranteed (1-10)

Posted on October 8, 2016 by admin

2016 October Cisco Official New Released 300-101 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Lead2pass provides 100% pass 300-101 exam questions and answers for your Cisco 300-101 exam. We provide Cisco 300-101 exam questions from Lead2pass dumps and answers for the training of 300-101 practice test.

Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/300-101.html

QUESTION 1
A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password.
Which technology, in combination with PPPoE, can be used for authentication in this manner?

A.    PAP
B.    dot1x
C.    IPsec
D.    CHAP
E.    ESP

Answer: D
Explanation:
With PPPoE, the two authentication options are PAP and CHAP. When CHAP is enabled on an interface and a remote device attempts to connect to it, the access server sends a CHAP packet to the remote device. The CHAP packet requests or "challenges" the remote device to respond. The challenge packet consists of an ID, a random number, and the host name of the local router. When the remote device receives the challenge packet, it concatenates the ID, the remote device’s password, and the random number, and then encrypts all of it using the remote device’s password. The remote device sends the results back to the access server, along with the name associated with the password used in the encryption process. When the access server receives the response, it uses the name it received to retrieve a password stored in its user database. The retrieved password should be the same password the remote device used in its encryption process. The access server then encrypts the concatenated information with the newly retrieved password–if the result matches the result sent in the response packet, authentication succeeds.
The benefit of using CHAP authentication is that the remote device’s password is never transmitted in clear text (encrypted). This prevents other devices from stealing it and gaining illegal access to the ISP’s network.
http://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfathen.html

QUESTION 2
A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no interesting traffic exists.
Which feature can be used to accomplish this task?

A.    TCP Adjust
B.    Dialer Persistent
C.    PPPoE Groups
D.    half-bridging
E.    Peer Neighbor Route

Answer: B
Explanation:
A new interface configuration command, dialer persistent, allows a dial-on-demand routing (DDR) dialer profile connection to be brought up without being triggered by interesting traffic. When configured, the dialer persistent command starts a timer when the dialer interface starts up and starts the connection when the timer expires. If interesting traffic arrives before the timer expires, the connection is still brought up and set as persistent. The command provides a default timer interval, or you can set a custom timer interval.

QUESTION 3
Which encapsulation supports an interface that is configured for an EVN trunk?

A.    802.1Q
B.    ISL
C.    PPP
D.    Frame Relay
E.    MPLS
F.    HDLC

Answer: A
Explanation:
Restrictions for EVN
An EVN trunk is allowed on any interface that supports 802.1q encapsulation, such as Fast Ethernet, Gigabit Ethernet, and port channels.
A single IP infrastructure can be virtualized to provide up to 32 virtual networks end-to-end.
If an EVN trunk is configured on an interface, you cannot configure VRF-Lite on the same interface.
OSPFv3 is not supported; OSPFv2 is supported.
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evn-overview.pdf

QUESTION 4
Which three characteristics are shared by subinterfaces and associated EVNs? (Choose three.)

A.    IP address
B.    routing table
C.    forwarding table
D.    access control lists
E.    NetFlow configuration

Answer: ABC
Explanation:
runk interface can carry traffic for multiple EVNs. To simplify the configuration process, all the subinterfaces and associated EVNs have the same IP address assigned. In other words, the trunk interface is identified by the same IP address in different EVN contexts.
This is accomplished as a result of each EVN having a unique routing and forwarding table, thereby enabling support for overlapping IP addresses across multiple EVNs.
http://www.cisco.com/en/US/docs/ios-xml/ios/evn/configuration/xe-3sg/evn-overview.pdf

QUESTION 5
Which traffic does the following configuration allow?
ipv6 access-list cisco
permit ipv6 host 2001:DB8:0:4::32 any eq ssh
line vty 0 4
ipv6 access-class cisco in

A.    all traffic to vty 0 4 from source 2001:DB8:0:4::32
B.    only ssh traffic to vty 0 4 from source all
C.    only ssh traffic to vty 0 4 from source 2001:DB8:0:4::32
D.    all traffic to vty 0 4 from source all

Answer: C
Explanation:
Here we see that the Ipv6 access list called "cisco" is being applied to incoming VTY connections to the router. Ipv6 access list has just one entry, which allows only the single Ipv6 IP address of 2001:DB8:0:4::32 to connect using SSH only.

QUESTION 6
For troubleshooting purposes, which method can you use in combination with the debug ip packet command to limit the amount of output data?

A.    You can disable the IP route cache globally.
B.    You can use the KRON scheduler.
C.    You can use an extended access list.
D.    You can use an IOS parser.
E.    You can use the RITE traffic exporter.

Answer: C
Explanation:
The "debug ip packet" command generates a substantial amount of output and uses a substantial amount of system resources. This command should be used with caution in production networks. Always use with the access-list command to apply an extended ACL to the debug output.
http://www.cisco.com/c/en/us/support/docs/security/dynamic-multipoint-vpn-dmvpn/111976-dmvpn-troubleshoot-00.html

QUESTION 7
Refer to the following access list.
access-list 100 permit ip any any log
After applying the access list on a Cisco router, the network engineer notices that the router CPU utilization has risen to 99 percent. What is the reason for this?

A.    A packet that matches access-list with the "log" keyword is Cisco Express Forwarding switched.
B.    A packet that matches access-list with the "log" keyword is fast switched.
C.    A packet that matches access-list with the "log" keyword is process switched.
D.    A large amount of IP traffic is being permitted on the router.

Answer: C
Explanation:
ging-enabled access control lists (ACLs) provide insight into traffic as it traverses the network or is dropped by network devices. Unfortunately, ACL logging can be CPU intensive and can negatively affect other functions of the network device. There are two primary factors that contribute to the CPU load increase from ACL logging: process switching of packets that match log-enabled access control entries (ACEs) and the generation and transmission of log messages.
http://www.cisco.com/web/about/security/intelligence/acl-logging.html#4

QUESTION 8
Which address is used by the Unicast Reverse Path Forwarding protocol to validate a packet against the routing table?

A.    source address
B.    destination address
C.    router interface
D.    default gateway

Answer: A
Explanation:
The Unicast RPF feature helps to mitigate problems that are caused by the introduction of malformed or forged (spoofed) IP source addresses into a network by discarding IP packets that lack a verifiable IP source address. For example, a number of common types of denial-of-service (DoS) attacks, including Smurf and Tribal Flood Network (TFN), can take advantage of forged or rapidly changing source IP addresses to allow attackers to thwart efforts to locate or filter the attacks. For Internet service providers (ISPs) that provide public access, Unicast RPF deflects such attacks by forwarding only packets that have source addresses that are valid and consistent with the IP routing table. This action protects the network of the ISP, its customer, and the rest of the Internet.
http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfrpf.html

QUESTION 9
What are the three modes of Unicast Reverse Path Forwarding?

A.    strict mode, loose mode, and VRF mode
B.    strict mode, loose mode, and broadcast mode
C.    strict mode, broadcast mode, and VRF mode
D.    broadcast mode, loose mode, and VRF mode

Answer: A
Explanation:
Network administrators can use Unicast Reverse Path Forwarding (Unicast RPF) to help limit the malicious traffic on an enterprise network. This security feature works by enabling a router to verify the reachability of the source address in packets being forwarded. This capability can limit the appearance of spoofed addresses on a network. If the source IP address is not valid, the packet is discarded. Unicast RPF works in one of three different modes: strict mode, loose mode, or VRF mode. Note that not all network devices support all three modes of operation. Unicast RPF in VRF mode will not be covered in this document.
When administrators use Unicast RPF in strict mode, the packet must be received on the interface that the router would use to forward the return packet. Unicast RPF configured in strict mode may drop legitimate traffic that is received on an interface that was not the router’s choice for sending return traffic. Dropping this legitimate traffic could occur when asymmetric routing paths are present in the network.
When administrators use Unicast RPF in loose mode, the source address must appear in the routing table. Administrators can change this behavior using the allow-default option, which allows the use of the default route in the source verification process. Additionally, a packet that contains a source address for which the return route points to the Null 0 interface will be dropped. An access list may also be specified that permits or denies certain source addresses in Unicast RPF loose mode.
Care must be taken to ensure that the appropriate Unicast RPF mode (loose or strict) is configured during the deployment of this feature because it can drop legitimate traffic. Although asymmetric traffic flows may be of concern when deploying this feature, Unicast RPF loose mode is a scalable option for networks that contain asymmetric routing paths.
http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html

QUESTION 10
What does the following access list, which is applied on the external interface FastEthernet 1/0 of the perimeter router, accomplish?
router(config)#access-list 101 deny ip 10.0.0.0 0.255.255.255 any log
router (config)#access-list 101 deny ip 192.168.0.0 0.0.255.255 any log
router (config)#access-list 101 deny ip 172.16.0.0 0.15.255.255 any log
router (config)#access-list 101 permit ip any any
router (config)#interface fastEthernet 1/0
router (config-if)#ip access-group 101 in

A.    It prevents incoming traffic from IP address ranges 10.0.0.0-10.0.0.255, 172.16.0.0-172.31.255.255, 192.168.0.0-192.168.255.255 and logs any intrusion attempts.
B.    It prevents the internal network from being used in spoofed denial of service attacks and logs any exit to the Internet.
C.    It filters incoming traffic from private addresses in order to prevent spoofing and logs any intrusion attempts.
D.    It prevents private internal addresses to be accessed directly from outside.

Answer: C
Explanation:
The private IP address ranges defined in RFC 1918 are as follows:
10.0.0.0 — 10.255.255.255
172.16.0.0 — 172.31.255.255
192.168.0.0 — 192.168.255.255
These IP addresses should never be allowed from external networks into a corporate network as they would only be able to reach the network from the outside via routing problems or if the IP addresses were spoofed. This ACL is used to prevent all packets with a spoofed reserved private source IP address to enter the network. The log keyword also enables logging of this intrusion attempt.

Lead2pass is the leader in 300-101 certification test questions with training materials for Cisco 300-101 exam dumps. Lead2pass Cisco training tools are constantly being revised and updated. We 100% guarantee Cisco 300-101 exam questions with quality and reliability which will help you pass Cisco 300-101 exam.

300-101 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDeXZ6R3kxS05wV0E

2016 Cisco 300-101 exam dumps (All 183 Q&As) from Lead2pass:

http://www.lead2pass.com/300-101.html [100% Exam Pass Guaranteed]

Posted in 300-101 Dumps 300-101 Exam Questions 300-101 New Questions 300-101 PDF 300-101 VCE Cisco | Tagged 300-101 braindumps 300-101 exam dumps 300-101 exam question 300-101 pdf dumps 300-101 practice test 300-101 study guide 300-101 vce dumps

Categories

Test Engine

VCE Exam Simulator for Mobile

Take exams on your mobile device the same way you do on your desktop. iPhone, iPad and Android devices are supported.

Microsoft Dumps

PDF & VCEMicrosoft 70-243 Dumps
PDF & VCEMicrosoft 70-246 Dumps
PDF & VCEMicrosoft 70-247 Dumps
PDF & VCEMicrosoft 70-331 Dumps
PDF & VCEMicrosoft 70-332 Dumps
PDF & VCEMicrosoft 70-333 Dumps
PDF & VCEMicrosoft 70-341 Dumps
PDF & VCEMicrosoft 70-342 Dumps
PDF & VCEMicrosoft 70-346 Dumps
PDF & VCEMicrosoft 70-347 Dumps
PDF & VCEMicrosoft 70-410 Dumps
PDF & VCEMicrosoft 70-411 Dumps
PDF & VCEMicrosoft 70-412 Dumps
PDF & VCEMicrosoft 70-413 Dumps
PDF & VCEMicrosoft 70-414 Dumps
PDF & VCEMicrosoft 70-417 Dumps
PDF & VCEMicrosoft 70-457 Dumps
PDF & VCEMicrosoft 70-458 Dumps
PDF & VCEMicrosoft 70-461 Dumps
PDF & VCEMicrosoft 70-462 Dumps
PDF & VCEMicrosoft 70-463 Dumps
PDF & VCEMicrosoft 70-464 Dumps
PDF & VCEMicrosoft 70-465 Dumps
PDF & VCEMicrosoft 70-466 Dumps
PDF & VCEMicrosoft 70-467 Dumps
PDF & VCEMicrosoft 70-469 Dumps
PDF & VCEMicrosoft 70-480 Dumps
PDF & VCEMicrosoft 70-481 Dumps
PDF & VCEMicrosoft 70-482 Dumps
PDF & VCEMicrosoft 70-483 Dumps
PDF & VCEMicrosoft 70-486 Dumps
PDF & VCEMicrosoft 70-487 Dumps
PDF & VCEMicrosoft 70-488 Dumps
PDF & VCEMicrosoft 70-489 Dumps
PDF & VCEMicrosoft 70-511 Dumps
PDF & VCEMicrosoft 70-513 Dumps
PDF & VCEMicrosoft 70-515 Dumps
PDF & VCEMicrosoft 70-532 Dumps
PDF & VCEMicrosoft 70-533 Dumps
PDF & VCEMicrosoft 70-534 Dumps
PDF & VCEMicrosoft 70-640 Dumps
PDF & VCEMicrosoft 70-642 Dumps
PDF & VCEMicrosoft 70-646 Dumps
PDF & VCEMicrosoft 70-687 Dumps
PDF & VCEMicrosoft 70-688 Dumps
PDF & VCEMicrosoft 70-689 Dumps
PDF & VCEMicrosoft 70-692 Dumps
PDF & VCEMicrosoft 70-695 Dumps
PDF & VCEMicrosoft 70-696 Dumps
PDF & VCEMicrosoft 70-697 Dumps
PDF & VCEMicrosoft 74-335 Dumps
PDF & VCEMicrosoft 74-338 Dumps
PDF & VCEMicrosoft 74-343 Dumps
PDF & VCEMicrosoft 74-344 Dumps
PDF & VCEMicrosoft 74-409 Dumps
PDF & VCEMicrosoft 98-361 Dumps
PDF & VCEMicrosoft 98-367 Dumps
PDF & VCEMB2-700 Dumps
PDF & VCEMB2-701 Dumps
PDF & VCEMB2-702 Dumps
PDF & VCEMB2-703 Dumps
GetAll List Of Microsoft Dumps NOW

Cisco Dumps

PDF & VCECisco 200-120 Dumps
PDF & VCECisco 100-101 Dumps
PDF & VCECisco 200-101 Dumps
PDF & VCECisco 200-310 Dumps
PDF & VCECisco 200-355 Dumps
PDF & VCECisco 200-401 Dumps
PDF & VCECisco 210-260 Dumps
PDF & VCECisco 210-060 Dumps
PDF & VCECisco 210-065 Dumps
PDF & VCECisco 300-101 Dumps
PDF & VCECisco 300-115 Dumps
PDF & VCECisco 300-135 Dumps
PDF & VCECisco 300-206 Dumps
PDF & VCECisco 300-207 Dumps
PDF & VCECisco 300-208 Dumps
PDF & VCECisco 300-209 Dumps
PDF & VCECisco 300-070 Dumps
PDF & VCECisco 300-075 Dumps
PDF & VCECisco 300-080 Dumps
PDF & VCECisco 300-085 Dumps
PDF & VCECisco 400-101 Dumps
PDF & VCECisco 400-201 Dumps
PDF & VCECisco 400-051 Dumps
PDF & VCECisco 350-018 Dumps
PDF & VCECisco 642-035 Dumps

CompTIA Dumps

PDF & VCESY0-401 Dumps
PDF & VCEN10-006 Dumps
PDF & VCE220-901 Dumps
PDF & VCE220-902 Dumps
PDF & VCESG0-001 Dumps
PDF & VCECAS-002 Dumps
PDF & VCESK0-004 Dumps

Hottest Exam

PDF & VCEVMware VCP550 Dumps
PDF & VCEVMware VCP550D Dumps
PDF & VCEVMware 1V0-601 Dumps
PDF & VCEVMware 2V0-620 Dumps
PDF & VCEVCP5-DCV Dumps
PDF & VCEISC CISSP Dumps
PDF & VCEPMI PMP Dumps
PDF & VCEOracle 1Z0-051 Dumps
PDF & VCEOracle 1Z0-052 Dumps
PDF & VCEOracle 1Z0-060 Dumps
PDF & VCEOracle 1Z0-061 Dumps
PDF & VCECitrix 1Y0-201 Dumps
PDF & VCECitrix 1Y0-301 Dumps
PDF & VCECitrix 1Y0-401 Dumps
PDF & VCE312-50v9 Dumps
PDF & VCERHCSA EX200 Dumps
PDF & VCERHCE EX300 Dumps

Archives

Categories

200-125 Dumps 200-125 Exam Questions 200-125 New Questions 200-125 PDF 200-125 VCE 300-075 Dumps 300-075 Exam Questions 300-320 Dumps 300-320 Exam Questions 300-320 New Questions 300-320 PDF 300-320 VCE 400-101 Dumps 400-101 Exam Questions 400-101 New Questions 400-101 PDF 400-101 VCE 400-251 Dumps Amazon AWS-SysOps Exam Questions Cisco C_BOCR_11 Dumps C_BOCR_11 Exam Questions C_BOCR_11 New Questions C_BOCR_11 PDF C_BOCR_11 VCE C_HANAIMP151 Dumps C_HANAIMP151 Exam Questions C_HANAIMP151 New Questions C_HANAIMP151 PDF C_HANAIMP151 VCE C_TFIN22_66 Dumps C_TFIN22_66 Exam Questions C_TFIN22_66 New Questions C_TFIN22_66 PDF C_TFIN22_66 VCE C_TSCM52_67 Dumps C_TSCM52_67 Exam Questions C_TSCM52_67 New Questions C_TSCM52_67 PDF C_TSCM52_67 VCE HP Microsoft Oracle SAP
Proudly powered by WordPress
Theme: Flint by Star Verte LLC