Limited Time Discount Offer
30% Off - Ends in 02:00:00


Cisco 300-101 Dumps

verified by experts

3 products

  • Verified by experts

300-101 Premium Bundle

  • Premium File 763 Questions & Answers

  • Training Course 91 Lectures

  • Study Guide 534 Pages


CCNP Implementing Cisco IP Routing (ROUTE v2.0)
CCNP Implementing Cisco IP Routing (ROUTE v2.0)





12.5 MB






13.9 MB






4.9 MB



Purchase Individually

  • 300-101

    Premium File

    763 Questions & Answers
  • 300-101

    Training Course

    91 Lectures
  • 300-101

    Study Guide

    534 Pages

Questions & Answers for Cisco 300-101

Showing 1-15 of 420 Questions

Question #1 - Topic 1

Which statement about the use of tunneling to migrate to IPv6 is true?

A. Tunneling is less secure than dual stack or translation.

B. Tunneling is more difficult to configure than dual stack or translation.

C. Tunneling does not enable users of the new protocol to communicate with users of the old protocol without dual-stack hosts.

D. Tunneling destinations are manually determined by the IPv4 address in the low-order 32 bits of IPv4-compatible IPv6 addresses.

Question #2 - Topic 1

Under which condition does UDP dominance occur?

A. when TCP traffic is in the same class as UDP

B. when UDP flows are assigned a lower priority queue

C. when WRED is enabled

D. when ACLs are in place to block TCP traffic

Question #3 - Topic 1

Refer to the exhibit.

Based on this FIB table, which statement is correct?

A. There is no default gateway.

B. The IP address of the router on FastEthernet is

C. The gateway of last resort is

D. The router will listen for all multicast traffic.

Question #4 - Topic 1

Which three problems result from application mixing of UDP and TCP streams within a
network with no QoS? (Choose three.)

A. starvation

B. jitter

C. latency

D. windowing

E. lower throughput

Question #5 - Topic 1

Which two actions must you perform to enable and use window scaling on a router?
(Choose two.)

A. Execute the command ip tcp window-size 65536.

B. Set window scaling to be used on the remote host.

C. Execute the command ip tcp queuemax.

D. Set TCP options to "enabled" on the remote host.

E. Execute the command ip tcp adjust-mss.

Question #6 - Topic 1

A network engineer notices that transmission rates of senders of TCP traffic sharply
increase and decrease simultaneously during periods of congestion. Which condition
causes this?

A. global synchronization

B. tail drop

C. random early detection

D. queue management algorithm

Question #7 - Topic 1

Which switching method is used when entries are present in the output of the command
show ip cache?

A. fast switching

B. process switching

C. Cisco Express Forwarding switching

D. cut-through packet switching

Question #8 - Topic 1

Refer to the exhibit.

A network administrator checks this adjacency table on a router. What is a possible cause
for the incomplete marking?

A. incomplete ARP information

B. incorrect ACL

C. dynamic routing protocol failure

D. serial link congestion

Question #9 - Topic 1

A network administrator executes the command clear ip route. Which two tables does this
command clear and rebuild? (Choose two.)

A. IP routing


C. ARP cache

D. MAC address table

E. Cisco Express Forwarding table

F. topology table

Question #10 - Topic 1

Which three TCP enhancements can be used with TCP selective acknowledgments?
(Choose three.)

A. header compression

B. explicit congestion notification

C. keepalive

D. time stamps

E. TCP path discovery

F. MTU window

Question #11 - Topic 1

A network administrator uses IP SLA to measure UDP performance and notices that
packets on one router have a higher one-way delay compared to the opposite direction.
Which UDP characteristic does this scenario describe?

A. latency

B. starvation

C. connectionless communication

D. nonsequencing unordered packets

E. jitter

Question #12 - Topic 1

Which method allows IPv4 and IPv6 to work together without requiring both to be used for
a single connection during the migration process?
A. dual-stack method
B. 6to4 tunneling
C. GRE tunneling

Topic 2, Layer 2 Technologies

Question #13 - Topic 2

PPPoE is composed of which two phases?

A. Active Authentication Phase and PPP Session Phase

B. Passive Discovery Phase and PPP Session Phase

C. Active Authorization Phase and PPP Session Phase

D. Active Discovery Phase and PPP Session Phase

Question #14 - Topic 2

Prior to enabling PPPoE in a virtual private dialup network group, which task must be

A. Disable CDP on the interface.

B. Execute the vpdn enable command.

C. Execute the no switchport command.

D. Enable QoS FIFO for PPPoE support.

Question #15 - Topic 2

A network engineer has been asked to ensure that the PPPoE connection is established
and authenticated using an encrypted password. Which technology, in combination with
PPPoE, can be used for authentication in this manner?


B. dot1x

C. IPsec