123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

300-101 Exam Dumps

Profile Picture
By Author: Dennis Ng
Total Articles: 67
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Question: 1

Refer to the exhibit.

Based on this FIB table, which statement is correct?

A. There is no default gateway.
B. The IP address of the router on FastEthernet is 209.168.201.1.
C. The gateway of last resort is 192.168.201.1.
D. The router will listen for all multicast traffic.

Answer: C

Question: 2

Refer to the exhibit.

A network administrator checks this adjacency table on a router. What is a possible cause for the incomplete marking?

A. incomplete ARP information
B. incorrect ACL
C. dynamic routing protocol failure
D. serial link congestion

Answer: A

Question: 3

A network engineer notices that transmission rates of senders of TCP traffic sharply increase and decrease simultaneously during periods of congestion. Which condition causes this?

A. global synchronization
B. tail drop
C. random early detection
D. queue management algorithm

Answer: A

Question: 4
...
...
Which three problems result from application mixing of UDP and TCP streams within a network with no QoS? (Choose three.)

A. starvation
B. jitter
C. latency
D. windowing
E. lower throughput

Answer: A, C, E

Question: 5

Which method allows IPv4 and IPv6 to work together without requiring both to be used for a single connection during the migration process?

A. dual-stack method
B. 6to4 tunneling
C. GRE tunneling
D. NAT-PT

Answer: A

Question: 6

Which statement about the use of tunneling to migrate to IPv6 is true?

A. Tunneling is less secure than dual stack or translation.
B. Tunneling is more difficult to configure than dual stack or translation.
C. Tunneling does not enable users of the new protocol to communicate with users of the old protocol without dual-stack hosts.
D. Tunneling destinations are manually determined by the IPv4 address in the low-order 32 bits of IPv4-compatible IPv6 addresses.

Answer: C

Question: 7

A network administrator executes the command clear ip route. Which two tables does this command clear and rebuild? (Choose two.)

A. IP routing
B. FIB
C. ARP cache
D. MAC address table
E. Cisco Express Forwarding table
F. topology table

Answer: A, B

Question: 8

Which switching method is used when entries are present in the output of the command show ip cache?

A. fast switching
B. process switching
C. Cisco Express Forwarding switching
D. cut-through packet switching

Answer: A

Question: 9

Which two actions must you perform to enable and use window scaling on a router? (Choose two.)

A. Execute the command ip tcp window-size 65536.
B. Set window scaling to be used on the remote host.
C. Execute the command ip tcp queuemax.
D. Set TCP options to "enabled" on the remote host.
E. Execute the command ip tcp adjust-mss.

Answer: A, B

Question: 10

Which three TCP enhancements can be used with TCP selective acknowledgments? (Choose three.)

A. header compression
B. explicit congestion notification
C. keepalive
D. time stamps
E. TCP path discovery
F. MTU window

Answer: B, C, D

Question: 11

A network administrator uses IP SLA to measure UDP performance and notices that packets on one router have a higher one-way delay compared to the opposite direction. Which UDP characteristic does this scenario describe?

A. latency
B. starvation
C. connectionless communication
D. nonsequencing unordered packets
E. jitter

Answer: A

Question: 12

Under which condition does UDP dominance occur?

A. when TCP traffic is in the same class as UDP
B. when UDP flows are assigned a lower priority queue
C. when WRED is enabled
D. when ACLs are in place to block TCP traffic

Answer: A

Question: 13

Prior to enabling PPPoE in a virtual private dialup network group, which task must be completed?

A. Disable CDP on the interface.
B. Execute the vpdn enable command.
C. Execute the no switchport command.
D. Enable QoS FIFO for PPPoE support.

Answer: B

Question: 14

A network engineer has been asked to ensure that the PPPoE connection is established and authenticated using an encrypted password. Which technology, in combination with PPPoE, can be used for authentication in this manner?

A. PAP
B. dot1x
C. IPsec
D. CHAP
E. ESP

Answer: D

Question: 15

A corporate policy requires PPPoE to be enabled and to maintain a connection with the ISP, even if no interesting traffic exists. Which feature can be used to accomplish this task?

A. TCP Adjust
B. Dialer Persistent
C. PPPoE Groups
D. half-bridging
E. Peer Neighbor Route

Answer: B

Total Views: 432Word Count: 734See All articles From Author

Add Comment

Education Articles

1. A Comprehensive Guide To Choosing The Right Sap Course For Your Career Goals
Author: lakshmana swamy

2. Ai Agent Course In Ameerpet | Training By Visualpath
Author: gollakalyan

3. Sap Ariba Online Training & Sap Ariba Course India
Author: krishna

4. Servicenow Cmdb Training | Servicenow Itom Course Online
Author: Hari

5. Redhat Openshift Training | Openshift Training In Hyderabad
Author: Visualpath

6. Industry-focused Data Science Course In Pune With Hands-on Learning
Author: Fusionsoftwareinstitute

7. Ai Llm Course | Llm Artificial Intelligence Course
Author: naveen

8. Fix The Green Gap: Isep Skills For Practical Managers
Author: Gulf Academy of Safety

9. Boost Learning With Easy & Effective Online Assessments
Author: Magicbox

10. School In Bangalore 2026-27 A Complete Guide To The Fees Ratings And Admissions
Author: shivam

11. Best Vapt Internship Program In India For Cybersecurity Students
Author: securium Academy

12. How Non-technical Professionals In Dehradun Are Entering The Data Science Industry
Author: dhanya

13. Explore Mbbs In Vietnam: Quality Education With Clinical Excellence
Author: Ashwini

14. Mbbs In Vietnam: Affordable Medical Education For Indian Students With Global Recognition
Author: Ashwini

15. Mbbs In Vietnam: World-class Medical Education At Reasonable Cost!
Author: ashwini

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: