[Free] EnsurePass Cisco 300-135 Real Exam Dumps Questions 1-10

Get Full Version of the Exam

Question No.1

A network administrator is troubleshooting an EIGRP connection between RouterA, IP address, and RouterB, IP address Given the debug output on RouterA, which two statements are true? (Choose two.)


  1. RouterA received a hello packet with mismatched autonomous system numbers.

  2. RouterA received a hello packet with mismatched hello timers.

  3. RouterA received a hello packet with mismatched authentication parameters.

  4. RouterA received a hello packet with mismatched metric-calculation mechanisms.

  5. RouterA will form an adjacency with RouterB.

  6. RouterA will not form an adjacency with RouterB.

Correct Answer: DF

Question No.2

When troubleshooting an EIGRP connectivity problem, you notice that two connected EIGRP routers are not becoming EIGRP neighbors. A ping between the two routers was successful. What is the next thing that should be checked?

  1. Verify that the EIGRP hello and hold timers match exactly.

  2. Verify that EIGRP broadcast packets are not being dropped between the two routers with the show ip EIGRP peer command.

  3. Verify that EIGRP broadcast packets are not being dropped between the two routers with the show ip EIGRP traffic command.

  4. Verify that EIGRP is enabled for the appropriate networks on the local and neighboring router.

Correct Answer: D

Question No.3

Which IPsec mode will encrypt a GRE tunnel to provide multiprotocol support and reduced overhead?

  1. 3DES

  2. multipoint GRE

  3. tunnel

  4. transport

Correct Answer: D

Question No.4

Refer to the exhibit. How would you confirm on R1 that load balancing is actually occurring on the

default- network (


  1. Use ping and the show ip route command to confirm the timers for each default network resets to 0.

  2. Load balancing does not occur over default networks; the second route will only be used for failover.

  3. Use an extended ping along with repeated show ip route commands to confirm the gateway of last resort address toggles back and forth.

  4. Use the traceroute command to an address that is not explicitly in the routing table.

Correct Answer: D

Question No.5

Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site- to-site VPNs? (Choose three.)

  1. allows dynamic routing over the tunnel

  2. supports multi-protocol (non-IP) traffic over the tunnel

  3. reduces IPsec headers overhead since tunnel mode is used

  4. simplifies the ACL used in the crypto map

  5. uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

Correct Answer: ABD

Question No.6

Which statement is true about an IPsec/GRE tunnel?

  1. The GRE tunnel source and destination addresses are specified within the IPsec transform set.

  2. An IPsec/GRE tunnel must use IPsec tunnel mode.

  3. GRE encapsulation occurs before the IPsec encryption process.

  4. Crypto map ACL is not needed to match which traffic will be protected.

Correct Answer: C

Question No.7

You enabled CDP on two Cisco Routers which are connected to each other. The Line and Protocol status for the interfaces on both routers show as UP but the routers do not see each other a CDP neighbors. Which layer of the OSI model does the problem most likely exist?

  1. Physical

  2. Session

  3. Application

  4. Data-Link

  5. Network

Correct Answer: D

Question No.8

FCAPS is a network maintenance model defined by ISO. It stands for which of the following?

  1. Fault Management

  2. Action Management

  3. Configuration Management

  4. Protocol Management

  5. Security Management

Correct Answer: ACE

Question No.9

Which three management categories are contained in the FCAPS network maintenance model? (Choose three.)

  1. Config

  2. Fault

  3. Storage

  4. Accounting

  5. Redundancy

  6. Telecommunications

Correct Answer: ABD

Question No.10

What is the result of configuring the logging console warning command?

  1. Messages with a severity level of 4 and higher will be logged to all available TTY lines.

  2. Only warning messages will be logged on the console.

  3. Warning, error, critical, and informational messages will be logged on the console.

  4. Warning, critical, alert, and emergency messages will be logged on the console.

  5. The logging console warning command needs to be followed in the configuration with logging buffered byte size to specify the message buffer size for the console.

Correct Answer: D

Get Full Version of the Exam
300-135 Dumps
300-135 VCE and PDF