READ Free Dumps For Cisco- 300-135
Question ID 13470 | The implementations group has been using the test bed to do a proof-of-concept
that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241.
After several changes to the network addressing, routing scheme, DHCP services,
NTP services, layer 2 connectivity, FHRP services, and device security, a trouble
ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241
address.
Use the supported commands to isolated the cause of this fault and answer the
following questions.
What is the solution to the fault condition?
|
Option A | Under the interface Serial0/0/1 enter the ip access-group edge_security out command.
|
Option B | Under the ip access-list extended edge_security configuration add the permit ip 209.65.200.224 0.0.0.3 any command.
|
Option C | Under the ip access-list extended edge_security configuration delete the deny ip 10.0.0.0.0 0.255.255.255 any command.
|
Option D | Under the interface Serial0/0/0 configuration delete the ip access-group edge_security in command and enter the ip access-group edge_security out command.
|
Correct Answer | B |
Explanation Explanation: On R1, we need to permit IP 209.65.200.222/30 under the access list.
Question ID 13471 | The implementations group has been using the test bed to do a proof-of-concept
that requires both Client 1 and Client 2 to access the WEB Server at 209.65.200.241.
After several changes to the network addressing, routing scheme, DHCP services,
NTP services, layer 2 connectivity, FHRP services, and device security, a trouble
ticket has been opened indicating that Client 1 cannot ping the 209.65.200.241
address.
Use the supported commands to isolated the cause of this fault and answer the
following questions.
The fault condition is related to which technology?
|
Option A | BGP
|
Option B | NTP
|
Option C | IP NAT
|
Option D | IPv4 OSPF Routing
|
Option E | IPv4 OSPF Redistribution
|
Option F | IPv4 layer 3 security
|
Correct Answer | G |
Explanation Explanation: Explanation: On R1, we need to permit IP 209.65.200.222/30 under the access list.