Home > Miscellaneous Questions

Miscellaneous Questions

March 23rd, 2020 Go to comments

Question 1

Explanation

Bidirectional Forwarding Detection (BFD) is a detection protocol that is designed to provide fast forwarding path failure detection times for all media types, encapsulations, topologies, and routing protocols.

Prerequisites for Bidirectional Forwarding Detection:
+ Cisco Express Forwarding and IP routing must be enabled on all participating routers.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bfd/configuration/15-mt/irb-15-mt-book/irb-bi-fwd-det.html

Question 2

Explanation

It is a general best practice to not mix TCP-based traffic with UDP-based traffic (especially Streaming-Video) within a single service-provider class because of the behaviors of these protocols during periods of congestion. Specifically, TCP transmitters throttle back flows when drops are detected. Although some UDP applications have application-level windowing, flow control, and retransmission capabilities, most UDP transmitters are completely oblivious to drops and, thus, never lower transmission rates because of dropping.

When TCP flows are combined with UDP flows within a single service-provider class and the class experiences congestion, TCP flows continually lower their transmission rates, potentially giving up their bandwidth to UDP flows that are oblivious to drops. This effect is called TCP starvation/UDP dominance.

TCP starvation/UDP dominance likely occurs if TCP-based applications is assigned to the same service-provider class as UDP-based applications and the class experiences sustained congestion.
Granted, it is not always possible to separate TCP-based flows from UDP-based flows, but it is beneficial to be aware of this behavior when making such application-mixing decisions within a single service-provider class.

Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/QoS-SRND-Book/VPNQoS.html

Therefore two UDP protocols that can cause TCP starvation are TFTP (UDP port 69) and SNMP (UDP port 161 & 162).

Question 3

Explanation

Policy-based routing (PBR) intercepts the packet after de-encapsulation on the incoming interface, before the router performs the CEF table lookup. PBR then chooses how to forward the packet using criteria other than the usual matching of the packet’s destination address with the CEF table. Therefore PBR does not affect the routing table or the data plane.

Question 4

Explanation

Traditionally, link state protocols despite of having full view of the database, never calculated a backup route. Loop-Free Alternate (LFA) aims to calculate a backup route that can be used to route traffic, in case of a failure of a directly connected link or node on primary path.

Shared Risk Link Groups (SRLG) refer to situations in which links in a network share a common fiber (or a common physical attribute). These links have a shared risk: when one link fails, other links in the group might also fail. Topology-Independent Loop-Free Alternate (TI-LFA) SRLG protection attempts to find the post-convergence backup path that excludes the SRLG of the protected link. All local links that share any SRLG with the protecting link are excluded.

Reference: https://www.cisco.com/c/en/us/td/docs/routers/asr9000/software/asr9k-r6-3/segment-routing/configuration/guide/b-segment-routing-cg-asr9000-63x/b-segment-routing-cg-asr9000-63x_chapter_01001.pdf

Note:

+ Linecard-disjoint: This prefers a backup route from an interface that is on another line card. This is also a special case of SRLG
+ Interface-disjoint: This means that repair path is over a different interface as compared to the interface used to reach destination via primary path. In case of point-to-point links, this condition is always met.

Question 5

Explanation

Answer A is not correct as we don’t want to disable telnet access.

Answer C is not correct because the “logging console debugging” command is equal to the “logging console 7” command, which was typed in the exhibit.

So there are only two answers left. We believe answer D is better because the “debug aaa authentication” command is used to see the AAA authentication messages. Therefore we have to enable AAA first via the “aaa new-model” command.

Note: The “logging console” is a default and hidden command. This command only appears if it is disabled (no logging console) so in fact it is currently enabled in this question.

Although we can use the “debug aaa authentication” with “aaa new-model” command but the debug would only show after entering the “aaa new-model” command”.

Question 6

Explanation

Flow exporters are created as separate components in a router’s configuration. Exporters are assigned to flow monitors to export the data from the flow monitor cache to a remote system such as a NetFlow collector.

As we can see the “flow exporter EXPORTER-1” was defined but it has not been used. We can use it inside a flow monitor. For example:

flow monitor FLOW-MONITOR-1
 record v4_r1
 exporter EXPORTER-1
 exit

Question 7

Comments (26) Comments
  1. Anonymous
    April 14th, 2020

    Hi
    Question 6:
    it was mentioned “don’t see debug messages when remote users log in.”
    a remote user means the user is connected by telnet/ssh. i think the correct answer is terminal monitor

  2. networktut
    April 14th, 2020

    @Anonymous: This question asked why “an administrator that is connected to the console …” so he is using the console port.

  3. Corona
    May 30th, 2020

    networktut, but that command is already supplied –> logging console 7
    so more correct seems terminal monitor

  4. c36
    June 9th, 2020

    The answer to question 5 is 100% to enable AAA via #aaa new-model command. I have even confirmed my judgement with a Lab and will happily provide the output if anybody needs to see it.

  5. RON BERSERKER
    June 26th, 2020

    Q5
    I’ve just passed the CCNP ENARSI exam, and in the exam the question doesn’t say: “R1(config)# do debug authentication”, instead it says: “R1(config)# do debug aaa authentication”.

    So the answer to the question 5 is: D Enter the aaa new-model configuration command.

    Good Luck!!!

  6. Heamgu
    June 30th, 2020
  7. Heamgu
    June 30th, 2020

    @RON that’s good that you pass your test, but bro you have to read the questions, analyze them and research, is not about just passing the exam, we have to learn the technologies and learn how to investigate (because nobody knows everything).

    In that question 5, they are referring to debug messages, is not about the AAA.
    The debug aaa authentication is just an example of a debug that is not showing any information because the user is connected remotely and R1 doesn’t have the logging monitor enabled, so to be able to see the debug in a remote login you have to enter the terminal monitor exec command.

    See the reference and READ:
    https://www.cisco.com/c/en/us/td/docs/routers/crs/software/system_monitoring/command/reference/b-sysmon-cr-crs/b-sysmon-cr-asr9k_chapter_0100.html#wp1325580768

  8. tozi
    August 7th, 2020

    Hi guys and networktut,

    did anyone knows final correct answer to Question 5 – B, C or D.

    thanks

  9. NETEngineer
    August 18th, 2020

    @networktut Q5 answer should be D. It should be do debug AAA authentication. So to enable this command (Which below to AAA commands) we have to use AAA new-model configuration commmand.https://www.geeksforgeeks.org/aaa-authentication-authorization-and-accounting-configuration-locally/

  10. chris123xyz
    September 18th, 2020

    Hi, in the picture @Q7 are two network with 192.168.12.0, maybe answer F is right.

  11. bobo
    November 23rd, 2020

    Hi @networktut , I belive on Q5 the correct answer is B. We need to have logging monitor 7 ( for the debug ) + terminal monitor//exec command , after we SSH we are writting terminal monitor.

  12. bobo
    November 23rd, 2020

    Actually no, The correct on is C. I didn`t saw it was logged over a Console.

  13. Q5 is terminal Monitor
    December 20th, 2020

    B. Terminal Monitor: My understanding of questions is admin should see who is logging in remotely after enabling terminal monitor.

    The function of terminal monitor is to enable the display of syslog messages on a terminal session (vty session). By default a terminal session does not display syslog messages. Terminal monitor enables the display (and terminal no monitor disables the display).

  14. Boa
    January 8th, 2021

    @networktut
    The correct answer for Question 5 is B, because A has nothing to do with – C is already enabled and D if AAA is enabled the “login local” command is no longer valid

  15. Question 7
    January 9th, 2021

    Is this not F

    There are two subsets with the same IP 192.168.12.0 ?

  16. abc123
    January 19th, 2021

    @networktut can you give an update for question 5? Per your comment above you stated its D but the answer is still showing C ?

  17. MasterROG
    March 3rd, 2021

    Q7 there are 2 “192.168.12.0” network, so the answer it’s not F?
    sorry for the English…

  18. Ariu
    April 5th, 2021

    https://www.cisco.com/c/en/us/td/docs/routers/crs/software/system_monitoring/command/reference/b-sysmon-cr-crs/b-sysmon-cr-asr9k_chapter_0100.html#wp1325580768
    says: To enable the display of debug command output and system logging (syslog) messages for the current terminal session, use the terminal monitor command in EXEC mode.

    So, networktut, you are not correct when you say:
    The “terminal monitor” command enables logging on your virtual terminal connection (telnet), not the console line

    For me the correct answer should be “Enter the terminal monitor exec command”

  19. Ariu
    April 5th, 2021

    Question 5 again – the correct answer can not be “Enter the logging console debugging configuration command” because we have the configuration “logging console 7”, which, according to https://www.cisco.com/c/en/us/td/docs/routers/crs/software/system_monitoring/command/reference/b-sysmon-cr-crs/b-sysmon-cr-asr9k_chapter_0100.html#wp3359494668__tab_1365648 is the same as logging console debugging

  20. rf
    April 11th, 2021

    Q5
    This question is poorly asked.

    I did some simulations to understand the possibilities and came to the conclusions below.

    When “debug anything” is enabled on a router, it will continue to display information locally, regardless of whether a remote user accesses the router.

    When a remote user accesses a router with “debug anything” enabled, they will not see the debug information on their screen by default. To see the outputs of the command, you must use the command “terminal monitor”.

    The “logging console” command is already enabled by default. When it is disabled, no output will appear regardless of whether access is local or remote.

    I understood that the statement asks how a remote access user can see the output of the debug command. In this case, he must use the command “terminal monitor”. The correct answer is B.

  21. fe007
    April 16th, 2021

    G5

    In my opinion, the correct answer is D.

    In my simulation test (consoled into a C7206VXR on EVE). There is no “debug authentication” command.

    I used “debug aaa authentication” and enabled aaa new-model. I was then able to see debug messages when telnetting to the router.

  22. Brozzo
    June 23rd, 2021

    NetworkTut, are these questions updated ?

  23. sunntzu
    April 4th, 2022

    Someone asked about #7
    When summarizing, you use the masks that gives you the LEAST amount of addresses possible while including the addresses needed to cover.

    If you use /20, you will have a 255.255.240.0. This would equal 240-256=16. Your subnets would be 0, 16, 24, 32 and so no. This would give you a range of 192.168.0.1 – 192.168.15.254

    If you use /32, you have 255.255.248.0. So, 248 – 256 = 8. Your subnets are 0, 8, 16, 24, and so no.

    Which option gives you the closest to the IP addresses in the picture without wasting or including unwanted addresses?

    Option 1 – 192.168.0.1 – 192.168.15.254
    or
    Option 2 – 192.168.8.1 – 192.168.15.254?

    Option 2, which is C

  24. NPIG
    May 29th, 2022

    @Networktut, for Question 5, the method applied on line vty is local.

    What is the point on enabling the aaa new-model since remote login users use the local database?

    I see the only correct answer left the -terminal monitor exec command

    Could you please review it?

  25. networktut
    May 30th, 2022

    @NPIG: Although we can use the “debug aaa authentication” with “aaa new-model” command but the debug would only show after entering the “aaa new-model” command”.

  26. NotTermMon
    September 19th, 2022

    Q5: Everyone, seriously… Go into any router via console and try to use terminal monitoring. It’s already enabled by default. You’ll get an error when issuing the command.

    Trust me. I have run into this many times at work just sanity checking why I’m not seeing messages in the off chance the version of IOS doesn’t have it enabled by default.