Home > Share your CCIE v5 Written Experience

Share your CCIE v5 Written Experience

June 1st, 2015 in CCIE v5 Written Go to comments

Please share with us your experience after taking the CCIE v5 Written exam, your materials, the way you learned, your recommendations… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…

Note: There are some guys trying to sell workbook, videos or even group buy for CCIE exams in the comment section. Please be careful and double check everything before making your decision. Many of them are scammers and just sell old materials or steal your money.

Comments (50) Comments
Comment pages
1 206 207 208 209 210 311 522
  1. Prabhat
    January 11th, 2019

    @Ebrahem thank you dumps. cheers !!!!

  2. Anonymous
    January 11th, 2019

    @ prabhatrahul
    @ barsoom1980
    @ ccienzir
    @ jorge.moreno.cuenca
    Could you resend me doctoralban(*)yahoo.com file from Ebrahem?
    Thank you!

  3. Help!
    January 11th, 2019

    Which feature must be enabled so that an IS-IS single topology can support IPv6 traffic?
    A. New-style TLVs only
    B. Adjacency checking
    C. Old-style TVLs only
    D. Extended metrics
    E. Both new-and old-style TLVs

  4. Ebrahem
    January 11th, 2019

    @ doctoralban
    @ MarkBaldino
    @ lybtas
    @ rizwan.cyber
    @ bhupendra.chauhan11
    @ eadgwind
    @ joker5611
    @ eddyventure2

    check your emails 🙂

    good luck

  5. Thomas Frach
    January 11th, 2019

    @Noriyuki Sato

    Congrats!

    Would you like to share that 103q PassLeader 400-101 dumps with me?

    Thomas Frach @ ostertag com

    Thanks a lot!

    ~~~~~~~~~~

    @Noriyuki Sato

    Congrats!

    Would you like to share that 103q PassLeader 400-101 dumps with me?

    Thomas Frach @ ostertag com

    Thanks a lot!

    ~~~~~~~~~~

    @Noriyuki Sato

    Congrats!

    Would you like to share that 103q PassLeader 400-101 dumps with me?

    Thomas Frach @ ostertag com

    Thanks a lot!

  6. Anonymous
    January 11th, 2019

    @Ebrahem Thank you very much!

  7. GKK
    January 11th, 2019

    Hello,

    Can you please provide a link to check the question BGP PIC?

  8. Aziz
    January 11th, 2019

    @Ebrahem couls you send Dump ?
    iconatstore @ gmail com
    thank you

  9. Bob
    January 11th, 2019

    Hi

    @Ebrahem may I please have the dumps?
    cciehelpme24 @ outlook com

  10. Tim
    January 11th, 2019

    @GKK

    https: // www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-3s/irg-xe-3s-book/irg-bgp-mp-pic. html

  11. Anonymous
    January 11th, 2019

    @Ebrahem

    Can you please send me the 103Q dump and 100Q update
    on johngee @ trashmail.com

    God bless you!

  12. GKK
    January 11th, 2019

    Hello Tim,
    I cannot spot the correct answers in this link. Thanks anyway.
    Which are the correct?

  13. J00p
    January 11th, 2019

    Hello Ebrahim,

    Can you send me aswell?
    Seriously, thanks alot

    amparo35 @ 0box.eu

  14. Ebrahem
    January 11th, 2019

    @ johngee
    @ cciehelpme24
    @ iconatstore

    check your emails 🙂

    good luck

  15. Anonymous
    January 11th, 2019

    @ amparo35

    check your email 🙂

    Good luck

  16. Erez Baruch
    January 12th, 2019

    @Noriyuki Sato

    Congrats!

    Would you like to share that 103q PassLeader 400-101 dumps with me?

    Erez Baruch @ naver com

    Thanks a lot!

    ~~~~~~~~~~

    @Noriyuki Sato

    Congrats!

    Would you like to share that 103q PassLeader 400-101 dumps with me?

    Erez Baruch @ naver com

    Thanks a lot!

    ~~~~~~~~~~

    @Noriyuki Sato

    Congrats!

    Would you like to share that 103q PassLeader 400-101 dumps with me?

    Erez Baruch @ naver com

    Thanks a lot!

  17. RIZWAN
    January 12th, 2019

    anyone preparing for LAB?

  18. ccie
    January 12th, 2019

    @Ebrahem

    Can you please send me all dumps
    on rbi.free.game @ gmail.com

    God bless you!

  19. Dominic
    January 12th, 2019

    @Ebrahem

    please send CCIE written dumps

    dominic.brown1030 @ gmail.com

  20. sa10
    January 12th, 2019

    Ebrahim 268Q
    All!! Could you please check and correct following Q
    Thanks
    Q5
    Which statement about PMTUD is true?
    A. It is supported by TCP and UDP.
    B. GRE tunnels use PMTUD to fragment data packets by default.
    C. It is used to prevent fragmentation of packets at the endpoint of a TCP connection.
    D. It is used to prevent fragmentation of packets traveling across a smaller MTU link between two endpoints.
    E. It increases the connection’s send MSS value to prevent fragmentation.
    A or D

    Q24
    What is a major disadvantage of virtual machines versus containers?
    A. Boot time
    B. Security
    C. Operational Management
    D. Limited management tools
    E. Vendor lock-in
    B or A

    Q31
    Which two statements about MSDP are true? (Choose two)
    A. It requires multicast sources to be in the same domain.
    B. It uses 32-bit anycast RP addresses.
    C. It uses loopback interfaces for anycast RP addresses.
    D. It uses UDP to establish peering sessions.
    E. All MSDP domains on a given network can share a common RP.
    F. It requires multicast receivers to be in the same domain.
    A, E or BC
    Q62
    Which two statements about MSDP are true? (Choose two)
    A. It interconnects PIM-SM domains
    B. It is supported both for IPv4 and IPv6 multicast deployments
    C. It is encapsulated into PIM packets
    D. MPLS is required to establish MSDP peering
    E. MSDP peers are established using multiprotocol BGP
    F. It is encapsulated into UDP segments
    A, E or C,F

    Q32
    Which two statements about 802.1 x authentications with EAP are true? (Choose two)
    A. The supplicant and authenticator server send a one-time password to the authenticator
    B. The authenticator server translates frames from the supplicant into a RADIUS message
    C. The authenticator can cache the username and password from the authentication server to reduce traffic
    D. The interface passes only EAPOL traffic until the client is authenticated
    E. It uses EAPOL frames between the supplicant and the authenticator
    C D or D,E
    Q49
    Which two statements about root guard are true? (Choose two)
    A. It allows unknown devices to participate in STP
    B. It automatically re-enables blocked ports
    C. It requires the administrator to manually re-enable ports that have been blocked
    D. It supports the errdisable-timeout command
    E. It automatically error-disables a port when PortFast is enabled
    F. It blocks BPDUs from unknown devices
    C, D or A,B

    Q145
    Which three types of behavior does an OSPFv3 Ipv6 AF-capable router exhibit when a non-AF-capable router attempts to form an adjacency? (Choose three)
    A. Hellos are not allowed
    B. DBDs are honored
    C. LSAs are not honored
    D. LSAs are honored
    E. Hellos are honored
    F. DBDs are not honored
    C, E, F or B,D, E
    Q150
    Which three connectivity models for vEdge Site Architecture are true? (Choose three)
    A. Augmentation model
    B. Hybrid with FallBack
    C. Secure tunnel
    D. Secure virtual connectivity
    E. Cloud provider
    F. Full SD-WAN
    B, C, E or B,D, F

  21. Tim
    January 12th, 2019

    @sa10

    These are my picks:

    Q150. BDF
    Q145. BDE
    Q49. AB
    Q32. DE
    Q62. AE
    Q24. I think that both are right, but I will shoose A
    Q31. BC
    Q5. D

    good luck!

  22. GKK
    January 12th, 2019

    @Tim

    Hello Tim, What do you think for the below Q?

    Avoid TCP Starvation/ UDP Dominance

    A) place UDP traffic in a dedicated traffic class with the bandwidth keyword configured
    or
    D) WRED to balance TCP & UDP utilization.

  23. eadgwind
    January 12th, 2019

    @Ebrahem thank you dumps. thank you

  24. Tim
    January 12th, 2019

    @GKK

    answer: A

    WRED can not do anything regarding UDP traffic.

  25. GKK
    January 12th, 2019

    Thank you Tim! Your contribution is valuable.

  26. Tim
    January 12th, 2019

    What are the right answers? Any idea?

    1) When is MAC authentication bypass enabled by default?
    A. When two-factor authentication is configured.
    B. After 802.1x authentication verifies the client’s identity.
    C. When 802.1x authentication fails.
    D. When 802.1x authentication times out.

    2) Which two statements about QoS marking are true? (Choose two)
    A. The set-discard-class command can be configured for ATM and MPLS protocols
    B. It can use a table map to mark traffic
    C. It requires Cisco Express forwarding to be enabled on the sending interface and the receiving interface
    D. It is supported on tunnel interfaces
    E. It is supported on Fast EthernetChannel and ATM SVC interfaces

  27. sa 10
    January 12th, 2019

    Thanks Tim
    What are the right answers? Any idea?

    1) When is MAC authentication bypass enabled by default?
    A. When two-factor authentication is configured.
    B. After 802.1x authentication verifies the client’s identity.
    C. When 802.1x authentication fails.
    D. When 802.1x authentication times out.
    my ans: d

    few more Q need to check

    Ebrahim 268Q

    QUESTION 147
    Refer to the exhibit. Which two statements about the network environment must be true? (Choose
    two.)
    A. The applet runs before any commands are executed
    B. If the administrator enters the show ip ospf neighbor GigabitEthernet0/1 command, the output
    is blank
    C. The applet runs only after OSPF neighbors are verified
    D. A BGP neighbor relationship is established over GigabitEthernet0/1
    E. An OSPF neighbor relationship is reestablished when the interface recovers.
    Correct Answer: AB
    QUESTION 110
    Refer to the exhibit. When a question mark is entered after bgp bestpath, only three options are
    visible. Which two BGP hidden options for the bgp bestpath command are valid? (Choose two.)
    A. bgp bestpath compare-all
    B. bgp bestpath as-path ignore
    C. bgp bestpath localpref ignore
    D. bgp bestpath as-path multipath relax
    Correct Answer: BDor CD
    QUESTION 572 q21/182
    Which two configuration options are available for PIM snooping? (Choose two.)
    A. globally on the device
    B. under the VLAN in VLAN configuration mode
    C. under the SVI for the corresponding VLAN
    D. on a specific interface on the device
    E. on a range of interfaces on the device
    Correct Answer: CE
    QUESTION 201
    What are two functions of IGMP snooping? (Choose two.)
    A. Enabling hosts in a UDLR environment to join a multicast group sourced from an upstream
    network.
    B. Learning and maintaining multicast group memberships at the Layer 2 level.
    C. Constraining multicast traffic to VPLS interfaces.
    D. Determining the ports that should receive multicast traffic from certain sources or groups.
    E. Restricting multicast packets for IP multicast groups that have downstream receivers.
    Correct Answer: BD or cd
    Q1
    Which two statements about Metro Ethernet services are true? (Choose two.)
    A. EVPL uses point-to-point EVCs between pairs of NNIs.
    B. EVP-Tree provides root-to-lead and leaf-to-leaf connectivity, preventing root-to-root connectivity.
    C. EPL provides a point-to-multipoint service.
    D. EVP-LAN provides point-to-point connectivity.
    E. EP-LAN provides a single multipoint LAN service to attached customer locations.
    F. EVPL uses 802.1Q tagging to differentiate between multiple private lines on an UNI.
    Correct Answer: EF
    QUESTION NO. 198
    Which two statements about Cisco HDLC are true? (Choose two)
    A. Cisco HDLC supports authentication of peering routers on the same HDLC link
    B. Cisco routers can carry multiple network-layer protocols simultaneously over the same HDLC link
    C. Cisco HDLC allows bundling of multiple links between the same pair of routers into a faster communication channel
    D. Cisco HDLC allows routers to negotiate the supported network-layer protocols before sending their packets over an HDLC link
    E. Cisco HDLC is the default encapsulation on serial and dialer interfaces
    F. Cisco HDLC is the preferred protocol in multi-vendor environments
    Answer: A, B
    QUESTION NO. 147

    Refer to the exhibit. Which two statements about the network environment must be true? (Choose two)
    A. If the administrator enters the show ip ospf neighbor GigabitEthernet0/1 command, the output is blank
    B. The applet runs before any command are executed
    C. An OSPF neighbor relationship is reestablished when the interface recovers
    D. The applet runs only after OSPF neighbors are verified
    E. A BGP neighbor relationship is established over GigabitEthernet0/1
    Answer: A, B or ad
    QUESTION NO. 218

    Refer to the exhibit.Which two statements about the output are true?(Choose two)
    A. BFD is active on interface GigabitEthernet0/3 and is using UDP
    B. BFD is active on interface GigabitEthernet0/3 and is using ICMP
    C. BFD last failed 476ms ago on interface GigabitEthernet 0/3.
    D. BFD is active for BGP on RT1.
    E. BGP on RT1 has negotiated the BFD capability with its peer.
    Answer: DE
    QUESTION NO. 257

    Refer to the exhibit. The main 1 and branch 1 switches are connected directly over an MPLS pseudowire, and both run UDLD. After router B1 reloads because of a power failure the pseudowire is restored, however the branch 1 switch is unable to reach the main 1 switch.
    Which Two action can you take to restore connectivity and prevent the problem from recurring? (Choose two.)
    A. Configure a backup GRE tunnel between the main1 and branch1 switches.
    B. Configure a backup pseudowire between the main1 and branch1 switches.
    C. Issue the shutdown and no shutdown command on both the branch 1 switch uplink to the B1 router and the main 1 switch’s uplink to the M1 router.
    D. Enable errdisable recover on both the main 1 and branch 1 switches.
    E. Issue the shutdown and no shutdown commands on the branch 1 switch uplink to the B1 router only.
    F. Enable UDLD recover on both the main 1 and Branch 1 switches.
    Answer: D,E

    QUESTION 164
    Which two statements about HDLC are true? (Choose two.)
    A. It supports clear-text authentication
    B. It supports both synchronous and asynchronous serial links
    C. The packet header contains the control field and address
    D. It is a frame-oriented data link layer protocol
    E. It guarantees error-free transmission
    Correct Answer: CD

    Thanks

  28. GKK
    January 12th, 2019

    @Tim
    I will choose the below
    1.c
    2.a,d

  29. GKK
    January 12th, 2019

    A host on an Ethernet segment has different subnet than the GW. What can be done to allow communication outside the subnet?

    Is proxy-ARP the correct?

  30. scsrtr
    January 12th, 2019

    @Ebrahem

    Can you please send me the 103q dumps to scsrrs16 @ gmail.com

    Thank you in advance.
    congrats by the way 🙂

  31. GKK
    January 12th, 2019

    @sa 10

    Which two configuration options are available for PIM snooping? (Choose two.)
    A. globally on the device
    B. under the VLAN in VLAN configuration mode
    C. under the SVI for the corresponding VLAN
    D. on a specific interface on the device
    E. on a range of interfaces on the device

    I would choose a,c.

    ====

    Refer to the exhibit.Which two statements about the output are true?(Choose two)
    A. BFD is active on interface GigabitEthernet0/3 and is using UDP
    B. BFD is active on interface GigabitEthernet0/3 and is using ICMP
    C. BFD last failed 476ms ago on interface GigabitEthernet 0/3.
    D. BFD is active for BGP on RT1.
    E. BGP on RT1 has negotiated the BFD capability with its peer.

    I vote for a,d

    From cisco:

    BFD Source and Destination Ports
    BFD payload control packets are encapsulated in UDP packets, using destination port 3784 and source port 49152. Even on shared media, like Ethernet, BFD control packets are always sent as unicast packets to the BFD peer.

    Echo packets are encapsulated in UDP packets, as well, using destination port 3785 and source port 3785.

    ===

    Refer to the exhibit. When a question mark is entered after bgp bestpath, only three options are
    visible. Which two BGP hidden options for the bgp bestpath command are valid? (Choose two.)
    B. bgp bestpath as-path ignore
    D. bgp bestpath as-path multipath relax

    ====

  32. GKK
    January 12th, 2019

    A host on an Ethernet segment has different subnet than the GW. What can be done to allow communication outside the subnet?

  33. Tim
    January 12th, 2019

    @sa10 @GKK

    Refer to the exhibit.Which two statements about the output are true?(Choose two)
    A. BFD is active on interface GigabitEthernet0/3 and is using UDP
    B. BFD is active on interface GigabitEthernet0/3 and is using ICMP
    C. BFD last failed 476ms ago on interface GigabitEthernet 0/3.
    D. BFD is active for BGP on RT1.
    E. BGP on RT1 has negotiated the BFD capability with its peer.

    I would choose: D, E.

    Actually they are asking what you can find about output, and you can see that BGP is registered protocol, and that it is negotiated capability with his peer (routers agreed to use BFD version 1, with no echo function). You are right, BFD is using UDP as stated in RFC 5881, but you can not see this info on presented output (you have to read RFC to find it out).

  34. Ebrahem
    January 12th, 2019

    @ rbi.free.game
    @ dominic.brown1030
    @ scsrrs16

    check your emails 🙂

    good luck

  35. Tim
    January 12th, 2019

    @Anonymous

    Why did you copied GKK’s answer? I already saw it, and replied to it.

    Do you have your opinion or not?

  36. GKK
    January 12th, 2019

    Hello all,

    Can someone answer the below?

    A host on an Ethernet segment has different subnet than the GW. What can be done to allow communication outside the subnet?

    I cannot find any source on internet regarding this topic

  37. GKK
    January 12th, 2019

    Dear Tim,

    I would like to kindly ask you how do you derive from the “routers agreed to use BFD version 1, with no echo function” printout that BGP has negotiated the parameters of the BFD session. From my research I can see that when echo function is disabled this merely means that the BFD is offloaded to hardware. I also suppose that BFD is responsible for the negotiation.

    Looking forward to see your view.

  38. GKK
    January 12th, 2019

    Hi all,

    If Router1 sends traffic with IP precedence=1 to another router2, what is the traffic class on R2?

    a. af31 (10)
    b. af32 (12)
    c. af33 (14)
    d. default

    ?

  39. GKK
    January 12th, 2019

    The tricky question is like this:

    Refer to the exhibit. If router R1 sends traffic marked with IP precedence 3 to R2’s Loopback address.Which class would the traffic match on R2’s Gi1/0 interface?
    A. CM-CLASS-1
    B. class-default
    C. CM-CLASS-3
    D. CM-CLASS-2

    A or B??
    I vote for B. IP precedence 3 is cs3 (011000). So no traffic will be matched by the manually defined classes and will go to the automatically created class-default.

  40. GKK
    January 12th, 2019

    Hello,

    Which feature must be enabled so that an IS-IS single topology can support IPv6 traffic?
    A. New-style TLVs only
    B. Adjacency checking
    C. Old-style TVLs only
    D. Extended metrics
    E. Both new-and old-style TLVs

    I believe that both D & A are correct, so its hard to choose. What is your opinion?

    When single-topology support for IPv6 is being used, either old- or new-style TLVs may be used. However, the TLVs used to advertise reachability to IPv6 prefixes use extended metrics. Cisco routers do not allow an interface metric to be set to a value greater than 63 if the configuration is not set to support only new-style TLVs for IPv4. In single-topology IPv6 mode, the configured metric is always the same for both IPv4 and IPv6.

  41. Tim
    January 12th, 2019

    @GKK

    New-style TLV ONLY, is not right, because document said “EITHER old- or new-style TLVs may be used”

    Regarding BFD question I must admit that your answers are the right ones. BGP is not responsible for BFD negotiation. My mistake.

    Class-default is right.

  42. Liverpool
    January 13th, 2019

    @Ebrahem could you please send me the latest Dumps ?
    ali80_hassan @ yahoo . com
    thank you

  43. Tanvee
    January 13th, 2019

    @Ebrahem , Kindly share with me Q103 on: tanveerkbi at gmail dot com. I have exam in few days. Thanks in advance

  44. GKK
    January 13th, 2019

    @Tim

    My interpretation is as follows:
    TLVs for IPv6 must use extended interface metrics. In order to support extended metric for an interface Cisco says that configuration should be set to support only new-style TLVs for IPv4. So I conclude that the feature to be enabled is “new-style TLVs”. What do you think?

    ==

    Which PIM feature allows the same multicast group address to be reused in different administrative domains?
    A. Proxy Registering
    B. IP Multicast Helper
    C. IP Multicast Boundary
    D. CGMP

    I vote for C although all dumps have “ip multicast helper” as the answer.

    You can set up an administratively scoped boundary on an interface for multicast group addresses using the ip multicast boundary command with the access-list argument. A standard access list defines the range of addresses affected. When a boundary is set up, no multicast data packets are allowed to flow across the boundary from either direction. The boundary allows the same multicast group address to be reused in different administrative domains.

    ====

    Which type of QoS is used on the CE device to rate-limit the aggregate traffic towards the WAN Ethernet circuit?
    A. FIFO
    B. CBWFQ
    C. LLQ
    D. WRED

    Which one can do rate-limiting and how?

    ===

    What is the initial BFD state?
    A. Up
    B. Down
    C. Init
    D. AdminDown

    I vote for C, although dumps have another answer.

    ==

    Which two statements about route summarization are true?
    A. It can be disabled in RIP, RIPv2, and EIGRP
    B. EIGRP and RIPv2 route summarization are configured with the ip summary-address command under the route process
    C. EIGRP can summarize routes at the classful network boundary
    D. RIPv2 can summarize routes beyond the classful network boundary

    Is C the Answer?

    ===

  45. GKK
    January 13th, 2019

    @New Questions

    Regarding the below:

    Which three challenges of adopting hybrid cloud model are true? (Choose three)

    A. security
    B. speed to market
    C. cloud management
    D. unified user experience
    E. operational cost
    F. innovation

    Correct Answer: ACE. Why E and not D? Do you have a link to share?

  46. Help
    January 13th, 2019

    One of your clients which is in the manufacture area, is after a solution in order to manage all his fog nodes. Which management tools best suits his needs?
    A.Cisco Fog Director
    B.Cisco Connected Grid Network Management System
    C.Cisco Prime Infrastructure
    D.Cisco Network Control System

    A or C

  47. GKK
    January 13th, 2019

    @Help

    C

    Manufacturers manage their fog nodes using Cisco Prime Infrastructure.

    https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-solutions.pdf

    What is your opinion? Could you pls also see my questions above?

    Thanks

  48. Muhammad Talha
    January 13th, 2019

    Passed the 400-101 exam few days ago!

    9xx/1000 POINTS!

    Only learned that NEW PassLeader 400-101 dumps with 103 Q&As.

    Still 100% accurate!

    All questions were from PassLeader, valid enough for passing!

    Trying the PassLeader 400-101 dumps ASAP, all guys!

    Good luck!!

  49. Hiko
    January 13th, 2019

    @Muhammad Talha

    congratulation
    how many Question did you got ? and How many D&D ?

  50. Saeed
    January 13th, 2019

    Help me guys

    Which two statements about Metro Ethernet services are true? (Choose two)
    A. EP-LAN provides a single multipath LAN services to attached customers locations.
    B. EPL provides a point-to-multipoint service
    C. EVP-Tree provides root-to-leaf and leaf-to-leaf connectivity, preventing root-to-root connectivity
    D. EVPL uses point-to-point EVCs between pairs of NNIs
    E. EVP-LAN provides point-to-point connectivity
    F. EVPL uses 802.1Q tagging to differentiate between multiple private lines on an UNI
    Answer: AF but other dump said A & E


  51. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 206 207 208 209 210 311 522
Add a Comment

CAPTCHA Image
Reload Image