exam questions

Exam 300-410 All Questions

View all questions & answers for the 300-410 exam

Exam 300-410 topic 1 question 457 discussion

Actual exam question from Cisco's 300-410
Question #: 457
Topic #: 1
[All 300-410 Questions]



Refer to the exhibit. The company implemented uRPF to address an antispoofing attack. A network engineer received a call from the IT security department that the regional data center is under an IP spoofing attack. Which configuration must be implemented on R1 to resolve this issue?

  • A. interface ethernet0/0
    ip verify unicast reverse-path
  • B. interface ethernet0/1
    ip verify unicast reverse-path
  • C. interface ethernet0/0
    ip unicast RPF check reachable-via any allow-default allow-self-ping
  • D. interface ethernet0/1
    ip unicast RPF check reachable-via any allow-default allow-self-ping
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CiscoTerminator
2 months, 1 week ago
Selected Answer: A
why config on eth0/1 and not both or eth0/0? Since both ISP provide Internet access and hacker can come from any ISP link?
upvoted 1 times
...
XBfoundX
7 months, 3 weeks ago
wow one of my biggest mistakes there is just B I did not read regional datacenter there.... Wow... And also is that even the old output got uRPF. So please ignore........ ALL of this :D thank you
upvoted 1 times
...
XBfoundX
7 months, 3 weeks ago
It's B The other commands are not right ip verify unicast source reachable-via rx (new format strict mode) ip verify unicast source reachable via any (new format loose mode) Old format => ip verify unicast reverse-path
upvoted 3 times
...
[Removed]
9 months, 2 weeks ago
Selected Answer: B
B is corerct
upvoted 1 times
...
bk989
1 year, 1 month ago
"IP unicast RPF check is enabled" indicates that Unicast Reverse Path Forwarding (uRPF) is globally enabled on the device. This feature helps prevent source address spoofing by verifying that the source IP address of a packet received on an interface exists in the routing table and has a route back to the source. "Input features: uRPF" specifically indicates that uRPF is being applied as an input feature on that interface. This means that the uRPF check is actively being applied to packets received on that interface to verify their source addresses. In summary, while both statements relate to Unicast Reverse Path Forwarding, "IP unicast RPF check is enabled" is a global setting, and "input features: uRPF" specifies that uRPF is applied as an input feature on a specific interface. Hence we are not sure if e0/1 has uRPF enabled in this scenario.
upvoted 4 times
...
bk989
1 year, 3 months ago
look: With no ip verify on interface we see no urpf: LA#show cef int e0/0 Ethernet0/0 is up (if_number 3) Corresponding hwidb fast_if_number 3 Corresponding hwidb firstsw->if_number 3 Internet address is 10.1.1.2/24 ICMP redirects are always sent Per packet load-sharing is disabled IP unicast RPF check is disabled IP policy routing is disabled
upvoted 1 times
bk989
1 year, 3 months ago
moderator please delete I am wrong
upvoted 2 times
bk989
8 months, 2 weeks ago
ChatGPT: 1. "IP unicast RPF check is enabled" This phrase indicates that the global feature of uRPF has been turned on for the router or switch. When this feature is enabled, the device will perform RPF checks on incoming unicast packets. The specific mode of uRPF used (strict or loose) may vary and can be configured separately; however, this statement alone does not detail which mode is active. This application of uRPF is aimed at preventing IP address spoofing and ensuring that only packets coming from a valid source according to the routing table are accepted. .
upvoted 1 times
bk989
8 months, 2 weeks ago
ChatGPT: 2. "Input features: uRPF" This phrase usually appears in the context of interface configuration and indicates that the uRPF check is applied to the incoming traffic on a specific interface. "Input features" refer to the checks and policies applied to packets as they arrive on an interface. In this case, uRPF is being utilized as part of the traffic filtering and validation processes. This is more specific than just saying that RPF checks are enabled since it specifies that the uRPF process is being applied at the input level for incoming packets.
upvoted 1 times
bk989
8 months, 2 weeks ago
In some documentation i read only I seen "Input features: uRPF" specified, or "Input features: uRPF" specified. In my lab both are turned on. I will go with B. It seems 'less wrong' than A. Also question could be wrong.
upvoted 1 times
...
...
...
...
...
inteldarvid
1 year, 9 months ago
Selected Answer: B
o9ption corerct is B, is easy beacuse: the command is: #ip verify unicast source reachable-via any allow-self-ping (its works), and I can see in 0/0 interface 0/0 "input features: uRPF". I have only one option: Option "B"
upvoted 2 times
...
HungarianDish_111
1 year, 11 months ago
As uRPF is already enabled on both interfaces (see "ip unicast RPF check is enabled" under "show cef int"), it is hard to choose between "A" and "B".
upvoted 2 times
...
HungarianDish_111
1 year, 11 months ago
This is a vague question. uRPF is already enabled for both WAN interfaces, as shown in the output under show cef int ... (ip unicast RPF check is enabled) "ip verify unicast reverse-path" is the old command for strict mode. The new commands are recommended. Plus, it is a multihome environemnt, where loose mode would be appropriate instead of strict. "C","D": ip unicast RPF check reachable-via any allow-default allow-self-ping => allow-default + loose mode makes no sense on the internet facing interfaces. ip unicast RPF check reachable-via any allow-self-ping => Loose mode allowing local device to ping it's own interface would be OK, but it's not an option. Probably, in real exam we can choose both "A" and "B".
upvoted 1 times
HungarianDish_111
1 year, 11 months ago
ip unicast RPF check reachable-via any allow-default allow-self-ping https://learningnetwork.cisco.com/s/question/0D53i00000Kt5tDCAR/urpf-allowdefault Using loose mode with allow-default can in some (if not most) cases completely defeat the purpose of implementing uRPF at all. https://community.cisco.com/t5/other-security-subjects/urpf-with-default-route/td-p/1182324 having a default-route will pretty much negate the use of uRPF as the router will always have a path back to the source.
upvoted 1 times
HungarianDish_111
1 year, 11 months ago
https://www.cisco.com/c/en/us/td/docs/routers/asr920/configuration/guide/sec-data-urpf/17-1-1/b-sec-data-urpf-xe-17-1-asr920/b-sec-data-urpf-xe-17-1-asr920_chapter_01.pdf Loose Mode for dual-homed ISP -alleviates the interface dependency of strict mode
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago