Share your CCIE v5 Written Experience
Please share with us your experience after taking the CCIE v5 Written exam, your materials, the way you learned, your recommendations… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…
Note: There are some guys trying to sell workbook, videos or even group buy for CCIE exams in the comment section. Please be careful and double check everything before making your decision. Many of them are scammers and just sell old materials or steal your money.

@SDU @RSA
I would have accepted that answer if it said RSTP decodes…
Refer to the exhibit. Which two statements about the given NetFlow configuration are true? (Choose two)
A) It supports a maximum of 2048 entries
B) It supports only IPv4 flows
C) It supports both IPv4 and IPv6 flows
D) It supports only IPv6 flows
E) It uses the default port to send flows to the exporter
Help Me
Guy, Now there is a lot Dump, which i use 356Q , 202Q or 334Q.
I need help… 356 + 202 is enough ?
@DUMP
A. is the correct answer.
Rate Limiting
With some types of DoS attacks, there’s not much you can do to stop the flow of the attack, especially in a distributed DoS (DDos) attack in which the hacker is spoofing the source addresses and using an unsuspecting company or ISP as the reflector in the attack. Tracing this kind of attack to the hacker can be difficult.
In this situation, your first concern should be limiting the impact of the attack on your network, which can be done with rate limiting. Rate limiting enables you to assign a bandwidth restriction to a category of traffic, such as ICMP, UDP, or specific connection types. This section focuses on three solutions for rate limiting: ICMP rate limiting, committed access rate (CAR), and class-based policing (CBP) using Network-Based Application Recognition (NBAR).
TIP
Rate limiting is best used on the ISP’s router that connects to your network. In other words, if you are experiencing a flood attack that is saturating your Internet link, implementing rate limiting on your perimeter router will not do much good. Instead, you work with your ISP to put this in place on the ISP’s router. Rate limiting is something you configure to restrict the amounts of various outbound traffic. As an example, if you were a reflector in a Smurf attack, you could use rate limiting as a temporary solution to limit the flood of traffic that you are sending to a victim’s network. Of course, you will want to try to track down the culprit and stop the attack.
Which two statements about IS-IS authentication are true? (Choose two.)
A. if LSP authentication is in use, unauthorized devices can be form neighbor adjacencies.
B. Area and domain authentication must be configured on a per-interface basis.
C. Passwords can be configured on a per-interface basis.
D. Level 1 LSPs use the domain password.
E. Level 2 LSPs use the domain password encrypted inside the IS-IS PDU.
@Anonymous
Thanks
@DUMP
A,B
– Vision 5 default port is 9996….not 9995
– Vision 5 only use IPV4 addresses
Which PIM mode can forward traffic by using only (*.G) routing table entries?
A. dense mode
B. sparse-dense mode
C. sparse mode
D. bidirectional mode
hello i passed my ccie rs written. The 188 file exist and is valid. 99 of 100 questions we’re from that file. But there was a new question with QOS (Answer: Best effort …)
ccie rs written cleared. 188q is valid
If u need 188q then drop you mail id
@ dump
AC
@soul
B
@sdu rsa
B
I think some Chinese wants to spoile some name and i am soecified
They dint want premdev
Becaouse he came with less question and he is earning name as comare to chinese. And i heard that in other forum too. I got PM in other forum that spread bad news about him. And we will provide you free dumps
This is my real time experiance and i dont know who is right and who is wrong. But i am in certcollection and Chineese forum and I heard that news in PM on that forum.
Same mesg i got in both forum.
And one mist important thing is that you will see some fake post about me.and some real user really leave this forum after posting thier experiance but some fake user continuesly post as i said before
@SDU RSA
Which PIM mode can forward traffic by using only (*.G) routing table entries?
A. dense mode
B. sparse-dense mode
C. sparse mode
D. bidirectional mode
Bidirectional mode uses only shared tree which is (*,G)
@Prem, I found the answer it is not “B” but “D”
Packet Forwarding
A router only creates (*, G) entries for bidirectional groups. The olist of a (*, G) entry includes all the interfaces for which the router has been elected DF and that have received either an IGMP or PIM join message. If a router is located on a sender-only branch, it will also create (*, G) state, but the olist will not include any interfaces.
http://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fsbidir.pdf
Please share 188 questions and answers.
@SDU @RSA
Lets knock down more questions.
@SDU @RSA
For MST question what boggles my mind is this:
At the MST boundry, MST does not send MST bpdus. It only sends PVST and one instance special multicast destination addressed bpdu in order to support old CST.
So MST single bpdu does not make sense for the answer.
@ Anonymous what about this explanation then from
https://en.wikipedia.org/wiki/Spanning_Tree_Protocol
– MSTP is fully compatible with RSTP bridges, in that an MSTP BPDU can be interpreted by an RSTP bridge as an RSTP BPDU. This not only allows compatibility with RSTP bridges without configuration changes, but also causes any RSTP bridges outside of an MSTP region to see the region as a single RSTP bridge, regardless of the number of MSTP bridges inside the region itself.
AFAIK RSTP switches will not see MST bpdus and can not understand the format. When a MST switch at the RSTP/PVST/CST boundry it knows that it has to send pvst and cst bpdus.
That is why neither answer satisfies. freaking cisco.
Lol
Which two statements about IS-IS authentication are true? (Choose two.)
A. Level 2 LSPs transmit the password encrypted inside the IS-IS PDU.
B. Area and domain authentication must be configured together.
C. Passwords can be configured on a per-interface basis.
D. If LSP authentication is in use, unauthorized devices can form neighbor adiacencies.
E. Lever 1 LSPs use the domain password.
SDU @RSA
One of your answers says
A,B
– Vision 5 default port is 9996….not 9995
– Vision 5 only use IPV4 addresses
Can you please send the reference regarding to answer A..maximum 2048 entries
C and D
I don’t have reference for it, but if you remove all wrong answers it is the only 2 answers left.
Which two statements about default SNMP configuration are true.
A. The SNMP agent enabled.
B. SNMP trap receiver is configured.
C. All SNMP notification types are sent.
D. SNMP v1 is the default version
E. SNMP v3 is the default version.
SNMP is not enabled by default. When you enable SNMP default version is 1. SNMP agent is also enabled. Trap receiver is also configured.
R3#sh control-plane host open-ports
Active internet connections (servers and established)
Prot Local Address Foreign Address Service State
tcp *:23 *:0 Telnet LISTEN
udp *:18999 *:0 udp_transport Server LISTEN
udp *:161 *:0 IP SNMP LISTEN
udp *:162 *:0 IP SNMP LISTEN
udp *:50434 *:0 IP SNMP LISTEN
I think correct answers are A and B.
At least we are back to trying to answer questions and learning the technology, even if some of the questions are unrealistic….People should try to research and answer some of these, before just posting the questions……
@Jeff
We are posting some of the questions because they are difficult, it is not for fun. Maybe you must try to assist by answering them and stop complaining.
Passed today 945/1000
Used 207q
98q from 207q and 2 new
4 DD questions
Next target lab in Sep
@SDU @RSA Don’t get your pants in a bunch! If you looked back a page or two, you would see that I was assisting in answering. My comments here were complimentary not critical, that people were finally getting back to work.
Some of the “difficult” questions that you mentioned, could be fairly easily answered or narrowed down (not all) by just doing a search and reading a few snippets from cisco docs. I agree that some of the other questions are poorly written and open for discussion.
All I am saying, is that some people should do their due diligence first, before just posting a question for someone else to answer.
For yours kind information all above questions are not part of current exam pool
So do not waste yourvpreciuos time
at least it is good for learning concepts…..
Any one pass 400-251 CCIE Security written
{email not allowed}
raj.mumbai @ Hotmail com
guys who took the exam recently?
Any one pass 400-251 CCIE Security written
raj.mumbai3 @ Hotmail com
HHhhhhhhhhhhuuuuummmmmmmmmmmblbbbbbbbbbbbbbbbblllllllllllleeeeeeeeeeeeeeeeeeeeeeeeeee PPPPPPPPPPppppppppppppiiiiiiiiiiiieeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
– Humble Pie
CCIE_Expert
207 or 202q?
While I understand the focus on passing a specific exam, the larger picture is simply knowing networking.
To take a few recent examples from here, how can a Cisco-focused network engineer not know the default state of SNMP on Cisco gear? How can any network engineer not know how TCP works? How can an expert-level network engineer not know how IS-IS works? And assuming such a person exists, how long will they be employed in the real world? It’s not multiple-choice format out there, you know!
Hello please somebody help!!!
I need New DUMPs for my CCIE 400-101 exam. can somebody give me download link.
@ Prem
{email not allowed}
@ Prem
frappelias @ protonmail . com
207
Ooppss solution 207q