CCIE SP Flashcards

1
Q

A service provider is implementing Ethernet solutions for clients that are not being provisioned within the MPLS core network. Which solution allows the Service Provider to complete Ethernet circuit provisioning in this scenario?

A. L2TPv3
B. VPLS
C. AToM
D. PPPoE

A

L2TPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QUESTION NO: 2
Which is the main characteristic of LTE architecture comparing to other mobile architectures?

A. Provides supports to deploy Layer 3 MPLS VPN model, where other mobile architectures do
not support.
B. Offers node redundancy with the static route configured on the IP NodeB using the
HSRP/VRRP virtual ip address.
C. Provides a simpler, less hierarchical model with the capability of simplistically distributing the
core gateways.

A

Provides a simpler, less hierarchical model with the capability of simplistically distributing the core gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QUESTION NO: 3
A Service Provider is offering VoIP services and a service level agreement to customers. Which configuration provides validation to customers that the service level agreement has been honored?
A. ipsla 999 udp-jitter 209.165.200.225 1000codec g729a tos 160
ipsla schedule 999 life forever start-time now
B. ipsla 999 icmp-jitter 209.165.200.225 tos 160
ipsla schedule 999 life forever start-time now
C. ipsla 999 icmp-jitter 209.165.200.225 tag VoIP-SLA
ipsla schedule 999 life forever start-time now
D. ipsla 999 udp-jitter 209.165.200.225 1000 codec g729a tag VoIP-SLA
ipsla schedule 999 life forever start-time now

A

ipsla 999 udp-jitter 209.165.200.225 1000 codec g729a tag VoIP-SLA ipsla schedule 999 life forever start-time now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QUESTION NO: 4
A telecom company offers ISPs the ability to resell dynamic IP broadband services over its local loops, but it does not allow the resellers to install broadband network gateways. If an ISP wants to become a reseller but is unable to use NHRP, which tunneling protocol should be implemented?

A. IP in IP
B. IPsec
C. L2TP
D. GRE

A

L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The vrf MAINT has been provisioned and used by the Service Provider management network. The engineer discovers that syslog messages are not being received on the syslog server. IP reachability has been validated using ping. Which issue in the configuration must be corrected?

A. logging onmust include thevrf MAINTkeyword.
B. logging hostmust include thevrf MAINTkeyword.
C. The logging facility must be configured for syslog processing.
D. The route targets that are configured do not match the route distinguisher

A

logging host must include the vrf MAINTkeyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ntp server 10.0.1.1
ntp server 10.0.2.1
ntp server 10.0.3.1
ntp server 10.0.4.1

A service provider has multiple time sources in the environment for NTP. The time source at
10.0.4.1 is intended to be seen as a primary time source. What command can be issued on PE4 to
fix the configuration, ensuring the proper NTP source will be issued?
A. ntp peer 10.0.4.1
B. ntp peer 10.0.4.1 prefer
C. ntp server 10.0.4.1 source GigabitEthernet0/0
D. ntp server 10.0.4.1 prefer

A

ntp server 10.0.4.1 prefer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QUESTION NO: 7
Which are the three benefits of using the Yang model? (Choose three.)
A. Reduce lab footprint
B. Improve access to resources
C. Support interoperabilitythat provides a standard way to model management data
D. Support simplified network management applications
E. Provide a scale virtual lab environment
F. Support programmatic interfaces

A

Support interoperability that provides a standard way to model management data
Support simplified network management applications
Support programmatic interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION NO: 8
Refer to the exhibit. How will the redistributed routes on R1 from EIGRP into OSPF be installed in the R4 routing table?

A. as a default route with an E2 route type
B. as a default route with an IA route type
C. as specific routes with an E2 route type
D. as specific routes with an N2 route type
E. as a default route with an N2 route type

A

as a default route with an IA route type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IEEE 802.1ag Coonectivity Fault Management

Link layer OAM
Ethernet Local Management Interface
SG 13 Y 1731 Requirement for OAM in Ethernet Networks
VPLS OAM
Service Layer OAM
A

Service layer OAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Service Provider provides a Layer 2 connection that is based on IEEE 802.1ad. When the customer tries to access a switch at the other side of the link by using SSH, the connection fails.

What is the cause of this failure?
A. The Service Provider omitted the commandl2protocol-tunnel stp.
B. The Service Provider omitted the commandl2protocol-tunnel vtp.
C. The Service Provider omitted the commandvlan dot1q tag native.
D. The Service Provider omitted the commandspanning-tree bpdufilter enable.

A

The Service Provider omitted the command vlan dot1q tag native

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In an MPLS VPN environment, the QoS marking over the MPLS backbone must be different from the one that is received from the customer. The forwarding on the egress PE is based on the marking that is set by the ingress PE. Which null label and QoS mode can achieve this?

A. MPLS explicit null with pipe mode
B. MPLS implicit null with short pipe mode
C. MPLS implicit null with uniform mode
D. MPLS explicit null with uniform mode
E. MPLS explicit null with short pipe mode
F. MPLS implicit null with pipe mode

A

MPLS explicit null with pipe mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An engineer is deploying RTBH. What is necessary routing constraint required for successful implementation?

A. The trigger device must have an iBGP session with all the clusters/route reflectors in the
autonomous system.
B. The trigger device must redistribute the static route pointing to a null interface into the IGP
process.
C. Theno ipreachablescommand must be issued on the PE router interface under attack.
D. The attacker’s destination IP address must be routed to a null interface.
E. The eBGP sessions need to set the next-hop attribute value to the trigger device loopback
interface.

A

The trigger device must have an iBGP session with all the clusters/route reflectors in the autonomous system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Refer to the exhibit.

ABC and XYZ MPLS VPN customers are accruing Internet access. Both CEs are sending traffic to
the Internet. Which statement about their connectivity is true?
A. Both CEs will have connectivity.
B. Only CE-XYZ will have connectivity.
C. Neither CEs will have connectivity, as both CEs are using the same NATed subnet.
D. Only CE-ABC will have connectivity.
E. Neither CEs will have connectivity, as IAR does not have route back tothe NATed subnet

A

Only CE-ABC will have connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Drag and drop the IOS XR NTP access group options on the left to the right from the least restrictive (top) to the most restrictive order (bottom).

peer
query-only
serve
serve-only

A

peer
serve
serve-only
query-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Cisco IOS XR Virtualization technology provides full isolation between virtualized routing instances for extra control plane resources?

A. HVR
B. SVR
C. SDR
D. DRP

A

SDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An engineer wants to configure MPLS TE Fast Reroute with link protection on five routers. Which
methodology can reduce configuration on the point of the local repair router and successfully complete the task?

A. Configure a backup tunnel on the PLR.
B. Enable the autotunnel backup feature.
C. Configure a backup tunnel on the tunnel headend router.
D. Enable the autotunnel primary feature.

A

Enable the autotunnel backup feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Refer to the exhibit. An MPLS Layer 3 VPN service has been provisioned for a customer. What will be the ToS value at Site-B for the exceeded traffic that it is sent from Site-A with ToS 2?

A. 0
B. 2
C. 3
D. 4
e. No exceeded traffic will reach Site-B.
A

No exceeded traffic will reach Site-B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is NETCONF?

A. It is a standard for installing, manipulating and deleting configuration of network devices.
B. it is a Cisco proprietary solution to help remove the time, cost and manual steps involved in
network element configuration.
C. It is data modeling language, to help remove the time, cost and manual steps involved in
network element configuration.
D. It is a new recommendation which writes device specific CLI scripts while keeping flexibility in a
vendor dependence environment.

A

It is a standard for installing, manipulating and deleting configuration of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

QUESTION NO: 19 DRAG DROP
Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right.

HSS

A) Concatenation of HLR and AuC
B) in charge of all the Control Plane functions related to subscriber
c) manages the service policy and sends QoS setting information
d) termination point of the pocket data towards the PDN
e) termination point of the pocket data interface towards E-UTRAN

A

Concatenation of HLR and AuC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

QUESTION NO: 19 DRAG DROP

Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right.

MME

A) Concatenation of HLR and AuC
B) in charge of all the Control Plane functions related to subscriber
c) manages the service policy and sends QoS setting information
d) termination point of the pocket data towards the PDN
e) termination point of the pocket data interface towards E-UTRAN

A

in charge of all the Control Plane functions related to subscriber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

QUESTION NO: 19 DRAG DROP
Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right.

PCRF server

A) Concatenation of HLR and AuC
B) in charge of all the Control Plane functions related to subscriber
c) manages the service policy and sends QoS setting information
d) termination point of the pocket data towards the PDN
e) termination point of the pocket data interface towards E-UTRAN

A

manages the service policy and sends QoS setting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

QUESTION NO: 19 DRAG DROP
Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right.

PDN GW

A) Concatenation of HLR and AuC
B) in charge of all the Control Plane functions related to subscriber
c) manages the service policy and sends QoS setting information
d) termination point of the pocket data towards the PDN
e) termination point of the pocket data interface towards E-UTRAN

A

termination point of the pocket data towards the PDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

QUESTION NO: 19 DRAG DROP
Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right.

Service GW

A) Concatenation of HLR and AuC
B) in charge of all the Control Plane functions related to subscriber
c) manages the service policy and sends QoS setting information
d) termination point of the pocket data towards the PDN
e) termination point of the pocket data interface towards E-UTRAN

A

termination point of the pocket data interface towards E-UTRAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which BGP feature improves the convergence and response time to adjacency changes with BGP
neighbors?

A. reducing BGP scanner timing to the minimum that is supported
B. BGP Multihop
C. Next-Hop Address Tracking
D. Fast Peering Session Deactivation
E. TTL Security Check
A

Next-Hop Address Tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which are the two purposes of the MPLS label value 1? (Choose two.)

A. it is used for MPLS OAM packets.
B. it indicates an implicit null label.
C. it is used for VPNv6 packets.
D. it is used to carry the QoS value in the label stack.
E. it indicates an explicit null label.
F. itindicates a router alert label.
A

it is used for VPNv6 packets.

it indicates a router alert label.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Refer to the exhibit. Why is R3 unable to install 1.1.1.1/32 in its routing table?

A. 11.11.11.11/32 exists in the routing table, so the conditional advertising is not working.
B. The route is filtered out by theip prefix-list ROUTE-INcommand.
C. 11.11.11.11/32 is advertising in the BGP table, so conditional advertising is not working.
D. Thebgp redistribute-internalcommand is missing under the R2 BGP process.

A

The route is filtered out by theip prefix-list ROUTE-INcommand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An engineer wants to configure Fast Reroute in the network. Which methodology eliminates RSVP
configuration in the network?

A. Enable LDP Fast Synch.
B. Enable IP Fast Reroute.
C. Enable theauto tunnelprimary feature.
D. Enable Cisco MPLS TE Fast Reroute.
E. Enable theauto tunnelbackup feature.
A

Enable IP Fast Reroute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are three actions that the control word performs in MPLS AToM? (Choose three.)

A. is used to identify the VC label
B. is used for padding small packets
C. preserves the sequence of the transported frames
D. facilitates the load balancing of AToM packets in the MPLS backbone network
E. carries control bits of the Layer 3 header of the transported protocol
F. is used to identify the tunnel label

A

is used for padding small packets

preserves the sequence of the transported frames

facilitates the load balancing of AToM packets in the MPLS backbone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are two advantages of Cisco IOS XR Software over Cisco IOS Software? (Choose two.)

A. a configuration that is grouped by interface
B. a configuration that is grouped by process
C. one-stage configuration
D. a monolithic OS
E. a two-stage configuration

A

a configuration that is grouped by process

a two-stage configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which are two major changes SyncE offers over traditional Ethernet to make it suitable for clock
distribution? (Choose two.)

A. SyncE introduces the concept of “Boundary Clocks” and “Transparent Clocks”
improvingnetwork scalability and accuracy of clock synchronization.
B. Industry standard that guarantee interoperability, since granular details, such as specific field
values are specified.
C. A mandated clock accuracy of 4.6ppm.
D. The ESMC protocol forclock selection, distribution, management, traceability, and failover.
E. High-priority synchronization packets so it can continually adjust its own oscillator.

A

A mandated clock accuracy of 4.6ppm.

The ESMC protocol forclock selection, distribution, management, traceability, and failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the PPMP label used for?

A. for the ingress replication model with BIDIR-PIM in an overlay model
B. only for the inter-ASmVPN models that use mLDP
C. for the partitioned mVPNmodel with PIM signaling in an overlay model
D. only for unicast over MPLS VPN
E. for all the default MDT and mVPN models

A

only for unicast over MPLS VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
vrf definition ABC
rd 10.0.0.1:1000
!
address-family ipv4
route-target export 1:1
route-target import 1:1
mdt default 232.0.0.1

Which two statements about multicast VPN configuration are true? (Choose two.)
A. The multicast tree is created based only on the existence of active sources or receivers behind
PEs in the ABC VRF.
B. The service provider core network is required to support SSM.
C. Multicast needs to be enabledonly on ABC VRF and is tunneled to participating PE routers in
the ABC VRF.
D. The SP core network is required in order to enable the BGP Multicast Address Family on
allpeering.
E. Multicast is required for the core network in addition to the ABC VRF.
F. The multicast tree exists regardless of whether there are any active sources or receivers in the
ABC VRF.

A

Multicast is required for the core network in addition to the ABC VRF.

The multicast tree exists regardless of whether there are any active sources or receivers in the
ABC VRF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An engineer is implementing an MPLS within the core of the Service Provider network. What two
components are required to build the control and data plane for MPLS Label Switched Paths?

(Choose two.)
A. FIB
B. CEF
C. LDP
D. LFIB
E. OSPF
A

CEF

LDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Refer to the exhibit. Customer XYZ Site 1 is not learning prefixes from Site 2. What is the issue?

A. MPLS LSP is broken along the path.
B. Theroute-policyis not implemented in router PE-2.
C. The BGPlocal-ascommand should be used between PE-1 and CE-1.
D. The route-distinguisher values must match in both sites.
E. The BGPas-overridecommand should beimplemented between PE-1 and CE-1.

A

The BGPas-override command should be implemented between PE-1 and CE-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Refer to the exhibit. A network engineer must configure BFD for IS-IS between R1 and R2. In case the primary link fails, the convergence time should be less than a second.
Which two IOS commands are required to meet this requirement? (Choose two.)

A. isisbfd
B. bfd minimum-interval 250
C. bfd interval 250 min_rx 250 multiplier 3
D. bfd multiplier 3
E. bfd interval 250 min_rx 250 multiplier 4
F. bfd fast-detect ipv4

A

bfd interval 250 min_rx 250 multiplier 3

bfd fast-detect ipv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An engineer must implement E-Line services for a service provider network. Which two services
apply in this situation? (Choose two.)

A. EVPL
B. E-Tree
C. E-LAN
D. EVC
E. EPL
A

EVPL

EPL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Refer to the exhibit. After the BGP TCP negotiation between RouterA and RouterB, what will be
the value of the keep alive timer and the hold-down timer, respectively?

A. 3 seconds and 9 seconds
B. 60 seconds and 180 seconds
C. 10 seconds and 9 seconds
D. no value, because BGP negotiation will not be successful
E. 10 seconds and 10 seconds
F. 10 seconds and 30 seconds
G. 3 seconds and 30 seconds
H. 3 seconds and 10 seconds
A

3 seconds and 9 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In a routing virtualization concept, which are the two main techniques for creating virtualized router
entities as defined by their physical and operational characteristics? (Choose two.)
A. VDC
B. SVR
C. DRP
D. HVR
E. SDR

A

SVR

HVR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which two statements about Unified MPLS are true? (Choose two.)

A. Unified MPLS works on Cisco IOS XR Software only.
B. Unified MPLS extends MPLS across multidomain networks in a scalable manner.
C. New technologies or protocols are not used; only MPLS, LDP, IGP, and BGP are used.
D. ABR loopback prefixes should always be redistributed from the core IGP into the aggregation
IGP.
E. The RRs are part of the control path only.

A

Unified MPLS extends MPLS across multidomain networks in a scalable manner.

ABR loopback prefixes should always be redistributed from the core IGP into the aggregation
IGP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Customers connecting to a Service Provider for Internet access are intending to implement redundant peering. The design requirements call for preferring a primary link for both ingress and egress traffic. Secondary links should be used only during primary outages. What two BGP deployment options will accomplish this design goal? (Choose two.)

A. On the router handlingthe secondary link, advertise routes with a MED value of 0.
B. On the router handling the primary link, setthe weight for all incoming routes to be a value of 0.
C. On the router handling the secondary link, advertise all routes with a longer AS-PATH value.
D. On the router handling the primary link, advertise all routes with a longer AS-PATH value.
E. On the router handling the secondary link, set the local preference for all incoming routes to be
a value of 0.

A

On the router handling the secondary link, advertise all routes with a longer AS-PATH value

On the router handling the secondary link, set the local preference for all incoming routes to be
a value of 0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Refer to the exhibit. A customer is running IS-IS within a network and is using BGP as a CE-PE routing protocol. Which action allows CE1 to get the subnet 10.10.2.0/24 over the CE1-PE1 link, regardless of whether there is a flap in the MPLS link or backdoor link?

A. Configure theneighbor weight 33768command on CE1 under the BGP process.
B. Configure thedistance bgp 115 200 200command on CE1 under the BGP process.
C. Configure thedistance 30ipcommand on CE1 under the IS-IS process.
D. Configure thedistance bgp 115 200 200command on CE2 under the BGP process.
E. Configure theneighbor weight 33768command on CE2 under the BGP process.

A

Configure thedistance bgp 115 200 200command on CE1 under the BGP process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which are the two fundamental ways in which IEEE 1588 differs from SyncE? (Choose two.)

A. In addition to frequency synchronization, it achieves ToD synchronization to achieve phase alignment which is required for multi-channel communication.
B. It is a purely-based solution, with the actual clock values being passed inside the payloads of special packets dedicated to that task.
C. It offers two major changes over traditional Ethernet to make it suitable for clock distribution: a mandated clock accuracy and the ESMC protocol for clock selection, distribution, management, traceability, and failover.
D. SyncE is a Cisco proprietary ToDtechnologywhere IEEE 1588 is a industry standard recommended for interoperability across vendor devices.
E. IEEE 1588 applies to voice-only systems or with low-bandwidth data traffic.

A

In addition to frequency synchronization, it achieves ToD synchronization to achieve phase alignment which is required for multi-channel communication.

It is a purely-based solution, with the actual clock values being passed inside the payloads of special packets dedicated to that task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Refer to the exhibit. Both MPLS TE tunnel 14 and MPLS TE tunnel 124 pass over the same physical links. Which configuration on R1 enables TE 14 to be the primary tunnel and TE 124 to become active when TE 14 is admin disabled?

A. Interface Tunnel14
tunnelmpls traffic-eng priority 3 1
!
Interface Tunnel124
tunnelmpls traffic-eng priority 5 4
B. Interface Tunnel14
tunnelmpls traffic-eng priority 4 1
!
`Interface Tunnel124
tunnelmpls traffic-eng priority 3 2
C. Interface Tunnel14
tunnelmpls traffic-eng priority 7 7
!
Interface Tunnel124
tunnelmpls traffic-eng priority 1 1
D. Interface Tunnel14
tunnelmpls traffic-eng priority 3 2
!
Interface Tunnel124
tunnelmpls traffic-eng priority 4 1
A
Interface Tunnel14
tunnelmpls traffic-eng priority 4 1
!
`Interface Tunnel124
tunnelmpls traffic-eng priority 3 2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A network engineer wants to decrease the convergence time of a network that is running integrated IS-IS as an IGP, at the expense of bandwidth and CPU usage. Which two configuration tasks achieve this goal? (Choose two.)

A. Configure thehold timeto be 1 second.
B. Configure thehello intervalto be minimal.
C. Ensure thathello-paddingis disabled.
D. Ensure that thehello multiplieris set to 3.
E. Configure thehello multiplierto be 3.

A

Configure thehello intervalto be minimal.

Ensure that thehello multiplieris set to 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In a Layer 2 VPN service, which is the default behavior of an EVC-based platform with regards to VLAN manipulation?

A. keeps the VLAN tag of the incoming frame
B. attaches two VLAN tags to the incoming frame
C. removes the VLAN tag from the incoming frame
D. removes all the VLAN tags from the incoming frame
E. sets the VLAN tag of the incoming frame

A

keeps the VLAN tag of the incoming frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
When IPv6 is enabled on an interface, which three multicast addresses does the configured interface automatically join? (Choose three.)
A. FF01::2
B. FEC0::1
C. FF02:0:0:0:0:1:FF00::/104
D. FF02::1
E. FF01::1
F. FF02::2
G. FF02::D
H. FF02::5
A

FF02:0:0:0:0:1:FF00::/104

FF02::1

FF02::2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
A network engineer is responsible for implementing a solution with Cisco IOS XR Software that insures continuous forwarding during a control plane failure. Which two technologies should the engineer consider? (Choose two.)
A. TE FRR
B. IP FRR
C. graceful restart
D. BFD
E. NSR
A

graceful restart

NSR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Refer to the exhibit. An SP core is running MPLS with OSPF as the IGP used for Loopback propagation. LDP Synchronization is enabled per the given configuration. What will the traffic flow behavior be after a temporary outage event on PE1 Eth0/0?

A. Permanently through PE1 -> P2 -> PE4 due to lowest path metric.
B. Initially through PE1 -> P1 -> PE4, then a few seconds later, it will be over PE1 -> P2 -> PE4.
C. Permanently through PE1 -> P1 -> PE4 due to lowest path metric.
D. Initially through PE1 -> P2 -> PE4, then a few seconds later, it will be over PE1 -> P1 -> PE4

A

Initially through PE1 -> P1 -> PE4, then a few seconds later, it will be over PE1 -> P2 -> PE4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which two frame types are correct when configuring T3 interfaces? (Choose two.)

A. M23
B. G.832
C. Extended Super Frame
D. C-bit parity
E. G.751
F. Super Frame
A

M23

C bit parity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Refer to the exhibit. The referenced TE tunnels compete for bandwidth requirements over the limited available bandwidth that is provisioned. Which core MPLS component erases a conflict and provides admission control for any new added TE tunnel?

A. link management
B. link attributes
C. MPLS TE priorities
D. RSVP

A

RSVP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Refer to the exhibit. Two MPLS TE tunnels are configured with a total bandwidth guarantee of 100
Mbps. However, Tunnel 1 has a requirement to have one-fifth of this total bandwidth. Which two
configurations accomplish this goal? (Choose two.)

A. Configuretunnel mpls traffic-eng bandwidth 20000under the Tunnel 1 interface.
B. Configurebandwidth 20000under the Tunnel 1 interface.
C. Configuretunnel mpls traffic-eng bandwidth 80000under the Tunnel 2 interface.
D. Configurebandwidth 80 Mbpsunder physical interfaces in the path PE1-P2-PE2.
E. Configurebandwidth 20 Mbpsunder physical interfaces in the path PE1-P1-PE2
F. Configurebandwidth 80000under the Tunnel 2 interface.

A

Configuretunnel mpls traffic-eng bandwidth 20000under the Tunnel 1 interface

Configuretunnel mpls traffic-eng bandwidth 80000under the Tunnel 2 interface

52
Q

What are three main characteristics of mLDP that differ from RSVP-TE? (Choose three.)

A. The LSPs are built from tailend to headend.
B. The LSPs are built from headend to tailend.
C. It supports only P2MP LSPs.
D. It supports both P2MP and MP2MP LSPs.
E. Signaling is periodic.
F. No periodic signaling is performed.

A

The LSPs are built from tailend to headend

It supports both P2MP and MP2MP LSPs.

No periodic signaling is performed

53
Q

Which are the three header fields that affect how Equal-Cost Multipath hashes traffic flow into interface groups? (Choose three.)

A. source MAC address
B. source port
C. source IP address
D. destination IP address
E. IP protocol ID
F. destination MAC address
A

source port

source IP address

destination IP address

54
Q

Refer to the exhibit. What is the correct action to fix the L2TPv3 configuration?

A. At Router-A, correct the local interface in the pseudowire configuration.
B. At Router-B, correct the encapsulation in the pseudowire configuration.
C. At Router-A, correct the encapsulation in the pseudowire configuration.
D. At Router-B, correct the local interface in the pseudowire configuration

A

At Router-B, correct the encapsulation in the pseudowire configuration.

55
Q

QUESTION NO: 51
Two routers that are running MPLS and LDP have multiple links that than connect them to each other. An engineer wants to ensure that the label bindings are not flushed from the LIB if one of the links fails. Which configuration meets this requirement?

A. the mpls ldp neighbor targetedcommand
B. the mpls ipcommand on a Cisco MPLS TE tunnel
C. the mpls ldp discovery targeted-hello acceptcommand
D. the mpls ldp session protection command

A

the mpls ldp session protection command

56
Q

A network engineer needs to connect two core switches that use Gigabit Ethernet interfaces in an MPLS backbone and that are separated by a distance of 60 km. Which Cisco GBIC achieves this goal?

A. Cisco 1000BASE-T GBIC
B. Cisco 1000BASE-SX GBIC
C. Cisco 1000BASE-LX/LH GBIC
D. Cisco 1000BASE-ZX GBIC

A

Cisco 1000BASE-ZX GBIC

57
Q

The product team at an ISP that offers VoIP services wants to add two-way video conferencing to their product offering. Which three QoS methods can be applied for real-time traffic on WAN linkswith speeds that are slower than 768 Kbps? (Choose three.)

A. Apply MLP link fragmentation and interleaving to the interface.
B. Apply LLQ with both voice traffic and video traffic in the same priority queue.
C. Apply CBWFQ with VoIP traffic in its own class, which is marked with a PHB value of EF.
D. Apply CBWFQ with video traffic in its own class, which is marked with a PHB value of AF41.
E. Apply voice-adaptivefragmentation to ensure that large video packets are fragmented and
interleaved.
F. Apply LLQ with video traffic that is dedicated in the priority queue.

A

Apply MLP link fragmentation and interleaving to the interface.

Apply CBWFQ with VoIP traffic in its own class, which is marked with a PHB value of EF.

Apply CBWFQ with video traffic in its own class, which is marked with a PHB value of AF41.

58
Q

An R1 router requires an equal load balancing to reach the prefix 192.168.0.0/16 over two exit points: through R2 and R3 routers. Which two options must be configured on the R1 router to achieve this goal? (Choose two.)

A. The BGP maximum path feature must be configured on R1.
B. The BGP PIC core must be enabled on R1
C. Weight, local-pref, MED, as-path length, origin, and the BGP next-hop IGP cost must be the
same for the R2 and R3 IBGP updates to R1.
D. The BGP Link Bandwidth feature must be applied on R1.
E. BGP extended community exchange must be enabled betweenIBGP neighbors.

A

The BGP Link Bandwidth feature must be applied on R1.

BGP extended community exchange must be enabled betweenIBGP neighbors

59
Q

An engineer has just configured IOS-XR with out-of-band MPP. Which are the three results that will occur? (Choose three.)

A. Management traffic to RPfrom all non-MPP interfaces is dropped
B. RP/DRP Ethernet Interfaces are not default out-of-band interfaces
C. MPP configuration changes doesn’t affect active sessions established before the changes
D. Interfaces configured for out-of-band MPP are still part of global routing/forwarding
E. If MPP is disabled and a protocol is activated, all interfaces cannot pass traffic
F. LPTS will provide rate limiting

A

Management traffic to RPfrom all non-MPP interfaces is dropped

MPP configuration changes doesn’t affect active sessions established before the changes

LPTS will provide rate limiting

60
Q

Refer to the exhibit. The Service Provider is deploying Internet service to its VRF customers by using vrf INTERNET. A dedicated firewall provides NAT functionally towards the Internet. Assume that IP address overlapping between VRFs is not an issue
Which three configuration steps are required to add Internet service to the VRF customers?
(Choose three.)

A. Export the RD ofvrfINTERNETfrom all customer VRFs.
B. Originate a default route on PE4 invrfINTERNET.
C. Import the RD fromvrfINTERNETin all customer VRFs.
D. Originate a default route on the firewall invrfINTERNET.
E. Import the VRF “INTERNET” Route Target in all customer VRFs.
F. Import the Route Target of all customer VRFs invrfINTERNET.
G. Leak all VRF routes to the global routing table.

A

Originate a default route on PE4 invrfINTERNET.

Import the RD fromvrfINTERNETin all customer VRFs.

Leak all VRF routes to the global routing table

61
Q

MPLS order of operation

Existing routing protocols

A

First

62
Q

Order of MLS operation?

Edge LSR at egress
Ingress Edge LSR receives packets
Existing Routing Protocols
LRS switches packets
LDP established "label" to destination network mapping
A

Existing LDP Ingress LRS Edge

63
Q

Ingress edge LSR Rx packets performs layer 3 value added services

A

Third

64
Q

LSR switches packets using Label Swapping

A

Fourth

65
Q

Edge LSR at egress removes label and delivers packets

A

Fifth

66
Q

QOS is applied on an outgoing interface as shown below:

policy-map COS-OUT
CLASS DATA
random detect

What will the QoS result be for egress traffic with an average queue depth of 40 that is marked as
DSCP AF32?

A. Traffic will be dropped with a random rate less than the one defined by MPD.
B. All traffic will be tail dropped.
C. Traffic will be dropped with a rate of 1 packet out of 20.
D. Traffic will be dropped with a rate of 1 packet out of 30.

A

Traffic will be dropped with a rate of 1 packet out of 20.

67
Q

Refer to exhibit. NAT64 stateless configuration has been applied on RT1 router. The NAT64 prefix stateless used on this scenario is 2001:DB8:2::/96. ‘Host IPv4 only’ needs to test the connectivity with ‘Host IPv6 only’ using a ping command. Which is the correct ping command ‘Host IPv4 only’ should use?

A. ping 27.1.1.10
B. ping 27.1.1.10 source 2001:db8:2::7001:10A
C. ping 2001:db8:2::7001:10A
D. ping 2001:db8:2::112.1.1.10
E. ping 2001:db8:2::27.1.1.10
F. ping 2001:db8:2::1B01:10A
A

27.1.1.10

68
Q

IPFIX terminology

Generates Flow records

Metering Process
Collecting Process
Importing Process
Distributing Process
Exporting Process
A

Metering Process

69
Q

IPFIX terminology

Sends Flow records

Metering Process
Collecting Process
Importing Process
Distributing Process
Exporting Process
A

Exporting Process

70
Q

IPFIX terminology

** Receives flow records**

Metering Process
Collecting Process
Importing Process
Distributing Process
Exporting Process
A

Collecting Process

71
Q

Which is the RP address of the IPv6 multicast address FF76:0:130:1234:5678:9abc::4321?

A. 4321:5678:9abc::30
B. 4321:5678:9abc::13
C. 1234:5678:9abc::130
D. 1234:5678:9abc::1
E. 1234:5678:9abc::13
A

1234:5678:9abc::1

72
Q

A Server Provider is seeing an increasing amount of attacks against its customers. For which kind of attack would an engineer want to design a Backscatter Traceback solution?

A. Rogue DNS/DHCP Servers
B. IP Spoofing
C. Ping of Death
D. Distributed Denial of Service
E. Network Attack TCP/UDP Scan
A

IP Spoofing

73
Q

Which QoS method is available when GRE is used to provide MPLS VPN services over an IP-only
core?

A. matching MPLS EXP on the physical interface
B. matching EXP on the tunnel interface
C. matching DSCP on the physical interface
D. matching DSCP on the tunnel interface

A

matching DSCP on the physical interface

74
Q

A Service Provider wants to extend MPLS WAN endpoints in the cloud at the edge of a customer
network within the cloud. Which platform will meet this requirement?

A. Cisco NX-OS
B. Cisco CSR1000v
C. Cisco ISR Routers running IOS
D. Cisco CRS-1
E. Cisco ASR Routers running IOS-XR
A

Cisco CSR1000v

75
Q

Refer to the exhibit. In the short-pipe QoS mode, this customer has QoS control for which two links? (Choose two.)

A. a
B. c
C. d
D. b
E. e
A

A

E

76
Q

Refer to the exhibit. OSPFv3 is already running, and R1 has added a new subnet (loopback 11). What is the reason code on R4 when executing the command show ipv6 ospf statistics

A. P (partial)
B. N (network)
C. R (router)
D. L (link)

A

R (router)

77
Q

A network engineer is designing the BGP architecture with a requirement of preventing the AS from becoming a Transit AS path, using the following configuration:
router bgp 65000 neighbor 10.0.0.1 route-map BGP-ROUTE-POLICY in. The goal is to prevent routes learned from 10.0.0.1 from being advertised to any other eBGP peering in the AS 65000. What command should be used within the route map to achieve this goal
while keeping existing route policies in place?

A. set community no-export additive
B. set community no-advertise
C. set community no-advertiseadditive
D. set community no-export

A

set community no-advertiseadditive

78
Q

An IS-IS enabled router with multiple IS-IS neighbors is required to have BFD sessions with all neighbors. Which BFD mode should you use when you want to save the overhead of periodic protocol control packets?

A. echo
B. asynchronous
C. demand
D. active

A

demand

79
Q

A Service Provider is designing control policies at the customer edge of the network, in order to prevent usage that exceeds the contracted terms. A new client that is contracted for only 2 Gbps is connecting to the Service Provider edge with a 10 Gbps interface. Which two QoS strategies meet the design goal? (Choose two.)

A. On the service Provider edge, enable traffic shaping on the customer port.
B. On the customer edge device,enable traffic shaping on the interface that is connected to the
Service Provider.
C. On the customer edge device, enable policing on the interface that is connected to the Service
Provider.
D. On the service Provider edge, enable policing on the customer port.
E. On the service Provider edge, enable WRED on the customer port.
F. On the customer edge, enable WRED on the interface that is connected to the Service
Provider.

A

On the customer edge device,enable traffic shaping on the interface that is connected to the
Service Provider

On the service Provider edge, enable policing on the customer port.

80
Q

SSO was configured on a Cisco ASR 1006 Router by using two RPs. When the main RP failed, a service disruption occurred. What are two reasons that the SSO did not work? (Choose two.)

A. The standby RP has a different DRAM configuration than the primary RP.
B. HSRP and NSF are not configured.
C. The ESP that is installed in the Cisco ASR 1006 Router does not support SSO.
D. The standby RP was not ready to switch over when the primary RP failed.
E. The standby RP has a different IOSversion than the primary RP.

A

HSRP and NSF are not configured.

The standby RP has a different IOSversion than the primary RP.

81
Q

A Service Provider connects to a client site that has two CEs. These CEs have a backdoor link for
backup. OSPF is used as the routing protocol in this environment. You want to ensure that client
traffic prefers the service provider connections for routing instead of the secondary connection.
Which option describes the default behavior and the action that accomplishes your goal?

A. The routes to the Service Provider are not preferred, due to the increased OSPF cost through
the service provider network. Ensure that the cost on the links to the service provider are lower than the secondary connection
B. The routes to the Service Provider are seen as external type 1 in the OSPF database.
Configure a domainID that is the sameacross all PEs, to ensure that customers see routes as
intra-area.
C. The routes to the Service Provider are seen as inter-area OSPF routes through the network.
Configure a sham link to create a new intra-area path across the service provider network
between the PE routers that service the client.
D. The routes to the Service Provider are seen as equal and cause nondeterministic traffic
patterns. Ensure that the secondary connection has a higher cost than the links to the service
provider.

A

The routes to the Service Provider are seen as inter-area OSPF routes through the network.
Configure a sham link to create a new intra-area path across the service provider network
between the PE routers that service the client.

82
Q

An engineer is working to provide high availability to a Service Provider core network. Which BGP
command enables a backup path to be installed in the RIB and CEF tables?

A. maximum-paths ibgp
B. bgp additional-paths install
C. maximum-paths eibgp
D. bgp additional-paths select
E. bgp advertise-best-external
A

bgp additional-paths install

83
Q

Which two flexible service mapping features that are used on the ES40 line card can classify traffic
into different service instances, in order to consume fewer VLANs? (Choose two.)

A. CoS
B. DSCP
C. IP precedence
D. MPLS experimental bit
E. ToS
F. EtherType
A

CoS

Ethertype

84
Q

Refer to exhibit:

When a traceroute is performed from a PC behind R2, the next hop on R1 for IPv4 is 10.0.1.2, and for IPv6 it is 2001:DB8:2:2. What is causing this behavior?

A. GigabitEthernet2/1 has a Level 1-only adjacency. This causes it to be the preferred path for the
IPv6 packets.
B. When SPF ran on R2, it calculated two equal paths to R1. It was a coincidence that than the
packets choose different paths.
C. Multitopology is enabled on R2, which causes the IPv6 packets to use a different path than the
IPv4 packets.
D. 2001:DB8:2::2 is on a Gigabit Ethernet interface. Because its speed is higher than Fast
Ethernet, the IS-IS metric is preferred.

A

Multitopology is enabled on R2, which causes the IPv6 packets to use a different path than the
IPv4 packets.

85
Q

What are the four key design requirements for mobile IP backhaul? (Choose four.)

A. X2 interface turning point
B. bandwidth
C. Layer 2 Tunneling
D. native IPv6 support
E. DiffServQoS
F. MPLS-enabled interface
G. network timing distribution and recovery
H. mandatory Layer 3 access up to a cell site
A

Layer 2 Tunneling

native IPv6 support

network timing distribution and recovery

mandatory Layer 3 access up to a cell site

86
Q

Refer to the exhibit. The Service Provider does not have IPv6 support in the core, however it does have MPLS support. Customer requires IPv6 connectivity in all sites including Internet access.
Without a requirement to create VRF, which method is preferred to support IPv6 traffic between
these sites?

A. 6VPE
B. H-VPLS
C. L2TPv3
D. VPLS
E. 6CE
F. 6PE
A

6PE

87
Q

Refer to the exhibit. R1 and R2 are multicast routers running PIM over Serial1/0. The PIM
adjacency on R1 is not forming with the given configuration. What command can be entered on R1
to resolve the issue?

A. no access-list 100 deny 103 any any
B. no access-list 100 deny udpany anyeq 103
C. no access-list 100 deny ip any host 224.0.0.1
D. no access-list 100 deny ip any host 224.0.0.2

A

no access-list 100 deny 103 any any

88
Q

A company is deciding between an HVR and SVR solution in order to finalize a virtualization project proposal. Which is an advantage of a HVR solution versus a SVR solution?

A. A HVR solution implements dedicated data plane resources.
B. A HVR solution implements shared control plane resources.
C. A HVR solution introduces significant contention of resources.
D. A HVR solution implements dedicated chassis resources.

A

A HVR solution implements dedicated data plane resources.

89
Q

Two Service Providers are beginning a merger between AS boundaries to provide MPLS-enabled services between their networks. Customers are using both Service Providers for services and, under certain circumstances; there are requirements to extend Layer 2 VPN circuits between each provider. The providers are in the process of completing the technical merger. However, the MPLS is not supported between the providers. Which action allows MPLS Layer 2 VPN circuits to be built over the inter-AS link?

A. Create a GRE tunnel with the mpls ip command between ASBRs.
B. Create Layer 2 VPN peerings between PE routers from each provider.
C. Create a VPNv4 peering between ASBRs to advertise labelsbetween each provider.
D. Create a sham link between ASBR routers to enable a superbackbone peering for Layer 2 VPN
signaling.
Answer:

A

Create a GRE tunnel with the mpls ipcommand between ASBRs.

90
Q

Refer to the exhibit. Which IOS command under the BGP VPNv4 address family implements a secondary backup path to the destination 192.168.1.1?

A. maximum-paths ibgp2
B. bgp additional-paths install
C. bgp recursion host
D. bgp advertise-best-external

A

bgp additional-paths install

91
Q

Refer to the exhibit. Router RT1 has three equal-cost paths back to the source. Which configuration should be applied in order to load-balance the multicast traffic across all three links.

A. Create three static multicast routes where each pointing out to one or three interfaces.
B. Enable PIM multipath.
C. Create a tunnel interface between RT1 and RT2. Enable PIM on the interface tunnel and
disable PIM on the three interfaces part of equal-cost path between RT1 and RT2.
D. PIM load balance is not possible. PIM only chooses one interface for RFC check and prunes
the other interfaces.

A

Create a tunnel interface between RT1 and RT2. Enable PIM on the interface tunnel and
disable PIM on the three interfaces part of equal-cost path between RT1 and RT2.

92
Q

Refer to the exhibit. R3 cannot install a route to R1-R2 subnet 2001:1:155:12::/64. Which action resolves this issue?

A. Add theredistribute ospf 1 include-connectedcommand under theipv6 router eigrp 10
process.
B. For the OSPF process, add theno shutdowncommand.
C. For prefix-listOSPF_INTO_EIGRP seq 20, replace the prefix with2001:155:1:12::/64.
D. For route-map OSPF_INTO_EIGRP, add theset metric 1000 1 255 1 1500command.

A

Add theredistribute ospf 1 include-connectedcommand under theipv6 router eigrp 10
process.

93
Q

A network administrator wants to implement an IP dampening feature for a network. Which parameter identifies how fast the accumulated penalty can decay exponentially?

A. reuse threshold
B. suppress threshold
C. half-life period
D. maximum suppress time

A

half-life period

94
Q

Refer to the exhibit. Which statement is true?
sh bgp vpnv4 unicast vrf one 10.2.2.0/24

A. This is an interautonomous unicast route.
B. The BGP MED value is 26.
C. This is an mVPN route.
D. The route target value is 10.1.100.2:3.
E. There is a route reflector in this network.
F. The route did not import this route into theVRF one.

A

There is a route reflector in this network.

95
Q

Which is the main goal of BGPsec regards to improve BGP security?

A. Reduces risk of improper route propagation from unauthorized AS numbers
B. Configures BGP route verification by storing routes in a database used to validate AS numbers
C. Adds encryption to route propagation outside the iBGP AS
D. Increases legitimacy and authenticity of BGP advertisements

A

Increases legitimacy and authenticity of BGP advertisements

96
Q

Refer to the exhibit. R2 and R3 cannot install IS-IS IPv6 routes. What is the root cause?

A. R2 is missing themetric-style widecommand under the IS-IS process.
B. R3 is missing themulti-topologytransition command under the IS-IS address-family IPv6
process.
C. R2 is missing themulti-topologycommand under the IS-IS address-family IPv6 process.
D. R3 is missing themetric-style widecommand under the IS-IS process.

A

R3 is missing themulti-topologytransition command under the IS-IS address-family IPv6
process.

97
Q

What BGP feature improves on DDOS mitigation by allowing instructions that are more granular and allow for source address, destination, address, L4 details, and packet specifics to be
analyzed?

A. RCMD
B. RTBH
C. BGP Flowspec
D. BGPSec

A

BGP Flowspec

98
Q

When troubleshooting a DoS attack, a support engineer finds a huge number of packets that are destined to one of the core routers interface IP address. By the time the packets reach this core router, they have a TTL of 0. Based on Cisco platform running IOS 15.3S, which technique is most effective in resolving this problem

A. Configure LPTS.
B. Configure an ACL on the core router interface.
C. Configure CoPP on the core router.
D. Configure policing on PE routers.
E. Configure a receive ACL on the core router.

A

Configure CoPP on the core router.

99
Q

Refer to the exhibit. A web server is connected to a switch via two Gigabit Ethernet links. These two links are bundled into a single logical link that provides the aggregate bandwidth of 2 Gbps.
The support engineer notices that traffic from the Internet to the web server uses both Gigabit Ethernet links. However, traffic from the web server to the Internet uses only one link.
Which CLI command on the exhibit causes this behavior?

A. lacp port-priority 32768in interface configuration mode
B. channel-group 5 mode passive
C. lacp port-priority 32768in global configuration mode
D. port-channel load-balance dst-mac

A

port-channel load-balance dst-mac

100
Q

Due to recent acquisitions, a company’s MPLS infrastructure is growing very quickly. Concerns
arise about labeling each and every IP address on the P router. Which command would significantly reduce the label allocations without compromising LDP functionalities?

A. ip prefix-list List1 deny prefix/prefix_length
!
mplsldp label
allocate global prefix-list List1
B. mplsldp label
allocate global host-routes
C. access-list 1 permit subnet wildcard
mplsldp neighbor neighbor_ip labels accept 3
D. mplsldp password required for 10
access-list 10 permit host_ip_1
access-list 10 permit host_ip_2
access-list 10 permit host_ip_n
A

A. ip prefix-list List1 deny prefix/prefix_length
!
mplsldp label
allocate global prefix-list List1

101
Q

Drag and drop the IPFIX terminology on the left to the correct description on the right. Not all options will be used.

Generates Flow records

Metering process
Collecting process
Importing process
Distributing Process
Exporting process
A

Metering Process

102
Q

Drag and drop the IPFIX terminology on the left to the correct description on the right. Not all
options will be used.

Sends Flow records

Metering process
Collecting process
Importing process
Distributing Process
Exporting process
A

Exporting process

103
Q

Drag and drop the IPFIX terminology on the left to the correct description on the right. Not all
options will be used.

Received Flow records

Metering process
Collecting process
Importing process
Distributing Process
Exporting process
A

Collecting Process

104
Q

Refer to the exhibit. The configuration in the exhibit redistributes static route 172.16.0.0/24 into BGP.
Which action does the route-map STATIC-TO-BGP do?

A. Route 172.16.0.0/24 cannot be sent to the Internet.
B. Route 172.16.0.0/24 cannot be re-advertised beyond its neighbors.
C. Route 172.16.0.0/24 cannot be advertised outside of AS 100.
D. Route 172.16.0.0/24 cannot be exported from BGP to another protocol

A

Route 172.16.0.0/24 cannot be advertised outside of AS 100

105
Q

Refer the exhibit. Two Autonomous Systems are enabled to support multicast. An engineer wants
to set up configuration so that a multicast client at AS 100 can receive multicast traffic from the MServer
at AS 200. However, the RP announcements must be limited within each autonomous system site.
Which Cisco IOS configuration achieves this goal?

A. On both ASBRs Eth0/0 and theno ippim sparse-modecommand.
B. On both ASBRs add theippim send-rp-discovery scope 1command.
C. On both RPs add theippim send-rp-discovery scope 2command.
D. On both ASBRs Eth0/0 addtheippimbsr-bordercommand.
E. On both ASBRs Eth0/0 addtheippim dense-modecommand.
F. On both RPs add theippimbsr-bordercommand.

A

On both ASBRs Eth0/0 add the ippimbsr-border command

106
Q

Two Tier 2 Service Providers are using a Tier 1 Service Provider for transport. MPLS is required between the Tier 2 Service Providers for label switching. In this CSC solution, which label stack is correct?

A. original IP packet, MPLS CSC transport label, MPLS VPN label, and MPLS Tier 2 transport
label
B. original IP packet, MPLS Tier 2 transport label, MPLS VPN label, and MPLS CSC transport
label
C. original IP packet, MPLS VPN label, MPLS Tier 2 transport label, and MPLS CSC transport
label
D. original IP packet, MPLS Tier 2 transport label, MPLS CSC transport label, and MPLS VPN
label

A

original IP packet, MPLS VPN label, MPLS Tier 2 transport label, and MPLS CSC transport
label

107
Q

QUESTION NO: 95
For MPLS inter-AS Option B, how many labels are associated with packet forwarding between the
VPNv4 ASBR neighbors?

A. 0
B. 1
C. 2
D. 3

A

3

108
Q

Which two statements about 10 Gigabit Ethernet WAN PHY mode are true? (Choose two.)

A. The signal maps to an OC-192c/STM-64c payload.
B. The nominal speed is 9.95328 Gbps.
C. It is compatible with Packet Ethernet over SONET.
D. The signal maps to an OC-768c/STM-256c payload.
E. It is compatible with Packet over SONET.
F. Thenominal speed is 10.3125 Gbps.

A

The signal maps to an OC-192c/STM-64c payload

The nominal speed is 9.95328 Gbps

109
Q

In a secure domain router scenario, which two functions are shared amongst all SDR in the
system? (Choose two.)

A. configuration
B. protocols
C. routing tables
D. chassis-control
E. switch-fabric
A

chassis-control

switch-fabric

110
Q

In which way does the DS-Lite IPv6 transitioning mechanism differ from IPv6 Dual-Stack?

A. DS-Lite is a combination of tunnel and translation technologies.
B. DS-Lite is a transition technology that gives full IPv6 connectivity for IPv6 capable hosts that
are on the IPv4 Internet but have no native connection to an IPv6 network.
C. DS-Lite is an automatic tunnel where the tunnel destination is determined by the IPv4 address
extracted from the IPv6 address thatstarts with the prefix 2002::/16.
D. DS-Lite is a stateless tunneling mechanism with a lightweight and secure manner without
requiring upgrades to existing IPv4 access network infrastructure.

A

DS-Lite is a combination of tunnel and translation technologies.

111
Q

What is the main advantage of H-VPLS over VPLS?

A. H-VPLS provides redundancy.
B. H-VPLS provides security.
C. H-VPLS improves the scalability.
D. H-VPLS allows a broader use of protocols.

A

H-VPLS improves the scalability

112
Q

Which MPLS technology will achieve LAN extensions over the service provider backbone?

A. AToM
B. VPLS
C. L2VPN
D. L2TPv3

A

VPLS

113
Q

Which two statements about forwarding equivalence class (FEC) are true? (Choose two)

A. FEC might correspond to a destination IP subnet, but it might alsocorrespond to any traffic
classthat the edge LSR considers significant.
B. FEC is a group of IP packets that is forwarded over a different path, but with the same
forwardingtreatment.
C. FEC is a group of IP packets that is forwarded over the same path, and with the same
forwardingtreatment.
D. FEC is a group of IP packets that is forwarded over a different path, but with the different
forwarding treatment.
E. FEC is a group of IP packets that is forwarded over the same path,but with a different
forwardingtreatment

A

FEC might correspond to a destination IP subnet, but it might alsocorrespond to any traffic
classthat the edge LSR considers significant

FEC is a group of IP packets that is forwarded over the same path, and with the same
forwardingtreatment.

114
Q

Cisco IOS XR has implemented a nonstop routing feature so that when RP failover occurs, the routing information can be recovered locally. Which protocol does not support the NSR feature?

A. OSPF
B. LDP
C. BGP
D. IS-IS
E. RSVP
A

RSVP

115
Q

What is the minimum hardware configuration of the multishelf Cisco CRS-1 system?

A. One route processor (RP) card and one modular services card (MSC)
B. One distributed route processor (DRP) and one S13 fabric card (SFC)
C. One line card chassis (LCC) and one fabric card chassis (FCC)
D. One route processor (RP) and one fabric card chassis (FCC)
E. One line card chassis (LCC) and one S13 fabric card (SFC)

A

One line card chassis (LCC) and one fabric card chassis (FCC

116
Q

Which information is carried in the OSPFv3 intra-area Prefix LSA?

A. All link-local addresses
B. All IPv6 prefix and topology information that OSPFv2 included in Router LSA and Network LSA
C. List of options associated with the link to all other routers attached to the link
D. All prefix-specific information that OSPFv2 included in Router LSA and Network LSA

A

All prefix-specific information that OSPFv2 included in Router LSA and Network LSA

117
Q

Refer to the exhibit
An ISP engineer has been asked to identity a method to protect the PE and to control the number
of BGP prefixes learned from his customers. The BGP session should be dropped if the PE router
receives more than 1000 BGP prefixes. A syslog message should be generated when the number
of BGP prefixes learned from CE exceeds 850.
Which Cisco IOS command should the engineer apply on PE routers?

A. neighbor 10.1.1.2 maximum-prefix 1000 85
B. neighbor 10.1.1.2 maximum-prefix 1000 850
C. neighbor 10.1.1.2 maximum-prefix 1000 85 warning-only
D. neighbor 10.1.1.2 maximum-prefix 1000 850 warning-only

A

neighbor 10.1.1.2 maximum-prefix 1000 85

118
Q

In a frame, the MPLS label is imposed where?

A. Before the layer 2 header
B. Within the Layer 3 header
C. After the Layer3 header and before Layer2 header
D. After the Layer2 header and before Layer3 header

A

After the Layer2 header and before Layer3 header

119
Q

BGP best route selection process is based on what?

A. path attributes
B. lowest cost
C. highest bandwidth
D. lowest delay
E. lowest hop-count
A

path attributes

120
Q

Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right

HSS

concatenation of HLR and AuC
termination point of the pocket data interface towards the PDN
termination point of the pocket data interface towards the E-UTRAN
manages the service policy and sends QOS setting information for each user session and accounting rule information
in in charge of all the Control Plan functions related to subscriber and session management

A

HSS is the concatenation of HLR and AuC

121
Q

Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right

PDN GW

concatenation of HLR and AuC
termination point of the pocket data interface towards the PDN
termination point of the pocket data interface towards the E-UTRAN
manages the service policy and sends QOS setting information for each user session and accounting rule information
in in charge of all the Control Plan functions related to subscriber and session management

A

termination point of the pocket data interface towards the PDN

122
Q

Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right

Service GW

concatenation of HLR and AuC
termination point of the pocket data interface towards the PDN
termination point of the pocket data interface towards the E-UTRAN
manages the service policy and sends QOS setting information for each user session and accounting rule information
in in charge of all the Control Plan functions related to subscriber and session management

A

termination point of the pocket data interface towards the E-UTRAN

123
Q

Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right

PCRF Server

concatenation of HLR and AuC
termination point of the pocket data interface towards the PDN
termination point of the pocket data interface towards the E-UTRAN
manages the service policy and sends QOS setting information for each user session and accounting rule information
in in charge of all the Control Plan functions related to subscriber and session management

A

manages the service policy and sends QOS setting information for each user session and accounting rule information

124
Q

Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right

MME

concatenation of HLR and AuC
termination point of the pocket data interface towards the PDN
termination point of the pocket data interface towards the E-UTRAN
manages the service policy and sends QOS setting information for each user session and accounting rule information
in in charge of all the Control Plan functions related to subscriber and session management

A

in in charge of all the Control Plan functions related to subscriber and session management

125
Q

IEEE 802.3ah OAM

Link layer OAM
Ethernet Local Management Interface
SG 13 Y 1731 Requirement for OAM in Ethernet Networks
VPLS OAM
Service Layer OAM
A

Link Layer OAM

126
Q

MEF-16-LMI

Link layer OAM
Ethernet Local Management Interface
SG 13 Y 1731 Requirement for OAM in Ethernet Networks
VPLS OAM
Service Layer OAM
A

Ethernet LMI