Các bạn học trong này xong ; không thi CCIE thì cũng thành chuyên gia mạng cao cấp rùi. Đây là bộ dump của passleader. Các bạn học trong này xong ; không thi CCIE thì cũng thành chuyên gia mạng cao cấp rùi. Đây là bộ dump của passleader Các bạn học trong này xong ; không thi CCIE thì cũng thành chuyên gia mạng cao cấp rùi. Đây là bộ dump của passleader Các bạn học trong này xong ; không thi CCIE thì cũng thành chuyên gia mạng cao cấp rùi. Đây là bộ dump của passleader Các bạn học trong này xong ; không thi CCIE thì cũng thành chuyên gia mạng cao cấp rùi. Đây là bộ dump của passleader
Trang 1Service Provider Written (400-201) October 2016
By theWildOne for certcollection.org
QUESTION 1
When will the primary processor core dump run in case of a switchover?
A Never takes place
What statement about Transit AS is true?
A Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Source AS
B Traffic and prefixes originating from Source AS are carried across a Transit AS to reach their Destination AS
C Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Destination AS
D None of the above
Answer: B
QUESTION 4
Due to recent acquisitions, a company's MPLS infrastructure is growing very quickly Concerns arise about labelling each and every IP address on the P router Which command would significantly reduce the label allocations without compromising LDP functionalities?
Trang 2A ip prefix-list List1 deny prefix/prefix_lengtht
mpls ldp label
allocate global prefix-list List1
B mpls ldp label
allocate global host-routes
C access-list 1 permit subnet wildcard
mpls ldp neighbor neighbor_ip labels accept 3
D mpls ldp password required for 10
!
access-list 10 permit host_ip_1
access-list 10 permit host_ip_2
access-list 10 permit host_ip_n
A GigabitEthernet2/1 has a Level 1-only adjacency
This causes it to be the preferred path for the IPv6 packets
B When SPF ran on R2, it calculated two equal paths to R1
It was a coincidence that than the packets choose different paths
C Multitopology is enabled on R2, which causes the IPv6 packets to use a different path than the IPv4 packets
D 2001:DB8:2::2 is on a Gigabit Ethernet interface
Because its speed is higher than Fast Ethernet, the IS-IS metric is preferred
Trang 3Answer: C
QUESTION 6
What are two advantages of Cisco IOS XR Software over Cisco IOS Software? (Choose two.)
A a configuration that is grouped by interface
B a configuration that is grouped by process
Trang 4Answer:
QUESTION 9
A network engineer wants to decrease the convergence time of a network that is running integrated IS-IS as an IGP, at the expense of bandwidth and CPU usage Which two
configuration tasks achieve this goal? (Choose two.)
A Configure the hold time to be 1 second
B Configure the hello interval to be minimal
C Ensure that hello-padding is disabled
D Ensure that the hello multiplier is set to 3
E Configure the hello multiplier to be 3
Answer: BE, explicitly set the multiplier to 3 and the minimal hello timer
C A mandated clock accuracy of 4.6ppm
D The ESMC protocol for clock selection, distribution, management, traceability, and failover
E High-priority synchronization packets so it can continually adjust its own oscillator Answer: CD, ESMC plus great accuracy
Trang 5QUESTION 11
Which two flexible service mapping features that are used on the ES40 line card can
classify traffic into different service instances, in order to consume fewer VLANs? (Choose two.)
Which three statements about bidirectional PIM are true? (Choose three)
A Traffic for a bidirectional group flows along the one shared tree and simultaneously utilizes multiple paths in a redundant network topology
B It does not require any traffic signalling in the protocol
C Membership to a bidirectional group is signalled using explicit Join messages
D It maintains source-specific forwarding state
E It reduces memory, bandwidth, and CPU requirements
A Set two RPs with same priority
B Set two RPs, one with high priority and the other with low priority
C Set one RP as the main RP and another as a backup RP
D Set the RP-BSR method with one high-priority RP and one low-priority RP
Trang 6flooding of sparse mode traffic
B MDTs are built in customer networks
C Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs
D MDTs are built in provider networks
E The number of MDTs depends on PIM modes of MDT groups
Answer: CDE, built in provider networks, used to reduce replication, number depends on PIM modes
QUESTION 15
What is the role of Forwarding Equivalence Class (FEC) in MPLS?
A FEC determines how to establish an LSP path
B FEC determines how IP packets are forwarded in MPLS LSP
C FEC determines how MPLS labels are stacked in LSP
D FEC determines how a group of IP packets are mapped to an LSP
Answer: D, how IP packets are mapped to LSP
QUESTION 16
In optical channel transport unit overhead (OTU OH), what are general communication channels 1 and 2 (GCC1/GCC2) used for?
A For trail trace identification
B As the backward defect indicator
C To transmit information between OTU termination points
D To extend command and management functions over several frames
E General communication channels 1 and 2 (GCC1/GCC2) do not belong to OTU OH
Answer: E
QUESTION 17
Which option describes the incorrect usage of the Label Distribution method?
A MP-BGP is used for label distribution for VPN customer routes
B LDP is primarily used in internal networks of MPLS-VPN providers
C MP-BGP is used for label distribution in MPLS Traffic Engineered networks
D Directed LDP is used for label distribution in L2-VPN Attachment Circuits
Answer: C
Trang 7QUESTION 18
RIPv2 differs from RIPv1 in which three things? (Choose three)
A It uses multicast address 224.0.0.10, instead of broadcast
B It uses multicast address 224.0.0.9, instead of broadcast
C It can use either multicast or broadcast addresses, instead of just broadcast
D It sends incremental updates, instead of periodic updates
E It is classless, instead of classful
F It supports authentication, and RIPv1 does not
Which are the three benefits of using the Yang model? (Choose three.)
A Reduce lab footprint
B Improve access to resources
C Support interoperability that provides a standard way to model management data
D Support simplified network management applications
E Provide a scale virtual lab environment
F Support programmatic interfaces
Trang 8QUESTION 22
Answer:
QUESTION 23
Refer to the exhibit The vrf MAINT has been provisioned and used by the Service
Provider management network The engineer discovers that syslog messages are not being
received on the syslog server IP reachability has been validated using ping Which issue in
the configuration must be corrected?
A Logging on must include the vrf MAINT keyword
B Logging host must include the vrf MAINT keyword
C The logging facility must be configured for syslog processing
D The route targets that are configured do not match the route distinguisher
Answer: B
Trang 9A The BGP maximum path feature must be configured on R1
B The BGP PIC core must be enabled on R1
C Weight, local-preference, MED, as-path length, origin, and the BGP next-hop IGP cost must be the same for the R2 and R3 iBGP updates to R1
D The BGP Link Bandwidth feature must be applied on R1
E BGP extended community exchange must be enabled between iBGP neighbors
Answer: AC, Maximum Path ON and equal parameters
QUESTION 26
A company is deciding between an HVR and SVR solution in order to finalize a
virtualization project proposal Which is an advantage of HVR solution?
A A HVR solution implements dedicated data plane resources
B A HVR solution implements shared control plane resources
C A HVR solution introduces significant contention of resources
D A HVR solution implements dedicated chassis resources
Answer: A
QUESTION 27
Which three of these are optical channel data unit (ODU) overhead fields? (Choose three)
A general communication channel 0 (GCC0)
B section monitoring
C reserved (RES)
D General communication channels 1 and 2 (GCC1 GCC2)
E Tandem connection monitoring activation deactivation (TCM ACT)
Answer: CDE – RES, GCC1 and 2, TCM-ACT
Trang 10QUESTION 28
Which three modes are the operating of HDLC? (Choose three)
A asynchronous balanced mode (ABM)
B normal response mode (NRM)
C normal peer mode (NPM)
D asynchronous client mode (ACM)
E asynchronous response mode (ARM)
Refer to the exhibit In the short-pipe QoS mode, this customer has QoS control for which
two links? (Choose two.)
Trang 11A network engineer is responsible for implementing a solution with Cisco IOS XR
Software that insures continuous forwarding during a control plane failure Which two technologies should the engineer consider? (Choose two.)
What are three main characteristics of mLDP that differ from RSVP-TE? (Choose three.)
A The LSPs are built from tailend to headend
B The LSPs are built from headend to tailend
C It supports only P2MP LSPs
D It supports both P2MP and MP2MP LSPs
E Signalling is periodic
F No periodic signalling is performed
Answer: ADF, LSP is built from tailend, supports MP2MP and no periodic signalling
QUESTION 34
Which are the two purposes of the MPLS label value 1? (Choose two.)
A it is used for MPLS OAM packets
B it indicates an implicit null label
C it is used for VPNv6 packets
D it is used to carry the QoS value in the label stack
E it indicates an explicit null label
F it indicates a router alert label
Answer: AF OAM Label and Router Alert
Trang 12QUESTION 35
Refer the exhibit Two Autonomous Systems are enabled to support multicast An engineer
wants to set up configuration so that a multicast client at AS 100 can receive multicast
traffic from the M- Server at AS 200 However, the RP announcements must be limited
within each autonomous system site Which Cisco IOS configuration achieves this goal?
A On both ASBRs Eth0/0 and the no ip pim sparse-mode command
B On both ASBRs add the ip pim send-rp-discovery scope 1 command
C On both RPs add the ip pim send-rp-discovery scope 2 command
D On both ASBRs Eth0/0 add the ip pim bsr-border command
E On both ASBRs Eth0/0 add the ip pim dense-mode command
F On both RPs add the ip pim bsr-border command
C H-VPLS improves the scalability
D H-VPLS allows a broader use of protocols
Answer: C, Scalability
Trang 13QUESTION 37
In a Layer 2 VPN service, which is the default behaviour of an EVC-based platform with regards to VLAN manipulation?
A keeps the VLAN tag of the incoming frame
B attaches two VLAN tags to the incoming frame
C removes the VLAN tag from the incoming frame
D removes all the VLAN tags from the incoming frame
E sets the VLAN tag of the incoming frame
Answer: A, EVC keeps the VLAN tag
QUESTION 38
Which of these is not a component of MPLS traffic engineering?
A trunk admission control
B forwarding traffic to tunnel
C information distribution
D path selection, calculation, and setup
E traffic patterns prediction
Answer: E, MPLS TE cannot do predictions
QUESTION 39
Which three statements about MPLS traffic engineering (MPLS TE) are true? (Choose three)
A MPLS TE supports admission control
B MPLS TE tunnel traffic is a link attribute to compute the TE tunnel path
C MPLS TE uses BGP extension to advertise link attributes
D MPLS TE provides protection capability
E MPLS TE uses RSVP to establish LSP
Answer: ADE, admission control, protection and RSVP for LSP
QUESTION 40
Which statements about BGP confederation and route reflectors are true? (Choose three)
A Clusters are used in confederation schemes to avoid loops
B BGP network can have a confederation within a route reflector area
C An internal BGP network cannot have a route reflector within a confederation
D An internal BGP network can have a route reflector within a confederation
E Clusters are used in route reflector schemes to avoid loops
F BGP network cannot have a confederation within a route reflector area
Answer: DEF, RR in confederation Ok, no confederation in RR
Trang 14In an MPLS VPN environment, the QoS marking over the MPLS backbone must be
different from the one that is received from the customer The forwarding on the egress PE
is based on the marking that is set by the ingress PE Which null label and QoS mode can
achieve this?
A MPLS explicit null with pipe mode
B MPLS implicit null with short pipe mode
C MPLS implicit null with uniform mode
D MPLS explicit null with uniform mode
E MPLS explicit null with short pipe mode
F MPLS implicit null with pipe mode
Answer: A, explicit null with pipe mode
QUESTION 43
Drag and Drop Questions
Answer:
Trang 15
QUESTION 44
Which is the main goal of BGPsec regards to improve BGP security?
A Reduces risk of improper route propagation from unauthorized AS numbers
B Configures BGP route verification by storing routes in a database used to
validate AS numbers
C Adds encryption to route propagation outside the iBGP AS
D Increases legitimacy and authenticity of BGP advertisements
Answer: D, authenticity of BGP advertisements, it validates the ASPATH
QUESTION 45
Drag and Drop Questions
Trang 16
Answer:
It always changes when sent to eBGP and doesn’t change to iBGP
QUESTION 46
What is the BGP synchronization rule?
A BGP should not advertise a route until that route has been learned via an IGP
B Routing information received through an eBGP session is not forwarding to another
iBGP neighbor, only to iBGP neighbors
C BGP neighbor peering are established and synchronized using TCP
D BGP should not advertise a route when that route has been learned via an IGP
E Routing information received through an iBGP session is not forwarding to another
iBGP neighbor, only to eBGP neighbors
Answer: A, only routes learned via IGP are advertised
Trang 17QUESTION 47
Refer to the exhibit R2 and R3 cannot install IS-IS IPv6 routes What is the root cause?
A R2 is missing the metric-style wide command under the IS-IS process
B R3 is missing the multi-topology transition command under the IS-IS address-family IPv6 process
C R2 is missing the multi-topology command under the IS-IS address-family IPv6 process
D R3 is missing the metric-style wide command under the IS-IS process
Answer: B
QUESTION 48
Which statement about Software Maintenance Upgrade is true?
A CRS-1 SMU can be applied to a different platform, and vice versa
B SMU is an executable code for running a process or libraries that are shared
between the different processes
C SMUs for each release are individually downloadable from Cisco.com and come in the form of a tar ball
D SMUs provide software fixes for critical network down and qualification blocking issues Therefore, every software defect has a corresponding SMU
E SMUs are release-specific If an issue affects multiple platforms or releases, an SMU is built separately for each release and each platform
Answer: E, release-specific
Trang 18B TE tunnels that are configured with the FRR option can be used as backup tunnels
C The backup tunnel that is used to protect a physical interface must have a valid IP address configured
D Interfaces must use MPLS global label allocation
E The source IP address of use backup tunnel and the merge point (MP) should not be reachable
Answer: ACD, FRR cannot be a backup
QUESTION 50
Refer to the exhibit Two MPLS TE tunnels are configured with a total bandwidth
guarantee of 100 Mbps However, Tunnel 1 has a requirement to have one-fifth of this total bandwidth Which two configurations accomplish this goal? (Choose two.)
A Configure tunnel mpls traffic-eng bandwidth 20000 under the Tunnel 1 interface
B Configure bandwidth 20000 under the Tunnel 1 interface
C Configure tunnel mpls traffic-eng bandwidth 80000 under the Tunnel 2 interface
D Configure bandwidth 80 Mbps under physical interfaces in the path PE1-P2-PE2
E Configure bandwidth 20 Mbps under physical interfaces in the path PE1-P1-PE2
F Configure bandwidth 80000 under the Tunnel 2 interface
Answer: AC, TE BW under the Tunnel interfaces
Trang 19E rtrA, rtrB and rtrC are part of a confederation sub-AS where rtrB is a route reflector and
rtrA, rtrC are route reflector-clients
Answer: BDE
QUESTION 52
Drag and Drop Questions
Trang 20
Answer: B1 – section, B2 – line, B3 - path
A Service Provider connects to a client site that has two CEs These CEs have a backdoor
link for backup OSPF is used as the routing protocol in this environment You want to
ensure that client traffic prefers the service provider connections for routing instead of the
secondary connection Which option describes the default behaviour and the action that
accomplishes your goal?
Trang 21A The routes to the Service Provider are not preferred, due to the increased OSPF cost through the service provider network Ensure that the cost on the links to the service
provider are lower than the secondary connection
B The routes to the Service Provider are seen as external type 1 in the OSPF database Configure a domain ID that is the same across all PEs, to ensure that customers see routes
as intra-area
C The routes to the Service Provider are seen as interarea OSPF routes through the
network Configure a sham link to create a new intra-area path across the service provider network between the PE routers that service the client
D The routes to the Service Provider are seen as equal and cause nondeterministic traffic patterns Ensure that the secondary connection has a higher cost than the links to the service provider
Answer: C, Sham Link
QUESTION 56
Which two statements about OSPF IPv6 routing are true? (Choose two)
A It requires OSPF version 3
B Automatically detects neighbors over NHMA interfaces
C It supports encryption using
D It uses LSA type 9
E It uses LSA type 8
Answer: AE
QUESTION 57
Which two statements about forwarding equivalence class (FEC) are true? (Choose two)
A FEC might correspond to a destination IP subnet, but it might also correspond to any traffic class that the edge LSR considers significant
B FEC is a group of IP packets that is forwarded over a different path, but with the same forwarding treatment
C FEC is a group of IP packets that is forwarded over the same path, and with the same forwarding treatment
D FEC is a group of IP packets that is forwarded over a different path, but with the
different forwarding treatment
E FEC is a group of IP packets that is forwarded over the same path, but with a different forwarding treatment
Answer: AC
Trang 22An engineer is working to provide high availability to a Service Provider core network
Which BGP command enables a backup path to be installed in the RIB and CEF tables?
Trang 23QUESTION 61
In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS selection?
A highest router ID first, then highest priority
B highest MAC address first, then highest priority
C highest router ID first, then highest MAC address
D highest priority first, then highest router ID
E highest priority first, then highest MAC address
Answer: E
QUESTION 62
Refer to the exhibit If the SP network is configuring RTBH filtering to protect hosts on the 152.68.19.0/24 network, which router should be configured as the black hole activating router?
Trang 24QUESTION 63
An engineer wants to configure Fast Reroute in the network Which methodology
eliminates RSVP configuration in the network?
A Enable LDP Fast Synch
B Enable IP Fast Reroute
C Enable the autotunnel primary feature
D Enable Cisco MPLS TE Fast Reroute
E Enable the autotunnel backup feature
Answer: B, just enable FRR
Which three statements about the secure domain router are true? (Choose three.)
A The logical router can span across chassis
B The fabric and system controller module are shared by all logical routers
C Each logical router has a distinct fabric and system controller module
D The logical router can share a route processor
E The logical router cannot share a route processor
Answer: ABE, Fabric and System controller are shared, Processor is not
QUESTION 66
An engineer is implementing an MPLS within the core of the Service Provider network
What two components are required to build the control and data plane for MPLS Label
Switched Paths? (Choose two.)
Trang 25QUESTION 67
Which three protocols use TLVs to carry attributes? (Choose three.)
A Cisco Discovery Protocol
B Label Discovery Protocol
C Border Gateway Protocol
850
Which Cisco IOS command should the engineer apply on PE routers?
A neighbor 10.1.1.2 maximum-prefix 1000 85
B neighbor 10.1.1.2 maximum-prefix 1000 850
C neighbor 10.1.1.2 maximum-prefix 1000 85 warning-only
D neighbor 10.1.1.2 maximum-prefix 1000 850 warning-only
Trang 26QUESTION 70
In the diagram, R1 is the head-end of a TE tunnel that terminates on R5 The red line
indicates the protected link, and the gold line indicates the backup tunnel Which router is
the Point of Local Repair?
In which way does the DS-Lite IPv6 transitioning mechanism differ from IPv6 Dual-Stack?
A DS-Lite is a combination of tunnel and translation technologies
B DS-Lite is a transition technology that gives full IPv6 connectivity for IPv6 capable hosts that are on the IPv4 Internet but have no native connection to IPv6 network
C DS-Lite is an automatic tunnel where the tunnel destination is determined by the
IPv4 address extracted from the IPv6 address that starts with the prefix 2002::/16
D DS-Lite is a stateless tunneling mechanism with a lightweight and secure manner
without requiring upgrades to existing IPv4 access network infrastructure
Answer: A, DS Lite is a combo
Trang 27QUESTION 72
Customer XYZ Site 1 is not learning prefixes from Site 2 What is the issue?
A MPLS LSP is broken along the path
B The route-policy is not implemented in router PE-2
C The BGP local-as command should be used between PE-1 and CE-1
D The route-distinguisher values must match in both sites
E The BGP as-override command should be implemented between PE-1 and CE-1
Answer: E
QUESTION 73
Which two models are the models of DiffServ-Aware Traffic Engineering? (Choose two)
A Policy-based Model
B Class based Model
C Russian Doll Model
D Global Tunnel Model
E Maximum Allocation Model
Answer: CE, Russian doll and Maximum Allocation
QUESTION 74
What is one of the primary overhead fields associated with Optical Payload Unit (OPU)?
A path monitoring
B tandem connection monitoring activation deactivation (TCM ACT)
C Payload Structure Identifier (PSI)
D multiframe alignment signal (MFAS)
E section monitoring
Answer: C, PSI
Trang 28QUESTION 75
Process-level redundancy is implemented by a system manager process that creates the standby process What two functions are provided by the system-level process called Qnet Symlink Manager (QSM)? (Choose two.)
A Backing up the information for the broken connections
B Provides common information for connecting processes and services
C Detection of a failed connection
D Provides an abstract name for a process or service
E Distribution of symbolic link information
Trang 29QUESTION 79
All secure domain routers (SDRs) have shared attribute and resources Which three
resources are shared all SDRs? (Choose three.)
Refer to the exhibit Which three statements describe r RIB-Failure in the show ip bgp
command output? (Choose three.)
A It is a redundancy route
B There is a route with a better administrative distance already present in IGP
C The number of routes in VRF exceeds the route limit that is configured under the VRF
What is the minimum hardware configuration of the multi-shelf Cisco CRS-1 system?
A One route processor (RP) card and one modular services card (MSC)
B One distributed route processor (DRP) and one S13 fabric card (SFC)
C One line card chassis (LCC) and one fabric card chassis (FCC)
D One route processor (RP) and one fabric card chassis (FCC)
E One line card chassis (LCC) and one S13 fabric card (SFC)
Answer: C, LCC-FCC
Trang 30QUESTION 82
What is the action of "pop" in the context of MPLS switching?
A It replaces the top label in the MPLS label stack with a set of labels
B It replaces the top label in the MPLS label stack with another value
C It adds a top label in MPLS label stack
D It removes the top label in the MPLS label stack
Answer: D
QUESTION 83
Which two statements about a backup tunnel to avoid the SRLGs of its protected interface are true? (Choose two.)
A Tunnel is not created unless it avoids SRLGs on the protected interface
B If it is not possible to avoid SRLG of the protected interface, backup tunnel will be created anyways
C If it is not possible to avoid SRLG of the protected interface, backup tunnel will not
D Distributed Denial of Service
E Network Attack TCP/UDP Scan
Answer: D (PassLead says B)
QUESTION 85
Which two statements about Unified MPLS are true? (Choose two.)
A Unified MPLS works on Cisco IOS XR Software only
B Unified MPLS extends MPLS across multi-domain networks in a scalable manner
C New technologies or protocols are not used; only MPLS, LDP, IGP, and BGP
D ABR loopback prefixes should be redistributed from core IGP to aggregation IGP
E The RRs are part of the control path only
Trang 31Answer: BC, works in multi-domain, no new technologies
QUESTION 86
A Service Provider is designing control policies at the customer edge of the network, in order to prevent usage that exceeds the contracted terms A new client that is contracted for only 2 Gbps is connecting to the Service Provider edge with a 10 Gbps interface Which two QoS strategies meet the design goal? (Choose two.)
A On the service Provider edge, enable traffic shaping on the customer port
B On the customer edge device, enable traffic shaping on the interface that is
connected to the Service Provider
C On the customer edge device, enable policing on the interface that is connected to the Service Provider
D On the service Provider edge, enable policing on the customer port
E On the service Provider edge, enable WRED on the customer port
F On the customer edge, enable WRED on the interface that is connected to the Service Provider
Answer: BD, Shaping on CE and Policing on PE
QUESTION 87
What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potential exit point out of the area?
A ATT (Attached) bit
B ABR (Area Border Rorter) bit
A Traffic will be dropped with a random rate less than the one defined by MPD
B All traffic will be tail dropped
C Traffic will be dropped with a rate of 1 packet out of 20
D Traffic will be dropped with a rate of 1 packet out of 30
Trang 32Answer: C, 1 out of 20
QUESTION 89
Two Service Providers are beginning a merger between AS boundaries to provide MPLS enabled services between their networks Customers are using both Service Providers for services and, under certain circumstances; there are requirements to extend Layer 2 VPN circuits between each provider The providers are in the process of completing the technical merger However, the MPLS is not supported between the providers Which action allows MPLS Layer 2 VPN circuits to be built over the inter-AS link?
A Create a GRE tunnel with the mpls ip command between ASBRs
B Create Layer 2 VPN peerings between PE routers from each provider
C Create a VPNv4 peering between ASBRs to advertise labels between each provider
D Create a sham link between ASBR routers to enable a superbackbone peering for Layer 2 VPN signaling
Answer: A
QUESTION 90
Which statement about MPLS TE Fast Reroute (FRR) link protection operation is not true?
A It requires a next-hop backup tunnel
B The backup tunnel terminates on the same tail-end router as the primary tunnel
C The point of local repair (PLR) swaps the label and pushes the backup label
D The restoration time is expected to be under 50 ms
E The backup tunnel can have associated bandwidth capacity
Answer: B, backup does not have to terminate on the same tail-end
Trang 33QUESTION 91
Refer to the exhibit An SP core is running MPLS with OSPF as the IGP used for Loopback propagation LDP Synchronization is enabled per the given configuration. What will the
traffic flow behaviour be after a temporary outage event on PE1 Eth0/0?
A Permanently through PE1 -> P2 -> PE4 due to lowest path metric
B Initially through PE1 -> P1 -> PE4, then a few seconds later, it will be over PE1 -> P2 -> PE4
C Permanently through PE1 -> P1 -> PE4 due to lowest path metric
D Initially through PE1 -> P2 -> PE4, then a few seconds later, it will be over PE1 -> P1 -> PE4
Trang 34QUESTION 93
Two Tier 2 Service Providers are using a Tier 1 Service Provider for transport MPLS is required between the Tier 2 Service Providers for label switching In this CSC solution, which label stack is correct?
A Original IP packet, MPLS CSC transport label, MPLS VPN label, and MPLS Tier 2 transport label
B Original IP packet, MPLS Tier 2 transport label, MPLS VPN label, and MPLS CSC transport label
C Original IP packet, MPLS VPN label, MPLS Tier 2 transport label, and MPLS CSC transport label
D Original IP packet, MPLS Tier 2 transport label, MPLS CSC transport label, and MPLS VPN label
Answer: C, first VPN then Tier 2 and CSC
QUESTION 94
What is the PPMP label used for?
A for the ingress replication model with BIDIR-PIM in an overlay model
B only for the inter-AS mVPN models that use mLDP
C for the partitioned mVPN model with PIM signalling in an overlay model
D only for unicast over MPLS VPN
E for all the default MDT and mVPN models
Answer: C, with PIM in Overlay
QUESTION 95
MPLS Service Providers use Route Distinguishers and Route Targets as methods to control routing for customer VRFs Which two statements are true about Route Distinguishers and Route Targets? (Choose two.)
A Route Targets are values that are used by a PE router to uniquely identify a VRF within its local MP-BGP VPNv4 table
B Route Distinguishers are used by PE routers by exporting and importing routes into
Trang 35QUESTION 96
Refer to the exhibit A service provider has multiple time sources in the environment for NTP The time source at 10.0.4.1 is intended to be seen as a primary time source What command can be issued on PE4 to fix the configuration, ensuring the proper NTP source will be issued?
Which two statements regarding the IS-IS DIS election process are true? (Choose two.)
A L1 routers on a broadcast network only establish adjacencies with the DIS
B If the DIS becomes unavailable, the backup DIS is promoted to DIS
C Adding a router with a higher priority than the current DIS will result in the new router becoming DIS
D Separate L1 and L2 election processes are held on a broadcast network
E A priority of 0 will prevent a router from becoming a DIS
F If there is a tie based on priority, the router whose attached interface has the lowest MAC address becomes the DIS
Answer: CD, higher priority is better, separate L1 and L2 elections
Trang 36QUESTION 98
Referring to the exhibit, what could be preventing the R1 router from receiving any
prefixes from the R2 BGP neighbor?
A The neighbor 192.168.31.2 “next-hop-self” command is missing on R2
B R1 is using the wrong remote AS number in its neighbor 192.168.31.1 remote-as configuration
C There is a TCP session establishment problem between R1 and R2
D The no sync command is missing on R1
E The no sync command is missing on R2
F There is a BGP version mismatch between R1 and R2
Answer: B
Trang 37QUESTION 99
Refer to the exhibit Your customer has enabled IPv6 and IPv4 on routers R1 and R2, both running ISIS routing protocol, and they can no longer reach R3 network 172.26.15.0/24
(R3 does not enable IPv6, enables IPv4 only) Which two steps should be taken to restore
reach ability to R3? (Choose two.)
A Enable OSPFv3 to support IPv4 and IPv6 simultaneously
B Configure static routes to all unreachable networks and redistribute to IS-IS
C Create an IPv6 tunnel from R2 to R3
D Transition to IS-IS Multiple Topology Mode on R3
E Enable wide metrics
F Transition to IS-IS Multiple Topology Mode on R1 and R2
Answer: EF, don’t forget the wide metrics
QUESTION 101
In a secure domain router (SDR) scenario, which two functions are shared amongst all SDR
in the system? (Choose two.)
Trang 38QUESTION 102
Refer to the exhibit R3 cannot install a route to R1-R2 subnet 2001:1:155:12::/64 Which
action resolves this issue?
A Add the redistribute ospf 1 include-connected command under the ipv6 router eigrp 10
process
B For the OSPF process, add the no shutdown command
C For prefix-list OSPF_INTO_EIGRP seq 20, replace the prefix with 2001:155:1:12::/64
D For route-map OSPF_INTO_EIGRP, add the set metric 1000 1 255 1 1500 command
Answer: A
QUESTION 103
In a routing virtualization concept, which are the two main techniques for creating
virtualized router entities as defined by their physical and operational characteristics?
Trang 39QUESTION 104
Which OSPF LSA is used to support MPLS Traffic-Engineering?
A NSSA LSA (Type 7)
B Opaque LSA (Type 11)
C Opaque LSA (Type 9)
D Opaque LSA (Type 10)
E External LSA (Type 5)
C Next-Hop Address Tracking
D Fast Peering Session Deactivation
E TTL Security Check
Answer: D, Deactivation of Fast Peering Session
QUESTION 107
Which statement about OSPF authentication is true?
A To enable OSPF authentication in a network, OSPF area 0 authentication must be enabled first
B The payload of OSPFv3 packets contains no authentication information
C OSPFv3 supports Advanced Encryption Standard
D OSPFv3 uses router ID as a key to encrypt OSPF hello packets
E OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP Answer: B, not in the payload
Trang 40QUESTION 108
What is the order of preference for these commands when all of them are applied to one neighbor in the BGP inbound filter direction?
A prefix-list/distribute-list, filter-list, route-map
B route-map, filter-list, prefix-list/distribute-list
C route-map, prefix-list/distribute-list, filter-list
D filter-list, prefix-list/distribute-list, route-map
E prefix-list/distribute-list, route-map, filter-list
Answer: B, Route-Map first, Filter-List and at last Prefix-List
QUESTION 109
Which two statements about EIGRP are true? (Choose two)
A EIGRP supports VLSM, route summarization, and routing update authentication
B If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route
C Passive routes are in the process of being calculated by DUAL
D EIGRP exchanges full routing table information with neighbouring routers with every update
E A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information
Answer: AE, supports VLSM and Queries for failed routes
QUESTION 110
Which statement about Remotely Triggered Black Hole (RTBH) is true?
A Route tagging is one of the techniques used by RTBH
B It is used for BGP authentication
C It cannot work with static routes
D It uses extended ACLs for blocking attacks by creating a black hole
E Before configuring RTBH LDP must be enabled on the interface