Está en la página 1de 67

Http://www.TestKiss.

com 
TestKiss,help U pass any IT exam!
1. VoIP bearer traffic is typically marked to which DSCP value?

A. cs3

B. cs7

C. ef

D. af41

E. af31

F. 0 (default)

Answer: C

2. DSCP value "101110" looks like which IP Precedence value to non-DiffServ compliant devices?

A. IP Precedence 2

B. IP Precedence 3

C. IP Precedence 4

D. IP Precedence 5

E. IP Precedence 6

F. IP Precedence 7

Answer: D

3. Referring to the exhibit, if RTP header compression is used on the link, the header's overhead on the voice

packet will be reduced by what percent?

Http://bbs.56CTO.com 

Http://www.TestKiss.com 
TestKiss,help U pass any IT exam!
A. from 70% to 33%.

B. from 70% to 20%.

C. from 50% to 20%.
D. from 50% to 25%.
Answer: A

4. When should traffic shaping be implemented on Frame Relay PVCs? (Choose two)

A. When you want to drop excess traffic above the CIR

B. When there is a speed mismatch between the central site and the remote site

C. When using Frame Relay SVCs

D. When over-subscribing the central site link

E. When LLQ is implemented on the Frame Relay PVC

F. When Multilink PPP LFI is implemented on the Frame Relay PVC

Answer: BD

5. What are the differences between LLQ and CBWFQ? (Choose two).

A. LLQ supports the addition of strict priority queuing.

B. With LLQ, bandwidth allocations for the priority queue and all the CBWFQ queues are configured using the

priority command.

C. LLQ is configured using MQC and CBWFQ is configured using the fair-queue command.

D. LLQ priority queue bandwidth is policed with a congestion aware policer.

E. LLQ does not support WFQ on the default traffic class (class-default).

Answer: AD

6. What is jitter?

A. The total end-to-end delay

B. The variations of delay

C. The delay caused by placing the bits on the wire

D. The time it takes for the bits to transit the physical media

Http://bbs.56CTO.com 

Http://www.TestKiss.com 
TestKiss,help U pass any IT exam!
Answer: B

7. How many token buckets are needed to support a multi-actions policer that meters conforming, exceeding and

violating traffic?

A. 1
B. 2
C. 3

D. 4

E. 5

F. 6

Answer: B

8. What is the BGP synchronization rule?

A. Routing information received through an IBGP session is not forwarded to another IBGP neighbor, only to

EBGP neighbors.

B. Routing information received through an EBGP session is not forwarded to another EBGP neighbor, only to

IBGP neighbors.

C. BGP neighbor peerings are established and synchronized using the TCP 3-way handshake.

D. BGP shall not advertise a route until that route has been learned via an IGP also.

Answer: D

9. Which BGP attributes can be used to influence inbound traffic flow? (Choose two).

A. MED

B. Local Preference

C. Weight

D. AS-Path

Answer: AD

Http://bbs.56CTO.com 

TestKiss. Stubby or Totally Stubby Answer: C 13. Highest priority first then highest MAC address B.help U pass any IT exam! 10. Fragment (Frag-Nr) F. Backbone (Area 0) E. Highest priority first then highest IS-IS router ID C. Routes redistributed into an OSPF ASBR are which LSA type? A. Partition (P) Answer: ABDF 11. Lowest MAC address E. Http://www. Which OSPF area type accepts type 7 LSA? A. Highest IS-IS router ID first then highest priority D. Highest IS-IS router ID Answer: A 12. LSA type 1 Http://bbs. Highest loopback interface IP address F. Attached (ATT) E. The Attribute field within the IS-IS LSP header contains which of the following flags? (Choose four) A.com  . Overload (LSPDBOL) C. what criteria is used for DIS selection? A. Pseudonode (PN) D.56CTO. IS-Type B.com  TestKiss. Totally Stubby C. Stubby B. In the IS-IS Designated Intermediate System (DIS) election process. NSSA D.

LSA type 4 E. C. Answer: B 16. What is periodically multicasted (every 10 seconds) by the DIS on a LAN to ensure IS-IS Link State Database accuracy? A. IIH E. Http://www. CSNP C. The EIGRP SIA condition occurs when: A. The DUAL process is stuck in a loop due to memory and/or CPU issues.56CTO. LSA type 2 C.TestKiss. the first router connected to the multicast source sends the Register message to which device? A. E. EIGRP can not successfully establish a neighbor relationship with its neighbor. B. LSA type 6 Answer: E 14. LSA type 5 F.com  .com  TestKiss. Multicast source Http://bbs. ISH Answer: B 15. In PIM-SM operations. LSA type 3 D. D. PSNP B. There is no response to an EIGRP query after a defined timeout period. LSP D. There is a routing loop. There is no acknowledgement to an EIGRP update after a defined timeout period.help U pass any IT exam! B.

1 update-source Loopback0 neighbor 10. Immediately after receiving the first packet on the shared tree for a given (S.1 next-hop-self Http://bbs.G). After receiving 100Kbps on the shared tree for a given (S.255. Never switch over to the SPT by default.G). C. E.1.com  . Answer: C 18.1.1 remote-as 51001 neighbor 10. Multicast receiver C.help U pass any IT exam! B. 60 seconds after receiving the first packet on the shared tree for a given (S. RP mapping agent E. B.0. Http://www.0 neighbor 10. D.G). Based on the BGP configuration shown in the exhitbit.10.10 255.0.1.0.255.56CTO.TestKiss. Designated Router (DR) Answer: C 17.com  TestKiss.G).0. What is the IOS default for switching from the shared tree to the SPT in PIM-SM operations? A.1. After receiving 1Mbps on the shared tree for a given (S.10.1.0 ! router bgp 51001 no synchronization bgp log-neighbor-changes bgp confederation identifier 51000 bgp confederation peers 51002 51003 network 10.1.255 ! ! router rip network 10. which of the following statements are correct? (Choose three). ! Interface loopback0 Ip address 10. RP D.

Http://www.TestKiss.com 
TestKiss,help U pass any IT exam!
neighbor 10.2.2.1 remote-as 51002
neighbor 10.2.2.1 ebgp-multihop 255
neighbor 10.2.2.1 update-source Loopback0
neighbor 10.3.3.1 remote-as 51003
neighbor 10.3.3.1 ebgp-multihop 255
neighbor 10.3.3.1 update-source Loopback0
neighbor 192.168.1.14 remote-as 51021
neighbor 192.168.1.18 remote-as 51022
auto-summary
!
A. 192.168.1.14 is an Intraconfederation EBGP neighbor.

B. 10.2.2.1 is an Intraconfederation EBGP neighbor.

C. 10.3.3.1 is an Intraconfederation IBGP neighbor.

D. 192.168.1.18 is an EBGP neighbor.

E. 10.1.1.1 is an IBGP neighbor.

Answer: BDE

19. In which state can BGP peers exchange Update messages?

A. Active

B. OpenSent

C. OpenConfirm

D. Established

E. Idle

Answer: D

20. Referring to the exhibit, what could be preventing the R1 router from receiving any prefixes from the R2 BGP

neighbor?

Http://bbs.56CTO.com 

Http://www.TestKiss.com 
TestKiss,help U pass any IT exam!

A. The neighbor 192.168.31.2 next-hop-self command is missing on R2.

B. R1 is using the wrong remote AS number in its neighbor 192.168.31.1 remote-as configuration.

C. The no sync command is missing on R1.

D. The no sync command is missing on R2.

E. There is a BGP version mismatch between R1 and R2.

F. There is a TCP session establishment problem between R1 and R2.

Answer: B

21. The IPv6 address FE80::656:78FF:FE9A:BCDE is what type of address?

A. Multicast

B. Link-local

Http://bbs.56CTO.com 

Http://www.TestKiss.com 
TestKiss,help U pass any IT exam!
C. Site-local

D. None of the above

Answer: B
22. Which BGP Community option is used to prevent the advertisement of the BGP prefix to any other BGP peer?

A. additive

B. none

C. no-export

D. no-advertise

E. local-as

Answer: D

23. BGP best route selection process is based on what?

A. lowest cost

B. highest bandwidth

C. lowest hop-count

D. path attributes

E. lowest delay

F. lowest delay and highest bandwidth

Answer: D

24. A route can be tagged with a community attribute using which configuration?

A. The neighbor {ip-address} prefix-list command within the BGP routing process

B. The neighbor {ip-address} update-source command within the BGP routing process

C. The network command within the BGP routing process

D. The set command within a route-map

E. The send-community command within a route-map

Answer: D

Http://bbs.56CTO.com 

Drop Probability C. C. It does not support all underlying unicast routing protocols like BGP. Receivers are "registered" with RP by their first-hop router. Queue Depth Answer: B 26. LSA type 7 F. LSA type 1 B.56CTO. LSA type 9 Answer: D Http://bbs.com  TestKiss. The show ip ospf database external command displays information about which OSPF LSA type? A. LSA type 5 E. From the RP. AF Class B. IP Precedence F. With the DSCP value of "101110".com  . CS (Class Selector Value) D. PHB (Per-Hop Behavior) E. It supports shared trees only assuming all hosts want the multicast traffic. E. what does the "11" in bits 1 and 2 indicate? A.TestKiss. traffic flows down a Source Tree to each receiver. Answer: D 27. Which of the following statements is correct regarding PIM Sparse Mode operations? A. Receivers are "joined" to the Shared Tree (rooted at the RP) by their local Designated Router (DR). LSA type 3 D. D. Http://www.help U pass any IT exam! 25. B. LSA type 2 C.

IS-Type bits C. Cisco AutoQoS C. PN (Pseudonode) bit F. Its AD is equal to the successor's FD Http://bbs. WRR Queueing Answer: C 31. Which MQC-based output queueing method is designed to support multiple traffic classes including VoIP traffic. Cisco SDM QoS Wizard E. P (Partition) bit D. ABR (Area Border Router) bit Answer: A 30. ATT (Attached) bit B. Cisco NBAR Discovery B. With EIGRP DUAL.TestKiss. CDP Answer: C 29.help U pass any IT exam! 28. Http://www.com  TestKiss. mission-critical traffic. What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potential exit point out of the area? A. CBWFQ B. Cisco Class-Based QoS MIB D. bulk traffic. a feasible successor is considered loop-free if which condition is true? A. What is used to provide read access to QoS configuration and statistics information on Cisco platforms that support Modular QoS CLI (MQC)? A.com  . LLQ D. CB-WRED C. Down bit E.56CTO. interactive traffic and default class traffic? A. Custom Queueing E.

Starts with a prefix of FEC0 to FEFF in hex D. Its AD is equal to the metric of the successor E. Separate L1 and L2 election processes are held on a broadcast network. E. Its FD is equal to the metric of the successor Answer: C 32. both running ISIS routing protocol. Starts with a prefix of FE80 to FEBF in hex C.TestKiss. First (most significant) octet is FF in hex B. the router whose attached interface has the lowest MAC address becomes the DIS. If the DIS becomes unavailable the backup DIS is promoted to DIS.com  TestKiss.) A.56CTO. Its AD is greater than the successor's FD C.0/24 (R3 does not enable IPv6. Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.help U pass any IT exam! B. Last 64 bit contains the modified MAC address of the Ethernet interface F. Its AD is less than the successor's FD D. B. Answer: CD 34. D. Refer to the exhibit. Which two are characteristics of an IPv6 multicast address? (Choose two) A.26.15. Http://www. Is allocated from the unicast address space Answer: AD 33. enables IPv4 Http://bbs. Your customer has enabled IPv6 and IPv4 on routers R1 and R2. L1 routers on a broadcast network only establish adjacencies with the DIS. F. Second octet contains a 4-bit multicast scope field E. Which two statements regarding the IS-IS DIS election process are true? (Choose Two. A priority of 0 will prevent a router from becoming a DIS. If there is a tie based on priority. and they can no longer reach R3 network 172.com  . C.

Http://www. In Multicast VPN (MVPN) implementations. traffic from the Data MDT is switched to the Http://bbs. Enable OSPFv3 to support IPv4 and IPv6 simultaneously. C. B.com  . It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers. There is a reduced multicast state in the MPLS core P routers. D. F.com  TestKiss. Transition to IS-IS Multiple Topology Mode on R3.help U pass any IT exam! only). B. Configure static routes to all unreachable networks and redistribute to IS-IS. which two of the following statements are true regarding the Default MDT Group? (Choose two) A. Create an IPv6 tunnel from R2 to R3.TestKiss. E. D. It is used for PIM control traffic. Answer: AD 35.56CTO. C. Which two steps should be taken to restore reachability to R3? (Choose Two. When multicast traffic exceeds a certain configured threshold.) A. E. Transition to IS-IS Multiple Topology Mode on R1 and R2. Within the VRF configuration in the PE router. Enable wide metrics. multiple Default MDT groups are configured so each VRF can support multiple multicast sources.

Route-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best path algorithm. select the two configurations for rtrB that will fulfill the following criteria: -Will advertise all routes from rtrA to rtrD but not to rtrC -Will advertise the routes from rtrD to rtrC Http://bbs. Route-Distinguisher is an 8 byte value used in creating unique VPNv4 address.com  TestKiss. When configuring Multicast VPN (MVPN) over an MPLS core. both the Default and Data MDT is configured under which configuration mode? A. router(config-router)# E. The configuration to define Route-Distinguisher is: ip vrf blue rd 1:1 D. router(config-if)# C. Which two statements are correct with regard to route distinguisher as defined in RFC 4364 .help U pass any IT exam! Default MDT to conserve bandwidth. A route distinguisher can be imported and exported to and from a VRF. Having the above BGP peerings. router(config-vrf)# D.router(config-router-af)# Answer: C 38. C.56CTO. Answer: AC 37. B.TestKiss.AKA IP-VPN (MPLS-VPN)? A. Answer: AD 36. Http://www.com  . router(config)# B.

router bgp 2 neighbor 1.TestKiss.1.56CTO. router bgp 2 neighbor 1.help U pass any IT exam! A.1 route-map rtrA in ! route-map rtrA permit 10 set community no-export ! C.1.1.1.1 remote-as 1 neighbor 1.1.1 remote-as 1 neighbor 1. Http://www.1.com  .1.com  TestKiss.1 route-map rtrA in ! route-map rtrA permit 10 set community no-advertise ! B.1. router bgp 2 Http://bbs.

com  TestKiss.1.3.1.1.3 remote-as 3 neighbor 3.3 remote-as 3 neighbor 3.1.3.1 remote-as 1 neighbor 1.1.3.3.3.3.1 route-map rtrA in neighbor 3.56CTO.1 remote-as 1 neighbor 1.1 route-map rtrA in neighbor 3. router bgp 2 neighbor 1.3 route-map rtrC out ! route-map rtrA permit 10 set community 5 ! route-map rtrC deny 10 match community 5 ! Http://bbs.3 route-map rtrC out ! route-map rtrA permit 10 set community 5 ! route-map rtrC deny 10 match community 5 ! D.help U pass any IT exam! neighbor 1.3.1.1.1.3.com  . Http://www.TestKiss.

It is classless. It sends incremental updates. The ASBR-summary LSA is: A.1 that are sourced from port 179 Answer: D 40.0. Allows incoming TCP connections from 1.1. Answer: BEF Http://bbs. Generated by the ASBR and describes reachabilty to the ABR C. RIPv2 differs from RIPv1 in that: A. It can use either multicast or broadcast addresses. instead of broadcast.help U pass any IT exam! route-map rtrC permit 20 ! Answer: BD 39.1 and destined to. Generated by the ASBR and describes reachability to itself B. Generated by the ABR and describes reachabilty to the ASBR for routers in the same area with the ASBR Answer: C 41. Allows incoming TCP connections destined to port 179 B.0. F. D. instead of just broadcast.1. E. instead of classful.com  .10. and RIPv1 does not. It uses multicast address 224.com  TestKiss. It uses multicast address 224. Allows incoming TCP connections from 1. Generated by the ABR and describes reachabilty to the ASBR for routers in a different area from the ASBR D. Allows incoming TCP connections from 1.1.1 remote-as 2 The above bgp configuration has what effect on the configured router? A.1. It supports authentication. B.1. router bgp 1 neighbor 1.1.TestKiss.56CTO.1.9.1 that are destined to port 179 E. instead of periodic updates. C.1. Allows incoming TCP connections sourced from port 179 C. Http://www. instead of brodcast.0.0. or sourced from port 179 D.

help U pass any IT exam! 42. If two routers.x. but only the one generated by the highest RID ASBR will be used. 115 Http://bbs.x. and both will be used. ASBR originating the LSA is not reachable C.56CTO.com  TestKiss.e. Any neighbor that is in the path towards the destination and whose reported distance equals the feasible distance Answer: B 45. Route to the ASBR does not follow the same path as the one to the Forwarding Address Answer: ABC 43. Route to the Forwarding Address is an internal OSPF route E. Two LSAs will exist in the network for this destination.x exists in the OSPF database. both reachable from one another. but the prefix is not installed in the routing table. A Successor is: A. B. 121 B. Only the LSA generated by the highest RID ASBR will exist in the network. which of the following statements would apply? A. According to RFC 3931. A neighbor that has met the feasibility condition B. The OSPF External LSA for prefix x. L2TPv3 utilizes the IANA assigned IP protocol ID of: A. Inbound distribute-list is configured under the ospf process and it is denying x. cost and non-zero forwarding address). Http://www..com  .x B. Which are possible explanations? A.x. C.x. D. Only the LSA generated by the lowest RID ASBR will exist in the network. originate functionally equivalent type 2 external-LSAs (i. Any neighbor that is in the path towards the destination D. A neighbor that has met the feasibility condition and has the lowest cost path towards the destination C. Route to the Forwarding Address in not an internal OSPF route D. same destination. Answer: C 44.TestKiss. Two LSAs will exist in the network for this destination.

110 D. 101 E. 51 Answer: B Http://bbs.TestKiss.help U pass any IT exam! C.56CTO.com  .com  TestKiss. 151 F. Http://www.

rtrB and rtrC are route reflectors part of different clusters C. QoS Groups/Discard Class E. Customer marking C. rtrA. rtrD are part of a different confederation sub-AS E. the PE to CE egress polices are based upon: A. With the BGP peerings shown. rtrB and rtrC are route reflectors part of the same cluster B. rtrA and rtrD are route-reflector-clients. rtrB and rtrC are part of a confederation sub-AS where rtrB is a route reflector and rtrA.com  TestKiss. rtrB are part of one confederation sub-AS and rtrC. rtrA and rtrD are route-reflector-clients. Remarked IP ToS value Http://bbs. rtrA. Innermost label EXP value D.help U pass any IT exam! 46. As described in RFC 3270.56CTO. Short-Pipe Mode operation. Topmost label EXP value B. rtrA. rtrB and rtrC are part of a confederation sub-AS and rtrD is part of a different confederation sub-AS D. Http://www. rtrC are route-reflector-clients Answer: BDE 47.TestKiss. which 3 solutions are most correct? A.com  .

Lower relative security is offered E.56CTO. Greater scalability is offered B. Identify the differences of Option 10A. Better suitability for InterProvider VPNs is provided Answer: BCF 49. Relative technical simplicity is offered D.help U pass any IT exam! F. Multihop E-BGP between ASBRs is utilized F. VC-label C. PW capabilities list B. Packed Cell Relay encapsulation with AToM includes which of the following? A.TestKiss. The ASBR holds VPNv4 routes C. as opposed to Option 10C. Support for 30 packed cells Answer: ABDE 50.com  TestKiss. For option 10A: A. MDRR quantam Answer: B 48. Tunnel label B. Http://www. 5-byte ATM header D. Message type Http://bbs. 4 byte ATM header F. Indentify the AVPs that must be present in L2TPv3 ICRQ messages: A. Payload E.com  . for InterAS VPN offerings.

Hostname Answer: BDE 51. Frame Relay E. MTP E. HDLC F. Cell relay B. With VPLS.help U pass any IT exam! C. LDP C. IGP Answer: C 53. Assigned control connection ID D.TestKiss. Http://www. aal5 C. Remote session ID F. which protocol is used for label exchange and PW signalling A. MP-BGP B. BGP F.com  .com  TestKiss. Which of the following AToM traffic encapsulations require the use of a Control Word? A. Ethernet VLAN D. Directed LDP D. What is the proper MP-BGP configuration between the shown PE routers to implement MPLS VPNs on PE-R2? Http://bbs. PW type E. PPP Answer: BD 52.56CTO.

4 remote-as 1 neighbor 50.0.0.0.help U pass any IT exam! A.4 remote-as 1 neighbor 50.TestKiss.0.0.0.4 activate neighbor 50.0.4 update-source Loopback0 no auto-summary ! address-family vpnv4 neighbor 50.0.0.0.56CTO. router bgp 1 neighbor 50. router bgp 1 neighbor 50. 802.0.0.1q VLAN TAG E.0. Control Word Http://bbs. Service Ethertype B.0.4 activate neighbor 50. Which two of the following are designated fields for MAC tunneling protocol (802.4 update-source Loopback0 no auto-summary ! address-family ipv4 neighbor 50. ISL C.4 update-source Loopback0 no auto-summary ! address-family vpnv4 unicast multicast neighbor 50.com  TestKiss.0.0.4 send-community extended exit-address-family C.0.0. PseudoLAN TAG D.0.0.4 send-community extended exit-address-family B.0.0.0.4 activate neighbor 50. Http://www.com  .0.1ah)? A.4 send-community extended exit-address-family D.4 remote-as 1 neighbor 50. None of the above Answer: B 54. router bgp 1 neighbor 50.

0. If a labeled packet arrives with the top most label of 17. Inserted between the MPLS label stack and the Layer 3 Header C. D.0.14 on Ethernet 0/0. where is this Control Word inserted? A. Inserted between the MPLS label stack and the Layer 3 payload B. it will be replaced with label 17 and sent out on Ethernet 0/0 interface. If a labeled packet arrives with the top most label of 17.0.168. None of the above Answer: B 56. B. Inserted between the MPLS label stack and the Layer 2 Header Answer: C Http://bbs. C.com  TestKiss. it will be replaced with label 19 and sent out on Ethernet 0/0 interface.3 detail Local Outgoing Prefix Bytes tag Outgoing Next Hop tag tag or VC or Tunnel Id switched interface 19 17 50. Inserted between the MPLS label stack and the Layer 2 payload D. all the labels will be removed and a clear IP packet is sent to Next Hop 192. which statement is true R1#show mpls forwarding-table 50.14 A. Based on the following output in R1.168. In Any Transport over MPLS (AtoM) Control word is an optional 4-byte field used in the pseudowire packet. The control word carries generic and Layer 2 payload-specific information to emulate L2 packets correctly.0.TestKiss. In pseudowire packet.help U pass any IT exam! F. Tunnel Label Answer: AC 55.0.com  . Http://www. If a labeled packet arrives with the top most label of 19.0.56CTO.3/32 0 Et0/0 192.

D.com  TestKiss. Http://www. None of above Answer: B 59. Pipe Model C. access-list 110 permit any any udp eq 69 log E. B. RFC 3270 describes Differentiated Services (Diff-Serv) over Multi-Protocol Label Switching (MPLS) networks. Which model alters Differentiated Services (Diff-Serv) code points set in different Differentiated Services (Diff-Serv) domain? A. Short Pipe D. None of the above will alter Differentiated Services (Diff-Serv) code points set in different Differentiated Services (Diff-Serv)domain Answer: A 58. Which of the following statements regarding Selective Packet Discard (SPD) is correct? A. access-list 100 permit any any udp eq 1434 log C. Uniform model B. Which of the following IOS commands can detect whether the SQL slammer virus propagates in your networks? A. access-list 100 permit any any udp eq 1434 B. Selective Packet Discard (SPD) is a mechanism to drop Frame Relay frames with the DE bit set instead of Frame Relay frames DE bits without being set when the link is overloaded. Selective Packet Discard (SPD) is a mechanism to drop packets with low IP precedence instead of packets with high IP precedence when the link is overloaded. access-list 110 permit any any udp eq 69 D.com  . C.TestKiss.56CTO.help U pass any IT exam! 57. Selective Packet Discard (SPD) is a mechanism to drop non-routing packets instead of routing packets when the process level queue is congested. Selective Packet Discard (SPD) is a mechanism to drop normal IP packets instead of VOIP packets when the Http://bbs.

CoPP protects against IP spoofing. and critical packet delivery. ensuring routing stability. Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specify configurable policy actions for the classified traffic.com  TestKiss. rACL can use named access lists C. Normal B. Control Plane Policing (CoPP) addresses the need to protect the management planes. rACL protects against DoS attacks. E. Answer: A 60. Random D. Which of the following statements regarding Control Plane Policing (CoPP) is correct? A. Select C.56CTO. Control Plane Policing (CoPP) protects the transit management and data traffic through the router. Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoS CLI (MQC) to provide filtering and rate limiting capabilities D. B. availability.help U pass any IT exam! link is overloaded. Http://bbs. Full Answer: ACE 61. B. Answer: ABC 62. rACL applies to all interfaces. Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filter DOS packet to protect routing packets. Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL (rACL) is correct? A.TestKiss. CoPP can not use named access lists. CoPP applies to a dedicated control plane interface. E. Discard E. C. Selective Packet Discard (SPD) operates in the following modes: (choose 3) A. None of above. Http://www.com  .

BGP B. RIP Version 2 D.help U pass any IT exam! D. Filter both source and destination where possible Answer: CDE 64. Http://www. Port Scan attack D. Filter as close to the core as possible C. BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate what classification of attack? A. CoPP needs a AAA server. Reconnaissance attack E. RIPv1 Http://bbs. What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles? A. Filter as close to the edge as possible D. EIGRP E. Which routing protocols support MD5 authentication? A. Sniffing attack B. E. Denial of service attack C. rACL does not support rate limits. rACL does not need a AAA server.com  . ISIS F. CoPP supports rate limits. OSPF C. Spoofing attack Answer: E 65. Filter Smurf ICMP packets B. Answer: CE 63.56CTO.TestKiss. Filter as precisely as possible E.com  TestKiss.

The MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hash. Answer: D 68. Multiple keys are supported.help U pass any IT exam! Answer:ABCDE 66. D. Authentication D. The MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hash. What Cisco IOS feature examines packets received to make sure that the source address and interface are in the routing table and match the interface that the packet was received on? A. B.com  . E. A Network administrator applies an access-list to an interface and show output as: Http://bbs.com  TestKiss. Symmetrical routing is required. Receive ACL E. C. MPLS Traffic Engineering B. Shared secret keys are delivered in encrypted messages. D. Domain name must be defined. Dynamic access-lists C.TestKiss. Which of the following statements about MD5 Routing Updates authentication is valid? (Select two) A.56CTO. BGP routing protocol must be running. B. What is a limitation of implementing uRPF? A. Http://www. Answer: AC 67. Unicast RPF Answer: E 69. E. C. Routing updates packets are delivered in encrypted messages. MPLS LDP must be enabled. Named access-lists must be configured.

IP spoofing attack B. if the interface utilization is not maxed out. then use the show access-list and show log commands to determine the type and source of attack D. Which of the following IOS features can prevent IP spoofing attacks? A. then. there is no attack underway.com  TestKiss. It's normal traffic. By setting up an access-list to permit all ICMP. C. How would you characterize the source and type in a Denial of Service attack on a router? A. By performing a 'show ip interface' to see the type and source of the attack based upon the access-list matches B. and UDP traffic with the log or log-input commands. Answer: C 71. Man in the Middle Attack D.56CTO. Http://www. when telnetting into the router perform a 'debug ip packet detail'. Smurf attack C.com  . TCP.TestKiss.help U pass any IT exam! Extended IP access list 100 Permit icmp any any echo(2 matches) Permit icmp any any echo-reply(21374 matches) Permit udp any any echo Permit udp any eq echo any Permit tcp any any established(150 matches) Permit tcp any any (15 matches) Permit ip any any (45 matches) What kind of attack could most likely happen in this network? A. By applying an access-list to all incoming and outgoing interfaces. no attack Answer: B 70. By performing a 'show interface' to see the transmitted load "txload" and receive load "rxload". turning off route-cache on all interfaces. Fraggle Attack E. PPP over Ethernet Http://bbs.

Safe mode Answer: BC 74. to verify there is a return route to the source and to verify that the path uses a valid interface B. Cisco Express forwarding C. loose mode verifies a source address by looking in forwarding information base (FIB). created by routing protocols. MPLS traffic Engineering D. Express mode B. Unicast Reverse Path Forwarding (uRPF) Answer: E 72. None of above Answer: A 73. It is typically used on point-to-point interfaces where the same interface is used for both directions of packet Http://bbs. Strict mode C. Loose mode D. IP destination address is forged C. IS-IS routing E.56CTO.com  TestKiss. IP TCP source port is forged D. Http://www. Which of the following descriptions about IP spoofing is correct? A. IP source address is forged B. Unicast Reverse Path Forwarding (uRPF) can work in the following modes: A.com  . Which of the following descriptions about uRPF Loose mode is correct? A. IP TCP destination port is forged E. It is typically used on multipoint interfaces or on routers where asymmetrical routing is used (packets are received on one interface but the return path is not on the same interface).help U pass any IT exam! B.TestKiss. Tunnel mode E.

help U pass any IT exam! flows. Logging detect fail-login B. Http://www. Http://bbs. What IOS command can make the attack recorded in a syslog server? A. A network administrator wants to detect a login attack against a router. what. B. Netflow records bidirectional IP traffic flow. none of the above Answer: B 77.56CTO.com  . Which descriptions of Netflow is correct? A. Login on-failure log C. C. None of above Answer: AC 75. service timestamps log datetime B. Which of the following IOS commands cause syslog messages to be stamped with time and dates? A. If a packet fails the uRPF Loose mode check. where. Logging login on-failure E. If a packet fails the uRPF Loose mode check. Netflow accounts for both transit traffic and traffic destined for the router. service logging datetime D. By default. it is then checked against the adjacency table to ensure the same interface receiving the packet is the same interface used for the return path C. Login detect login-failure log D. when. logging datetime on E. if the source address has a return route in the FIB table.com  TestKiss. Netflow answers questions regarding IP traffic: who.TestKiss. logging trap datetime C. the packet is then dropped D. the packet is then transmitted and creates a log message E. logging timestamps on Answer: A 76. and how.

1.2. It is normal traffic. What can be concluded? A.com  TestKiss. ISIS updates exchange between trigger router and black hole router E. Http://www.10.TestKiss. There is a potential DOS attack on device of 194.6.10. Answer: BCD 78. None of above Http://bbs. EBGP updates exchange between trigger router and black hole router C.6. Netflow returns the subinterface information in the flow records.help U pass any IT exam! D.com  . What is the requirement of Remote Triggered Black Hole (RTBH) filtering? A. B. IBGP updates exchange between trigger router and black hole router B. It is multicast traffic source from 194.56CTO.0 generating attacks. It is multicast traffic destined for 194. Answer: BC 79. C.6. D.10.2. There is a potential sacrificed host located at network 192. E.6. A network administrator issues the command "show ip cache flow" and finds the shown output. OSPF updates exchange between trigger router and black hole router D.2.

each provider edge advertises a virtual circuit label mapping that is used as part of the label stack imposed on the Ethernet frames by the ingress provider edge during packet forwarding. D.com  . Which of the following are steps to configure destination-based Remote Triggered Black Hole (RTBH) filtering? (choose three) A. and filtering mechanisms defined for Ethernet bridging. In Cisco? VPLS the virtual circuit setup uses Multi-Protocol BGP as autodiscovery and signaling mechanism. Http://bbs.56CTO. C.com  TestKiss. Configure all edge routers with static (reserved) host route to Null0 C. aging. Cisco VPLS uses directed LDP as a signalling protocol to exchange reachability (MAC addresses) information to avoid maintanance of ARP cache. This information is learned from the data plane using standard address learning. Which two statements best describe the signalling requirements of virtual circuit setup of VPLS and exchange of reachability information (MAC addresses)? A. Cisco VPLS does not require the exchange of reachability (MAC addresses) information via a signaling protocol. Configure on trigger router to advertise victim host route with community E. In Cisco? VPLS the virtual circuit setup uses the same LDP signaling mechanism defined for point-to-point services. Configure OSPF between trigger router and black hole routers B.TestKiss. Http://www. B. Configure BGP between trigger router and black hole routers D. Activate black hole by redistributing route for victim into BGP with next-hop set to the static (reserved) host route configured on edge routers Answer: BCE 81. Using a directed LDP session. Using BGP allows BPDUs to be propagated across VPLS in a scaleable fashion.help U pass any IT exam! Answer: A 80.

Answer: BC 83. D.56CTO.1Q tag represents customer VLAN ID and inner . It is an effective way to achieve VLAN transparency between Provider and enterprise customer by tunneling one set of VLAN tags inside a second VLAN tag. FEC determines how to establish an LSP path. C. The Outer . B.com  TestKiss. Address Family Identifier (AFI) carries the identity of the Network Layer protocol for which the BGP speaker intends to advertise multiple paths.1Q tag represents customer VLAN. D. Answer: BD 84.com  . B.1Q tag represents Service VLAN ((PVLAN))and inner . C.TestKiss. Http://www. Subsequent Address Family Identifier (SAFI) provides additional information about the type of the Network Layer Reachability Information carried in the attribute. What is the role of Forwarding Equivalence Class (FEC) in MPLS? A.1Q tag represents Provider VLAN (PVLAN). FEC determines how IP packets are forwarded in MPLS LSP. B.help U pass any IT exam! Answer: AD 82. FEC determines how MPLS labels are stacked in LSP. The Outer . Subsequent Address Family Identifier (SAFI) provides additional information about the type of the Network Layer ports carried in the BGP update. C. QinQ is a way to hide native VLAN which can conflict with Provider native VLAN. Which two statements are TRUE? A. FEC determines how a group of IP packets are mapped to an LSP. None of above Http://bbs. Address Family Identifier (AFI) field carries the identity of the Network Layer ports for which the BGP speaker intends to advertise multiple paths. D. E. With regard to QinQ used in VPLS (Virtual Private LAN Services) which two statements are true? A.

LDP E.TestKiss. Layer 2 circuits (ATM. S flag Answer: BCDE 87. FR. OSPF C. BGP B. Groups of addresses/sites-VPN x C. HDLC. MPLS label headers for packet media consist of: A. Which protocols can be used for MPLS to distribute labels? A. PPP. Tunnel interface-traffic engineering Answer: ABDE 86.com  . ISIS D. TTL E. Http://www.56CTO.help U pass any IT exam! Answer: C 85. IPSEC Encryption Algorithm D. Label C.com  TestKiss. Version B. A bridge/switch instance-VSI E. RSVP Answer: ADE Http://bbs. COS/EXP D. Ethernet) B. Forwarding Equivalence Class (FEC) corresponds to: A.

Cell mode E. Lightweight messaging B. Lower maintenance cost Http://bbs.56CTO. All of the above Answer: F 90. What are the benefits of using TCAM technology in high-end routing products? A. Prevents head-of-line blocking B.help U pass any IT exam! 88.TestKiss.com  . Simplifies configuration Answer: A 91. Http://www. Memory management C. Frame mode Answer: D 89. Packet mode D. VPI/VCI mode B. Which of the following processes are likely to be found in a microkernel? A. What is the importance of using Virtual Output Queues on ingress Line Cards in a high-end router? A. Process scheduling F. Hardware abstraction D.com  TestKiss. VCI mode C. Increases forwarding performance D. What is the mode for MPLS running on ATM? A. Uses less memory C. Lower power consumption B. Host stack E.

Just before sending a CEASE message to tear down the session B. BFD D. Longer uptime Answer: DE 92.help U pass any IT exam! C. Simplified configuration D. MPLS TE FRR B. SNMP Answer: AC 94. MPLS VPN C. VPLS F. Http://www. Following a link flap in the BGP speaker's AS C. 5s F. Deterministic performance E. Following a Route Processor Switchover D. 10ms C. 500ms D. RSVP E.56CTO. In which of the following BGP-related events is an End-of-RIB (EOR) message sent? A. Which of the following technologies can improve convergence time following a link failure in a service provider network? A. During initial convergence Http://bbs. 30s Answer: E 93. 0ms B.com  .TestKiss. 1s E. What is the default SPF throttle timer in OSPF? A.com  TestKiss.

SD. Lockout of Protection. Manual Switch. Which of the following is a correct arrangement of APS Action Requests in order of priority. The red line indicates the protected link. Manual Switch. SD E.56CTO. and the gold line indicates the backup tunnel. None of the above Answer: B 96. SD. SD C. Lockout of Protection. Which router is the Point of Local Repair? A. Forced Switch. Manual Switch. Forced Switch B. Manual Switch Http://bbs. During capability negotiation Answer: CD 95.com  . Manual Switch D. SD. Lockout of Protection. R1 B. Http://www.com  TestKiss. Forced Switch. In the diagram. Lockout of Protection. R4 E. Forced Switch. R2 C. Lockout of Protection. with highest priority first? A. R3 D.help U pass any IT exam! E. R5 F. R1 is the head-end of a TE tunnel that terminates on R5.TestKiss. Forced Switch.

In which of the following lists of APS Action Requests is the priority correctly arranged from lowest to highest? A. Wait-to-Restore Http://bbs. standby 1 priority 130 D. Wait-to-Restore. Forced Switch. Manual Switch. Per-hop flooding time of new link state E. standby 1 priority 130 preempt Answer: CF 99. standby 1 priority 120 preempt F. Manual Switch.com  . None of the above Answer: C 97. Forced Switch. standby 1 priority 110 preempt E. Assume two routers on the same subnet. Which of the following HSRP interface configurations will always result in the R2 becoming the primary? A. Http://www. Manual Switch. R1 has a priority of 120. Failure detection B. Forced Switch. Manual Switch. Failure reporting C. Forced Switch C.TestKiss.56CTO.com  TestKiss. R1 and R2. Lockout of Protection B. Number of hops that need to be notified of new link state Answer: E 98. both configured for HSRP. Lockout of Protection.help U pass any IT exam! F. Wait-to-Restore. standby 1 priority 120 C. Which of the following events can NOT be tuned via router configuration to provide for faster convergence following a link failure? A. Wait-to-Restore D. Lockout of Protection. standby 1 priority 110 B. IGP LSP/LSA origination D. Lockout of Protection.

help U pass any IT exam! E. Lockout of Protection. Which of the following processes in IOS XR run exclusively on the Route Processor? A. Wait-to-Restore. wdsysmon E. Forced Switch Answer: E 100.TestKiss.56CTO. gsp Answer: AB 101. After the Layer 3 header and before Layer 2 header B.com  . Manual Switch. Within the Layer 3 header D. Wait-to-Restore. Forced Switch. The mechanisms for distributing LDP are: A. CEF and the FIB table D. Before the Layer 2 header Answer: B 102. LDP and RSVP B.com  TestKiss. Aand B Http://bbs. After the Layer 2 header and before the layer 3 header C. sysmgr D. bgp B. Manual Switch. RSVP and CEF C. UDP and IP E. In a frame. Http://www. Lockout of Protection F. the MPLS label is imposed: A. mpls_ldp C.

1.TestKiss.8 B. show tag-switching tdp binding 1. Packet-based switching devices B. Aand B Answer: C 105. MPLS VPN C. OSPF and ISIS uses the following method for TE tunnels: A.1. VPI/VCI-based switching devices C. MPLS TE B.0 Http://bbs.1.com  . None of the above Answer: C 104.1.com  TestKiss. When CEF switching and Label switching is done D. None of the above E. sho tag-switching tdp bindings neighbor 1. OSPF and ISIS uses TLV C. GMPLS is based upon: A.help U pass any IT exam! Answer: A 103. Which command will display the MPLS label binding for IP prefix 1. Using more than one label on a single packet is required in what context? A.56CTO. OSPF and ISIS uses type 6.0 /24 B.10. Non-Packet-based devices D. Http://www. OSPF uses Type 9.7. In all the above circumstances Answer: B 106.1.11 and ISIS uses TLV D. A and B E.0 on the router? A.1.

A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor door D. show tag-switching interface e0/0 D.com  TestKiss. Answer: AB Http://bbs. Access-list Control in Distance Vector protocol like RIP and EIGRP Answer: AF 108. A sham-link is seen as an intra-area link between PE routers.TestKiss. A and B both will show the binding E. BGP feature allow-as in E. All of the above Answer: A 107. Which IOS features are used to avoid Routing loops when dynamic Routing protocols are used between PE and CE in MPLS-VPN networks? A.56CTO.help U pass any IT exam! C. SHAM links with OSPF C.com  . If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge (PE) routers in the VPN backbone. which two options best describe the use of SHAM links? A. A sham-link is created between any two VPN sites that belong to the same OSPF area and share an OSPF backdoor link B. BGP cost community D. Http://www. Site Of Origin SOO B. A SHAM link is part of OSPF network of MPLS-VPN provider. an OSPF adjacency is created and database is exchanged C. RPF Reverse Path forwarding F.

The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endpoint. The session ID will be negotiated by the control connection or statically defined if using the L2TPv3 data plane only. D. Answer: AB 111. In the Inter-AS VPN deployment shown in the diagram. The session ID is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endpoint. what is the Next Hop address of MP-iBGP update for CE4 network received at PE-R2? Http://bbs. word-aligned optional field.com  TestKiss. The cookie is a variable length (with a maximum of eight bytes).com  . Route-Distinguisher D.help U pass any IT exam! 109. Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet? A. Which three choices are BGP Extended communities used in MPLS-VPN deployment? A. word-aligned optional field. The control connection can negotiate this as an additional level of guarantee beyond the regular cookie lookup to make sure that a data message has been directed to the correct session or that any recently reused cookie will not be misdirected. The control connection can negotiate this as an additional level of guarantee beyond the regular session ID lookup to make sure that a data message has been directed to the correct session or that any recently reused session ID will not be misdirected.TestKiss. Domain Identifier BGP extended community Answer: ABD 110. Route-Target C. B. Site Of Origin SOO B. C. The session ID is a variable length (with a maximum of eight bytes).56CTO. Http://www. The cookie will be negotiated by the control connection or statically defined if using the L2TPv3 data plane only.

0. Call Serial Number Answer: ACE 113. Assigned Session ID D.56CTO.0.0.1 C.0. PE-R4 50. Which Any Transport over MPLS (AToM) solution allows transportation of ATM signaling as well as Operations Administration and Maintenance (OAM) cells across a packet network.0.4 B. ASBR-2 50.2 Answer: C 112. ASBR-1 50. Called Number E. Calling Number C.0. PE-R2 50.3 D.0.com  TestKiss. making a packet network invisible to the ATM network? Http://bbs. Http://www.help U pass any IT exam! A. Message Type B.com  .0. Select 3 AVPs (Attribute-Value Pair) which MUST be present in the ICRQ: A.TestKiss.

56CTO." Http://bbs. B. A value of 4 represents the "Implicit NULL Label. D. A value of 1 represents the "IPv4 Explicit NULL Label. Directed LDP is used for label distribution in L2-VPN Attachement Circuits. Http://www. MP-BGP is used for label distribution in MPLS Traffic Engineered networks. ATM adaptation layer 5 (AAL5) transport over MPLS C." B. C. ping with record route option). D. D. None of the above Answer: A 114. Answer: AB 115.com  TestKiss." C. Which 4 statements regarding MPLS Label Stack Encoding is true? A.TestKiss. A value of 1 represents the "Router Alert Label". MP-BGP is used for label distribution for VPN customer routes. C.help U pass any IT exam! A. B. Which two statements are correct? A. ATM Cell Relay over MPLS B. A value of 0 represents the "IPv4 Explicit NULL Label. A VC type 5 transports a VLAN over MPLS. Which option describes the incorrect usage of the Label Distribution method? A. A VC type 4 tunnels an Ethernet port over MPLS. A VC type 4 transports a VLAN over MPLS. A value of 2 represents the "IPv6 Explicit NULL Label. Answer: D 116.com  . LDP is primarily used in internal networks of MPLS-VPN providers. ATM over MPLS with the cell loss priority (CLP) field mapped to MPLS EXP bits D. The use of this label is analogous to the use of the "Router Alert Option" in IP packets (for example." E. A VC type 5 tunnels an Ethernet port over MPLS.

com  TestKiss. Route-Target is an 8 byte value used in creating unique VPNv4 addresses. Which 2 statements are correct? A.TestKiss. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PE router in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.com  . B.help U pass any IT exam! F." Answer: BCDF 117.56CTO. The correct configuration to define Route-target is Ip vrf blue Route-target both 1:1 Or ip vrf blue export route-target 1:1 import route-target 1:1 Answer: AC 118. Route-Target is an 8 byte BGP Extended Community that acts as a filter used in the distribution of VPN routing information. B. What best describes the usage of Route-Target rewrite? A. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the Route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN Http://bbs. The correct configuration to define Route-target is Ip vrf blue Route-target both 1:1 Or ip vrf blue route-target export 1:1 route-target import 1:1 D. C. A value of 3 represents the "Implicit NULL Label. Http://www.

0.0. D.0. LDP hello packets are sent to TCP port 711. Length field C.4. LDP hello packets are sent to UDP port 646. B.help U pass any IT exam! configurations.0. B.0. 50. The IP address 50.TestKiss. Based on the following output in a router A running LDP. The IP address 50. C. Which statements about MPLS Label Distribution Protocol (LDP) are valid? A. None of the above.com  TestKiss. what is defined in pseudowire emulation that mainly serves as a detection mechanism for network operators to troubleshoot occasional out-of-order delivery problems? A.1/32. tag:16 A. 50.4:0.0.56CTO.0.1/32 is assigned to its directly connected LDP neighbor.0.0. D. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.0. None of the above Answer: C 119.0. Answer: A 120.0. The IP address 50. Http://www.0.0. Http://bbs.0. Sequence number field B. which statement is true? #show mpls ldp bindings 50. Order field D.1/32 is assigned to one of its own interfaces.com  .1/32 is assigned to the non-directly connected LDP neighbor. In Any Transport over MPLS (AToM).1 32 tib entry: 50.0. rev 5 local binding: tag: imp-null remote binding:tsr:50. C. Series check field Answer: A 121.4.

Answer: ACF 122. Opaque LSA (Type 11) E. Time-Division Multiplex Capable Interfaces (TDM) C.56CTO.TestKiss. Opaque LSA (Type 9) C.com  . Extended IS neighbor TLV # 22 B.help U pass any IT exam! C. What ISIS TLVs are used to support MPLS-traffic Engineering? A. E. F. D. Extended IS name TLV #137 C. Cell-Switch Capable Interfaces (CSC) Http://bbs. Router ID TLV # 134 Answer: ADE 123. LDP establishes a peer relationship with another router that must be directly attached.com  TestKiss. What OSPF LSA is used to support MPLS-traffic Engineering? A. LDP sessions are TCP sessions to port 646. LDP sessions are TCP sessions to port 711. Packet-Switch Capable Interfaces (PSC) B. Opaque LSA (Type 10) D. Http://www. Which interfaces are defined in GMPLS? A. Extended IP reachability TLV # 135 E. Extended IS resource TLV#138 D. External LSA (Type 5) B. NSSA LSA (Type 7) Answer: C 124. LDP can establish a peer relationship with another router that is not directly attached.

What is used as label in cell-based MPLS? A.TestKiss. VPI and VCI D.help U pass any IT exam! D. Channel mode E. Fibre-Switch Capable Interfaces (FSC) F. Label Management Protocol C.com  . None of above Answer: D 126. VCI C. LMP stands for: A. Frame mode C. In the context of GMPLS.56CTO. Http://www. Layer 2 Switch Capable Interfaces (L2SC) Answer: ABDEF 125. Loop Management Protocol B. VPI B. Load Management Protocol D. Tunnel mode Answer: B 127. None of above Http://bbs. Lambda Switch Capable Interfaces (LSC) E. Packet mode B. Link Management Protocol E.com  TestKiss. Specific 4 bytes label E. What is the encapsulation mode for MPLS running on Ethernet ? A. Transparent mode D.

TE label Answer: A 129. What is the MPLS packet label stack sequence (from outer to inner) for the VPN traffic on this router? A. TE label. Downstream unsolicited mode E.help U pass any IT exam! Answer: C 128. TE label. Show mpls ldp discovery Answer: B 130. Show mpls forwading-table B. There is MPLS VPN traffic traversing through a TE intermediate router. VPN label B.com  TestKiss. IGP label. VPN label C. Static assignment mode B.TestKiss. TE label E. VPN label. Http://www. Show mpls ldp parameters E.56CTO. TE label.com  . IGP label. Quick mode D. IGP label. VPN label. Dynamic assignment mode C. IGP label. What are label distribution modes for LDP? (Choose 2) A. VPN label. What IOS commands display MPLS label mapping on an LSR? A. IGP label D. Show mpls ldp bindings C. Show mpls ldp neighbor detail D. Downstream on-demand mode Answer: DE Http://bbs.

It replaces the top label in the MPLS label stack with a VPN label and propagates. OSPF B. D. What is the action of "pop" in the context of MPLS switching? A. In the context of MPLS. None of above Answer: A 132. It replaces the top label in the MPLS label stack with another value. ISIS C. What protocol is used for Path Setup in MPLS traffic engineering? A. It adds a top label in the MPLS label stack. It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packets. TE path calculation is conducted by: A. None of above Answer: D 133. D.TestKiss. B. It replaces the top label in the MPLS label stack with a set of labels.help U pass any IT exam! 131. Independent server Answer: C 134. B. C. TE middle point B.com  TestKiss. All TE nodes along the path E. E. C. Http://www. It adds the VPN label into the top label in the MPLS label stack. TE head end D. It removes the top label in the MPLS label stack. E. In the context of MPLS Traffic engineering. BGP Http://bbs. what is the correct action to be performed when an aggregate label is received? A.com  .56CTO. TE tail end C. It replaces the bottom label in the MPLS label stack with a VPN label and propagates.

TestKiss.56CTO. PPPoA B.com  TestKiss. PIM Answer: D 135. B. Which methods would enable traffic to be forwarded along an MPLS TE tunnel (Choose 4) A. Forwarding adjacency makes the TE head-end node advertise the Tunnel LSP into the IGP. Static routing C. Typical ADSL broadband Internet access requires a username and password to be entered on end-user PC connected to the ADSL modem in order for the end user to gain access to the Internet. D. Answer: ACD 137. Forwarding adjacency Answer: BCDE 136. RSVP E. Autoroute causes the TE head-end to establish IGP adjacency with the tail-end over the tunnel. PPPoE client D. Route Bridge Encapsulation (RBE) C. MP-BGP routing B.com  . Policy routing D. C. Which statements are correct for forwarding traffic into MPLS TE tunnels? (Choose 3) A. Http://www. Forwarding adjacency supports unequal cost load balancing over multiple TE tunnels. If a Cisco ADSL router is used instead of an ADSL modem. what functionality is required on the Cisco ADSL router so the end-user connected to the Cisco ADSL router can access the Internet without entering a username and password? A.help U pass any IT exam! D. Autoroute causes the tunnel to be treated as a directly connected link to the head-end. Integrated Routing and Bridging (IRB) Http://bbs. Autoroute E.

AAA Answer: C 138. C. What statement about Transit AS is true? A. Loss should be no more than 1 percent. One-way latency should be no more than 150/2=75 ms. Loss should be no more than 3 percent. Http://www. B.com  . Jitter should be no more than 300 ms. AS numbers are assigned by the IANA. video conferencing traffic) which three statements depicts the correct requirements? A. Answer: ABC 140. Traffic and prefixes originating from Transit AS are carried across a Stub AS to their destination AS. All of the Above Http://bbs.com  TestKiss.g. In the Internet. an Autonomous System (AS) is a collection of IP networks and routers under the control of one entity (or sometimes more) that presents a common routing policy to the Internet. Jitter should be no more than 30 ms. B. When provisioning for Interactive-Video (e. C. D. One-way latency should be no more than 150 ms.56CTO. D.help U pass any IT exam! E. What is true regarding Autonomous Systems (AS)? A. C. AS numbers are used by BGP (Border Gateway protocol) to exchange IP routing information with neighboring AS. Answer: A 139. D. Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Source AS. None of the above. E. B.TestKiss. F. Traffic and prefixes originating from Source AS are carried across a Transit AS to reach their destination AS.

Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCI. Inverse ARP is enabled by default for all protocols enabled on the physical interface. B. A. Amplification is prevented if local changes have only a local effect as opposed to systems in which local changes have a global effect. B. A. Inverse ARP is configured using the following command under the Interface configuration 'frame-relay map Http://bbs. D. Line C. as explained in RFC 3429( Internet Architectural Guidelines). Select the statement that best describes "The cure for Amplification Principle" in the Internet domain. Path E. Amplification is prevented if global changes have only a local effect as opposed to systems in which global changes have a local effect. Section B. Http://www. C. Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP. None of the above. Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop protocol address or the DLCI for outgoing traffic.com  TestKiss. SONET's three layers are: A.56CTO. DS1 Answer:ABD 143.help U pass any IT exam! Answer: D 141. Frame D.TestKiss. Answer: B 142.com  . Internet domain does not suffer from "The Amplification Principle" as BGP takes care of misbehaving advertisers. D. C.

EtherChannel can aggregate up to 800 Mbps. Pick the 4 valid ATM Cell Header fields: A. Answer: AC 145.com  TestKiss. or 80 Gbps of aggregate bandwidth for a Fast Http://bbs. Which two statements best describe EtherChannel? A. CLP-1 bit of congestion loss E. GFC-4 bits of generic flow control B. ATM Discard Eligibility (DE) bit Answer: ACDE 146. In DPT/RPR rings. B.17 standard and it uses Token Bucket system to avoid collisions on the fiber. DPT/RPR is defined in the IEEE 802. E. Forward-explicit congestion notification (FECN) C.56CTO. 8 Gbps. Answer: ABC 144. VCI-16 bits of virtual channel identifier D. B. Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet. data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream). DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings. C. Http://www.help U pass any IT exam! dlci (dlci number) protocol protocol-address'. DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used to make best use of the Bandwidth.1 IEEE standard.com  . D. EtherChannel technology helps aggregate traffic grouping multiple. full-duplex point-to-point links together.TestKiss. EtherChannel technology is based on the 802. C. Which two statements are true? A. HEC-8 bits of header error control F. thus using both fibres concurrently to maximise bandwidth.

3. 4. 3) Gaps between frames are filled with flags. 2. Multicasting Http://bbs. 4) Octet stuffing occurs if any flags or resultant escape characters (of value 7D) are found in the data. 2) Encapsulated via Point-to-Point Protocol (PPP) takes place framing information is added with High-level Data Link Control (HDLC). None of the above. Http://www. 3. 2. 2. The layer 2 protocol used by POS technology offers a standarized way for mapping IP packets into SONET/SDH payloads. 1. 3. Answer: A 149.com  . B. A. What statement is true? A.TestKiss. 1. Gigabit EtherChannel. 5. 5. A. 4 Answer: D 148. C. 1 E. EtherChannel is defined for Rapid Spanning Tree for faster convergence.com  TestKiss. 5. 5. 3.56CTO. Link Control Protocol (LCP) is used for basic PPP link setup and operation. Link Control Protocol (LCP) for PPP is synonymous to ARP for Ethernet. Select the three valid LMI extensions. 4. or 10 Gigabit EtherChannel connection respectively. D. 5 B. 3. 1 D. Link Control Protocol (LCP) is used for denying PPP connections to unauthorized devices. 1. Answer: AC 147. 2. Select the correct sequence of POS operation 1) Data is scrambled and synchronous mapping takes place by octet into the SONET/SDH frame. set to value 7E.help U pass any IT exam! EtherChannel. 4. 5) Data is segmented into an IP datagram with its 20-byte IP header. D. 2 C. 4.

Global addressing C.56CTO.0. None of the above will work. Virtual circuit status messages E. It is the Routing protocol used between ATM switches.5 Answer: AB 152.1 B. When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise.0.255. A.help U pass any IT exam! B. Answer: ABD 151. Deploy IPv6 at the Core first and then move to Edges toward the end customer D. PNNI measures line capacities and delays in addition to simple cost metrics.255 C.0. Deploy IPv6 at the Edges and tunnel Enterprise through the core B. Http://www. which transition strategy works the best? A. D.0. Backward-explicit congestion notification (BECN) Answer: ABD 150.com  . 224. 239.TestKiss. Deploy IPv6 at the Edges and Core at the same time for smooth transition C. Http://bbs. 224.com  TestKiss.0.0. Select the three best answers which best describe Private Network-to-Network Interface (PNNI) in an ATM network.10 D. 239. PNNI and OSPF use the same Database to make cohesive decision for packet forwarding. Forward-explicit congestion notification (FECN) D. PNNI uses the same Dijsktra algorithm for SPF calculation. C.255. Select two valid administratively scoped multicast addresses in networks running Interior Gateway protocols like EIGRP and OSPF: A. B.

TestKiss. which two statements are true? A. Answer: AC 154. there is NO I-BGP session between R1 and R2. R3 acts as a Route-Reflector client to R4. CE-2 establishes multi-hop E-BGP sessions with R3 and R4. R1 acts as a Route-Reflector client to R3. D. Clusters are used in Route-Reflector schemes to avoid loops. R3 and R4 are Route-Reflectors and there is an I-BGP session between them. R2. A confederation uses confederation clusters to avoid routing loops. B.help U pass any IT exam! Answer: A 153. D. R3 and R4 establish full mesh I-BGP sessions. Which two statements are true? A. C. R1 acts as a Route-Reflector client to R4. R3 and R4 establish full mesh I-BGP sessions. R1.com  TestKiss. Http://www. B.com  . Answer: BC Http://bbs. R2 acts as a Route-Reflector client to R4 C. An internal BGP (iBGP) network cannot have Route-Reflectors within a Confederation because Confederation works between External Autonomous System (AS) numbers. For an External Route from CE-2 in R2 to reach R1.56CTO. An internal BGP (iBGP) network can have Route-Reflectors within a Confederation. R2 acts as a Route-Reflector client to R3.

1. Routers with Anycast RP can be configured statically (loopback 1.1. C. for other Level-1 domain.1)with the command ip pim rp-address 1. announced by Level-2 (L2) by route-leaking feature of Cisco IOS. Which two statements are true about RPF checks in MSDP(Multicast Source Discovery Protocol)? A.1 E.com  .TestKiss.1.help U pass any IT exam! 155. Answer: BC 156.1.1.1 D.1)with the command ip rp-address pim 1. Level-1(L1) routers use default routes annonced by Level-2(L2) routers in Level-1(L1) domain. Routers with Anycast RP can be configured statically (loopback 1.com  TestKiss. Level-1 routers use specfic routes.1. Level-1 routers use specfic routes. D. Routers with Anycast RP can be configured statically (loopback 1.1. B. Http://www.1 Answer: ABC 157. It prevents message looping. two or more RPs are configured with the same IP address on loopback interfaces. RPF check should be done against the route to the Rendez-vous Point of the corresponding PIM-SM domain.1.1.1. How do routers in an IS-IS Level-1 domain exit to reach other Level-1(L1) domains? (Select 2. RPF check should be done against the route to the source S of the corresponding PIM-SM domain. Session Advertisement (SA) messages must be RPF checked B. announced by Level-1-2 (L1/L2) by route-leaking feature of Cisco IOS. C. Anycast RP provides redundancy and load-sharing capabilities.1. In Anycast RP.56CTO. C. Which are correct descriptions and configurations of Anycast RP? A. Http://bbs. for other Level-1 domain.1. Level-1 routers use default routes installed based on ATT bit (Attach Bit) in announcements from Level-1-2 (L1/L2) router.) A.1)with the command ip anycast-rp pim 1. which originated the SA. B.

What best explains the BGP route-reflector function? A. None of the above Answer: B 160. The IP Event Dampening works with routing protocols by stopping the announcement of dampened Interface subnets in their updates. Http://www.ATT (Attached )bit needs to be set in the link state PDUs in an IS-IS level-1-2 router to indicate Http://bbs. Answer: AC 159. D.An architecture that utilizes PPPoE deals with IP address allocation by what type of negotiation?  A. D.TestKiss. IPCP C. RPF checking Session Advertisement (SA) messages will cause message looping. B. Answer: AC 158.com  . LDAP Answer: B 161. The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping. Select the two answers that best describe the IP Event Dampening feature: A. BGP installs them in the Routing Table and announces them to other BGP speakers. NIS B.com  TestKiss. BGP route-reflector does not have to be in the forwarding path of data coming from its clients. BGP route-reflectors will stop reflecting the routes if they're not directly-connected clients. C. When IP Event Dampened internet routes reach their re-use limit.56CTO.help U pass any IT exam! D. BGP route-reflector should be in forwarding path of data coming from its clients. B. C. RADIUS D. BGP Operators use IP Event Dampening to suppress the effect of unstable Internet Routes.

GMPLS is based upon Non-Packet-based devices A. Fiber node Answer: A 167.Which of the following is true regarding Label Distribution Protocol (LDP)? A. Applies to rings smaller than 1000km D. Frame Relay Traffic Pseudowire C.com  TestKiss. True B. Plncludes the detection time B. Tag distribution Protocol (TDP) was the basis for LDP. Http://www. Diplex filter C. B. Applies to rings smaller than 1200km C. Answer: D  166.What does FRTP stand for? A.TestKiss.help U pass any IT exam! that they are a potential exit point out of the area A. False Answer: A 162. Frame Relay Traffic Protocol D. Frame Relay Traffic Policing Answer: D 164. Frame Relay Top Pseudowire B. Local head end D.In a cable HFC plant.For SONET ring switching. All of the above are true. Includes up to 16 nodes Answer: B. the 50ms switch time: Select all that apply A. It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs) through a network C. D.com  .D 163.What is the purpose of Dual Ring Interconnect with D C for SDH rings? Http://bbs. what is a modulator? A.56CTO. False Answer: A 165. Set top box B. It is a label distribution protocol for MPLS. True B.

help U pass any IT exam! A. Protects signals against any combination of link failure in each ring Answer: D 168. C. A higher interleave depth provides more protection from burst of noise on the HFC network B. sinceless carriers become available for upstream traffic.What is the main difference between the information displayed on the dspload and the dsptrkutl screens? A.What is the effect of turning on all available downstream carrier tones in a DMT DSL transmission systems? A. The dspload screen shows the expected traffic. The dspload screen shows historical information. B. D. The downstream line rate and throughput remains unchanged. The dspload screen is for all trunks. The upstream DSL bandwidth is reduced.56CTO.com  .TestKiss. B. Show mpls Idp neighbor detail B. Protects signals when multiple span switches fail C. Answer: D 171. Downstream RS error correction effectiveness is reduced. Higher interleave depth increase downstream latency.com  TestKiss.MPLS label mapping on an LSR is displayed by which IOS command? A. Http://www. Lower interleave depth cause some packet loss on typical HFC networks D. Protects signals when a ring switch fails B. Show mpls Idp bindings C.Which statement is FALSE concerning the interleave depth value? A. None ofthe above Http://bbs. Show mpls Idp parameters D. the dsptrkutl screen is for one trunk. C. the dsptrkutl screen shows current information. The information on the dspload screen never changes. C. The downstream DSL bandwidth is increased. Show mpls Idp discovery Answer: B 170. the dsptrkutl screen is dynamic D. Protects pre-emptible traffic from being dropped when a ring switch occurs D. but FEC efficiency is reduced. the dsptrkutl screen shows actual traffice. Answer: B 169.

C 173. The modem tuner scans the downstream spectrum until digital QAM modulated signal is encountered Answer: D 176.56CTO. shutdown [a | b] B.com  . how does the modem acquire the downstream channel? A.During the modem boot process. B. C. True C.help U pass any IT exam! Answer: D 172. C.What protocol does an IP phone use to learn the voice VLAN ID it should use for voice traffic? A. srp shutdown [a | b] C.000 Answer C 40. It is used for a frame's synchronization and alignment. Answer: A 175.Which two IOS commands are equivalents for putting a Cisco 7500 OC-12 RPR interface card into wrapped mode? Select all that apply A.What is the function of the AJB bits on DS1 using Extended Super Frame (ESF)? A. D.000 Answer C B. False Answer: A 174. It is used for a control and performance information.1 q C. 802. 40. The modem uses the default value in the broadcom chipset.TestKiss. Http://www. CDP D. The modem is commanded by the CMTS to set to the specific channel. The modem tuner sets a level as defined by the DOCSIS specification. It carries CRC information for error detection.BGP best route selection process is based on path attributes A. D. B. srp ips request manual-switched [a | b] Answer: B. Skinny Station Protocol Answer: C Http://bbs.com  TestKiss. VTP B. It is used for signaling on-hook and off-hook status.

All the root DNS servers maintain information in a distributed LDAP tree. C. On the same subnet B. but error correction effectives may also be reduced. It is currently recommended to express DN as a sequence of Domain components Answer: D 180. Latency remains the same.What is the effect of changing DMT interleaved delay from 3 milliseconds to 15 milliseconds? A. the gatekeeper can be A. On a remote LAN C.What is the relationship between the Domain Name System (DNS) and LDAP? A. An LDAP DN attribute is a Domain Name.TestKiss. Concatenation activity on an interface can be checked by the show controller counters Command Answer: B 182. It allows ITCM to send multiple upstream packets in one single large burst. B. DNS clients access DNS information by making LDAP queries to DNS servers. In a different subnet D. Latency is increased. but throughput is decreased. B. Fewer ATM PVCs can be provisioned on DSL line.56CTO. D. C. TCP B. Answer: C 178. but faster error correction occurs.What method of streaming live video is the least taxing on bandwidth in a large enterprise environment? A. It can be enabled/disabled from CMTS on per upstream port basis if desired D.com  TestKiss. It reduces upstream data throughput. C. Multicast Answer: D 181. UDP C. chirped lasers are used for the purpose of: Http://bbs. Http://www. D. B.In optical transmission systems.When gateways are registering with a gatekeeper.com  . Latency remains the same. Any of the above Answer: D 179.help U pass any IT exam! 177. HTTP D.Which statement is FALSE concerning Concatenation? A.

Port Security D. Bandwidth that is reserved on a trunk so that ABR connections can burst C. Bandwidth on a trunk that is reserved for control traffic and cannot be used by connections D. 802.x C. Business management layer D.What is the statistical reserve? A. Turning the laser to a specific ITU channel B. Network management layer B.help U pass any IT exam! A. Tag Control Identifier C.Which statements are true regarding VPLS? (Select all that apply) A. BPDU Guard B. Bandwidth that cannot be allocated to connections but can be used to accommodate statistical variations in the traffic Answer: D 186.56CTO. Tag Calling Interface B. Bandwidth that is reserved for SVCs to route over a trunk B. Element management layer C. Suppressing FWM and SBS non-linear effects D. There is a full mesh of pseudowires. Http://www.What features set is most frequently used to prevent hackers from flooding a port with MACaddresses? A. Storm Control Answer: C 185.TestKiss. Http://bbs.com  . Network element layer Answer: B 184. None ofthe above Answer: D 183. ToS Class Interface D.com  TestKiss.What is TCI? A. Tag Control Information Answer: D 187.What layer of the TMN (telecommunications management network) model does CTM fit into? A. Keeping the signal wavelength "locked" to a specific technology C.

Allow a CSS to probe the server B. None of the other alternatives apply.In the Apache Web Server configuration. Allow the use of HTTP HEAD request Answer: C 189.What will significantly degrade DSL performance. D.com  . D. Answer: A. POTS splitters at the subscriber's end of the DSL line C. D. It provides DHCP administrative functionality C.56CTO. Allow persistent connections D. Only l_2TPv3 can be used for pseudowire establishment. It provides TFTP server functionality.D 188. POTS splitters at the telco CO. C.Which of the following is reported in the LMI regular status polling? Select all that apply A.TestKiss. Unified Distribution Label Direction D. Answer: A.What is true regarding Cisco Network Registrar in Cable networks? A. regardless of DSL rate or line length? Select all that apply A. None of the other alternatives apply. UniDirectional Link Detection Answer: D 192. It provides comprehensive Domain Name system B. Http://www. There is split-horizon to avoid loops. Unspecified Distribution Label Detection C. the command KeepAlive ON is used to A. D. All of the above are true.What does UDLD stand for? A.C 190.help U pass any IT exam! B. There is a partial mesh of pseudowires. Answer: D Http://bbs. Answer: D 191.com  TestKiss. PVC status (active or inactive). Allow a connection to be closed with a TCP RESET C. Microliters installed between a telephone and shared line. Link integrity. B.B. C. B. UniDirectional Loop Detection B. Addition or Deletion of PVC.

802. E.ATM carries IP and PPP information with ATM cells. C. Http://www.F 195.TestKiss. The VPI range of 2-3 is invalid. What ATM adaptation Layer is used when an ATM cell carries IP packets and PPP frames? A. AAL5 Answer: D 194. and a partial configuration for the MPLS-enabled ATM switch and router are shown. The router has not been configured to specifically use LDP. AAU2 B. The control VPI/VCI has not been set to 0/32 on the router. VC-merge has not been enabled on the ATM switch interface.1q VLAN TAG D. A diagram of a router connected to an MPLS-enabled ATM switch via an LC-ATM MPLS interface. B. D. Which statement describes what is incorrect about the configuration shown?   A.Which two of the following are designated fields for MAC tunneling protocol(802.com  . Tunnel Label C. PseudoLAN TAG Answer: E. Control Word B.com  TestKiss.56CTO. Answer: A    Http://bbs.Refer to the exhibit.1 ah)? A. ISL E. AAL3 C. AAL4 D.help U pass any IT exam! 193. ServiceEthertype F. CEF has not been enabled on the router.