Ensurepass

 

QUESTION 161

Which two statements regarding the IS-IS DIS election process are true? (Choose Two.)

 

A.  L1 routers on a broadcast network only establish adjacencies with the DIS.
B.  If the DIS becomes unavailable the backup DIS is promoted to DIS.

C.  Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.
D.  Separate L1 and L2 election processes are held on a brodcast network.

E.  A priority of 0 will prevent a router from becoming a DIS.

F.  If there is a tie based on priority, the router whose attached interface has the lowest MAC address becomes the DIS.

 

Answer: CD

 

 

QUESTION 162

What is jitter?

 

A.  The total end-to-end delay

B.  The time it takes for the bits to transit the physical media.
C.  The delay caused by placing the bits on the wire.

D.  The variations of delay.

 

Answer: D

 

 

QUESTION 163

Which two statements best describe the signalling requirements of virtual circuit setup of VPLS and exchange of reachability information (MAC addresses)?

 

A.  Cisco VPLS does not require the exchange of reachability (MAC addresses) information via a signaling protocol. This information is learned from the data plane using standard address learning, aging, and filtering mechanisms defined for Ethernet bridging.

B.  Cisco VPLS uses directed LDP as a signalling protocol to exchange reachability (MAC addresses)

information to avoid maintanance of ARP cache.


C.  In Cisco VPLS the virtual circuit setup uses Multi-Protocol BGP as autodiscovery and signaling mechanism. Using BGP allows BPDUs to be propagated across VPLS in a scaleable fashion.

D.  In Cisco VPLS the virtual circuit setup uses the same LDP signaling mechanism defined for point-to- point services. Using a directed LDP session, each provider edge advertises a virtual circuit label mapping that is used as part of the label stack imposed on the Ethernet frames by the ingress provider edge during packet forwarding.

 

Answer: AD

 

 

QUESTION 164

What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potential exit point out of the area ?

 

A.  ATT (Attached )bit

B.  ABR (Area Border Rorter ) bit

C.  PN (Pseudonode )biy

D.  P(Partition) bit

E.  Down bit

F.  IS-Type bits

 

Answer: A

 

 

QUESTION 165

Select the two answers that best describe the IP Event Dampening feature:

 

A.  The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping

B.  BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes

C.  The IP Event Dampening works with routing protocols by stopping the announcement of dampened

Interface subnets in their updates

D.  When IP Event Dampened internet routes resch their re-use limit, BGP installs them in the Routing

Table and announces them to other BGP speakers

 

Answer: AC

 

 

QUESTION 166

What OSPF LSA is used to support MPLS-traffic Engineering ?

 

A.  NSSA LSA (Type 7 )

B.  Opaque LSA (Type 11 )
C.  Opaque LSA (Type 9 )
D.  Opaque LSA (Type 10 )
E.  External LSA (Type 5 )

 

Answer: D

 

 

QUESTION 167

Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM

network

 

A.  It is the Routing protocol used between ATM switches

B.  PNNI uses the same Dijsktra algorithm for SPF calculation

C.  PNNI and OSPF use the same Database to make cohesive decision for packet forwarding

D.  PNNI measures line capacities and delays in addition to simple cost metrics


Answer: ABD

 

 

QUESTION 168

With EIGRP DUAL, a feasible successor is considered loop-free if which condition is true?

 

A.  Its AD is equal to the metric of the successor

B.  Its AD is less than the successor??s FD
C.  Its AD is equal to the successor??s FD

D.  Its AD is greater than the successor??s FD
E.  Its FD is equal to the metric of the successor

 

Answer: B

 

 

QUESTION 169

What best describes the usage of Route-Target rewrite?

 

A.  Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the Route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.

B.  Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the

ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.

C.  Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PE router in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.

D.  None of the above.

 

Answer: B

 

 

QUESTION 170

Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? (Choose three.)

 

A.  PW capabilities list

B.  Message type

C.  Assigned control connection ID
D.  PW type

E.  Remote session ID
F.  Hostname

 

Answer: BDE

 

DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.

 

 

Comments are closed.