Ensurepass

 

QUESTION 181

What best describes the usage of Route-Target rewrite?

 

A.  None of the above.

B.  Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PE router in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.

C.  Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the

ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.

D.  Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the Route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.

 

Answer: C

 

 

QUESTION 182

Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)

filtering?(choose three)

 

A.  Configure BGP beteen trigger and black hole routers.

B.  Configure OSPF between trigger router and black hole routes

C.  Configure all edge routers with static (reserved) host route to Null0

D.  Configure on trigger router to advertise victim host route with community

E.  Activate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)

host route configured on edge routers.

 

Answer: ACE

 

 

QUESTION 183

Based on the following output in a router A running LDP, which statement is true?

show mpls ldp bindings 50.0.0.1 32 tib entry: 50.0.0.1/32, rev 5

local binding: tag: imp-null

remote binding:tsr:50.0.0.4:0, tag:16

 

A.  None of the above.

B.  The IP address 50.0.0.1/32 is assigned to the non-directly connected LDP neighbor, 50.0..0.4.
C.  The IP address 50.0.0.1/32 is assigned to one of its own interfaces.

D.  The IP address 50.0.0.1/32 is assigned to its directly connected LDP neighbor, 50.0..0.4.

 

Answer: C

 

 

QUESTION 184

According to RFC 3931,L2TPv3 utilizes the IANA assigned IP protocol ID of:

 

A.  110


 

B.

101

C.

121

D.

51

E.

151

F.

115

 

Answer: F

 

 

QUESTION 185

When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise, which transition strategy works the best?

 

A.  Deploy IPv6 at the Edges and tunnel Enterprise through the core

B.  None of the above will work

C.  Deploy IPv6 at Edges and Core at the same time for smooth transition

D.  Deploy IPv6 at the core first and then move to Edges toward the end customer

 

Answer: A

 

 

QUESTION 186

With VPLS, which protocol is used for label exchange and PW signalling.

 

A.  MP-BGP
B.  LDP

C.  BGP
D.  MTP

E.  Directed LDP
F.  IGP

 

Answer: E

 

 

QUESTION 187

Refer to the exhibit. Your customer has enabled IPv6 and IPv4 on routers R1 and R2, both running ISIS routing protocol, and they can no longer reach R3 network 172.26.15.0/24 (R3 does not enable IPv6, enables IPv4 only). Which two steps should be taken no restore reachability to R3? (Choose Two.)

 

clip_image002

 

A.  Enable OSPFv3 to support IPv4 and IPv6 simultaneously.

B.  Configure static routes to all unreachable networks and redistribute to IS-IS.
C.  Create an IPv6 tunnel from R2 to R3.

D.  Transition to IS-IS Multiple Topology Mode on R3.


E.  Enable wide metrics.

F.  Transition to IS-IS Multiple Topology Mode on R1 and R2.

 

Answer: EF

 

 

QUESTION 188

Which methods would enable traffic to be forwarded along an MPLS TE tunnel (Choose 4)

 

A.  MP-BGP routing

B.  Static routing
C.  Policy routing
D.  Autoroute

E.  Forwarding adjacency

 

Answer: BCDE

 

 

QUESTION 189

Which of the following descriptions about IP spoofing is correct?

 

A.  IP destination address is forged

B.  IP source address is forged

C.  IP TCP destination port is forged

D.  None of above

E.  IP TCP source port is forged

 

Answer: B

 

 

QUESTION 190

SONET’s three layers are:

 

A.  DS1

B.  Frame

C.  Path

D.  Line

E.  Section

 

Answer: CDE

 

DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.

Comments are closed.