Ensurepass

 

 

QUESTION 191

With the DSCP value fo “101110”, what does the “11” in bits 1 and 2 indicate ?

 

A.  CS(Class Selector Value )
B.  Queue Depth

C.  PHB (Per-Hop Behavior )
D.  IP Precedence

E.  Drop Probability

F.  AF Class

 

Answer: E

 

 

QUESTION 192

What are the benefits of using TCAM technology in high-end routing products ?


A.  Simplified configuration

B.  Lower maintenance cost

C.  Deterministic performance

D.  Longer uptime

E.  Lower power consumption

 

Answer: CD

 

 

QUESTION 193

Referring to the exhibit, if RTP header compression is used on the link, the header??s overhead on the voice packet will be reduced by what percent?

 

clip_image002

 

A.  from 50% to 25%
B.  from 50% to 20%
C.  from 70% to 20%
D.  from 70% to 33%

 

Answer: D

 

 

QUESTION 194

Which two statements are correct?

 

A.  A VC type 5 transports a VLAN over MPLS.

B.  A VC type 4 tunnels an Ethernet port over MPLS.
C.  A VC type 5 tunnels an Ethernet port over MPLS.
D.  A VC type 4 transports a VLAN over MPLS.

 

Answer: CD

 

 

QUESTION 195

Which of the following technologies can improve convergence time following a link failure in a service provider network?

 

A.  RSVP

B.  MPLS TE FR
C.  MPLS VPN

D.  SNMP
E.  BFD

F.  VPLS

 

Answer: BE

 


QUESTION 196

Which of the following statemets regarding Control Plane Policing (CoPP) is correct?

 

A.  Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routing stability, availability, and critical packet delivery.

B.  Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specify configurable policy actions for the classified traffic.

C.  Control Plane Policing (CoPP) uses a dedicated “control-plane” command via the Modular QoS CLI (MQC) to provide filtering and rate limiting capabilities.

D.  Control Plane Policing (CoPP) uses “service policy” command under relevant interfaces to filter DOS

packet to protect routing packets.

E.  Control Plane Policing (CoPP) protects the transit management and data traffic through the router.

 

Answer: ABC

 

 

QUESTION 197

Which two statements are correct with regard to route distinguisher as defined in RFC 4364-AKA IP-VPN (MPLS-VPN)?

 

A.  The configuration to define Route-Distinguisher is Ip vrf bulle Rd 1:1

B.  A route distinguisher can be imported and exported to and from a VRF

C.  Route-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best path algorithm.
D.  Route-Distinguisher is an 8 byte value used in creating unique VPNv4 address.

 

Answer: AD

 

 

QUESTION 198

Which two statemets are true?

 

A.  DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.

B.  DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.

C.  DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used to make best use of the Bandwidth.

D.  In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream), thus using both fibres concurrently to maximise bandwidth.

 

Answer: AD

 

 

QUESTION 199

Which statements about MPLS Label Distribution Protocol(LDP) are valid?

 

A.  LDP hello packets are sent to UDP port 646

B.  LDP hello packets are sent to TCP port 711

C.  LDP sessions are TCP sessions to port 646

D.  LDP sessions are TCP sessions to port 711

E.  LDP establishes a peer relationship with another router that must be directly attached.
F.  LDP can establishes a peer relationship with another router that is not directly attached

 

Answer: ACF

 

 

QUESTION 200

How would you characterize the source and type in a denial of service attack on a router?

 

A.  By perfornubg a show ip interface to see the type and source of the attack based upon the access-list matches

B.  By setting up an access-list to permit all ICMP ,TCP ,and UDP traffic with the log or log-input commands ,then use the show access-list and show log commands to determine the type and source of attack

C.  By performing a show interface to see the transmitted load “txload” and receive load “rxload” ;if the interface utilization is not maxed out ,there is no attack underway

D.  By applying an access-list to all incoming and outgoing interfaces,turning off route- cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

 

Answer: B

 

DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.

Comments are closed.