RIPv2 differs from RIPv1 in that:
A. it uses multicast address 188.8.131.52,instead of broadcast.
B. it uses multicast address 184.108.40.206,instead of broadcast.
C. it can use either multicast or broadcast addresses,instead of just broadcast.
D. it sends incremental updates,instead of periodic updates.
E. it is classless,instead of classful
F. it supports authentication,and RIPv1 does not
Which 4 statements regarding MPLS Label Stack Encoding is true?
A. A value of 4 represents the “Implicit NULL Label.”
B. A value of 0 represents the “IPv4 Explicit NULL Label.”
C. A value of 1 represents the “Router Alert Label”. The use of this label is analogous to the use of the
“Router Alert Option” in IP packets (for example, ping with record route option).
D. A value of 2 represents the “IPv6 Explicit NULL Label”
E. A value of 1 represents the “IPv1 Explicit NULL Label”
F. A value of 3 represents the “Implicit NULL Label”
What ISIS TLVs are used to support MPLS-traffic Engineering?
A. Extended IS neighbor TLV # 22
B. Extended IS name TLV #137
C. Extended IS resource TLV #138
D. Extended IS reachability TLV #135
E. Router ID TLV # 134
The layer 2 protocol used by POS technology offers a standarized way for mapping IP packets into
SONET/SDH payloads. Select the correct sequence of POS operation.
1) Data is scrambled and synchronous mapping takes place by octet into the SONET/SDH frame.
2) Encapsulated via Point-to-Point Protocol (PPP) takes place framing information is added with High-level
Data Link Control (HDLC).
3) Gaps between frames are filled with flags, set to value 7E.
4) Octet stuffing occurs if any flags or resultant escape characters (of value 7D) are found in the data.
5) Data is segmented into an IP datagram with its 20-byte IP header.
Select 3 AVPs (Attribute-Value Pair) which MUST be present in the ICRQ:
A. Called Number
B. Call Serial Number
C. Message Type
D. Calling Number
E. Assigned Session ID
Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?
A. The session ID is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endport. The session ID will be negotiated by the control connection or statically defined if using the L2TP v3 data plane only
B. The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The control connection can negotiate this as an additional level of guarantee beyond the regular session ID lookup to make sure that a data message has been directed to the correct session or that any recently reused session ID will not be misdirected
C. The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endpoint. The cookie will be negotiated by the control connection or statically defined if using the L2TPv3 data plane only
D. The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field. The control connection can negotiate this as an additional level of guarantee beyond the regular cookie lookup to make sure that a data message has been directed to the correct session or that any recently reused cookie will not be misdirected.
As described in rfc 3270,short-pipe mode operstion, the PE to CE egress polices are based upon:
A. customer marking
B. remarked IP tos value
C. Qos groups/discard class
D. Innerrnost label exp value
E. MDRR quantam
F. topmost label exp value
The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN (PVLAN )
A. The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN (PVLAN )
B. It is an effective way to achieve VLAN transparency between Provider and enterprise customer by
tunneling one ser of VLAN tags inside a second VLAN tag
C. The Outer.1Q tag represents Service VLAN (PVLAN) and inner.1Q tag represents customer VLAN
D. QinQ is a way to hide native VLAN which can conflict with Provider native VLAN
Based on the following output in R1, which statement is true R1#show mpls forwarding-table 220.127.116.11 detail
Local Outgoing Prefix Bytes tag Outgoing Next Hop tag tag or VC or Tunnel Id switched interface
19 17 18.104.22.168/32 0 Et0/0 192.168.0.14
A. If a labeled packet arrives with the top most label of 17, all the labels will be removed and a clear IP
packet is sent to Next Hop 192.168.0.14 on Ethernet 0/0.
B. If a labeled packet arrives with the top most label of 17, it will be replaced with label 19 and sent out on
Ethernet 0/0 interface.
C. None of the above.
D. If a labeled packet arrives with the topmost label of 19, the label is replaced with label 17 and the packet is sent out on the Ethernet 0/0 interface.
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate what classification of attack?
A. Denial of service attack
B. Sniffing attack
C. Spoofing attack
D. Reconnaisance attack
E. Port Scan attack
DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.