Ensurepass

 

QUESTION 251

RIPv2 differs from RIPv1 in that:

 

A.  it uses multicast address 224.0.0.10,instead of broadcast.
B.  it uses multicast address 224.0.0.9,instead of broadcast.

C.  it can use either multicast or broadcast addresses,instead of just broadcast.
D.  it sends incremental updates,instead of periodic updates.

E.  it is classless,instead of classful

F.  it supports authentication,and RIPv1 does not


Answer: BEF

 

 

QUESTION 252

Which 4 statements regarding MPLS Label Stack Encoding is true?

 

A.  A value of 4 represents the “Implicit NULL Label.”

B.  A value of 0 represents the “IPv4 Explicit NULL Label.”

C.  A value of 1 represents the “Router Alert Label”. The use of this label is analogous to the use of the

“Router Alert Option” in IP packets (for example, ping with record route option).

D.  A value of 2 represents the “IPv6 Explicit NULL Label”
E.  A value of 1 represents the “IPv1 Explicit NULL Label”
F.  A value of 3 represents the “Implicit NULL Label”

 

Answer: BCDF

 

 

QUESTION 253

What ISIS TLVs are used to support MPLS-traffic Engineering?

 

A.  Extended IS neighbor TLV # 22

B.  Extended IS name TLV #137

C.  Extended IS resource TLV #138

D.  Extended IS reachability TLV #135

E.  Router ID TLV # 134

 

Answer: ADE

 

 

QUESTION 254

The layer 2 protocol used by POS technology offers a standarized way for mapping IP packets into

SONET/SDH payloads. Select the correct sequence of POS operation.

1) Data is scrambled and synchronous mapping takes place by octet into the SONET/SDH frame.

2) Encapsulated via Point-to-Point Protocol (PPP) takes place framing information is added with High-level

Data Link Control (HDLC).

3) Gaps between frames are filled with flags, set to value 7E.

4) Octet stuffing occurs if any flags or resultant escape characters (of value 7D) are found in the data.

5) Data is segmented into an IP datagram with its 20-byte IP header.

 

A.

1,3,4,5,2

B.

5,2,3,1,4

C.

2,3,5,4,1

D.

5,2,3,4,1

E.

1,2,3,4,5

 

Answer: D

 

 

QUESTION 255

Select 3 AVPs (Attribute-Value Pair) which MUST be present in the ICRQ:

 

A.  Called Number

B.  Call Serial Number

C.  Message Type

D.  Calling Number

E.  Assigned Session ID


Answer: BCE

 

 

QUESTION 256

Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?

 

A.  The session ID is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endport. The session ID will be negotiated by the control connection or statically defined if using the L2TP v3 data plane only

B.  The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The control connection can negotiate this as an additional level of guarantee beyond the regular session ID lookup to make sure that a data message has been directed to the correct session or that any recently reused session ID will not be misdirected

C.  The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endpoint. The cookie will be negotiated by the control connection or statically defined if using the L2TPv3 data plane only

D.  The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field. The control connection can negotiate this as an additional level of guarantee beyond the regular cookie lookup to make sure that a data message has been directed to the correct session or that any recently reused cookie will not be misdirected.

 

Answer: AB

 

 

QUESTION 257

As described in rfc 3270,short-pipe mode operstion, the PE to CE egress polices are based upon:

 

A.  customer marking

B.  remarked IP tos value

C.  Qos groups/discard class
D.  Innerrnost label exp value
E.  MDRR quantam

F.  topmost label exp value

 

Answer: A

 

 

QUESTION 258

The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN (PVLAN )

 

A.  The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN (PVLAN )
B.  It is an effective way to achieve VLAN transparency between Provider and enterprise customer by

tunneling one ser of VLAN tags inside a second VLAN tag

C.  The Outer.1Q tag represents Service VLAN (PVLAN) and inner.1Q tag represents customer VLAN
D.  QinQ is a way to hide native VLAN which can conflict with Provider native VLAN

 

Answer: BC

 

 

QUESTION 259

Based on the following output in R1, which statement is true R1#show mpls forwarding-table 50.0.0.3 detail

Local Outgoing Prefix Bytes tag Outgoing Next Hop tag tag or VC or Tunnel Id switched interface

19 17 50.0.0.3/32 0 Et0/0 192.168.0.14

 

A.  If a labeled packet arrives with the top most label of 17, all the labels will be removed and a clear IP

packet is sent to Next Hop 192.168.0.14 on Ethernet 0/0.

B.  If a labeled packet arrives with the top most label of 17, it will be replaced with label 19 and sent out on

Ethernet 0/0 interface.


C.  None of the above.

D.  If a labeled packet arrives with the topmost label of 19, the label is replaced with label 17 and the packet is sent out on the Ethernet 0/0 interface.

 

Answer: D

 

 

QUESTION 260

BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate what classification of attack?

 

A.  Denial of service attack

B.  Sniffing attack

C.  Spoofing attack

D.  Reconnaisance attack

E.  Port Scan attack

 

Answer: C

 

DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.

Comments are closed.