An enterprise customer has recently purchased a WAN link from a service provider. BGP is running over this WAN link. An engineer notices that the CE router uses an large amount of system resources to process routing updates by filtering out unwanted routing updates received from the PE, which configuration can be applied to reduce the amount of processing required on the CE router that is not accepting full routes from PE?

An enterprise customer has recently purchased a WAN link from a service provider. BGP is running over this WAN link. An engineer notices that the CE router uses an large amount of system resources to process routing updates by filtering out unwanted routing updates received from the PE, which configuration...

December 12, 2018 No Comments READ MORE +

In the MC-LAG environment, which two statements about clustering HA are true?

In the MC-LAG environment, which two statements about clustering HA are true?A . Public connection is used to access the active node of cluster from the outside clusterB . Private connection is used to connect the nodes of the cluster for private communicationC . Private connection is used to access...

December 12, 2018 No Comments READ MORE +

Assuming that all the configurations are applied correctly, how many routers will establish IS-IS neighborship with P1 router on this broadcast link?

Refer to the exhibit. The P1 router is elected as the DIS on the broadcast link. Assuming that all the configurations are applied correctly, how many routers will establish IS-IS neighborship with P1 router on this broadcast link?A . 0B . 1C . 2D . 3View AnswerAnswer: D

December 12, 2018 No Comments READ MORE +

Which three MPLS Traffic-eng DS-TE models are defined by IETF standard? (Choose three)

Which three MPLS Traffic-eng DS-TE models are defined by IETF standard? (Choose three)A . GRDMB . MARC . MAMD . RDME . G-BAMF . A-RDMView AnswerAnswer: B, C, D

December 12, 2018 No Comments READ MORE +

In which scenario Backscatter Trace back solution is recommended?

A service provider is working to develop an evolving security technique toolset in regards to the increasing amount of attacks. In which scenario Backscatter Trace back solution is recommended?A . Rouge DNS/DHCP ServersB . Distribution Denial of serviceC . Ping of deathD . IP SpoofingE . Network Attack TCP/UDP ScanView...

December 11, 2018 No Comments READ MORE +

Which open source cloud computing platform uses the neutron project as a networking as a service between devices like cisco nexus, cisco APIC cisco CSR 1000v and cisco UCS?

Which open source cloud computing platform uses the neutron project as a networking as a service between devices like cisco nexus, cisco APIC cisco CSR 1000v and cisco UCS?A . AnsibleB . OpenstackC . Cisco UCS directorD . OpendaylightView AnswerAnswer: B

December 10, 2018 No Comments READ MORE +

Which two flexible service mapping features that are used on the ES40 line card can classify traffic into different service instances, in order to consume fewer VLANs? (Choose two.)

Which two flexible service mapping features that are used on the ES40 line card can classify traffic into different service instances, in order to consume fewer VLANs? (Choose two.)A . CoSB . DSCPC . IP precedenceD . MPLS experimental bitE . ToSF . Ether TypeView AnswerAnswer: A, F

December 10, 2018 No Comments READ MORE +

Which solution can you provide seamless extension of the MPLS/Layer 3 VPN?

An Enterprise XYZ company has a requirement to extend the MPLS/Layer 3 VPN MAN network to the remote branches using Internet as the transport. Which solution can you provide seamless extension of the MPLS/Layer 3 VPN?A . LISPB . L2TPv3C . Cisco Unified MPLSD . 2547oDMVPNE . Carrier Supporting CarrierView...

December 10, 2018 No Comments READ MORE +

Which configuration accomplishes this BGP routing policy?

An operation engineer from AS 2000 must deploy this inbound routing policy : • Based on RFC 1998, modify the local-preference value for prefixes containing BGP community values 2000:90 and 2000:110 • Strip any BGP community of the BGP prefixes received from customers that are in the range between 2000:1...

December 8, 2018 No Comments READ MORE +

Which multicast feature listens multicast conversations maintaining a map in order to control which ports receive specific multicast traffic?

Which multicast feature listens multicast conversations maintaining a map in order to control which ports receive specific multicast traffic?A . Bidirectional PIMB . Source Specific MulticastC . PIM assertionD . IGMP snoopingView AnswerAnswer: D

December 7, 2018 No Comments READ MORE +