An enterprise customer has recently purchased a WAN link from a service provider. BGP is running over this WAN link. An engineer notices that the CE router uses an large amount of system resources to process routing updates by filtering out unwanted routing updates received from the PE, which configuration can be applied to reduce the amount of processing required on the CE router that is not accepting full routes from PE?
An enterprise customer has recently purchased a WAN link from a service provider. BGP is running over this WAN link. An engineer notices that the CE router uses an large amount of system resources to process routing updates by filtering out unwanted routing updates received from the PE, which configuration...
In the MC-LAG environment, which two statements about clustering HA are true?
In the MC-LAG environment, which two statements about clustering HA are true?A . Public connection is used to access the active node of cluster from the outside clusterB . Private connection is used to connect the nodes of the cluster for private communicationC . Private connection is used to access...
Assuming that all the configurations are applied correctly, how many routers will establish IS-IS neighborship with P1 router on this broadcast link?
Refer to the exhibit. The P1 router is elected as the DIS on the broadcast link. Assuming that all the configurations are applied correctly, how many routers will establish IS-IS neighborship with P1 router on this broadcast link?A . 0B . 1C . 2D . 3View AnswerAnswer: D
Which three MPLS Traffic-eng DS-TE models are defined by IETF standard? (Choose three)
Which three MPLS Traffic-eng DS-TE models are defined by IETF standard? (Choose three)A . GRDMB . MARC . MAMD . RDME . G-BAMF . A-RDMView AnswerAnswer: B, C, D
In which scenario Backscatter Trace back solution is recommended?
A service provider is working to develop an evolving security technique toolset in regards to the increasing amount of attacks. In which scenario Backscatter Trace back solution is recommended?A . Rouge DNS/DHCP ServersB . Distribution Denial of serviceC . Ping of deathD . IP SpoofingE . Network Attack TCP/UDP ScanView...
Which open source cloud computing platform uses the neutron project as a networking as a service between devices like cisco nexus, cisco APIC cisco CSR 1000v and cisco UCS?
Which open source cloud computing platform uses the neutron project as a networking as a service between devices like cisco nexus, cisco APIC cisco CSR 1000v and cisco UCS?A . AnsibleB . OpenstackC . Cisco UCS directorD . OpendaylightView AnswerAnswer: B
Which two flexible service mapping features that are used on the ES40 line card can classify traffic into different service instances, in order to consume fewer VLANs? (Choose two.)
Which two flexible service mapping features that are used on the ES40 line card can classify traffic into different service instances, in order to consume fewer VLANs? (Choose two.)A . CoSB . DSCPC . IP precedenceD . MPLS experimental bitE . ToSF . Ether TypeView AnswerAnswer: A, F
Which solution can you provide seamless extension of the MPLS/Layer 3 VPN?
An Enterprise XYZ company has a requirement to extend the MPLS/Layer 3 VPN MAN network to the remote branches using Internet as the transport. Which solution can you provide seamless extension of the MPLS/Layer 3 VPN?A . LISPB . L2TPv3C . Cisco Unified MPLSD . 2547oDMVPNE . Carrier Supporting CarrierView...
Which configuration accomplishes this BGP routing policy?
An operation engineer from AS 2000 must deploy this inbound routing policy : • Based on RFC 1998, modify the local-preference value for prefixes containing BGP community values 2000:90 and 2000:110 • Strip any BGP community of the BGP prefixes received from customers that are in the range between 2000:1...
Which multicast feature listens multicast conversations maintaining a map in order to control which ports receive specific multicast traffic?
Which multicast feature listens multicast conversations maintaining a map in order to control which ports receive specific multicast traffic?A . Bidirectional PIMB . Source Specific MulticastC . PIM assertionD . IGMP snoopingView AnswerAnswer: D