Based on the local label allocation filtering failure, which subnet of prefixes must be selected to meet these requirements?

A service provider is in the process of providing Layer 2 and Layer 3 VPN services through a MPLS LDP-enabled backbone. With load increasing in the service provider domain, scalability become the most important. Based on the local label allocation filtering failure, which subnet of prefixes must be selected to...

October 4, 2018 No Comments READ MORE +

How can this requirements be accomplished?

Service providers that implement MPLS Inter-AS Option B must ensure that the ASBRs between each provider learn all VPNv4 routers from both providers. How can this requirements be accomplished?A . Ensure that each ASBR is configured for all VRFs from within its own provider backboneB . Configure each ASBR to...

October 4, 2018 No Comments READ MORE +

How does the system mitigate against a split-brain state if all control plane and data plane links are lost?

A service provider has deployed new PEs using nV Edge technology based on Cisco ASR 9000 routers. How does the system mitigate against a split-brain state if all control plane and data plane links are lost?A . The chassis located in the second rack automatically shuts down and only the...

October 3, 2018 No Comments READ MORE +

Which are the three characteristics of SDR? (Choose three)

Which are the three characteristics of SDR? (Choose three)A . The logical router can span across chassis.B . Each logical router has a distinct fabric and system controller module.C . Owner SDR can be reloaded, without affecting all non-SDRs.D . The logical router has dedicated route processor.E . The logical...

October 2, 2018 No Comments READ MORE +

What is the port number of an IPsec Encapsulating Security Payload packet? (ESP)

What is the port number of an IPsec Encapsulating Security Payload packet? (ESP)A . IP protocol 51B . UDP port 50C . Ip protocol 50D . TCP Port 50E . UDP port 51F . TCP port 51View AnswerAnswer: C

September 30, 2018 No Comments READ MORE +

Which statement is true about Cisco IOS XR commit command?

Which statement is true about Cisco IOS XR commit command?A . The commit force command merges the target configuration with the running configuration and commits only valid changesB . The commit replace command applies all the changes of the file configuration that were loaded previously. The final configuration applied is...

September 29, 2018 No Comments READ MORE +

Which unicast RPF check mode must the operator apply at the border for optimal protection?

A network has a single exit and is using a default route An operator is worried about denial of service at the network border. Which unicast RPF check mode must the operator apply at the border for optimal protection?A . loose mode with allow self pingB . loose modeC ....

September 27, 2018 No Comments READ MORE +

Which three configuration sections are required on service provider PE router to enable IPv4 layer 3 VPN? (Choose three)

Which three configuration sections are required on service provider PE router to enable IPv4 layer 3 VPN? (Choose three)A . Configure route targets that are used for importing and exporting customer VRF routes.B . Configure route distinguisher that is used for importing and exporting customer VRF routes.C . Implement MPLS...

September 27, 2018 No Comments READ MORE +

Assuming that all the configurations are applied correctly, how many routers will establish IS-IS neighborship with P1 router on this broadcast link?

Refer to the exhibit. The P1 router is elected as the DIS on the broadcast link. Assuming that all the configurations are applied correctly, how many routers will establish IS-IS neighborship with P1 router on this broadcast link?A . 0B . 1C . 2D . 3View AnswerAnswer: D

September 26, 2018 No Comments READ MORE +

How does BGPsec protect advertisements by preventing from the malicious traffic flows?

How does BGPsec protect advertisements by preventing from the malicious traffic flows?A . It validates the AS pathB . It validates only the originating ASC . It validates routes with encryptionD . It validates the next-hop ASView AnswerAnswer: A

September 26, 2018 No Comments READ MORE +