Which technology is being implemented?

Refer to the exhibit. A service provider is using the configuration to determine traffic paths based on MPLS EXP marking. Which technology is being implemented?A . CBTSB . DS-TEC . PBTSD . IP FBRView AnswerAnswer: A

August 2, 2018 No Comments READ MORE +

Which two QoS mark methods can a service use to mark user traffic and be visible only internally to the router? (Choose two)

Which two QoS mark methods can a service use to mark user traffic and be visible only internally to the router? (Choose two)A . 802.1pB . DS-TEC . discard-classD . ToSE . QoS-groupF . MPLS EXP bitsG . DSCPView AnswerAnswer: C, E

July 29, 2018 No Comments READ MORE +

What are two advantages of Cisco IOS XR Software over Cisco IOS Software? (Choose two.)

What are two advantages of Cisco IOS XR Software over Cisco IOS Software? (Choose two.)A . a configuration that is grouped by interfaceB . a configuration that is grouped by processC . one-stage configurationD . a monolithic OSE . a two-stage configurationView AnswerAnswer: B, E

July 26, 2018 No Comments READ MORE +

Which statement is correct?

Refer to the exhibit. Which statement is correct?A . If the labeled packet arrives with the bottom label of 27, the label is replaced with label 38 and the packet is sent out on the Gigabitethernet 0/0B . If the labeled packet arrives with the bottom label of 27, all...

July 26, 2018 No Comments READ MORE +

Which configuration must be applied on both PE routers to avoid the routing loop?

Refer to the exhibit. CE6 cannot ping the loopback address of C7.An SP engineer notices a routing loop between PE2 and CE4. Which configuration must be applied on both PE routers to avoid the routing loop?A . Neighbor<CE-IP address>soo<value> with the same SoO value on both PEsB . Neighbor<CE-IP address>soo<value>...

July 26, 2018 No Comments READ MORE +

Which two security issues must the engineer take into consideration?

An engineer is tasked with configuring Lawful-Intercept on the Internet facing routers. Which two security issues must the engineer take into consideration? (Choose two)A . Encryption might be required depending on the requestB . SNMPv2c should be enabled in order to provide the correct message formatC . QoS and CoPP...

July 25, 2018 No Comments READ MORE +

Which solution accomplishes these goals?

An support engineer has been tasked to protect an ISP infrastructure from the growing number of encrypted DDoS attacks. The solution should also validate the eBGP peering. Which solution accomplishes these goals?A . BGP FlowSpecB . BTSHC . BGP Route DampeningD . BGP LSE . RTBHView AnswerAnswer: B

July 25, 2018 No Comments READ MORE +

Which two options are characteristics of MoFRR? (Choose two)

Which two options are characteristics of MoFRR? (Choose two)A . Uses additional PIM join toward sourceB . Based on multicast forward error correction featureC . Based on PIM Fast RouteD . Requires MPLS TE FRR enabled with link protection and node protectionE . Utilizes two equal-cost paths toward sourceView AnswerAnswer:...

July 24, 2018 No Comments READ MORE +

Assuming that the IGP is properly configured, which issue causes a temporary data flow blackholing when the IGP and LDP reconverges?

An engineer is troubleshooting L3VPN traffic loss over the MPLS-enabled core network when new core links were enable. Assuming that the IGP is properly configured, which issue causes a temporary data flow blackholing when the IGP and LDP reconverges?A . MPLS-TE tunnels without LDP adjacencies are used over the new...

July 24, 2018 No Comments READ MORE +

What is the issue?

Refer to the exhibit. The NOC engineer noticed that the R2 router system clock is not updated and synchronized to the NTP server that is configured on the R10 router. What is the issue?A . The maximum number of peers and client associations is exceededB . The access list NTP_Clients...

July 23, 2018 No Comments READ MORE +