Which routing table is used by PEs and ASBRs to store all VPN routes that need to be exchanged in an Inter-AS L3VPN option B scenario?

Which routing table is used by PEs and ASBRs to store all VPN routes that need to be exchanged in an Inter-AS L3VPN option B scenario?A . IGP tableB . VRF routing tableC . Global routing tableD . BGP tableView AnswerAnswer: D

January 31, 2019 No Comments READ MORE +

What must the engineer do to allow the network analyzer to receive the customer data that is captured on SWITCH A?

Refer to the exhibit. An operations engineer has a requirement to capture traffic from a customer that is connected on SWITCH A. The engineer has connected a network analyzer to SWITCH C. What must the engineer do to allow the network analyzer to receive the customer data that is captured...

January 31, 2019 No Comments READ MORE +

Which Cisco IOS command should be used within the route-map to achieve the goal on ISP 2 from AS 65000?

Refer to the exhibit. A network engineer from ISP 2 is designing the BGP architecture with a requirement of preventing their customer AS 65001 from becoming a transit AS, using the following configuration. Router BGP 65000 Neighbor 10.0.0.1 remote-as 65001 Neighbor 10.0.0.1 route-map BGP-ROUTE-policy in Which Cisco IOS command should...

January 31, 2019 No Comments READ MORE +

Which are the three characteristics of SDR? (Choose three)

Which are the three characteristics of SDR? (Choose three)A . The logical router can span across chassis.B . Each logical router has a distinct fabric and system controller module.C . Owner SDR can be reloaded, without affecting all non-SDRs.D . The logical router has dedicated route processor.E . The logical...

January 29, 2019 No Comments READ MORE +

Which action can fox this issue?

Refer to the exhibit the 2.6.6.6/32 prefix is flapping when PE1 is flapping. Which action can fox this issue?A . On PE2, allow only redistribution from BGP into IS-IS on PE3, allow only redistribution from IS-IS into BGPB . On PE2 and PE3 reconfigure redistribute BGP into IS-IS using the...

January 27, 2019 No Comments READ MORE +

Drag and drop the Ethernet Virtual Circuit characteristics on the left onto the correct classification to the current Metro Ethernet Forum term on the right. Not all options are used

Drag and drop the Ethernet Virtual Circuit characteristics on the left onto the correct classification to the current Metro Ethernet Forum term on the right. Not all options are used View AnswerAnswer:

January 26, 2019 No Comments READ MORE +

Which description is true of what the fast-reroute keep-all-paths command accomplishes when under OSPF process?

Which description is true of what the fast-reroute keep-all-paths command accomplishes when under OSPF process?A . Besides the regular LFA backup paths, this command also installs the remote LFA backup pathsB . By default, only the/32 routes have a backup path installed. This command creates a backup path for the...

January 25, 2019 No Comments READ MORE +

Which action does the engineer perform?

An operations engineer identifies a device is receiving a section loss signal alarm for a SONET link. Which action does the engineer perform?A . Verify that the framing format on the port matches the format configured on the lineB . Verify that the alarm exists on the remote siteC ....

January 25, 2019 No Comments READ MORE +

After the show bgp summary command is issue, the engineer sees in the output that BGP router ID is set to 0.0.0.0 what is the root cause of this issue?

An operations engineer configured a BGP session between two routers, After deploying the configuration, the engineer notices that the BGP session cannot be established and he sees an error message in the system log. After the show bgp summary command is issue, the engineer sees in the output that BGP...

January 23, 2019 No Comments READ MORE +

SNMPv3 provides which three security features? (Choose three)

SNMPv3 provides which three security features? (Choose three)A . DES 56-bit encryptionB . Encrypted user passwordC . Private community information that is exchanged out-of-bandD . Device hostname that is authenticated via AES algorithmE . Message integrityF . Authentication that is based on MD5 or SHA algorithmsView AnswerAnswer: A, E, F

January 22, 2019 No Comments READ MORE +