When implementing MPLS Layer 3 VPN services, which CE-PE routing method does not require the use of the redistribute command to enable the customer routes to be advertised through the MPLS cloud between the customer sites?
When implementing MPLS Layer 3 VPN services, which CE-PE routing method does not require the use of the redistribute command to enable the customer routes to be advertised through the MPLS cloud between the customer sites?A . EIGRPB . OSPFC . IS-ISD . BGPE . static routingF . OSPF or...
On PE7, which interface connects to the CE7 and what is the name of the VRF that interface is associated to? (Choose two.)
On PE7, which interface connects to the CE7 and what is the name of the VRF that interface is associated to? (Choose two.) A . Gi0/0/0/0B . Gi0/0/0/1C . Gi0/0/0/2D . Customer_1E . Customer_AF . Customer_CE7View AnswerAnswer: B,C
Which CE-to-PE routing protocol implements the down bit as a loop prevention mechanism?
Which CE-to-PE routing protocol implements the down bit as a loop prevention mechanism?A . RIPv2B . EIGRPC . IS-ISD . OSPFE . BGPView AnswerAnswer: D
On Cisco IOS and IOS XE Layer 3 MPLS VPN implementations, when redistributing the customer RIP routes into MP-BGP, the RIP metric is copied into which BGP attribute?
On Cisco IOS and IOS XE Layer 3 MPLS VPN implementations, when redistributing the customer RIP routes into MP-BGP, the RIP metric is copied into which BGP attribute?A . local preferenceB . weightC . MEDD . extended communityView AnswerAnswer: C
When implementing nonhierarchical VPLS with eight PE routers, how many total PWs will be required between the PE routers?
When implementing nonhierarchical VPLS with eight PE routers, how many total PWs will be required between the PE routers?A . 8B . 16C . 28D . 32E . 64View AnswerAnswer: C
What is an advantage of using the Cisco EVC infrastructure to implement carrier-class Ethernet services that are not available on non-EVC-capable platforms?
What is an advantage of using the Cisco EVC infrastructure to implement carrier-class Ethernet services that are not available on non-EVC-capable platforms?A . PW redundancyB . interworking supportC . PW stitching supportD . flexible frame-matching support and VLAN tag manipulationE . local cross-connect supportView AnswerAnswer: D
To implement a central-service VPN supporting both customer1 and customer2, what will be the required corresponding VRF configuration on the central-service-server PE router?
Refer to the partial Cisco IOS XR PE router VRF configuration exhibit. To implement a central-service VPN supporting both customer1 and customer2, what will be the required corresponding VRF configuration on the central-service-server PE router?A . vrf central-service-server address-family ipv4 unicast import route-target 3:1 2:2 export route-target 3:1 2:1 !B...
The Cisco IOS XR address-family ipv4 labeled-unicast and the Cisco IOS/IOS XE neighbor send-label commands are used in which MPLS implementation?
The Cisco IOS XR address-family ipv4 labeled-unicast and the Cisco IOS/IOS XE neighbor send-label commands are used in which MPLS implementation?A . Cisco MPLS TEB . CSC using MP-BGP for label exchangeC . back-to-back VRFD . AToME . VPLSView AnswerAnswer: B
When implementing a Layer 2 transport subinterface on a Cisco IOS XR router, which encapsulation option is used to match any packets that are not matched by any other service instances?
When implementing a Layer 2 transport subinterface on a Cisco IOS XR router, which encapsulation option is used to match any packets that are not matched by any other service instances?A . defaultB . untaggedC . anyD . tagView AnswerAnswer: A
Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?
Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?A . DMVPNB . GET VPNC . SSL VPND . L2TPv3View AnswerAnswer: B