When implementing MPLS Layer 3 VPN services, which CE-PE routing method does not require the use of the redistribute command to enable the customer routes to be advertised through the MPLS cloud between the customer sites?

When implementing MPLS Layer 3 VPN services, which CE-PE routing method does not require the use of the redistribute command to enable the customer routes to be advertised through the MPLS cloud between the customer sites?A . EIGRPB . OSPFC . IS-ISD . BGPE . static routingF . OSPF or...

September 29, 2018 No Comments READ MORE +

On PE7, which interface connects to the CE7 and what is the name of the VRF that interface is associated to? (Choose two.)

On PE7, which interface connects to the CE7 and what is the name of the VRF that interface is associated to? (Choose two.) A . Gi0/0/0/0B . Gi0/0/0/1C . Gi0/0/0/2D . Customer_1E . Customer_AF . Customer_CE7View AnswerAnswer: B,C

September 29, 2018 No Comments READ MORE +

Which CE-to-PE routing protocol implements the down bit as a loop prevention mechanism?

Which CE-to-PE routing protocol implements the down bit as a loop prevention mechanism?A . RIPv2B . EIGRPC . IS-ISD . OSPFE . BGPView AnswerAnswer: D

September 27, 2018 No Comments READ MORE +

On Cisco IOS and IOS XE Layer 3 MPLS VPN implementations, when redistributing the customer RIP routes into MP-BGP, the RIP metric is copied into which BGP attribute?

On Cisco IOS and IOS XE Layer 3 MPLS VPN implementations, when redistributing the customer RIP routes into MP-BGP, the RIP metric is copied into which BGP attribute?A . local preferenceB . weightC . MEDD . extended communityView AnswerAnswer: C

September 26, 2018 No Comments READ MORE +

When implementing nonhierarchical VPLS with eight PE routers, how many total PWs will be required between the PE routers?

When implementing nonhierarchical VPLS with eight PE routers, how many total PWs will be required between the PE routers?A . 8B . 16C . 28D . 32E . 64View AnswerAnswer: C

September 26, 2018 No Comments READ MORE +

What is an advantage of using the Cisco EVC infrastructure to implement carrier-class Ethernet services that are not available on non-EVC-capable platforms?

What is an advantage of using the Cisco EVC infrastructure to implement carrier-class Ethernet services that are not available on non-EVC-capable platforms?A . PW redundancyB . interworking supportC . PW stitching supportD . flexible frame-matching support and VLAN tag manipulationE . local cross-connect supportView AnswerAnswer: D

September 24, 2018 No Comments READ MORE +

To implement a central-service VPN supporting both customer1 and customer2, what will be the required corresponding VRF configuration on the central-service-server PE router?

Refer to the partial Cisco IOS XR PE router VRF configuration exhibit. To implement a central-service VPN supporting both customer1 and customer2, what will be the required corresponding VRF configuration on the central-service-server PE router?A . vrf central-service-server address-family ipv4 unicast import route-target 3:1 2:2 export route-target 3:1 2:1 !B...

September 23, 2018 No Comments READ MORE +

The Cisco IOS XR address-family ipv4 labeled-unicast and the Cisco IOS/IOS XE neighbor send-label commands are used in which MPLS implementation?

The Cisco IOS XR address-family ipv4 labeled-unicast and the Cisco IOS/IOS XE neighbor send-label commands are used in which MPLS implementation?A . Cisco MPLS TEB . CSC using MP-BGP for label exchangeC . back-to-back VRFD . AToME . VPLSView AnswerAnswer: B

September 18, 2018 No Comments READ MORE +

When implementing a Layer 2 transport subinterface on a Cisco IOS XR router, which encapsulation option is used to match any packets that are not matched by any other service instances?

When implementing a Layer 2 transport subinterface on a Cisco IOS XR router, which encapsulation option is used to match any packets that are not matched by any other service instances?A . defaultB . untaggedC . anyD . tagView AnswerAnswer: A

September 16, 2018 No Comments READ MORE +

Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?

Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?A . DMVPNB . GET VPNC . SSL VPND . L2TPv3View AnswerAnswer: B

September 16, 2018 No Comments READ MORE +