Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A network architect is troubleshooting the L2TPv3 tunneling security due to the untrusted nature of the underlaying network. Which two L2TPv3 features does the architect deploy to address the ongoing issues? (Choose two.)

A.

TCP MD5 authentication

B.

control message hashing

C.

CHAP authentication

D.

control message rate limiting

E.

asymmetric mutual authentication with PSK

An engineer is trying to configure an EVPN VWPS. What is the issue with this configuration?

A.

The member in the VPWS context should be the PE-facing interface.

B.

The 12vpn evpn command should be instance 101.

C.

Interface GigabitEthernet0/1/0 should not have any IP address.

D.

The service instance and the EVPN instance are different.

How does Layer 3 VPN traffic traverse an ISP network?

A.

Devices on the network use MPLS labels to share VPN routes between P routers in the network.

B.

Devices on the network use LSAs to share routes between P routers in the network.

C.

Devices on the network use MPLS labels to move VPN traffic through the network.

D.

Devices on the network use GRE tunnels to move traffic between VRFs.

What is a requirement to share VRF reachability information to all members of a VPN when using IPv6?

A.

PE and CE routers must be running BGP as the PE-CE routing protocol

B.

PE routers must have MPLS disabled and be running MP-BGP between all P and PE routers.

C.

PE routers must be running MP-BGP and bgp default ipv4-unicast must be disabled

D.

All PEs must have the same VRFs configured.

The network engineering group of a large ISP needs to harden the management plane of its Cisco 9000

Series ASRs. While addressing IPv6 ICMP issues, they realized they have to limit the rate at which IPv6 ICMP error messages are sent out on the network. Which command do they need to apply?

A.

icmp ipv6 rate-limit unreachable 1000

B.

ipv6 rate-limit 1000

C.

icmp ipv4 rate-limit unreachable 1000

D.

ipv6 icmp error-interval 50 20

Refer to the exhibit.

An organization is running H-VPLS on a network comprising four routers in a hub-and-spoke topology with R1 as the hub An engineer added a new spoke with multiple VCs to the network, and now traffic cannot flow properly How should the engineer update the configuration on R1 to correct the problem?

A.

Disable spanning tree to allow loops to occur within the hub-and-spoke topology.

B.

Disable split horizon to allow multiple VCs per spoke

C.

Disable Cisco Discovery Protocol to allow MPLS to share labels between the designated spokes

D.

Disable Cisco Discovery Protocol to allow for neighbor discovery

Refer to the exhibit.

Router 1 is a route reflector client within a service provider core PE1 cannot see VPNv4 routes received from the ASBR PE1 only has an iBGP relationship with Router 1. Which action resolves this issue?

A.

Activate PE1 as a neighbor under the IPv4 address family.

B.

Configure Router 1 as a route reflector for PE1 under the VPNv4 address family.

C.

Configure PE1 to have an eBGP relationship with Router 1.

D.

Enable BGP default ipv4-unicast

Refer to the exhibit.

Refer to the exhibit Router 1 is a P router in the ISP MPLS core A connected P router cannot generate an MPLS label for the router 1 loopback0 interface Which action resolves this issue?

A.

The loopback0 interface must be in OSPF area 0.

B.

The network statement under the routing process must have a wildcard mask of 0 0.0 255.

C.

The OSPF network type must be changed on loopback0 to point-to-point

D.

A static route to null 0 must be added for the loopback interface and then static routes must be redistributed into OSPF

Refer to the exhibit.

An engineer is implementing an MPLS P2MP TE solution. Which type of router can serve as the midpoint router and the tailend router in this P2MP TE network implementation?

A.

headend

B.

source

C.

transit

D.

bud

An ISP provides a major client MPLS VPN for managed services. The MPLS engineering team needs to use the advanced VPN feature of selective VRF import so that only specific prefixes are present in the required VPNs.

Which aspect of this feature must the team consider?

A.

A route must pass the import route map first and then the route target import filter.

B.

The routers that are imported in the VRF can be BGP and IGP routes, so other match conditions in the route map, besides communities, can be used.

C.

The import-map command is applied under the PE interface that connects to the CE router.

D.

A route is imported into the VRF only when at least one RT that is attached to the route matches one RT that is configured in the VRF and the route is permitted by the import route map.