Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does SR policy operate in Segment Routing Traffic Engineering?

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Refer to the exhibit. Users on a LAN connected to router R5 frequently open high-traffic connections with servers connected to R1 and R4. Users on R2 also require access to the servers, but performance is not a major concern and their traffic can be treated as secondary. As traffic on all links grows, the network architect wants to mitigate the potential for congestion on the link between R2 and R4.

Which action must the engineering team take to improve performance on the R2-R4 link for users on R5 while still allowing other traffic to flow?

A.

Implement traffic policing on R2 to drop unnecessary traffic from secondary users when that traffic exceeds a given threshold.

B.

Implement traffic shaping on R2 to control transmission between R1 and R4 for traffic identified in a class map.

C.

Implement LLQ for the whole network with a strict policy to ensure that all traffic from the servers is sent to priority users without interruption.

D.

Implement FIFO on R1, R2, and R4 to queue traffic so that all traffic can pass with maximum efficiency.

Refer to the exhibit:

A network engineer is implementing an OSPF configuration Based on the output, which statement is true?

A.

In the ospfv3 1 area 1 ipv4 command, area 0 must be configured instead of area 1.

B.

OSPFv3 does not run for IPv4 on FastEthemet0/0 until IPv6 routing is enabled on the router and IPv6 is enabled on interface Fastfc.thernet0/0

C.

OSPFv3 cannot be configured for IPv4; OSPFv3 works only for IPv6.

D.

IPv6 routing not enabled" is just an informational message and OSPFv3 runs for IPv4 on interface FastEthernet0/0 anyway

Refer to the exhibit:

What does the REST API command do?

A.

It retrieves the information requested by Descriptions xml

B.

It removes the information identified by Descriptions xml

C.

It executes the commands specified in Descriptions xml

D.

It displays the information identified by Descriptions xml

An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?

A.

vrf upgrade-cli

B.

bgp upgrade-cli

C.

address-family ipv4

D.

ip bgp-community new-format

When implementing a REST API, how does an engineer mitigate security risks?

A.

by configuring the system to authenticate the client's identity and avoid broken authentication

B.

by configuring object properties to protect data

C.

by configuring separate authorization schemes to securely compartmentalize different areas of the business

D.

by configuring rate limiting to reduce the risk of DOS and DDOS attacks against the system

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.

Static routes on CE routers allow route leakage from a PE global routing table

Refer to the exhibit.

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What is the purpose of OSPF-TE extensions to MPLS traffic engineering functionality?

A.

carrying OSPF routing information for TE tunnels

B.

advertising the TE tunnel routes to the OSPF domain

C.

calculating and establishing TE tunnels in accordance with network constraints

D.

calculating fast reroute to provide a backup path for TE tunnels

What is a feature of model-driven telemetry?

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

Refer to the exhibit. Routers R1 and R2 are connected over the internet, with the connection passing over four different autonomous systems. The company must mitigate potential DDoS attacks and protect the CPUs of the routers. A network engineer must secure all external connections on edge router R1 based on RFC 5082. R2 has already been secured. Which task should the engineer perform on R1 to achieve the goal?

A.

Configure ip neighbor 182.12.91.5 bgp multihop-ttl 4 under the global configuration.

B.

Configure ip neighbor 182.12.91.5 ttl 4 under the global configuration.

C.

Configure neighbor 182.12.91.5 ttl-security hops 4 under the BGP configuration.

D.

Configure neighbor 182.12.91.5 bgp-ttl 4 under the BGP configuration.

Refer to the exhibit. A network engineer observed congestion between routers R1 and R4, which are connected on a point-to-point link. Two servers that reside on networks on R1 and R4 generate heavy traffic between them with most traffic going from R4 to R1. To improve overall performance, the engineer wants to drop inbound packets that exceed a configured threshold, without disrupting traffic that passes from R4 to R3. Which action must the engineer take to resolve the issue?

A.

Implement traffic policing to drop packets that exceed the given threshold.

B.

Implement FIFO to queue excess traffic for transmission when bandwidth is available.

C.

Implement traffic shaping to drop excess packets.

D.

Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.

Refer To the exhibit:

On R1, which output does the show isis neighbors command generate?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

Which two topology changes happen to the IS-IS routers? (Choose two.)

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

R1 and R4 are Level 2 neighbours.

D.

R1 and R2 are Level 2 neighbours.

E.

All four routers are operating as Level 1-2 routers.