New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Why is the keyword none needed when implementing management plane security using TACACS?

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

An engineer is implementing MPLS to monitor within the MPLS domain. Which must the engineer perform to prevent packets from being forwarded beyond the service provider domain when the LSP is down?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit:

A network engineer is implementing QoS services. Which two statements about the QoS-group keyword on Cisco IOS XR 3re true? (Choose two )

A.

The QoS group numbering corresponds to priority level

B.

QoS group marking occurs on the ingress

C.

It marks packets for end to end QoS pokey enforcement across the network

D.

QoS group can be used in fabric QoS policy as a match criteria

E.

It cannot be used with priority traffic class

Which module refers to the network automation using Ansible?

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

A remote operation center is deploying a set of l-BGP and E-BGP connections for multiple IOS-XR platforms using the same template. The l-BGP sessions exchange prefixes with no apparent issues, but the E-BGP sessions do not exchange routes. What causes this issue?

A.

A PASS ALL policy has no! been implemented for the l-BGP neighbors.

B.

The next-hop-self command is not implemented on both E-BGP neighbors.

C.

The E-BGP neighbors are not allowed to exchange information doe to the customer platforms default policy.

D.

The l-BGP neighbors are mistyped and HELLO packets cannot be exchanged successfully between routers.

Refer to the exhibit:

Which statement supports QPPB implementation?

A.

QoS policies are identified in the MPLS forwarding table

B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

C.

QoS policies use BGP to gain full coverage on the network.

D.

QPPB policies affect only egress traffic

Refer to the exhibit.

An engineer with an employee 10:4350:47:853 is implementing IS-IS as the new routing protocol in the network. All routers in the network operate as Level 2 routers in the same private autonomous system, and the three branches are connected via dark fibre. The engineer has already implemented IS-IS on router R1 with NET address 49.0133.532b.ca14.6915.21311.F40F.1B3a.ba10.00. Which IS-IS NET address configuration must be implemented on R3 to establish IS-IS connectivity?

A.

49.0133.532b.ca14.6915.21311.f40f.1b4a.bb87.00

B.

49.0135.332b.ca14.6975.28371.1721.1b3b.ca11.10

C.

48.0133.532b.ca14.6915.21311.f40f.1626.bb98.00

D.

49.0133.532b.ca14.6915.21311.1721.1b4a.0013.01

Refer to the exhibit:

If router RA is configured as shown, which IPv4 multicast address space does it use?

A.

224.0. 0.0/8

B.

225.0. 0.0/8

C.

232.0. 0.0/8

D.

239.0. 0.0/8

Refer to the exhibit.

What does the script configure?

A.

a VLAN namespace

B.

selectors for the in-band management

C.

a physical domain

D.

a static VLAN

Refer to the exhibit. All edge routers are fully meshed via the IBGP and IS-IS routing protocols, and LDP is used for label distribution. The network engineer must protect the TE tunnels and MPLS network from interface flaps and retain label information in the LIB cache for 10 minutes. Which action completes the implementation?

A.

Enable the MPLS TTL signaling expiration timer with the timeout set to 10 minutes.

B.

Implement MPLS label protection with a duration of 10 minutes.

C.

Enable signaling synchronization for MPLS traffic engineering with the timeout set to 600 seconds.

D.

Implement LDP session protection with a duration of 600 seconds.

What is the purpose of DS-Lite technology?

A.

It enables networks to pass encapsulated IPv4-in-IPv6 traffic over the ISP backbone.

B.

It allows network administrators to implement shared IPv4 addresses between the ISP and its customers.

C.

It allows an ISP to service IPv6 networks over an IPv4-enabled ISP backbone.

D.

It allows network administrators to transition a network to IPv6 while maintaining IPv4 support.

A network engineer must enable multicast on the network to support a new series of webcasts. The PIM protocol has been enabled on the LAN side, with PIM and MSDP capabilities on edge router R1. The multicast source has been configured with IP address FF3A:121, and IP protocol 58 has been enabled and successfully tested in the network. Due to the limitations of some devices on the network, the data flow should take the most efficient path.

Which task must the engineer perform to achieve the goal?

A.

Enable PIM BSR on R1.

B.

Implement Anycast RP on R1.

C.

Implement PIM-SM in the LAN.

D.

Enable PIM-SSM across the network.

You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tunnel’s router?

A.

error

B.

reservation

C.

path

D.

tear

Refer to the exhibit. R1 and R3 have a pseudowire connection between them, which allows R2 and R4 to communicate via Layer 2. R2 uses VLAN 10. R4 also uses VLAN 10, but with a different subnet associated.

Which configuration should the engineer apply to R3 to rewrite the VLAN on traffic from R2 to VLAN 15?

A.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag translate 1-to-2 dot1q 15 second-dot1q 20

B.

interface TenGigE0/0/0/0.2 I2transport

 encapsulation dot1q 15

C.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag pop 1

D.

interface TenGigE0/0/0/0.2 12transport

 encapsulation dot1q 10

 rewrite ingress tag push dot1q 15 symmetric

Refer to the exhibit.

Which type of DDoS attack will be mitigated by this configuration?

A.

SYN flood

B.

smurf attack

C.

SIP INVITE flood attacks

D.

teardrop attack