Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How does Cisco MPLS TE use OSPF extensions to allow for optimized transit between a headend router and a destination router?

A.

Router LSAs share router link advertisements to each router within the MPLS environment so that tunnels can be built bidirectionally.

B.

ASBR Summary LSAs share OSPF domain information so that the two routers know how to reach each other during tunnel setup.

C.

Network LSAs share RSVP information to build the tunnel between the two routers.

D.

Opaque LSAs calculate and establish unidirectional tunnels that are set according to the network constraint.

An engineer needs to implement QOS mechanism on customer's network as some applications going over the internet are slower than others are. Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task? (Choose two)

A.

Configure a queue with sufficient memory to buffer excess packets.

B.

Configure the token values in bytes.

C.

Implement packet remarking for excess traffic.

D.

Implement a scheduling function to handle delayed packets.

E.

Configure a threshold over which excess packets are discarded.

Refer to the exhibit:

Which three outcomes occur if the prefix list is added to the neighbor? (Choose three)

A.

192.168 0.0/19 is denied.

B.

192.168 0.0/17 is denied.

C.

192.168 0.0/17 is permitted

D.

192.168.0.0/16 is denied

E.

192.168 0.0/16 is permitted

F.

192.168 0.0/19 is permitted

Which benefit is provided by FRR?

A.

It provides fast forwarding path failure detection times for all media.

B.

It provides rapid failure detection between forwarding engines.

C.

It provides performance data for the service provider network.

D.

It protects Cisco MPLS TE LSPs from link and node failures.

Which action occurs during the traceback phase of the six-phase approach to service provider security?

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

What are two features of stateful NAT64?

A.

It provides 1: N translations, so it supports an unlimited number of endpoints

B.

It provides 1:1 translation so it supports a limited number of end points

C.

It requires the ipv6 hosts to use either DHCPv6 based address assignments or manual address assignments

D.

It uses address overloading

E.

It requires IPv4 translatable IPv6 address assignments

Refer to the exhibit:

Which effect of this configuration is true?

A.

it creates a pseudowire class named Cisco

B.

It enables tagging for VLAN 12 on the interface

C.

It enables MPLS on the interface

D.

It enables AToM on interface gigabitethemet1/0

Refer to the exhibit. Users in AS 65010 are connected with the application server in AS 65050 with these requirements:

AS 65010 users are experiencing latency and congestion to connect with application server 172.16.50.10.

AS 65030 must be restricted to become Transient Autonomous System for traffic flow.

Links connected to AS 65020 and AS 65040 are underutilized and must be used efficiently for traffic.

Which two configurations must be implemented to meet these requirements? (Choose two.)

A.

Apply the AS-Path route-map policy for traffic received from R3.

B.

Configure the route map to prepend the AS-Path attribute for R5-R3 BGP peering.

C.

Apply the MED route-map policy for traffic received from R4.

D.

Configure a higher Local preference for R5-R4 BGP peering.

E.

Configure the route map to set the MED 50 attribute for R5-R4 BGP peering.

Refer to the exhibit:

After implementing a new design for the network, a technician reviews the pictured CLI output as part of the MOP.

Which two statements describe what the technician can ascertain from the ImpNull output? (Choose two.)

A.

Label 0 is used for the prefix displayed but will not be part of the MPLS label stack for packets destined for 192 168.10.10.

B.

Ultimate Hop Popping is in use for the prefix displayed.

C.

Label 0 is used for the prefix displayed and will be part of the MPLS label stack for packets destined for 192.168.10.10

D.

Penultimate Hop Popping is in use for the prefix displayed

E.

Label 3 is in use for the prefix displayed and will be part of the MPLS label stack for packets destined for 192.168.10.10

Refer to the exhibit. A network engineer is configuring a new router for iBGP to improve the capacity of a growing network. The router must establish an iBGP peer relationship with its neighbor. The underlay network is already configured with the correct IP addresses. Which step should the engineer apply to complete this task?

A.

Implement multicast routing on the router to support BGP hellos.

B.

Configure the AS number for the router to share with its iBGP peers.

C.

Configure the new router as an iBGP route reflector to support multiple iBGP peers.

D.

Activate the BGP peers under the correct address family on the router.