Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following best describes the features of Classless Inter-Domain Routing (CIDR)?

A.

Automatic summarization and the use of IP addresses that use any number of bits for the network portion of the address.

B.

Manual summarization and the use of IP addresses that use any number of bits for the network portion of the address.

C.

Automatic summarization and the use of IP addresses that use a fixed number of bits for the network portion of the address.

D.

Manual summarization and the use of IP addresses that use a fixed number of bits for the network portion of the address.

A targeted-LDP session may exist between directly connected or non-directly connected devices

A.

TRUE

B.

FALSE

Click on the exhibit button below.

LSP "toR8-5" requests fast reroute protection on the primary loose path. What could be done to remove the Failure Code shown?

A.

CSPF must be enabled at head-end on fast reroute protected loose path LSPs

B.

Fast reroute must first be enabled on the downstream routers.

C.

CSPF must be enabled on all downstream loose hop routers.

D.

Global revertive path optimization must be enabled so the path will be re-optimized around a failed node.

Which of the following is a valid IPv6 address equivalent to 2001:0da8:0000:0000:0024:0000:4ab9:0300?

A.

2001:0da8:::0024:0000:4ab9:03

B.

2001:0da8::0024::4ab9:0300

C.

2001:da8::24::4ab9:300

D.

2001:da8::24:0:4ab9:300

When a router performs the SPF calculation, which router is used as the root of the shortest path tree?

A.

The router with the least number of links.

B.

The router with the lowest router ID.

C.

The router's closest neighbor.

D.

The router doing the calculation.

Click on the exhibit button below.

With fast reroute enabled, and given the following:

    The protected LSP path is R1-R2-R3.

    All links are of equal cost.

Which of the following statements is true? (Choose two)

A.

Router R1 is the LSP originator and is also a PLR.

B.

With one-to-one link or node protection, the detour LSP path is R1-R4-R5-R2-R3.

C.

With one-to-one link or node protection, the detour LSP path is R1-R4-R5-R3.

D.

If the R2-R3 link fails, router R3 becomes a PLR

E.

None of the nodes can be protected with FRR.

Which of the following is a type of authentication that is supported by OSPF on the Alcatel-Lucent 7750 SR?

A.

Challenge handshake authentication protocol (CHAP)

B.

Two factor authentication

C.

MD5 authentication

D.

Extensible authentication protocol (EAP)

You wish to build an LSP originating on router R1, transiting the path R1-R2-R4-R5-R6, and terminating on router R6. How many strict hops would you define in your path statement?

A.

4

B.

1

C.

5

D.

6

Click on the exhibit.

Examine the physical topology of the IS-IS network, the metrics of the links and the levels of the routers. All routers have a system address included in IS-IS.

Which of the following describes the route that router R4 will use to reach the system address of router R6?

A.

Router R4 will have a route to router R6's system address with router R2 as the next-hop.

B.

Router R4 will have a default route with router R2 as the next-hop.

C.

Router R4 will have a default route with router R3 as the next-hop.

D.

Router R4 will not have a route to router R6's system address, nor will it have a default route.

Click on the exhibit.

Assuming point-to-point links, which of the following is TRUE?

A.

Routers R1 and R2 are L2 routers. Routers R3 and R4 are L1/L2 routers.

B.

Routers R1, R2, and R4 are L1/L2 routers Router R3 is an L1 router.

C.

Routers R1, R2, and R3 are L2 routers. Router R4 is an L1 router.

D.

Routers R1 and R2 are L1/L2 routers. Routers R3 and R4 are L1 routers.

Which of the following best describes the actions taken by an IS-IS router after it receives an LSP on a broadcast interface that is newer than the one in its database?

A.

The router sends a copy of the LSP from its database to its neighbor.

B.

The router updates its database with the LSP and floods a copy to its other neighbors.

C.

The router updates its database with the LSP, acknowledges the LSP with a PSNP and floods a copy to its other neighbors.

D.

The router updates its database with the LSP and acknowledges it with a PSNP.

Which one of the following statements regarding the detour object transported in the detour path message is true?

A.

The PLR sends it downstream with the RRO.

B.

The PLR sends it downstream with the ERO.

C.

It associates all detours with the source PLR.

D.

The MP sends it upstream with the RESV message.

Which LSA type is not found in point-to-point only OSPF networks?

A.

Type 1 Router LSA

B.

Type 2 Network LS A

C.

Type 3 Summary LSA

D.

Type 5 External LSA

When configuring an LSP for fast reroute one-to-one protection, which of the following statements is true?

A.

The LSP can also use facility backup.

B.

The LSP is limited to node protection.

C.

You cannot request bandwidth on the protected LSP.

D.

Node protection can be disabled.

Which of the following TLV fields is included in an IS-IS Hello packet on broadcast interfaces but not on point-to-point interfaces?

A.

The area addresses TLV

B.

The intermediate system neighbors TLV

C.

The IP interface address TLV

D.

The authentication information TLV

Which of the following prerequisites must you configure on a router to enable LDP-over-RSVP support? (Choose two)

A.

Configure the T-LDP peers for tunneling.

B.

Configure tunneled T-LDP sessions between PE routers.

C.

Enable Idp-over-rsvp in the IGP configuration on the PEs and ABRs

D.

Enable LSP stitching on the RSVP LSPs

Link-state PDUs include an age field. Which of the following is FALSE?

A.

When link-state information reaches the maximum age on a router, the router will flood that information to its neighbors.

B.

When a router detects that any of its link-state information has reached the maximum age, it will request a new update from the source router.

C.

Aging helps ensure that links, which are no longer part of the topology, will eventually get removed from the LSDB.

D.

The age value is updated as the information is flooded throughout the network and when it is in the LSDB.

Click on the exhibit button below.

Given the following fast reroute protected LSPs:

-LSP1.R1-R4-R5-R3

-LSP2.R1-R4-R5-R2

Which routers become bypass tunnel PLRs? Choose two answers

A.

Router R1

B.

Router R2

C.

Router R3

D.

Router R4

E.

Router R5

Which of the following concerning OSPFv3 is TRUE?

A.

OSPFv3 uses MD5 Authentication.

B.

Router LSAs carry IPv6 prefix information.

C.

NSSA is supported in OSPFv3.

D.

OSPFv3 uses a 64-bit router ID.

Which of the following routing protocols are supported on the Alcatel-Lucent 7750 SR to enable constraint-based LSPs? (Choose two)

A.

RIPv2-TE

B.

CSPF

C.

OSPF-TE

D.

ISIS-TE

E.

RSVP-TE