Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

How does an IS-IS router acknowledge the receipt of an IS-IS LSP on a point-to-point link?

A.

They are explicitly acknowledged by sending a CSNP to the sender identifying the LSP.

B.

They are implicitly acknowledged as a part of the link-state database synchronization and maintenance procedures.

C.

They are explicitly acknowledged by sending a PSNP to the sender identifying the LSP.

D.

They are implicitly acknowledged by the DIS multicast of CSNPs.

Which of the following about IS-IS level hierarchies is FALSE?

A.

Level 2 routers interconnect the Level 1 areas.

B.

There must be a contiguous Level 2 backbone to enable routing throughout the entire network.

C.

Level 1 routers send packets to the nearest L1/L2 router if the destination is in a different area

D.

Level 2 routers store the Level 1 and Level 2 topology information in a single database.

Which of the following is defined by the following statement? All label mappings received from all peer LSRs are saved.

A.

Conservative label retention

B.

Liberal label retention.

C.

Downstream on demand.

D.

Downstream unsolicited.

Click on the exhibit.

What value would be expected in the state field?

A.

Exchange

B.

Up

C.

Down

D.

2-Way

Which of the following describes what happens when facility backup fast reroute is enabled for a LSP? Choose three answers.

A.

Each PLR will signal a bypass tunnel that avoids the next-hop node or link.

B.

When a failure occurs, the PLR will push an additional label onto the label stack and start forwarding traffic onto its bypass tunnel.

C.

The ingress router will include a RRO object in the path message to indicate the routers that should be PLRs and MPs along the protected path.

D.

The ingress router will set the local protection desired flag in the session attribute object of the path message to inform all routers along the protected LSP path to establish bypass tunnels.

E.

When the bypass tunnel is in use, the MP will include the RRO object in its PathErr message, with the local protection in use flag set to notify the ingress router that it is using the bypass tunnel.

Click on the exhibit.

In the topology shown, router R1 is an ASBR configured to export external routes to OSPF. Assuming that there are no stub networks, which of the following statements regarding Type 5 LSA generation is TRUE?

A.

Router R1 generates a Type 5 LSA that is flooded to area 1 only.

B.

Router R1 generates a Type 5 LSA that is flooded to areas 1 and 0. Router R6 generates a Type 5 LSA that is flooded to area 2.

C.

Router R1 generates a Type 5 LSA that is flooded to areas 0.1, and 2.

D.

Router R3 generates a Type 5 LSA that is flooded to areas 0 and 2

E.

Type 5 LSAs are not generated in this network topology.

The solicited node address for the destination node address of 2001:DB8::30A:216 4DFF:FE14:6CAE is:

A.

2001::FF:FE:14:6CAE

B.

2001::1:FF:14:6CAE

C.

FF02.DB8::30A:216:4DFF:FE14.6CAE

D.

FF02::1:FF14:6CAE

Click on the exhibit.

Which of the following best describes the format of data traffic sent to the server as it exits from the PC?

A.

The destination IP address will be the system IP address of router R1 and the destination MAC address will be the MAC address of the router R1 port connected to the PC.

B.

The destination IP address will be the IP address of the router R1 port connected to the PC and the destination MAC address will be the MAC address of the router R1 port connected to the PC.

C.

The destination IP address will be the IP address of the server and the destination MAC address will be the MAC address of the server.

D.

The destination IP address will be the IP address of the server and the destination MAC address will be the MAC address of the router R1 port connected to the PC.

Click on the exhibit button below. Assume the following:

- Each router's OSPF interfaces are in the areas shown.

- Bidirectional LDP-over-RSVP tunnels extend from routers R1 to R3 and back over the path R1-R4-R5-R3.

- You enable fast reroute facility bypass on the R5-R3 RSVP LSP.

- Router R5 acts as a PLR, protecting the R5-R3 link by building a bypass tunnel through router R2.

You build a layer 2 VPN on routers R1 and R3, using the LDP-over-RSVP tunnels. What MPLS configuration step must you complete on router R2 for it to protect the end-to-end service?

A.

Enable LDP on the R2-R5 interface.

B.

Configure T-LDP sessions between routers R2 and R5 and R3.

C.

Configure LDP-over-RSVP support on router R2.

D.

Enable MPLS and RSVP on the router R2 network interfaces.

E.

Enable LDP on the R2-R5 and R2-R3 interfaces.

Click on the exhibit.

The routers have an established IS-IS L2 adjacency on which IPv4 system addresses are exchanged. An operator successfully configures multi-topology IS-IS routing so that the IPv6 system addresses are also exchanged between routers.

After IPv6 has been configured, which of the following is TRUE?

A.

Router R2 has two IS-IS-adjacencies and two LSPs.

B.

Router R2 has two IS-IS-adjacencies and four LSPs.

C.

Router R2 has two IS-IS-adjacencies and three LSPs.

D.

Router R2 has four IS-IS-adjacencies and six LSPs.

Which OSPFv3 LSA type is similar in function to the OSPFv2 Type 4 LSA?

A.

Link

B.

Intra-Area Prefix

C.

Inter-Area Prefix

D.

Inter-Area Router

Click on the exhibit.

Given the contents of the Router LSA, which of the following best describes the local topology of the router?

A.

The router has a system interface, two point-to-point interfaces and one broadcast interface.

B.

The router has a system interface, two passive interfaces, two point-to-point interfaces and one broadcast interface.

C.

The router has a system interface, two point-to-point interfaces and one virtual link.

D.

The router has a system interface, two passive interfaces, two point-to-point interfaces and one virtual link.

Which of the following statements concerning OSPFv3 is false?

A.

MD5 Authentication is not supported.

B.

Router LSAs do not carry IPv6 prefix information

C.

NSSA is not supported in OSPFv3.

D.

OSPFv3 uses a 32-bit router ID.

Which LSA is used for OSPF-TE purposes?

A.

Type 9 LSA ?Link local LSA

B.

Type 10 LSA ?Area local LSA

C.

Type 8 LSA ?TE router LSA

D.

Type 11 LSA ?Network LSA

A router receives an OSPF database description packet from a neighbor that references an LSA, which is already in the router's LSDB. The sequence number in the DBD packet is lower than the sequence number of the LSA in the LSDB.

What action does the router take?

A.

The router sends a link-state update to its neighbor.

B.

The router sends a link-state acknowledgement to its neighbor.

C.

The router updates the information in its LSDB with the information received from its neighbor.

D.

The router sends a link-state request to its neighbor.

E.

The router takes no action.

Which of the following are characteristics of an LSP? (Choose two)

A.

It is unidirectional.

B.

It is bidirectional.

C.

It must always have a secondary path.

D.

It provides a specific tunnel for a FEC through the network.

E.

It always follows the IGP best path.

Which of the following best describes distance vector protocols?

A.

They periodically exchange copies of routing tables between adjacent routers and do not maintain any knowledge of links on non adjacent routers.

B.

They use shortest path first algorithms, do not exchange copies of routing tables between routers and do maintain knowledge of links on non adjacent routers.

C.

They periodically exchange copies of routing tables between adjacent routers and maintain knowledge of links on non adjacent routers.

D.

They use shortest path first algorithms, exchange copies of routing tables between routers and maintain knowledge of links on non adjacent routers.

What event causes an OSPF adjacency to change from 'down' to 'two way'?

A.

The router receives a link-state update in response to a link-state request.

B.

The router receives a Hello packet from its neighbor that contains its own router ID in the neighbor list.

C.

The router receives a database description packet from its neighbor.

D.

The router receives a link-state acknowledgement in response to a link-state update

Which type of OSPF LSA has the following characteristics: It is flooded only within the area it originates from and can be originated by any OSPF router within the area (including non-DR routers).

A.

Type 1 Router LSA

B.

Type 2 Network LSA

C.

Type 3 Summary LSA

D.

Type 4 ASBR LSA

A service provider is deploying a 6over4 tunnel to connect a customer's branch office IPv6 network to the corporate headquarters as shown in the exhibit. Which command is used to create a default route on PE2 for the branch office network?

A.

configure router static-route 0.0.0.0/0 indirect 10.10.10.2

B.

configure router static-route 0.0.0.0/0 indirect 2001:DB8:1:100::1

C.

configure router static-route ::/0 indirect 10.10.10.2

D.

configure router static-route::/0indirect2001:DB8:1:100::1

E.

configure outer static-route::/0indirect2001:DB8:1:101::1