Q1. In an MPLS VPN environment, the QoS marking over the MPLS backbone must be different from the one that is received from the customer. The forwarding on the egress PE is based on the marking that is set by the ingress PE. Which null label and QoS mode can achieve this?
A. MPLS explicit null with pipe mode
B. MPLS implicit null with short pipe mode
C. MPLS implicit null with uniform mode
D. MPLS explicit null with uniform mode
E. MPLS explicit null with short pipe mode
F. MPLS implicit null with pipe mode
Answer: A
Explanation:
http://www.cisco.com/en/US/tech/tk828/technologies_q_and_a_item09186a00800a43f5.sht ml#wp27379
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_te_diffserv/configuration/15-mt/mp-te-diffserv-15-mt-book/mp-diffserv-tun-mode.pdf
https://ccdewiki.wordpress.com/2013/05/31/three-qos-models-in-mpls/
Q2. In a routing virtualization concept, which are the two main techniques for creating vitalized router entities as defined by their physical and operational characteristics? (Choose two.)
A. HVR
B. SVR
C. SDR
D. DRP
E. VDC
Answer: A,B
Q3. Refer to the exhibit.
A network engineer is troubleshooting PTP on Cisco ASR 9000 router. What can be concluded about the interface based on output provided?
A. The interface receives timestamps from a master clock, but the router's clock is not yet synchronized to the master.
B. The interface is aware of a better clock than the one it would advertise if it was in Master state.
C. The interface is not yet ready to participate on PTP.
D. The interface is about to go into Master state.
Answer: A
Q4. Refer to the exhibit.
PIM sparse mode is implemented in the network RPF succeeds under which condition?
A. The RPF check succeeds for the next hop whose router ID is the highest.
B. The RPF check succeeds for the highest DR priority for the PIM router.
C. The RPF check succeeds for both PIM neighbors, and traffic load-balances across both neighbors.
D. The RPF check succeeds for the highest interface IP address for the PIM router.
Answer: D
Q5. Refer to the exhibit.
OSPF is already running with the default OSPF parameters. R1 has added a new subnet (loopback 11). What will occur in regards to SPT computing on R2 router?
A. Adding ispf command on R2 router, the entire SPT will be computed on R2 router.
B. Because 10.11.11.11/32 prefix information will be in a LSA type 3 on R2 router's OSPF database, R2 router will run partial SPF computation.
C. Adding ispf command on R2 router, R2 router will recompute only the affected part of tree.
D. Because 10.11.11.11/32 prefix will be a LSA type 1 on R2 router's OSPF database. R2 router will always run a full SPF computation, even though an OSPF optimization is applied on R2 router.
Answer: C
Q6. An support engineer has been tasked to protect an ISP infrastructure from the growing number of encrypted DDoS attacks. The solution should also validate the eBGP peering. Which solution accomplishes these goals?
A. BGP FlowSpec
B. BTSH
C. BGP Route Dampening
D. BGP LS
E. RTBH
Answer: B
Q7. In a secure domain router scenario, which two functions are shared amongst all SDR in the system? (Choose two.)
A. configuration
B. protocols
C. routing tables
D. chassis-control
E. switch-fabric
Answer: D,E
Explanation:
Secure domain routers (SDRs) provide a means of partitioning a router into multiple, independent routers. SDRs perform routing functions in the same manner as a physical router but share resources with the rest of the system. For example, the applications, configurations, protocols, and routing tables assigned to an SDR belong to that SDR only, but other functions such as chassis control, switch fabric, and partitioning are shared with the rest of the system.
Reference: http://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-3/system_management/command/reference/b_sysman_cr43crs/b_sysman_cr43crs_chapt er_01110.html
Q8. What are three actions that the control word performs in MPLS AToM? (Choose three.)
A. is used to identify the VC label
B. is used for padding small packets
C. preserves the sequence of the transported frames
D. facilitates the load balancing of AToM packets in the MPLS backbone network
E. carries control bits of the Layer 3 header of the transported protocol
F. is used to identify the tunnel label
Answer: B,C,D
Explanation: https://ccdewiki.wordpress.com/2013/05/28/control-word-on-atom/
Q9. Two Service Providers are beginning a merger between AS boundaries to provide MPLS-enabled services between their networks. Customers are using both Service Providers for services and, under certain circumstances; there are requirements to extend Layer 2 VPN circuits between each provider. The providers are in the process of completing the technical merger. However, the MPLS is not supported between the providers. Which action allows MPLS Layer 2 VPN circuits to be built over the inter-AS link?
A. Create a GRE tunnel with the mpls ip command between ASBRs.
B. Create Layer 2 VPN peerings between PE routers from each provider.
C. Create a VPNv4 peering between ASBRs to advertise labels between each provider.
D. Create a sham link between ASBR routers to enable a superbackbone peering for Layer 2 VPN signaling.
Answer: A
Explanation: https://ccdewiki.wordpress.com/2013/07/02/inter-as-l2vpn-mpls-solutions/
Q10. On a Cisco ASR 1000 Series, which hardware component is used to build and distribute the forwarding plane information to all line cards?
A. RP
B. ESP
C. SIP
D. PRP
Answer: B
Q11. An engineer must implement E-Line services for a service provider network. Which two services apply in this situation? (Choose two.)
A. EVPL
B. E-Tree
C. E-LAN
D. EVC
E. EPL
Answer: A,E
Explanation: http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/fulfillment/6-2/theory/operations/guide/theory/l2ce.pdf
Q12. The product team at an ISP that offers VoIP services wants to add two-way video conferencing to their product offering. Which three QoS methods can be applied for real-time traffic on WAN links with speeds that are slower than 768 Kbps? (Choose three.)
A. Apply MLP link fragmentation and interleaving to the interface.
B. Apply LLQ with both voice traffic and video traffic in the same priority queue.
C. Apply CBWFQ with VoIP traffic in its own class, which is marked with a PHB value of EF.
D. Apply CBWFQ with video traffic in its own class, which is marked with a PHB value of AF41.
E. Apply voice-adaptive fragmentation to ensure that large video packets are fragmented and interleaved.
F. Apply LLQ with video traffic that is dedicated in the priority queue.
Answer: A,C,D
Explanation:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/Qo S-SRND-Book/WANQoS.html
Q13. A Service Provider is designing control policies at the customer edge of the network, in order to prevent usage that exceeds the contracted terms. A new client that is contracted for only 2 Gbps is connecting to the Service Provider edge with a 10 Gbps interface. Which two QoS strategies meet the design goal? (Choose two.)
A. On the service Provider edge, enable traffic shaping on the customer port.
B. On the customer edge device, enable traffic shaping on the interface that is connected to the Service Provider.
C. On the customer edge device, enable policing on the interface that is connected to the Service Provider.
D. On the service Provider edge, enable policing on the customer port.
E. On the service Provider edge, enable WRED on the customer port.
F. On the customer edge, enable WRED on the interface that is connected to the Service Provider.
Answer: B,D
Explanation: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/xe-3s/asr1000/qos-plcshp-xe-3s-asr-1000-book/qos-plcshp-oview.html
Q14. Refer to the exhibit. The Service Provider is deploying Internet service to its VRF customers by using vrf INTERNET. A dedicated firewall provides NAT functionally towards the Internet. Assume that IP address overlapping between VRFs is not an issue.
Which three configuration steps are required to add Internet service to the VRF customers? (Choose three.)
A. Export the RD of vrf INTERNET from all customer VRFs.
B. Originate a default route on PE4 in vrf INTERNET.
C. Import the RD from vrf INTERNET in all customer VRFs.
D. Originate a default route on the firewall in vrf INTERNET.
E. Import the VRF “INTERNET” Route Target in all customer VRFs.
F. Import the Route Target of all customer VRFs in vrf INTERNET.
G. Leak all VRF routes to the global routing table.
Answer: B,C,G
Q15. Refer to the exhibit. Two MPLS TE tunnels are configured with a total bandwidth guarantee of 100 Mbps. However, Tunnel 1 has a requirement to have one-fifth of this total bandwidth. Which two configurations accomplish this goal? (Choose two.)
A. Configure tunnel mpls traffic-eng bandwidth 20000 under the Tunnel 1 interface.
B. Configure bandwidth 20000 under the Tunnel 1 interface.
C. Configure tunnel mpls traffic-eng bandwidth 80000 under the Tunnel 2 interface.
D. Configure bandwidth 80 Mbps under physical interfaces in the path PE1-P2-PE2.
E. Configure bandwidth 20 Mbps under physical interfaces in the path PE1-P1-PE2
F. Configure bandwidth 80000 under the Tunnel 2 interface.
Answer: A,C
Explanation: See Configuration Guide