Q1. What are the four key design requirements for mobile IP backhaul? (Choose four.)
A. X2 interface turning point
B. bandwidth
C. Layer 2 Tunneling
D. native IPv6 support
E. DiffServQoS
F. MPLS-enabled interface
G. network timing distribution and recovery
H. mandatory Layer 3 access up to a cell site
Answer: C,D,G,H
Explanation: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_14-3/143_backhaul.html
Q2. Refer to the exhibit. R3 cannot install a route to R1-R2 subnet 2001:1:155:12::/64. Which action resolves this issue?
A. Add the redistribute ospf 1 include-connected command under the ipv6 router eigrp 10 process.
B. For the OSPF process, add the no shutdown command.
C. For prefix-list OSPF_INTO_EIGRP seq 20, replace the prefix with 2001:155:1:12::/64.
D. For route-map OSPF_INTO_EIGRP, add the set metric 1000 1 255 1 1500 command.
Answer: A
Explanation: http://www.ciscopress.com/articles/article.asp?p=2273507&seqNum=8
https://supportforums.cisco.com/document/12110191/understand-include-connected-keyword-use-ipv6-redistribution
Q3. Refer to the exhibit. A customer is running IS-IS within a network and is using BGP as a CE-PE routing protocol. Which action allows CE1 to get the subnet 10.10.2.0/24 over the CE1-PE1 link, regardless of whether there is a flap in the MPLS link or backdoor link?
A. Configure the neighbor <PE1-IP>weight 33768 command on CE1 under the BGP process.
B. Configure the distance bgp 115 200 200 command on CE1 under the BGP process.
C. Configure the distance 30 ip command on CE1 under the IS-IS process.
D. Configure the distance bgp 115 200 200 command on CE2 under the BGP process.
E. Configure the neighbor <PE1-IP>weight 33768 command on CE2 under the BGP process.
Answer: B
Q4. Refer to the exhibit.
Which VLAN interface does untagged traffic pass through?
A. 1
B. 2
C. 3
D. 4
Answer: C
Q5. Which OSPF feature allows the router to recompute SPF changes for only the affected part of the SPT?
A. PRC
B. fast hellos
C. BFD across the entire backbone area
D. incremental SPF
Answer: D
Q6. Which Cisco IOS XR Virtualization technology provides full isolation between virtualized routing instances for extra control plane resources?
A. HVR
B. SVR
C. SDR
D. DRP
Answer: C
Explanation:
http://www.cisco.com/en/US/solutions/collateral/ns341/ns524/ns562/ns573/white_paper_c11-512753_ns573_Networking_Solutions_White_Paper.html
Q7. Refer to the exhibit.
An ISP engineer has been asked to identity a method to protect the PE and to control the number of BGP prefixes learned from his customers. The BGP session should be dropped if the PE router receives more than 1000 BGP prefixes. A syslog message should be generated when the number of BGP prefixes learned from CE exceeds 850.
Which Cisco IOS command should the engineer apply on PE routers?
A. neighbor 10.1.1.2 maximum-prefix 1000 85
B. neighbor 10.1.1.2 maximum-prefix 1000 850
C. neighbor 10.1.1.2 maximum-prefix 1000 85 warning-only
D. neighbor 10.1.1.2 maximum-prefix 1000 850 warning-only
Answer: A
Q8. DRAG DROP
Drag and drop Evolved Packet Core functional entities on the left to the correct description on the right.
Answer:
Q9. Refer to the exhibit. The configuration in the exhibit redistributes static route 172.16.0.0/24 into BGP. Which action does the route-map STATIC-TO-BGP do?
A. Route 172.16.0.0/24 cannot be sent to the Internet.
B. Route 172.16.0.0/24 cannot be re-advertised beyond its neighbors.
C. Route 172.16.0.0/24 cannot be advertised outside of AS 100.
D. Route 172.16.0.0/24 cannot be exported from BGP to another protocol.
Answer: C
Q10. A Server Provider is seeing an increasing amount of attacks against its customers. For which kind of attack would an engineer want to design a Backscatter Traceback solution?
A. Rogue DNS/DHCP Servers
B. IP Spoofing
C. Ping of Death
D. Distributed Denial of Service
E. Network Attack TCP/UDP Scan
Answer: B
Explanation: Reference: http://www.cisco.com/web/about/security/intelligence/sp_infrastruct_scty.html
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_10-4/104_ip-spoofing.html
Q11. In Multicast Inter-AS VPN context, which BGP attribute should you use to overcome the Option B limitation due to a rewritten originator next-hop address in the network?
A. connector
B. AS path
C. weight
D. originator
Answer: A
Q12. Which are the two fundamental ways in which IEEE 1588 differs from SyncE? (Choose two.)
A. In addition to frequency synchronization, it achieves ToD synchronization to achieve phase alignment which is required for multi-channel communication.
B. It is a purely-based solution, with the actual clock values being passed inside the payloads of special packets dedicated to that task.
C. It offers two major changes over traditional Ethernet to make it suitable for clock distribution: a mandated clock accuracy and the ESMC protocol for clock selection, distribution, management, traceability, and failover.
D. SyncE is a Cisco proprietary ToD technology where IEEE 1588 is a industry standard recommended for interoperability across vendor devices.
E. IEEE 1588 applies to voice-only systems or with low-bandwidth data traffic.
Answer: A,B
Explanation: http://www.eetimes.com/document.asp?doc_id=1278660
Q13. Refer to the exhibit. Router RT1 has three equal-cost paths back to the source. Which configuration should be applied in order to load-balance the multicast traffic across all three links.
A. Create three static multicast routes where each pointing out to one or three interfaces.
B. Enable PIM multipath.
C. Create a tunnel interface between RT1 and RT2. Enable PIM on the interface tunnel and disable PIM on the three interfaces part of equal-cost path between RT1 and RT2.
D. PIM load balance is not possible. PIM only chooses one interface for RFC check and prunes the other interfaces.
Answer: C
Explanation:
Reference: http://www.cisco.com/c/en/us/support/docs/ip/ip-multicast/16450-mcastguide0.html
Q14. In a PE-CE scenario using OSPF as the routing protocol, a down-bit set can be advertised in which OSPF LSA type?
A. type 1 LSA
B. type 2 LSA
C. type 3 LSA
D. type 5 LSA
E. type 7 LSA
Answer: C
Q15. Refer to the exhibit. An MPLS Layer 3 VPN service has been provisioned for a customer. What will be the ToS value at Site-B for the exceeded traffic that it is sent from Site-A with ToS 2?
A. 0
B. 2
C. 3
D. 4
E. No exceeded traffic will reach Site-B.
Answer: E