Which two features must be configured to perform AToM NSF? (Choose two)
C. distribute CEF
D. switch virtual path
E. graceful restart
Refer to the exhibit.
Which two configurations are shown? (Choose two)
A. L2TP tunnel configuration
B. GRE tunnel configuration
C. IPsec tunnel configuration
D. tunnel keepalive mechanism configuration
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system: single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that are supported in multimodule cabling?
A. 9 LCCs
B. 7 LCCs
C. 10 LCCs
D. 6 LCCs
E. 8 LCCs
Which three things are the building blocks of the Cisco VPLS architecture? (Choose three)
A. VLAN Trunk Protocol (VTP)
B. State Synchronization Protocol (SSP)
D. Ethernet Virtual Switch Interface (VSI)
E. Label Distribution Protocol (LDP)
Which Modular QoS CLI (MQC) based output queuing method is designed to support multiple traffic classes including VoIP traffic, mission-critical traffic, interactive traffic, and default class traffic?
C. custom queuing
D. priority queuing
What are three common reasons for ATM CRC errors? (Choose three.)
A. Incorrect VPI and VCI configuration
B. Noise, gain hits, or other transmission problems on the data link equipment
C. ATM cells are dropped due to incorrect ATM routing in the service provider.
D. A faulty or failing ATM interface.
E. Cells are dropped due to traffic policing in the ATM cloud on one or more virtual circuits attached to the
Refer to the exhibit.
The service provider is an MPLS and IPv4 enabled network. Which two approaches can enable IPv6 tunneling between site A and site B over the backbone? (Choose two.)
A. IPv6 customer premise (6CP) over MPLS
B. IPv6 VPN provider edge (6VPE) over MPLS
C. IPv6 virtual forwarding (6VF) over MPLS
D. IPv6 forwarding instance (6FI) over MPLS
E. IPv6 provider edge router (6PE) over MPLS
How many messages does internet Key Exchange use to negotiate SA characteristics when running in main mode?
A. 3 messages
B. 6 messages
C. 4 messages
D. 2 messages
E. 5 messages
Which three protocols use TLVs to carry attributes? (Choose three.)
A. Cisco Discovery Protocol
B. Label Discovery Protocol
C. Border Gateway Protocol
E. RIP version 2
Which statements about the Route Target Rewrite feature are not true? (Choose two.)
A. After the route target replacement policy is applied to the target router, the BGP session need not be refreshed manually to put the policy into operation.
B. Route Target Rewrite allows the administration of the routing policy to stay local to the AS.
C. Route target replacement is always done by the ASBR.
D. Route target rewrites are supported for VRF export maps.
E. Route target replacement can be done on incoming and outgoing BGP updates.
DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.