Which two statements regarding the IS-IS DIS election process are true? (Choose Two.)
A. L1 routers on a broadcast network only establish adjacencies with the DIS.
B. If the DIS becomes unavailable the backup DIS is promoted to DIS.
C. Adding a router with a higher priority than the current DIS will result in the new router becoming DIS.
D. Separate L1 and L2 election processes are held on a brodcast network.
E. A priority of 0 will prevent a router from becoming a DIS.
F. If there is a tie based on priority, the router whose attached interface has the lowest MAC address becomes the DIS.
What is jitter?
A. The total end-to-end delay
B. The time it takes for the bits to transit the physical media.
C. The delay caused by placing the bits on the wire.
D. The variations of delay.
Which two statements best describe the signalling requirements of virtual circuit setup of VPLS and exchange of reachability information (MAC addresses)?
A. Cisco VPLS does not require the exchange of reachability (MAC addresses) information via a signaling protocol. This information is learned from the data plane using standard address learning, aging, and filtering mechanisms defined for Ethernet bridging.
B. Cisco VPLS uses directed LDP as a signalling protocol to exchange reachability (MAC addresses)
information to avoid maintanance of ARP cache.
C. In Cisco VPLS the virtual circuit setup uses Multi-Protocol BGP as autodiscovery and signaling mechanism. Using BGP allows BPDUs to be propagated across VPLS in a scaleable fashion.
D. In Cisco VPLS the virtual circuit setup uses the same LDP signaling mechanism defined for point-to- point services. Using a directed LDP session, each provider edge advertises a virtual circuit label mapping that is used as part of the label stack imposed on the Ethernet frames by the ingress provider edge during packet forwarding.
What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are a potential exit point out of the area ?
A. ATT (Attached )bit
B. ABR (Area Border Rorter ) bit
C. PN (Pseudonode )biy
D. P(Partition) bit
E. Down bit
F. IS-Type bits
Select the two answers that best describe the IP Event Dampening feature:
A. The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B. BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C. The IP Event Dampening works with routing protocols by stopping the announcement of dampened
Interface subnets in their updates
D. When IP Event Dampened internet routes resch their re-use limit, BGP installs them in the Routing
Table and announces them to other BGP speakers
What OSPF LSA is used to support MPLS-traffic Engineering ?
A. NSSA LSA (Type 7 )
B. Opaque LSA (Type 11 )
C. Opaque LSA (Type 9 )
D. Opaque LSA (Type 10 )
E. External LSA (Type 5 )
Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM
A. It is the Routing protocol used between ATM switches
B. PNNI uses the same Dijsktra algorithm for SPF calculation
C. PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D. PNNI measures line capacities and delays in addition to simple cost metrics
With EIGRP DUAL, a feasible successor is considered loop-free if which condition is true?
A. Its AD is equal to the metric of the successor
B. Its AD is less than the successor??s FD
C. Its AD is equal to the successor??s FD
D. Its AD is greater than the successor??s FD
E. Its FD is equal to the metric of the successor
What best describes the usage of Route-Target rewrite?
A. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the Route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
B. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the
ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PE router in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D. None of the above.
Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? (Choose three.)
A. PW capabilities list
B. Message type
C. Assigned control connection ID
D. PW type
E. Remote session ID
DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.