What best describes the usage of Route-Target rewrite?
A. None of the above.
B. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the PE router in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
C. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the
ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
D. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured at the Route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.
Which of the following are steps to configure destination-based Remote Triggered Black Hole(RTBH)
A. Configure BGP beteen trigger and black hole routers.
B. Configure OSPF between trigger router and black hole routes
C. Configure all edge routers with static (reserved) host route to Null0
D. Configure on trigger router to advertise victim host route with community
E. Activate black hole by redistributing route for victim into BGP with next-hop set to the static(reserved)
host route configured on edge routers.
Based on the following output in a router A running LDP, which statement is true?
show mpls ldp bindings 184.108.40.206 32 tib entry: 220.127.116.11/32, rev 5
local binding: tag: imp-null
remote binding:tsr:18.104.22.168:0, tag:16
A. None of the above.
B. The IP address 22.214.171.124/32 is assigned to the non-directly connected LDP neighbor, 50.0..0.4.
C. The IP address 126.96.36.199/32 is assigned to one of its own interfaces.
D. The IP address 188.8.131.52/32 is assigned to its directly connected LDP neighbor, 50.0..0.4.
According to RFC 3931,L2TPv3 utilizes the IANA assigned IP protocol ID of:
When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise, which transition strategy works the best?
A. Deploy IPv6 at the Edges and tunnel Enterprise through the core
B. None of the above will work
C. Deploy IPv6 at Edges and Core at the same time for smooth transition
D. Deploy IPv6 at the core first and then move to Edges toward the end customer
With VPLS, which protocol is used for label exchange and PW signalling.
E. Directed LDP
Refer to the exhibit. Your customer has enabled IPv6 and IPv4 on routers R1 and R2, both running ISIS routing protocol, and they can no longer reach R3 network 172.26.15.0/24 (R3 does not enable IPv6, enables IPv4 only). Which two steps should be taken no restore reachability to R3? (Choose Two.)
A. Enable OSPFv3 to support IPv4 and IPv6 simultaneously.
B. Configure static routes to all unreachable networks and redistribute to IS-IS.
C. Create an IPv6 tunnel from R2 to R3.
D. Transition to IS-IS Multiple Topology Mode on R3.
E. Enable wide metrics.
F. Transition to IS-IS Multiple Topology Mode on R1 and R2.
Which methods would enable traffic to be forwarded along an MPLS TE tunnel (Choose 4)
A. MP-BGP routing
B. Static routing
C. Policy routing
E. Forwarding adjacency
Which of the following descriptions about IP spoofing is correct?
A. IP destination address is forged
B. IP source address is forged
C. IP TCP destination port is forged
D. None of above
E. IP TCP source port is forged
SONET’s three layers are:
DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.