GMPLS is based upon:
A. VPI/VCI-based switching devices
B. A and B
C. Packet-based switching devices
D. None of the above
E. Non-Packet-based devices
In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?
A. It replaces the bottom label in the MPLS label stack with a VPN label and propagates B. None of above
B. It adds the VPN label into the top label in the MPLS label stack
C. It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packets
D. It replaces the top label in the MPLS label stack with a VPN label and propagates
MPLS label headers for packet media consist of:
E. S flag
Which of the following IOS features can prevent IP spoofing attacks?
A. Unicast Reverse Path Forwarding (uRPF)
B. MPLS traffic Engineering
C. Cisco Express Forwarding
D. PPP over Ethernet
E. IS-IS routing
Which are correct descriptions and configurations of Anycast RP?
A. In Anycast RP, two or more RPs are configured with the same IP address on loopback interfaces.
B. Anycast RP provides redundancy and load-sharing capabilities.
C. Routers with Anycast RP can be configured statically (loopback 188.8.131.52)with the command ip pim rp- address 184.108.40.206
D. Routers with Anycast RP can be configured statically (loopback 220.127.116.11)with the command ip rp- address pim 18.104.22.168
E. Routers with Anycast RP can be configured statically (loopback 22.214.171.124)with the command ip anycast- rp pim 126.96.36.199
Packed Cell Relay encapsulation with AToM inclues which of the following?
A. Tunnel label
C. 5-byte ATM header
E. 4 byte ATM header
F. Support for 30 packed cells.
In the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support? (Choose two.)
A. port tunneling on the Ethernet subinterface
B. VLAN tunneling on the Ethernet trunk
C. port tunneling on the Ethernet interface
D. VLAN tunneling on the Ethernet VLAN subinterface
E. port tunneling on the Ethernet trunk
Which two are characteristics of an IPv6 multicast address? (Choose two )
A. Is allocated from the unicast address space
B. Second octet contains a 4-bit multicast scope field
C. Starts with a prefix of FE80 to FEBF in hex
D. Last 64 bit contains the modified MAC address of the Ethernet interface
E. First (most significant ) octet is FF in hex
F. Starts with a prefix of FECO to FEFF in hex
How would you characterize the source and type in a Denial of Service attack on a router?
A. By setting up and access-list to permit all ICMP, TCP, and UDP traffic with the log or lot ????ì?Cinput commands, then use the show access-list and show log commands to determine the type and source of attack
B. By performing a ??show ip interface?? to see the type and source of the attack based upon the access-list matches
C. By applying and access-list to all incoming and outgoing interfaces, turning off route-cache on all interfaces, then, when telnetting into the router perform a ‘debug ip packet detail’.
D. By performing a ??show interface?? to see the transmitted load ???txload??? and receive load ???
rxload ???, if the interface utilization is not maxed out, there is no attack underway
router bgp 1
Neighbor 188.8.131.52 remote-as 2
The above bgp configuration has what effect on the configured router?
A. Allows incoming TCP connections from 184.108.40.206 that are sourced from port 179
B. Allows incoming TCP connections from 220.127.116.11 that are destined to port 179
C. Allows incoming TCP connections sourced from port 179
D. Allows incoming TCP connections from 18.104.22.168 and destined to,or sourced from port
E. Allows incoming TCP connections destined to port 179
DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.