2013 Latest 350-029 Pass4sure Free Tests 71-80

Ensurepass

 

 

QUESTION 71

Which statement about Remotely Triggered Black Hole (RTBH) is true?

 

A.  Route tagging is one of the techniques used by RTBH
B.  It is used for BGP authentication

C.  It cannot work with static routes

D.  It uses extended ACLs for blocking attacks by creating a black hole

E.  Before configuring RTBH. LDP must be enabled on the interface

 

Answer: A

 

 

QUESTION 72

In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS

selection?

 

A.  highest router ID first, then highest priority

B.  highest MAC address first, then highest priority

C.  highest router ID first, then highest MAC address

D.  highest priority first, then highest router ID

E.  highest priority first, then highest MAC address

 

Answer: E

 

 

QUESTION 73

Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that are supported by the IETF? (Choose two)

 

A.  VPLS uses LDP for signaling.

B.  VPLS uses BGP for autodiscovery and signaling.
C.  VPLS uses extended IS-IS for signaling

D.  VPLS uses OSPF version 3 for auto discovery and signaling

E.  VPLS uses spanning tree for signaling

 

Answer: AB

 

 

QUESTION 74

Which two statements about EIGRP are true? (Choose two)

 

A.  EIGRP supports VLSM, route summarization, and routing update authentication.

B.  If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.

C.  Passive routes are in the process of being calculated by DUAL.


D.  EIGRP exchanges full routing table information with neighboring routers with every update.

E.  A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.

 

Answer: AE

 

 

QUESTION 75

Which of following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state database accuracy?

 

A.  LSP

B.  PSNP
C.  ISH

D.  CSNP
E.  IIH

 

Answer: D

 

 

QUESTION 76

What type of IPv6 address is this address: FF05:: 2:260:8FF:FE52:F9D8?

 

A.  multicast temporary node local
B.  multicast temporary site local
C.  unicast permanent link local

D.  multicast permanent node link local

E.  multicast permanent site local

F.  unicast temporary link local

 

Answer: E

 

 

QUESTION 77

In PPPoA architecture, which two methods are most commonly deployed? (Choose two)

 

A.  terminating PPP sessions at the service provider

B.  PPP framing

C.  PPP multiplexing

D.  GRE tunneling

E.  L2TP tunneling

 

Answer: AE

 

 

QUESTION 78

In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups are true? (Choose three)

 

A.  Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.

B.  MDTs are built in customer networks

C.  Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D.  MDTs are built in provider networks

E.  The number of MDTs depends on PIM modes of MDT groups.

 

Answer: CDE


 

 

QUESTION 79

Which statement about SNMP is true?

 

A.  SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.

B.  SNMP version 2 supports message integrity to ensure that a packet has not been tampered with in transit.

C.  Proxy agents were used only in SNMP version 1.

D.  SNMP version 3 supports encryption and SNMP version 2 support authentication.

E.  GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.

 

Answer: E

 

 

QUESTION 80

How many messages does Internet Key Exchange use to negotiate SA characteristic when it runs in aggressive mode?

 

A.

3

B.

4

C.

5

D.

2

E.

6

 

Answer: A

 

DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.