Which statement about Remotely Triggered Black Hole (RTBH) is true?
A. Route tagging is one of the techniques used by RTBH
B. It is used for BGP authentication
C. It cannot work with static routes
D. It uses extended ACLs for blocking attacks by creating a black hole
E. Before configuring RTBH. LDP must be enabled on the interface
In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS
A. highest router ID first, then highest priority
B. highest MAC address first, then highest priority
C. highest router ID first, then highest MAC address
D. highest priority first, then highest router ID
E. highest priority first, then highest MAC address
Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that are supported by the IETF? (Choose two)
A. VPLS uses LDP for signaling.
B. VPLS uses BGP for autodiscovery and signaling.
C. VPLS uses extended IS-IS for signaling
D. VPLS uses OSPF version 3 for auto discovery and signaling
E. VPLS uses spanning tree for signaling
Which two statements about EIGRP are true? (Choose two)
A. EIGRP supports VLSM, route summarization, and routing update authentication.
B. If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C. Passive routes are in the process of being calculated by DUAL.
D. EIGRP exchanges full routing table information with neighboring routers with every update.
E. A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
Which of following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state database accuracy?
What type of IPv6 address is this address: FF05:: 2:260:8FF:FE52:F9D8?
A. multicast temporary node local
B. multicast temporary site local
C. unicast permanent link local
D. multicast permanent node link local
E. multicast permanent site local
F. unicast temporary link local
In PPPoA architecture, which two methods are most commonly deployed? (Choose two)
A. terminating PPP sessions at the service provider
B. PPP framing
C. PPP multiplexing
D. GRE tunneling
E. L2TP tunneling
In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups are true? (Choose three)
A. Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.
B. MDTs are built in customer networks
C. Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
D. MDTs are built in provider networks
E. The number of MDTs depends on PIM modes of MDT groups.
Which statement about SNMP is true?
A. SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
B. SNMP version 2 supports message integrity to ensure that a packet has not been tampered with in transit.
C. Proxy agents were used only in SNMP version 1.
D. SNMP version 3 supports encryption and SNMP version 2 support authentication.
E. GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.
How many messages does Internet Key Exchange use to negotiate SA characteristic when it runs in aggressive mode?
DownloadLatest 2013 350-029 Pass4sure Free Tests , help you to pass exam 100%.