What features set is most frequently used to prevent hackers from flooding a port with MAC- addresses?
A. BPDU Guard
C. Port Security
D. Storm Control
Correct Answer: C
What layer of the TMN (telecommunications management network) model does CTM fit into?
A. Network management layer
B. Element management layer
C. Business management layer
D. Network element layer
Correct Answer: B
With the BGP peerings shown, which 3 solutions are most correct?
A. rtrA and rtrD are route-reflector-clients; rtrB and rtrC are route reflectors part of the same cluster.
B. rtrA and rtrD are route-reflector-clients; rtrB and rtrC are route reflectors part of the different cluster.
C. rtrA, rtrB and rtrC are part of a confederation sub-AS and rtrD is part of a different confederation sub-
D. rtrA, rtrB are part of one confederation sub-AS and rtrC,rtrD are part of a different confederation sub-AS
E. rtrA, rtrB and rtrC are part of a confederation sub-AS where rtrB is a route reflector and rtrA, rtrC are
Correct Answer: BDE
In optical transmission systems, chirped lasers are used for the purpose of:
A. Turning the laser to a specific ITU channel
B. Keeping the signal wavelength “locked” to a specific technology
C. Suppressing FWM and SBS non-linear effects
D. None ofthe above
Correct Answer: D
Which statement is FALSE concerning Concatenation?
A. It allows ITCM to send multiple upstream packets in one single large burst.
B. It reduces upstream data throughput.
C. It can be enabled/disabled from CMTS on per upstream port basis if desired
D. Concatenation activity on an interface can be checked by the show controller counters command
Correct Answer: B
Ensurepass offers Latest 2013 CCIE 350-029 Real Exam Questions , help you to pass exam 100%.