How many messages does Internet Key Exchange use to negotiate SA characteristics when it runs in aggressive mode?
Correct Answer: A
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? (Choose four)
A. EVC infrastructure is a Layer 3 platform-independent routing architecture that supports IP over Ethernet services.
B. Ethernet flow point (EFP) is configured on the main interface.
C. Feature commands like MQC-based QoS policies can be specified.
D. EVC infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet services.
E. Each Ethernet flow point (EFP) matches a predefined VLAN tag-based criteria. F. Ethernet flow point (EFP) is configured on the VLAN interface.
Correct Answer: BDEF
What does RPL stand for?
A. routing primary language
B. routing policy language
C. routing police language
D. routing program language
E. routing protocol language
Correct Answer: B
What three major tasks are performed by a Designated Intermediate System in an ISIS pseudonode environment? (Choose three.)
A. Updating the pseudonode LSP
B. maintaining pseudonode link-state information
C. creating the pseudonode
D. flooding LSPs over the LAN
E. election of the pseudonode
Correct Answer: ACE
What is the data encapsulation method for the VPLS virtual circuit (VC)?
A. MAC over MPLS
C. 802.1 QinQ
D. Ethernet over MPLS
Correct Answer: D
Ensurepass offers Latest 2013 CCIE 350-029 Real Exam Questions , help you to pass exam 100%.