Which statement about Remotely Triggered Black Hole (RTBH) is true?
A. Route tagging is one of the techniques used by RTBH
B. It is used for BGP authentication
C. It cannot work with static routes
D. It uses extended ACLs for blocking attacks by creating a black hole
E. Before configuring RTBH. LDP must be enabled on the interface
Correct Answer: A
In the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DIS
A. highest router ID first, then highest priority
B. highest MAC address first, then highest priority
C. highest router ID first, then highest MAC address
D. highest priority first, then highest router ID
E. highest priority first, then highest MAC address
Correct Answer: E
Which two implementations are standard Virtual Private LAN Service (VPLS) implementations that are supported by the IETF? (Choose two)
A. VPLS uses LDP for signaling.
B. VPLS uses BGP for autodiscovery and signaling.
C. VPLS uses extended IS-IS for signaling
D. VPLS uses OSPF version 3 for auto discovery and signaling
E. VPLS uses spanning tree for signaling
Correct Answer: AB
Which two statements about EIGRP are true? (Choose two)
A. EIGRP supports VLSM, route summarization, and routing update authentication.
B. If the feasible successor has a higher advertised distance than the successor route, it becomes the primary route.
C. Passive routes are in the process of being calculated by DUAL.
D. EIGRP exchanges full routing table information with neighboring routers with every update.
E. A query process is used to discover a replacement for a failed route if a feasible successor is not identified from the current routing information.
Correct Answer: AE
Which of following is used to periodically multicast by DIS on a LAN to ensure IS-IS link state database accuracy?
Correct Answer: D
Ensurepass offers Latest 2013 CCIE 350-029 Real Exam Questions , help you to pass exam 100%.