2014年9月7日 星期日

CCIE SP 350-029 Question 121-150

CCIE SP Written Exam (Version 3.0)



Number: 350-029
Passing Score: 790
Time Limit: 120 min
File Version: 421Q+69




QUESTION 121
Select the two answers that best describe the IP Event Dampening featurE.
A. The IP Event Dampening uses exponential decay mechanism to suppress the effects of excessive interface flapping
B. BGP Operators use IP Event Dampening to suppress the effect of unstable internet Routes
C. The IP Event Dampening works with routing protocols by stopping the announcement of dampened Interface subnets in their updates
D. When IP Event Dampened internet routes reach their re-use limit, BGP installs them in the Routing Table and announces them to other BGP speakers












Correct Answer: AC




QUESTION 122Refer to the exhibit.
Which Cisco IOS feature does this algorithm illustrate?
A. OSPF exponential back-off
B. IP event dampening
C. partial SPF
D. EIGRP DUAL
E. the Cisco MPLS traffic engineering path recalculation











Correct Answer: B





QUESTION 123
Which of the following events can NOT be tuned via router configuration to provide for faster convergence following a link failure?
A. Failure detection
B. IGP LSP/LSA origination
C. Per-hop flooding time of new link state
D. Number of hops that need to be notified of new link state
E. Failure reporting












Correct Answer: D




QUESTION 124
Which configuration prevents traffic that is sourced from the unique local address scope to be sent out of the link to the upstream service provider?
A. interface ethernet0/0 ipv6 traffic-filter NoULA out ! ipv6 access-list NoULA deny ipv6 FC00::/8 any permit ipv6 any any
B. interface ethernet0/0 ipv6 traffic-filter NoULA out ! ipv6 access-list NoULA deny ipv6 FC00::/7 any permit ipv6 any any
C. interface ethernet0/0 ipv6 access-group NoULA out ! ipv6 access-list NoULA deny ipv6 FC00::/8 any permit ipv6 any any
D. interface ethernet0/0 ipv6 access-group NoULA out ! ipv6 access-list NoULA deny ipv6 FC00::/7 any permit ipv6 any any











Correct Answer: B




QUESTION 125

The IPv6 address FE80::656:78FF:FE9A:BCDE is what type of address?
A. Site-local
B. Link-local
C. Multicast
D. None of the above










Correct Answer: B




QUESTION 126
Which option is not a valid method to assign the lowest-order 64-bit field of an IPv6 unicast address?
A. ARP
B. manual assignment
C. DHCPv6
D. auto-configured based on the 48-bit MAC address
E. auto-generated pseudo-random number










Correct Answer: A




QUESTION 127
When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise, which transition strategy works the best?
A. Deploy IPv6 at the Edges and tunnel Enterprise through the core
B. None of the above will work
C. Deploy IPv6 at Edges and Core at the same time for smooth transition
D. Deploy IPv6 at the core first and then move to Edges toward the end customer











Correct Answer: A





QUESTION 128
Which two statements about DS-Lite are true? (Choose two.)
A. IPv4 packets are carried over IPv6 tunnels to the LSN while IPv6 traffic is forwarded natively.
B. Ipv6 packets are carried over IPv4 tunnels to the LSN while IPv4 traffic is forwards natively.
C. The LSN performs NAT44 on private IPv4 source addresses.
D. DS-Lite does not perform any address translation.











Correct Answer: AC




QUESTION 129
Which two are characteristics of an IPv6 multicast address? (Choose two)
A. Is allocated from the unicast address space
B. Second octet contains a 4-bit multicast scope field
C. Starts with a prefix of FE80 to FEBF in hex
D. Last 64 bit contains the modified MAC address of the Ethernet interface
E. First (most significant) octet is FF in hex
F. Starts with a prefix of FECO to FEFF in hex

















Correct Answer: BE




QUESTION 130

What is the importance of using Virtual Output Queues on ingress Line Cards in a high-end router?
A. Increases forwarding performance
B. Simplifies configuration
C. Prevents head-of-line blocking
D. Uses less memory












Correct Answer: C




QUESTION 131
Which of the following is a correct arrangement of APS Action Requests in order of priority, with highest priority first?
A. Lookout of Protection, Forced Switch, SD, Manual Switch
B. SD, Lockout of Protection, Forced Switch, Manual Switch
C. Lockout of Protection, Manual Switch, SD, Forced Switch
D. Manual Switch, Forced Switch, Lockout of Protection, SD
E. Manual Switch, Lockout of Protection, Forced Switch, SD














Correct Answer: A




QUESTION 132
In which of the following lists of APS Action Requests is the priority correctly arranged from lowest to highest?
A. Wait-to-Restore, Manual Switch, Forced Switch, Lockout of Protection
B. Wait-to-Restore, Forced Switch, Manual Switch, Lockout of Protection.
C. Manual Switch, Wait-to-Restore, Lockout of Protection, Forced Switch.
D. Lockout of Protection, Forced Switch, Manual Switch, Wait-to-Restore

E. Lockout of Protection, Manual Switch, Forced Switch, Wait-to-Restore
F. Wait-to-Restore, Manual Switch, Lockout of Protection, Forced Switch















Correct Answer: A





QUESTION 133
SONET's three layers arE. (Choose three.)
A. DS1
B. Frame
C. Path
D. Line
E. Section











Correct Answer: CDE




QUESTION 134
For SONET ring switching, the 50ms switch time? (Choose two.)
A. lncludes the detection time
B. Applies to rings smaller than 1200km
C. Applies to rings smaller than 1000km
D. Includes up to 16 nodes












Correct Answer: BD




QUESTION 135
Which three are advantages of SONET? (Choose three)
A. Allows the transportation of all forms of traffic
B. Multiplexing is easy
C. Clocks do not need to be synchronized
D. Reduces network complexity and cost
E. Padding is not necessary and not permitted










Correct Answer: ABD




QUESTION 136
Which statement about standard STS-1 SONET framing is true?
A. 8 rows by 64 bytes
B. 6 rows by 64 bytes
C. 10 rows by 96 bytes
D. 8 rows by 128 bytes
E. 9 rows by 90 bytes











Correct Answer: E




QUESTION 137
Which two statements are true about DPT/RPR?
A. DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.

B. DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C. DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used to make best use of the Bandwidth.
D. In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream), thus
using both fibres concurrently to maximize bandwidth.












Correct Answer: AD




QUESTION 138
What does FRTP stand for?
A. Frame Relay Top Pseudowire
B. Frame Relay Traffic Pseudowire
C. Frame Relay Traffic Protocol
D. Frame Relay Traffic Policing












Correct Answer: D




QUESTION 139
Which two statements about spanning tree path cost are true? (Choose two.)
A. The path cost can be changed for an interface using the spanning-tree cost command.
B. The path cost can be changed for an interface using the stp path-cost command.
C. The STP default path cost depends on the interface speed.
D. The STP default path cost is similar for all interface.










Correct Answer: AC




QUESTION 140
Two islands of IPv6 networks that are running ISIS (IPv6 IGP) must be connected using a tunnel over an IPv4 network. Which tunneling method can be used to
achieve this goal?
A. GRE tunnels
B. automatic 6 to 4 tunnels
C. ISATAP tunnels
D. manual tunnels (RFC 2893)












Correct Answer: A




QUESTION 141
What are the default values for GRE tunnel keepalive time and number of retries?
A. 5 seconds and 3 retries
B. 10 seconds and 5 retries
C. 10 seconds and 3 retries
D. 20 seconds and 5 retries
E. 5 seconds and 5 retries


















Correct Answer: C




QUESTION 142

Refer to the exhibit.


Which two configurations are shown? (Choose two)
A. L2TP tunnel configuration
B. GRE tunnel configuration
C. IPsec tunnel configuration

D. tunnel keepalive mechanism configuration












Correct Answer: BD




QUESTION 143
An architecture that utilizes PPPoE deals with IP address allocation by what type of negotiation?
A. NIS
B. IPCP
C. RADIUS
D. LDAP













Correct Answer: B




QUESTION 144
Which three are the ATM cell header fields? (Choose three.)
A. cell loss priority (CLP)
B. discard eligibility (DE)
C. head error control (HEC)
D. generic flow control (GFC)
E. forward explicit congestion notification (FECN)












Correct Answer: ACD




QUESTION 145
Pick the 4 valid ATM Cell Header fields:
A. GFC-4 bits of generic flow control
B. Forward-explicit congestion notification(FECN)
C. VCI-16 bits of virtual channel identifier
D. CLP-1 bit of congestion loss
E. HEC-8 bit of header error control
F. ATM Discard Eligibility(DE) bit










Correct Answer: ACDE




QUESTION 146
What is the default maximum transmission unit on the Cisco router ATM interface?
A. 4470 bytes
B. 1516 bytes
C. 9288 bytes
D. 1500 bytes
E. 1492 bytes











Correct Answer: A




QUESTION 147
Which statement about ATM AAL5 over MPLS is true?
A. It supports ATM signaling.

B. It supports traffic shaping of packets in MPLS to the ATM path.
C. It supports ATM switched virtual circuits
D. It supports fragmentation and reassembly.
E. It supports AAL5 SDU switching.










Correct Answer: E




QUESTION 148
Which type of AAL does ATM utilize to deliver CBR traffic?
A. AAL2
B. AAL4
C. AAL5
D. AAL1
E. AAL3











Correct Answer: D



QUESTION 149
What are three common reasons for ATM CRC errors? (Choose three.)
A. Incorrect VPI and VCI configuration
B. Noise, gain hits, or other transmission problems on the data link equipment
C. ATM cells are dropped due to incorrect ATM routing in the service provider.
D. A faulty or failing ATM interface.
E. Cells are dropped due to traffic policing in the ATM cloud on one or more virtual circuits attached to the ATM interface.










Correct Answer: BDE




QUESTION 150
Select the three best answers which best describe Private Network-to Network Interface (PNNI) in an ATM network (Choose three.)
A. It is the Routing protocol used between ATM switches
B. PNNI uses the same Dijsktra algorithm for SPF calculation
C. PNNI and OSPF use the same Database to make cohesive decision for packet forwarding
D. PNNI measures line capacities and delays in addition to simple cost metrics







Correct Answer: ABD








沒有留言:

張貼留言