Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

If two queues complete for bandwidth in a hierarchical scheduler environment, which parameter is used by their parent scheduler to determine the priority with which each queue can use bandwidth above its committed rate?

A.

level

B.

cir-level

C.

weight

D.

cir-weight

Full Access
Question # 5

In which policies, on the Nokia 7750 SR. is classification performed? (Choose three)

A.

SAP-ingress policy

B.

SAP-egress policy

C.

IP-criteria policy

D.

Network-queue policy

E.

Slope policy

F.

Network policy

Full Access
Question # 6

Which of the following statements describe the primary objectives of the policing of traffic flows on the Nokia 7750 SR? (Choose two)

A.

Ensure that traffic flows conform to their traffic profile.

B.

Log violations of metered traffic flows exceeding the CIR value set on the entity across which the traffic is moving.

C.

Provide fairness between traffic flows, so that conforming (in-profile) traffic flows are not starved of bandwidth and/or buffer space by non-conforming (out-of-profile) flows.

D.

Minimize packet loss and reduce end to end latency.

E.

Ensure that variable latencies do not cluster short bursts of originally conforming packets and render them nonconforming.

Full Access
Question # 7

What is the maximum number of forwarding subclasses a forwarding class can have?

A.

3

B.

64

C.

72

D.

16

E.

56

Full Access
Question # 8

Which of the following statements describe the operation of WRED on the Nokia 7750 SR? (Choose three)

A.

WRED monitors the shared buffer space utilization over a period of time.

B.

WRED disables the TCP slow-start congestion control mechanism.

C.

WRED uses two configurable slopes for each buffer pool: a high slope and a low slope.

D.

WRED uses the shared buffer utilization, instead of the individual queue depth, to get a better picture of the average resource utilization of the shared buffer space.

E.

WRED polices the shared buffer pool and marks all packets above a certain rate as "discard eligible."

Full Access
Question # 9

In the image shown above, the SAP-ingress policy is applied properly to a Nokia 7750 SR. A packet is received from an IP address of 192.168.2.2 with DSCP set to AF. Which forwarding class and priority level is assigned to this packet?

A.

NC, low

B.

NC, high

C.

BE, low

D.

BE, high

Full Access
Question # 10

Which of the following statements about CIR of a queue is TRUE?

A.

It may exceed PIR of the queue.

B.

It may be exceeded by the average servicing rate of the queue.

C.

It varies depending on the traffic characteristics.

D.

It is the rate at which packets are forwarded out of the queue.

Full Access
Question # 11

According to the configurations shown, which of the following statements about the classification and queuing of self-generated OSPF traffic is TRUE?

A.

It will be classified into forwarding class BE and stored in queue 1.

B.

It will be classified into forwarding class BE and stored in queue 8.

C.

It will be classified into forwarding class NC and stored in queue 1.

D.

It will be classified into forwarding class NC and stored in queue 8.

Full Access
Question # 12

If traffic is destined to queue 5, which has a high-priority-only value of 0 in the network-queue policy, all out-of-profile packets will be dropped.

A.

TRUE

B.

FALSE

Full Access
Question # 13

While deciding how to share the available bandwidth among its children, when does a port scheduler consider the parameter “level” of a child?

A.

During the allocation of within-CIR bandwidth.

B.

During the allocation of above-CIR bandwidth.

C.

During the allocation of both within-CIR and above-CIR bandwidth.

D.

The port scheduler does not use the level of a child for making bandwidth allocation decisions

Full Access
Question # 14

What type of unwanted packet drops can the proper configuration of a queue’s burst-limit parameter prevent?

A.

Packet drops in the local queue resulting from traffic congestion.

B.

Packet drops on the downstream nodes resulting from traffic congestion.

C.

Packet drops in the local queue resulting from traffic bursts.

D.

Packet drops on the downstream nodes resulting from traffic bursts.

Full Access
Question # 15

Which of the following modules has 768 MB of buffer memory that dynamically allocates between its two MDAs?

A.

IOM3

B.

FP3 based IMM

C.

IOM1

D.

IOM2

Full Access
Question # 16

It is necessary for Tier 1 schedulers to obtain bandwidth from a higher tier scheduler.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Click the exhibit button below. Given that the slope-policy (below) has been enabled and applied on a network port, which of the following statements are TRUE? (Choose three)

A.

All out-of-profile traffic will be dropped before any in-profile is dropped.

B.

The time average factor of 0 will discard all packets arriving in the shared buffer pool.

C.

When the shared buffer utilization reaches 51%, in-profile packets might be dropped.

D.

The highest probability with which an out-of-profile packet can be dropped is 20%.

E.

When an in-profile packet arrives and the shared buffer utilization is at 69%, the packet will have approximately a 60% likelihood of being discarded.

Full Access
Question # 18

Which of the following statements BEST describes the IntServ model?

A.

Has the ability to distinguish traffic in 32 different ways.

B.

Uses the RSVP protocol to create microflows through a network.

C.

Has the ability to manually configure foiwarding classes through a network.

D.

Uses the RSVP protocol to create macroflows through a network.

Full Access
Question # 19

The SAP-ingress policy shown below is applied properly to a Nokia 7750 SR. A traffic stream is received from an IP address of 192.168.2.200 with DSCP and dot1p set to EF and 4, respectively. Which forwarding class and priority level is used for this traffic stream?

A.

FC H1, high

B.

FCH1, low

C.

FCAF, high

D.

FCAF, low

Full Access
Question # 20

Click the exhibit button below. A network operator has configured the SAP-ingress policy below. Ping traffic is expected in queue 3. However, the network operator notices that all traffic is placed in queue 1. What is the most probable reason for this?

A.

The default forwarding class for all traffic, including ICMP, is BE, which is placed in queue 1.

B.

The SAP has been shut down.

C.

The IP-match criteria has been misconfigured for ICMP traffic.

D.

Queue 3 has no rate or CIR configured and thus cannot hold any packets.

E.

The SAP-ingress policy has not been applied to the SAP.

Full Access
Question # 21

At which points can traffic be marked or remarked on the Nokia 7750? (Choose two)

A.

SAP-ingress only

B.

SAP-egress only

C.

SAP-ingress and SAP-egress

D.

Network ingress

E.

Network egress

Full Access
Question # 22

Which of the following statements regarding the default scheduler in the Nokia 7750 SR are TRUE? (Choose two)

A.

There are a maximum of 8 levels of priority serviced using a round-robin algorithm.

B.

The default scheduler will spend an equal amount of time in each queue, as long as there is traffic present

C.

The H1 internal forwarding class will receive its CIR before AF traffic.

D.

Orphaned queues will be scheduled out of the BE queue.

E.

A queue servicing EF and AF traffic will require explicit configuration to set the queue to expedited.

Full Access
Question # 23

Which of the following statements about network QoS policies is FALSE?

A.

Classification rules must specify both an FC and a profile for the packets.

B.

A network policy is applied at a physical port.

C.

Classification is performed with behavior-aggregate statements only.

D.

Match criteria can be chosen from dot1p, DSCP, and EXP fields in the packet.

Full Access
Question # 24

Which of the following is an advantage of using queue-groups on a service SAP?

A.

It enables CFHP.

B.

It more scalable than using policers.

C.

It allows a separate set of queues/policers for each VLAN on a port.

D.

It allows a set of queues to be shared among multiple SAPs.

Full Access
Question # 25

Real-time rate limiting on the service ingress is a feature that performs_____________. Traffic above the defined PIR is ______________.

A.

Policing, expedited

B.

Metering, marked discard eligible

C.

Marking, marked discard eligible

D.

Policing, discarded

E.

Shaping, discarded

Full Access
Question # 26

What is the 6-bit binary representation of DSCP value AF21?

A.

010011

B.

100010

C.

010001

D.

001100

E.

010010

Full Access
Question # 27

According to the SAP-ingress QoS policy shown, which of the following statements about processing of the packets by policers 3 and 4 is TRUE?

A.

Policer 3 forwards packets as out-of-profile when its PIR bucket has 4000 tokens.

B.

Policer 3 starts discarding low-priority packets when its PIR bucket has at least 3000 tokens.

C.

Policer 4 forwards all its packets as out-of-profile.

D.

Policer 4 starts discarding low-priority packets when its PIR bucket has at least 3000 tokens.

Full Access
Question # 28

On the Nokia 7750 SR, how many queues per FC are available for multipoint traffic within a VPLS on service ingress?

A.

64

B.

8

C.

3

D.

16

E.

1

Full Access
Question # 29

If a packet is marked on a SAP-ingress, it will be remarked at the first network egress point (if remarking is enabled in the network egress policy).

A.

TRUE

B.

FALSE

Full Access
Question # 30

Which of the following statements is considered best practice when changing a network policy that has been associated with an interface?

A.

The policy should be placed in a "shutdown" state before changes are made.

B.

A new network policy should be created and applied to the interface, overwriting the previous policy.

C.

The policy must first be removed from the interface, then modified and re-applied to the interface.

D.

Before the policy can be changed, it must be deleted with the no network qos command.

E.

Before any changes are made to the policy, all network interfaces where the policy is applied have to be shut down.

Full Access
Question # 31

Click the exhibit button below. A network operator has configured a network-queue policy to map forwarding classes to queues, as shown in the exhibit below. Based on the default scheduling behavior of the Nokia 7750 SR, in which order will packets be serviced?

A.

All in-profile packets in round-robin, then all out-of-profile packets in biased round-robin.

B.

In-profile EF packets, then in-profile H2 packets, then in-profile AF packets, then out-of-profile EF packets, then out-of-profile H2 and AF packets, and then out-of-profile BE packets.

C.

In-profile EF, H2 and AF packets, then out-of-profile H2, AF and BE packets in biased round-robin.

D.

In-profile EF packets, then in-profile H2 and AF packets, then out-of-profile H2, AF and BE packets in biased round-robin.

E.

In-profile EF and H2 packets, then in-profile AF packets, then out-of-profile H2, AF and BE packets in biased round-robin.

Full Access
Question # 32

Why are the four QoS steps (classification, queuing, scheduling, and marking/remarking) executed twice for every packet entering a 7750 SR router?

A.

Once before going through each of the redundant switching fabrics.

B.

To protect against failure of either ingress or egress card.

C.

Once before going through the switching fabric, and once more before going onto the egress port.

D.

Once to decide if the packet is in-profile or out-of-profile, and once more to process the packet according to its profile.

Full Access
Question # 33

What is the maximum number of SAP-ingress policies that can be applied on a SAP?

A.

1

B.

2

C.

3

D.

4

E.

5

F.

8

Full Access
Question # 34

Click the exhibit button below. Given the scheduler-policy (below), how much bandwidth can the best-effort traffic receive (PIR and CIR) when the ingress rate of each queue is 10Mbps?

A.

PIR = 4Mbps. CIR = 1Mbps

B.

PIR = 1Mbps, CIR = 1 Mbps

C.

PIR = 10Mbps, CIR = 1Mbps

D.

PIR = 5Mbps, CIR = 1.25Mbps

E.

PIR = 1.25Mbps, CIR = 1.25Mbps

Full Access