Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When a physical port is configured for null encapsulation, many SAPs can be configured using that port.

A.

TRUE

B.

FALSE

Full Access
Question # 5

Which of the following tasks must be carried out before deleting an Epipe service? (Choose 4)

A.

Shut down all SAPs associated with the service.

B.

Shut down all SDPs associated with the service.

C.

Delete all SAPs and SDPs associated with the service.

D.

Shut down all physical ports that are bound to a SAP.

E.

Delete the Customer ID.

F.

Shut down the service.

Full Access
Question # 6

Which of the following about an E-pipe terminating on a VPLS is FALSE?

A.

The VC-IDs used between the E-pipe and VPLS must match.

B.

The E-pipe must maintain a MAC FDB in order to connect to the VPLS.

C.

The service ID of the E-pipe can be different from that of the VPLS.

D.

The service MTU of the VPLS and E-pipe must match.

Full Access
Question # 7

What command syntax would be used to create a new IES service with a service id of 5 and a customer id of 1000?

A.

configure ies 5 customer 1000 create

B.

configure router ies 5 customer 1000 create

C.

configure service ies 5 customer 1000 create

D.

configure router ies 5 customer 1000

Full Access
Question # 8

Which of the following prerequisites must you configure on a router to enable LDP-over-RSVP support? (Choose two)

A.

Configure the T-LDP peers for tunneling.

B.

Configure tunneled T-LDP sessions between PE routers.

C.

Enable Idp-over-rsvp in the IGP configuration on the PEs and ABRs

D.

Enable LSP stitching on the RSVP LSPs

Full Access
Question # 9

What is the significance of receiving a packet with the bottom MPLS label S bit set to 1?

A.

It results in forwarding based on the next packet header.

B.

It indicates that the label is the bottom of the MPLS label stack.

C.

It indicates that the label is the top of the MPLS label stack.

D.

Any LSR that receives an S bit set to 1 must discard the packet.

Full Access
Question # 10

An IS-IS router receives a CSNP that references an older LSP than the one in its database. What action is taken?

A.

The router sends a copy of the LSP from its database to its neighbor.

B.

The router sends a PSNP to its neighbor describing the LSP in its database.

C.

The router updates its database with the LSP and floods a copy to its other neighbors.

D.

The router sends a PSNP to its neighbor to request the LSP.

Full Access
Question # 11

Which of the following are top level TLV types defined for OSPF-TE? Choose two answers.

A.

Router address

B.

Traffic engineering metric

C.

Maximum bandwidth

D.

Link

E.

Admin Group

Full Access
Question # 12

What is the primary purpose of variable length subnet masks (VLSM)?

A.

To reduce the size of each routing update.

B.

To allow interoperability between routing protocols.

C.

To allow different subnet masks for different subnets.

D.

To reduce the size of the routing table.

Full Access
Question # 13

The solicited node address for the destination node address of 2001:DB8::30A:216 4DFF:FE14:6CAE is:

A.

2001::FF:FE:14:6CAE

B.

2001::1:FF:14:6CAE

C.

FF02.DB8::30A:216:4DFF:FE14.6CAE

D.

FF02::1:FF14:6CAE

Full Access
Question # 14

Which of the following commands may only be used on the head end router to verify the status of an LSP named "LSP 1"? (Choose two)

A.

show router mpls Isp "LSP 1" originate

B.

show router mpls Isp "LSP 1" path detail

C.

show router rsvp session originate

D.

show router rsvp session "LSP 1"

Full Access
Question # 15

Click on the exhibit button below.

Given the following fast reroute protected LSPs:

-LSP1.R1-R4-R5-R3

-LSP2.R1-R4-R5-R2

Which routers become bypass tunnel PLRs? Choose two answers

A.

Router R1

B.

Router R2

C.

Router R3

D.

Router R4

E.

Router R5

Full Access
Question # 16

Which of the following is described by the following statement? An LSR propagates a label mapping only for an FEC for which it has a label mapping for the FEC next-hop.

A.

Independent control mode.

B.

Ordered control mode.

C.

Liberal label retention.

D.

Conservative label retention.

E.

Downstream on demand

Full Access
Question # 17

Which of the following is a feature of a black-hole static route?

A.

It discards packets based on the source address.

B.

It discards packets that match the destination prefix.

C.

It returns ICMP unreachable messages.

D.

It discards packets based on the egress port.

Full Access
Question # 18

Click on the exhibit.

192.168.3.1 is a loopback interface on router R2 and is distributed to OSPF area 0, but the ping fails from router R3. Which of the following is a possible solution to the problem?

A.

Add "stub no summaries" to the area 1 configuration on router R1.

B.

Add the "originate-default-route" option in the area 1 configuration on router R1.

C.

Add a default static route on router R3.

D.

Include the system interface in the area 1 configuration on router R3.

E.

Add a static route on router R3 to 192.168.3.1.

Full Access
Question # 19

Which OSPFv3 LSA advertises the location of an ASBR?

A.

Intra-Area Prefix LSA

B.

Inter-Area Prefix LSA

C.

Inter-Area Router LSA

D.

AS External LSA

Full Access
Question # 20

True or False? MPLS may use an existing data link layer header field to identify a label, instead of using a specific MPLS header

A.

TRUE

B.

FALSE

Full Access
Question # 21

Which of the following about IS-IS is FALSE?

A.

IS-IS uses the concept of Level 1 and Level 2 routers to implement hierarchy.

B.

An IS-IS router belongs to one or more areas.

C.

All Level 2 routers belong to the same area.

D.

A Level 1 router forwards traffic to other areas through the nearest Level 1/2 router.

Full Access
Question # 22

Which of the following is NOT a characteristic of a floating static route?

A.

The primary and backup routes are to the same destination.

B.

The primary and backup routes appear in the routing table.

C.

The backup route is configured with a higher preference value.

D.

The next-hop of the primary and backup routes are different.

Full Access
Question # 23

Click on the exhibit button below.

With fast reroute enabled, and given the following:

  • Two protected LSPs with the path R1-R2-R3
  • Both LSPs enable facility bypass and link protection.

When router R1 is the PLR, which router becomes the MP?

A.

Router R1

B.

Router R2

C.

Router R3

D.

Router R4

E.

Router R5

Full Access
Question # 24

Click on the exhibit.

What value would be expected in the state field?

A.

Exchange

B.

Up

C.

Down

D.

2-Way

Full Access
Question # 25

Which of the following best describes a MAC FDB used by a VPLS service?

A.

A VPLS service does not use a MAC FDB.

B.

A single MAC FDB is shared by all VPLS services on a PE.

C.

A separate MAC FDB is used on the PE for each VPLS service.

D.

Each VPLS service uses a separate MAC FDBs for unicast and multicast traffic.

Full Access
Question # 26

All services mapped to an SDP use the same transport encapsulation type (either GRE or MPLS)

A.

TRUE

B.

FALSE

Full Access
Question # 27

If the Alcatel-Lucent 7750 SR is rebooted after an "admin save'' has been performed, which of the following about mirror services is TRUE?

A.

Only the mirror source must be re-configured.

B.

Only the mirror destination must be re-configured.

C.

Both the mirror destination and mirror source must be re-configured.

D.

Neither the mirror destination nor the mirror source must be re-configured.

Full Access
Question # 28

When IS-IS elects a DIS, what is used as the tie breaker on an Alcatel-Lucent 7750 SR, if the priorities are the same?

A.

The system ID.

B.

The loopback address.

C.

The sequence number of the Hello packet.

D.

The device that first initiated communication becomes the DIS

E.

The highest interface MAC address.

Full Access
Question # 29

Click the exhibit button.

Given the topology and the route-tables shown, which of the following is most likely to be the configuration on router R1?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

Click the exhibit button.

Which of the following statements best describes the format of data traffic sent from the PC to the server?

A.

The source IP address will be the address of the PC, and the destination IP address will be the system IP address of router R1; the source MAC address will be the MAC address of the PC, and the destination MAC address will be the MAC address of the router R1 port connected to the PC.

B.

The source IP address will be the address of the PC, and the destination IP address will be the IP address of the router R1 port connected to the PC, the source MAC address will be the MAC address of the PC, and the destination MAC address will be the MAC address of the router R1 port connected to the PC.

C.

The source IP address will be the address of the PC, and the destination IP address will be the IP address of the server, the source MAC address will be the MAC address of the PC, and the destination MAC address will be the MAC address of the server.

D.

The source IP address will be the address of the PC, and the destination IP address will be the IP address of the server; the source MAC address will be the MAC address of the PC, and the destination MAC address will be the MAC address of the router R1 port connected to the PC.

Full Access
Question # 31

Refer to the exhibit.

Assume that OSPFv3 is properly configured on all routers and that R4 advertises its system prefix into Area 0. Which of the following statements best describes how R5 learns R4's IPv6 system prefix?

A.

With a Router LSA originated by R1

B.

With a Router LSA originated by R5

C.

With a Router LSA originated by R4

D.

With an Inter-Area Prefix LSA originated by R1

E.

With an Inter-Area Prefix LSA originated by R5

F.

With an Inter-Area Prefix LSA originated by R4

Full Access
Question # 32

The Alcatel-Lucent 7750 SR supports which two of the OSPF area types below?

A.

Not So Stubby Areas

B.

Level 1 Areas

C.

Stub Areas

D.

Partially Stubby Areas

Full Access
Question # 33

What command will show the IS-IS neighbors, and their status on an Alcatel-Lucent 7750 SR?

A.

Show isis neighbors

B.

Show router isis neighbors

C.

Show router isis adjacency

D.

Show isis adjacency

Full Access
Question # 34

Identify two attributes of Distance Vector Protocols: (Choose two)

A.

Use split horizon by default.

B.

Send information about directly connected links to neighbors at periodic intervals.

C.

Use holddown timers when topologies change to allow for convergence.

D.

Maintain multiple databases: neighbor, topology and routing.

Full Access
Question # 35

Which of the following statements regarding distance vectors protocols are true?

(Choose two answers).

A.

RIPv1, RIPv2, and BGP are distance vector protocols.

B.

OSPF and IS-IS are distance vector protocols.

C.

Routing tables are exchanged between neighbors; however, no routing table is transmitted beyond the immediate neighbor.

D.

Distance vector protocols use the Dijkstra SPF algorithm.

E.

Routers that participate in distance vector routing protocols maintain full knowledge of distant routers and how they interconnect

Full Access
Question # 36

Which of the following cannot be used as a matching criterion in route policy statements?

A.

Source IP address

B.

TCP source port

C.

Prefix list

D.

Protocol type

Full Access
Question # 37

Which of the following statements regarding area border routers in an OSPF network is true?

A.

The term backbone router has the same definition as the term area border router.

B.

An OSPF network needs at least one area border router to function.

C.

Area border routers connect the backbone area to other areas in an OSPF network.

D.

By definition, an area border router must perform route summarization between areas.

Full Access
Question # 38

When a router receives an IP packet, but does not find a match in the routing table for the destination IP address, what actions are performed by the router?

A.

The packet is flooded out all router interfaces.

B.

The packet is dropped and an ICMP unreachable message is sent back to the source.

C.

The packet is silently discarded.

D.

The packet is flooded out all interfaces and an ICMP unreachable message is sent.

Full Access
Question # 39

Which of the following types of networks are supported on an Alcatel-Lucent 7750 SR for OSPF? Choose two answers.

A.

Broadcast

B.

Non-broadcast multi-access

C.

Point-to-point

D.

Point-to-multipoint

Full Access
Question # 40

Refer to the exhibit below. IS-IS IPv6 routing is configured in the network with globally routed addresses as shown. How many routes will R4 have in its IPv6 route table?

A.

1

B.

2

C.

3

D.

4

E.

6

F.

7

Full Access
Question # 41

Click the exhibit button.

Given the diagram in the exhibit, what would be the correct static route configuration on the router on the right, if it is an Alcatel-Lucent 7750 SR?

A.

config> static-route 0.0.0.0/0 next-hop 10.1.2.2

B.

config>router> static-route 0.0.0.0 255.255.255.255 next-hop 10.1.2.1

C.

config>router> static-route 0.0.0.0/0 next-hop 10.1.2.2

D.

config>router> static-route 0 0.0 0/0 next-hop 10.1.2.1

Full Access
Question # 42

There is an IP host with IP address 10.2.3.1. A static route is created, using the "configure router static-route 10.2.3.0/24 next-hop 10.1.2.1" command. What is the correct traceroute command to test this static route on an Alcatel-Lucent 7750 SR?

A.

traceroute 10.2.3.1

B.

traceroute 10.2.3.1 next-hop 10.1.2.1

C.

traceroute next-hop 10.1.2.1

D.

traceroute does not work on the Alcatel-Lucent 7750 SR.

E.

traceroute 10.1.2.1

Full Access
Question # 43

How are IS-IS LSPs sent on point-to-point links?

A.

They are sent using multicast MAC addresses 0180:0200:0014.

B.

They are sent using multicast MAC addresses 0180:c200:0015.

C.

They are sent using a unicast address.

D.

None of the above.

Full Access
Question # 44

Click on the exhibit.

This policy is applied on a router as an LDP export policy and an LDP session has been established between this router and its neighboring router. In addition to the FECs learned from its neighbors, what additional FECs will appear in this router's LIB?

A.

All FECs that are in the 192.168.1.0/24 address space.

B.

Local FECs that are in the 192.168.1.0/24 address space.

C.

All FECs that are not in the 192.168.1.0/24 address space.

D.

All FECs except the local FECs that are in the 192.168.1.0/24 address space.

Full Access
Question # 45

Click on the exhibit.

An LSP's primary path takes R1-R3-R5-R6. Its fully loose secondary path is configured for SRLG. All links are of equal cost. Which path will the secondary path take?

A.

The secondary path will take R1-R3-R2-R4-R6.

B.

The secondary path will take R1-R2-R4-R6.

C.

The secondary path will take R1-R2-R3-R5-R6.

D.

The secondary path will take R1-R3-R2-R4-R5-R6.

Full Access
Question # 46

Click on the exhibit.

After the Isp-ping command is executed, which of the following best describe the router's action?

A.

MPLS Echo Request packets are sent unlabeled to the prefix 192.10.1.2.

B.

MPLS Echo Request packets are sent within the LDP tunnel that are signaled for 192.10.1.2.

C.

MPLS Echo Request packets are sent within the RSVP-TE tunnel that are signaled for 192.10.1.2.

D.

MPLS Echo Request packets are sent over TCP.

Full Access
Question # 47

Which of the following about the Link LDP discovery process on the Alcatel-Lucent 7750 SR is FALSE?

A.

LDP Hello messages are sent over TCP.

B.

LDP Hello messages are sent to the All Routers address 224.0.0.2.

C.

LDP Hello messages are exchanged between all directly connected LDP enabled routers.

D.

Each LDP enabled router must have its own unique system IP address.

Full Access
Question # 48

What labels are encapsulated in the tunnels used by a 6PE deployment?

A.

The inner label is the IPv4 Explicit Null. The outer label is the MPLS transport label,

B.

The inner label is an MPLS transport label. The outer label is the IPv4 Explicit Null.

C.

The inner label is the IPv6 Explicit Null. The outer label is an MPLS transport label.

D.

The inner label is an MPLS transport label. The outer label is the IPv6 Explicit Null.

Full Access
Question # 49

Which of the following about RSVP-TE on an Alcatel-Lucent 7750 SR is TRUE?

A.

Label bindings are distributed to other routers when explicitly requested.

B.

Label bindings are distributed to all neighbors including non-downstream routers.

C.

Label bindings are distributed if labels have not been received from downstream routers.

D.

All labels received from downstream neighbors are stored in the LIB.

Full Access
Question # 50

Which of the following about RSVP refresh reduction on a Alcatel-Lucent 7750 SR is FALSE?

A.

RSVP generates a summary refresh message for each LSP.

B.

Message-IDs replace individual refresh messages.

C.

An LSP state change causes the Message-ID to be incremented.

D.

RSVP refresh reduction is disabled by default.

Full Access
Question # 51

Which of the following statements is FALSE about the VPN label?

A.

The VPN label is signaled between PE devices using MP-BGP.

B.

The VPN label is swapped at each P router as a packet crosses the service provider network.

C.

The VPN label is also known as the inner label or service label.

D.

The VPN label indicates which VPRN a packet should be sent to once it reaches the egress PE.

E.

All of the above

F.

Only C and D.

Full Access
Question # 52

Click on the exhibit button below.

Which of the following is the correct configuration for an MP-BGP session on 6VPE1?

A.

PE1>config>router>bgp#info

--------------------------------------------

group "multi-bgp"

family vpn-ipv6

neighbor 10.10.10.2/32

local-address 10.10.10.1

peer-as 64496

exit

exit

B.

PE1>config>router>bgp#info

-------------------------------------------

group "multi-bgp"

family ipv6 vpn-ipv4

neighbor 10.10.10.2

local-address 10.10.10.1

peer-as 64496

exit

exit

C.

PE1>config>router>bgp#info

--------------------------------------------

group "multi-bgp"

family vpn-ipv6

neighbor 10.10.10 2

local-address 10.10.10.1

peer-as 64496

exit

exit

D.

PE1>config>router>bgp#info

--------------------------------------------

group "multi-bgp"

family ipv6 vpn-ipv6

neighbor 10.10.10.2/32

local-address 10.10.10.1

peer-as 64496

exit

exit

Full Access
Question # 53

Which of the following is NOT an application of MPLS?

A.

Enabling VPNs

B.

Enabling traffic engineering

C.

Enabling network security

D.

Enhancing network resiliency

Full Access
Question # 54

Click on the exhibit.

OSPF is operational on all links in the network diagram, all routers are the same cost, and all routers are configured with an ECMP value of 4. Router R5 advertises the prefix 192.168.3.0/24 into OSPF.

How many entries for prefix 192.168.3.0/24 will be in router R3's routing table?

A.

0

B.

1

C.

2

D.

3

E.

4

Full Access
Question # 55

Which of the following best describes distance vector protocols?

A.

They periodically exchange copies of routing tables between adjacent routers and do not maintain any knowledge of links on non adjacent routers.

B.

They use shortest path first algorithms, do not exchange copies of routing tables between routers and do maintain knowledge of links on non adjacent routers.

C.

They periodically exchange copies of routing tables between adjacent routers and maintain knowledge of links on non adjacent routers.

D.

They use shortest path first algorithms, exchange copies of routing tables between routers and maintain knowledge of links on non adjacent routers.

Full Access
Question # 56

Which of the following statements regarding the last two octets of the LDP identifier is true?

A.

It is always a random 16-bit number.

B.

It is always zero for per-interface label space.

C.

It is always non-zero.

D.

It is always zero for per-platform label space.

E.

It is always non-zero for per-platform label space.

Full Access
Question # 57

A static route needs to be configured with a next-hop that is NOT directly connected to the router. Which of the following must be TRUE?

A.

The router must also have an active static route to the next-hop specified in the static route command.

B.

The system address of the next-hop router must be included in the static route command.

C.

The command option "indirect" must be used in the static-route command.

D.

The system address of the router connected to the destination must be included in the static route command

Full Access
Question # 58

Click on the exhibit.

Given the contents of the Router LSA, which of the following best describes the local topology of the router?

A.

The router has a system interface, two point-to-point interfaces and one broadcast interface.

B.

The router has a system interface, two passive interfaces, two point-to-point interfaces and one broadcast interface.

C.

The router has a system interface, two point-to-point interfaces and one virtual link.

D.

The router has a system interface, two passive interfaces, two point-to-point interfaces and one virtual link.

Full Access
Question # 59

Click the exhibit.

Which tool produced this output?

A.

ping

B.

Isp-ping

C.

traceroute

D.

Isp-trace

Full Access
Question # 60

How many service labels must be signaled to bring up a fully-meshed VPLS among five PE routers?

A.

1

B.

5

C.

10

D.

20

Full Access
Question # 61

The SAP 1/1/1:2.3 receives an Ethernet frame with outer VLAN tag 2 and inner VLAN tag 5. Which of the following is TRUE?

A.

The matching outer tag is removed, and the frame is forwarded.

B.

The inner tag is removed, and the frame is forwarded.

C.

The inner tag is changed to match the SAP, and the frame is forwarded.

D.

The frame is dropped.

Full Access
Question # 62

Click the exhibit.

E-pipe 100 is using an SDP with an LSP that uses the path shown (PE1-PE2-PE3-PE4). Based on the OAM command output, which of the following is FALSE?

A.

The E-pipe can support a maximum MTU size of 1578.

B.

The ports of the link PE2-PE3 have an MTU of 1578.

C.

An svc-ping of the E-pipe will succeed.

D.

If the step size was 2, the maximum response size would be the same.

Full Access
Question # 63

Which service type is needed to bridge an ATM-attached user and an Ethernet-attached user?

A.

A-pipe

B.

F-pipe

C.

C-pipe

D.

E-pipe

Full Access
Question # 64

A CE is connected to an IES interface. Which of the following is TRUE?

A.

The IES's interface must be an IGP peer with the CE.

B.

The IES must use an IP address that is different than the C£.

C.

The IES can only include one SAP for the CE.

D.

The IES must include a network port.

Full Access
Question # 65

What is the minimum Ethernet physical network MTU required for a Layer 2 service on a GRE encapsulated SDP with a service MTU of 1514?

A.

1514

B.

1526

C.

1548

D.

1556

E.

1536

Full Access
Question # 66

Why must the MTU be changed when configuring an IES spoke termination to a VPLS?

A.

The default service MTU on a VPLS service is 1514 bytes.

B.

The default IP MTU of an IES is set based on the network port MTU.

C.

During VC label signaling, the VC MTU is verified and must match.

D.

All of the above.

Full Access
Question # 67

Which of the following statements best describes how an FDB is populated with MAC addresses in a VPLS service?

A.

A VPLS service does not use an FDB.

B.

The router reads the destination MAC address of packets passing through the service.

C.

The router reads the source MAC address of packets passing through the service.

D.

The router uses reverse ARP (RARP) to resolve the MAC addresses for unknown destinations.

E.

The router is programmed with MAC addresses by the network administrator.

Full Access
Question # 68

Click the exhibit.

E-pipe 100 is using an SDP (4) with an LSP that uses the path shown (PE1-PE2-PE3-PE4). Which of the following is the expected output from the OAM command?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 69

On a dot1Q encapsulated port, frames with a VLAN tag of 0 and untagged frames are forwarded to the null SAP

A.

TRUE

B.

FALSE

Full Access
Question # 70

An operator wishes to verify end-to-end connectivity for an individual service. What utility will he or she most likely use?

A.

sdp-ping

B.

Isp-ping

C.

svc-ping

D.

sdp-mtu

Full Access
Question # 71

Which of the following about VPRN VRF tables is FALSE?

A.

A PE uses the same VRF table for all the VPRN services on it.

B.

A PE uses a VRF to maintain forwarding information.

C.

Information for VRFs can be advertised between PEs by MP-BGP.

D.

A PE uses a VRF to route traffic to CEs.

Full Access
Question # 72

Which of the following about SAPs is TRUE?

A.

More than one SAP can be configured on a physical port that is configured for null encapsulation.

B.

Dot1Q Ethernet encapsulated access ports can support multiple SAPs and services.

C.

SAPs can be created on ports designated as "Network".

D.

SAPs can only be created on Ethernet ports.

Full Access
Question # 73

Which of the following SAPs will forward all tagged and untagged frames on the port?

A.

sap 1/1/1

B.

sap 1/1/1:*.0

C.

sap 1/1/1:0.*

D.

1/1/1:0

Full Access
Question # 74

What must be configured before a SAP can be created on an E-pipe?

A.

The Ethernet port must be set to network mode, and the service must have a spoke SDP.

B.

The Ethernet port must be set to network mode.

C.

The Ethernet port must be set to access mode.

D.

The Ethernet port must be set to access mode, and the service must have a spoke SDP.

Full Access
Question # 75

The SAP 1/1/1:2.3 receives an Ethernet frame with outer VLAN tag 5 and inner VLAN tag 3. Which of the following is TRUE?

A.

The frame is dropped.

B.

The frame's outer tag is changed to match the SAP, and it is accepted.

C.

The frames outer tag is dropped, and the frame is accepted.

D.

The frame's tags are removed, and the frame is accepted.

Full Access
Question # 76

Which of the following fields is NOT present in a GRE encapsulated VPN service packet?

A.

DLC Header

B.

Control Word

C.

Transport Label

D.

Service Label

Full Access
Question # 77

Which of the following statements best describes the flooding of traffic on a PE when traffic is received on a mesh SDP?

A.

Traffic is flooded to all SAPs in the service.

B.

Traffic is flooded to all SAPs and spoke SDPs in the service.

C.

Traffic is flooded to all SAPs and mesh SDPs in the service.

D.

Traffic is flooded to all SAPs, spoke SDPs. and mesh SDPs in the service.

E.

The traffic is not flooded.

Full Access
Question # 78

Which of the following can be used to detect the smallest path MTU in an RSVP signaled MPLS tunnel?

A.

ADSPEC

B.

CSPF

C.

Service ping

D.

LSP trace

Full Access
Question # 79

Which of the following are characteristics of an IES service? (Choose 2)

A.

A virtual routing/forwarding table is created per IES service.

B.

Only one IES service can be created for a single customer ID.

C.

More than one IP interface can be created within a single IES service.

D.

All IP interfaces created within the same IES service belong to the same customer

Full Access
Question # 80

Click the exhibit.

An operator at PE1 wants to analyze the traffic between CE1 and PE1 on SAP 1/1/3, On an Alcatel-Lucent 7750 SR, which of the following is NOT required as part of the configuration?

A.

A mirror source with a defined source type.

B.

A mirror source defined with an SDP destination.

C.

A mirror destination with a SAP defined.

D.

A mirror destination and a mirror source with the same service ID.

Full Access
Question # 81

On which component is vc-type configured to create an E-pipe service that preserves the VLAN tag during transport?

A.

The SDP itself (outside of the epipe context).

B.

The SAP in the E-pipe.

C.

The mesh SDP in the E-pipe.

D.

The spoke SDP in the E-pipe.

Full Access
Question # 82

Which of the following about VPLS MAC learning is FALSE?

A.

The PE routers of the service are responsible for learning MAC addresses.

B.

Flooding ensures that all PEs in a fully-meshed VPLS will learn the source address of all traffic.

C.

MAC learning reduces flooding of frames with previously learned addresses.

D.

Multiple VPLSes on the same PE share the same MAC FDB.

Full Access
Question # 83

Click the exhibit.

Part of a 6VPE deployment is shown in this exhibit. Which of the following is the correct configuration and context on PE1 for a BGP peering session with CE1?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 84

Click on the exhibit.

A fully loose LSP MtoR6" is enabled with FRR protection. All links have the same cost. After the link between R2 and R4 goes down, FRR protection repairs the LSP and traffic traverses on R1-R2-R7-R8-R4-R6. By default, which of the following about this LSP on an Alcatel-Lucent 7750 SR is FALSE?

A.

The LSP will switch to R1-R3-R5-R6 after the resignal timer expires.

B.

The old primary path and its detours are torn down after the new primary path is established.

C.

CSPF must be enabled to find a more optimal path.

D.

The traffic is switched to R1-R3-R5-R6 in an MBB fashion.

Full Access
Question # 85

Which of the following regarding the IS-IS PSNP is FALSE?

A.

PSNPs are used on point-to-point links to acknowledge the receipt of an LSP.

B.

There are three types of PSNPs: Level 1, Level 2, and Level 1/2.

C.

A PSNP lists some of the LSPs in the router's database.

D.

PSNPs are used by an IS-IS router to request LSP information from a neighboring router.

Full Access
Question # 86

Click on the exhibit button below.

If the four LSPs shown use the shared-explicit reservation style, how much bandwidth does CSPF request across a single 1Gbps link?

A.

100Mbps

B.

200Mbps

C.

300Mpbs

D.

600Mbps

E.

700Mbps

Full Access
Question # 87

Which one of the following statements regarding the detour object transported in the detour path message is true?

A.

The PLR sends it downstream with the RRO.

B.

The PLR sends it downstream with the ERO.

C.

It associates all detours with the source PLR.

D.

The MP sends it upstream with the RESV message.

Full Access
Question # 88

Which of the following statements regarding RSVP refresh reduction are true1? (Choose two)

A.

Message-IDs replace individual refresh messages.

B.

Refresh reduction applies only to reservation messages.

C.

RSVP generates a summary-refresh message for each LSP.

D.

An LSP state change causes an incremented Message-ID.

Full Access
Question # 89

How have Traffic Engineering extensions to IS-IS been implemented?

A.

By defining new LSAs for the IS-IS protocol.

B.

By utilizing the OSPF opaque LSAs to maintain interoperability with OSPF routing domains

C.

By defining new TE extension TLVs to the IS-IS protocol.

D.

By enabling CSPF algorithm extensions that allow link state TE to be implemented.

Full Access
Question # 90

An OSPF adjacency is stuck in the exstart state. What is the most likely cause?

A.

The MTU does not match on both interfaces.

B.

OSPF is not enabled on one of the routers.

C.

The router ID is the same on both routers.

D.

An OSPF Hello has not been received from the neighbor.

E.

The interfaces are configured as point-to-point on one side and broadcast on the other.

Full Access
Question # 91

When configuring RSVP-TE for transport tunnels, which command enables RSVP by default?

A.

configure router tunnel

B.

configure router gre

C.

configure router rsvp-te

D.

configure router transport-tunnel

E.

configure router mpls

Full Access
Question # 92

Which of the following about LDP sessions is TRUE?

A.

Frame mode requires multiple sessions between peers.

B.

The lower transport address initiates the session.

C.

Established LDP sessions run over a TCP connection.

D.

An LDP session is established immediately after Init messages are exchanged between peers.

Full Access
Question # 93

Click on the exhibit.

LSP 1's link between routers R3 and R6 has failed, and the RESV state at router R3 has timed out. Which of the following actions will router R3 initiate?

A.

Send a PathTear message towards router R6.

B.

Send a PathTear message towards router R1.

C.

Send a ResvTear message toward router R6.

D.

Send a ResvTear message toward router R1.

Full Access
Question # 94

What distinguishes a VPLS service from a VPWS service?

A.

VPLS supports point-to-point connections.

B.

VPLS supports multipoint-to-multipoint connections

C.

VPLS supports a distributed service

D.

VPLS supports a local service on a single node.

Full Access
Question # 95

Which of the following statements regarding IS-IS LSPs is true?

A.

There are three types of LSPs: L1, L2 and L1/L2.

B.

An LSP packet contains the ATT bits and the IS-type bits.

C.

The lower the LSP sequence number, the more current the update.

D.

Separate databases are maintained for L1 „ L2, and L1/L2 LSPs.

Full Access
Question # 96

What is the default priority value used for electing the DR on an Alcatel-Lucent 7750 SR running OSPF on an Ethernet?

A.

Priority of 0

B.

Priority of 1

C.

Priority of 64

D.

Priority of 255

Full Access
Question # 97

Click the exhibit button.

What can you deduce from the show command on router R6?

A.

The router R6 interface is in a multi-access segment. It is neither the DR nor the BDR for the segment. The DR for this segment would be the router with router ID 10.10.10.5.

B.

The router R6 interface is in a multi-access segment. It is neither the DR nor the BDR for the segment; however, this command does not indicate whether 10.10.10.3 or 10.10.10.5 is the DR or BDR.

C.

The router R6 interface is in a multi-access segment. It is the BDR, which is why it is not adjacent to the other routers.

D.

The router R6 interface is in a multi-access segment. It is neither the DR nor the BDR for the segment. The DR for this segment would be the router with router ID 10.10.10.3.

Full Access
Question # 98

Click the exhibit button.

Two neighboring OSPF routers have exchanged the packets shown. What state is the adjacency in?

A.

Full; both routers are exchanging Helios to maintain the adjacency.

B.

The adjacency is down.

C.

The adjacency is in exstart state.

D.

The adjacency is in the exchange state.

Full Access
Question # 99

In which of the following types of areas does an OSPF router not set the E bit in its Type 1 LSA?

A.

Not so stubby area

B.

Stub area

C.

Backbone area

D.

Normal area

Full Access
Question # 100

If routers R1 and R2 have a Level 1 and Level 2 IS-IS adjacency, which of the following statements are true? Choose two answers.

A.

Routers R1 and R2 are in different areas,

B.

Routers R1 and R2 are in the same area.

C.

Routers R1 and R2 will send a Level 1 Hello PDU and Level 2 Hello PDU, if the interface type between them is point-to-point.

D.

Routers R1 and R2 will send a Level 1 Hello PDU and Level 2 Hello PDU, if the interface type between them is broadcast.

E.

Routers R1 and R2 will send a Level 1/2 Hello PDU, if the interface type between them is broadcast.

Full Access
Question # 101

Static routing is to be used in a network between a corporate head office with many connected networks, and a branch office with one connection to the head office. Which of the following best describes the likely configuration?

A.

The corporate head office router should have a default route and the branch site should have a more specific static route

B.

The corporate head office router and the branch office router should both have specific static routes.

C.

The corporate head office router and the branch router should both have default routes.

D.

The corporate head office router should have a specific static route and the branch office router should have a default route.

Full Access
Question # 102

Which of the following routing protocols are supported on the Alcatel-Lucent 7750 SR to enable constraint-based LSPs? (Choose two)

A.

RIPv2-TE

B.

CSPF

C.

OSPF-TE

D.

ISIS-TE

E.

RSVP-TE

Full Access
Question # 103

The destination IP address of a received unlabeled packet is successfully matched in the FIB.

Which of the following is FALSE?

A.

A POP label stack operation may be performed.

B.

The outgoing interface and next-hop address will be determined from the FIB.

C.

The packet can be forwarded as a labeled or unlabeled packet.

D.

A PUSH label stack operation may be performed.

Full Access
Question # 104

Which of the following about IES is TRUE?

A.

An IES requires a spoke SDP.

B.

A virtual route table must be configured for an IES service.

C.

An IES service must use static routes to communicate with customer networks.

D.

An IES must have at least one SAP defined.

Full Access
Question # 105

A network consists of four PE routers. A customer requires a VPLS and has sites connected to each PE. The VPLS is fully meshed using IP/MPLS. How many SDPs must be configured on each PE?

A.

3

B.

4

C.

6

D.

8

Full Access
Question # 106

Which of the following SAPs will NOT forward untagged frames?

A.

sap 1/1/1

B.

sap 1/1/1:*

C.

sap 1/1/1:0

D.

sap 1/1/1:1

Full Access
Question # 107

Which protocol can be used to signal the outer label for a VPN service?

A.

IPCP

B.

LDP

C.

PPP

D.

TLDP

Full Access
Question # 108

Click the exhibit button.

What is the state of adjacency?

A.

Initializing

B.

Up

C.

Down

D.

2-Way

Full Access
Question # 109

Which of the following best describes downstream on demand label distribution?

A.

An LSR answers requests for label mappings immediately, without waiting for a label mapping from the next-hop.

B.

An LSR advertises label mappings to all peers for which it might be a next-hop for a given FEC.

C.

An LSR distributes a label mapping for a FEC when it has been requested to do so.

D.

An LSR propagates a label mapping downstream for a FEC. only if it has a label mapping for the FEC's next-hop.

Full Access
Question # 110

Click on the exhibit.

Which of the following about the bypass tunnel is FALSE?

A.

The router 10.10.10.1 is a PLR providing node protection for the router 10.10.10.3.

B.

One-to-one fast reroute protection is requested by an LSP.

C.

The bypass-link tunnel is used to avoid the link with the egress interface address 10.3.4.4.

D.

The bypass-node tunnel is used to avoid the next-hop downstream router 10.10.10.3.

Full Access
Question # 111

Which of the following steps is mandatory when enabling an MP-BGP session between PE routers in a VPRN?

A.

Configure an autonomous system number in the global context.

B.

Configure a BGP group and peer parameters.

C.

Configure a VPN-IPv4 address family.

D.

All of the above steps are mandatory.

E.

None of the above steps are mandatory.

Full Access
Question # 112

Which of the following statements is FALSE regarding 6VPE?

A.

6VPE is a tunneling technology that makes use of MPLS tunnels to transport IPv6 information over an IPv4 MPLS infrastructure.

B.

Customers connected to 6VPE could run native IPv6 or IPv4.

C.

On the PE router, the next hop for a VPN IPv6 address is an IPv6 address, regardless of the nature of the network between the PEs.

D.

6VPE requires an IPv6-aware MPLS core.

E.

Both C and D are false.

F.

All of the above statements are true.

Full Access
Question # 113

Facility fast reroute with node protection is enabled for an LSP, which of the following is FALSE?

A.

Each PLR signals a bypass tunnel that avoids the next-hop downstream router.

B.

When a failure occurs, the PLR pushs an additional label onto the label stack.

C.

No bypass tunnel is established if the PLR cannot provide node protection.

D.

The head-end router sets the local protection desired flag in the session attribute object.

Full Access
Question # 114

Which of the following about Fast Reroute link protection tunnels is FALSE?

A.

Link protection tunnels are established if a router is unable to establish node protection tunnels.

B.

Link protection tunnels are only requested for a primary LSP path.

C.

Link protection tunnels can be created for both one-to-one or facility Fast Reroute.

D.

Link protection tunnels detour around a failed next downstream router.

Full Access
Question # 115

When provisioning a spoke-SDP on an Epipe, what MUST match on both ends of the service?

A.

Service ID

B.

Customer ID

C.

SAPID

D.

VC-ID

E.

SDPID

Full Access
Question # 116

Click on the exhibit.

What is the possible reason that the label for prefix 192.10.1.2/32 is not active?

A.

The router does not have a route to reach to the peer 10.10.10.2/32.

B.

The router does not have a route to reach to the prefix 192.10.1.2/32.

C.

The router does not have an export policy defined to export the prefix 192.10.1.2/32 into LDP.

D.

The router receives an invalid label for the prefix 192.10.1.2/32 from its peer.

Full Access
Question # 117

Which of the following is NOT required to configure an Alcatel-Lucent 7750 SR as a PE router running 6PE?

A.

Configure BGP with the IPv6 address family.

B.

Configure BGP to add IPv6 Explicit Null labels.

C.

Configure a route policy to export IPv6 routes into BGP.

D.

Configure the nexthop core router as a BGP peer.

Full Access
Question # 118

Which tree in the CLI would you need to be in to add a QoS policy to a SAP?

A.

config>router#

B.

config>qos#

C.

config>port#

D.

config>service#

Full Access
Question # 119

Which of the following items can NOT be used as a mirror source?

A.

A physical port.

B.

ASAP.

C.

Ingress MPLS frames with a specific label.

D.

Entries that match an IP filter.

E.

Entries that match a MAC filter.

F.

All of the above can be used as a mirror source.

Full Access
Question # 120

Which MPLS label mode saves label mappings received from all peer LSRs?

A.

Conservative label retention

B.

Liberal label retention

C.

Downstream on demand

D.

Downstream unsolicited

Full Access
Question # 121

What is a key benefit of a VPLS service?

A.

The customer maintains complete control over routing.

B.

The adding of new sites is simplified; no re-configuration is required at existing sites.

C.

The clear demarcation of functionality between service provider and customer makes troubleshooting easier.

D.

All of the above.

Full Access
Question # 122

In an IP datagram, which of the following fields identifies the receiving application?

A.

The protocol field of the transport layer header.

B.

The port field of the transport layer header.

C.

The protocol field of the network layer header.

D.

The port field of the network layer address.

Full Access
Question # 123

What types of routers can an IS-IS L1 router form adjacencies with? Pick all that apply.

A.

L1 routers in the same area

B.

L1 routers in other areas

C.

L2 routers in the same area

D.

L2 routers in other areas

E.

L1/L2 router in the same area

F.

L1/L2 routers in other areas

Full Access
Question # 124

Which of the following describes the method used to resolve an IPv6 address to a MAC address?

A.

IPv6 uses the Address Resolution Protocol to resolve the address to a MAC address.

B.

A Neighbor Discovery message is sent to the broadcast MAC address. The host with the IPv6 address responds with a Neighbor Advertisement message.

C.

A Neighbor Discovery message is sent to the solicited-node multicast address. The host with the IPv6 address responds with a Neighbor Advertisement message.

D.

A Neighbor Discovery message is sent to the anycast address for the LAN. The host with the IPv6 address responds with a Neighbor Advertisement message.

E.

IPv6 addresses do not need to be resolved to a MAC address.

Full Access
Question # 125

Which of the following correctly lists the 5 OSPF packet types?

A.

Hello, link state update, link state packet, link State acknowledgement, database description.

B.

Link state update, link state refresh, link state acknowledgement, database description, notification.

C.

Hello, link state refresh, link state update, link state acknowledgement, link state authentication.

D.

Hello, link state update, link state request, link state acknowledgement, database description.

Full Access
Question # 126

What are the default Hello and Dead timer intervals for OSPF on the Alcatel-Lucent 7750 SR?

A.

5 and 15 seconds

B.

10 and 30 seconds

C.

5 and 20 seconds

D.

10 and 40 seconds

Full Access
Question # 127

Click the exhibit button.

What triggers convergence of the routing protocol when the link between switch 1 and switch 2 goes down?

A.

Convergence is triggered when the adjacency between routers R1 and R2 drops as a result of Hello timeouts. At this point, both routers R1 and R2 re-compute their link state database and send updates to their adjacent routers. Once the process is complete for all routers, the networks have converged.

B.

Convergence is triggered when the physical interfaces between routers R1 and R2 go down. At this point, both routers R1 and R2 re-compute their link state database and send updates to their adjacent routers. Once the process is complete for all routers, the networks have converged.

C.

Convergence will not be triggered because switches cannot run routing protocols between them.

D.

Convergence is triggered when the switches notify the routers about the link state information. At this point, both routers R1 and R2 re-compute their link state database and send updates to their adjacent routers. Once the process is complete for all routers, the networks have converged

E.

Convergence is triggered when an LSA is sent from router R1 to router R2 to indicate that the link is down. At this point, both routers R1 and R2 re-compute their link state database and send updates to their adjacent routers. Once the process is complete for all routers, the networks have converged.

Full Access