Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Click on the exhibit button below.

Under which condition might the peer LDP ID 10.10.10.2:0 entry show state "Nonexistent"?

A.

When the interface to the peer router is down.

B.

When router R1 has no route to the peer address 10.10.10.2.

C.

When the adjacency between the two routers fails.

D.

When the targeted session is not yet configured.

Full Access
Question # 5

Click on the exhibit button below. Assume the following:

- Each router's OSPF interfaces are in the areas shown.

- Bidirectional LDP-over-RSVP tunnels extend from routers R1 to R3 and back over the path R1-R4-R5-R3.

- You enable fast reroute facility bypass on the R5-R3 RSVP LSP.

- Router R5 acts as a PLR, protecting the R5-R3 link by building a bypass tunnel through router R2.

You build a layer 2 VPN on routers R1 and R3, using the LDP-over-RSVP tunnels. What MPLS configuration step must you complete on router R2 for it to protect the end-to-end service?

A.

Enable LDP on the R2-R5 interface.

B.

Configure T-LDP sessions between routers R2 and R5 and R3.

C.

Configure LDP-over-RSVP support on router R2.

D.

Enable MPLS and RSVP on the router R2 network interfaces.

E.

Enable LDP on the R2-R5 and R2-R3 interfaces.

Full Access
Question # 6

Which of the following are the default settings for the Alcatel-Lucent 7750 SR when using LDP?

A.

Per-platform label space, conservative retention mode

B.

Per-interface label space, conservative retention mode

C.

Per-platform label space, liberal retention mode

D.

Per-interface label space, liberal retention mode

Full Access
Question # 7

Which of the following LDP messages are used in the successful establishment of LDP sessions? Choose three answers

A.

Label request message

B.

Notification message

C.

Address message

D.

Keepalive message

E.

Initialization message

F.

Hello message

Full Access
Question # 8

Which of the following LDP message categories is UDP-based?

A.

Notification

B.

Session

C.

Discovery

D.

Advertisement

Full Access
Question # 9

Which of the following regarding MPLS Encapsulation is FALSE?

A.

The customer's Layer 2 header is preserved at the iLER for Layer 2 services.

B.

The customer's Layer 2 Header is preserved at the iLER for Layer 3 services.

C.

The service provider's Layer 2 header is added at the iLER for Layer 2 services.

D.

The service provider's Layer 2 header is added at the iLER for Layer 3 services.

Full Access
Question # 10

Which of the following is a primary cause of IP hyper-aggregation?

A.

IP routing protocols do not always select the best route to a destination.

B.

IP routing protocols always select multiple routes to a destination.

C.

IP routing protocols do not make use of all available network attributes to select a path

D.

Improper network design results in limited network path redundancy.

Full Access
Question # 11

Which of the following is described by the following statement? An LSR propagates a label mapping only for an FEC for which it has a label mapping for the FEC next-hop.

A.

Independent control mode.

B.

Ordered control mode.

C.

Liberal label retention.

D.

Conservative label retention.

E.

Downstream on demand

Full Access
Question # 12

Router R3 signals an LSP, reserving 1Gbps bandwidth on a 10Gbps link. RSVP configuration limits reservable bandwidth to 20 percent on the egress interface. Which of the following statements is true?

A.

The egress RSVP interface has 80 percent bandwidth unreserved.

B.

LSPs can reserve an additional 9.9 Gbps bandwidth on this RSVP interface.

C.

The head end reserves 100Mbps for the LSP.

D.

The egress RSVP interface has 1Gbps bandwidth unreserved.

Full Access
Question # 13

Which of the following about RSVP-TE on an Alcatel-Lucent 7750 SR is TRUE?

A.

Label bindings are distributed to other routers when explicitly requested.

B.

Label bindings are distributed to all neighbors including non-downstream routers.

C.

Label bindings are distributed if labels have not been received from downstream routers.

D.

All labels received from downstream neighbors are stored in the LIB.

Full Access
Question # 14

Which of the following statements is true when the implicit null is implemented?

A.

The penultimate router will POP the top label from the packets.

B.

The eLER will receive packets with a top label value of 3.

C.

The eLER will receive packets with a top label value of 0.

D.

The penultimate router will always receive unlabeled packets.

E.

The penultimate router performs a double lookup on the packet.

Full Access
Question # 15

Click on the exhibit button below.

Given the configuration below, which of the following scenarios is FALSE?

A.

Both the primary and secondary paths are explicitly defined.

B.

The primary path is active and the secondary path is in hot standby.

C.

The LSP defined will use the primary path and will signal the secondary path to become active if the primary path fails.

D.

The LSP has the same source and destination for both primary and secondary paths.

Full Access
Question # 16

Which of the following best describes constraint-based routing?

A.

A mechanism that implements opaque LSAs.

B.

A mechanism that computes routes based on defined user requirements.

C.

A mechanism that allows the IGP shortest path to be used.

D.

A mechanism that allows RSVP or LDP signaling to use a route other than the IGP best route to establish a LSP.

Full Access
Question # 17

Which of the following are characteristics of an LSP? (Choose two)

A.

It is unidirectional.

B.

It is bidirectional.

C.

It must always have a secondary path.

D.

It provides a specific tunnel for a FEC through the network.

E.

It always follows the IGP best path.

Full Access
Question # 18

Which of the following statements regarding the last two octets of the LDP identifier is true?

A.

It is always a random 16-bit number.

B.

It is always zero for per-interface label space.

C.

It is always non-zero.

D.

It is always zero for per-platform label space.

E.

It is always non-zero for per-platform label space.

Full Access
Question # 19

Which MPLS label mode saves label mappings received from all peer LSRs?

A.

Conservative label retention

B.

Liberal label retention

C.

Downstream on demand

D.

Downstream unsolicited

Full Access
Question # 20

An LSP is configured with one-to-one FRR and node protection on a Alcatel-Lucent 7750 SR. Which of the following is FALSE?

A.

Each PLR signals a protection tunnel that avoids the downstream node.

B.

A single protection tunnel can protect all LSPs that go through the same hop.

C.

A link protection tunnel is signaled if a node protection tunnel cannot be established.

D.

Protection tunnels used in this LSP are also detour tunnels.

Full Access
Question # 21

Which of the following is NOT a characteristic of MPLS?

A.

It provides the ability to establish connection oriented paths over a connectionless IP network.

B.

It provides a mechanism to engineer network traffic patterns independently of IP routing tables.

C.

It will work over most physical layer protocols.

D.

It can use GRE tunnels to transport data from many different protocols over an IP network.

Full Access
Question # 22

Facility fast reroute with node protection is enabled for an LSP, which of the following is FALSE?

A.

Each PLR signals a bypass tunnel that avoids the next-hop downstream router.

B.

When a failure occurs, the PLR pushs an additional label onto the label stack.

C.

No bypass tunnel is established if the PLR cannot provide node protection.

D.

The head-end router sets the local protection desired flag in the session attribute object.

Full Access
Question # 23

Click on the exhibit.

The LSP "toR6" is configured with a fully strict path on an Alcatel-Lucent 7750 SR. Which of the following configurations is required to enable fast reroute for this LSP?

A.

Enable fast-reroute on all routers along the path. R1, R2, R4, and R6.

B.

Enable both link-protection and node-protection on router R1.

C.

Enable fast-reroute with either one-to-one or facility mode on this LSP.

D.

Enable link-protection only on router R4.

Full Access
Question # 24

An IS-IS TE enabled router has an interface on a 500Mbps link and it is configured with a 25% subscription. If this interface is not used by any LSPs. what value will be shown in the Reservable Bandwidth sub-TLV?

A.

125 Mbps

B.

500 Mbps

C.

625 Mbps

D.

2000 Mbps

Full Access
Question # 25

Which of the following devices inspects the MPLS header in the received packet, and exchanges it for a new MPLS header?

A.

iLER

B.

LER

C.

LSR

D.

PE

E.

eLER

Full Access
Question # 26

What is the common usage of the MPLS EXP bits?

A.

Each implementation can use them as they see fit.

B.

They are used to carry the Ethertype value.

C.

They are used to carry the TTL value.

D.

They are used to carry QoS classification.

E.

They are used to carry fragmentation flag information

Full Access
Question # 27

Which of the following statements regarding RSVP-TE is FALSE?

A.

RSVP-TE operates in a downstream unsolicited label advertisement mode.

B.

RSVP-TE makes use of ordered control mode.

C.

RSVP-TE is an MPLS signaling protocol, based on the resource reservation protocol.

D.

RSVP-TE enables the establishment of explicitly routed LSPs that can be automatically routed away from network failures

E.

RSVP-TE supports explicitly routed LSPs using either loose or strict route definitions.

Full Access
Question # 28

Assume that, on the Alcatel-Lucent 7750 SR, an LSP is configured with one-to-one FRR and node protection. Which of the following statements are FALSE? (Choose two)

A.

Each PLR signals a detour LSP that avoids the downstream node. If the downstream node cannot be avoided, a detour LSP that avoids the downstream link is signaled.

B.

The detour LSP can take one or more hops before merging back on the protected LSP.

C.

The merge point of the protected LSP must be the next-next-hop node

D.

The ingress router will set the local protection desired flag in the session attribute object of the path message to inform all routers along the protected LSP path to establish detour LSPs.

E.

The label recording desired flag must be set in the session attribute object in order for the PLR to know what label to swap when using the detour LSP.

Full Access
Question # 29

Which of the following statements regarding LSP path configuration are true? (Choose three)

A.

The path must include at least one hop.

B.

The path may be used multiple times in a single LSP.

C.

The path may comprise loose hop entries only.

D.

The path must define the LSP's tail end.

E.

The path may be used for multiple LSPs.

Full Access
Question # 30

Which of the following statements best defines an LSP?

A.

An LSP is a bidirectional path across the MPLS domain.

B.

An LSP is a bidirectional path for a particular FEC across the MPLS domain.

C.

An LSP is a unidirectional path across the MPLS domain.

D.

An LSP is a bidirectional path between adjacent LSRs.

E.

An LSP is a unidirectional path between adjacent LSRs.

Full Access
Question # 31

Click on the exhibit.

A fully loose LSP MtoR6" is enabled with FRR protection. All links have the same cost. After the link between R2 and R4 goes down, FRR protection repairs the LSP and traffic traverses on R1-R2-R7-R8-R4-R6. By default, which of the following about this LSP on an Alcatel-Lucent 7750 SR is FALSE?

A.

The LSP will switch to R1-R3-R5-R6 after the resignal timer expires.

B.

The old primary path and its detours are torn down after the new primary path is established.

C.

CSPF must be enabled to find a more optimal path.

D.

The traffic is switched to R1-R3-R5-R6 in an MBB fashion.

Full Access
Question # 32

Using facility mode fast reroute, how does the PLR learn the address of the MP?

A.

The PLR issues an RSVP PATH message to the tail-end requesting the address of the MP.

B.

The PLR learns the address of the MP from the ERO.

C.

The PLR learns the address of the MP from the RRO.

D.

The PLR learns the address of the MP from the targeted RSVP Hello message.

E.

The PLR knows the address of the MP is the same as the tail-end router.

Full Access
Question # 33

Which of the following about MPLS fast reroute is TRUE?

A.

Fast reroute is used when redundant links are not available.

B.

Fast reroute provides path protection close to the failure point.

C.

Fast reroute provides fast failure detection to the head-end router.

D.

Fast reroute protects both primary and secondary paths.

Full Access
Question # 34

Which of the following is NOT an advantage of MPLS shortcuts for BGP traffic?

A.

It makes use of MPLS resiliency features available within an AS.

B.

It eliminates double route lookups on all routers within an AS.

C.

It eliminates the need to run IGP on all routers within an AS.

D.

It eliminates the need for an iBGP full mesh on all core routers.

Full Access
Question # 35

All links have 1Gbps unreserved bandwidth initially and all LSPs have the least-fill feature enabled. After the two LSPs have been signaled as shown, two new LSPs are configured. LSP-3 is signaled first with 600Mbps reserved. LSP-4 is signaled after with 800Mbps reserved. All LSPs have the same setup and hold priorities. Which paths will CSPF choose for LSP-3 and LSP-4?

A.

LSP-3 takes R1-R3-R5-R6 and LSP-4 takes R1-R2-R4-R6.

B.

LSP-3 takes R1-R2-R4-R6 and LSP-4 takes R1-R3-R5-R6.

C.

LSP-3 takes R1-R3-R5-R6 and LSP-4 has no available path.

D.

LSP-3 takes R1-R2-R4-R6 and LSP-4 has no available path.

Full Access
Question # 36

Which of the following modes are used by RSVP-TE on an Alcatel-Lucent 7750 SR?

A.

Independent control mode, downstream on demand

B.

Independent control mode, downstream unsolicited

C.

Ordered control mode, downstream on demand

D.

Ordered control mode, downstream unsolicited

Full Access
Question # 37

Click on the exhibit.

Router R2 advertises the aggregate prefix 10.10.10.0/24 into Area 1. Why would LDP aggregate-prefix-match be enabled on router R3?

A.

To reduce the number of LDP sessions

B.

To reduce the number of LIB and LFIB entries

C.

To bypass the LDP exact prefix match rule

D.

To export summarized routes from OSPF to LDP

Full Access