Q1. Which three statements about RIPng are true? (Choose three.)
A. It supports route tags.
B. It sends updates on FF02::9.
C. Its RTE last byte is 0XFF.
D. It supports authentication.
E. It sends updates on UDP port 520.
F. It can be used on networks of greater than 15 hops.
Answer: A,B,C
Q2. Which statement about the RPF interface in a BIDIR-PIM network is true?
A. In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the PIM rendezvous point.
B. In a BIDIR-PIM network, the RPF interface can be the interface that is used to reach the PIM rendezvous point or the interface that is used to reach the source.
C. In a BIDIR-PIM network, the RPF interface is always the interface that is used to reach the source.
D. There is no RPF interface concept in BIDIR-PIM networks.
Answer: A
Explanation:
RPF stands for "Reverse Path Forwarding". The RPF Interface of a router with respect to an address is the interface that the MRIB indicates should be used to reach that address. In the case of a BIDIR-PIM multicast group, the RPF interface is determined by looking up the Rendezvous Point Address in the MRIB. The RPF information determines the interface of the router that would be used to send packets towards the Rendezvous Point Link for the group.
Reference: https://tools.ietf.org/html/rfc5015
Q3. Refer to the exhibit.
Which statement about the topology is true?
A. It provides a transparent LAN service.
B. It provides only point-to-multipoint connections between UNIs.
C. It uses port-based connections at the hub.
D. It provides point-to-point connections between UNIs.
Answer: D
Q4. Which two statements about port ACLs are true? (Choose two.)
A. Port ACLs are supported on physical interfaces and are configured on a Layer 2 interface on a switch.
B. Port ACLs support both outbound and inbound traffic filtering.
C. When it is applied to trunk ports, the port ACL filters only native VLAN traffic.
D. When it is applied to a port with voice VLAN, the port ACL filters both voice and data VLAN traffic.
Answer: A,D
Explanation:
PACLs filter incoming traffic on Layer 2 interfaces, using Layer 3 information, Layer 4 header information, or non-IP Layer 2 information The port ACL (PACL) feature provides the ability to perform access control on specific Layer 2 ports. A Layer 2 port is a physical LAN or trunk port that belongs to a VLAN. Port ACLs perform access control on all traffic entering the specified Layer 2 port, including voice and data VLANs that may be configured on the port. Port ACLs are applied only on the ingress traffic.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SY/configuration/guide/sy_swcg/port_acls.html
Q5. Refer to the exhibit.
Which configuration reduces CPU utilization on R2 while still advertising the connected routes of R2 to R1?
A. Configure eigrp stub connected on R2.
B. Configure eigrp stub receive-only on R1.
C. Configure eigrp stub static on R2.
D. Configure eigrp stub summary on R1.
Answer: A
Q6. What is the destination MAC address of a BPDU frame?
A. 01-80-C2-00-00-00
B. 01-00-5E-00-00-00
C. FF-FF-FF-FF-FF-FF
D. 01-80-C6-00-00-01
Answer: A
Explanation:
The root-bridge election process begins by having every switch in the domain believe it is the root and claiming it throughout the network by means of Bridge Protocol Data Units (BPDU). BPDUs are Layer 2 frames multicast to a well-known MAC address in case of IEEE STP (01-80-C2-00-00-00) or vendor-assigned addresses, in other cases.
Reference: http://www.ciscopress.com/articles/article.asp?p=1016582
Q7. Which two packet types does an RTP session consist of? (Choose two.)
A. TCP
B. RTCP
C. RTP
D. ICMP
E. BOOTP
F. ARP
Answer: B,C
Explanation:
An RTP session is established for each multimedia stream. A session consists of an IP address with a pair of ports for RTP and RTCP. For example, audio and video streams use separate RTP sessions, enabling a receiver to deselect a particular stream. The ports which form a session are negotiated using other protocols such as RTSP (using SDP in the setup method) and SIP. According to the specification, an RTP port should be even and the RTCP port is the next higher odd port number.
Reference: http://en.wikipedia.org/wiki/Real-time_Transport_Protocol
Q8. Which two options are reasons for TCP starvation? (Choose two.)
A. The use of tail drop
B. The use of WRED
C. Mixing TCP and UDP traffic in the same traffic class
D. The use of TCP congestion control
Answer: C,D
Explanation:
It is a general best practice to not mix TCP-based traffic with UDP-based traffic (especially Streaming-Video) within a single service-provider class because of the behaviors of these protocols during periods of congestion. Specifically, TCP transmitters throttle back flows when drops are detected. Although some UDP applications have application-level windowing, flow control, and retransmission capabilities, most UDP transmitters are completely oblivious to drops and, thus, never lower transmission rates because of dropping. When TCP flows are combined with UDP flows within a single service-provider class and the class experiences congestion, TCP flows continually lower their transmission rates, potentially giving up their bandwidth to UDP flows that are oblivious to drops. This effect is called TCP starvation/UDP dominance. TCP starvation/UDP dominance likely occurs if (TCP-based) Mission-Critical Data is assigned to the same service-provider class as (UDP-based) Streaming-Video and the class experiences sustained congestion. Even if WRED or other TCP congestion control mechanisms are enabled on the service-provider class, the same behavior would be observed because WRED (for the most part) manages congestion only on TCP-based flows.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/Qo S-SRND-Book/VPNQoS.html
Q9. Refer to the exhibit.
If a connection failure occurs between R1 and R2, which two actions can you take to allow CR-1 to reach the subnet 192.168.192.0/24 on R2? (Choose two.)
A. Create a static route on R1 for subnet 192.168.192.0/24 towards R3 and redistribute it into OSPF.
B. Turn up a BGP session between CR-1 and R1.
C. Create a static route on R1 for subnet 192.168.192.0/24 towards R3 and redistribute it into BGP.
D. Turn up an EIGRP session between R1 and R3 with AS 65535.
E. Create an OSPF virtual link between CR-1 and R2 to bypass R1.
Answer: A,B
Q10. Which technology is not necessary to set up a basic MPLS domain?
A. IP addressing
B. an IGP
C. LDP or TDP
D. CEF
E. a VRF
Answer: E
Explanation:
The simplest form of VRF implementation is VRF Lite. In this implementation, each router within the network participates in the virtual routing environment in a peer-based fashion. While simple to deploy and appropriate for small to medium enterprises and shared data centres, VRF Lite does not scale to the size required by global enterprises or large carriers, as there is the need to implement each VRF instance on every router, including intermediate routers. VRFs were initially introduced in combination with MPLS, but VRF proved to be so useful that it eventually evolved to live independent of MPLS. This is the historical explanation of the term VRF Lite. Usage of VRFs without MPLS.
Reference: http://en.wikipedia.org/wiki/Virtual_routing_and_forwarding