CCIE SP v4.0 400-201 Pas111q

Download as pdf or txt
Download as pdf or txt
You are on page 1of 64

400-201

CCIE Service Provider Written Exam

Version 4.0

QUESTION NO: 1
A service provider is implementing Ethernet solutions for clients that are not being provisioned
within the MPLS core network. Which solution allows the Service Provider to complete Ethernet
circuit provisioning in this scenario?

A. L2TPv3
B. VPLS
C. AToM
D. PPPoE

Answer: A
QUESTION NO: 2
Which is the main characteristic of LTE architecture comparing to other mobile architectures?

A. Provides supports to deploy Layer 3 MPLS VPN model, where other mobile architectures do
not support.
B. Offers node redundancy with the static route configured on the IP NodeB using the
HSRP/VRRP virtual ip address.
C. Provides a simpler, less hierarchical model with the capability of simplistically distributing the
core gateways.
D. Introduces a hierarchical model with connection-oriented service requirements and one-toone relationships.

Answer: C

QUESTION NO: 3
A Service Provider is offering VoIP services and a service level agreement to customers. Which
configuration provides validation to customers that the service level agreement has been
honored?

A.

ip sla 999 udp-jitter 209.165.200.225 1000 codec g729a tos 160


ip sla schedule 999 life forever start-time now

B.

ip sla 999 icmp-jitter 209.165.200.225 tos 160


ip sla schedule 999 life forever start-time now

C.

ip sla 999 icmp-jitter 209.165.200.225 tag VoIP-SLA


ip sla schedule 999 life forever start-time now

D.

ip sla 999 udp-jitter 209.165.200.225 1000 codec g729a tag VoIP-SLA


ip sla schedule 999 life forever start-time now

Answer: A

QUESTION NO: 4
A telecom company offers ISPs the ability to resell dynamic IP broadband services over its local
loops, but it does not allow the resellers to install broadband network gateways. If an ISP wants
to become a reseller but is unable to use NHRP, which tunneling protocol should be
implemented?

A. IP in IP
B. IPsec
C. L2TP
D. GRE

Answer: C

QUESTION NO: 5
Refer to the exhibit.

The vrf MAINT has been provisioned and used by the Service Provider management network.
The engineer discovers that syslog messages are not being received on the syslog server. IP
reachability has been validated using ping. Which issue in the configuration must be corrected?

A. logging on must include the vrf MAINT keyword.


B. logging host must include the vrf MAINT keyword.
C. The logging facility must be configured for syslog processing.
D. The route targets that are configured do not match the route distinguisher.

Answer: B

QUESTION NO: 6
Refer to the exhibit.

A service provider has multiple time sources in the environment for NTP. The time source at
10.0.4.1 is intended to be seen as a primary time source. What command can be issued on PE4
to fix the configuration, ensuring the proper NTP source will be issued?

A. ntp peer 10.0.4.1


B. ntp peer 10.0.4.1 prefer
C. ntp server 10.0.4.1 source GigabitEthernet0/0
D. ntp server 10.0.4.1 prefer

Answer: D

QUESTION NO: 7
Which are the three benefits of using the Yang model? (Choose three.)

A. Reduce lab footprint


B. Improve access to resources
C. Support interoperability that provides a standard way to model management data
D. Support simplified network management applications

E. Provide a scale virtual lab environment


F. Support programmatic interfaces

Answer: CDF

QUESTION NO: 8
Refer to the exhibit. How will the redistributed routes on R1 from EIGRP into OSPF be installed
in the R4 routing table?

A. as a default route with an E2 route type


B. as a default route with an IA route type
C. as specific routes with an E2 route type
D. as specific routes with an N2 route type
E. as a default route with an N2 route type
Answer: B

QUESTION NO: 9 DRAG DROP


Drag and drop the OAM protocol listed on the left to the correct standard on the right. Not all
options will be used.

Answer: IEEE 802.1ag Connectivity Fault Management Service Layer OAM


IEEE 802.3ah OAM Link Layer OAM
MEF-16 E-LMI Ethernet Local Management Interface

QUESTION NO: 10
A Service Provider provides a Layer 2 connection that is based on IEEE 802.1ad. When the
customer tries to access a switch at the other side of the link by using SSH, the connection fails.
What is the cause of this failure?

A. The Service Provider omitted the command l2protocol-tunnel stp.


B. The Service Provider omitted the command l2protocol-tunnel vtp.
C. The Service Provider omitted the command vlan dot1q tag native.
D. The Service Provider omitted the command spanning-tree bpdufilter enable.

Answer: C

QUESTION NO: 11

In an MPLS VPN environment, the QoS making over the MPLS backbone must be different from
the one that is received from the customer. The forwarding on the egress PE is based on the
marking that is set by the ingress PE. Which null label and QoS mode can achieve this?

A. MPLS explicit null with pipe mode


B. MPLS implicit null with short pipe mode
C. MPLS implicit null with uniform mode
D. MPLS explicit null with uniform mode
E. MPLS explicit null with short pipe mode
F. MPLS implicit null with pipe mode

Answer: A

QUESTION NO: 12
An engineer is deploying RTBH. What is necessary routing constraint required for successful
implementation?

A. The trigger device must have an iBGP session with all the clusters/route reflectors in the
autonomous system.
B. The trigger device must redistribute the static route pointing to a null interface into the IGP
process.
C. The no ip reachables command must be issued on the PE router interface under attack.
D. The attackers destination IP address must be routed to a null interface.
E. The eBGP sessions need to set the next-hop attribute value to the trigger device loopback
interface.

Answer: A

QUESTION NO: 13
Refer to the exhibit.

ABC and XYZ MPLS VPN customers are accruing Internet access. Both CEs are sending traffic to
the Internet. Which statement about their connectivity is true?

A. Both CEs will have connectivity.


B. Only CE-XYZ will have connectivity.
C. Neither CEs will have connectivity, as both CEs are using the same NATed subnet.
D. Only CE-ABC will have connectivity.
E. Neither CEs will have connectivity, as IAR does not have route back to the NATed subnet.

Answer: A

QUESTION NO: 14 DRAG DROP


Drag and drop the IOS XR NTP access group options on the left to the right from the least
restrictive (top) to the most restrictive order (bottom).

Answer:
1 - peer
2 serve
3 serve-only
4 query-only

QUESTION NO: 15
Which Cisco IOS XR Virtualization technology provides full isolation between virtualized routing
instances for extra control plane resources?

A. HVR
B. SVR
C. SDR
D. DRP
Answer: C

QUESTION NO: 16

An engineer wants to configure MPLS TE Fast Reroute with link protection on five routers.
Which methodology can reduce configuration on the point of the local repair router and
successfully complete the task?

A. Configure a backup tunnel on the PLR.


B. Enable the autotunnel backup feature.
C. Configure a backup tunnel on the tunnel headend router.
D. Enable the autotunnel primary feature.
Answer: B

QUESTION NO: 17
Refer to the exhibit. An MPLS Layer 3 VPN service has been provisioned for a customer. What
will be the ToS value at Site-B for the exceeded traffic that it is sent from Site-A with ToS 2?

A. 0
B. 2
C. 3
D. 4
E. No exceeded traffic will reach Site-B.

Answer: B

QUESTION NO: 18
What is NETCONF?

A. It is a standard for installing, manipulating and deleting configuration of network devices.


B. it is a Cisco proprietary solution to help remove the time, cost and manual steps involved in
network element configuration.
C. It is data modeling language, to help remove the time, cost and manual steps involved in
network element configuration.
D. It is a new recommendation which writes device specific CLI scripts while keeping flexibility
in a vendor dependence environment.

Answer: A

QUESTION NO: 19 DRAG DROP


Drag and drop Evolved Packet Core functional entities on the left to the correct description on
the right.

Answer:
HSS Is the concatenation of HLR and AuC

MME Is in charge of all the Control plane functions related to subscriber and session
management
PCRF Server Manages the service policy and sends QoS setting information for each user
session and accounting rule information
PDN GW Is the termination point of the packet data interface towards the PDN
Service GW - Is the termination point of the packet data interface towards E-UTRAN

QUESTION NO: 20
Which BGP feature improves the convergence and response time to adjacency changes with
BGP neighbors?

A. reducing BGP scanner timing to the minimum that is supported


B. BGP Multihop
C. Next-Hop Address Tracking
D. Fast Peering Session Deactivation
E. TTL Security Check

Answer: D

QUESTION NO: 21
Which are the two purposes of the MPLS label value 1? (Choose two.)

A. it is used for MPLS OAM packets.


B. it indicates an implicit null label.
C. it is used for VPNv6 packets.
D. it is used to carry the QoS value in the label stack.
E. it indicates an explicit null label.
F. it indicates a router alert label.

Answer: A, F

QUESTION NO: 22
Refer to the exhibit. Why is R3 unable to install 1.1.1.1/32 in its routing table?

A. 11.11.11.11/32 exists in the routing table, so the conditional advertising is not working.
B. The route is filtered out by the ip prefix-list ROUTE-IN command.
C. 11.11.11.11/32 is advertising in the BGP table, so conditional advertising is not working.
D. The bgp redistribute-internal command is missing under the R2 BGP process.

Answer: D

QUESTION NO: 23
An engineer wants to configure Fast Reroute in the network. Which methodology eliminates
RSVP configuration in the network?

A. Enable LDP Fast Synch.


B. Enable IP Fast Reroute.
C. Enable the autotunnel primary feature.
D. Enable Cisco MPLS TE Fast Reroute.
E. Enable the autotunnel backup feature.

Answer: B

QUESTION NO: 24
What are three actions that the control word performs in MPLS AToM? (Choose three.)

A. is used to identify the VC label


B. is used for padding small packets
C. preserves the sequence of the transported frames
D. facilitates the load balancing of AToM packets in the MPLS backbone network
E. carries control bits of the Layer 3 header of the transported protocol
F. is used to identify the tunnel label

Answer: B, C, D

QUESTION NO: 25
What are two advantages of Cisco IOS XR Software over Cisco IOS Software? (Choose two.)

A. a configuration that is grouped by interface


B. a configuration that is grouped by process
C. one-stage configuration

D. a monolithic OS
E. a two-stage configuration

Answer: B, E

QUESTION NO: 26
Which are two major changes SyncE offers over traditional Ethernet to make it suitable for
clock distribution? (Choose two.)

A. SyncE introduces the concept of Boundary Clocks and Transparent Clocks improving
network scalability and accuracy of clock synchronization.
B. Industry standard that guarantee interoperability, since granular details, such as specific field
values are specified.
C. A mandated clock accuracy of 4.6ppm.
D. The ESMC protocol for clock selection, distribution, management, traceability, and failover.
E. High-priority synchronization packets so it can continually adjust its own oscillator.

Answer: C, D

QUESTION NO: 27
What is the PPMP label used for?

A. for the ingress replication model with BIDIR-PIM in an overlay model


B. only for the inter-AS mVPN models that use mLDP
C. for the partitioned mVPN mmodel with PIM signaling in an overlay model
D. only for unicast over MPLS VPN
E. for all the default MDT and mVPN models

Answer: C

QUESTION NO: 28
Based on the following configuration:
vrf definition ABC
rd 10.0.0.1:1000
!
address-family ipv4
route-target export 1:1
route-target import 1:1
mdt default 232.0.0.1
Which two statements about multicast VPN configuration are true? (Choose two.)

A. The multicast tree is created based only on the existence of active sources or receivers
behind PEs in the ABC VRF.
B. The service provider core network is required to support SSM.
C. Multicast needs to be enabled only on ABC VRF and is tunneled to participating PE routers in
the ABC VRF.
D. The SP core network is required in order to enable the BGP Multicast Address Family on all
peerings.
E. Multicast is required for the core network in addition to the ABC VRF.
F. The multicast tree exists regardless of whether there are any active sources or receivers in
the ABC VRF.

Answer: D, F

QUESTION NO: 29

An engineer is implementing an MPLS within the core of the Service Provider network. What
two components are required to build the control and data plane for MPLS Label Switched
Paths? (Choose two.)

A. FIB
B. CEF
C. LDP
D. LFIB
E. OSPF

Answer: B, C

QUESTION NO: 30
Refer to the exhibit. Customer XYZ Site 1 is not learning prefixes from Site 2. What is the issue?

A. MPLS LSP is broken along the path.


B. The route-policy is not implemented in router PE-2.
C. The BGP local-as command should be used between PE-1 and CE-1.

D. The route-distinguisher values must match in both sites.


E. The BGP as-override command should be implemented between between PE-1 and CE-1.

Answer: E

QUESTION NO: 31
Refer to the exhibit. A network engineer must configure BFD for IS-IS between R1 and R2. In
case the primary link fails, the convergence time should be less than a second.
Which two IOS commands are required to meet this requirement? (Choose two.)

A. isis bfd
B. bfd minimum-interval 250
C. bfd interval 250 min_rx 250 multiplier 3
D. bfd multiplier 3
E. bfd interval 250 min_rx 250 multiplier 4
F. bfd fast-detect ipv4

Answer: A,C
QUESTION NO: 32
An engineer must implement E-Line services for a service provider network. Which two services
apply in this situation? (Choose two.)

A. EVPL
B. E-Tree
C. E-LAN
D. EVC
E. EPL

Answer: A, E

QUESTION NO: 33
Refer to the exhibit. After the BGP TCP negotiation between RouterA and RouterB, what will be
the value of the keepalive timer and the hold-down timer, respectively?

A. 3 seconds and 9 seconds


B. 60 seconds and 180 seconds
C. 10 seconds and 9 seconds
D. no value, because BGP negotiation will not be successful
E. 10 seconds and 10 seconds
F. 10 seconds and 30 seconds
G. 3 seconds and 30 seconds
H. 3 seconds and 10 seconds

Answer: D

QUESTION NO: 34
In a routing virtualization concept, which are the two main techniques for creating virtualized
router entities as defined by their physical and operational characteristics? (Choose two.)

A. VDC
B. SVR
C. DRP
D. HVR
E. SDR

Answer: B, D

QUESTION NO: 35
Which two statements about Unified MPLS are true? (Choose two.)

A. Unified MPLS works on Cisco IOS XR Software only.


B. Unified MPLS extends MPLS across multidomain networks in a scalable manner.
C. New technologies or protocols are not used; only MPLS, LDP, IGP, and BGP are used.
D. ABR loopback prefixes should always be redistributed from the core IGP into the aggregation
IGP.
E. The RRs are part of the control path only.

Answer: B,C

QUESTION NO: 36

Customers connecting to a Service Provider for Internet access are intending to implement
redundant peering. The design requirements call for preferring a primary link for both ingress
and egress traffic. Secondary links should be used only during primary outages. What two BGP
deployment options will accomplish this design goal? (Choose two.)

A. On the router handling the secondary link, advertise routes with a MED value of 0.
B. On the router handling the primary link, set the weight for all incoming routes to be a value
of 0.
C. On the router handling the secondary link, advertise all routes with a longer AS-PATH value.
D. On the router handling the primary link, advertise all routes with a longer AS-PATH value.
E. On the router handling the secondary link, set the local preference for all incoming routes to
be a value of 0.

Answer: C, E

QUESTION NO: 37
Refer to the exhibit. A customer is running IS-IS within a network and is using BGP as a CE-PE
routing protocol. Which action allows CE1 to get the subnet 10.10.2.0/24 over the CE1-PE1 link,
regardless of whether there is a flap in the MPLS link or backdoor link?

A. Configure the neighbor <PE1-IP> weight 33768 command on CE1 under the BGP process.
B. Configure the distance bgp 115 200 200 command on CE1 under the BGP process.
C. Configure the distance 30 ip command on CE1 under the IS-IS process.
D. Configure the distance bgp 115 200 200 command on CE2 under the BGP process.
F. Configure the neighbor <PE1-IP> weight 33768 command on CE2 under the BGP process.

Answer: B

QUESTION NO: 38
Which are the two fundamental ways in which IEEE 1588 differs from SyncE? (Choose two.)
A. In addition to frequency synchronization, it achieves ToD synchronization to achieve phase
alignment which is required for multi-channel communication.
B. It is a purely-based solution, with the actual clock values being passed inside the payloads of
special packets dedicated to that task.
C. It offers two major changes over traditional Ethernet to make it suitable for clock
distribution: a mandated clock accuracy and the ESMC protocol for clock selection, distribution,
management, traceability, and failover.

D. SyncE is a Cisco proprietary ToD technology where IEEE 1588 is a industry standard
recommended for interoperability across vendor devices.
E. IEEE 1588 applies to voice-only systems or with low-bandwidth data traffic.

Answer: A, B

QUESTION NO: 39
Refer to the exhibit. Both MPLS TE tunnel 14 and MPLS TE tunnel 124 pass over the same
physical links. Which configuration on R1 enables TE 14 to be the primary tunnel and TE 124 to
become active when TE 14 is admin disabled?

A. Interface Tunnel14
tunnel mpls traffic-eng priority 3 1
!
Interface Tunnel124
tunnel mpls traffic-eng priority 5 4
B. Interface Tunnel14
tunnel mpls traffic-eng priority 4 1
!

Interface Tunnel124
tunnel mpls traffic-eng priority 3 2
C. Interface Tunnel14
tunnel mpls traffic-eng priority 7 7
!
Interface Tunnel124
tunnel mpls traffic-eng priority 1 1
D. Interface Tunnel14
tunnel mpls traffic-eng priority 3 2
!
Interface Tunnel124
tunnel mpls traffic-eng priority 4 1

Answer: A
t

QUESTION NO: 40
A network engineer wants to decrease the convergence time of a network that is running
integrated IS-IS as an IGP, at the expense of bandwidth and CPU usage. Which two
configuration tasks achieve this goal? (Choose two.)

A. Configure the hold time to be 1 second.


B. Configure the hello interval to be minimal.
C. Ensure that hello-padding is disabled.
D. Configure that hello multiplier is set to 1
E. Configure the hello multiplier to be 3.

QUESTION NO: 41
In a Layer 2 VPN service, which is the default behavior of an EVC-based platform with regards to
VLAN manipulation?

A. keeps the VLAN tag of the incoming frame


B. attaches two VLAN tags to the incoming frame
C. removes the VLAN tag from the incoming frame
D. removes all the VLAN tags from the incoming frame
E. sets the VLAN tag of the incoming frame

Answer: A

QUESTION NO: 42
When IPv6 is enabled on an interface, which three multicast addresses does the configured
interface automatically join? (Choose three.)

A. FF01::2
B. FEC0::1
C. FF02:0:0:0:0:1:FF00::/104
D. FF02::1
E. FF01::1
F. FF02::2
G. FF02::D
H. FF02::5

Answer: C, D, F

QUESTION NO: 43
A network engineer is responsible for implementing a solution with Cisco IOS XR Software that
insures continuous forwarding during a control plane failure. Which two technologies should
the engineer consider? (Choose two.)

A. TE FRR
B. IP FRR
C. graceful restart
D. BFD
E. NSR

Answer: C, E

QUESTION NO: 44
Refer to the exhibit. An SP core is running MPLS with OSPF as the IGP used for Loopback
propagation. LDP Synchronization is enabled per the given configuration. What will the traffic
flow behavior be after a temporary outage event on PE1 Eth0/0?

A. Permanently through PE1 -> P2 -> PE4 due to lowest path metric.
B. Initially through PE1 -> P1 -> PE4, then a few seconds later, it will be over PE1 -> P2 -> PE4.

C. Permanently through PE1 -> P1 -> PE4 due to lowest path metric.
D. Initially through PE1 -> P2 -> PE4, then a few seconds later, it will be over PE1 -> P1 -> PE4

Answer: B

QUESTION NO: 45
Which two frame types are correct when configuring T3 interfaces? (Choose two.)

A. M23
B. G.832
C. Extended Super Frame
D. C-bit parity
E. G.751
F. Super Frame

Answer: A, D

QUESTION NO: 46
Refer to the exhibit. The referenced TE tunnels compete for bandwidth requirements over the
limited available bandwidth that is provisioned. Which core MPLS component flooding and
provides admission control for any new added TE tunnel?

A. link management
B. link attributes
C. MPLS TE priorities
D. RSVP

Answer: A

QUESTION NO: 47
Refer to the exhibit. Two MPLS TE tunnels are configured with a total bandwidth guarantee of
100 Mbps. However, Tunnel 1 has a requirement to have one-fifth of this total bandwidth.
Which two configurations accomplish this goal? (Choose two.)

A. Configure tunnel mpls traffic-eng bandwidth 20000 under the Tunnel 1 interface.
B. Configure bandwidth 20000 under the Tunnel 1 interface.
C. Configure tunnel mpls traffic-eng bandwidth 80000 under the Tunnel 2 interface.
D. Configure bandwidth 80 Mbps under physical interfaces in the path PE1-P2-PE2.
E. Configure bandwidth 20 Mbps under physical interfaces in the path PE1-P1-PE2
F. Configure bandwidth 80000 under the Tunnel 2 interface.

Answer: A, C

QUESTION NO: 48
What are three main characteristics of mLDP that differ from RSVP-TE? (Choose three.)

A. The LSPs are built from tailend to headend.


B. The LSPs are built from headend to tailend.
C. It supports only P2MP LSPs.
D. It supports both P2MP and MP2MP LSPs.
E. Signaling is periodic.
F. No periodic signaling is performed.
Answer: A, D, F

QUESTION NO: 49
Which are the three header fields that affect how Equal-Cost Multipath hashes traffic flow into
interface groups? (Choose three.)

A. source MAC address


B. source port
C. source IP address

D. destination IP address
E. IP protocol ID
F. destination MAC address

Answer: B, C, D

QUESTION NO: 50
Refer to the exhibit. What is the correct action to fix the L2TPv3 configuration?

A. At Router-A, correct the local interface in the pseudowire configuration.


B. At Router-B, correct the encapsulation in the pseudowire configuration.
C. At Router-A, correct the encapsulation in the pseudowire configuration.
D. At Router-B, correct the local interface in the pseudowire configuration.
Answer: B

QUESTION NO: 51-2. is almost similar except the one change in config (Encpsualtion is "l2tpv3"
in both routers under Pseudowire config)
A Change the ip local interface command to an interface that contains ip address
B. Add an ip address on interface that has xconnect command applied.
C. Change the encapsualtion to MPLS under the Pseudowire config
D. L2TPv3 does not work in MPLS enabled networks.

Answer: A

QUESTION NO: 51
Two routers that are running MPLS and LDP have multiple links that than connect them to each
other. An engineer wants to ensure that the label bindings are not flushed from the LIB if one of
the links fails. Which configuration meets this requirement?

A. the mpls ldp neighbor targeted command


B. the mpls ip command on a Cisco MPLS TE tunnel
C. the mpls ldp discovery targeted-hello accept command
D. the mpls ldp session protection command

Answer: D

QUESTION NO: 52
A network engineer needs to connect two core switches that use Gigabit Ethernet interfaces in
an MPLS backbone and that are separated by a distance of 60 km. Which Cisco GBIC achieves
this goal?

A. Cisco 1000BASE-T GBIC


B. Cisco 1000BASE-SX GBIC
C. Cisco 1000BASE-LX/LH GBIC
D. Cisco 1000BASE-ZX GBIC

Answer: D

QUESTION NO: 53
The product team at an ISP that offers VoIP services wants to add two-way video conferencing
to their product offering. Which three QoS methods can be applied for real-time traffic on WAN
links with speeds that are slower than 768 Kbps? (Choose three.)

A. Apply MLP link fragmentation and interleaving to the interface.


B. Apply LLQ with both voice traffic and video traffic in the same priority queue.
C. Apply CBWFQ with VoIP traffic in its own class, which is marked with a PHB value of EF.
D. Apply CBWFQ with video traffic in its own class, which is marked with a PHB value of AF41.
E. Apply voice-adaptive fragmentation to ensure that large video packets are fragmented and
interleaved.
F. Apply LLQ with video traffic that is dedicated in the priority queue.

Answer: A, C, D

QUESTION NO: 54
An R1 router requires an equal load balancing to reach the prefix 192.168.0.0/16 over two exit
points: through R2 and R3 routers. Which two options must be configured on the R1 router to
achieve this goal? (Choose two.)

A. The BGP maximum path feature must be configured on R1.


B. The BGP PIC core must be enabled on R1
C. Weight, local-pref, MED, as-path length, origin, and the BGP next-hop IGP cost must be the
same for the R2 and R3 IBGP updates to R1.
D. The BGP Link Bandwidth feature must be applied on R1.
E. BGP extended community exchange must be enabled between IBGP neighbors.

Answer: A, C

QUESTION NO: 55
An engineer has just configured IOS-XR with out-of-band MPP. Which are the three results that
will occur? (Choose three.)

A. Management traffic to RP from all non-MPP interfaces is dropped


B. RP/DRP Ethernet Interfaces are not default out-of-band interfaces.
C. MPP configuration changes doesnt affect active sessions established before the changes
D. Interfaces configured for out-of-band MPP are still part of global routing/forwarding
E. If MPP is disabled and a protocol is activated, all interfaces cannot pass traffic
F. LPTS will provide rate limiting
Answer: A, C, F

QUESTION NO: 56
Refer to the exhibit. The Service Provider is deploying Internet service to its VRF customers by
using vrf INTERNET. A dedicated firewall provides NAT functionally towards the Internet.
Assume that IP address overlapping between VRFs is not an issue.

Which three configuration steps are required to add Internet service to the VRF customers?
(Choose three.)

A. Export the RD of vrf INTERNET from all customer VRFs.


B. Originate a default route on PE4 in vrf INTERNET.

C. Import the RD from vrf INTERNET in all customer VRFs.


D. Originate a default route on the firewall in vrf INTERNET.
E. Import the VRF INTERNET Route Target in all customer VRFs.
F. Import the Route Target of all customer VRFs in vrf INTERNET.
G. Leak all VRF routes to the global routing table.

Answer: B, E, F

QUESTION NO: 57 DRAG DROP


Drag and drop the MPLS operation listed on the left to the correct order of the operation on
the right.

Answer:
1. Existing Routing Protocols establish reachability to destination networks
2. LDP established label to destination network mappings
3. Ingress edge LSR receives packet, performs layer 3 value-added services, and labels
packets.
4. LSR switches packets using Label Swapping
5. Edge LSR at egress removes label and delivers packets

QUESTION NO: 58
QoS is applied on an outgoing interface as shown below:
policy-map COS-OUT
class DATA
random-detect dscp-based
random-detect exponential-weighting-constant 9
random-detect dscp 26 39 117 30
random-detect dscp 28 19 35 20
What will the QoS result be for egress traffic with an average queue depth of 40 that is marked
as DSCP AF32?

A. Traffic will be dropped with a random rate less than the one defined by MPD.
B. All traffic will be tail dropped.
C. Traffic will be dropped with a rate of 1 packet out of 20.
D. Traffic will be dropped with a rate of 1 packet out of 30.

Answer: B

QUESTION NO: 59
Refer to exhibit. NAT64 stateless configuration has been applied on RT1 router. The NAT64
prefix stateless used on this scenario is 2001:DB8:2::/96. Host IPv4 only needs to test the
connectivity with Host IPv6 only using a ping command. Which is the correct ping command
Host IPv4 only should use?

A. ping 27.1.1.10
B. ping 27.1.1.10 source 2001:db8:2::7001:10A
C. ping 2001:db8:2::7001:10A
D. ping 2001:db8:2::112.1.1.10
E. ping 2001:db8:2::27.1.1.10
F. ping 2001:db8:2::1B01:10A

Answer: A

QUESTION NO: 60
Which is the RP address of the IPv6 multicast address FF76:0:130:1234:5678:9abc::4321?

A. 4321:5678:9abc::30
B. 4321:5678:9abc::13
C. 1234:5678:9abc::130
D. 1234:5678:9abc::1
E. 1234:5678:9abc::13

Answer: D

QUESTION NO: 61
A Server Provider is seeing an increasing amount of attacks against its customers. For which
kind of attack would an engineer want to design a Backscatter Traceback solution?

A. Rogue DNS/DHCP Servers


B. IP Spoofing
C. Ping of Death
D. Distributed Denial of Service
E. Network Attack TCP/UDP Scan
Answer: B

QUESTION NO: 62
Which QoS method is available when GRE is used to provide MPLS VPN services over an IP-only
core?

A. matching MPLS EXP on the physical interface


B. matching EXP on the tunnel interface
C. matching DSCP on the physical interface
D. matching DSCP on the tunnel interface

Answer: C

QUESTION NO: 63
A Service Provider wants to extend MPLS WAN endpoints in the cloud at the edge of a
customer network within the cloud. Which platform will meet this requirement?

A. Cisco NX-OS
B. Cisco CSR1000v
C. Cisco ISR Routers running IOS
D. Cisco CRS-1
E. Cisco ASR Routers running IOS-XR
Answer: B

QUESTION NO: 64
Refer to the exhibit. In the short-pipe QoS mode, this customer has QoS control for which two
links? (Choose two.)

A. a
B. c
C. d
D. b
E. e

Answer: A, E

QUESTION NO: 65
MPLS Service Providers use Route Distinguishers and Route Targets as methods to control
routing for customer VRFs. Which two statements are true about Route Distinguishers and
Route Targets? (Choose two.)

A. Route Targets are values that are used by a PE router to uniquely identify a VRF within its
local MP-BGP VPNv4 table.
B. Route Distinguishers are used by PE routers by exporting and importing routes into a local
VRF.
C. Route Targets are used by PE routers to define how to import and export prefixes into a local
VRF database.
D. Route Targets are extended communities that are used by MP-BGP to identify routes as they
are advertised to neighbor PE routers.
E. Route Distinguishers are values that are used by a PE router to uniquely identify a VRF within
its local MP-BGP VPNv4 table.

Answer: C, E

QUESTION NO: 66
Refer to the exhibit. OSPFv3 is already running, and R1 has added a new subnet (loopback 11).
What is the reason code on R4 when executing the command show ipv6 ospf statistics?

A. P (partial)
B. N (network)
C. R (router)
D. L (link)

Answer: C

QUESTION NO: 67
A network engineer is designing the BGP architecture with a requirement of preventing the AS
from becoming a Transit AS path, using the following configuration:
router bgp 65000
neighbor 10.0.0.1 route-map BGP-ROUTE-POLICY in
The goal is to prevent routes learned from 10.0.0.1 from being advertised to any other eBGP
peering in the AS 65000. What command should be used within the route map to achieve this
goal while keeping existing route policies in place?

A. set community no-export additive


B. set community no-advertise
C. set community no-advertise additive

D. set community no-export

Answer: A

QUESTION NO: 68
An IS-IS enabled router with multiple IS-IS neighbors is required to have BFD sessions with all
neighbors. Which BFD mode should you use when you want to save the overhead of periodic
protocol control packets?

A. echo
B. asynchronous
C. demand
D. active

Answer: C

QUESTION NO: 69
A Service Provider is designing control policies at the customer edge of the network, in order to
prevent usage that exceeds the contracted terms. A new client that is contracted for only 2
Gbps is connecting to the Service Provider edge with a 10 Gbps interface. Which two QoS
strategies meet the design goal? (Choose two.)

A. On the service Provider edge, enable traffic shaping on the customer port.
B. On the customer edge device, enable traffic shaping on the interface that is connected to the
Service Provider.
C. On the customer edge device, enable policing on the interface that is connected to the
Service Provider.
D. On the service Provider edge, enable policing on the customer port.
E. On the service Provider edge, enable WRED on the customer port.

F. On the customer edge, enable WRED on the interface that is connected to the Service
Provider.

Answer: B, D

QUESTION NO: 70
SSO was configured on a Cisco ASR 1006 Router by using two RPs. When the main RP failed, a
service disruption occurred. What are two reasons that the SSO did not work? (Choose two.)

A. The standby RP has a different DRAM configuration than the primary RP.
B. HSRP and NSF are not configured.
C. The ESP that is installed in the Cisco ASR 1006 Router does not support SSO.
D. The standby RP was not ready to switch over when the primary RP failed.
E. The standby RP has a different IOS version than the primary RP.

Answer: B, E
QUESTION NO: 71
A Service Provider connects to a client site that has two CEs. These CEs have a backdoor link for
backup. OSPF is used as the routing protocol in this environment. You want to ensure that
client traffic prefers the service provider connections for routing instead of the secondary
connection. Which option describes the default behavior and the action that accomplishes your
goal?

A. The routes to the Service Provider are not preferred, due to the increased OSPF cost through
the service provider network. Ensure that the cost on the links to the service provider are lower
than the secondary connection.
B. The routes to the Service Provider are seen as external type 1 in the OSPF database.
Configure a domain ID that is the same across all PEs, to ensure that customers see routes as
intra-area.
C. The routes to the Service Provider are seen as inter-area OSPF routes through the network.
Configure a sham link to create a new intra-area path across the service provider network
between the PE routers that service the client.

D. The routes to the Service Provider are seen as equal and cause nondeterministic traffic
patterns. Ensure that the secondary connection has a higher cost than the links to the service
provider.

Answer: C

QUESTION NO: 72
An engineer is working to provide high availability to a Service Provider core network. Which
BGP command enables a backup path to be installed in the RIB and CEF tables?

A. maximum-paths ibgp
B. bgp additional-paths install
C. maximum-paths eibgp
D. bgp additional-paths select
E. bgp advertise-best-external

Answer: B

QUESTION NO: 73
Which two flexible service mapping features that are used on the ES40 line card can classify
traffic into different service instances, in order to consume fewer VLANs? (Choose two.)

A. CoS
B. DSCP
C. IP precedence
D. MPLS experimental bit
E. ToS
F. EtherType

Answer: A, F

QUESTION NO: 74
Refer to the exhibit.

When a traceroute is performed from a PC behind R2, the next hop on R1 for IPv4 is 10.0.1.2,
and for IPv6 it is 2001:DB8:2:2. What is causing thus behavior?
A. GigabitEthernet2/1 has a Level 1-only adjacency. This causes it to be the preferred path for
the IPv6 packets.
B. When SPF ran on R2, it calculated two equal paths to R1. It was a coincidence that than the
packets choose different paths.
C. Multitopology is enabled on R2, which causes the IPv6 packets to use a different path than
the IPv4 packets.
D. 2001:DB8:2::2 is on a Gigabit Ethernet interface. Because its speed is higher than Fast
Ethernet, the IS-IS metric is preferred.

Answer: C

QUESTION NO: 75
What are the four key design requirements for mobile IP backhaul? (Choose four.)

A. X2 interface turning point


B. bandwidth
C. Layer 2 Tunneling
D. native IPv6 support
E. DiffServ QoS
F. MPLS-enabled interface
G. network timing distribution and recovery
H. mandatory Layer 3 access up to a cell site
Answer: C, D, G, H

QUESTION NO: 76
Refer to the exhibit. The Service Provider does not have IPv6 support in the core, however it
does have MPLS support. Customer requires IPv6 connectivity in all sites including Internet
access. Without a requirement to create VRF, which method is preferred to support IPv6 traffic
between these sites?

A. 6VPE
B. H-VPLS
C. L2TPv3

D. VPLS
E. 6CE
F. 6PE

Answer: F

QUESTION NO: 77
Refer to the exhibit. R1 and R2 are multicast routers running PIM over Serial1/0. The PIM
adjacency on R1 is not forming with the given configuration. What command can be entered on
R1 to resolve the issue?

A. no access-list 100 deny 103 any any


B. no access-list 100 deny udp any any eq 103
C. no access-list 100 deny ip any host 224.0.0.1
D. no access-list 100 deny ip any host 224.0.0.2

Answer: A

QUESTION NO: 78
A company is deciding between an HVR and SVR solution in order to finalize a virtualization
project proposal. Which is an advantage of a HVR solution versus a SVR solution?

A. A HVR solution implements dedicated data plane resources.


B. A HVR solution implements shared control plane resources.
C. A HVR solution introduces significant contention of resources.
D. A HVR solution implements dedicated chassis resources.

Answer: A
QUESTION NO: 79
Two Service Providers are beginning a merger between AS boundaries to provide MPLS-enabled
services between their networks. Customers are using both Service Providers for services and,
under certain circumstances; there are requirements to extend Layer 2 VPN circuits between
each provider. The providers are in the process of completing the technical merger. However,
the MPLS is not supported between the providers. Which action allows MPLS Layer 2 VPN
circuits to be built over the inter-AS link?

A. Create a GRE tunnel with the mpls ip command between ASBRs.


B. Create Layer 2 VPN peerings between PE routers from each provider.
C. Create a VPNv4 peering between ASBRs to advertise labels between each provider.
D. Create a sham link between ASBR routers to enable a superbackbone peering for Layer 2
VPN signaling.

Answer: A

QUESTION NO: 80
Refer to the exhibit. Which IOS command under the BGP VPNv4 address family implements a
secondary backup path to the destination 192.168.1.1?

A. maximum-paths ibgp2
B. bgp additional-paths install
C. bgp recursion host
D. bgp advertise-best-external

Answer: B
QUESTION NO: 81
Refer to the exhibit. Router RT1 has three equal-cost paths back to the source. Which
configuration should be applied in order to load-balance the multicast traffic across all three
links.

A. Create three static multicast routes where each pointing out to one or three interfaces.

B. Enable PIM multipath.


C. Create a tunnel interface between RT1 and RT2. Enable PIM on the interface tunnel and
disable PIM on the three interfaces part of equal-cost path between RT1 and RT2.
D. PIM load balance is not possible. PIM only chooses one interface for RFC check and prunes
the other interfaces.

Answer: C

QUESTION NO: 82
Refer to the exhibit. R3 cannot install a route to R1-R2 subnet 2001:1:155:12::/64. Which action
resolves this issue?

A. Add the redistribute ospf 1 include-connected command under the ipv6 router eigrp 10
process.
B. For the OSPF process, add the no shutdown command.
C. For prefix-list OSPF_INTO_EIGRP seq 20, replace the prefix with 2001:155:1:12::/64.
D. For route-map OSPF_INTO_EIGRP, add the set metric 1000 1 255 1 1500 command.

QUESTION NO: 83
A network administrator wants to implement an IP dampening feature for a network. Which
parameter identifies how fast the accumulated penalty can decay exponentially?

A. reuse threshold
B. suppress threshold
C. half-life period
D. maximum suppress time

Answer: C

QUESTION NO: 84
Refer to the exhibit. Which statement is true?

A. This is an interautonomous unicast route.


B. The BGP MED value is 26.
C. This is an mVPN route.
D. The route target value is 10.1.100.2:3.
E. There is a route reflector in this network.

F. The route did not import this route into the VRF one.

Answer: E

QUESTION NO: 85
Which is the main goal of BGPsec regards to improve BGP security?

A. Reduces risk of improper route propagation from unauthorized AS numbers


B. Configures BGP route verification by storing routes in a database used to validate AS
numbers
C. Adds encryption to route propagation outside the iBGP AS
D. Increases legitimacy and authenticity of BGP advertisements

Answer: D

QUESTION NO: 86
Refer to the exhibit. R2 and R3 cannot install IS-IS IPv6 routes. What is the root cause?

A. R2 is missing the metric-style wide command under the IS-IS process.


B. R3 is missing the multi-topology transition command under the IS-IS address-family IPv6
process.
C. R2 is missing the multi-topology command under the IS-IS address-family IPv6 process.
D. R3 is missing the metric-style wide command under the IS-IS process.

Answer: B

QUESTION NO: 87
What BGP feature improves on DDOS mitigation by allowing instructions that are more granular
and allow for source address, destination, address, L4 details, and packet specifics to be
analyzed?

A. RCMD
B. RTBH
C. BGP Flowspec
D. BGPSec

Answer: C

QUESTION NO: 88
When troubleshooting a DoS attack, a support engineer finds a huge number of packets that
are destined to one of the core routers interface IP address. By the time the packets reach this
core router, they have a TTL of 0. Based on Cisco platform running IOS 15.3S, which technique is
most effective in resolving this problem?

A. Configure LPTS.

B. Configure an ACL on the core router interface.


C. Configure CoPP on the core router.
D. Configure policing on PE routers.
E. Configure a receive ACL on the core router.

Answer: C
QUESTION NO: 89
Refer to the exhibit. A web server is connected to a switch via two Gigabit Ethernet links. These
two links are bundled into a single logical link that provides the aggregate bandwidth of 2 Gbps.
The support engineer notices that traffic from the Internet to the web server uses both Gigabit
Ethernet links. However, traffic from the web server to the Internet uses only one link.
Which CLI command on the exhibit causes this behavior?

A. lacp port-priority 32768 in interface configuration mode


B. channel-group 5 mode passive
C. lacp port-priority 32768 in global configuration mode
D. port-channel load-balance dst-mac

Answer: D

QUESTION NO: 90
Due to recent acquisitions, a companys MPLS infrastructure is growing very quickly. Concerns
arise about labeling each and every IP address on the P router. Which command would
significantly reduce the label allocations without compromising LDP functionalities?

A. ip prefix-list List1 deny prefix/prefix_length


!
mpls ldp label
allocate global prefix-list List1
B. mpls ldp label
allocate global host-routes
C. access-list 1 permit subnet wildcard
mpls ldp neighbor neighbor_ip labels accept 3
D. mpls ldp password required for 10
!
access-list 10 permit host_ip_1
access-list 10 permit host_ip_2
access-list 10 permit host_ip_n

Answer: A

QUESTION NO: 91 DRAG DROP


Drag and drop the IPFIX terminology on the left to the correct description on the right. Not all
options will be used.

Answer:
Generates Flow Records Metering process
Sends flow records Exporting process
Receives Flow Records Collecting Process

QUESTION NO: 92
Refer to the exhibit. The configuration in the exhibit redistributes static route 172.16.0.0/24
into BGP. Which action does the route-map STATIC-TO-BGP do?

A. Route 172.16.0.0/24 cannot be sent to the Internet.


B. Route 172.16.0.0/24 cannot be re-advertised beyond its neighbors.
C. Route 172.16.0.0/24 cannot be advertised outside of AS 100.
D. Route 172.16.0.0/24 cannot be exported from BGP to another protocol.

Answer: C

QUESTION NO: 93
Refer the exhibit. Two Autonomous Systems are enabled to support multicast. An engineer
wants to set up configuration so that a multicast client at AS 100 can receive multicast traffic
from the M-Server at AS 200. However, the RP announcements must be limited within each
autonomous system site. Which Cisco IOS configuration achieves this goal?

A. On both ASBRs Eth0/0 and the no ip pim sparse-mode command.


B. On both ASBRs add the ip pim send-rp-discovery scope 1 command.
C. On both RPs add the ip pim send-rp-discovery scope 2 command.
D. On both ASBRs Eth0/0 and the ip pim bsr-border command.
E. On both ASBRs Eth0/0 and the ip pim dense-mode command.
F. On both RPs add the ip pim bsr-border command.

Answer: D

QUESTION NO: 94
Two Tier 2 Service Providers are using a Tier 1 Service Provider for transport. MPLS is required
between the Tier 2 Service Providers for label switching. In this CSC solution, which label stack
is correct?
A. original IP packet, MPLS CSC transport label, MPLS VPN label, and MPLS Tier 2 transport label
B. original IP packet, MPLS Tier 2 transport label, MPLS VPN label, and MPLS CSC transport label
C. original IP packet, MPLS VPN label, MPLS Tier 2 transport label, and MPLS CSC transport label
D. original IP packet, MPLS Tier 2 transport label, MPLS CSC transport label, and MPLS VPN label
E. original IP packet, MPLS VPN label, MPLS CSC transport label, and MPLS Tier 2 transport label

Answer: E

QUESTION NO: 95
For MPLS inter-AS Option B, how many labels are associated with packet forwarding between
the VPNv4 ASBR neighbors?

A. 0
B. 1
C. 2
D. 3

Answer: B
QUESTION NO: 96

Which two statements about 10 Gigabit Ethernet WAN PHY mode are true? (Choose two.)

A. The signal maps to an OC-192c/STM-64c payload.


B. The nominal speed is 9.95328 Gbps.
C. It is compatible with Packet Ethernet over SONET.
D. The signal maps to an OC-768c/STM-256c payload.
E. It is compatible with Packet over SONET.
F. The nominal speed is 10.3125 Gbps.
Answer: A, B

QUESTION NO: 97
In a secure domain router scenario, which two functions are shared amongst all SDR in the
system? (Choose two.)
A. configuration
B. protocols
C. routing tables
D. chassis-control
E. switch-fabric

Answer: D, E
QUESTION NO: 98
In which way does the DS-Lite IPv6 transitioning mechanism differ from IPv6 Dual-Stack?

A. DS-Lite is a combination of tunnel and translation technologies.


B. DS-Lite is a transition technology that gives full IPv6 connectivity for IPv6 capable hosts that
are on the IPv4 Internet but have no native connection to an IPv6 network.
C. DS-Lite is an automatic tunnel where the tunnel destination is determined by the IPv4
address extracted from the IPv6 address that starts with the prefix 2002::/16.

D. DS-Lite is a stateless tunneling mechanism with a lightweight and secure manner without
requiring upgrades to existing IPv4 access network infrastructure.

Answer: A

QUESTION NO: 99
What is the main advantage of H-VPLS over VPLS?

A. H-VPLS provides redundancy.


B. H-VPLS provides security.
C. H-VPLS improves the scalability.
D. H-VPLS allows a broader use of protocols.

Answer: C

QUESTION NO: 100


Which MPLS technology will achieve LAN extensions over the service provider backbone?

A. AToM
B. VPLS
C. L2VPN
D. L2TPv3

Answer: B

QUESTION NO: 101


Which two statements about forwarding equivalence class (FEC) are true? (Choose two)

A. FEC might correspond to a destination IP subnet, but it might also correspond to any traffic
class that the edge LSR considers significant.
B. FEC is a group of IP packets that is forwarded over a different path, but with the same
forwardingtreatment.
C. FEC is a group of IP packets that is forwarded over the same path, and with the same
forwarding treatment. D. FEC is a group of IP packets that is forwarded over a different path,
but with the different forwarding treatment.
E. FEC is a group of IP packets that is forwarded over the same path,but with a different
forwardingtreatment.
Answer: A,C

QUESTION NO: 102


Cisco IOS XR has implemented a nonstop routing feature so that when RP failover occurs, the
routing information can be recovered locally. Which protocol does not support the NSR
feature?
A. OSPF
B. LDP
C. BGP
D. IS-IS
E. RSVP

Answer: E

QUESTION NO: 103


What is the minimum hardware configuration of the multishelf Cisco CRS-1 system?
A. One route processor (RP) card and one modular services card (MSC)
B. One distributed route processor (DRP) and one S13 fabric card (SFC)
C. One line card chassis (LCC) and one fabric card chassis (FCC)
D. One route processor (RP) and one fabric card chassis (FCC)

E. One line card chassis (LCC) and one S13 fabric card (SFC)
Answer:C

QUESTION NO: 104


Which information is carried in the OSPFv3 intra-area Prefix LSA?
A. All link-local addresses
B. All IPv6 prefix and topology information that OSPFv2 included in Router LSA and Network LSA
C. List of options associated with the link to all other routers attached to the link
D. All prefix-specific information that OSPFv2 included in Router LSA and Network LSA
Answer: D

QUESTION NO: 105


Refer to the exhibit
An ISP engineer has been asked to identity a method to protect the PE and to control the
number of BGP prefixes learned from his customers. The BGP session should be dropped if the
PE router receives more than 1000 BGP prefixes. A syslog message should be generated when
the number of BGP prefixes learned from CE exceeds 850.
Which Cisco IOS command should the engineer apply on PE routers?
A. neighbor 10.1.1.2 maximum-prefix 1000 85
B. neighbor 10.1.1.2 maximum-prefix 1000 850
C. neighbor 10.1.1.2 maximum-prefix 1000 85 warning-only
D. neighbor 10.1.1.2 maximum-prefix 1000 850 warning-only
Answer: A

QUESTION NO: 106


In a frame, the MPLS label is imposed where?
A. Before the layer 2 header
B. Within the Layer 3 header

C. After the Layer3 header and before Layer2 header


D. After the Layer2 header and before Layer3 header
Answer: D

QUESTION NO: 107


BGP best route selection process is based on what?
A. path attributes
B. lowest cost
C. highest bandwidth
D. lowest delay
E. lowest hop-count
Answer: A

QUESTION NO: 108


What is one difference between H-VPLS and VPLS ?
A. H-VPLS reduces signaling overhead and packet replication requirements for the provider
edge
B. VPLS connect usingg Ethernet encapsulation only an d H-VPLS using also other LAYER-2
encapsulation such as PPP
C. VPLS improve scalability concern identify on H-VPLS implementation
D. VPLS is a point-to-point Layer-2 service and H-VPLS is a multipoint Layer-2 services

Answer: A

QUESTION NO: 109


In which Scenario is the BGP Accumulated IGP feature required ?
A. When BGP Link-State feature is enabled and it is required for BGP link state data to be
downloaded to another component to the router.

B. When a more granular approach is required to effectively construct instruction to match a


particular flow with source and destination in order to mitigate DDoS which remote triggered
blackhole technique is not able to provide.
C. When multipaths are available and the cost community is required to influency the BGP best
path selection process at the point of insersation
.
D. when the bandwidth is available on each of the core links is mapped to the OSPF cost and
BGP is required to carry this information of the PE devices simulating the OSPF behavior of
computing the distance associated with the path.
Answer: D

QUESTION NO: 110


MPLS L3VPN Over GRE , please drag & drop the label stack from top(inner) to bottom(outer)
Answer:

1.Client IP header
2.MPLS VPN label
3.MPLS transport label
4.GRE header
5.Ethernet Transport
QUESTION NO: 111
The diagram was R1 connected to R2 and R2 connected to R3 on ospf area 0

Refer to the exibit OSPF is already running with default parameters. If R1 already have loopback

0 & Router-ID configured with that loopback address, then what will SPF computation on R2
after adding R1 one more loopback11 on OSPF?

1. Beacuse 10.11.11.11/32 prefix information will be an LSA type 3 on R2 router 's database ,
R2 router will run partial SPF computation.
2 Beacuse 10.11.11.11/32 prefix will a LSA type 1 on R2 router's database. R2 router will a full
SPF computation, even though an OSPF optimization is applied on R2 router.
3. Adding ispf on command on R2 router, the entire SPT will be computed on R2 router.
4. Adding ispf on command on R2 router, R2 router will only recompute only the affected part
of the tree.
Answer: D

You might also like