2014年9月21日 星期日

CCIE SP VIRTUAL LAB USING CISCO XRV

The following steps show how to get your Virtual CCIE SP lab based on INE topology. The screenshots are based on VMware Workstation 10 running on Windows 7.


Step 1. Download IOS XRv (iosxrv-demo-5.1.1.vmdk) from the following location.  You need to have  Cisco SSO account to be able to download.



Step 2. Running XRv in VMware Workstation 10
a. Fire up VMware Workstation, Edit > Virtual Network Editor, configure as below:
1.png


b. VMware Workstation, File > New Virtual Machine (Ctrl +N), select Custom (advanced), then click next.
2.png
c. Select I will install the operating system later
3.png
d. Choose Other > Other option for Guest Operating System, then provide your VM a name and select appropriate location
4.png
e. Leave the Processor Configuration to default (1)
5.png
f. Allocate 3GB of memory (Cisco’s recommendation but 2 GB is works) to each XRv Virtual Machine.
6.png
g. Select Network Type to Use host-only networking, then click next (default), next (default)
7.png
h. Select Use an existing virtual disk, click next, point to the XRv image filename you have downloaded earlier. Next, and click Keep Existing Format, click Finish
8.png
i. Right-click on your Virtual Machine name you have created earlier, Select settings, XRv1 and XRv2 have to have the following settings respectively.
Network Adapter2(VMnet1) <—> XRv1_g0/0/0/0
Network Adapter3(VMnet3) <—> XRv1_g0/0/0/1
Network Adapter4(VMnet5) <—> XRv1_g0/0/0/2
Network Adapter5(VMnet6) <—> XRv1_g0/0/0/3
Network Adapter2(VMnet2) <—> XRv2_g0/0/0/0
Network Adapter3(VMnet4) <—> XRv2_g0/0/0/1
Network Adapter4(VMnet5) <—> XRv2_g0/0/0/2
Network Adapter5(VMnet6) <—> XRv2_g0/0/0/3
XRv1:
9_1.png
XRv2:
9_2.png
j. Each XRv has to have a serial port. Set serial ports as follows:
XRv1:
10_1.png
XRv2:
1-_2.png
k. Navigate to your VM folder and open XRv1.vmx (your VM name) file and add the following:
ethernet0.virtualDEV = “e1000″
ethernet1.virtualDEV = “e1000″
ethernet2.virtualDEV = “e1000″
ethernet3.virtualDEV = “e1000″
ethernet4.virtualDEV = “e1000″

example:

more...
....

ethernet0.present = "TRUE"
ethernet0.virtualDev = "e1000"
ethernet0.connectionType = "bridged"
ethernet0.startConnected = "TRUE"
ethernet0.addressType = "generated"
ethernet1.present = "TRUE"
ethernet1.virtualDev = "e1000"
ethernet1.connectionType = "custom"
ethernet1.startConnected = "TRUE"
ethernet1.addressType = "generated"
toolscripts.afterpoweron = "true"
toolscripts.afterresume = "true"
toolscripts.beforepoweroff = "true"
toolscripts.beforesuspend = "true"
extendedConfigFile = "R3.vmxf"
virtualHW.productCompatibility = "hosted"
uuid.bios = "56 4d 08 e6 c9 7e 1b c9-f1 66 63 3e f1 db 6a 52"
uuid.location = "56 4d 08 e6 c9 7e 1b c9-f1 66 63 3e f1 db 6a 52"
replay.supported = "FALSE"
replay.filename = ""

ide0:0.redo = ""
pciBridge0.pciSlotNumber = "17"
pciBridge4.pciSlotNumber = "21"
pciBridge5.pciSlotNumber = "22"
pciBridge6.pciSlotNumber = "23"
pciBridge7.pciSlotNumber = "24"
ethernet0.pciSlotNumber = "32"
ethernet1.pciSlotNumber = "33"
vmci0.pciSlotNumber = "34"
ethernet0.generatedAddress = "00:0c:29:db:6a:52"
ethernet0.generatedAddressOffset = "0"
ethernet1.generatedAddress = "00:0C:29:DB:6A:5C"
ethernet1.generatedAddressOffset = "10"
vmci0.id = "-237278638"
monitor.phys_bits_used = "40"
vmotion.checkpointFBSize = "33554432"
cleanShutdown = "TRUE"
softPowerOff = "FALSE"
ethernet1.vnet = "VMnet5"
ethernet2.present = "TRUE"
ethernet2.vnet = "VMnet4"
ethernet2.connectionType = "custom"
ethernet2.addressType = "generated"
ethernet3.present = "TRUE"
ethernet3.vnet = "VMnet14"
ethernet3.connectionType = "custom"
ethernet3.addressType = "generated"
ethernet4.present = "TRUE"
ethernet4.vnet = "VMnet13"
ethernet4.connectionType = "custom"
ethernet4.addressType = "generated"
ethernet5.present = "TRUE"
ethernet5.vnet = "VMnet6"
ethernet5.connectionType = "custom"
ethernet5.addressType = "generated"
ethernet2.pciSlotNumber = "35"
ethernet3.pciSlotNumber = "36"
ethernet4.pciSlotNumber = "37"
ethernet5.pciSlotNumber = "38"
ethernet2.generatedAddress = "00:0c:29:db:6a:66"
ethernet2.generatedAddressOffset = "20"
ethernet3.generatedAddress = "00:0c:29:db:6a:70"
ethernet3.generatedAddressOffset = "30"
ethernet4.generatedAddress = "00:0c:29:db:6a:7a"
ethernet4.generatedAddressOffset = "40"
ethernet5.generatedAddress = "00:0c:29:db:6a:84"
ethernet5.generatedAddressOffset = "50"
ethernet2.virtualDev = "e1000"
ethernet3.virtualDev = "e1000"
ethernet4.virtualDev = "e1000"
ethernet5.virtualDev = "e1000"
serial0.present = "TRUE"
serial0.fileType = "pipe"
serial0.fileName = "\\.\pipe\xr3"
serial0.tryNoRxLoss = "TRUE"
floppy0.present = "FALSE"

toolsInstallManager.updateCounter = "1"


more...
....

Perform this step to both the XRv Virtual Machines.



Step 3: Install Named Pipe TCP Proxy and configure as follows:
http://shvechkov.tripod.com/nptp.html
11_1.png
11_2.png



Step 4. Start the VMs (XRv1 and XRv2) and log-in using either putty or SecureCRT as follows:
12.png


Source http://packetsandframes.com/2014/04/18/building-ine-ccie-sp-virtual-lab-on-cisco-xrv-and-iou-web-2/#comment-29

2014年9月12日 星期五

CCIE SP 350-029 Question 380-421

CCIE SP Written Exam (Version 3.0)



Number: 350-029
Passing Score: 790
Time Limit: 120 min
File Version: 421Q+69







QUESTION 381
Which two statements about 6RD are true? (Choose two.) 
A. The 6RD customer edge device forwards all packets to the 6RD border relay. 
B. The 6RD customer edge device can forward packets destined to other 6RD customer edge devices outside the local 6RD domain without traversing the 6RD
border relay. 
C. Packets between 6RD customer edge devices in the same 6RD domain do not need to traverse the 6RD border relay. 
D. Packets received from a 6RD domain can easily be identified as such on the IPv6 Internet. 
E. The entry point into the local 6RD domain is deterministic. 














Correct Answer: CE




QUESTION 382
Which statement about implementing the Cisco IPv6 provider Edge Router over MPLS is true? 
A. 6PE feature is supported over tunnels other than RSVP-TE tunnels. 
B. Core MPLS routers are supporting IPv6 only. 
C. 6PE feature is not supported over tunnels other than RSVP-TE tunnels. 
D. Core MPLS routers are supporting IPv4 only. 

















Correct Answer: C




QUESTION 383
Which are three advantages of PPPoA implementation? (Choose three) 
A. NAP and NSP provide secure access to corporate gateways without managing end-to-end PVCs. NAP and NSP use Layer 3 routing, Layer 2 Forwarding, or Layer 2 Tunneling Protocol tunnels. Hence, they can scale their business models for selling wholesale service. 
B. The NSP can oversubscribe by deploying idle and session timeouts using an industry standard RADIUS server for each subscriber. 
C. Only a single session per CPE on one virtual channel (VC). The username and password are configured on the CPE, so all users behind the CPE for that
particular VC can access only one set of services. Users cannot select different sets of services, although using multiple VCs and establishing different PPP
session on different VCs is possible. 
D. If a single IP address is provided to the CPE, and NAT or PAT is implemented, certain pplications such as IPTV, which embed IP information in the payload,
well not work. Additionally, if an IP subnet feature is used, an IP address also has to be reserved for the CPE. 
E. PPPoA can use the features on the Cisco Service Selection Gateway (SSG) 










Correct Answer: ABE



QUESTION 384
Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP. 
A. Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCI. 
B. Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop
protoco address or the DLCI for outgoing traffic. 
C. Inverse ARP is enabled by default for all protocols enabled on the physical interface. 
D. Inverse ARP is configured using the following command under the Interface configuration 'frame-relay mapdlci (dlci number) protocol protocol-address'. 
E. Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet. 









Correct Answer: ABC



QUESTION 385
Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? (Choose three.) 
A. PW capabilities list 
B. Message type 
C.Assigned control connection ID 
D. PW type 
E. Remote session ID 
F. Hostname 








Correct Answer: BDE



QUESTION 386
Which four services use the inner labels of an MPLS label stack? (Choose four) 
A. MPLS VPN 
B. switching path in MPLS core 
C. Cisco MPLS Traffic Engineering and Fast Reroute 
D. MPLS over ATM 
E. VPN over Traffic Engineering core 
F. any transport over MPLS 












Correct Answer: ACEF



QUESTION 387
The Attribute field within the IS-IS LSP header contains which of the following flags? (Choose four) 
A. IS-Type 
B. Overload (LSPDBOL) 
C. Pseudonode (PN) 
D. Attached (ATT) 
E. Fragment (Frag-Nr) 
F. Partition (P) 










Correct Answer: ABDF



QUESTION 388

Refer to the exhibit. 



Inbound Infrastructure ACLs are configured to protect the SP network. Which three types of traffic should be filtered in the infrastructure ACLs? (Choose three.) 
A. traffic from a source with an IP address that is within 239.255.0.0/16 
B. FTP traffic destined for internal routers 
C. IPsec traffic that at an internal router 

D. traffic from a source with an IP address that is within 162.238.0.0/16 
E. EBGP traffic that peers with edge routers 









Correct Answer: ABD



QUESTION 389
Which four of these statements are restrictions for Frame Relay PVC bundles with QoS support for IP and MPLS? (Choose four) 
A. A PVC bundle will not come up unless all the precedence, DSCP, and EXP levels are configured in the bundle. 
B. A PVC bundle can perform precedence and DSCP matching at the same time 
C. A PVC bundle may contain no more than sixteen PVCs 
D. A PVC can be in only one PVC bundle 
E. A PVC bundle cannot perform precedence and DSCP matching at the same time. 
F. A PVC bundle may contain no more than eight PVCs. 











Correct Answer: ADEF



QUESTION 390
Option 10C is an implementation of Inter-AS MPLS VPN. Which two statements about Option 10C are true? (Choose two.) 
A. Great scalability is offered 
B. Route Target Rewrite must be configured on ASBRs 
C. Multihop EBGP is utilized between route reflectors 
D. Multihop EBGP is utilized between ASBRs 
E. The ASBRs hold VPNv4 routes 











Correct Answer: AC




QUESTION 391
Which two statements best describe the signalling requirements of virtual circuit setup of VPLS and exchange of reachability information (MAC addresses)? 
A. Cisco VPLS does not require the exchange of reachability (MAC addresses) information via a signaling protocol. This information is learned from the data
plane using standard address learning, aging, and filtering mechanisms defined for Ethernet bridging. 
B. Cisco VPLS uses directed LDP as a signalling protocol to exchange reachability (MAC addresses) information to avoid maintanance of ARP cache. 
C. In Cisco VPLS the virtual circuit setup uses Multi-Protocol BGP as autodiscovery and signaling mechanism. Using BGP allows BPDUs to be propagated
across VPLS in a scaleable fashion. 
D. In Cisco VPLS the virtual circuit setup uses the same LDP signaling mechanism defined for point-to-point services. Using a directed LDP session, each
provider edge advertises a virtual circuit label mapping that is used as part of the label stack imposed on the Ethernet frames by the ingress provider edge during packet forwarding. 












Correct Answer: AD




QUESTION 392
In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups are true? (Choose three) 
A. Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic. 
B. MDTs are built in customer networks 
C. Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs. 
D. MDTs are built in provider networks 
E. The number of MDTs depends on PIM modes of MDT groups. 













Correct Answer: CDE




QUESTION 393
Which two statements about RPF checks in Multicast Source Discovery Protocol (MSDP) are true? (Choose two) 
A. RPF check should be done against the route to the source of the corresponding PIM-SM domain. 
B. Checking session advertisement (SA) messages causes messages looping. 
C. The RPF check ensures that there is a working redundancy for anycast RPs. 
D. RPF check should be done against the route to the RP of the PIM-SM domain that originated the SA. 
E. It prevents message looping, and session advertisement (SA) messages must be RPF checked. 











Correct Answer: DE



QUESTION 394
Select 3 AVPs (Attribute-Value Pair) which MUST be present in the ICRQ: 
A. Called Number 
B. Call Serial Number 
C. Message Type 
D. Calling Number 
E. Assigned Session ID 













Correct Answer: BCE



QUESTION 395
Which three statements about L2TPv3 are true? (Choose three) 
A. L2TPv3 Frame Relay support includes only 32-bit DLCI addressing. 
B. L2TPv3 sessions do not support Frame Relay LMI interworking. 
C. Multipoint DLCI is not supported. 
D. To use DCE or a Network-to-Network Interface on a Frame Relay port, you must configure the frame-relayswitching command. 
E. L2TPv3 feature does not support Frame Relay extended addressing. 











Correct Answer: CDE




QUESTION 396
Which three options are restrictions for MPLS VPN BGP Local Convergence? (Choose three.) 
A. The MPLS VPN BGP Local Convergence feature affects only traffic that is exiting the VPN. Therefore, it cannot fully protect traffic end-to-end by itself. 
B. This link protection can be initiated during a HA SSO. But links that were configured with this protection before the switchover begins remain protected after the
switchover. 
C. The MPLS VPN BGP Local Convergence feature for IPv4/IPV6 supports the eBGP, RIP, EIGRP,OSPF, and dynamic routing protocols. 
D. Any next-hop core tunneling technology that is supported by BGP is also supported for protection, including MPLS, L2TPv3, and IP/GRE. CSC protocol
between the PE and CE is also supported. Interautonomous system option A (back-to-back VRF) is supported because it is essentially the same as performing
the PE-CE link protection in both autonomous systems. However, interautonomous system options B and C protection are not supported. 
E. If you perform an in-service software downgrade from an image that does include this link protection to an image that does not support this feature, active
protection is halted when BGP routes are refreshed. 











Correct Answer: ADE



QUESTION 397
Identify the differences of option 10A, as opposed to option 10C, for interAS vpn offerings For option 10A? (Choose three). 
A. Greater scalability is offered 
B. The ASBR holds VPNv4 routes 
C. Relative technical simplicity is offered 
D. Lower relative security is offered 
E. Multihop eBGP between ASBRs is utilized 
F. Better suitability for InterProvider VPNs is provided 











Correct Answer: BCF



QUESTION 398
Which of the following descriptions about uRPF loose mode is correct? (Choose two). 
A. It is typically used on point-to-point interfaces where the same interface is used for both directions of packet flows; if the source address has a return route in
the FIB table, it is then checked against the adjacency table to ensure the same interface receiving the packet is the same interface used for the return path 
B. If a packet fails the uRPF loose mode check, the packet is then transmitted and creates a log message 
C. It is typically used on multipoint interfaces or on routers where asymmetrical routing is used (packets are received on one interface but the return path is not on
the same interface); loose mode verifies a source address by looking in forwarding information base(FIB). 
D. If a packet fails the uRPF loose mode check, the packet is then dropped 














Correct Answer: CD




QUESTION 399
Which statement about MPLS Traffic Engineering class-based tunnel selection (CBTS) is not true? 
A. Local mechanism is at the middle-point router. 
B. EXP selection is between multiple tunnels to the same destination 
C. Bundle members are configured with EXP values to carry. 
D. The tunnel selection is configured on the tunnel master. 
E. The tunnel master bundles the tunnel members 











Correct Answer: A



QUESTION 400
Option 10A (back-to-back VRF) is an implementation of inter-AS MPLS VPN. Which of four statements about option 10A are not true? (Choose four.) 
A. MPLS is required between the ASBRs. 
B. ASBR must hold all routing information. 
C. It is a scalable solution. 
D. It is a simple solution. 
E. MP-EBGP is used to exchange routes between ASBRs. 










Correct Answer: ACDE



QUESTION 401
In which of the following lists of APS Action Requests is the priority correctly arranged from lowest to highest? 
A. Wait-to-Restore, Manual Switch, Forced Switch, Lockout of Protection 
B. Wait-to-Restore, Forced Switch, Manual Switch, Lockout of Protection. 
C. Manual Switch, Wait-to-Restore, Lockout of Protection, Forced Switch. 
D. Lockout of Protection, Forced Switch, Manual Switch, Wait-to-Restore 
E. Lockout of Protection, Manual Switch, Forced Switch, Wait-to-Restore 
F. Wait-to-Restore, Manual Switch, Lockout of Protection, Forced Switch 










Correct Answer: A



QUESTION 402
In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE and CSC-CE. (Choose two) 
A. IGP and RSVP 
B. EBGPv4 with a sending community 
C. IGP and EBGPv4 
D. IGP and LDP 
E. EBGPv4 with a sending label 











Correct Answer: DE



QUESTION 403
Which two statements about DS-Lite are true? (Choose two.) 
A. IPv4 packets are carried over IPv6 tunnels to the LSN while IPv6 traffic is forwarded natively. 
B. Ipv6 packets are carried over IPv4 tunnels to the LSN while IPv4 traffic is forwards natively. 
C. The LSN performs NAT44 on private IPv4 source addresses. 
D. DS-Lite does not perform any address translation. 










Correct Answer: AC



QUESTION 404
Which three things are the building blocks of the Cisco VPLS architecture? (Choose three) 
A. VLAN Trunk Protocol (VTP) 
B. State Synchronization Protocol (SSP) 
C. L2VPN 
D. Ethernet Virtual Switch Interface (VSI) 
E. Label Distribution Protocol (LDP) 











Correct Answer: CDE




QUESTION 405
Which two statements about OSPF IPv6 routing are true? (Choose two) 
A. It requires OSPF version 3. 
B. automatically detects neighbors over NHMA interfaces 
C. It supports encryption using 
D. It uses LSA type 9 
E. It uses LSA type 8 










Correct Answer: AE




QUESTION 406
Which three configuration options are available for configuring the l2tp-class command in L2TPv3? (Choose three) 
A. TCP port 
B. authentication 
C. IP DF bit 
D. retransmit retries 
E. sequencing 
F. hostname 













Correct Answer: BDF




QUESTION 407
Which two statements about the bgp deterministic-med and bgp always-compare-med commands are true? (Choose two) 
A. The bgp deterministic-med command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS
path length 
B. The bgp always-compare command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS
path system. 
C. Enabling the bgp deterministic-med command ensures the comparison of the MED variable when choosing routes advertised by different peers in the same
autonomous system. 
D. Enabling the bgp always-compare-med command ensures the comparison of the MED variable for paths from neighbors in different autonomous systems. 
E. The bgp deterministic-med and bgp always-compare-med commands are enabled by defult. 













Correct Answer: CD



QUESTION 408
Which three options are functions of the Cisco Service Control Engine? (Choose three.) 
A. intelligent inspection and control of IP packets 
B. application of session-level bandwidth shaping 
C. provisioning of access aggregation 
D. per-subscriber bandwidth management 
E. Implementation of VPN services 











Correct Answer: ABD



QUESTION 409
All secure domain routers (SDRs) have shared attribute and resources. Which three resources are shared all SDRs? (Choose three.) 
A. privilege-level configuration 
B. fabric cards 
C. SNMP traps 
D. admin-level configuration 
E. exec-level configuration 











Correct Answer: BCD



QUESTION 410
Which three statements about bidirectional PIM are true? (Choose three) 
A. Traffic for a bidirectional group flows along the one shared tree and simultaneously utilizes multiple paths in a redundant network topology. 
B. It does not require any traffic signaling in the protocol 
C. Membership to a bidirectional group is signaled using explicit Join messages. 
D. It maintains source-specific forwarding state. 
E. It reduces memory, bandwidth, and CPU requirements 












Correct Answer: BCE




QUESTION 411
Which two statements are true about DPT/RPR? 
A. DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings. 
B. DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber. 
C. DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used to make best use of the Bandwidth. 
D. In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream), thus
using both fibres concurrently to maximize bandwidth. 











Correct Answer: AD



QUESTION 412
What are three common reasons for ATM CRC errors? (Choose three.) 
A. Incorrect VPI and VCI configuration 
B. Noise, gain hits, or other transmission problems on the data link equipment 
C. ATM cells are dropped due to incorrect ATM routing in the service provider. 
D. A faulty or failing ATM interface. 
E. Cells are dropped due to traffic policing in the ATM cloud on one or more virtual circuits attached to the ATM interface. 










Correct Answer: BDE



QUESTION 413
Which two statements about MPLS point-to-multipoint traffic engineering (P2MP TE) are true? (Choose two) 
A. P2MP TE uses an OSPF extension that is different from the OSPF extension that is used in P2P TE. 
B. Loose path is not supported in P2MP TE. 
C. Multiple IP multicast groups can map to one P2MP tunnel. 
D. Affinity is not supported in P2MP TE. 
E. P2MP TE uses Constrained Shortest Path First (CSPF) to calculate paths. 












Correct Answer: CE




QUESTION 414
Which statement about L2VPN Pseudowire Switching is not true? 
A. L2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across an inter- AS boundary 
B. L2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across two separate MPLS networks. 
C. Quality of service is not supported per Pseudowire 
D. L2VPN Pseudowire Switching connects two or more contiguous Pseudowires segments to from an end-to end multihop Pseudowire 
E. The Cisco MPLS Traffic Engineering tunnel selection is not supported 
















Correct Answer: E





QUESTION 415
SONET's three layers arE. (Choose three.) 
A. DS1 
B. Frame 
C. Path 
D. Line 
E. Section 












Correct Answer: CDE




QUESTION 416
Which three of these are optical channel data unit (ODU) overhead fields? (Choose three) 
A. general communication channel 0 (GCC0) 
B. section monitoring 
C. reserved (RES) 
D. general communication channels 1 and 2 (GCC1 GCC2) 
E. tandem connection monitoring activation deactivation (TCM ACT) 





QUESTION 417
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? (Choose four.) 
A. EVC infrastructure is a Layer 3 platform-independent routing architecture that supports IP over Ethernet services. 
B. Ethernet flow point (EFP) is configured on the main interface. 
C. Feature commands like MQC-based QoS policies can be specified. 
D. EVC infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet services. 
E. Each Ethernet flow point (EFP) matches a predefined VLAN tag-based criteria. 
F. Ethernet flow point (EFP) is configured on the VLAN interface. 









Correct Answer: BCDE



QUESTION 418
Which two statements about NTP version 4 are true? (Choose two)
A. It supports fast synchronization at starting and before network failures.
B. It supports automatic server discovery.
C. It uses a fixed-point arithmetic
D. It supports the "nanokernel" kernel implementation.
E. It does not support Public-Key Cryptography











Correct Answer: BD




QUESTION 419
How many bits does EXP occupy in the MPLS label header?
A. 8
B. 4
C. 3
D. 1
E. 2








Correct Answer: C



QUESTION 420
MPLS label mapping on an LSR is displayed by which IOS command?
A. Show mpls Idp neighbor detail
B. Show mpls Idp bindings
C. Show mpls Idp parameters
D. Show mpls Idp discovery








Correct Answer: B



QUESTION 421