2014年9月7日 星期日

CCIE SP 350-029 Question 151-180

CCIE SP Written Exam (Version 3.0)



Number: 350-029
Passing Score: 790
Time Limit: 120 min
File Version: 421Q+69




QUESTION 151
What is the label for MPLS over ATM?
A. VPI 16
B. DLCI
C. VPI and VCI
D. circuit number
E. PVC and SVC








Correct Answer: C




QUESTION 152
What is used as label in cell-based MPLS?

A. VPI and VCI
B. None of above
C. VCI
D. Specific 4 bytes label
E. VPI








Correct Answer: A




QUESTION 153
When should traffic shaping be implemented on Frame Relay PVCs? (Choose two)
A. When you want to drop excess traffic above the CIR
B. When there is a speed mismatch between the central site and the remote site.
C. When using Frame Relay SVCs
D. When over-subscribing the central site link
E. When LLQ is implemented on the Frame Relay PVC.
F. When Multilink PPP LFI is implemented on the Frame Relay PVC.








Correct Answer: BD




QUESTION 154
Which statement about Frame Relay is not true?
A. Static mapping is used when the remote router does not support Inverse ARP.
B. Frame Relay Inverse ARP requires LMI capability to construct an address to the DLCI mapping table on the router.
C. Frame Relay Inverse ARP is disabled by default in Cisco IOS Software for all protocols that are enabled on the physical interface.

D. Inverse ARP does not work when LMI is disabled.
E. Frame Relay provides forward and backward congestion notification messages.









Correct Answer: C



QUESTION 155
Which three are optional extensions of the Frame Relay Local Management Interface specification? (Choose three)
A. switched virtual circuit
B. virtual circuit status
C. simple flow control
D. multicasting
E. permanent virtual circuit











Correct Answer: BCD




QUESTION 156
Select the three valid LMI extension:
A. Multicasting
B. Global addressing
C. Forward-explicit congestion notification (FECN)
D. Virtual circuit status messages.
E. Backward-explicit congestion notification (BECN)






Correct Answer: ABD







QUESTION 157
In the Cisco Resilient Ethernet Protocol (REP), how many ports are always blocking?
A. zero
B. at least one
C. at least two
D. at least four
E. at least three









Correct Answer: B




QUESTION 158
Which four statements about Ethernet virtual circuit (EVC) infrastructure are true? (Choose four.)
A. EVC infrastructure is a Layer 3 platform-independent routing architecture that supports IP over Ethernet services.
B. Ethernet flow point (EFP) is configured on the main interface.
C. Feature commands like MQC-based QoS policies can be specified.
D. EVC infrastructure is a Layer 2 platform-independent bridging architecture that supports Ethernet services.
E. Each Ethernet flow point (EFP) matches a predefined VLAN tag-based criteria.
F. Ethernet flow point (EFP) is configured on the VLAN interface.









Correct Answer: BCDE




QUESTION 159

Which three of these are types of Ethernet Virtual Connections (EVCs) in the MEF concept? (Choose three)
A. rooted multipoint EVC (E-Tree)
B. point-to-point EVC (E-Line)
C. point-to-multipoint EVC (E-Tree)
D. hub spoke EVC (E-Tree)
E. multipoint-to-multipoint EVC (E-LAN)











Correct Answer: ABE




QUESTION 160
Which two statements about 10 Gigabit Ethernet (10GE) are true? (Choose two.)
A. 10 Gigabit Ethernet does not support VLAN definition
B. 10 Gigabit Ethernet supports full duplex links, but does not support half duplex links.
C. 10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connections
D. 10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD).
E. 10 Gigabit Ethernet supports optical fiber connections in single mode only. Multi mode is not supported.








Correct Answer: BC




QUESTION 161
What does the protocol field inside the PPP frame indicate?
A. the protocol used to determine the authentication method
B. the protocol used to identify the data in the Information field
C. the protocol used to carry the PPP frame
D. the protocol used to decode the FCS field

E. the protocol used to detect the number of padding bytes









Correct Answer: B




QUESTION 162
Which statement about the Link Control Protocol (LCP) is true?
A. LCP is used for basic PPP link setup and operation.
B. LCP is used for PPP CHAP authentication.
C. LCP is used for PPP over ATM (PPPoA) setup.
D. LCP is used for PPP over Ethernet (PPPoE) setup.
E. LCP is used for PPP over Frame Relay (PPPoFR) setup.










Correct Answer: A




QUESTION 163
Which four of these statements are restrictions for Frame Relay PVC bundles with QoS support for IP and MPLS? (Choose four)
A. A PVC bundle will not come up unless all the precedence, DSCP, and EXP levels are configured in the bundle.
B. A PVC bundle can perform precedence and DSCP matching at the same time
C. A PVC bundle may contain no more than sixteen PVCs
D. A PVC can be in only one PVC bundle
E. A PVC bundle cannot perform precedence and DSCP matching at the same time.
F. A PVC bundle may contain no more than eight PVCs.











Correct Answer: ADEF





Explanation/Reference:
QUESTION 164
What is the purpose of Dual Ring Interconnect with D C for SDH rings?
A. Protects signals when a ring switch fails
B. Protects signals when multiple span switches fail
C. Protects pre-emptible traffic from being dropped when a ring switch occurs
D. Protects signals against any combination of link failure in each ring











Correct Answer: D




QUESTION 165
What is the function of the AJB bits on DS1 using Extended Super Frame (ESF)?
A. It is used for signaling on-hook and off-hook status.
B. It carries CRC information for error detection.
C. It is used for a control and performance information.
D. It is used for a frame's synchronization and alignment.










Correct Answer: A




QUESTION 166
Which statement is FALSE concerning Concatenation?
A. It allows ITCM to send multiple upstream packets in one single large burst.

B. It reduces upstream data throughput.
C. It can be enabled/disabled from CMTS on per upstream port basis if desired
D. Concatenation activity on an interface can be checked by the show controller counters command














Correct Answer: B




QUESTION 167
What features set is most frequently used to prevent hackers from flooding a port with MAC- addresses?
A. BPDU Guard
B. 802.x
C. Port Security
D. Storm Control











Correct Answer: C




QUESTION 168
What does UDLD stand for?
A. UniDirectional Loop Detection
B. Unspecified Distribution Label Detection
C. Unified Distribution Label Direction
D. UniDirectional Link Detection











Correct Answer: D




QUESTION 169
What is the statistical reserve?
A. Bandwidth that is reserved for SVCs to route over a trunk
B. Bandwidth that is reserved on a trunk so that ABR connections can burst
C. Bandwidth on a trunk that is reserved for control traffic and cannot be used by connections
D. Bandwidth that cannot be allocated to connections but can be used to accommodate statistical variations in the traffic










Correct Answer: D




QUESTION 170
Which of the following is reported in the LMI regular status polling? (Choose three.)
A. Addition or Deletion of PVC.
B. PVC status (active or inactive).
C. Link integrity.
D. None of the other alternatives apply.









Correct Answer: ABC




QUESTION 171
ATM carries IP and PPP information with ATM cells. What ATM adaptation Layer is used when an ATM cell carries IP packets and PPP frames?
A. AAU2
B. AAL3
C. AAL4

D. AAL5













Correct Answer: D





QUESTION 172
Which two of the following are designated fields for MAC tunneling protocol (802.1ah)?
A. Control Word
B. Tunnel Label
C. 802.1q VLAN TAG
D. ISL
E. Service Ethertype
F. PseudoLAN TAG












Correct Answer: EF



QUESTION 173


Assume two routers on the same subnet, R1 and R2, both configured for HSRP. R1 has a priority of 120. Which of the following HSRP interface configurations will
always result in the R2 becoming the primary? (Choose two.)
A. standby 1 priority 120
B. standby 1 priority 130 preempt
C. standby 1 priority 130
D. standby 1 priority 120 preempt
E. standby 1 priority 110 preempt
F. standby 1 priority 110














Correct Answer: BC





QUESTION 174

Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.
A. Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCI.
B. Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop
protoco address or the DLCI for outgoing traffic.
C. Inverse ARP is enabled by default for all protocols enabled on the physical interface.
D. Inverse ARP is configured using the following command under the Interface configuration 'frame-relay mapdlci (dlci number) protocol protocol-address'.
E. Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet.














Correct Answer: ABC




QUESTION 175
What are the benefits of using TCAM technology in high-end routing products? (Choose two.)
A. Simplified configuration
B. Lower maintenance cost
C. Deterministic performance
D. Longer uptime
E. Lower power consumption












Correct Answer: CD






QUESTION 176
Which two statements best describe EtherChannel? (Choose two).
A. EtherChannel technology helps aggregate traffic grouping multiple, full-duplex point-to-point links together
B. EtherChannel technology is based on the 802.1 IEEE stand
C. EtherChannel can aggregate up to 800 Mbps,8 Gbps,or 80Gbps of aggregate bandwidth for a Fast EtherChannel, Gigabit EtherChannel,or 10 Gigabit
EtherChannel connection respectively.
D. EtherChannel is defined for Rapid Spanning Tree for faster convergence.













Correct Answer: AC




QUESTION 177
Which two things are correct about QinQ technology? (Choose two.)
A. The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Service Provider VLAN (PVLAN)
B. It is an effective way to achieve VLAN transparency between Provider and enterprise customer by tunneling one ser of VLAN tags inside a second VLAN tag
C. The Outer.1Q tag represents Service Provider VLAN (PVLAN) and inner.1Q tag represents customer VLAN
D. QinQ is a way to hide native VLAN which can conflict with Provider native VLAN










Correct Answer: BC




QUESTION 178
In the context of GMPLS, LMP stands for:
A. Load Management Protocol
B. Label Management Protocol
C. Loop Management Protocol

D. Link Management Protocol















Correct Answer: D




QUESTION 179
GMPLS is based upon:
A. VPI/VCI-based switching devices
B. Non-Packet-based devices
C. Packet-based switching devices
D. None of the above








Correct Answer: B




QUESTION 180
The layer 2 protocol used by POS technology offers a standardized way for mapping IP packets into SONET/ SDH payloads. Select the correct sequence of POS
operation:
1) Data is scrambled and synchronous mapping takes place by octet into the SONET/SDH frame. 2) Encapsulated via Point-to-Point Protocol (PPP) takes place
framing information is added with High-level Data Link Control (HDLC). 3) Gaps between frames are filled with flags, set to value 7E. 4) Octet stuffing occurs if any
flags or resultant escape characters (of value 7D) are found in the data. 5) Data is segmented into an IP datagram with its 20-byte IP header.
A. 1, 3, 4, 5, 2
B. 5, 2, 3, 1, 4
C. 2, 3, 5, 4, 1
D. 5, 2, 3, 4, 1
E. 1, 2, 3, 4, 5





Correct Answer: D






沒有留言:

張貼留言