Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-261 has been withdrawn.

H12-261 Practice Exam Questions with Answers HCIE-Routing & Switching (Written) Certification

Question # 6

In the following topology diagram, all the interfaces of the router are all open. Figure ISIS ( ), the following methods are correct.

H12-261 question answer

A.

If the interface is then R3 GE0/0/0 down, R2 master is the device

B.

If the interface is , then it will become R3 Ethernet 0/0/0 down R2 master as device

C.

If the interface is , then it will become R1 Ethernet 0/0/0 down R2 master as device

D.

If the interface is , then it will become R1 Ethernet 0/0/1 down R2 master as the devicec

Full Access
Question # 7

The router acts as the HW1 MPLS LSR HW, and the router exists in the network of the carrier. The router receives a message with the tag.

The item does not exist in its LFIB ? Then how does the router manage the text?

A.

The router will use it to build a HW1 LDP LSP LFIB and create a new path in the Chinese

B.

The router will abandon the text HW1 lose the newspaper

C.

The router will forward the report using the modal HW1 tag.

D.

The router will strip the HW1, FIB IP tags and find the destination address.

Full Access
Question # 8

The figure shows the topology and configuration. Which of the following method, can he used to exclude the specific route .0.0.3.3/32 from the routing table of R1?

H12-261 question answer

A.

Configure route summarization on R2 and summarize routes as 10.0.0.0/16.

B.

Configure route summarization on R3 and summarize routes as 10.0.0.0/16.

C.

On R1, configure a filter policy, use the ACL applied to the filter-policy to match 10.0.3.3/32, and apply direction.

Full Access
Question # 9

The following is about MPLS BGP VPN?

A.

IBGP ALoopback BGP establishes a stable neighbor relationship for the interface address.

B.

PE-CE OSPF IS-iS EBGP exchange routing can be static routing, multiple instances, multiple examples,

C.

The TTL field in the tag has a function to prevent the path.

D.

BGP Soo VPN MPLS Soo MP-BGP is used to prevent routes routed from one site from going back to the site through the backbone network. Self-generated Expansion group

Full Access
Question # 10

Which of the following statements regarding ISIS route summarization is true?

A.

Route summarization can be configured and takes effect on all types of routers.

B.

Route summarization takes effect only on Level-1 routers

C.

Route summarization takes effect only on Level-2 routers.

D.

Route summarization takes effect only on Level-1-2 routers.

Full Access
Question # 11

The following description of the mechanism is correct BSR

A.

PIM-SM C-BSR There may be multiple BSR domains, but only one election.

B.

BSR C-RP C-RP collects information from received packets.

C.

BSR Bootstrap PIM-SM BSR C-RP floods the message to advertise information and information to all routers in the domain.

D.

A C-BSR C-RP C-RP packet can also be received to collect information.

Full Access
Question # 12

The following is true about the route aggregation method.

A.

Route aggregation can be configured and valid on all routers.

B.

Route aggregation can only be configured on the router to take effect level--1

C.

Route aggregation can only be configured on the router to take effect level--2

D.

Route aggregation can only be configured on the router to take effect level--1-2

Full Access
Question # 13

Which of the following statements regarding 802.1s deployment is true?

A.

Multiple bridges share a spanning tree instance.

B.

Each VLAN owns a spanning tree instance.

C.

Multiple VLANs share a spanning tree instance.

D.

All VLANs share a spanning tree instance.

Full Access
Question # 14

Which of the following AS-_path attribute values can be niched by the AS-Path filter configured using ip as-path-filter 1 permit ,*(100|400)$ command?

A.

100

B.

3100

C.

300 4200

D.

1234 1400

Full Access
Question # 15

The topology and configuration are as shown in the figure below, R1 10.0.3.3/32, now I hope that the routing entries that do not exist in the routing table are fine. The following methods can be implemented.

H12-261 question answer

A.

Configure routing R3 above, 10.0.0.0/16 summary.

B.

Configure route R2 above, 10.0.0.0/16 summary.

C.

Configure the above R2 filter-policy, ACL 10.0.3.3/32, expot over match when used in the same direction

D.

Configure the above R1 filter-policy, ACL 10.0.3.3/32, import over match, use the same direction

Full Access
Question # 16

An existing router running OSPF 0 1 1 Stub 1 LSA is connected to the zone and zone. You configure the area as a zone. Operated only within the area

What types are included?

A.

7 LSA class

B.

1 LSA 2 LSA Classes and Classes

C.

1 LSA 2 LSA 5 LSA Classes, Classes and Classes

D.

3 LSA 4 LSA Classes and Classes

E.

1 LSA 2 LSA 3 LSA Classes, Classes and Classes

Full Access
Question # 17

If more than one candidate group is selected for RP RP RP ( ) in a broadcast, the election of multiple candidates from the multiple candidates is more selective than the following parameters.

A.

C-RP's priority

B.

The mask of the C-RP service that matches the address of the added group.

C.

Address of the C-RP IP interface

D.

Number of the C-RP interface

Full Access
Question # 18

The five classes in the OSPF LSA LSA are used for external route delivery.

A.

The external routing meter can be calculated by the ASBR LSA LSA in the same area as the router in the same area.

B.

The strategies for configuring the phase can be five ABR ASBR LSA should filter the class

C.

Category 5 LSA ASBR Stub/NSSA OSPF is advertised and flooded in the network in the non-region

D.

In the five types of LSA FA FA 0.0.0.0, the address is included, but the reservation is not effective.

Full Access
Question # 19

Which of the following descriptions of the most various routes is correct is which option is preferred for the agreement election?

A.

OSPF LSDP IP will put all routing information in the routing table.

B.

The route that is not reachable in the next hop in BGP IP will also be placed in the routing table.

C.

From the different routing entries from the learning to the same destination network segment, the BGP OSPF preference of the comparison is better than the protocol value.

To routing table IP

D.

BGP cost protocol is better than the value of the routing entry. The best route to the same destination network segment.

Full Access
Question # 20

Which of the following statements is true regarding the domain-authentication-mode md5 hello command in the IS_IS process?

A.

This command enables 1S-IS Hello PDUs to carry authentication information.

B.

1S-1S SNP and LSP can be flooded normally only when the domain authentication mode and password of all routers in the same routing domain are MD5 and hello.

C.

IS-IS authentication cannot be applied to IPv6 environments.

D.

Routing domain authentication enables Level-1 and Level-2 SNPs and LSPs to carry authentication information.

Full Access
Question # 21

Which of the following statements regarding route import is false?

A.

Importing IBGP routes into the OSPF process may cause routing loops.

B.

By default, the metric of external routes imported into the OSPF process \s 1 and the type of imported external routes is Type 2.

C.

BGP can generate routes in either Import or Network mode. The Network mode is more precise than the Import mode.

D.

After IS-IS Level-2 routes are imported to an ISTS Level-1 area, routing loops occur if no route import policy is manually configured.

Full Access
Question # 22

Which of the following statements regarding the BFD one-arm-Echo function are true?

A.

Local and remote discriminators must be configured for this function.

B.

After this function is enabled, the destination and source IP addresses of BFD packets are the same.

C.

This function is applicable when one device supports BFD and the other device does not.

D.

The default destination IP address of a BFD packet is 224.0.0.184.

Full Access
Question # 23

SSM is enabled on the entire IP multicast network. Which of the following statements regarding SSM are true?

A.

SSM is applicable to one-to-many applications.

B.

Only the RPT is used for SSM.

C.

Only the 5PT is used for SSM.

D.

SSM is recommended when multiple sources are available on the network and the multicast route is simple.

E.

No RP is required.

Full Access
Question # 24

You are assigned the task of compressing an IPv6 address as much as possible. If the original IPv6 address is 2013:0000:130F:000Q:00G0:09C0:876A:130B, which of the following is the IPv6 address in its compressed format?

A.

2013:0; 130F::9C0:876A: BOB

B.

2013::130F::9CO:876A:130B

C.

2013:0:130F:0:0:O9C0:876A:130B

D.

213::13F::9C:876A:13B

E.

2013:0:130F:0:0:9C0:876A:130B

Full Access
Question # 25

Which of the following statements regarding the IPv6 over VXLAN network is false?

A.

The IPv6 over VXLAN network indicates that the VXLAN overlay network is an IPv6 network.

B.

The IPv6 Over VXLAN network does not generate ND entries.

C.

Tunnels between Layer 2 and Layer 3 VXLAN gateways are deployed on an IPv4 network.

D.

The IPv6 over VXLAN network enables tenants to have sufficient IP address resources.

Full Access
Question # 26

How long will a Huawei switch running RSTP wait before aging out the BPDUs on an interface?

A.

Hello time interval

B.

6 seconds

C.

MaxAge interval

D.

BPDUs on the interface will not be aged out.

E.

Forward delay

Full Access
Question # 27

If the Option field in the 0SPFv3 Hello packet sent from GigabitEthernet0/0/0 of router A is 0x000013, which of the following statements are true?

A.

GigabitEthernet0/0/0 of router A belongs to an NSSA.

B.

GigabitEthemet0/G/0 of router A participates in IPv6 route calculation.

C.

Router A is an OSPFv3 device enabled with the forwarding capability.

D.

Router A supports flooding of AS-external-LSAs.

Full Access
Question # 28

Which of the following statements regarding BGP confederations is false?

A.

By default, sub-AS numbers of a confederation are advertised to BGP peers outside the confederation.

B.

A BGP confederation divides an AS into several sub-ASs. ASs outside a confederation still consider the confederation as an AS.

C.

Confederations can easily detect routing loops inside an AS because EBGP is run between sub-ASs.

D.

Sub-A5s within a BGP confederation can use private AS numbers. For Huawei NE and AR routers, a maximum of 32 sub-ASs can be configured in a BGP confederation.

Full Access
Question # 29

Routes received from AS100 match the AS-Path filter configured using the ip as-path-filter 10 permit _100$ command.

A.

TRUE

B.

FALSE

Full Access
Question # 30

In which scenario can an AS_Path-filter be used?

A.

Apply clause in a router-policy

B.

Filtering routers received from BGP peers based on the AS_Path attribute. For example, the peer X.X.X.X as-path-filter import command.

C.

If-match clause in a route-policy

D.

Filtering routes sent to BGP peers based on the AS_path attributes. For example, the peer X.X.X.X as-Path filter export command.

Full Access
Question # 31

BGP EVPN, distributed gateway, virtual machine migration field implementation, which of the following is required?

A.

Type3

B.

Type5

C.

Type4

D.

Type2

E.

Type1

Full Access
Question # 32

The following is the correct way to resolve the road address. NDP chain layer

H12-261 question answer

A.

True

B.

False

Full Access
Question # 33

The fields of the OSPFv3 Option LSA are all present.

A.

Yes

B.

Wrong

Full Access
Question # 34

What is the class D IP address range 239.0.0.0-239.255.255.255 used for?

A.

It is a multicast address range used by routing protocols

B.

Any legal multicast data flow and multicast application can use this address segment

C.

Link-local multicast traffic mode up of network control messages meant to stay in the local subnet

D.

It is a locally scoped multicast address and should only be used on local segments

E.

It is an SSM multicast address range which is used on the entire network.

Full Access
Question # 35

Which parameter will not be received from the root bridge by a non-root bridge running 802.1D STP?

A.

Forward delay

B.

Hello time

C.

Root cost

D.

Hold time

E.

Max Age

Full Access
Question # 36

A company's second network architecture, such as a layer map, when the project configuration is completed, the communicator can't find the business door, and the command looks like the following to check the device status.

Possible reasons are as follows

(No texture, anyway, the three elements are not consistent with the MSTP Master sample project.)

A.

Interchange of the exchange

B.

The exchange between the BPDUs is inconsistent.

C.

Interchange of the exchange The Region Name configuration is inconsistent

D.

Interchange of the Instance VLAN mapping configuration is inconsistent

Full Access
Question # 37

The following description of cross-domain features is correct vpn –Option C, ?

A.

Reporting Forwarding Layer Labels Up to two are required in the script.

B.

ASBR VPNV4, VPNv4 does not save routes, and does not advertise between routes.

C.

VPN PE PE, the VPN route is exchanged between the ingress and the egress.

D.

Cross-domain mode is not suitable when using multiple VPN-Option-c ASs.

Full Access
Question # 38

The description of the configuration is correct: (multiple BGP4+ selected)

A.

Ruter-ID BGP4 Router-ID is the same as .

B.

BGP4+ peer Link-Local specified when required

C.

The next hop of the BGP4+ Link-Local route does not use an address.

D.

BGP4+ BGP4 When the reflector is configured, the role of the reflector and the client needs to be the same as the configuration of the user.

E.

BGP4+ does not support route reflectors.

Full Access
Question # 39

The following is about the digital method is the certificate said wrong?

A.

The integrity of the digital name guarantee number is signed.

B.

The number contains the public information certificate key.

C.

When the received body is within the validity period of the certificate, but the device itself is not valid, the device time error certificate is lost.

D.

Even if the two entities are not in the same PRI CA, CA, the real system can complete the authentication as long as both parties can identify each other.

Full Access
Question # 40

ISIS P2P, LSP, PSNP, LSDB protocol in the broadcast network and the network. When the router receives it, it needs to use the line to ensure the synchronization.

A.

True

B.

False

Full Access
Question # 41

Regarding the cross-domain scenario, the following describes the VPN Option-B error?

A.

Reporting In the forwarded mode, the ASBR VPN LSP exchanges on the two private networks to be paired.

B.

Two neighbor relationships between ASBR MP-EBGP need to be established.

C.

The cross-domain scheme is not limited by the number of interconnections. VPN-option-B ASBR is linked.

D.

Two ASBR VPNv4 inter-exchange routes are exchanged with external label.

Full Access
Question # 42

If the network is running OSPF, the OSPP Totally Stub Totally Stub ls-id configures the non-backbone area in the area as the area under the strip.

0.0.0.0 LSA, LSA LSA?

A.

LSA5

B.

LSA2

C.

LSA1

D.

LSA3

Full Access
Question # 43

The following is about routing BGP, ?( ) selection description is wrong

A.

Non-aggregated routing precedes aggregation routing.

B.

In the case of equal and equal If the locally generated route, route, route Pref-Val local_preference, IBGP EBGP BGP preference

Consistent locally generated valid routes first, then excellent

C.

See the following entry in the routing table BGP :* 172.16.1.11/32 0.0.0.0 10 0 ? Represents the route available.

D.

For nexthop, the unreachable route is invalid and does not participate in the preference.

Full Access
Question # 44

If there is a switch running Huawei's RSTP, BPDU?(), what will be changed on a certain port of the switch will be aging?

A.

Will not age on the interface, RSTP BPDU.

B.

After more than 6 seconds

C.

After the Super MaxAge

D.

After the Super Hold time

E.

After the super

Full Access
Question # 45

Huawei exchanged two sets of SWA.SWB 7 , SW connected through the root Ethernet and configured the static channel aggregation chain to change the port corresponding to

Ethernet1/0/3. Ethernet1/0/3. Ethernet1/0/4. Ethernet1/0/5. Ethernet1/0/6. Ethernet1/0/7, configuration mode.

The order is configured in turn if the exchange is changed to SWA.SWB 6 Each aggregation only supports group ports.

A.

When the configuration of each port is consistent, port, Ethernet1/0/7 Unselected

B.

When the configuration of each port is consistent, port, Ethernet1/0/6 Unselected

C.

In the case of consistent port configuration, random port aggregation in each port, SWA 7 Unselected selected as group port

D.

In the case of consistent port configuration, port, Ethernet1/0/1 Unselected

Full Access
Question # 46

The following information about the correct description is BGP4+, ?

A.

Bgp4+ dampening IBGP can use the match to suppress the polling of the routing line.

B.

The modified BGP router id BGP guide connection will be re-established.

C.

BCP4+ Next Hop Pv6, the attribute in the address is represented by the address, which can be the next-hop road-local address chain.

D.

BGP4+ does not support route self-aggregation.

Full Access
Question # 47

In the case of not dividing the area, the following is true about the road route description, ? chain state protocol

A.

Each router establishes a topology structure for the entire flooding domain.

B.

Each router directly routes from the routing update and adds it to the routing table.

C.

The router in the flooding domain may repeatedly receive the same road information chain.

D.

The routers in the entire flooding domain have the same road data.

E.

The router will send all the existing road information to all other neighbors to send the wrong state to the neighbor, and the data synchronization certificate.

Full Access
Question # 48

A project has introduced the operation of the OSPF LSA router in the company's network. The following is true about the introduction of the route?

A.

The Advertising Route is set to

B.

netmask 0 of the ASBR router-id.

C.

link state id is set to the destination network segment address is set to

D.

Use and can be unique. A link state id advertising Router LSA identifier

Full Access
Question # 49

What is the correct description of the reflector? Multiple BGP ( ) selection

A.

The route reflector can advertise all IBGP client non-client neighbors from the learned route.

B.

In the absence of a route reflector, the relationship needs to be fully inter-IBGP neighbors, and the introduction of route reflectors can reduce the requirement for full inter-connection.

C.

The route reflector can advertise all non-client clients from the learned routes.

D.

The route reflector can advertise other client client non-client from a learned route.

Full Access
Question # 50

What is the relationship between CIR BC TC and ?

A.

TC=CIR/BC

B.

CIR=TC/BC

C.

CIR=BE/TC

D.

TC=BC/CIR

Full Access
Question # 51

A household has opened a 10Mb/s 12Mb/s broadband, and the carrier has increased the use of the camp for the user. The speed can be set at the time of the household. If I am stable, if I

We use token bucket technology. Which of the following is the best?

A.

cir 10000 pir 12000

B.

cir 10000 cbs 10000 pbs 12000

C.

cir 8000 pir 12000

D.

cir 10000 cbs 12000 pbs 12000

Full Access
Question # 52

IPv6 ISIS ring protocol deployment, the following method is correct

A.

In the broadcast network, the first can be divided into IPv4 IPv6 DIS priority settings.

B.

By default, the priority of the broadcast network interface is Level-1 Level-2 DIS 1 and

C.

In the same broadcast network, if each router is supported, IPv4 IPv6 IPv4 IPv6 DIS and , and must be the same device

D.

ISIS ISIS silent ISIS ISIS interface configuration, then this interface will not send packets, but will receive packets

Full Access
Question # 53

Level-1-2 IS Level-1 Level-2 LSP will be transmitted to the area. If the location is in the range, it indicates the Level-2 LSP ATT 1 Level-1 in the area.

Can pass this Level-1-2 IS to the external area

A.

Correct

B.

Error

Full Access
Question # 54

LAND's attack means that the attacker sends a source address and a destination address to the target host. The target is marked as the source port and the destination port.

SYN ACK TCP report text, the receiving end is waiting for the sending end of the final message, and the connection is always connected in a semi-connected state, causing the receiver to receive limited resources.

Waste

A.

Correct

B.

Error

Full Access
Question # 55

The following topology diagram can be established through the R1 R2 R3 internet R1 R2 R1 R3 EBGP R2, R3 and access, and , and

By AS BGP R1 internet R2 ( ), the default route is advertised, and the traffic required for access is preferred. The following practices can be implemented.

H12-261 question answer

A.

R2 R1 export MED 150 specifies that the body pair is set in the direction attribute

B.

R1 R3 import MED 150 specifies the body to be set in the direction attribute

C.

R2 R1 export 150 specifies the body to set the priority in the direction

D.

R1 R2 import 150 specifies that the body is set to the local direction in the direction.

Full Access
Question # 56

The following description of the MPLS error?

A.

LDP MP-BGP 16-1023, etc. The null of the signaling is dynamic protocol label

B.

MPLS 20 tag length is bit, used for message forwarding

C.

Adopt mode mode Pipe TTL IP MPLS IP TTL MPLS When the message is transmitted on the network, the value of the message is only at the in and out points.

Subtraction 1

D.

MPLS S 1 supports multiple nested layer labels, and the innermost layer label is value

Full Access
Question # 57

Which scene can be used AS-path -filter?

A.

Clause in the route-policy apply

B.

Clause in the route-policy if-match

C.

According to the route with AS_PATH, BGP peer x.x.x.x as-path-filter export attribute sends the route to the neighbor. For example command

D.

According to the route with the AS_PATH, BGP peer x.x.x.x as-path-filter import attribute to the route received by the filtering neighbor. For example command

Full Access
Question # 58

The following is a cross-domain approach to MPLS VPN, which describes the error.

A.

LDP, vp–Option-c 2 when only the label is used on the public network. For the cross-domain solution, the third-layer forwarding layer label is required.

B.

For the inter-domain vPN-OptionB, the ASBR MP-eBGP mode needs to establish a neighbor relationship.

C.

For the inter-domain vPn -OptionA, the routes of the ASBR IPv4 mode are ordinary inter-route routes.

D.

For inter-domain vPN-OptionB, ASBR-E ( ), VPN, two methods, use multiple interfaces, including sub-interfaces, interconnect each interface, one each.

ASBR-PE CE

Full Access
Question # 59

Which of the following statements regarding a TCP sliding window are false?

A.

The sender advertises the size of the initial window.

B.

If the sender does not receive an acknowledgment message after the retransmission timer times out, it retransmits the unacknowledged data.

C.

The sliding window size can only be increased or remains unchanged.

D.

A TCP sliding window allows the sender to send multiple data packets before receiving an acknowledgment message.

E.

The sender does not need to transmit packets with a complete window size.

Full Access
Question # 60

The output of the display in vpn-instance verbose command for displaying detailed information about all VPN instances on a network device is as follows.

Which of the following statements are false?

H12-261 question answer

A.

The device assigns a label to each route of the VPN instance vpna.

B.

GigabitEthernet1/0/0 is bound to the VPN instance vpna.

C.

The total number of locally configured VPN instances for which IPv6 address families are enabled is 1.

D.

The VPN instance vpna does not receive VPN routes with RT being 2:1.

Full Access
Question # 61

Which of the following statements about VRRP load balancing are false?

A.

When configuring priorities, you must ensure that the same router server as the master router in three VRRP backup groups

B.

To implement load balancing, default network gateways of hosts on a LAN must be configured as IP addresses of different virtual routers

C.

Multiple VRRP backup groups can be created on an interface of a router. The router can serve as the master router in on VRRP backup group and the backup router in other VRRP backup groups.

D.

VRRP local balancing requires that at least two virtual routers transmit services at the same time.

Full Access
Question # 62

Which of the following statements regarding VXLAN packets are true?

A.

A VNI has 24 bits and is used to identify a VXLAN segment.

B.

The destination UDP port number is 4789.

C.

The outer destination IP address is the IP address of the remote VTEP in a VXLAN tunnel.

D.

The source UDP port number is 4789.

Full Access
Question # 63

Which of the following attacks are DoS (Denial of service) attacks?

A.

Single-packet attacks

B.

Flood attacks

C.

Man-in-the middle attacks

D.

Source IP address spoofing attacks

Full Access
Question # 64

Both IS-IS CSNPs and OSPF DD packets describe the brief information about link state databases in MA network.

Which of the following statements regarding the two types of packets is true?

A.

After CSNPs and DD packets are received by the peer router, the peer router needs to send an acknowledgement message; otherwise, the packets need to be retransmitted.

B.

Once the neighbor relationship is established, CSNPs and DD packets are not sent.

C.

The master/slave relationship in OSPF DD packet exchange is not bound to DR/BDR; and CSNPs are generated only by the DIS.

D.

After CSNPs and DD packets are received by the peer router, the peer router does not need to send an acknowledgment message.

Full Access
Question # 65

Routers HW1 and HW2 are IP Multicast routers. These routers use (S, G) entries for multicast packet forwarding. Which of the following address types are used in the “S” entry?

A.

The block of administratively scoped multicast addresses

B.

Source Specific multicast addresses

C.

SDP/SAP addresses

D.

Any class A, Class B, or Class C host address

E.

GLOP addresses

Full Access
Question # 66

OSPFv3 is a version of OSPF for IPv6 and is different from OSPFv2. OSPFv3 is based on links but OSPFv2 is based on network segments. Which of the following statements is false?

A.

When an OSPFv3 router obtains routing information from a neighbor, it uses the link-local address of the neighbor as the next hop for packet forwarding.

B.

Two OSPF routers on the same physical link can still establish a neighbor relationship even if no unicast IPv6 address is configured.

C.

Two OSPF routers on the same physical link can still establish a neighbor relationship even if their IPv6 addresses are on different networks.

D.

Except for virtual links, all OSPFv3 interfaces use a link-local address as the destination address of OSPFv3 message.

Full Access
Question # 67

Which of the following are differences between PIM-SM and PIM-DM?

A.

PIM-SM has RPTs and SPTs but PIM-DM has only RPTs

B.

BSRs/RPs exist only on a PIM-SM network, not on a PIM-DM network

C.

PIM-SM is applicable to a network with few receivers; PIM-DM is applicable to a network with a larger number of receivers

D.

Whether in PIM-SM or PIM-DM mode, receiver hosts must join multicast groups through IGMP

Full Access
Question # 68

A router is connected to two EBGP peers through two parallel serial cables. What method can be used to achieve bidirectional load balancing between the EBGP peers?

A.

Run the ebgp-load-balance command on the EBGP peers.

B.

No method is needed. BGP automatically implements load balancing among different Ass through available links.

C.

Establish an EBGP peer relationship through loopback interfaces, and configure the loopback interfaces as update sources. In each AS, import two equal-cost routes to the loopback interface of each EBGP peer to the IGP process. In addition, run the ebgp-max-hop and next-hop-local commands.

D.

Configure an EBGP peer relationship through loopback interfaces, and configure the loopback interfaces as update sources. In each AS, enable two equal-cost routes to the loopback interface on each EBGP peer in the IGP process. In addition, run the next-hop-local command.

Full Access
Question # 69

Which of the following statements regarding the packet processing method in the MPLS network model are false?

A.

The device discards IP packets that enter the MPLS domain.

B.

An LSR does not remove any label.

C.

A Label Switched Path (LSP) is determined and established through various protocols during the packet forwarding process.

D.

Both LERs and LSRs distribute labels.

Full Access
Question # 70

Which of the following statements regarding the inter-AS MPLS VPN are false?

A.

In inter-AS VPN Option B mode, an MP-EBGP peer relationship needs to be established between two ASBRs.

B.

In inter-AS VPN Option B mode, two ASBR-PEs are interconnected through multiple interfaces (including sub-interfaces), each interface is associated with one VPN, and each ASBR-PE considers the remote device as a CE.

C.

In inter-AS VPN Option A mode, the routes advertised between two ASBRs are common IPv4 routes.

D.

In inter-AS VPN Option C solution 2, if only LDP is used to advertise public network labels, three labels need to be used during packet forwarding.

Full Access
Question # 71

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP

session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall?

A.

There is no way to make BGP work across a firewall without special configuration, so there is no simple test that will show you if BGP will work, other than trying to start the peering session.

B.

Attempt to Telnet from the router connected to the inside of the firewall to the router connected to the outside of the firewall. If Telnet works, BGP will work, since telnet and BGP both use TCP to transport data

C.

There is no way to make BGP work across a firewall

D.

Ping from the router connected to the inside interface of the firewall to the router connected to the outside interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP to transport

packets.

Full Access
Question # 72

Which of the following statements regarding BGP attributes is true?

A.

A route can have only one value for the Community attribute.

B.

The number of the neighboring AS is displayed to the right of the AS_Path list of a BGP routing entry.

C.

The Local_Pref attribute is exchanged only between EBGP peers and is not advertised to other ASs.

D.

When advertising a route learned from an EBGP peer to an IBGP peer, the BGP speaker does not change the Next_Hop attribute of the route.

Full Access
Question # 73

Which of the following statements regarding MP-BGP is false?

A.

The MP_UNREACH_NLRI attribute of Update packets does not contain path information

B.

MP_REACH_NLRI and MP_UNREACH_NLRI are optional transitive attributes

C.

The complete MP_REACH_NLRI attribute structure contains the address family, next hop, and prefix information

D.

MP-BGP can be used to allocate labels

Full Access