|
ITCertKeys is the very best u must visit this site thanks buddy
|
Question 1. Referring to the topology diagram show in the exhibit, which three statements are correct regarding the BGP routing updates? (Choose three.) A. The EBGP routing updates received by R1 from R5 will be propagated to the R2, R4, and R7 routers B. The EBGP routing updates received by R3 from R6 will be propagated to the R2 and R4 routers C. The EBGP routing updates received by R1 from R5 will be propagated to the R2 and R4 routers D. The IBGP routing updates received by R3 from R2 will be propagated to the R6 router E. The IBGP routing updates received by R2 from R1 will be propagated to the R3 router F. The IBGP routing updates received by R1 from R4 will be propagated to the R5, R7, and R2 routers Answer: A, B, D Explanation: Question 2. When a BGP route reflector receives an IBGP update from a non-client IBGP peer, the route reflector will then forward the IBGP updates to which other router(s)? A. To the other clients only B. To the EBGP peers only C. To the EBGP peers and other clients only D. To the EBGP peers and other clients and non-clients Answer: C Explanation: Question 3. Which two BGP mechanisms are used to prevent routing loops when using a design with redundant route reflectors? (Choose two.) A. Cluster-list B. AS-Path C. Originator ID D. Community E. Origin Answer: A, C Explanation: Question 4. Which two statements correctly describe the BGP ttl-security feature? (Choose two.) A. This feature protects the BGP processes from CPU utilization-based attacks from EBGP neighbors which can be multiple hops away B. This feature prevents IBGP sessions with non-directly connected IBGP neighbors C. This feature will cause the EBGP updates from the router to be sent using a TTL of 1 D. This feature needs to be configured on each participating BGP router E. This feature is used together with the ebgp-multihop command Answer: A, D Explanation: Question 5. When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.) A. A static route to a prefix that is not used in the network with a next hop set to the Null0 interface B. A static route pointing to the IP address of the attacker C. uRPF on all external facing interfaces at the edge routers D. Redistribution into BGP of the static route that points to the IP address of the attacker E. A route policy to set the redistributed static routes with the no-export BGP community Answer: A, C Explanation: Question 6. Refer to the topology diagram shown in the exhibit and the partial configurations shown below. Once the attack from 209.165.201.144/28 to 209.165.202.128/28 has been detected, which additional configurations are required on the P1 IOS-XR router to implement source-based remote-triggered black hole filtering? ! router bgp 123 address-family ipv4 unicast redistribute static route-policy test ! A. router static address-family ipv4 unicast 209.165.202.128/28 null0 tag 666 192.0.2.1/32 null0 tag 667 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 endif if tag is 667 then set community (no-export) endif end-policy ! B. router static address-family ipv4 unicast 209.165.201.144/28 null0 tag 666 192.0.2.1/32 null0 tag 667 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 endif if tag is 667 then set community (no-export) endif end-policy ! C. router static address-family ipv4 unicast 209.165.201.144/28 null0 tag 666 192.0.2.1/32 null0 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 set community (no-export) endif end-policy D. router static address-family ipv4 unicast 209.165.202.128/28 null0 tag 666 192.0.2.1/32 null0 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 set community (no-export) endif end-policy ! Answer: C Explanation: Question 7. In Cisco IOS-XR, the maximum-prefix command, to control the number of prefixes that can be installed from a BGP neighbor, is configured under which configuration mode? A. RP/0/RSP0/CPU0:P2(config-bgp)# B. RP/0/RSP0/CPU0:P2(config-bgp-af)# C. RP/0/RSP0/CPU0:P2(config-bgp-nbr)# D. RP/0/RSP0/CPU0:P2(config-bgp-nbr-af)# Answer: D Explanation: Question 8. In Cisco IOS-XR, the ttl-security command is configured under which configuration mode? A. RP/0/RSP0/CPU0:P2(config)# B. RP/0/RSP0/CPU0:P2(config-bgp)# C. RP/0/RSP0/CPU0:P2(config-bgp-nbr)# D. RP/0/RSP0/CPU0:P2(config-bgp-af)# E. RP/0/RSP0/CPU0:P2(config-bgp-nbr-af)# Answer: C Explanation: Question 9. Refer to the exhibit. Given the partial BGP configuration, which configuration correctly completes the Cisco IOS-XR route reflector configuration where both the 1.1.1.1 and 2.2.2.2 routers are the clients and the 3.3.3.3 router is a non-client IBGP peer? A. neighbor 1.1.1.1 remote-as 65123 route-reflector-client neighbor 2.2.2.2 remote-as 65123 route-reflector-client neighbor 3.3.3.3 remote-as 65123 B. neighbor 1.1.1.1 address-family ipv4 unicast remote-as 65123 route-reflector-client neighbor 2.2.2.2 address-family ipv4 unicast remote-as 65123 route-reflector-client neighbor 3.3.3.3 address-family ipv4 unicast remote-as 65123 C. neighbor 1.1.1.1 remote-as 65123 address-family ipv4 unicast route-reflector-client neighbor 2.2.2.2 remote-as 65123 address-family ipv4 unicast route-reflector-client neighbor 3.3.3.3 remote-as 65123 D. neighbor 1.1.1.1 remote-as 65123 neighbor 1.1.1.1 route-reflector-client neighbor 2.2.2.2 remote-as 65123 neighbor 2.2.2.2 route-reflector-client neighbor 3.3.3.3 remote-as 65123 Answer: C Explanation: Question 10. Which three methods can be used to reduce the full-mesh IBGP requirement in a service provider core network? (Choose three.) A. implement route reflectors B. enable multi-protocol BGP sessions between all the PE routers C. implement confederations D. implement MPLS (LDP) in the core network on all the PE and P routers E. enable BGP synchronization F. disable the IBGP split-horizon rule Answer: A, C, D Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.