IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Cisco 350-029 (CCIE SP Written Exam, V3.0) 최신자료

Pass4Test 의 Cisco 350-029 (CCIE SP Written Exam, V3.0) 덤프는 PDF버전과 소프트웨어버전 두가지 버전으로 되어있는데 소프트웨어버전은 시뮬레이션버전입니다. 소프트웨어버전의 문제를 푸는 과정은 Cisco 350-029 (CCIE SP Written Exam, V3.0) 시험현장을 연상케하여 Cisco 350-029 (CCIE SP Written Exam, V3.0) 시험환경에 먼저 적응하여 실제시험에서 높은 점수를 받도록 도와드릴수 있습니다.

 

NO.1 Which two IOS commands are equivalents for putting a Cisco 7500 OC-12 RPR interface card
into wrapped mode? Select all that apply
A. shutdown [a | b]
B. srp shutdown [a | b]
C. srp ips request manual-switched [a | b]
Answer: B,C

NO.2 Packed Cell Relay encapsulation with AToM includes which of the following? (Choose four.)
A. Tunnel label
B. VC-label
C. 5-byte ATM header
D. Payload
E. 4 byte ATM header
F. Support for 30 packed cells.
Answer: A,B,D,E
Explanation:
Packed cell relay (cell packing). This allows the encapsulation of multiple ATM cells in each AToM
data channel packet.

NO.3 How many bits does EXP occupy in the MPLS label header?
A. 8
B. 4
C. 3
D. 1
E. 2
Answer: C

NO.4 Based on the following output in a router A running LDP, which statement is true?
ROUTER-A#show mpls ldp bindings 50.0.0.1 32 lib entry: 50.0.0.1/32, rev 5 local bindinG. label: imp-
null remote bindinG. lsr: 50.0.0.4:0, label: 16
A. None of the above.
B. The IP address 50.0.0.1/32 is assigned to the non-directly connected LDP neighbor, 50.0.0.4.
C. The IP address 50.0.0.1/32 is assigned to one of its own interfaces.
D. The IP address 50.0.0.1/32 is assigned to its directly connected LDP neighbor, 50.0.0.4.
Answer: C

NO.5 In relation to MPLS Multicast VPN, which three statements about multicast distribution tree
(MDT) groups are true? (Choose three.)
A. MDTs are built in customer networks.
B. MDTs are built in provider networks.
C. The number of MDTs depends on PIM modes of MDT groups.
D. Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of
sparse mode traffic.
E. Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.
F. Data MDT groups forward multicast packets using MPLS labels and Default MDT groups forward
multicast packets using GRE tunnels.
Answer: B,C,E

NO.6 Which statement about the use of Route Target Rewrite is true?
A. It is mainly used in Intra-AS MPLS VPN deployments and is configured at the ASBR to avoid
misconfiguration of the Route Target assignment for VPN configurations.
B. It is mainly used in Inter-AS MPLS VPN deployments and is configured at the ASBR to avoid
misconfiguration of the Route Target assignment for VPN configurations.
C. It is mainly used in Intra-AS MPLS VPN deployments and is configured at the Router Reflector to
avoid misconfiguration in Route Target assignment for VPN configurations
D. It is mainly used in Inter-AS MPLS VPN deployments and is configured at the Router Reflector to
avoid misconfiguration of the Route Target assignment for VPN configurations
E. It is mainly used in Inter-AS MPLS VPN deployments and is configured at the PE router to avoid to
misconfiguration of the Route Target assignment for VPN configurations
Answer: B
Explanation:
The MPLS VPN-Route Target Rewrite feature allows the replacement of route targets on incoming
and outgoing Border Gateway Protocol (BGP) updates. Typically, Autonomous System Border Routers
(ASBRs) perform the replacement of route targets at autonomous system boundaries. Route
Reflectors (RRs) and provider edge (PE) routers can also perform route target replacement. The main
advantage of the MPLS VPN - Route Target Rewrite feature is that it keeps the administration of
routing policy local to the autonomous system.

NO.7 Which ACL entry can be used to block Teredo tunnels?
A. Teredo tunnels cannot be blocked
B. deny udp any any 3544
C. deny ipv6 udp any any 3544
D. deny 41 any any
Answer: B
Explanation:
Topic 7, Mix Questions

NO.8 What are BCP 38 (Best Common Practices 38) / RFC 2827 Ingress Packet Filtering Principles?
(Choose three.)
A. Filter Smurf ICMP packets.
B. Filter as close to the core as possible
C. Filter as close to the edge as possible
D. Filter as precisely as possible
E. Filter both source and destination where possible.
Answer: C,D,E
Explanation:
1.13. Security in core

Posted 2014/10/23 10:53:36  |  Category: cisco  |  Tag: 350-029 최신자료