Pass4Test 의 Cisco 350-029 (CCIE SP Written Exam, V3.0) 덤프는 PDF버전과 소프트웨어버전 두가지 버전으로 되어있는데 소프트웨어버전은 시뮬레이션버전입니다. 소프트웨어버전의 문제를 푸는 과정은 Cisco 350-029 (CCIE SP Written Exam, V3.0) 시험현장을 연상케하여 Cisco 350-029 (CCIE SP Written Exam, V3.0) 시험환경에 먼저 적응하여 실제시험에서 높은 점수를 받도록 도와드릴수 있습니다.
NO.1 Which two IOS commands are equivalents for putting a Cisco 7500 OC-12 RPR
interface card
into wrapped mode? Select all that apply
A. shutdown [a |
b]
B. srp shutdown [a | b]
C. srp ips request manual-switched [a |
b]
Answer: B,C
NO.2 Packed Cell Relay encapsulation with AToM includes
which of the following? (Choose four.)
A. Tunnel label
B. VC-label
C.
5-byte ATM header
D. Payload
E. 4 byte ATM header
F. Support for 30
packed cells.
Answer: A,B,D,E
Explanation:
Packed cell relay (cell
packing). This allows the encapsulation of multiple ATM cells in each
AToM
data channel packet.
NO.3 How many bits does EXP occupy in the
MPLS label header?
A. 8
B. 4
C. 3
D. 1
E. 2
Answer:
C
NO.4 Based on the following output in a router A running LDP, which
statement is true?
ROUTER-A#show mpls ldp bindings 50.0.0.1 32 lib entry:
50.0.0.1/32, rev 5 local bindinG. label: imp-
null remote bindinG. lsr:
50.0.0.4:0, label: 16
A. None of the above.
B. The IP address 50.0.0.1/32
is assigned to the non-directly connected LDP neighbor, 50.0.0.4.
C. The IP
address 50.0.0.1/32 is assigned to one of its own interfaces.
D. The IP
address 50.0.0.1/32 is assigned to its directly connected LDP neighbor,
50.0.0.4.
Answer: C
NO.5 In relation to MPLS Multicast VPN, which
three statements about multicast distribution tree
(MDT) groups are true?
(Choose three.)
A. MDTs are built in customer networks.
B. MDTs are built
in provider networks.
C. The number of MDTs depends on PIM modes of MDT
groups.
D. Default MDT groups are used for PIM control traffic, low-bandwidth
sources, and flooding of
sparse mode traffic.
E. Data MDT groups are used
for high-bandwidth sources to reduce replication to uninterested PEs.
F. Data
MDT groups forward multicast packets using MPLS labels and Default MDT groups
forward
multicast packets using GRE tunnels.
Answer: B,C,E
NO.6
Which statement about the use of Route Target Rewrite is true?
A. It is
mainly used in Intra-AS MPLS VPN deployments and is configured at the ASBR to
avoid
misconfiguration of the Route Target assignment for VPN
configurations.
B. It is mainly used in Inter-AS MPLS VPN deployments and is
configured at the ASBR to avoid
misconfiguration of the Route Target
assignment for VPN configurations.
C. It is mainly used in Intra-AS MPLS VPN
deployments and is configured at the Router Reflector to
avoid
misconfiguration in Route Target assignment for VPN configurations
D. It is
mainly used in Inter-AS MPLS VPN deployments and is configured at the Router
Reflector to
avoid misconfiguration of the Route Target assignment for VPN
configurations
E. It is mainly used in Inter-AS MPLS VPN deployments and is
configured at the PE router to avoid to
misconfiguration of the Route Target
assignment for VPN configurations
Answer: B
Explanation:
The MPLS
VPN-Route Target Rewrite feature allows the replacement of route targets on
incoming
and outgoing Border Gateway Protocol (BGP) updates. Typically,
Autonomous System Border Routers
(ASBRs) perform the replacement of route
targets at autonomous system boundaries. Route
Reflectors (RRs) and provider
edge (PE) routers can also perform route target replacement. The
main
advantage of the MPLS VPN - Route Target Rewrite feature is that it
keeps the administration of
routing policy local to the autonomous
system.
NO.7 Which ACL entry can be used to block Teredo tunnels?
A.
Teredo tunnels cannot be blocked
B. deny udp any any 3544
C. deny ipv6 udp
any any 3544
D. deny 41 any any
Answer: B
Explanation:
Topic 7, Mix
Questions
NO.8 What are BCP 38 (Best Common Practices 38) / RFC 2827
Ingress Packet Filtering Principles?
(Choose three.)
A. Filter Smurf ICMP
packets.
B. Filter as close to the core as possible
C. Filter as close to
the edge as possible
D. Filter as precisely as possible
E. Filter both
source and destination where possible.
Answer: C,D,E
Explanation:
1.13.
Security in core