web analytics

When implementing EoMPLS on Cisco IOS XR routers, which command under the l2vpn configuration mode is used to define the pseudowire?

When implementing EoMPLS on Cisco IOS XR routers, which command under the l2vpn configuration mode is used to define the pseudowire? A. pbb B. xconnect C. connect D. bridge E.

When configuring an EoMPLS PW on a Cisco IOS XR router, what are the two supported transport modes?

When configuring an EoMPLS PW on a Cisco IOS XR router, what are the two supported transport modes? (Choose two.) A. ethernet (Ethernet port mode) B. ip (routed mode) C.

When implementing EoMPLS PWs, which configuration is optional?

When implementing EoMPLS PWs, which configuration is optional? A. matching PW ID on both ends B. Xconnect C. Cisco Express Forwarding D. control word Correct Answer: D

When implementing nonhierarchical VPLS with eight PE routers, how many total PWs will be required between the PE routers?

When implementing nonhierarchical VPLS with eight PE routers, how many total PWs will be required between the PE routers? A. 8 B. 16 C. 28 D. 32 E. 64 Correct

Which type of Ethernet services as defined by the MEF?

VPWS/EoMPLS offers which type of Ethernet services as defined by the MEF? A. E-Tree B. E-LAN C. E-Line D. E-Interworking Correct Answer: C

When using the Cisco EVC software infrastructure, a double-tagged frame with a customer VLAN of 10 and a service provider VLAN of 150 will be best matched by which encapsulation configuration?

When using the Cisco EVC software infrastructure, a double-tagged frame with a customer VLAN of 10 and a service provider VLAN of 150 will be best matched by which encapsulation

When implementing H-VPLS with QinQ access on Cisco Metro Ethernet switches, which two commands enable the QinQ tagging?

When implementing H-VPLS with QinQ access on Cisco Metro Ethernet switches, which two commands enable the QinQ tagging? (Choose two.) A. encapsulation dot1q {customer-vlan} second-tag {sp-vlan} B. encapsulation dot1q {sp-vlan}

Implementing H-VPLS instead of VPLS reduces which requirement?

Implementing H-VPLS instead of VPLS reduces which requirement? A. having a full mesh of PWs between all the PE routers in the service provider MPLS core B. having a full

When implementing VPLS on Cisco IOS XR routers, the customer-facing subinterfaces on the PE routers are assigned to which Cisco EVC component?

When implementing VPLS on Cisco IOS XR routers, the customer-facing subinterfaces on the PE routers are assigned to which Cisco EVC component? A. bridge group B. bridge domain C. VFI

What is an advantage of using the Cisco EVC infrastructure to implement carrier-class Ethernet services that are not available on non-EVC-capable platforms?

What is an advantage of using the Cisco EVC infrastructure to implement carrier-class Ethernet services that are not available on non-EVC-capable platforms? A. PW redundancy B. interworking support C. PW

Which type of VPN requires a full mesh of virtual circuits to provide optimal site-to-site connectivity?

Which type of VPN requires a full mesh of virtual circuits to provide optimal site-to-site connectivity? A. MPLS Layer 3 VPNs B. Layer 2 overlay VPNs C. GET VPNs D.

Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network?

Which VPN technology uses the Group Domain of Interpretation as the keying protocol and IPsec for encryption that is often deployed over a private MPLS core network? A. DMVPN B.

What is used on the PE router to isolate potential overlapping routing information between different customers?

In MPLS Layer 3 VPN implementations, what is used on the PE router to isolate potential overlapping routing information between different customers? A. route targets B. VRFs C. VC IDs

Which mechanism is used to control which routes are imported to a VRF?

In MPLS Layer 3 VPN implementations, which mechanism is used to control which routes are imported to a VRF? A. RT B. RD C. VC ID D. PW ID E.

Which two statements regarding Cisco 6PE operations are correct?

Which two statements regarding Cisco 6PE operations are correct? (Choose two.) A. The top label in the label stack is assigned by MP-BGP, and it is used to reach the

Which Cisco IOS XR BGP configuration command is required to enable MP-BGP to carry IPv6 VPN routes?

Which Cisco IOS XR BGP configuration command is required to enable MP-BGP to carry IPv6 VPN routes? A. address-family ipv4 unicast B. address-family ipv6 unicast C. address-family vpnv4 unicast D.

Which flavor of MPLS Layer 3 VPN has MPLS enabled on PE-CE links?

Which flavor of MPLS Layer 3 VPN has MPLS enabled on PE-CE links? A. basic B. CSC C. inter-AS D. AToM E. VPLS Correct Answer: B

When implementing MPLS Layer 3 VPNs with customers running OSPF as the CE-PE routing protocol, which situation will require a sham link to be implemented in the MPLS backbone?

When implementing MPLS Layer 3 VPNs with customers running OSPF as the CE-PE routing protocol, which situation will require a sham link to be implemented in the MPLS backbone? A.

Which three Layer 3 VPN technologies are based on the overlay model?

Which three Layer 3 VPN technologies are based on the overlay model? (Choose three.) A. ATM virtual circuits B. Frame Relay virtual circuits C. GRE/IPsec D. L2TPv3 E. MPLS Layer

When redistributing the customer RIP routes into MP-BGP, the RIP metric is copied into which BGP attribute?

On Cisco IOS and IOS XE Layer 3 MPLS VPN implementations, when redistributing the customer RIP routes into MP-BGP, the RIP metric is copied into which BGP attribute? A. local

What is the primary difference between 6PE and 6VPE?

What is the primary difference between 6PE and 6VPE? A. 6VPE does not require an MPLS core. B. 6VPE requires an IPv6-aware core. C. 6VPE provides IPv6 VPN services. D.

Which option is used as a loop prevention mechanism to support MPLS VPN customers with multihomed sites?

Which option is used as a loop prevention mechanism to support MPLS VPN customers with multihomed sites? A. BGP down bit B. sham links C. AS override D. SOO extended

Which MP-BGP address family must be configured to use VPLS autodiscovery in a Cisco IOS XR router?

Which MP-BGP address family must be configured to use VPLS autodiscovery in a Cisco IOS XR router? A. address-family l2vpn vpls-vpws B. address-family vpnv4 unicast C. address-family ipv4 mdt D.

What must be implemented to enable Layer 3 MPLS VPN services?

Within the service provider IP/MPLS core network, what must be implemented to enable Layer 3 MPLS VPN services? A. IS-IS or OSPF on all the PE and P routers B.

When implementing MPLS Layer 3 VPNs with customers running OSPF as the CE-PE routing protocol, the service provider MPLS backbone looks like what to the CE routers?

When implementing MPLS Layer 3 VPNs with customers running OSPF as the CE-PE routing protocol, the service provider MPLS backbone looks like what to the CE routers? A. the backbone

Which two statements about implementing a separate MPLS VPN to provide customers Internet access are correct?

Which two statements about implementing a separate MPLS VPN to provide customers Internet access are correct? (Choose two.) A. The Internet gateway router will act as a CE router. B.

Which CE-to-PE routing protocol implements the down bit as a loop prevention mechanism?

Which CE-to-PE routing protocol implements the down bit as a loop prevention mechanism? A. RIPv2 B. EIGRP C. IS-IS D. OSPF E. BGP Correct Answer: D

When you are using OSPF as the CE-to-PE routing protocol in MPLS VPN implementations, an OSPF route from customerA site 1 in Area 0 will appear as which kind of OSPF route in customerA site 2, also in Area 0?

When you are using OSPF as the CE-to-PE routing protocol in MPLS VPN implementations, an OSPF route from customerA site 1 in Area 0 will appear as which kind of

What could be the problem?

In Layer 3 MPLS VPN implementations, if some of the VPNv4 routes on one PE router do not appear on another PE router, what could be the problem? A. RD

When implementing CSC services, which two methods can be used to exchange label information between the downstream CSC customer carrier and the CSC backbone carrier?

When implementing CSC services, which two methods can be used to exchange label information between the downstream CSC customer carrier and the CSC backbone carrier? (Choose two.) A. using MP-BGP

Which MPLS implementation?

The Cisco IOS XR address-family ipv4 labeled-unicast and the Cisco IOS/IOS XE neighbor send-label commands are used in which MPLS implementation? A. Cisco MPLS TE B. CSC using MP-BGP for

When verifying Layer 3 MPLS VPN operations, which Cisco IOS XR show command is best used to verify that the PE router is receiving the routes from the CE router?

When verifying Layer 3 MPLS VPN operations, which Cisco IOS XR show command is best used to verify that the PE router is receiving the routes from the CE router?

When implementing Layer 3 MPLS VPNs on Cisco IOS/IOS XE PE routers, which PE-to-CE routing protocol requires a separate routing process to be created for each VRF?

When implementing Layer 3 MPLS VPNs on Cisco IOS/IOS XE PE routers, which PE-to-CE routing protocol requires a separate routing process to be created for each VRF? A. EIGRP B.

What must be enabled on the PE router?

In Layer 3 MPLS VPN implementations, if a customer is using the same AS number at both customer sites and the PE-to-CE routing protocol is BGP, what must be enabled

Which three functions are performed by the PE router in an MPLS Layer 3 VPN?

Which three functions are performed by the PE router in an MPLS Layer 3 VPN? (Choose three.) A. exchanges routing updates with the CE router B. translates the CE routing

Which BGP extended community is used to control the distribution of VPN routing information and to identify routers that may receive a set of routes that carry the community?

Which BGP extended community is used to control the distribution of VPN routing information and to identify routers that may receive a set of routes that carry the community? A.

Which configuration mode is a route distinguisher configured in a Cisco IOS XR router?

In which configuration mode is a route distinguisher configured in a Cisco IOS XR router? A. config-vrf B. config-vrf-af C. config-bgp D. config-bgp-af E. config-bgp-vrf Correct Answer: E

Which Layer 2 VPN technology is implemented over an IP core network without the need for MPLS?

Which Layer 2 VPN technology is implemented over an IP core network without the need for MPLS? A. VPLS B. VPWS C. AToM D. L2TPv3 Correct Answer: D

Which two Layer 2 VPN methods support interworking between customer sites with different Layer 2 encapsulation at each end (for example, Frame Relay to Ethernet interworking)?

Which two Layer 2 VPN methods support interworking between customer sites with different Layer 2 encapsulation at each end (for example, Frame Relay to Ethernet interworking)? (Choose two.) A. AToM

What are the two AToM interworking modes?

What are the two AToM interworking modes? (Choose two.) A. bridged (interworking ethernet) B. routed (interworking ip) C. label-switched (interworking mpls) D. transparent (interworking transparent) Correct Answer: AB

When implementing a Layer 2 transport subinterface on a Cisco IOS XR router, which encapsulation option is used to match any packets that are not matched by any other service instances?

When implementing a Layer 2 transport subinterface on a Cisco IOS XR router, which encapsulation option is used to match any packets that are not matched by any other service

When configuring VPLS on the Cisco ASR 9000, which three configurations are required under the l2vpn configuration mode?

When configuring VPLS on the Cisco ASR 9000, which three configurations are required under the l2vpn configuration mode? (Choose three.) A. bridge-group B. bridge-domain C. xconnect D. vfi E. encapsulation

Which option is the correct command to define an interface as Layer 2 on the Cisco ASR 9000?

Which option is the correct command to define an interface as Layer 2 on the Cisco ASR 9000? A. RP/0/RSP0/CPU0:R1(config)#int gigabitEthernet 0/6/0/0 l2transport B. RP/0/RSP0/CPU0:R1(config)#int gigabitEthernet 0/6/0/0 layer2 C. RP/0/RSP0/CPU0:R1(config)#int

When implementing MPLS Layer 3 VPN services, which CE-PE routing method does not require the use of the redistribute command to enable the customer routes to be advertised through the MPLS cloud between the customer sites?

When implementing MPLS Layer 3 VPN services, which CE-PE routing method does not require the use of the redistribute command to enable the customer routes to be advertised through the

Which method is used to provide inter-AS AToM services?

Which method is used to provide inter-AS AToM services? A. back-to-back VRF B. targeted LDP C. pseudowire stitching D. AToM interworking E. Cisco MPLS TE tunnels F. autodiscovery Correct Answer:

When troubleshooting EoMPLS configuration problems, which three parameters must match between the two ends of the pseudowire configurations?

When troubleshooting EoMPLS configuration problems, which three parameters must match between the two ends of the pseudowire configurations? (Choose three.) A. control word usage B. MTU size C. pseudowire ID

Which Layer 2 protocol parameters can be carried inside the control word when implementing AToM service?

Which Layer 2 protocol parameters can be carried inside the control word when implementing AToM service? A. PW ID B. Frame Relay FECN, BECN, and DE bits C. encapsulation type

When implementing VPLS on Cisco routers, which data structure resembles a virtual switch and is used for learning the MAC addresses?

When implementing VPLS on Cisco routers, which data structure resembles a virtual switch and is used for learning the MAC addresses? A. VRF B. VFI C. SVI D. BVI Correct

Which two access architectures can be used between the UPE and NPE?

In hierarchical VPLS implementations, which two access architectures can be used between the UPE and NPE? (Choose two.) A. EoMPLS B. MP-BGP C. Frame Relay D. 802.1ad Correct Answer: AD

Which two methods can be used for VPLS PW signaling?

Which two methods can be used for VPLS PW signaling? (Choose two.) A. static B. BGP C. IGP D. LDP E. RSVP Correct Answer: BD