Download New Updated (Spring 2015) Cisco 350-029 Actual Tests 181-190

By | April 26, 2015

Ensurepass

 

QUESTION 181

GMPLS is based upon:

 

A.

VPI/VCI-based switching devices

B.

Non-Packet-based devices

C.

Packet-based switching devices

D.

None of the above

 

Correct Answer: B

Explanation:

The Generalized Multi-Protocol Label Switching (GMPLS)[1] is a protocol suite extending MPLS to manage further classes of interfaces and switching technologies other than packet interfaces and switching, such as time division multiplex, layer-2 switch, wavelength switch and fiber-switch.

 

GMPLS is composed of three main protocols:

Resource Reservation Protocol with Traffic Engineering extensions (RSVP-TE) signaling protocol.[5][6]

Open Shortest Path First with Traffic Engineering extensions (OSPF-TE) routing protocol.[7][8]

Link Management Protocol (LMP).[9]

 

 

QUESTION 182

The layer 2 protocol used by POS technology offers a standardized way for mapping IP packets into SONET/ SDH payloads. Select the correct sequence of POS operation:

 

1) Data is scrambled and synchronous mapping takes place by octet into the SONET/SDH frame.

2) Encapsulated via Point-to-Point Protocol (PPP) takes place framing information is added with High-level Data Link Control (HDLC).

3) Gaps between frames are filled with flags, set to value 7E.

4) Octet stuffing occurs if any flags or resultant escape characters (of value 7D) are found in the data.

5) Data is segmented into an IPdatagram with its 20-byte IP header.

 

A.

1, 3, 4, 5, 2

B.

5, 2, 3, 1, 4

C.

2, 3, 5, 4, 1

D.

5, 2, 3, 4, 1

E.

1, 2, 3, 4, 5

 

Correct Answer: D

Explanation:

The proper order of operation of PoS is:

When transmitting:

IP ->PPP -> FCS generation -> Byte stuffing -> Scrambling -> SONET/SDH framing When receiving:

SONET/SDH framing -> Descrambling -> Byte destuffing -> FCS detection -> PPP -> IP Remote

 

 

QUESTION 183

Which tworouters support cable access? (Choose two.)

 

A.

ME3000

B.

uBR10000

C.

ASR9000

D.

CRS-1

E.

ME3600

F.

uBR7200

 

Correct Answer: BF

Explanation:

Cisco uBR10000 Series Universal Broadband Routers

Cisco uBR7200 Series Universal Broadband Routers

 

 

QUESTION 184

In PPPoAarchitecture, which two methods are most commonly deployed? (Choose two)

 

A.

Terminating PPP sessions at the service provider

B.

PPP framing

C.

PPP multiplexing

D.

GRE tunneling

E.

L2TP tunneling

 

Correct Answer: AE

Explanation:

Reference

http://www.cisco.com/en/US/tech/tk175/tk819/technologies_white_paper09186a0080093bd2.shtml

 

In PPPoA architectures, the service destination can be reached in different ways. Some of the most commonly deployed methods are:

 

Terminating PPP sessions at the service provider

L2TP Tunneling

Using SSG

 

 

 

 

QUESTION 185

Which are three advantages of PPPoA implementation? (Choose three)

 

A.

NAP and NSP provide secure access to corporategateways without managing end-to- end PVCs. NAP and NSP use Layer 3 routing, Layer 2 Forwarding, or Layer 2 Tunneling Protocol tunnels. Hence, they can scale their business models for selling wholesale service.

B.

The NSP can oversubscribe by deploying idleand session timeouts using an industry standard RADIUS server for each subscriber.

C.

Only a single session per CPE on one virtual channel (VC). The username and password are configured on the CPE, so all users behind the CPE for that particular VC can access only one set of services. Users cannot select different sets of services, although using multiple VCs and establishing different PPP session on different VCs is possible.

D.

If a single IP address is provided to the CPE, and NAT or PAT is implemented,certain pplications such as IPTV, which embed IP information in the payload, well not work. Additionally, if an IP subnet feature is used, an IP address also has to be reserved for the CPE.

E.

PPPoA can use the features on the Cisco Service Selection Gateway (SSG)

 

Correct Answer: ABE

Explanation:

Advantages:

Per session authentication based on Password Authentication Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP). This is the greatest advantage of PPPoA as authentication overcomes the security holein a bridging architecture.

 

Per session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. Per session accounting enables a service provider to offer a minimum acc
ess levelfor minimal charge and then charge subscribers for additional services used.

 

IP address conservation at the CPE. This allows the service provider to assign only one IP address for a CPE, with the CPE configured for network address translation (NAT). All users behind one CPE can use a single IP address to reach different destinations. IP management overhead for the Network Access Provider/Network Services Provider (NAP/NSP) for each individual user is reduced while conserving IP addresses. Additionally, theservice provider canprovide a small subnet of IP addresses to overcome the limitations of port address translation (PAT) and NAT.

 

NAPs/NSPs provide secure access to corporate gateways without managing end-to-end PVCs and using Layer 3 routing or Layer 2Forwarding/Layer 2 Tunneling Protocol (L2F/L2TP) tunnels. Hence, they can scale their business models for selling wholesale services.

 

Troubleshooting individual subscribers. The NSP can easily identify which subscribers are on or off based on active PPP sessions, rather than troubleshooting entire groups as is the case with bridging architecture. The NSP can oversubscribe by deploying idle and session timeouts using an industry standard Remote Authentication Dial-In User Service (RADIUS) server for each subscriber. Highly scalable as we can terminate a very high number of PPP sessions on an aggregation router. Authentication, authorization, and accounting can be handled for each user using external RADIUS servers. Optimal use of features on the Service Selection Gateway (SSG).

 

Disadvantages:

Only a single session per CPE on one virtual channel (VC). Since the username and password are configured on the CPE, all users behind the CPE for that particular VC can access only one set of services. Users cannot select different sets of services, although using multiple VCs and establishing different PPP sessions on different VCs is possible.

 

Increased complexity of the CPE setup. Help desk personnel at the service provider need to be more knowledgeable. Since the username and password are configured on the CPE, the subscriber or the CPE vendor will need to make setup changes. Using multiple VCs increases configuration complexity. This, however, can be overcome by an autoconfiguration feature which is not yet released.

 

The service provider needs to maintain a database of usernames and passwords for all subscribers. If tunnels or proxy services are used, then the authentication can be done on the basis of the domain name and the user authentication is done at the corporate gateway. This reduces the size of the database that the service provider has to maintain.

 

If a single IP address is provided to the CPE and NAT/PAT is implemented, certain applications such as IPTV, which embed IP information in the payload, will notwork. Additionally, if an IP subnet feature is used, an IP address also has to be reserved for the CPE.

 

 

QUESTION 186

Which four of these key points should be considered during implementation of PPPoA architecture? (Choose four)

 

A.

The number of subscribers that will be serviced currently and in the future because this affects the number of required PPPoA sessions

B.

The types of applications that the NSP offers to the end subscriber

C.

The capacity of ATM and Frame Relay interworking on the NSP

D.

Inthe case of more than one user, whether all users need to reach the same final destination or service, or they all have different service destinations

E.

Whether the service provider or the final service destination is providing the IP address to the CPE of the subscriber

 

Correct Answer: ABDE

Explanation:

Implementation Considerations for PPPoA Architecture

The number of subscribers that will be serviced currently and in the future, as this affects the number of required PPP sessions.

Whether the PPP sessions are beingterminated at the service provider aggregation router or forwarded to other corporate gateways or Internet Service Providers (ISPs).

Whether the service provider or the final service destination is providing the IP address to the subscriber’s CPE.

Whetherthe IP addresses provided are legal public or private. Is the CPE going to do NAT/PAT or will NAT be performed at the termination destination?

Profiles of end subscribers, residential users, small office home office (SOHO) customers,and telecommuters.

In the case of more than one user, whether all users need to reach the same final destination or service, or they all have different service destinations.

Is the service provider providing any value added services like voice or video? Does the service providerrequire all subscribers to first go to a particular network before reaching a final destination? When subscribers use SSG, are they going to use passthrough services, PPP Terminated Aggregation (PTA), a mediation device, or proxy?

 

How the service provider bills subscribers–based on a flat rate, per session usage, or services used.

Deployment and provisioning of CPEs, DSLAMs and aggregation points of presence (POPs).

The business model for the NAP. Does the model also include selling wholesale services like secure corporate access and value added services like voice and video? Are NAPs and NSPs the same entity?

 

The business model of the company. Is it comparable to an independent local exchange carrier (ILEC), a competitive local exchange carrier (CLEC) oran ISP?

The types of applications the NSP will offer to the end subscriber.

The anticipated upstream and downstream volume of data flow.

Keeping these points in mind, we will discuss how the PPPoA architecture will fit and scale to different businessmodels for service providers and how the providers can benefit using this architecture.

 

 

QUESTION 187

Which three of these statements about PPPoE are true? (Choose three.)

 

A.

PPPoE can provide a host with access to a destination over Ethernet. You canhave only one PPPoE session per PVC.

B.

You must install PPPoE client software on all hosts that connect to the Ethernet segment. This means that the access provider must maintain a CPE.

C.

You cannot use PPPoE with Cisco Service Selection Gateway.

D.

PPPoE implementation is susceptible to broadcast storms and possible denial-of-service attacks.

E.

Per-session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. The service provider can also require a min
imum access charge.

 

Correct Answer: BDE

 

 

QUESTION 188

In a cable HFC plant, what is a modulator?

 

A.

Set top box

B.

Diplex filter

C.

Local head end

D.

Fiber node

 

Correct Answer: A

 

 

QUESTION 189

What is the effect of turning on allavailable downstream carrier tones in a DMT DSL transmission systems?

 

A.

Downstream RS error correction effectiveness is reduced.

B.

The downstream line rate and throughput remains unchanged, but FEC efficiency is reduced.

C.

The upstream DSL bandwidth isreduced, since less carriers become available for upstream traffic.

D.

The downstream DSL bandwidth is increased.

 

Correct Answer: D

 

 

 

 

 

QUESTION 190

During the modem boot process, how does the modem acquire the downstream channel?

 

A.

The modem is commanded by the CMTS to set to the specific channel.

B.

The modem uses the default value in the broadcom chipset.

C.

The modem tuner sets a level as defined by the DOCSIS specification.

D.

The modem tuner scans the downstream spectrum until digital QAM modulated signalis encountered

 

Correct Answer: D

 

Free VCE & PDF File for Cisco 350-029 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …