Download New Updated (Spring 2015) Cisco 350-029 Actual Tests 231-240

By | April 26, 2015

Ensurepass

 

 

QUESTION 231

DRAG DROP

Drag the command on the left to the correct step on the right to perform Frame Relay interworking with Ethernet over MPLS on a Cisco IOS router.

 

clip_image002

 

Correct Answer:

clip_image004

 

 

QUESTION 232

Which twoimplementations are standard Virtual Private LAN Service (VPLS) implementations that are supported by the IETF? (Choose two)

 

A.

VPLS uses LDP for signaling.

B.

VPLS uses BGP for autodiscovery and signaling.

C.

VPLS uses extended IS-IS for signaling

D.

VPLS uses OSPF version 3 for auto discovery and signaling

E.

VPLS uses spanning tree for signaling

 

Correct Answer: AB

 

 

QUESTION 233

Which three things are the building blocks of the Cisco VPLS architecture? (Choose three)

 

A.

VLAN Trunk Protocol (VTP)

< p class="MsoNormal" style="margin: 0cm 0cm 0pt; line-height: normal; text-autospace: ; mso-layout-grid-align: none" align="left">B.

StateSynchronization Protocol (SSP)

C.

L2VPN

D.

Ethernet Virtual Switch Interface (VSI)

E.

Label Distribution Protocol (LDP)

 

Correct Answer: CDE

 

 

 

QUESTION 234

What is the data encapsulation method for the VPLS virtual circuit (VC)?

 

A.

MAC over MPLS

B.

L2TPV3

C.

802.1 QinQ

D.

Ethernet over MPLS

E.

GRE

 

Correct Answer: D

 

 

QUESTION 235

With VPLS, which protocol is used for label exchange and PW signalling?

 

A.

MP-BGP

B.

LDP

C.

BGP

D.

MTP

E.

Directed LDP

F.

IGP

 

Correct Answer: E

Explanation:

Using a directed LDP session, each provideredge advertises a virtual circuit label mapping that is used as part of the label stack imposed on the Ethernet frames by the ingress provider edge during packet forwarding.

 

 

QUESTION 236

Which two statements are correct?

 

A.

A VC type 5 transports aVLAN over MPLS.

B.

A VC type 4 tunnels an Ethernet port over MPLS.

C.

A VC type 5 tunnels an Ethernet port over MPLS.

D.

A VC type 4 transports a VLAN over MPLS.

 

Correct Answer: CD

Explanation:

VC Type 4 is used for Ethernet VLAN mode.

VC Type 5 is used for Ethernet Port mode.

 

 

QUESTION 237

Which statement about VPLS is true?

 

A.

All CE devices emulate a bridge

B.

All provider devices emulate a bridge

C.

Hierarchical VPLS reduces signaling overhead

D.

Each PE device emulates a bridge

E.

Each CE device emulates a bridge

 

Correct Answer: C

Explanation:

A hierarchical model can be used to improve the scalability characteristics of VPLS. Hierarchical VPLS (HVPLS) reduces signaling overhead and packet replication requirements for the provider edge.

 

 

QUESTION 238

Which two statements about VPLSare true? (Choose two.)

 

A.

There is a full mesh of pseudo wires.

B.

There is a partial mesh of pseudo wires.

C.

Only L2TPv3 can be used for pseudo wire establishment.

D.

There is split-horizon to avoid loops.

 

Correct Answer: AD

 

 

QUESTION 239

According to RFC 3931, L2TPv3 utilizes the IANA assigned IP protocol ID of:

 

A.

110

B.

101

C.

121

D.

51

E.

151

F.

115

 

Correct Answer: F

Explanation:

IP Protocol 115 (L2TPv3)

 

 

QUESTION 240

Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?

 

A.

The session ID is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endport. The session ID will be negotiated by the control connection or statically defined if using the L2TP v3 data plane only.

B.

The cookie is a variable length (with a maximum of eight bytes),word-aligned optional field. The control connection can negotiate this as an additional level of guarantee beyond the regular session ID lookup to make sure that a data message has been directed tothe correct session or that any recently reused session ID will not be misdirected.

C.< /font>

The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnel endpoint. The cookie will be negotiated by the control connection or statically defined if using the L2TPv3 data plane only.

D.

The session ID is a variable length (with a maximum of eight bytes), word-aligned optional field. The control connection can negotiate this as an additional level of guarantee beyond theregular cookie lookup to make sure that a data message has been directed to the correct session or that any recently reused cookie will not be misdirected.

 

Correct Answer: AB

Explanation:

Session ID:

The 32-bit nonzero session ID carried in the data message header is usedto associate incoming data messages with a particular local attachment circuit. Note that one L2TPv3 session corresponds to one pseudowire.

 

Cookie:

Following the session ID is an optional variable length random cookie value (maximum 64 bits). This cookie value can be used in addition to the session ID and adds an extra level of assurance that the incoming data messages are correctly associated with the local attachment circuit. Furthermore, a randomly chosen cookie provides protection against blind insertion attacks. That is, an attacker would find it very difficult, if not impossible, to insert packets into a data stream (pseudowire) if the attacker is unable to sniff packets transiting the network between peer LCCEs. This is because of the difficulty of guessing the correct cookie value (0 to 264 if the cookie is 64 bits in length).

 

Free VCE & PDF File for Cisco 350-029 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …