Download New Updated (Spring 2015) Cisco 350-029 Actual Tests 91-100

By | April 26, 2015

Ensurepass

 

QUESTION 91

What best explains the BGP route-reflector function?

 

A.

None of the above.

B.

BGP route-reflector does not have to be in the forwarding path of data coming from its clients.

C.

BGP route-reflector will stop reflecting the routes if they’re not directly-connected clients.

D.

BGP route-reflector should be in forwarding path of data coming from its clients.

 

Correct Answer: B

 

 

QUESTION 92

What is the order of preference for these commands when all of them are applied to one neighbor in the BGP inbound filter direction?

 

A.

prefix-list/distribute-list, filter-list, route-map

B.

route-map, filter-list, prefix-list/distribute-list

C.

route-map, prefix-list/distribute-list, filter-list

D.

filter-list, prefix-list/distribute-list, route-map

E.

prefix-list/distribute-list, route-map, filter-list

 

Correct Answer: B

Explanation:

Q. What is the order of preference of attributes when some or all are applied to one neighbor in BGP?

 

A.The order of preference varies based on whether the attributes are applied for inbound updates oroutbound updates.

 

For inbound updates the order of preference is:

 

route-map

filter-list

prefix-list, distribute-list

 

For outbound updates the order of preference is:

 

prefix-list, distribute-list

filter-list

route-map

 

Note

The attributes prefix-list anddistribute-list are mutually exclusive, and only one command (neighbor prefix-list or neighbor distribute-list) can be applied to each inbound or outbound direction for a particular neighbor.

 

 

QUESTION 93

Which two statements about the bgp deterministic-med and bgp always-compare-med commands are true? (Choose two)

 

A.

The bgp deterministic-med command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS path length

B.

The bgp always-compare command is used to influence the BGP route selection process to cause the MED attribute to have higher precedence over the AS path system.

C.

Enabling the bgp deterministic-med command ensures the comparison of the MED variable when choosing routes advertised by different peers in the same autonomous system.

D.

Enabling the bgp always-compare-med command ensures the comparison of the MED variable for paths from neighbors in different autonomous systems.

E.

The bgp deterministic-med and bgp always-compare-med commands are enabled by defult.

 

Correct Answer: CD

Explanation:

Enabling the bgp deterministic-med command ensures the comparison of the MED variable when choosing routes advertised by different peers in the same autonomous syste
m. Enabling the bgpalways-compare-med command ensures the comparison of the MED for paths from neighbors in different autonomous systems.

 

Note

The bgp deterministic-med and bgp always-compare-med commands are not enabled by default. Also, the two commands are separate; enabling one does not automatically enable the other.

 

 

QUESTION 94

What is the requirement of Remote Triggered Black Hole (RTBH) filtering?

 

A.

ISIS updates exchange between trigger router and black hole router

B.

EBGP updates exchange between trigger router and black hole router

C.

None of above

D.

OSPF updates exchange between trigger router and black hole router

E.

IBGP updates exchange between trigger router and black hole router

 

Correct Answer: E

 

 

QUESTION 95

Which of the following are steps to configure destination-based Remote Triggered Black Hole (RTBH) filtering? (Choose three.)

 

A.

Configure BGP between trigger and black hole routers.

B.

Configure OSPF between trigger router and black hole routes

C.

Configure all edge routers with static (reserved) host route to Null0

D.

Configure on trigger router to advertise victim host route with community

E.

Activate black hole by redistributing route for victim into BGP with next-hop set to the static (reserved) hostroute configured on edge routers.

 

Correct Answer: ACE

Explanation:

The three steps in destination-based black hole filtering are summarized below.

 

Step 1. The setup (preparation)

A trigger is a special device that is installed at the NOC exclusively for the purpose of triggering a black hole.

The trigger musthave an iBGP peering relationship with all the edge routers, or, if using route reflectors, it must have an iBGP relationship with the route reflectors in every cluster. The trigger is also configured to redistribute static routes to its iBGP peers. It sends the static route by means of an iBGP routing update.

 

Step 2. The trigger

An administrator adds a static route to the trigger, which redistributes the route by sending a BGP update to all its iBGP peers, setting the next hop to the target destination address under attack as 192.0.2.1 in the current example. The PEs receive their iBGP update and set their next hop to the target to the unused IP address space 192.0.2.1. The route to this address is set to null0 in the PE, using a static routing entry in the router configuration. The next hop entry in the forwarding information base (FIB) for the destination IP (target) is now updated to null0. All traffic to the target will now be forwarded to Null0 at the edge and dropped.

 

Step 3. The withdrawal

Once the trigger is in place, all traffic to the target destination is dropped at the PEs. When the threat no longer exists, the administrator must manually remove the static route from the trigger, which sends a BGP route withdrawal to its iBGP peers. This prompts the edge routers to remove the existing route for the target that ispointed to 192.0.2.1 and to install a new route based on the IGP routing information base (RIB).

 

 

QUESTION 96

Which statement about Remotely Triggered Black Hole (RTBH) is true?

 

A.

Route tagging is one of the techniques used by RTBH

B.

It is used for BGP authentication

C.

It cannot work with static routes

D.

It uses extended ACLs for blocking attacks by creating a black hole

E.

Before configuring RTBH. LDP must be enabled on the interface

 

Correct Answer: A

QUESTION 97

Refer to the exhibit. The SP network is configuring Remote Filtering to protect hosts on network 152.68.19.0/24. Which routers should be configured to the sinkhole router?

 

clip_image002

 

A.

L and K

B.

A, B, F, G, and H

C.

C and D

D.

A, B, G, and H

E.

A, D, F, G, and L

 

Correct Answer: A

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 98

Refer to the exhibit. If the SP network is configuring RTBH filtering to protect hosts on the 152.68.19.0/24 network, which router should be configured as the black hole activating router?

 

clip_image003

 

A.

F

B.

C

C.

D

D.

L

E.

A

F.

K

 

Correct Answer: A

Explanation:

1.13. Security in core

1.13.15. Remote triggered black hole (RTBH)

 

 

QUESTION 99

Which three protocols use TLVs to carry attributes? (Choose three.)

 

A.

Cisco Discovery Protocol

B.

Label DiscoveryProtocol

C.

Border Gateway Protocol

D.

OSPF

E.

RIP version 2

 

Correct Answer: ABC

 

 

QUESTION 100

Which three statements about BGP confederation and route reflectors are true? (Choose three)

 

A.

Clusters are used in confederation schemes to avoid loops.

B.

BGP network can have a confederation within a route reflector area.

C.

An internal BGP network cannot have a route reflector within a confederation.

D.

An internal BGP network can have a route reflector within a confederation.

E.

Clusters are used in routereflector schemes to avoid loops.

F.

BGP network cannot have a confederation within a route reflector area.

 

Correct Answer: DEF

 

Free VCE & PDF File for Cisco 350-029 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …