Question 6 of 480

You are configuring MPLS traffic-engineering tunnels in the core. Which two ways exist for the tunnel path across the core? (Choose two.)
Answer

Suggested Answer

The suggested answer is B, E.

Community Votes2 votes
BESuggested
100%
Question 7 of 480

Which configuration mode do you use to apply the mpls ldp graceful-restart command in IOS XE Software?
Answer

Suggested Answer

The suggested answer is D.

Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_ha/configuration/xe-3s/mp-ha-xe-3s-book/mp-ldp-grace-rstrt.html
Community Votes2 votes
DSuggested
100%
Question 8 of 480

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services.
For which reason do you make this decision?
Answer

Suggested Answer

The suggested answer is A.

Implementing a full separation model for Internet access and MPLS L3VPN services enables EGP (Exterior Gateway Protocol) and IGP (Interior Gateway Protocol) to operate independently. This separation is crucial because EGP is used to exchange routing information between different autonomous systems, while IGP is used within an autonomous system. By maintaining separate routing instances for each service, the network can achieve enhanced performance and stability, as it prevents routing conflicts and ensures each protocol operates within its optimal context.

Community Votes7 votes
BMost voted
71%
ASuggested
29%
Question 9 of 480

Which statement about the Cisco MPLS TE forwarding adjacency feature is true?
Answer

Suggested Answer

The suggested answer is B.

The Cisco MPLS TE forwarding adjacency feature allows an MPLS Traffic Engineering tunnel to be advertised as a link in the Interior Gateway Protocol (IGP) routing tables. This enables the MPLS core network to facilitate traffic engineering by providing the capability to include MPLS TE tunnels as part of the IGP’s topology.

Community Votes2 votes
BSuggested
100%
Question 10 of 480

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.
After you issue this command, which BGP packets does the PE accept?
Answer

Suggested Answer

The suggested answer is D.

When configuring TTL security with the command 'neighbor 2.2.2.2 ttl-security hops 2', the router expects to receive BGP packets from the neighbor with a TTL value of at least 253. This is calculated as 255 (the maximum TTL value) minus the number of hops set (2). Therefore, the correct answer is that the PE accepts packets from 2.2.2.2 with a TTL of 253 or more.

Community Votes3 votes
DSuggested
100%