CCIE SP Written Exm, “350 – 029”, Study Questions And Answers
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

CCIE SP Written Exm, “350 – 029”, Study Questions And Answers

on

  • 959 views

Cisco CCIE SP Written Exam " 350-029 " Study Questions and Answers

Cisco CCIE SP Written Exam " 350-029 " Study Questions and Answers

Statistics

Views

Total Views
959
Views on SlideShare
956
Embed Views
3

Actions

Likes
0
Downloads
38
Comments
0

2 Embeds 3

http://www.linkedin.com 2
https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

CCIE SP Written Exm, “350 – 029”, Study Questions And Answers Document Transcript

  • 1. October 16, 2012 [CCIE SP Written Exam, “350 – 029”, Study Questions and Answers] CCIE SP Written Exam, V3.0
  • 2. Cisco 350-029 ExamTopic 1, Main Questions Set # 1QUESTION NO: 1Refer to the exhibitWhich Cisco IOS feature does this algorithm illustrate?A. OSPF exponential back-offB. IP event dampeningC. partial SPFD. EIGRP DUALE. the Cisco MPLS traffic engineering path recalculationANSWER: BExplanation:QUESTION NO: 2What is the encapsulation format of an MPLS Multicast VPN (MVPN) packer?A. IP unicast in IP unicastB. IP multicast in IP anycastC. IP anycast in IP anycastD. IP multicast in IP unicastE. IP multicast in IP multicastF. IP unicast in IP multicastANSWER: EExplanation: 2
  • 3. Cisco 350-029 ExamQUESTION NO: 3What is the port number of an IPsec Encapsulating Security Payfoad packet?A. UOP port 50B. IP protocol 51C. TCP port 51D. TCP port 50E. IP protocol 50F. UDP port51ANSWER: EExplanation:QUESTION NO: 4Refer to the exhibitWhich IPv6 deployment feature is displayed?A. MPLS 6PEB. MPLS 6VPEC. 6 to 4 Replay ServiceD. native IPv6 over MPLSE. 6 to 4 TunnelANSWER: BExplanation: 3
  • 4. Cisco 350-029 ExamQUESTION NO: 5What is the minimum hardware configuration of the multishelf Cisco CRS- 1 system?A. one route processor (RP) Card and one modular services card (MSC)B. one distributed route processor (DRP) and one S13 fabric card (SFC)C. one line card chassis (LCC) and one fabric card chassis (FCC)D. one route processor (RP) and one fabric card chassis (FCC)E. one line card chassis (LCC) and one S13 fabric card (SFC)ANSWER: CExplanation:QUESTION NO: 6How many bits does EXP occupy in the MPLS label header?A. 8B. 4C. 3D. 1E. 2ANSWER: CExplanation:QUESTION NO: 7Which three of these can be a forwarding equivalence class? (Choose three)A. IPsec tunnelB. routing equivalence pathsC. traffic engineering tunnelD. bridge or switch instanceE. groups of IP addressesANSWER: C,D,EExplanation: 4
  • 5. Cisco 350-029 ExamQUESTION NO: 8You are about to design a very fast convergence time on a service provider network. Whichfeature would you utilize to declare a link failure within less than two seconds of the fault on a link?A. fast convergence SFPB. MTU discoveryC. redundancy linksD. keepaliveE. carrier delayANSWER: EExplanation:QUESTION NO: 9What is the default BGP scanner time?A. 10 minutesB. 5 minutesC. 120 secondsD. 60 secondsE. 30 minutesANSWER: DExplanation:QUESTION NO: 10Which statement about standard STS-1 SONET framing is true?A. 8 rows by 64 bytesB. 6 rows by 64 bytesC. 10 rows by 96 bytesD. 8 rows by 128 bytesE. 9 rows by 90 bytesANSWER: E 5
  • 6. Cisco 350-029 ExamExplanation:QUESTION NO: 11In the Carrier Support Carrier (CsC) feature, which two protocols run CSC-PE and CSC-CS(Choose two)A. EBGPv4 with a sending communityB. IGP and LDPC. EBGPv4 with a sending labelD. IGP and EBGPv4E. IGP and RSVPANSWER: B,DExplanation:QUESTION NO: 12Which three are optional extensions of the Frame Relay Local Management Interfacespecification? (Choose three)A. switched virtual circuitB. virtual circuit statusC. simple flow controlD. multicastingE. permanent virtual circuitANSWER: B,C,D Explanation:http://www.cisco.com/en/US/docs/internetworking/troubleshooting/guide/tr1918.htm#wp1020573lLMI Extensions In addition to the basic Frame Relay protocol functions for transferring data, theconsortium Frame Relay specification includes LMI extensions that make supporting large,complex internetworks easier. Some LMI extensions are referred to as "common" and areexpected to be implemented by everyone who adopts the specification. Other LMI functions arereferred to as "optional." A summary of the LMI extensions follows:•Virtual circuit status messages(common)—Provide communication and synchronization between the network and the userdevice, periodically reporting the existence of new PVCs and the deletion of already existingPVCs, and generally provide information about PVC integrity. Virtual circuit status messagesprevent the sending of data into black holes—that is, over PVCs that no longer exist.•Multicasting 6
  • 7. Cisco 350-029 Exam(optional)—Allows a sender to transmit a single frame but have it delivered by the network tomultiple recipients. Thus, multicasting supports the efficient conveyance of routing protocolmessages and address resolution procedures that typically must be sent to many destinationssimultaneously.•Global addressing (optional)—Gives connection identifiers global rather than localsignificance, allowing them to be used to identify a specific interface to the Frame Relay network.Global addressing makes the Frame Relay network resemble a local-area network (LAN) in termsof addressing; Address Resolution Protocols, therefore, perform over Frame Relay exactly as theydo over a LAN.•Simple flow control (optional)—Provides for an XON/XOFF flow controlmechanism that applies to the entire Frame Relay interface. It is intended for devices whosehigher layers cannot use the congestion notification bits and that need some level of flow control.QUESTION NO: 13Which two models are the models of DiffServ-Aware Traffic Engineering? (Choose two)A. Policy-based ModelB. Class based ModelC. Russian Doll ModelD. Global Tunnel ModelE. Maximum Allocation ModelANSWER: C,EExplanation:QUESTION NO: 14Refer to the exhibit 7
  • 8. Cisco 350-029 ExamIf the SP network is configuring Remotely Triggered Black Hole filtering to protect hosts on the152.68.19.0/24 network, which router should be configured as the black hole activating router?A. FB. CC. DD. LE. AF. KANSWER: AExplanation:QUESTION NO: 15Which type of AAL does ATM utilize to deliver CBR traffic?A. AAL2B. AAL 4C. AL 5D. AAL 1E. AAL 3ANSWER: DExplanation: 8
  • 9. Cisco 350-029 ExamQUESTION NO: 16Which statement about VPLS is true?A. All CE devices emulate a bridgeB. All provider devices emulate a bridgeC. Hierarchical VPLS reduces signaling overheadD. Each PE device emulates a bridgeE. Each CE device emulates a bridgeANSWER: CExplanation:QUESTION NO: 17All secure domain routers (SDRs) have shared attribute and resources. Which three resources areshared all SDRs? (Choose three)A. privilege-level configurationB. fabric cardsC. SNMP trapsD. admin- level configurationE. exec- level configurationANSWER: B,C,DExplanation:QUESTION NO: 18When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?A. hub and spokeB. PEC. CED. hubE. spokeANSWER: DExplanation: 9
  • 10. Cisco 350-029 ExamQUESTION NO: 19In the Carrier Supporting Carrier (CsC) feature, which two protocols run between CSC-PE andCSC-CE (Choose two)A. IGP and RSVPB. EBGPv4 with a sending communityC. IGP and EBGPv4D. IGP and LDPE. EBGPv4 with a sending labelANSWER: D,EExplanation:QUESTION NO: 20Which two statements about 10 Gigabit Ethernet (10GE) are true? (Choose two.)A. 10 Gigabit Ethernet does not support VLAN definitionB. 10 Gigabit Ethernet supports full duplex links, but does not support half duplex links.C. 10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connectionsD. 10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection(CSMA/CD).E. 10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is notsupported.ANSWER: B,CExplanation:QUESTION NO: 21What is the BGP synchronization rule?A. BGP should not advertise a route until that route has been learned via an IGP.B. Routing information received through an EBGP session is not forwarding to another EBGPneighbor, only to IBGP neighbors.C. BGP neighbor peerings are established and synchronized using TCP.D. BGP should not advertise a route when that route has been learned via an IGP 10
  • 11. Cisco 350-029 ExamE. Routing information received through an IBGP session is not forwarding to another IBGPneighbor, only to EBGP neighbors.ANSWER: AExplanation:QUESTION NO: 22Refer to the exhibitIf the service provider is an IPv4-only network, which two of these approaches can enable IPv6tunneling between Site A and Site B over the backbone? (Choose two.)A. DNSB. NeTBIOSC. FTPD. GRE tunnelE. L2TP v3ANSWER: D,EExplanation: 11
  • 12. Cisco 350-029 ExamQUESTION NO: 23Which statement about the use of Route Target Rewrite is true?A. It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the ASBR to avoidmisconfiguration of the Route Target assignment for VPN configurationsB. It is mainly used in Inter-AS MPLS VPN deployments and is configured at the ASBR to avoidmisconfiguration of the Route Target assignment for VPN configurations.C. It is mainly used in Intra-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration in Route Target assignment for VPN configurationsD. It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the Router Reflectorto avoid misconfiguration of the Route Target assignment for VPN configurationsE. It is mainly used in Inter-AS MPLS VPLS deployments and is configured at the PE router toavoid to misconfiguration of the Route Target assignment for VPN configurationsANSWER: BExplanation:QUESTION NO: 24Which three are advantages of SONET? (Choose three)A. Allows the transportation of all forms of trafficB. Multiplexing is easyC. Clocks do not need to be synchronizedD. Reduces network complexity and costE. Padding is not necessary and not permittedANSWER: A,B,DExplanation:QUESTION NO: 25Which three statements about MPLS traffic engineering (MPLS TE) are true? (Choose three)A. MPLS TE supports admission controlB. MPLS TE tunnel traffic is a link attribute to compute the TE tunnel pathC. MPLS TE uses BGP extension to advertise link attributesD. MPLS TE provides protection capabilityE. MPLS TE uses RSVP to establish LSP 12
  • 13. Cisco 350-029 ExamANSWER: A,D,EExplanation:QUESTION NO: 26Refer to the exhibitInbound Infrastructure ACLs are configured to protect the SP network. Which three types of trafficshould be filtered in the infrastructure ACLs? (Choose three.)A. traffic from a source with an IP address that is within 239.255.0.0/16B. FTP traffic destined for internal routersC. IPsec traffic that at an internal routerD. traffic from a source with an IP address that is within 162.238.0.0/16E. EBGP traffic that peers with edge routersANSWER: A,B,DExplanation:QUESTION NO: 27Which tree of these are types of Ethernet Virtue Connections (EVCs) in the MEF concept? 13
  • 14. Cisco 350-029 Exam(Choose three)A. multipart-to-multipoint EVC (E-LAN)B. hub spoke EVC (E-Tree)C. point to point EVC (E-Line)D. rooted multipoint EVC (E-Tree)E. point-to-multipoint EVC (E-Tree)ANSWER: A,C,DExplanation:QUESTION NO: 28Which two statements about OSPF IPv6 routing are true? (Choose two)A. It requires OSPF version 3.B. automatically detects neighbors over NHMA interfacesC. It supports encryption usingD. It uses LSA type 9E. It uses LSA type 8ANSWER: A,EExplanation:QUESTION NO: 29In the Cisco Resilient Ethernet Protocol (REP), how many ports are always blocking?A. zeroB. at least oneC. at least twoD. at least fourE. at least threeANSWER: EExplanation:QUESTION NO: 30 14
  • 15. Cisco 350-029 ExamWhich statement about ATM AAL5 over MPLS is true?A. It supports ATM signaling.B. It supports traffic shaping of packets in MPLS to the ATM path.C. It supports ATM switched virtual circuitsD. It supports fragmentation and reassembly.E. It supports AAL5 SDU switchingANSWER: EExplanation:Reference:http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/fsaal22.html#wp1015337QUESTION NO: 31Which two statements about MPLS point-to-multipoint traffic engineering (P2MP TE) are true?(Choose two)A. P2MP TE uses an OSPF extension that is different from the OSPF extension that is used inP2P TE.B. Loose path is not supported in P2MP TE.C. Multiple IP multicast groups can map to one P2MP tunnel.D. Affinity is not supported in P2MP TE.E. P2MP TE uses Constrained Shortest Path First (CSPF) to calculate paths.ANSWER: C,EExplanation:QUESTION NO: 32In which Cisco IOS configuration mode is the route distinguisher (RD) configured?A. R1(config-route-at)#B. R1(config-route-map)#C. R1(config-it)#D. R1(config-vrf)#E. R1(config)#F. R1(router)#ANSWER: D 15
  • 16. Cisco 350-029 ExamExplanation:QUESTION NO: 33Which two features prevent routing loops between the OSPF sites of a customer when the sitesare multi-homed or a backdoor link is used between the sites? (Choose two.)A. sham linkB. down bitC. virtual linkD. Site of OriginE. domain tagANSWER: B,EExplanation:QUESTION NO: 34Cisco IOS XR software is partitioned into three planes: control, data, and management. Whichthree of these belong to the data plane? (Choose three.)A. XMLB. RIBC. FIBD. QoSE. PFIANSWER: B,D,EExplanation:QUESTION NO: 35In which two ways does the BGP graceful capability preserve prefix information during a restart?(Choose two)A. The peer router immediately removes the BGP routers that it learned from the restarting routerfrom its BGP routing tables.B. The router establishes BGP sessions with other routers and relearns the BGP routes from 16
  • 17. Cisco 350-029 Examothers that are also capable of graceful restart. The restarting router waits to receive updates fromthe neighboring routers. When the neighboring routers send end-of-RIB messages to indicate thatthey are done sending updates, the restarting router starts sending its own updates.C. The peer router sends an end-of-RIB message to the restarting router.D. The restarting router removes any stale prefixes after the timer for stale entries expires.E. The restarting router does not remove any stale prefixes after the timer for stale entries expires.ANSWER: B,DExplanation:QUESTION NO: 36Which four of these statements are restrictions for Frame Relay PVC bundles with QoS support forIP and MPLS? (Choose four)A. A PVC bundle will not come up unless all the precedence, DSCP, and EXP levels areconfigured in the bundle.B. A PVC bundle can perform precedence and DSCP matching at the same timeC. A PVC bundle may contain no more than sixteen PVCsD. A PVC can be in only one PVC bundleE. A PVC bundle cannot perform precedence and DSCP matching at the same time.F. A PVC bundle may contain no more than eight PVCs.ANSWER: A,D,E,F Reference:http://www.cisco.com/en/US/docs/ios/12_2t/12_2t13/feature/guide/ft_frbnd.html#wp1027175QUESTION NO: 37When the Cisco IOS OSPF command ip ospf dead-interval minimal hello-multiplier 5 is configured,which two statements are true? (Choose two.)A. OSPF hello interval is 5 secondsB. OSPF hello interval is 1 secondC. OSPF dead interval is 1 secondD. OSPF dead interval is 5 secondsE. OSPF dead interval is 20 secondsF. OSPF hello interval is 0.2 secondANSWER: C,F 17
  • 18. Cisco 350-029 ExamExplanation:QUESTION NO: 38Which three BGP attributes are carried by TLV? (Choose three)A. local preferenceB. weightC. originD. Network Layer Reachability InformationE. multiple exit discriminatorANSWER: A,D,EExplanation:QUESTION NO: 39Which statement about L2VPN Pseudowire Switching is not true?A. L2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across an inter-AS boundaryB. L2VPN Pseudowire Switching allows the user to extend L2VPN Pseudowires across twoseparate MPLS networks.C. Quality of service is not supported per PseudowireD. L2VPN Pseudowire Switching connects two or more contiguous Pseudowires segments to froman end-to-end multihop PseudowireE. The Cisco MPLS Traffic Engineering tunnel selection is not supportedANSWER: EReference: http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/fsstitch.html#wp1053770QUESTION NO: 40What are the Address Family Identifier (AFI) and Subsequent Address Family Identifier (SAFI)values for VPNv6?A. AFI is 2, SAFI is 96 18
  • 19. Cisco 350-029 ExamB. AFI is 1, SAFI is 98C. AFI is 1, SAFI is 64D. AFI is 1, SAFI is 128E. AFI is 2, SAFI is 128F. AFI is 2, SAFI is 64ANSWER: EExplanation:QUESTION NO: 41What is the default maximum transmission unit on the Cisco router ATM interface?A. 4470 bytesB. 1516 bytesC. 9288 bytesD. 1500 bytesE. 1492 bytesANSWER: AExplanation:QUESTION NO: 42Which four services use the inner labels of an MPLS label stack? (Choose four)A. MPLS VPNB. switching path in MPLS coreC. Cisco MPLS Traffic Engineering and Fast RerouteD. MPLS over ATME. VPN over Traffic Engineering coreF. any transport over MPLSANSWER: A,C,E,FExplanation:QUESTION NO: 43Which three statements about bidirectional PIM are true? (Choose three) 19
  • 20. Cisco 350-029 ExamA. Traffic for a bidirectional group flows along the one shared tree and simultaneously utilizesmultiple paths in a redundant network topology.B. It does not require any traffic signaling in the protocolC. Membership to a bidirectional group is signaled using explicit Join messages.D. It maintains source-specific forwarding state.E. It reduces memory, bandwidth, and CPU requirementsANSWER: B,C,EReference:http://www.cisco.com/en/US/docs/ios/12_1t/12_1t2/feature/guide/dtbipim.htmlQUESTION NO: 44Which statement about OSPF authentication is true?A. To enable OSPF authentication in a network, OSPF area 0 authentications must be enabledfirst.B. The payload of OSPF version 3 packets contains no authentication information.C. OSPF version 3 supports Advanced Encryption StandardD. OSPF version 3 uses router ID as a key to encrypt OSPF hello packets.E. OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP.ANSWER: BExplanation:QUESTION NO: 45Which three statements about L2TPv3 are true? (Choose three)A. L2TPv3 Frame Relay support includes only 32-bit DLCI addressing.B. L2TPv3 sessions do not support Frame Relay LMI interworking.C. Multipoint DLCI is not supported.D. To use DCE or a Network-to-Network Interface on a Frame Relay port, you must configure theframe-relay switching command.E. L2TPv3 feature does not support Frame Relay extended addressing.ANSWER: B,D,EExplanation: 20
  • 21. Cisco 350-029 ExamQUESTION NO: 46Which statement about Software Maintenance Upgrade is true?A. CRS-1 SMU can be applied to a different platform, and vice versa.B. SMU is an executable code for running a process or libraries that are shared between thedifferent processes.C. SMUs for each release are individually downloadable from Cisco.com and come in the form ofa tar ball.D. SMUs provide software fixes for critical network down and qualification blocking issues.Therefore, every software defect has a corresponding SMU.E. SMUs are release-specific. If an issue affects multiple platforms or releases, an SMU is builtseparately for each release and each platform.ANSWER: EExplanation:QUESTION NO: 47Which three statements about the Cisco MPLS TE Fast Reroute (FRR) process are true?(Choose three.)A. TE tunnels that are configured with the FRR option cannot be used as backup tunnels.B. TE tunnels that are configured with the FRR option can be used as backup tunnels.C. The backup tunnel that is used to protect a physical interface must have a valid IP addressconfigured.D. Interfaces must use MPLS global label allocation.E. The source IP address of use backup tunnel and the merge point (MP) should not bereachable.ANSWER: A,C,DExplanation:QUESTION NO: 48Which three of these are major components of an MPLS VPN network? (Choose three) 21
  • 22. Cisco 350-029 ExamA. LDP notificationB. L2TPv3 sessionC. VPN route target communitiesD. Multiprotocol BGP peering of PE routersE. MPLS forwardingANSWER: C,D,EExplanation:QUESTION NO: 49Which two Any Transport over MPLS (AToM) traffic encapsulations require the use of a controlword? (Choose two)A. HDLCB. ATM AAL5C. PPPD. Ethernet VLANE. Frame RelayANSWER: B,EReference: http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/fsatoma.htmlQUESTION NO: 50Which two statements about spanning tree path cost are true? (Choose two)A. The path cost can be changed for an interface using the spanning-tree cost command.B. The path cost can be changed for an interface using the stp path-cost command.C. The SPT default path cost depends on the interface speed.D. The STP default path cost is similar for all interface.ANSWER: A,CExplanation:QUESTION NO: 51Which three of these statements about PPPoP are true? (Choose three) 22
  • 23. Cisco 350-029 ExamA. You must install PPPoP client software on all hosts that connects to the Ethernet segment. Thismeans that the access provider must maintain a CPE.B. PPPoP can provide a host with access to a destination over Ethernet. You can have only onePPPoP session per PVC.C. PPPoP implementation is susceptible to broadcast storms and possible denial-of-serviceattacks.D. You cannot use PPPoP with Cisco Service Selection Gateway.E. Per-session accounting is possible, which allows the service provider to charge the subscribebased on session time for various services offered. The service provider can also require aminimum access change.ANSWER: A,C,EExplanation:QUESTION NO: 52Which three of these statements about the IP service level agreement (SLA) sender are true?(Choose three)A. SLA sender target can be an IP hostB. SLA sender sends a probe packet and a response probe packetC. SLA sender sends a probe packetD. SLA sender target must be a routerE. SLA sender target can be an IP SLA responderANSWER: A,C,EExplanation:QUESTION NO: 53Which three modes are the operating of HDLC? (Choose three)A. asynchronous balanced mode (ABM)B. normal response mode (NRM)C. normal peer mode (NPM)D. asynchronous client mode (ACM)E. asynchronous response mode (ARM)ANSWER: A,B,EExplanation: 23
  • 24. Cisco 350-029 ExamQUESTION NO: 54Which three statements about NetFlow are true? (Choose three)A. NetFlow records unidirectional IP traffic flow.B. NetFlow records MPLS frame flow.C. NetFlow expert is only over TCP.D. NetFlow records is only over UDP.E. NetFlow records subinterface information of traffic flow.ANSWER: A,B,EExplanation:QUESTION NO: 55Which three statements about NetFlow are true? (Choose three)A. LCP is used for PPP over ATM (PPPoA) setup.B. LCP is used for PPP over Ethernet (PPPoE) setup.C. LCP is used for PPP over Ethernet (PPPoPR) setup.D. LCP is used for PPP CHAP authentication.E. LCP is used for basic PPP link setup and operation.ANSWER: A,B,EExplanation:QUESTION NO: 56How many messages does Internet Key Exchange use to negotiate SA characteristics when itruns in aggressive mode?A. 3B. 4C. 5D. 2E. 6ANSWER: A 24
  • 25. Cisco 350-029 ExamExplanation:QUESTION NO: 57Which four statements about Ethernet virtual circuit (EVC) infrastructure are true?(Choose four)A. EVC infrastructure is a Layer 3 platform-independent routing architecture that supports IP overEthernet services.B. Ethernet flow point (EFP) is configured on the main interface.C. Feature commands like MQC-based QoS policies can be specified.D. EVC infrastructure is a Layer 2 platform-independent bridging architecture that supportsEthernet services.E. Each Ethernet flow point (EFP) matches a predefined VLAN tag-based criteria.F. Ethernet flow point (EFP) is configured on the VLAN interface.ANSWER: B,D,E,FExplanation:QUESTION NO: 58What does RPL stand for?A. routing primary languageB. routing policy languageC. routing police languageD. routing program languageE. routing protocol languageANSWER: BExplanation:QUESTION NO: 59What three major tasks are performed by a Designated Intermediate System in an ISISpseudonode environment? (Choose three.) 25
  • 26. Cisco 350-029 ExamA. Updating the pseudonode LSPB. maintaining pseudonode link-state informationC. creating the pseudonodeD. flooding LSPs over the LANE. election of the pseudonodeANSWER: A,C,EExplanation:QUESTION NO: 60What is the data encapsulation method for the VPLS virtual circuit (VC)?A. MAC over MPLSB. L2TPV3C. 802.1 QinQD. Ethernet over MPLSE. GREANSWER: DExplanation:QUESTION NO: 61What is the Cisco IOS default behavior for switching from the shared tree to the shortest path treein PIM-SM operations?A. immediately after receiving the first packet on the shared tree for a given (S,G)B. after receiving over 1 kb/s traffic onthe shared tree for a given (S,G)C. 10 seconds after receiving the first packet on the shared tree for a given (S,G)D. 30 seconds after receiving the first packet on the shared tree for a given (S,G)E. after receiving over 10 kb/s traffic onthe shared tree for a given (S,G)ANSWER: AExplanation:QUESTION NO: 62Which four statements about the Carrier Supporting Carrier (CSC) feature are true? 26
  • 27. Cisco 350-029 Exam(Choose four)A. MPLS is required between the PE and CE routers that connect the backbone carrier to thecustomer carrier.B. The backbone carrier must enable the PE router to check that the packets it receives from theCE router contain only the labels that the PE router advertised to the CE router.C. Every packet that crosses the backbone carrier must be encapsulated so that the packetincludes MPLS labelsD. AII PE routers that link the backbone carrier to the customer carrier must run Route TargetRewrite.E. A routing protocol is required between the PE and CE routers that connect the backbone carrierto the customer carrier. The routing protocol enables the customer carrier to exchange IGP routinginformation with the backbone carrier.ANSWER: A,B,C,EExplanation:QUESTION NO: 63Which of these is not a component of MPLS traffic engineering?A. trunk admission controlB. forwarding traffic to tunnelC. information distributionD. path selection, calculation, and setupE. traffic patterns predictionANSWER: EExplanation:QUESTION NO: 64Which are three advantages of PPPoA implementation? (Choose three)A. NAP and NSP provide secure access to corporate gateways without managing end-to-endPVCs. NAP and NSP use Layer 3 routing, Layer 2 Forwarding, or Layer 2 Tunneling Protocoltunnels. Hence, they can scale their business models for selling wholesale service.B. The NSP can oversubscribe by deploying idle and session timeouts using an industry standardRADIUS server for each subscriber.C. Only a single session per CPE on one virtual channel (VC). The username and password are 27
  • 28. Cisco 350-029 Examconfigured on the CPE, so all users behind the CPE for that particular VC can access only one setof services. Users cannot select different sets of services, although using multiple VCs andestablishing different PPP session on different VCs is possible.D. If a single IP address is provided to the CPE, and NAT or PAT is implemented, certainapplications such as IPTV, which embed IP information in the payload, well not work. Additionally,if an IP subnet feature is used, an IP address also has to be reserved for the CPE.E. PPPoA can use the features on the Cisco Service Selection Gateway (SSG)ANSWER: A,B,E Reference:http://www.cisco.com/en/US/tech/tk175/tk819/technologies_white_paper09186a0080093bd2.shtmlQUESTION NO: 65Which statement about VPNv6 addresses is true?A. The VPNv6 address is a 96-bit route distinguisher and a 128-brt IPv6 addressB. The VPNv6 address is a 64-bit route distinguisher and a 128-bit IPv6 addressC. The VPNv6 address is a 64-brt route distinguisher and a 96-brt IPv6 addressD. The VPMv6 address is a 96-brt route distinguisher and a 96-bit IPv6 addressE. The VPNv6 address is a 128-bit route distinguisher and a 128-brt IPv6 addressANSWER: BExplanation:QUESTION NO: 66Which two statements about RPF checks in Multicast Source Discovery Protocol (MSDP) aretrue? (Choose two)A. RPF Check should be done against the route to the source of the corresponding PIM-SMdomain.B. checking session advertisement (SA) messages causes massages looping.C. The RPF check ensures that there is a working redundancy for anycast RPs.D. RPF Check should be done against the route to the RP of the PIM-SM domain that originatedthe SA.E. It prevents message looping, and session advertisement (SA) messages must be RPFchecked. 28
  • 29. Cisco 350-029 ExamANSWER: D,EExplanation:QUESTION NO: 67When will the primary processor core dump run in case of a switchover?A. never takes placeB. periodicallyC. during switchoverD. after switchoverE. before switchoverANSWER: DExplanation:In networking devices with redundant processors, the Post-Switchover Core Dump feature usesbetter software communication techniques between redundant processors to allow the switchoverto occur before dumping core information. Not having to wait for dump operations effectivelydecreases the switchover time between processors. The newly active primary processor runs thecore dump operation after switchoverReference: http://www.cisco.com/en/US/docs/ios/12_0st/12_0st18/feature/guide/coredump.htmlQUESTION NO: 68What is the label for MPLS over ATM?A. VPI 16B. DLCIC. VPI and VCID. circuit numberE. PVC and SVCANSWER: CExplanation:QUESTION NO: 69 29
  • 30. Cisco 350-029 ExamWhich statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?A. The tunnel that is not configured with the policy-class command acts as the default.B. EXP selection is between multiple tunnels to the same destinationC. There is no requirement for IGP extensionsD. Tunnels are configured using the policy-class command and carry multiple EXP values.E. It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switchingANSWER: DExplanation:QUESTION NO: 70What is one of the primary overhead fields associated with the Optical Payload Unit (OPU)?A. path monitoringB. tandem connection monitoring activation deactivation (TCM ACT)C. Payload Structure Identifier (PSI)D. multiframe alignment signal (MFAS)E. section monitoringANSWER: CExplanation:QUESTION NO: 71Which statement about Remotely Triggered Black Hole (RTBH) is true?A. Route tagging is one of the techniques used by RTBHB. It is used for BGP authenticationC. It cannot work with static routesD. It uses extended ACLs for blocking attacks by creating a black holeE. Before configuring RTBH. LDP must be enabled on the interfaceANSWER: AExplanation:QUESTION NO: 72 30
  • 31. Cisco 350-029 ExamIn the IS-IS Designated Intermediate System (DIS) election process, which criteria is used for DISselection?A. highest router ID first, then highest priorityB. highest MAC address first, then highest priorityC. highest router ID first, then highest MAC addressD. highest priority first, then highest router IDE. highest priority first, then highest MAC addressANSWER: EExplanation:QUESTION NO: 73Which two implementations are standard Virtual Private LAN Service (VPLS) implementations thatare supported by the IETF? (Choose two)A. VPLS uses LDP for signaling.B. VPLS uses BGP for auto-discovery and signaling.C. VPLS uses extended IS-IS for signalingD. VPLS uses OSPF version 3 for auto discovery and signalingE. VPLS uses spanning tree for signalingANSWER: A,BExplanation:QUESTION NO: 74Which two statements about EIGRP are true? (Choose two)A. EIGRP supports VLSM, route summarization, and routing update authentication.B. If the feasible successor has a higher advertised distance than the successor route, it becomesthe primary route.C. Passive routes are in the process of being calculated by DUAL.D. EIGRP exchanges full routing table information with neighboring routers with every update.E. A query process is used to discover a replacement for a failed route if a feasible successor isnot identified from the current routing information.ANSWER: A,EExplanation: 31
  • 32. Cisco 350-029 ExamQUESTION NO: 75Which of following is used to periodically multicast by DIS on a LAN to ensure IS-IS link statedatabase accuracy?A. LSPB. PSNPC. ISHD. CSNPE. IIHANSWER: DExplanation:QUESTION NO: 76What type of IPv6 address is this address: FF05:: 2:260:8FF:FE52:F9D8?A. multicast temporary node localB. multicast temporary site localC. unicast permanent link localD. multicast permanent node link localE. multicast permanent site localF. unicast temporary link localANSWER: EExplanation:QUESTION NO: 77In PPPoA architecture, which two methods are most commonly deployed? (Choose two)A. terminating PPP sessions at the service providerB. PPP framingC. PPP multiplexingD. GRE tunnelingE. L2TP tunneling 32
  • 33. Cisco 350-029 ExamANSWER: A,EReference:http://www.cisco.com/en/US/tech/tk175/tk819/technologies_white_paper09186a0080093bd2.shtmlQUESTION NO: 78In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT)groups are true? (Choose three)A. Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding ofsparse mode traffic.B. MDTs are built in customer networksC. Data MDT groups are used for high-bandwidth sources to reduce replication to uninterestedPEs.D. MDTs are built in provider networksE. The number of MDTs depends on PIM modes of MDT groups.ANSWER: C,D,EExplanation:QUESTION NO: 79Which statement about SNMP is true?A. SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.B. SNMP version 2 supports message integrity to ensure that a packet has not been tamperedwith in transit.C. Proxy agents were used only in SNMP version 1.D. SNMP version 3 supports encryption and SNMP version 2 support authentication.E. GetBulk messages are converted to GetNext messages by the proxy agent and are thenforwarded to the SNMP version 1 agent.ANSWER: EExplanation:QUESTION NO: 80 33
  • 34. Cisco 350-029 ExamHow many messages does Internet Key Exchange use to negotiate SA characteristic when it runsin aggressive mode?A. 3B. 4C. 5D. 2E. 6ANSWER: AExplanation:QUESTION NO: 81What are the default values for GRE tunnel keeplive time and number of retries?A. 5 seconds and 3 retriesB. 10 seconds and 5 retriesC. 10 seconds and 3 retriesD. 20 seconds and 5 retriesE. 5 seconds and 5 retriesANSWER: CExplanation:QUESTION NO: 82Refer to the exhibit. 34
  • 35. Cisco 350-029 ExamAll routers are running IS-IS. Which routers must be Level 2 routers?A. B, D, E and GB. A, D, E, and HC. B, C, F, and GD. B, C, E, F, and GE. A, B, C, D, F, G, and HANSWER: DExplanation:QUESTION NO: 83In PIM-SM operations, to which device does the first router that connects with the multicast sourcesend the register message?A. RPB. multicast sourceC. IGMP routerD. multicast receiverE. PIM designated routerANSWER: AExplanation:QUESTION NO: 84Refer to the exhibitWhich three statements describe r RIB-Failure in the show ip bgp command output?(Choose three)A. It is a redundancy route.B. It is a route with a better administrative distance already present in IGP. 35
  • 36. Cisco 350-029 ExamC. The number of routes in VRF exceeds the route limit that is configured under the VRF instance.D. It is a rerouting entryE. It indicates memory failureANSWER: B,C,DExplanation:QUESTION NO: 85Process-level redundancy is implemented by a system manager process that creates the standbyprocess. What two functions are provided by the system-level process called Qnet SymlinkManager (QSM)? (Choose two.)A. backing up the information for the broken connectionsB. provides common information for connecting processes and servicesC. detection of a failed connectionD. provides an abstract name for a process or serviceE. distribution of symbolic link informationANSWER: D,EExplanation:QUESTION NO: 86Which two statements about NTP version 4 are true? (Choose two)A. It supports fast synchronization at starting and before network failures.B. It supports automatic server discovery.C. It uses a fixed-point arithmeticD. It supports the "nanokernel" kernel implementation.E. It does not support Public-Key CryptographyANSWER: B,DExplanation:Reference: http://www.ntp.org/ntpfaq/NTP-s-def.htm#Q-DEF-OV-V4NEWSQUESTION NO: 87 36
  • 37. Cisco 350-029 ExamWhich three statements about BGP confederation and route reflectors are true? (Choose three)A. Clusters are used in confederation schemes to avoid loops.B. BGP network can have a confederation within a route reflector area.C. An internal BGP network cannot have a route reflector within a confederation.D. An internal BGP network can have a route reflector within a confederation.E. Clusters are used in route reflector schemes to avoid loops.F. BGP network cannot have a confederation within a route reflector area.ANSWER: D,E,FExplanation:QUESTION NO: 88Where are MPLS point-to-multipoint traffic engineering packets replicated?A. head-end routerB. branch-point routerC. midpoint routerD. leaf-point routerE. tail-end routerANSWER: BReference: http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_te_p2mp.pdfQUESTION NO: 89Which statement about the Cisco MPLS TE Fast Reroute (FRR) node protection operation is notcorrect?A. It requires a next-next hop backup tunnel.B. Point of local repair (PLR) swaps the next hop label and pushes the backup label.C. The backup tunnel terminates on the merge point (MP) where traffic rejoins the primary tunnel.D. The backup tunnel can have associated bandwidth capacity.E. Restoration time is expected under 50 ms.ANSWER: EExplanation: 37
  • 38. Cisco 350-029 ExamQUESTION NO: 90Option 10C is an implementation of Inter-AS MPLS VPN. Which two statements about Option 10Care true? (Choose two.)A. Great scalability is offeredB. Route Target Rewrite must be configured on ASBRsC. Multihop EBGP is utilized between route reflectorsD. Multihop EBGP is utilized between ASBRsE. The ASBRs hold VPNv4 routesANSWER: A,CExplanation:QUESTION NO: 91Which statement about Frame Relay is not true?A. Static mapping is used when the remote router does not support Inverse ARP.B. Frame Relay Inverse ARP requires LMI capability to construct an address to the DLCI mappingtable on the router.C. Frame Relay Inverse ARP is disabled by default in Cisco IOS Software for all protocols that areenabled on the physical interface.D. Inverse ARP does not work when LMI is disabled.E. Frame Relay provides forward and backward congestion notification messages.ANSWER: CExplanation:QUESTION NO: 92Cisco IOS XR has implemented a nonstop routing feature so that when RP failover occurs, therouting information can be recovered locally. Which protocol does not support the NSR feature?A. OSPFB. LDPC. BGPD. IS-ISE. RSVP 38
  • 39. Cisco 350-029 ExamANSWER: EExplanation:QUESTION NO: 93Which three of these are types of Ethernet Virtual Connections (EVCs) in the MEF concept?(Choose three)A. rooted multipoint EVC (E-Tree)B. point-to-point EVC (E-Line)C. point-to-multipoint EVC (E-Tree)D. hub spoke EVC (E-Tree)E. multipoint-to-multipoint EVC (E-LAN)ANSWER: A,B,EExplanation:QUESTION NO: 94Which three components are included in the Cisco IOS XR infrastructure? (Choose three.)A. modular line cardsB. shelf controllersC. route processorsD. service processorsE. distributed service cardsANSWER: B,C,DExplanation:QUESTION NO: 95Which three statements about the route target (RT) are true? (Choose three.)A. The RT is a BGP extended community.B. The RT is an 8-byte field that is prefixed to an IPv4 address to make it a unique VPNv4address.C. When a VPN route that is learned from a CE router is injected into BGP, one or more RTs are 39
  • 40. Cisco 350-029 Examassociated with itD. The distribution of VPN routing information is controlled through the use of VPN RTsE. When a VPN route that is learned from a CE router is injected into BGP, there is always one RTthat is associated with it.ANSWER: A,C,DExplanation:QUESTION NO: 96What is the typical marked DSCP value for a voice signaling packet in VoIP technology?A. BEB. AF41C. AF21D. EFE. AF31ANSWER: EExplanation:QUESTION NO: 97Which description of BGP authentication is true?A. MD5 has been used by BGP to encrypt BGP update packets.B. BGP uses a message-digest algorithm to authenticate BGP peersC. A plain-text password authentication is an option of BGP authenticationD. EBGP peers authentication is faster than IBGP peers authenticationE. BGP uses public key and private key to authenticate BGP peers.ANSWER: BExplanation:QUESTION NO: 98When you design QoS on CE for an MPLS Layer 2 VPN, which three things should beconsidered? (Choose three.) 40
  • 41. Cisco 350-029 ExamA. Layer 2 access link QoS designB. enterprise-to-service-provider mapping modelsC. Layer 3 link access QoS designD. service provider service level agreementsE. Layer 2 link access load balancingANSWER: A,B,DExplanation:QUESTION NO: 99Which three are the ATM cell header fields? (Choose three.)A. cell loss priority (CLP)B. discard eligibility (DE)C. head error control (HEC)D. generic flow control (GFC)E. forward explicit congestion notification (FECN)ANSWER: A,C,DExplanation:QUESTION NO: 100What are the two benefits of graceful restart? (Choose two)A. Graceful restart allows session information recovery without disruption to the network.B. A node can perform a graceful restart to help a neighbor recover its state. The label bindingsare kept on state information, which helps the failed node recover faster and does not affect thecurrent forward traffic.C. Graceful restart allows a node to recover state from its neighbor when there is no RP or beforethe device undergoes SSO.D. Graceful restart does not allow session information recovery.E. During a graceful restart, the router removes any stale prefixes after a timer for stale entriesexpiresANSWER: A,BExplanation: 41
  • 42. Cisco 350-029 ExamQUESTION NO: 101Which BGP attribute can be used to influence inbound traffic flow?A. cluster IDB. WeightC. MEDD. local preferenceE. aggregateANSWER: CExplanation:QUESTION NO: 102Which three configuration options are available for configuring the l2tp-class command in L2TPv3?(Choose three)A. TCP portB. authenticationC. IP DF bitD. retransmit retriesE. sequencingF. hostnameANSWER: B,E,FExplanation:QUESTION NO: 103Refer to the exhibit. 42
  • 43. Cisco 350-029 ExamThe SP network is configuring Remote Filtering to protect hosts on network 152.68.19.0/24. Whichrouters should be configured to the sinkhole router?A. L and KB. A, B, F, G, and HC. C and DD. A, B, G, and HE. A, D, F, G, and LANSWER: AExplanation:QUESTION NO: 104What does the protocol field inside the PPP frame indicate?A. the protocol used to determine the authentication methodB. the protocol used to identify the data in the Information fieldC. the protocol used to carry the PPP frameD. the protocol used to decode the FCS fieldE. the protocol used to detect the number of padding bytesANSWER: B 43
  • 44. Cisco 350-029 ExamExplanation:QUESTION NO: 105What is the port number of the IPsec Authentication Header packet?A. IP protocol 50B. TCP port 51C. UDP port 50D. IP protocol 51E. UDP port 51F. TCP port 50ANSWER: DExplanation:QUESTION NO: 106Which three statements about the BGP next-hop attribute are true? (Choose three.)A. EBGP sessions between confederation sub ASs do not modify the next-hop attribute.B. By default, iBGP sessions change the next-hop attribute learned from eBGP peers to selfaddress.C. By default, the next-hop attribute is not changed when a prefix is reflected by the route reflectorD. EBGP sessions between confederation sub ASs change the next-hop attribute to peer address.E. By default, iBGP sessions preserve the next-hop attribute learned from eBGP peers.ANSWER: A,C,EExplanation:QUESTION NO: 107Where is the MPLS label imposed?A. after the Layer 3 header and before the Layer 2 payloadB. after the Layer 3 header and before the Layer 4 payloadC. after the Layer 2 header and before the Layer 1 payloadD. after the Layer 1 header and before the Layer 2 payload 44
  • 45. Cisco 350-029 ExamE. after the Layer 2 header and before the Layer 3 payloadANSWER: EExplanation:QUESTION NO: 108Which four of these key points should be considered during implementation of PPPoAarchitecture? (Choose four)A. the number of subscribers that will be serviced currently and in the future because this affectsthe number of required PPPoA sessionsB. The types of applications that the NSP offers to the end subscriberC. The capacity of ATM and Frame Relay interworking on the NSPD. in the case of more than one user, whether all users need to reach the same final destination orservice, or they all have different service destinationsE. Whether the service provider or the final service destination is providing the IP address to theCPE of the subscriberANSWER: A,B,D,EExplanation:QUESTION NO: 109Which two statements about forwarding equivalence class (FEC) are true? (Choose two)A. FEC might correspond to a destination IP subnet, but it might also correspond to any trafficclass that the edge LSR considers significant.B. FEC is a group of IP packets that is forwarded over a different path, but with the sameforwarding treatment.C. FEC is a group of IP packets that is forwarded over the same path, and with the sameforwarding treatment.D. FEC is a group of IP packets that is forwarded over a different path, but with the differentforwarding treatment.E. FEC is a group of IP packets that is forwarded over the same path, but with a differentforwarding treatment.ANSWER: A,CExplanation: 45
  • 46. Cisco 350-029 ExamQUESTION NO: 110Refer to the exhibit.Which router is the DIS?A. router-22B. router-44C. router-33 and router-44D. router-11E. router-33ANSWER: EExplanation: 46
  • 47. Cisco 350-029 ExamQUESTION NO: 111Which two features must be configured to perform AToM NSF? (Choose two)A. FRRB. SSOC. distribute CEFD. switch virtual pathE. graceful restartANSWER: B,EExplanation:QUESTION NO: 112Refer to the exhibit. 47
  • 48. Cisco 350-029 ExamWhich two configurations are shown? (Choose two)A. L2TP tunnel configurationB. GRE tunnel configurationC. IPsec tunnel configurationD. tunnel keepalive mechanism configurationANSWER: B,DExplanation:QUESTION NO: 113There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelfsystem: single-module cabling and multimodule cabling. What is the maximum capacity of theLCCs that are supported in multimodule cabling?A. 9 LCCsB. 7 LCCsC. 10 LCCsD. 6 LCCsE. 8 LCCsANSWER: AExplanation:QUESTION NO: 114Which three things are the building blocks of the Cisco VPLS architecture? (Choose three)A. VLAN Trunk Protocol (VTP)B. State Synchronization Protocol (SSP)C. L2VPND. Ethernet Virtual Switch Interface (VSI)E. Label Distribution Protocol (LDP)ANSWER: C,D,EExplanation: 48
  • 49. Cisco 350-029 ExamQUESTION NO: 115Which Modular QoS CLI (MQC) based output queuing method is designed to support multipletraffic classes including VoIP traffic, mission-critical traffic, interactive traffic, and default classtraffic?A. WREDB. LLQC. custom queuingD. priority queuingE. CBWFQANSWER: BExplanation:QUESTION NO: 116What are three common reasons for ATM CRC errors? (Choose three.)A. Incorrect VPI and VCI configurationB. Noise, gain hits, or other transmission problems on the data link equipmentC. ATM cells are dropped due to incorrect ATM routing in the service provider.D. A faulty or failing ATM interface.E. Cells are dropped due to traffic policing in the ATM cloud on one or more virtual circuitsattached to the ATM interface.ANSWER: B,D,EExplanation:QUESTION NO: 117Refer to the exhibit. 49
  • 50. Cisco 350-029 ExamThe service provider is an MPLS and IPv4 enabled network. Which two approaches can enableIPv6 tunneling between site A and site B over the backbone? (Choose two.)A. IPv6 customer premise (6CP) over MPLSB. IPv6 VPN provider edge (6VPE) over MPLSC. IPv6 virtual forwarding (6VF) over MPLSD. IPv6 forwarding instance (6FI) over MPLSE. IPv6 provider edge router (6PE) over MPLSANSWER: B,EExplanation:QUESTION NO: 118How many messages does internet Key Exchange use to negotiate SA characteristics whenrunning in main mode?A. 3 messagesB. 6 messagesC. 4 messagesD. 2 messagesE. 5 messagesANSWER: B 50
  • 51. Cisco 350-029 ExamExplanation:QUESTION NO: 119Which three protocols use TLVs to carry attributes? (Choose three.)A. Cisco Discovery ProtocolB. Label Discovery ProtocolC. Border Gateway ProtocolD. OSPFE. RIP version 2ANSWER: A,B,CExplanation:QUESTION NO: 120Which statements about the Route Target Rewrite feature are not true? (Choose two.)A. After the route target replacement policy is applied to the target router, the BGP session neednot be refreshed manually to put the policy into operation.B. Route Target Rewrite allows the administration of the routing policy to stay local to the AS.C. Route target replacement is always done by the ASBR.D. Route target rewrites are supported for VRF export maps.E. Route target replacement can be done on incoming and outgoing BGP updates.ANSWER: A,CExplanation:QUESTION NO: 121Which statement about PIM sparse mode operations is true?A. It does not support all underlying unicast routing protocols like BGPB. Receivers are registered with RP by their first hop routerC. From the RP, traffic flows down a source tree to each receiver.D. It supports shared trees only, and assumes all hosts want the multicast trafficE. Receivers are joined to the shared tree by their local designated router 51
  • 52. Cisco 350-029 ExamANSWER: EExplanation:QUESTION NO: 122Which four statements about NetFlow are true? (Choose four.)A. NetFlow records bidirectional IP traffic flow.B. NetFlow export can be implemented over IPv4.C. NetFlow export can be implemented over IPv6.D. NetFlow records multicast IP traffic flow.E. NetFlow records ingress traffic.F. NetFlow records egress traffic.ANSWER: B,D,E,FExplanation:QUESTION NO: 123Which three statements about OSPF partial SPF are true? (Choose three)A. If it is triggered by Type 4, all Type 4 LSAs that announce a certain ASBR and all Type 5 and 7LSAs are processedB. If it is triggered by Types 5 and 7, all Type 5 and 7 LSAs that contribute to a certain destinationare processed.C. If it is triggered by Type 2, all Type 2 LSAs that contribute to a certain destination areprocessed.D. If it is triggered by the change of Type 3, 4, 5, and 7 LSAs.E. If it is triggered by the change of Type 2, 3, 5, and 7 LSAsANSWER: A,B,DExplanation:QUESTION NO: 124Which Cisco IOS command displays the export VPN route target value of a VRF?A. show ip vrf all 52
  • 53. Cisco 350-029 ExamB. show ip vrf route-targets allC. show ip vrf summaryD. show ip vrf interfacesE. show ip vrf detailF. show ip vrfANSWER: EExplanation:QUESTION NO: 125Which router or router combination is used to calculate the MPLS traffic engineering tunnel path?A. head-end router and tail-end routerB. middle-point routerC. head-end routerD. tart-end routerE. head-end routerANSWER: CExplanation:QUESTION NO: 126Which statement about MPLS TE Fast Reroute (FRR) link protection operation is not true?A. It requires a next-hop backup tunnel.B. The backup tunnel terminates on the same tail-end router as the primary tunnel.C. The point of local repair (PLR) swaps the label and pushes the backup label.D. The restoration time is expected to be under 50 ms.E. The backup tunnel can have associated bandwidth capacityANSWER: BExplanation:QUESTION NO: 127Which two statements about the bgp deterministic-med and bgp always-compare-med commandsare true? (Choose two) 53
  • 54. Cisco 350-029 ExamA. The bgp deterministic-med command is used to influence the BGP route selection process tocause the MED attribute to have higher precedence over the AS path lengthB. The bgp always-compare command is used to influence the BGP route selection process tocause the MED attribute to have higher precedence over the AS path system.C. Enabling the bgp deterministic-med command ensures the comparison of the MED variablewhen choosing routes advertised by different peers in the same autonomous system.D. Enabling the bgp always-compare-med command ensures the comparison of the MED variablefor paths from neighbors in different autonomous systems.E. The bgp deterministic-med and bgp always-compare-med commands are enabled by defult.ANSWER: C,DExplanation:QUESTION NO: 128Which three statements about anycast RP are true? (ChooseA. MSDP is running between anycast RPs.B. Anycast RP provides redundancy and load-sharing capabilitiesC. Multicast BGP is running between anycast RPs.D. In anycast RP, two or more RPs are configured with the same multicast IP address on loopbackinterfacesE. In anycast RP, two or more RPs are configured with the same unicast IP address on loopbackinterfacesANSWER: A,B,EExplanation:QUESTION NO: 129Which two statements about VPNv4 address are true? (Choose two.)A. The VPNv4 address is 128 bits long with a 128-bit long subnet maskB. The VPNv4 address consists of an RD and an IPv4 address.C. The VPNv4 address is 96 bits long with a 64-bit long subnet mask.D. The VPNv4 address is 128 bits long with a 64-bit long subnet mask.E. The VPNv4 address consists of an RT and an IPv4 address.F. The VPNv4 address is 96 bits long with a 32-bit long subnet maskANSWER: B,FExplanation: 54
  • 55. Cisco 350-029 ExamQUESTION NO: 130Which three statements about the secure domain router are true? (Choose three.)A. The logical router can span across chassis.B. The fabric and system controller module are shared by all logical routers.C. Each logical router has a distinct fabric and system controller moduleD. The logical router can share a route processorE. The logical router cannot share a route processor.ANSWER: A,B,EExplanation:QUESTION NO: 131Which two statements about MPLS Label Distribution Protocol (LDP) are true? (Choose two)A. LDP hello packets are sent to TCP 646.B. LDP session packets are sent to TCP 646.C. LDP session packets are sent to TCP 711.D. LDP hello packets are sent to TCP 711.E. LDP hello packets are sent to UDP 711.F. LDP hello packets are sent to UDP 646.ANSWER: B,FExplanation:QUESTION NO: 132Which statement about the Cisco MPLS Traffic Engineering class-based tunnel selection (CBTS)is not true?A. Local mechanism is at the middle-point router.B. EXP selection is between multiple tunnels to the same destinationC. Bundle members are configured with EXP values to carry.D. The tunnel selection is configured on the tunnel master.E. The tunnel master bundles the tunnel members 55
  • 56. Cisco 350-029 ExamANSWER: AExplanation:QUESTION NO: 133Which two routing protocols support MPLS traffic engineering link information distribution?(Choose two)A. OSPFB. BGPC. RIP version 2D. IS-ISE. EIGRPANSWER: A,DExplanation:QUESTION NO: 134Which three modes are the operating modes of HDLC? (Choose three)A. asynchronous response mode (ARM)B. normal peer mode (NPM)C. asynchronous balanced mode (ABM)D. normal response mode (NRM)E. asynchronous client mode (ACM)ANSWER: A,C,DExplanation:QUESTION NO: 135What are the address Family Identifier (AFI) and subsequent Address family Identifier ASAFI)values from VPNv6?A. AFI is 2, SAFI is 128B. AFI is 1, SAFI is 64C. AFI is 2, SAFI is 64 56
  • 57. Cisco 350-029 ExamD. AFI is 1, SAFI is 96E. AFI is 2, SAFI is 96F. AFI is 1, SAFI is 128ANSWER: AExplanation:QUESTION NO: 136Which two models are the models of DiffServ-Award traffic Engineering? (Choose two)A. Class-based ModelB. Maximum Allocation ModelC. Russian Doll ModelD. Global Tunnel ModelE. Policy-based ModelANSWER: B,CExplanation:QUESTION NO: 137Which statement about OSPF ASBR summary LSA is true?A. It is generated by an ASBR and indicates the reachability to an ABR located in another area.B. It is generated by ABR and indicates the reachability to an ASBR located in another AS.C. It is generated by ABR and indicates reachability to itself.D. It is generated by ABR and indicates the reachability to an ASBR located in another area.E. It is generated by ASBR and indicates the reachability to an ABR.ANSWER: DExplanation:QUESTION NO: 138Which three of these are optical channel data unit (ODU) overhead fields? (Choose three)A. general communication channel 0 (GCC0)B. section monitoring 57
  • 58. Cisco 350-029 ExamC. reserved (RES)D. general communication channels 1 and 2 (GCC1 GCC2)E. tandem connection monitoring activation deactivation (TCM ACT)ANSWER: C,D,EExplanation:QUESTION NO: 139Option 10A (back-to-back VRF) is an implementation of inter-AS MPLS VPN. Which of fourstatements about option 10A are not true? (Choose four.)A. MPLS is required between the ASBRs.B. ASBR must hold all routing information.C. It is a scalable solution.D. It is a simple solution.E. MP-EBGP is used to exchange routes between ASBRs.ANSWER: A,C,D,EExplanation:QUESTION NO: 140Which OSPF LSA is used to support MPLS traffic engineering?A. opaque LSA (Type 8)B. opaque LSA (Type 9)C. link LSA (Type 1)D. network LSA (Type 2)E. opaque LSA (Type 10)ANSWER: EExplanation:QUESTION NO: 141Which four statements about an IP service level agreement (SLA) are true? (Choose four) 58
  • 59. Cisco 350-029 ExamA. SLA responder knows type of operation, the port used, and duration.B. SLA responder inserts in and out timestamps in the packet payload.C. SLA sender and responder use the IP SLA Control Protocol to communicate with each otherbefore sending test packets.D. SLA sender and responder communication can be encrypted.E. SLA sender and responder communication can be authenticated with MD5.ANSWER: A,B,C,EExplanation:QUESTION NO: 142Refer to the exhibit.Which IPv6 deployment feature is displayed?A. MPLS 6PEB. MPLS 6VPEC. 6 to 4 Replay ServiceD. native IPv6 over MPLSE. 6 to 4 TunnelANSWER: AExplanation:QUESTION NO: 143 59
  • 60. Cisco 350-029 ExamWhat are two uRPF working modes? (Choose two.)A. express modeB. safe modeC. loose modeD. strict modeE. tight modeANSWER: C,DExplanation:QUESTION NO: 144What is the order of preference for these commands when all of them are applied to one neighborin the BGP inbound filter direction?A. prefix-list, route-map, filter-list, distribute listB. route-map, filter-list, prefix-list, distribute-listC. route-map, distribute-list, prefix-list, filter-listD. filter-list, prefix list, route-map, distribute listE. distribute list, prefix-list, route-map, fitter listANSWER: BExplanation:QUESTION NO: 145Which of the following is used to periodically multicast by DIS on a LAN to ensure IS-IS link statedatabase accuracy?A. CSNPB. LSPC. ISHD. HelloE. IIHF. PSNPANSWER: AExplanation: 60
  • 61. Cisco 350-029 ExamQUESTION NO: 146Refer to the exhibit.All routers are running IS-IS. Which three routers can be Level 1 Only routers?(Choose three)A. GB. CC. AD. EE. FF. BG. HH. DANSWER: C,G,HExplanation:QUESTION NO: 147Which three of these statements about PPPoE are true? (Choose three.) 61
  • 62. Cisco 350-029 ExamA. PPPoE can provide a host with access to a destination over Ethernet. You can have only onePPPoE session per PVC.B. You must install PPPoE client software on all hosts that connect to the Ethernet segment. Thismeans that the access provider must maintain a CPE.C. You cannot use PPPoE with Cisco Service Selection Gateway.D. PPPoE implementation is susceptible to broadcast storms and possible denial-of-serviceattacks.E. Per-session accounting is possible, which allows the service provider to charge the subscriberbased on session time for various services offered. The service provider can also require aminimum access charge.ANSWER: B,D,EExplanation:QUESTION NO: 148Refer to the exhibit.Inbound infrastructure ACLs are configured to protect the SP network. Which two types of trafficshould be permitted in the infrastructure ACL? (Choose two.) 62
  • 63. Cisco 350-029 ExamA. traffic destined for network of 172.30.0.0/16B. traffic source from network of 172.30.0.0/16C. traffic destined for network of 162.238.0.0/16D. traffic source from network of 162.238.0.0/16E. traffic destined for network of 232.16.0.0/16ANSWER: C,EExplanation:QUESTION NO: 149Refer to the exhibit.The SP network is configuring Remotely Triggered Black Hole Filtering to protect hosts on network152.68.19.0/24. Which routers should be configured to the sinkhole router?A. A, B, G, and HB. C and DC. L and KD. A, D, F, G, and LE. A, B, F, G, and HANSWER: A 63
  • 64. Cisco 350-029 ExamExplanation:QUESTION NO: 150In optical channel transport unit overhead (OTU OH), what are general communication channels 1and 2 (GCC1/GCC2) used for?A. for trail trace identificationB. as the backward defect indicatorC. to transmit information between OTU termination pointsD. to extend command and management functions over several framesE. General communication channels 1 and 2 (GCC1/GCC2) do not belong to OTU OH.ANSWER: EExplanation:QUESTION NO: 151All secure domain routers (SDRs) have shared attributes and resources. Which three resourcesare shared among all SDRs? (Choose three.)A. SNMP trapsB. fabric cardsC. exec-level configurationD. privilege-level configurationE. admin-level configurationANSWER: B,C,EExplanation:QUESTION NO: 152Which four of these are MPLS label header fields? (Choose four.)A. LabelB. VPI VCIC. EXPD. TTL 64
  • 65. Cisco 350-029 ExamE. FCSF. S flagANSWER: A,C,D,FExplanation:QUESTION NO: 153Which three IS-IS TLVs are used to support MPLS traffic engineering? (Choose three).A. extended TLV 22B. extended TLV 23C. extended TLV 134D. extended TLV 135E. extended TLV 136F. extended TLV 138ANSWER: A,C,DExplanation:QUESTION NO: 154In which two ways does the BGP graceful restart capability preserve prefix information during arestart? (Choose two.)A. The peer router sends an end-of RIB message to the restarting router.B. The peer router immediately removes the BGP routes that it learned from the restarting routerfrom its BGP routing table.C. The restarting router does not remove any stale prefixes after the timer for stale entries expires.D. The router establishes BGP sessions with other routers and relearns the BGP routes from otherrouters that are also capable of graceful restart. The restarting router waits to receive updatesfrom the neighboring routers. When the neighboring routers send end-of-RIB messages to indicatethat they are done sending updates, the restarting router starts sending its own updates.E. The restarting router removes any stale prefixes after the timer for stale entries expires.ANSWER: D,EExplanation: 65
  • 66. Cisco 350-029 ExamQUESTION NO: 155Which statement about the Link Control Protocol (LCP) is true?A. LCP is used for basic PPP link setup and operation.B. LCP is used for PPP CHAP authentication.C. LCP is used for PPP over ATM (PPPoA) setup.D. LCP is used for PPP over Ethernet (PPPoE) setup.E. LCP is used for PPP over Frame Relay (PPPoFR) setup.ANSWER: AExplanation:QUESTION NO: 156Which three statements about the Route Distinguisher (RD) are true? (Choose three.)A. The RD is a BGP extended community.B. The RD prefix and a route target make the VPNv4 address unique.C. RD, similar to the AS number, is assigned to a service provider by the Internet AssignedNumbers Authority (IANA).D. The RD is an 8-byte field.E. One customer may use different RDs for the same IPv4 route.ANSWER: B,D,EExplanation:QUESTION NO: 157What is the typical marked DSCP value for a voice media packet in Voice over IP technology?A. AF41B. AF31C. AF21D. BEE. EFANSWER: EExplanation: 66
  • 67. Cisco 350-029 ExamQUESTION NO: 158What is the port number of an IPsec Encapsulating Security Payload packet?A. IP protocol 50B. IP protocol 51C. TCP port 50D. TCP port 51E. UDP port 50F. UDP port 51ANSWER: AExplanation:Topic 2, Practice Questions Set AQUESTION NO: 159R1-wan1-core-abcxyz.com#show ip cache flowA network administrator issues the command "show ip cache flow" and finds the shown output.What can be concluded?A. It is normal traffic.B. There is a potential sacrificed host located at network 192.1.6.0 generating attacks.C. There is a potential DOS attack on device of 194.10.6.2.D. It is multicast traffic source from 194.10.6.2E. It is multicast traffic destined for 194.10.6.2ANSWER: B,CExplanation: 67
  • 68. Cisco 350-029 ExamQUESTION NO: 160Which MQC-based output queueing method is designed to support multiple traffic classesincluding VoIP traffic, mission-critical traffic, bulk traffic, interactive traffic and default class traffic?A. Custom QueueingB. CB-WREDC. WRR QueueingD. LLQE. CBWFQANSWER: DExplanation:QUESTION NO: 161Which two statements regarding the IS-IS DIS election process are true? (Choose Two.)A. L1 routers on a broadcast network only establish adjacencies with the DIS.B. If the DIS becomes unavailable the backup DIS is promoted to DIS.C. Adding a router with a higher priority than the current DIS will result in the new router becomingDIS.D. Separate L1 and L2 election processes are held on a broadcast network.E. A priority of 0 will prevent a router from becoming a DIS.F. If there is a tie based on priority, the router whose attached interface has the lowest MACaddress becomes the DIS.ANSWER: C,DExplanation:QUESTION NO: 162What is jitter?A. The total end-to-end delayB. The time it takes for the bits to transit the physical media.C. The delay caused by placing the bits on the wire.D. The variations of delay. 68
  • 69. Cisco 350-029 ExamANSWER: DExplanation:QUESTION NO: 163Which two statements best describe the signalling requirements of virtual circuit setup of VPLSand exchange of reachability information (MAC addresses)?A. Cisco VPLS does not require the exchange of reachability (MAC addresses) information via asignaling protocol. This information is learned from the data plane using standard addresslearning, aging, and filtering mechanisms defined for Ethernet bridging.B. Cisco VPLS uses directed LDP as a signalling protocol to exchange reachability (MACaddresses) information to avoid maintanance of ARP cache.C. In Cisco VPLS the virtual circuit setup uses Multi-Protocol BGP as autodiscovery and signalingmechanism. Using BGP allows BPDUs to be propagated across VPLS in a scaleable fashion.D. In Cisco VPLS the virtual circuit setup uses the same LDP signaling mechanism defined forpoint-to-point services. Using a directed LDP session, each provider edge advertises a virtualcircuit label mapping that is used as part of the label stack imposed on the Ethernet frames by theingress provider edge during packet forwarding.ANSWER: A,DExplanation:QUESTION NO: 164What bit should be set in the link state PDUs in an IS-IS level-1-2 router to indicate that they are apotential exit point out of the area ?A. ATT (Attached )bitB. ABR (Area Border Rorter ) bitC. PN (Pseudonode )biyD. P(Partition) bitE. Down bitF. IS-Type bitsANSWER: AExplanation: 69
  • 70. Cisco 350-029 ExamQUESTION NO: 165Select the two answers that best describe the IP Event Dampening feature:A. The IP Event Dampening uses exponential decay mechanism to suppress the effects ofexcessive interface flappingB. BGP Operators use IP Event Dampening to suppress the effect of unstable internet RoutesC. The IP Event Dampening works with routing protocols by stopping the announcement ofdampened Interface subnets in their updatesD. When IP Event Dampened internet routes resch their re-use limit, BGP installs them in theRouting Table and announces them to other BGP speakersANSWER: A,CExplanation:QUESTION NO: 166What OSPF LSA is used to support MPLS-traffic Engineering ?A. NSSA LSA (Type 7 )B. Opaque LSA (Type 11 )C. Opaque LSA (Type 9 )D. Opaque LSA (Type 10 )E. External LSA (Type 5 )ANSWER: DExplanation:QUESTION NO: 167Select the three best answers which best describe Private Network-to Network Interface (PNNI) inan ATM networkA. It is the Routing protocol used between ATM switchesB. PNNI uses the same Dijsktra algorithm for SPF calculationC. PNNI and OSPF use the same Database to make cohesive decision for packet forwardingD. PNNI measures line capacities and delays in addition to simple cost metricsANSWER: A,B,DExplanation: 70
  • 71. Cisco 350-029 ExamQUESTION NO: 168With EIGRP DUAL, a feasible successor is considered loop-free if which condition is true?A. Its AD is equal to the metric of the successorB. Its AD is less than the successor??s FDC. Its AD is equal to the successor??s FDD. Its AD is greater than the successor??s FDE. Its FD is equal to the metric of the successorANSWER: BExplanation:QUESTION NO: 169What best describes the usage of Route-Target rewrite?A. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured atthe Route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignmentfor VPN configurations.B. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured atthe ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.C. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured atthe PE router in originating AS ASBR to avoid misconfiguration in Route-Target assignment forVPN configurations.D. None of the above.ANSWER: BExplanation:QUESTION NO: 170Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages?(Choose three.)A. PW capabilities list 71
  • 72. Cisco 350-029 ExamB. Message typeC. Assigned control connection IDD. PW typeE. Remote session IDF. HostnameANSWER: B,D,EExplanation:QUESTION NO: 171Which descriptions of Netflow is correct?A. By default,Netflow records bidirectional IP traffic flow.B. Netflow answers questions regarding IP traffic:who,what,where,when,and howC. Netflow accounts for both transit traffic and traffic destined for the router.D. Netflow returns the subinterface information in the flow records.ANSWER: B,C,DExplanation:QUESTION NO: 172How do routers in an IS-IS Level-1 domain exit to reach other Level-1 (L1) domains ?(Select 2)A. Level-1(L1) routers use default routes announced by Level-2(L2) routers in Level-1(L1) domainB. Level-1 routers use default routes installed based on ATT bit (Attach Bit) in announcementsfrom Level-1-2(L1/L2) routerC. Level-1 routers use specific routes, for other Level-1 domain, announced by Level-1-2(L1/L2)by route-leaking feature of Cisco IOSD. Level-1 routers use specific routes, for other Level-1 domain, announced by Level-2(L2) byroute-leaking feature of Cisco IOSANSWER: B,CExplanation:QUESTION NO: 173DSCP value "101110" looks like which IP Precedence value to non-DiffServ compliant devices? 72
  • 73. Cisco 350-029 ExamA. IP Precedence 6B. IP Precedence 4C. IP Precedence 3D. IP Precedence 5E. IP Precedence 2F. IP Precedence 7ANSWER: DExplanation:QUESTION NO: 174Which two statements are TRUE ?A. Subsequent Address Family identifier (SNFI ) provides additional information about the type ofthe Network Layer ports carried in the BGP updateB. Address Family identifier (AFI ) field carries the identity of the Network Layer ports for which theBGP speaker intends to advertise multiple pathsC. Subsequent Address Family identifier (SAFI ) provides additional information about the type ofthe Network Layer Reachability Information carried in the attributeD. Address Family identifier (AFI ) carries the identity of the Network Layer protocol for which theBGP speaker intends to advertise multiple pathsANSWER: C,DExplanation:QUESTION NO: 175Having the above BGP peerings, select the two configurations for rtrB that will fulfill the followingcriteria:-Will advertise all routes from rtrA to rtrD but not to rtrC-Will advertise the routes from rtrD to rtrC 73
  • 74. Cisco 350-029 ExamA. router bgp 2neighbor 1.1.1.1 remote-as 1neighbor 1.1.1.1 route-map rtrA in!route-map rtrA permit 10set community no-advertise!B. router bgp 2neighbor 1.1.1.1 remote-as 1neighbor 1.1.1.1 route-map rtrA in!route-map rtrA permit 10set community no-export!C. router bgp 2neighbor 1.1.1.1 remote-as 1neighbor 1.1.1.1 route-map rtrA inneighbor 3.3.3.3 remote-as 3neighbor 3.3.3.3 route-map rtrC out!route-map rtrA permit 10set community 5!route-map rtrC permit 10match community 5!D. router bgp 2neighbor 1.1.1.1 remote-as 1neighbor 1.1.1.1 route-map rtrA in 74
  • 75. Cisco 350-029 Examneighbor 3.3.3.3 remote-as 3neighbor 3.3.3.3 route-map rtrC out!route-map rtrA permit 10set community 5!route-map rtrC permit 10match community 5!route-map rtrC permit 20!ANSWER: B,DExplanation:QUESTION NO: 176Selective packet discard(SPD)operates in the following modes: (choose3)A. discardB. randomC. normalD. fullE. selectANSWER: B,C,DExplanation:QUESTION NO: 177Which of the following processes in IOS XR run exclusively on the Route Processor?A. wdsysmonB. mpls_idpC. sysmgrD. gspE. bgpANSWER: B,EExplanation: 75
  • 76. Cisco 350-029 ExamQUESTION NO: 178The Attribute field within the IS-IS LSP header contains which of the following flags? (Choose four)A. IS-TypeB. Overload (LSPDBOL)C. Pseudonode (PN)D. Attached (ATT)E. Fragment (Frag-Nr)F. Partition (P)ANSWER: A,B,D,FExplanation:QUESTION NO: 179What protocol is used for Path Setup in MPLS traffic engineering?A. BGPB. PIMC. ISISD. OSPFE. RSVPANSWER: EExplanation:QUESTION NO: 180Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) iscorrect?A. CoPP protects against IP spoofing;Racl protects against DoS attacks.B. CoPP can not use named access lists;Racl can use named access listsC. CoPP applies to a dedicated control plane interface;Racl applies to all interfaces.D. CoPP needs a AAA server,Racl does not need a AAA serverE. CoPP supports rate limits;Racl does not support rate limits 76
  • 77. Cisco 350-029 ExamANSWER: C,EExplanation:QUESTION NO: 181What best describes the usage of Route-Target rewrite?A. None of the above.B. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured atthe PE router in originating AS ASBR to avoid misconfiguration in Route-Target assignment forVPN configurations.C. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured atthe ASBR to avoid misconfiguration in Route-Target assignment for VPN configurations.D. Route-Target Rewrite is mainly used in Inter-AS MPLS-VPN deployments and is configured atthe Route-Reflector in originating AS ASBR to avoid misconfiguration in Route-Target assignmentfor VPN configurations.ANSWER: CExplanation:QUESTION NO: 182Which of the following are steps to configure destination-based Remote Triggered BlackHole(RTBH) filtering?(choose three)A. Configure BGP beteen trigger and black hole routers.B. Configure OSPF between trigger router and black hole routesC. Configure all edge routers with static (reserved) host route to Null0D. Configure on trigger router to advertise victim host route with communityE. Activate black hole by redistributing route for victim into BGP with next-hop set to thestatic(reserved) host route configured on edge routers.ANSWER: A,C,EExplanation:QUESTION NO: 183Based on the following output in a router A running LDP, which statement is true? 77
  • 78. Cisco 350-029 Examshow mpls ldp bindings 50.0.0.1 32tib entry: 50.0.0.1/32, rev 5local binding: tag: imp-nullremote binding:tsr:50.0.0.4:0, tag:16-A. None of the above.B. The IP address 50.0.0.1/32 is assigned to the non-directly connected LDP neighbor, 50.0..0.4.C. The IP address 50.0.0.1/32 is assigned to one of its own interfaces.D. The IP address 50.0.0.1/32 is assigned to its directly connected LDP neighbor, 50.0..0.4.ANSWER: CExplanation:QUESTION NO: 184According to RFC 3931,L2TPv3 utilizes the IANA assigned IP protocol ID of:A. 110B. 101C. 121D. 51E. 151F. 115ANSWER: FExplanation:QUESTION NO: 185When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise, which transitionstrategy works the best?A. Deploy IPv6 at the Edges and tunnel Enterprise through the coreB. None of the above will workC. Deploy IPv6 at Edges and Core at the same time for smooth transition 78
  • 79. Cisco 350-029 ExamD. Deploy IPv6 at the core first and then move to Edges toward the end customerANSWER: AExplanation:QUESTION NO: 186With VPLS, which protocol is used for label exchange and PW signalling.A. MP-BGPB. LDPC. BGPD. MTPE. Directed LDPF. IGPANSWER: EExplanation:QUESTION NO: 187Refer to the exhibit. Your customer has enabled IPv6 and IPv4 on routers R1 and R2, bothrunning ISIS routing protocol, and they can no longer reach R3 network 172.26.15.0/24 (R3 doesnot enable IPv6, enables IPv4 only).Which two steps should be taken no restore reachability to R3? (Choose Two.)A. Enable OSPFv3 to support IPv4 and IPv6 simultaneously.B. Configure static routes to all unreachable networks and redistribute to IS-IS. 79
  • 80. Cisco 350-029 ExamC. Create an IPv6 tunnel from R2 to R3.D. Transition to IS-IS Multiple Topology Mode on R3.E. Enable wide metrics.F. Transition to IS-IS Multiple Topology Mode on R1 and R2.ANSWER: E,FExplanation:QUESTION NO: 188Which methods would enable traffic to be forwarded along an MPLS TE tunnel (Choose 4)A. MP-BGP routingB. Static routingC. Policy routingD. AutorouteE. Forwarding adjacencyANSWER: B,C,D,EExplanation:QUESTION NO: 189Which of the following descriptions about IP spoofing is correct?A. IP destination address is forgedB. IP source address is forgedC. IP TCP destination port is forgedD. None of aboveE. IP TCP source port is forgedANSWER: BExplanation:QUESTION NO: 190SONETs three layers are: 80
  • 81. Cisco 350-029 ExamA. DS1B. FrameC. PathD. LineE. SectionANSWER: C,D,EExplanation:QUESTION NO: 191With the DSCP value fo "101110", what does the "11" in bits 1 and 2 indicate ?A. CS(Class Selector Value )B. Queue DepthC. PHB (Per-Hop Behavior )D. IP PrecedenceE. Drop ProbabilityF. AF ClassANSWER: EExplanation:QUESTION NO: 192What are the benefits of using TCAM technology in high-end routing products ?A. Simplified configurationB. Lower maintenance costC. Deterministic performanceD. Longer uptimeE. Lower power consumptionANSWER: C,DExplanation:QUESTION NO: 193Referring to the exhibit, if RTP header compression is used on the link, the header??s overhead 81
  • 82. Cisco 350-029 Examon the voice packet will be reduced by what percent?A. from 50% to 25%B. from 50% to 20%C. from 70% to 20%D. from 70% to 33%ANSWER: DExplanation:QUESTION NO: 194Which two statements are correct?A. A VC type 5 transports a VLAN over MPLS.B. A VC type 4 tunnels an Ethernet port over MPLS.C. A VC type 5 tunnels an Ethernet port over MPLS.D. A VC type 4 transports a VLAN over MPLS.ANSWER: C,DExplanation:QUESTION NO: 195Which of the following technologies can improve convergence time following a link failure in aservice provider network?A. RSVPB. MPLS TE FRC. MPLS VPN 82
  • 83. Cisco 350-029 ExamD. SNMPE. BFDF. VPLSANSWER: B,EExplanation:QUESTION NO: 196Which of the following statemets regarding Control Plane Policing (CoPP) is correct?A. Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuringrouting stability, availability, and critical packet delivery.B. Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and tospecify configurable policy actions for the classified traffic.C. Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoSCLI (MQC) to provide filtering and rate limiting capabilities.D. Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filterDOS packet to protect routing packets.E. Control Plane Policing (CoPP) protects the transit management and data traffic through therouter.ANSWER: A,B,CExplanation:QUESTION NO: 197Which two statements are correct with regard to route distinguisher as defined in RFC 4364-AKAIP-VPN(MPLS-VPN)?A. The configuration to define Route-Distinguisher isIp vrf bulleRd 1:1B. A route distinguisher can be imported and exported to and from a VRFC. Route-Distinguisher is an 8 byte BGP attribute value used in influencing BGP best pathalgorithm.D. Route-Distinguisher is an 8 byte value used in creating unique VPNv4 address.ANSWER: A,DExplanation: 83
  • 84. Cisco 350-029 ExamQUESTION NO: 198Which two statemets are true?A. DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.B. DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoidcollisions on the fiber.C. DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links areused to make best use of the Bandwidth.D. In DPT/RPR rings, data packets can be sent in one direction (downstream) and thecorresponding control packets in the opposite direction (upstream), thus using both fibresconcurrently to maximise bandwidth.ANSWER: A,DExplanation:QUESTION NO: 199Which statements about MPLS Label Distribution Protocol(LDP) are valid?A. LDP hello packets are sent to UDP port 646B. LDP hello packets are sent to TCP port 711C. LDP sessions are TCP sessions to port 646D. LDP sessions are TCP sessions to port 711E. LDP establishes a peer relationship with another router that must be directly attached.F. LDP can establishes a peer relationship with another router that is not directly attachedANSWER: A,C,FExplanation:QUESTION NO: 200How would you characterize the source and type in a denial of service attack on a router?A. By perfornubg a show ip interface to see the type and source of the attack based upon theaccess-list matchesB. By setting up an access-list to permit all ICMP ,TCP ,and UDP traffic with the log or log-inputcommands ,then use the show access-list and show log commands to determine the type and 84
  • 85. Cisco 350-029 Examsource of attackC. By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;ifthe interface utilization is not maxed out ,there is no attack underwayD. By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on allinterfaces,then,when telnetting into the router perform a debug IP packet detailANSWER: BExplanation:QUESTION NO: 201Which of the following IOS commands cause syslog messages to be stamped with time anddates?A. logging datetime onB. service timestamps log datetimeC. service logging datetimeD. logging timestamps onE. logging trap datetimeANSWER: BExplanation:QUESTION NO: 202In the context of GMPLS,LMP stands for;A. None of aboveB. Label Management ProtocolC. Loop Management ProtocolD. Link Management ProtocolE. Load Management ProtocolANSWER: DExplanation:QUESTION NO: 203Which of the following statements is correct regarding PIM Sparse Mode operations? 85
  • 86. Cisco 350-029 ExamA. Receivers are ???registered??? with RP by their first-hop routerB. It supports shared trees only assuming all hosts want the multicast trafficC. From the RP, traffic flows down a Source Tree to each receiverD. It does not support all underlying unicast routing protocols like GBPE. Receivers are ???joined??? to the Shared Tree (rooted the rp ) by their local DesignatedRouter (DR)ANSWER: EExplanation:QUESTION NO: 204Which statements are correct for forwarding traffic into MPLS TE tunnels? (Choose 3)A. Autoroute causes the tunnel to be treated as a directly connected link to the head-end.B. Autoroute causes the TE head-end to establish IGP adjacency with the tail-end over the tunnel.C. Forwarding adjacency makes the TE head-end node advertise the Tunnel LSP into the IGP.D. Forwarding adjacency supports unequal cost load balancing over multiple TE tunnels.ANSWER: A,C,DExplanation:QUESTION NO: 205Select two valid administratively scoped multicast addresses in networks running Interior Gatewayprotocols like EIGRP and OSPFA. 239.255.255.255B. 224.0.0.10C. 239.0.0.1D. 224.0.0.5ANSWER: A,CExplanation:QUESTION NO: 206In which of the following lists of APS Action Requests is the priority correctly arranged from lowestto highest? 86
  • 87. Cisco 350-029 ExamA. Wait-to-Restore, Manual Switch, Forced Switch, Lockout of ProtectionB. Wait-to-Restore, Forced Switch, Manual Switch, Lockout of Protection.C. Manual Switch, Wait-to-Restore, Lockout of Protection, Forced Switch.D. Lockout of Protection, Forced Switch, Manual Switch, Wait-to-RestoreE. Lockout of Protection, Manual Switch, Forced Switch, Wait-to-RestoreF. Wait-to-Restore, Manual Switch, Lockout of Protection, Forced SwitchANSWER: AExplanation:QUESTION NO: 207What is the action of "pop" in the context of MPLS switching?A. It replaces the top label in the MPLS label stack with a set of labels.B. It replaces the top label in the MPLS label stack with another value.C. None of above.D. It removes the top label in the MPLS label stack.E. It adds a top label in MPLS label stack.ANSWER: DExplanation:QUESTION NO: 208What is the encapsulation mode for MPLS running on Ethernet?A. Transparent mode.B. Frame modeC. Channel modeD. Packet mode.E. Tunnel mode.ANSWER: BExplanation:QUESTION NO: 209 87
  • 88. Cisco 350-029 ExamThe show ip ospf database external command displays information about which OSPF LSA type?A. LSA type 1B. LSA type 2C. LSA type 7D. LSA type 3E. LSA type 9F. LSA type 5ANSWER: FExplanation:QUESTION NO: 210Forwarding Equivalence Class (FEC) corresponds to :A. Layer 2 circuits (ATM, FR, PPP, HDLC, Ethernet)B. Groups of addresses/sites-VPN xC. IPSEC Encryption AlgorithmD. A bridge/switch instance-VSIE. Tunnel interface-traffic engineeringANSWER: A,B,D,EExplanation:QUESTION NO: 211The mechanisms for distributing LDP are:A. CEF and the FIB tableB. UDP and IPC. A and BD. RSVP and CEFE. LDP and RSVPANSWER: EExplanation: 88
  • 89. Cisco 350-029 ExamQUESTION NO: 212Which two statements are true about RPF checks in MSDP(Multicast Source Discovery Protocol)?A. It prevents message looping, Session Advertisement (SA) messages must be RPF checked.B. RPF check should be done against the route to the Rendez-vous Point of the correspondingPIM-SM domain, which originated the SA.C. RPF checking Session Advertisement (SA) messages will cause message looping.D. RPF check should be done against the route to the source S of the corresponding PIM-SMdomain.ANSWER: A,BExplanation:QUESTION NO: 213BGP best route selection process is based on what ?A. path attributesB. lowest costC. highest bandwidthD. lowest delayE. lowest hop-countANSWER: AExplanation:QUESTION NO: 214Pick the 4 valid ATM Cell Header fields:A. GFC-4 bits of generic flow controlB. Forward-explicit congestion notification(FECN)C. VCI-16 bits of virtual channel identifierD. CLP-1 bit of congestion lossE. HEC-8 bit of header error controlF. ATM Discard Eligibility(DE) bitANSWER: A,C,D,EExplanation: 89
  • 90. Cisco 350-029 ExamQUESTION NO: 215A network administrator wants to detect a login attack against a router. What IOS command canmake the attack recorded in syslog server?A. Login detect login-failure logB. none of the aboveC. Logging detect fail-loginD. Login on-failure logE. Logging login on-failureANSWER: DExplanation:QUESTION NO: 216R3 and R4 are Route-Reflectors and there is an I-BGP session between them, there is NO I-BGPsession between R1 and R2. For an External Route from CE-2 in R2 to reach R1, which twostatements are true?A. R1, R3 and R4 establish full mesh I-BGP sessions, R2, R3 and R4 establish full mesh I-BGPsessions.B. R1 acts as a Route-Reflector client to R3, R2 acts as a Route-Reflector client to R4.C. R1 acts as a Route-Reflector client to R4, R4 acts as a Route-Reflector client to R4, R2 acts asa Route-Reflector client to R3.D. CE-2 establishes multi-hop E-BGP sessions with R3 and R4. 90
  • 91. Cisco 350-029 ExamANSWER: B,CExplanation:QUESTION NO: 217With the BGP peerings shown, which 3 solutions are most correct?A. rtrA and rtrD are route-reflector-clients; rtrB and rtrC are route reflectors part of the samecluster.B. rtrA and rtrD are route-reflector-clients; rtrB and rtrC are route reflectors part of the differentcluster.C. rtrA, rtrB and rtrC are part of a confederation sub-AS and rtrD is part of a different confederationsub-ASD. rtrA, rtrB are part of one confederation sub-AS and rtrC,rtrD are part of a different confederationsub-ASE. rtrA, rtrB and rtrC are part of a confederation sub-AS where rtrB is a route reflector and rtrA,rtrC are route-reflector-clients.ANSWER: B,D,EExplanation:QUESTION NO: 218In Multicast VPN (MVPN) implementations, which two of the following statements are regardingthe Default MDT Group? (Choose two.) 91
  • 92. Cisco 350-029 ExamA. It is used for PIM control traffic.B. It is optionally configured for a high bandwidth multicast source to reduce multicast trafficreplication to uninterested PE routers.C. Within the VPF configuration in the PE router, multiple Default MDT groups are configured soeach VPF can support multiple multicast sources.D. There is a reduced multicast state in the MPLS core P routers.E. When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT isswitched to the Default MDT to conserve bandwidth.ANSWER: A,DExplanation:QUESTION NO: 219VoIP bearer traffic is typically marked to which DSCP value ?A. af41B. af31C. 0 (default )D. cs7E. cs3F. efANSWER: FExplanation:QUESTION NO: 220In which of the following BGP-related events is an End-of-RIB (EOR) message sent?A. Following a link flap in the BGP speakers ASB. During initial convergence.C. Following a Route Processor Switchover.D. Just before sending a CEASE message to tear down the session.E. During capability negotiationANSWER: B,CExplanation: 92
  • 93. Cisco 350-029 ExamQUESTION NO: 221Select the statement that best describes ??? The cure for Amplification Principle ??? in theInternet domain, as explained in RFC 3429 (Internet Architectural Guidelines )A. None of the aboveB. Amplification is prevented if local changes have only a local effect as opposed to system inwhich local change have a global effectC. Amplification is prevented if global changes have only a local effect as opposed to systems inwhich global changes have a local effectD. Internet domain does not suffer from ??? The Amplification Principle ??? as BGP takes care ofmisbehaving advertisersANSWER: BExplanation:QUESTION NO: 222Which option describes the incorrect usage of the Label Distribution method?A. MP-BGP is used for label distribution for VPN customer routes.B. LDP is primarily used in internal networks of MPLS-VPN providers.C. MP-BGP is used for label distribution in MPLS Traffic Engineered networks.D. Directed LDP is used for label distribution in L2-VPN Attachement Circuits.ANSWER: CExplanation:QUESTION NO: 223Identify the differences of option 10A, as opposed to option 10C, for interAS vpn offerings. Foroption 10AA. Greater scalability is offeredB. The ASBR holds VPNv4 routesC. Relative technical simplicity is offeredD. Lower relative security is offeredE. Multihop E-BGP between ASBRs is utilizedF. Better suitability for InterProvider VPNs is providedANSWER: B,C,F 93
  • 94. Cisco 350-029 ExamExplanation:QUESTION NO: 224RFC 3270 describes Differentiated Services (Diff-Serv) over Multi-Protocol Label Switching(MPLS) networks. Which model alters Differentiated Services (Diff-Serv) code points set indifferent Differentiated Services (Diff-Serv) domain?A. None of the above will alter Differentiated Services (Diff-Serv) code points set in differentDifferentiated Services (Diff-Serv) domain.B. Uniform modelC. Pipe ModelD. Short PipeANSWER: BExplanation:QUESTION NO: 225Which two statements best describe EtherChannel?A. EtherChannel technology helps aggregate traffic grouping multiple,full-duplex point-to-pointlinks togetherB. EtherChannel technology is based on the 802.1 IEEE standC. EtherChannel can aggregate up to 800 Mbps,8 Gbps,or Gbps of aggregate bandwidth for aFast EtherChannel,Gigabit EtherChannel,or 10 Gigabit EtherChannel connection respectively.D. EtherChannel is defined for Rapid Spanning Tree for faster convergence.ANSWER: A,CExplanation:QUESTION NO: 226When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT isconfigured under which configuration mode?A. router(config-router)#B. router(config)# 94
  • 95. Cisco 350-029 ExamC. router(config-router-af)#D. router(config-if)#E. router(config-vrf)#ANSWER: EExplanation:QUESTION NO: 227Which three choices are BGP Extended communities used in MPLS-VPN deployment?A. Site Of Origin SOOB. Route-DistinguisherC. Route-TargetD. Domain Identifier BGP extended commumityANSWER: A,C,DExplanation:QUESTION NO: 228Which of the following is a correct arrangement of APS Action Requests in order of priority, withhighest priority first?A. Lookout of Protection, Forced Switch, SD, Manual SwitchB. None of the aboveC. Lockout of Protection, Manual Switch, SD, Forced SwitchD. Manual Switch, Forced Switch, Lockout of Protection, SDE. Manual Switch, Lockout of Protection, Forced Switch, SDF. SD, Lockout of Protection, Forced Switch, Manual SwitchANSWER: AExplanation:QUESTION NO: 229What is the default SPF throttle timer in OSPF? 95
  • 96. Cisco 350-029 ExamA. 5sB. 10msC. 0msD. 30sE. 1sF. 500msANSWER: AExplanation:QUESTION NO: 230In the context of MPLS Traffic engineering, TE path calculation is conducted by:A. TE middle pointB. TE tail endC. Independent serverD. All TE nodes along the pathE. TE head endANSWER: EExplanation:QUESTION NO: 231GMPLS is based upon:A. VPI/VCI-based switching devicesB. A and BC. Packet-based switching devicesD. None of the aboveE. Non-Packet-based devicesANSWER: EExplanation: 96
  • 97. Cisco 350-029 ExamQUESTION NO: 232In the context of MPLS,what is the correct action to be performed when an aggregate label isreceived ?A. It replaces the bottom label in the MPLS label stack with a VPN label and propagatesB. None of aboveC. It adds the VPN label into the top label in the MPLS label stackD. It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IPpacketsE. It replaces the top label in the MPLS label stack with a VPN label and propagatesANSWER: DExplanation:QUESTION NO: 233MPLS label headers for packet media consist of:A. VersionB. LabelC. COS/EXPD. TTLE. S flagANSWER: B,C,D,EExplanation:QUESTION NO: 234Which of the following IOS features can prevent IP spoofing attacks?A. Unicast Reverse Path Forwarding (uRPF)B. MPLS traffic EngineeringC. Cisco Express ForwardingD. PPP over EthernetE. IS-IS routingANSWER: AExplanation: 97
  • 98. Cisco 350-029 ExamQUESTION NO: 235Which are correct descriptions and configurations of Anycast RP?A. In Anycast RP, two or more RPs are configured with the same IP address on loopbackinterfaces.B. Anycast RP provides redundancy and load-sharing capabilities.C. Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ippim rp-address 1.1.1.1D. Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command iprp-address pim 1.1.1.1E. Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ipanycast-rp pim 1.1.1.1ANSWER: A,B,CExplanation:QUESTION NO: 236Packed Cell Relay encapsulation with AToM inclues which of the following?A. Tunnel labelB. VC-labelC. 5-byte ATM headerD. PayloadE. 4 byte ATM headerF. Support for 30 packed cells.ANSWER: A,B,D,EExplanation:QUESTION NO: 237In the case of Ethernet transport, which two types of attachment circuits does L2TPv3 support?(Choose two.)A. port tunneling on the Ethernet subinterfaceB. VLAN tunneling on the Ethernet trunkC. port tunneling on the Ethernet interfaceD. VLAN tunneling on the Ethernet VLAN subinterfaceE. port tunneling on the Ethernet trunk 98
  • 99. Cisco 350-029 ExamANSWER: C,DExplanation:QUESTION NO: 238Which two are characteristics of an IPv6 multicast address? (Choose two )A. Is allocated from the unicast address spaceB. Second octet contains a 4-bit multicast scope fieldC. Starts with a prefix of FE80 to FEBF in hexD. Last 64 bit contains the modified MAC address of the Ethernet interfaceE. First (most significant ) octet is FF in hexF. Starts with a prefix of FECO to FEFF in hexANSWER: B,EExplanation:QUESTION NO: 239How would you characterize the source and type in a Denial of Service attack on a router?A. By setting up and access-list to permit all ICMP, TCP, and UDP traffic with the log or lot????¨¬?Cinput commands, then use the show access-list and show log commands to determinethe type and source of attackB. By performing a ??show ip interface?? to see the type and source of the attack based upon theaccess-list matchesC. By applying and access-list to all incoming and outgoing interfaces, turning off route-cache onall interfaces, then, when telnetting into the router perform a debug ip packet detail.D. By performing a ??show interface?? to see the transmitted load ???txload??? and receive load???rxload ???, if the interface utilization is not maxed out, there is no attack underwayANSWER: AExplanation:QUESTION NO: 240router bgp 1Neighbor 1.1.1.1 remote-as 2 99
  • 100. Cisco 350-029 ExamThe above bgp configuration has what effect on the configured router?A. Allows incoming TCP connections from 1.1.1.1 that are sourced from port 179B. Allows incoming TCP connections from 1.1.1.1 that are destined to port 179C. Allows incoming TCP connections sourced from port 179D. Allows incoming TCP connections from 1.1.1.1 and destined to,or sourced from port 179E. Allows incoming TCP connections destined to port 179ANSWER: BExplanation:QUESTION NO: 241What is a limitation of implementing uRPF?A. Domain name must be defined.B. MPLS LDP must be enabled.C. BGP routing protocol must be running.D. Symmetrical routing is required.E. Named access-lists must be configured.ANSWER: DExplanation:QUESTION NO: 242In the diagram, R1 is the head-end of a TE tunnel that terminates on R5. The red line indicates theprotected link, and the gold line indicates the backup tunnel. Which router is the Point of LocalRepair? 100
  • 101. Cisco 350-029 ExamA. R2B. R5C. R3D. R1E. None of the above.F. R4ANSWER: AExplanation:QUESTION NO: 243Which of the following events can NOT be tuned via router configuration to provide for fasterconvergence following a link failure?A. Failure detectionB. IGP LSP/LSA originationC. Per-hop flooding time of new link stateD. Number of hops that need to be notified of new link stateE. Failure reportingANSWER: DExplanation:QUESTION NO: 244What best explains the BGP route-reflector function?A. None of the above.B. BGP route-reflector does not have to be in the forwarding path of data coming from its clients.C. BGP route-reflector will stop reflecting the routes if theyre not directly-connected clients.D. BGP route-reflector should be in forwarding path of data coming from its clients.ANSWER: BExplanation:QUESTION NO: 245In Any Transport over MPLS (AtoM) Control word is an optional 4-byte field used in the 101
  • 102. Cisco 350-029 Exampseudowire packet. The control word carries generic and Layer 2 payload-specific information toemulate L2 packets correctly. In pseudowire packet, where is this Control Word inserted ?A. Inserted between the MPLS label stack and the Layer 3 payloadB. Inserted between the MPLS label stack and the Layer 3 HeaderC. Inserted between the MPLS label stack and the Layer 2 payloadD. Inserted between the MPLS label stack and the Layer 2 headerANSWER: CExplanation:QUESTION NO: 246What is the proper MP-BGP configuration between the shown PE routers to implement MPLSVPNs on PE-R2 ?A. None of the aboveB. router bgp 1neighbor 50.0.0.4 remote-as 1neighbor 50.0.0.4 update-source Loopback0no auto-summary!address-family ipv4neighbor 50.0.0.4 activateneighbor 50.0.0.4 send-community extendedexit-address-familyC. router bgp 1neighbor 50.0.0.4 remote-as 1neighbor 50.0.0.4 update-source Loopback0 102
  • 103. Cisco 350-029 Examno auto-summary!address-family vpnv4neighbor 50.0.0.4 activateneighbor 50.0.0.4 send-community extendedexit-address-familyD. router bgp 1neighbor 50.0.0.4 remote-as 1neighbor 50.0.0.4 update-source Loopback0no auto-summary!address-family vpnv4 unicast multicastneighbor 50.0.0.4 activateneighbor 50.0.0.4 send-community extendedexit-address-familyANSWER: CExplanation:QUESTION NO: 247What is the importance of using Virtual Output Queues on ingress Line Cards in a high-endrouter?A. Increases forwarding performanceB. Simplifies configurationC. Prevents head-of-line blockingD. Uses less memoryANSWER: CExplanation:QUESTION NO: 248Which of the following statements about MD5 Routing Updates authentication is valid? (Selecttwo)A. The MD5 algorithm inputs the routing updates of arbitrary length and outputs a 128-bit hashB. The MD5 algorithm inputs the routing updates of every 64bit length and outputs an 8-bit hashC. Multiple keys are supportedD. Routing updates packets are delivered in encrypted messages 103
  • 104. Cisco 350-029 ExamE. Shared secret keys are delivered in encrypted messagesANSWER: A,CExplanation:QUESTION NO: 249In which of the following BGP-related events is an End-of-RIB (EOR) message sent?A. Just before sending a CEASE message to tear down the session.B. During capability negotiation.C. During initial convergence.D. Following a link flap in the BGP speakers AS.E. Following a Route Processor Switchover.ANSWER: C,EExplanation:QUESTION NO: 250What is the requirement of Remote Triggered Black Hole (RTBH ) filtering?A. ISIS updates exchange between trigger router and black hole routerB. EBGP updates exchange between trigger router and black hole routerC. None of aboveD. OSPF updates exchange between trigger router and black hole routerE. IBGP updates exchange between trigger router and black hole routerANSWER: EExplanation:QUESTION NO: 251RIPv2 differs from RIPv1 in that:A. it uses multicast address 224.0.0.10,instead of broadcast.B. it uses multicast address 224.0.0.9,instead of broadcast.C. it can use either multicast or broadcast addresses,instead of just broadcast. 104
  • 105. Cisco 350-029 ExamD. it sends incremental updates,instead of periodic updates.E. it is classless,instead of classfulF. it supports authentication,and RIPv1 does notANSWER: B,E,FExplanation:QUESTION NO: 252Which 4 statements regarding MPLS Label Stack Encoding is true?A. A value of 4 represents the "Implicit NULL Label."B. A value of 0 represents the "IPv4 Explicit NULL Label."C. A value of 1 represents the "Router Alert Label". The use of this label is analogous to the use ofthe "Router Alert Option" in IP packets (for example, ping with record route option).D. A value of 2 represents the "IPv6 Explicit NULL Label"E. A value of 1 represents the "IPv1 Explicit NULL Label"F. A value of 3 represents the "Implicit NULL Label"ANSWER: B,C,D,FExplanation:QUESTION NO: 253What ISIS TLVs are used to support MPLS-traffic Engineering?A. Extended IS neighbor TLV # 22B. Extended IS name TLV #137C. Extended IS resource TLV #138D. Extended IS reachability TLV #135E. Router ID TLV # 134ANSWER: A,D,EExplanation:QUESTION NO: 254The layer 2 protocol used by POS technology offers a standardized way for mapping IPpackets into SONET/SDH payloads. Select the correct sequence of POS operation. 105
  • 106. Cisco 350-029 Exam1) Data is scrambled and synchronous mapping takes place by octet into the SONET/SDH frame.2) Encapsulated via Point-to-Point Protocol (PPP) takes place framing information is added withHigh-level Data Link Control (HDLC).3) Gaps between frames are filled with flags, set to value 7E.4) Octet stuffing occurs if any flags or resultant escape characters (of value 7D) are found in thedata.5) Data is segmented into an IP datagram with its 20-byte IP header.A. 1,3,4,5,2B. 5,2,3,1,4C. 2,3,5,4,1D. 5,2,3,4,1E. 1,2,3,4,5ANSWER: DExplanation:QUESTION NO: 255Select 3 AVPs (Attribute-Value Pair) which MUST be present in the ICRQ:A. Called NumberB. Call Serial NumberC. Message TypeD. Calling NumberE. Assigned Session IDANSWER: B,C,EExplanation:QUESTION NO: 256Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?A. The session ID is a 32-bit locally significant field used to identify the call on the destination oregress tunnel endport. The session ID will be negotiated by the control connection or staticallydefined if using the L2TP v3 data plane only 106
  • 107. Cisco 350-029 ExamB. The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. Thecontrol connection can negotiate this as an additional level of guarantee beyond the regularsession ID lookup to make sure that a data message has been directed to the correct session orthat any recently reused session ID will not be misdirected.C. The cookie is a 32-bit locally significant field used to identify the call on the destination oregress tunnel endpoint. The cookie will be negotiated by the control connection or staticallydefined if using the L2TPv3 data plane onlyD. The session ID is a variable length (with a maximum of eight bytes),word-aligned optionalfield. The control connection can negotiate this as an additional level of guarantee beyond theregular cookie lookup to make sure that a data message has been directed to the correct sessionor that any recently reused cookie will not be misdirected.ANSWER: A,BExplanation:QUESTION NO: 257As described in rfc 3270,short-pipe mode operstion, the PE to CE egress polices are based upon:A. customer markingB. remarked IP tos valueC. Qos groups/discard classD. Innerrnost label exp valueE. MDRR quantamF. topmost label exp valueANSWER: AExplanation:QUESTION NO: 258The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN(PVLAN )A. The Outer.1Q tag represents customer VLAN ID and inner.1Q tag represents Provider VLAN(PVLAN )B. It is an effective way to achieve VLAN transparency between Provider and enterprise customerby tunneling one ser of VLAN tags inside a second VLAN tagC. The Outer.1Q tag represents Service VLAN (PVLAN) and inner.1Q tag represents customerVLAND. QinQ is a way to hide native VLAN which can conflict with Provider native VLAN 107
  • 108. Cisco 350-029 ExamANSWER: B,CExplanation:QUESTION NO: 259Based on the following output in R1, which statement is trueR1#show mpls forwarding-table 50.0.0.3 detailLocal Outgoing Prefix Bytes tag Outgoing Next Hoptag tag or VC or Tunnel Id switched interface19 17 50.0.0.3/32 0 Et0/0 192.168.0.14A. If a labeled packet arrives with the top most label of 17, all the labels will be removed and aclear IP packet is sent to Next Hop 192.168.0.14 on Ethernet 0/0.B. If a labeled packet arrives with the top most label of 17, it will be replaced with label 19 and sentout on Ethernet 0/0 interface.C. None of the above.D. If a labeled packet arrives with the topmost label of 19, the label is replaced with label 17 andthe packet is sent out on the Ethernet 0/0 interface.ANSWER: DExplanation:QUESTION NO: 260BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would helpmitigate what classification of attack?A. Denial of service attackB. Sniffing attackC. Spoofing attackD. Reconnaissance attackE. Port Scan attackANSWER: CExplanation: 108
  • 109. Cisco 350-029 ExamQUESTION NO: 261Which IOS features are used to avoid Routing loops when dynamic Routing protocols are usedbetween PE and CE in MPLS-VPN networks?A. BGP cost communityB. BGP feature allow-as inC. Access-list Control in Distance Vector protocol like RIP and EIGRP.D. SHAM links with OSPFE. RPF Reverse Path forwarding.F. Site Of Origin SOO.ANSWER: C,FExplanation:QUESTION NO: 262In a frame, the MPLS label is imposedA. Before the layer 2 headerB. Within the Layer 3 headerC. After the Layer3 header and before Layer2 headerD. After the Layer2 header and before Layer3 headerANSWER: DExplanation:QUESTION NO: 263What is used to provide read access to QoS configuration and statistics information on Ciscoplatforms that support Modular QoS CLI (MQC)?A. Cisco SDM QoS WizardB. Cisco AutoQoSC. CDPD. Cisco Class-Based QoS MIB.E. Cisco NBAR Discovery 109
  • 110. Cisco 350-029 ExamANSWER: DExplanation:QUESTION NO: 264which of the following descriptions about urpf loose mode is correct?A. It is typically used on point-to-point interfaces where the same interface isused for bothdirectiongs of packet flows; if the source address has a return route in the FIB table,it is thenchecked against the adjacency table to ensure the same interface receiving the packet is thesame interface used for the return pathB. If a packet fails the uRPF loose mode check, the packet is then transmitted and creates a logmessageC. It is typically used on multipoint interfaces or on routers where asymmetrical routing isused(packets are received on one interface but the return path is not on the same interface);loosemode verifies a source address by looking in forwarding information base(FIB). Created by routingprotocols, to verify there is a return route to the source and to venrify that the path uses a validinterfaceD. None of aboveE. If a packet fails the uRPF loose mode check ,the packet is then droppedANSWER: C,EExplanation:QUESTION NO: 265What is periodically multicasted (every 10 seconds) by the DIS on a LAN to ensure IS-IS LinkState Database accuracy?A. IIHB. LSPC. CSNPD. ISHE. PSNPANSWER: CExplanation: 110
  • 111. Cisco 350-029 ExamQUESTION NO: 266The ASBR-summary LSA is:A. Generated by the ABR and describes reachabilty to the ASBR for routers in the same area withthe ASBRB. Generated by the ASBR and describes reachability to itselfC. Generated by the ABR and describes reachabilty to the ASBR for routers in a different areafrom the ASBRD. Generated by the ASBR and describes reachabilty to the ABRANSWER: CExplanation:QUESTION NO: 267Referring to the exhibit, what could be preventing the R1 router from receiving any prefixes fromthe R2 BGP neighbor?A. The neighbor 192.168.31.2 next-hop-self command is missing on R2B. R1 is using the wrong remote AS number in its neighbor 192.168.31.1 remote-as configurationC. There is a TCP session establishment problem between R1 and R2 111
  • 112. Cisco 350-029 ExamD. The no sync command is missing on R1E. The no sync command is missing on R2F. There is a BGP version mismatch between R1 and R2ANSWER: BExplanation:QUESTION NO: 268What statement about Transit AS is true?A. Traffic and prefixes originating from Transit AS are carried across a Stub AS to their SourceAS.B. None of the above.C. Traffic and prefixes originating from Source AS are carried across a Transit AS to reach theirdestination AS.D. Traffic and prefixes originating from Transit AS are carried across a Stub AS to their destinationAS.ANSWER: CExplanation:Topic 3, Practice Questions Set 2QUESTION NO: 269The OSPF External LSA for prefix x.x.x.x exists in the OSPF database, but the prefix is notinstalled in the routing table. Which are possible explanations?A. ASBR origination the LSA is not reachable.B. Route to the Forwarding Address is an internal OSPF route.C. Inbound distribute-list is configured under the ospf process and it is denying x.x.x.xD. Route to the ASBR does not follow the same path as the one to the Forwarding Address.E. Route to the Forwarding Address in not an internal OSPF route.ANSWER: A,C,EExplanation:QUESTION NO: 270When provisioning for Interactive-Video(e,g,video conferencing traffic)which three statements 112
  • 113. Cisco 350-029 Examdepicts the correct requirements?A. Loss should be no more than 1 percent.B. One-way latency should be no more than 150 msC. Jitter should be no more than 30 msD. Loss should be no more than 3 percentE. One-way latency should be no more than 150/2=75 msF. Jitter should be no more than 300 msANSWER: A,B,CExplanation:QUESTION NO: 271Select the three valid LMI extension.A. MulticastingB. Global addressingC. Forward-explicit congestion notification (FECN)D. Virtual circuit status messages.E. Backward-explicit congestion notification (BECN)ANSWER: A,B,DExplanation:QUESTION NO: 272In the Inter-AS VPN deployment shown in the diagram, what is the Next Hop address of MP-IbgpUpdate for CE4 network received at PE-R2 ? 113
  • 114. Cisco 350-029 ExamA. ASBR-2 50.0.0.3B. PE-R2 50.0.0.2C. PE-R4 50.0.0.4D. ASBR-1 50.0.0.1ANSWER: AExplanation:QUESTION NO: 273Unicast Reverse Path Forwarding (Urpf ) can work in the following modes:A. Safe modeB. Loose modeC. Strict modeD. Express modeE. Tunnel modeANSWER: B,CExplanation:QUESTION NO: 274There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packetlabel stack sequence (from outer to inner) for the VPN traffic on this router?A. VPN label, IGP label, TE labelB. TE label, IGP label, VPN labelC. IGP label, VPN label, TE labelD. TE label, VPN label, IGP labelE. IGP label, TE label, VPN labelANSWER: BExplanation:QUESTION NO: 275Which of the following ATOM traffic encapsulations require the use of a Control Word? 114
  • 115. Cisco 350-029 ExamA. AAL5B. Ethernet VLANC. Cell relayD. HDLCE. Frame RelayF. PPPANSWER: A,C,EReference: http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/fsatoma.htmlQUESTION NO: 276What IOS commands display MPLS label mapping on an LSR?A. Show mpls ldp parametersB. Show mpls ldp bindingsC. Show mpls forwading-tableD. Show mpls ldp discoveryE. Show mpls ldp neighbor detailANSWER: BExplanation:QUESTION NO: 277When should traffic shaping be implemented on Frame Relay PVCs? (Choose two)A. When you want to drop excess traffic above the CIRB. When there is a speed mismatch between the central site and the remote site.C. When using Frame Relay SVCsD. When over-subscribing the central site linkE. When LLQ is implemented on the Frame Relay PVC.F. When Multilink PPP LFI is implemented on the Frame Relay PVC.ANSWER: B,DExplanation: 115
  • 116. Cisco 350-029 ExamQUESTION NO: 278Which BGP community is used to prevent the advertisement of the BGP prefix to other BGPpeers?A. no-advertiseB. additiveC. no-exportD. local-asE. noneANSWER: AExplanation:QUESTION NO: 279Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.A. Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocoladdress for a specific connection on its known DLCI.B. Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on therouter or access server which is used to supply the next-hop protoco address or the DLCI foroutgoing traffic.C. Inverse ARP is enabled by default for all protocols enabled on the physical interface.D. Inverse ARP is configured using the following command under the Interface configurationframe-relay map dlci (dlci number) protocol protocol-address.E. Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet.ANSWER: A,B,CExplanation:QUESTION NO: 280Which two statements are true?A. An internal BGP (iBGP) network can have Route-Reflectors within a Confederation.B. Clusters are used in Route-Reflector schemes to avoid loops.C. A confederation uses confederation clusters to avoid routing loops.D. An internal BGP (iBGP) network cannot have Route-Reflectors within a Confederation becauseConfederation works between External Autonomous System (AS) numbers. 116
  • 117. Cisco CCIE SP Written Exam “ 350-029 ” StudynQuestionsswersANSWER: A,BExplanation:QUESTION NO: 281What are the differences between LLQ and CBWFQ? (Choose two.)A. LLQ priority queue bandwidth is policed with a congestion aware policer.B. With LLQ, bandwidth allocations for the priority queue and all the CBWFQ queues areconfigured using the priority command.C. LLQ does not support WFQ on the default traffic class (class-default).D. LLQ supports the addition of strict priority queuing.E. LLQ is configured using MQC and CBWFQ is configured using the fair-queue command.ANSWER: A,DExplanation:QUESTION NO: 282Which command will display the MPLS label binding for IP prefix 1.1.1.0 on the router?A. All of the above.B. show tag-switching tdp binding 1.1.1.0/24C. show tag-switching tdp bindings neighbor 1.1.1.0D. A and B both will show the binding.E. show tag-switching interface e0/0ANSWER: BExplanation:QUESTION NO: 283Which of the following statements regarding Selective Packet Discard(SPD) is correct?A. Selective Packet Discard (SPD) is a mechanism to drop non-routing packets instead ofrouting packets when the process level queue is congested.B. Selective Packet Discard(SPD) is a mechanism to drop normal IP packets instead of VOIPpackets when the link is overloaded 117
  • 118. Cisco CCIE SP Written Exam “ 350-029 ” StudynQuestionsswersC. None of above.D. Selective Packet Discard(SPD) is a mechanism to drop Frame Relay frames with the DE bit setinstead of Frame Relay frames DE bits without being set when the link is overloadedE. Selective Packet Discard(SPD) is a mechanism to drop packets with low IP precedence insteadof packets with high IP precedence when the link is overloadedANSWER: AExplanation:QUESTION NO: 284What is true regarding Autonomous Systems (AS)?A. All of the AboveB. AS numbers are assigned by the IANAC. AS numbers are used by BGP (Border Gateway protocol ) to exchange IP routing informationwith neighboring ASD. In the internet, an Autonomous System (AS) is a collection of IP networks and routers under thecontrolANSWER: AExplanation:QUESTION NO: 285If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge (PE)routers in the VPN backbone, which two options best describe the use of SHAM links?A. A sham-link is created between any twoo VPN sites that belong to the same OSPF area andshare an OSPF backdoor linkB. A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is createdand database is exchangedC. A SHAM link is created between two directly connected PE routers so that it is preferred overthe low speed backdoor doorD. A SHAM link is part of OSPF network of MPLS-VPN provider.ANSWER: A,BExplanation: 118
  • 119. Cisco CCIE SP Written Exam “ 350-029 ” StudynQuestionsswersQUESTION NO: 286Assume two routers on the same subnet, R1 and R2, both configured for HSRP. R1 has a priorityof 120. Which of the following HSRP interface configurations will always result in the R2 becomingthe primary?A. standby 1 priority 120B. standby 1 priority 130 preemptC. standby 1 priority 130D. standby 1 priority 120 preemptE. standby 1 priority 110 preemptF. standby 1 priority 110ANSWER: B,CExplanation:QUESTION NO: 287If two routers, both reachable from one another, originate functionally equivalent type 2 external-LSAs (i.e, same destination, cost and non-zero forwarding address ), Which of the followingstatements would apply ?A. Only the LSA generated by the lowest RID ASBR will exist in the networkB. Two LSAs will exist in the network for this destination, but only the one generated by thehighest RID ASBR will be usedC. Two LSAs will exist in the network for this destination, and both will be usedD. Only the LSA generated by the highest RID ASBR will exist in the networkANSWER: DExplanation:QUESTION NO: 288What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?A. Filter Smurf ICMP packets.B. Filter as close to the core as possibleC. Filter as close to the edge as possibleD. Filter as precisely as possibleE. Filter both source and destination where possible. 119
  • 120. Cisco 350-029 ExamANSWER: C,D,EExplanation:QUESTION NO: 289Which of the following processes are likely to be found in a microkernel?A. Memory managementB. Lightweight messagingC. Process schedulingD. Hardware abstractionE. Host stackF. All of the aboveANSWER: FExplanation:QUESTION NO: 290Using more than one label on a single packet is required in what context?A. MPLS TEB. When CEF switching and Label switching is doneC. In all the above circumstances.D. MPLS VPNANSWER: DExplanation:QUESTION NO: 291How many token buckets are needed to support a multi-actions policer that meters conforming,exceeding and violating traffic?A. 1B. 3C. 5D. 2 120
  • 121. Cisco 350-029 ExamE. 6F. 4ANSWER: DExplanation:QUESTION NO: 292The IPv6 address FE80::656:78FF:FE9A:BCDE is what type of address?A. Site-localB. Link-localC. MulticastD. None of the aboveANSWER: BExplanation:QUESTION NO: 293What is the role of Forwarding Equivalence Class (FEC) in MPLS?A. FEC determines how to establish an LSP path.B. FEC determines how IP packets are forwarded in MPLS LSP.C. None of above.D. FEC determines how MPLS labels are stacked in LSP.E. FEC determines how a group of IP packets are mapped to an LSP.ANSWER: EExplanation:QUESTION NO: 294Typical ADSL broadband Internet access requires a username and password to be entered onend-user PC connected to the ADSL modem in order for the end user to gain access to theInternet.if a Cisco ADSL router is used instead of an ADSL modem,what functionality is requiredon the Cisco ADSL router so the end-user connected to the Cisco ADSL router can access theInternet without entering a username and password? 121
  • 122. Cisco 350-029 ExamA. Route Bridge Encapsulation(RBE)B. PPPoAC. Integrated Routing and Bridging(IRB)D. AAAE. PPPoE clientANSWER: EExplanation:QUESTION NO: 295In PIM-SM operations, the first router connected to the multicast source sends the Registermessage to which device?A. Designated Router (DR)B. Multicast source C.Multicast receiverD. RP mapping agentE. RPANSWER: EExplanation:QUESTION NO: 296In which state can BGP peers exchange Update messages?A. OpenConfirmB. OpenSentC. ActiveD. IdleE. EstablishedANSWER: EExplanation:QUESTION NO: 297What Cisco IOS feature examines packets received to make sure that the source address and 122
  • 123. Cisco 350-029 Examinterface are in the routing table and matck the interface that the packet was received on?A. MPLS Traffic EngineeringB. Receive ACLC. Unicast RPFD. AuthenticationE. Dynamic access-listsANSWER: CExplanation:QUESTION NO: 298What statement is true?A. Link Control Protocol (LCP) is used for denying PPP connections to unauthorized devices.B. Link Control Protocol (LCP) is used for basic PPP link setup and operationC. None of the above.D. Link Control Protocol (LCP) for PPP is synonymous to ARP for Ethernet.ANSWER: BExplanation:QUESTION NO: 299Which of the following IOS commands can detect whether the SQL slammer virus propagates inyour networks?A. access-list 110 permit any any udp eq 69 logB. access-list 100 permit any any udp eq 1434 logC. access-list 110 permit any any udp eq 69D. access-list 100 permit any any udp eq 1434E. None of above.ANSWER: BExplanation:QUESTION NO: 300 123
  • 124. Cisco 350-029 ExamWhat is used as label in cell-based MPLS ?A. VPI and VCIB. None of aboveC. VCID. Specific 4 bytes labelE. VPIANSWER: AExplanation:QUESTION NO: 301Routes redistributed into an OSPF ASBR are which LSA type?A. LSA type 6B. LSA type 1C. LSA type 2D. LSA type 5E. LSA type 3F. LSA type 4ANSWER: DExplanation:QUESTION NO: 302A Successor is:A. A neighbor that has met the feasibility conditionB. A neighbor that has met the feasibility condition and has the lowest cost path towards thedestinationC. Any neighbor that is in the path towards the destination.D. Any neighbor that is in the path towards the destination and whose reported distance equalsthe feasible distance.ANSWER: BExplanation: 124
  • 125. Cisco 350-029 ExamQUESTION NO: 303Which two of the following are designated fields for MAC tunneling protocol(802.1 ah)?A. Control WordB. Tunnel LabelC. 802.1q VLAN TAGD. ISLE. Service EthertypeF. Pseudo LAN TAGANSWER: E,FExplanation:QUESTION NO: 304ATM carries IP and PPP information with ATM cells. What ATM adaptation Layer is used when anATM cell carries IP packets and PPP frames?A. AAU2B. AAL3C. AAL4D. AAL5ANSWER: DExplanation:QUESTION NO: 305What will significantly degrade DSL performance, regardless of DSL rate or line length? Select allthat applyA. Microliters installed between a telephone and shared line.B. POTS splitters at the subscribers end of the DSL lineC. POTS splitters at the telco CO.D. None of the other alternatives apply.ANSWER: DExplanation: 125
  • 126. Cisco 350-029 ExamQUESTION NO: 306What does UDLD stand for?A. UniDirectional Loop DetectionB. Unspecified Distribution Label DetectionC. Unified Distribution Label DirectionD. UniDirectional Link DetectionANSWER: DExplanation:QUESTION NO: 307Refer to the outputs shown in the exhibit. What could be preventing the R1 router from receivingany prefixes from the R2 BGP neighbor? 126
  • 127. Cisco 350-029 ExamA. R2 is using the wrong AS number in its neighbor 192.168.31.2 remote-as statement.B. The no sync command is missing on R2.C. R1 is using the wrong AS number in its neighbor 192.168.31.1 remote-as statement.D. The no sync command is missing on R1.E. Both R1 and R2 are not using a loopback address to source their BGP packets.F. There is a TCP session establishment problem between R1 and R2.ANSWER: CExplanation:QUESTION NO: 308What is true regarding Cisco Network Registrar in Cable networks?A. It provides comprehensive Domain Name systemB. It provides DHCP administrative functionalityC. It provides TFTP server functionality.D. All of the above are true.ANSWER: DExplanation:QUESTION NO: 309Which of the following is reported in the LMI regular status polling? Select all that applyA. Addition or Deletion of PVC.B. PVC status (active or inactive).C. Link integrity.D. None of the other alternatives apply.ANSWER: A,B,CExplanation: 127
  • 128. Cisco 350-029 ExamQUESTION NO: 310In the Apache Web Server configuration, the command KeepAlive ON is used toA. Allow a CSS to probe the serverB. Allow a connection to be closed with a TCP RESETC. Allow persistent connectionsD. Allow the use of HTTP HEAD requestANSWER: CExplanation:QUESTION NO: 311Which two statements about VPLS are true? (Choose two.)A. There is a full mesh of pseudowires.B. There is a partial mesh of pseudowires.C. Only l_2TPv3 can be used for pseudowire establishment.D. There is split-horizon to avoid loops.ANSWER: A,DExplanation:QUESTION NO: 312In which modes does selective packet discard(SPD)operate?(choose3)A. normalB. discardC. randomD. D. fullANSWER: A,C,DExplanation: 128
  • 129. Cisco 350-029 ExamQUESTION NO: 313What is TCI?A. Tag Calling InterfaceB. Tag Control IdentifierC. ToS Class InterfaceD. Tag Control InformationANSWER: DExplanation:QUESTION NO: 314What is the statistical reserve?A. Bandwidth that is reserved for SVCs to route over a trunkB. Bandwidth that is reserved on a trunk so that ABR connections can burstC. Bandwidth on a trunk that is reserved for control traffic and cannot be used by connectionsD. Bandwidth that cannot be allocated to connections but can be used to accommodate statisticalvariations in the trafficANSWER: DExplanation:QUESTION NO: 315ATT (Attached )bit needs to be set in the link state PDUs in an IS-IS level-1-2 router to indicatethat they are a potential exit point out of the areaA. TrueB. FalseANSWER: AExplanation: 129
  • 130. Cisco 350-029 ExamQUESTION NO: 316What features set is most frequently used to prevent hackers from flooding a port with MAC-addresses?A. BPDU GuardB. 802.xC. Port SecurityD. Storm ControlANSWER: CExplanation:QUESTION NO: 317What layer of the TMN (telecommunications management network) model does CTM fit into?A. Network management layerB. Element management layerC. Business management layerD. Network element layerANSWER: BExplanation:QUESTION NO: 318With the BGP peerings shown, which 3 solutions are most correct? 130
  • 131. Cisco 350-029 ExamA. rtrA and rtrD are route-reflector-clients; rtrB and rtrC are route reflectors part of the samecluster.B. rtrA and rtrD are route-reflector-clients; rtrB and rtrC are route reflectors part of the differentcluster.C. rtrA, rtrB and rtrC are part of a confederation sub-AS and rtrD is part of a different confederationsub-ASD. rtrA, rtrB are part of one confederation sub-AS and rtrC,rtrD are part of a different confederationsub-ASE. rtrA, rtrB and rtrC are part of a confederation sub-AS where rtrB is a route reflector and rtrA,rtrC are route-reflector-clients.ANSWER: B,D,EExplanation:QUESTION NO: 319In optical transmission systems, chirped lasers are used for the purpose of:A. Turning the laser to a specific ITU channelB. Keeping the signal wavelength "locked" to a specific technologyC. Suppressing FWM and SBS non-linear effectsD. None of the aboveANSWER: DExplanation: 131
  • 132. Cisco 350-029 ExamQUESTION NO: 320Which statement is FALSE concerning Concatenation?A. It allows ITCM to send multiple upstream packets in one single large burst.B. It reduces upstream data throughput.C. It can be enabled / disabled from CMTS on per upstream port basis ifdesiredD. Concatenation activity on an interface can be checked by the show controller counterscommandANSWER: BExplanation:QUESTION NO: 321What method of streaming live video is the least taxing on bandwidth in a large enterpriseenvironment?A. TCPB. UDPC. HTTPD. MulticastANSWER: DExplanation:QUESTION NO: 322What is the relationship between the Domain Name System (DNS) and LDAP?A. All the root DNS servers maintain information in a distributed LDAP tree.B. DNS clients access DNS information by making LDAP queries to DNS servers.C. An LDAP DN attribute is a Domain Name.D. It is currently recommended to express DN as a sequence of Domain components 132
  • 133. Cisco 350-029 ExamANSWER: DExplanation:QUESTION NO: 323When gateways are registering with a gatekeeper, the gatekeeper can beA. On the same subnetB. On a remote LANC. In a different subnetD. Any of the aboveANSWER: DExplanation:QUESTION NO: 324What is the effect of changing DMT interleaved delay from 3 milliseconds to 15 milliseconds?A. Latency remains the same, but throughput is decreased.B. Latency remains the same, but error correction effectives may also be reduced.C. Latency is increased, but faster error correction occurs.D. Fewer ATM PVCs can be provisioned on DSL line.ANSWER: CExplanation:QUESTION NO: 325What protocol does an IP phone use to learn the voice VLAN ID it should use for voice traffic?A. VTPB. 802.1 qC. CDPD. Skinny Station Protocol 133
  • 134. Cisco 350-029 ExamQUESTION NO: 326During the modem boot process, how does the modem acquire the downstream channel?A. The modem is commanded by the CMTS to set to the specific channel.B. The modem uses the default value in the broadcom chipset.C. The modem tuner sets a level as defined by the DOCSIS specification.D. The modem tuner scans the downstream spectrum until digital QAM modulated signal isencounteredANSWER: DExplanation:QUESTION NO: 327What is the function of the AJB bits on DS1 using Extended Super Frame (ESF)?A. It is used for signaling on-hook and off-hook status.B. It carries CRC information for error detection.C. It is used for a control and performance information.D. It is used for a frames synchronization and alignment.ANSWER: AExplanation:QUESTION NO: 328 134
  • 135. Cisco 350-029 ExamHow many content definitions does CSG allow?A. 40B. 400C. 4000D. 40,000ANSWER: CExplanation:QUESTION NO: 329BGP best route selection process is based on path attributesA. TrueB. FalseANSWER: AExplanation:QUESTION NO: 330Which two IOS commands are equivalents for putting a Cisco 7500 OC-12 RPR interface card intowrapped mode? Select all that applyA. shutdown [a | b]B. srp shutdown [a | b]C. srp ips request manual-switched [a | b]ANSWER: B,CExplanation: 135
  • 136. Cisco 350-029 ExamQUESTION NO: 331Which statement is FALSE concerning the interleave depth value?A. A higher interleave depth provides more protection from burst of noise on the HFC networkB. Higher interleave depth increase downstream latency.C. Lower interleave depth cause some packet loss on typical HFC networksD. None of the aboveANSWER: DExplanation:QUESTION NO: 332What is the effect of turning on all available downstream carrier tones in a DMT DSL transmissionsystems?A. Downstream RS error correction effectiveness is reduced.B. The downstream line rate and throughput remains unchanged, but FEC efficiency is reduced.C. The upstream DSL bandwidth is reduced, since less carriers become available for upstreamtraffic.D. The downstream DSL bandwidth is increased.ANSWER: DExplanation:QUESTION NO: 333What is the purpose of Dual Ring Interconnect with D C for SDH rings?A. Protects signals when a ring switch failsB. Protects signals when multiple span switches failC. Protects pre-emptible traffic from being dropped when a ring switch occursD. Protects signals against any combination of link failure in each ringANSWER: DExplanation: 136
  • 137. Cisco 350-029 ExamQUESTION NO: 334MPLS label mapping on an LSR is displayed by which IOS command?A. Show mpls Idp neighbor detailB. Show mpls Idp bindingsC. Show mpls Idp parametersD. Show mpls Idp discoveryANSWER: BExplanation:QUESTION NO: 335In a cable HFC plant, what is a modulator?A. Set top boxB. Diplex filterC. Local head endD. Fiber nodeANSWER: AExplanation:QUESTION NO: 336What is the main difference between the information displayed on the dspload and the dsptrkutlscreens?A. The dspload screen is for all trunks; the dsptrkutl screen is for one trunk.B. The dspload screen shows the expected traffic; the dsptrkutl screen shows actual traffice.C. The information on the dspload screen never changes; the dsptrkutl screen is dynamicD. The dspload screen shows historical information; the dsptrkutl screen shows currentinformation.ANSWER: BExplanation: 137
  • 138. Cisco 350-029 ExamQUESTION NO: 337An architecture that utilizes PPPoE deals with IP address allocation by what type of negotiation?A. NISB. IPCPC. RADIUSD. LDAPANSWER: BExplanation:QUESTION NO: 338Which of the following is true regarding Label Distribution Protocol (LDP)?A. It is a label distribution protocol for MPLS.B. It is a set of procedures and messages by which LSRs establish Label Switch Paths (LSPs)through a networkC. Tag distribution Protocol (TDP) was the basis for LDP.D. All of the above are true.ANSWER: DExplanation:QUESTION NO: 339GMPLS is based upon Non-Packet-based devicesA. TrueB. FalseANSWER: AExplanation: 138
  • 139. Cisco 350-029 ExamQUESTION NO: 340What does FRTP stand for?A. Frame Relay Top PseudowireB. Frame Relay Traffic PseudowireC. Frame Relay Traffic ProtocolD. Frame Relay Traffic PolicingANSWER: DExplanation:QUESTION NO: 341In MPLS traffic engineering, which one of the following protocols is used for Path Setup?A. BGPB. OSPFC. ISISD. RSVPANSWER: DExplanation:QUESTION NO: 342For SONET ring switching, the 50ms switch time: Select all that applyA. Plncludes the detection timeB. Applies to rings smaller than 1200kmC. Applies to rings smaller than 1000kmD. Includes up to 16 nodesANSWER: B,DExplanation: 139