Refer to the exhibits. Which information is provided for traceback analysis when this configuration is applied?
A. source interface
B. packet size distribution
C. IP sub flow cache
D. BGP version
Question 12
Refer to the exhibit. R1 is connected to two service providers and is under a DDoS attack.Which statement about this design is true if URPF in strict mode is configured on both interfaces?
A. R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface.
B. R1 drops destination addresses that are routed to a null interface on the router.
C. R1 permits asymmetric routing as long as the AS-PATH attribute entry matches the connected AS.
D. R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Question 13
Refer to the exhibit. Router 1 was experiencing a DDoS attack that was traced to interface gigabitethernet0/1.Which statement about this configuration is true?
A. Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1.
B. Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface.
C. Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface.
D. Router 1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Question 14
Refer to the exhibit. An engineer is preparing to implement data plane security configuration.Which statement about this configuration is true?
A. Router 2 is the router receiving the DDoS attack.
B. Router 1 must be configured with uRPF for the RTBH implementation to be effective.
C. Router 1 is the trigger router in a RTBH implementation.
D. Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Question 15
Which configuration modifies Local Packet Transport Services hardware policies?
A.
B.
C.
D.
Question 16
Which additional feature does MPLS DiffServ tunneling support?
A. matching EXP and DSCP values
B. PHB layer management
C. using GRE tunnels to hide markings
D. interaction between MPLS and IGP
Question 17
You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tailend router?
A. path
B. tear
C. error
D. reservation
Question 18
Which statement describes the advantage of a Multi-Layer control plane?
A. It provides multivendor configuration capabilities for Layer 3 to Layer 1.
B. It automatically provisions, monitors, and manages traffic across Layer 0 to Layer 3.
C. It supports dynamic wavelength restoration in Layer 0.
D. It minimizes human error configuring converged networks.
Question 19
DRAG DROP -Drag and drop the technologies from the left onto the correct definitions on the right.Select and Place:
Question 20
An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate.Which configuration accomplishes these objectives?