Which two types of LSAs have an area scope? (Choose two.)
A. Type 2
B. Type 5
C. Type 11
D. Type 7
You are asked to configure a series of interface policers and firewall filters, which include policers, on the same device. You must ensure that the two configuration methods do not conflict.
What are two considerations when performing this task? (Choose two.)
A. On inbound traffic, firewall filters are applied before interface policers.
B. On outbound traffic, interface policers are applied before firewall filters.
C. On outbound traffic, firewall filters are applied before interface policers.
D. On inbound traffic, interface policers are applied before firewall filters.
All adjacencies have been formed, no extra options have been configured, and no policies have been written.
Referring to the exhibit, which two statements are correct? (Choose two.)
A. R2 will create a default route and send it as a TLV to R1
B. R1 cannot reach R5
C. R1 can reach R5
D. R1 will create its own default route that points to R2
Referring to the exhibit, there is a Layer 3 VPN setup that connects sites CE-A-1, CE-A-2, and CE-A-3 together. Host-1 can communicate with Host-3, but Host-1 cannot communicate with Host-2.
What must you do to solve the problem?
A. Change the route distinguisher in both routing instances to the same value.
B. Use the next-table configuration statement for static routes in the corresponding routing instances.
C. Use BGP instead of static routing between the CE and PE devices.
D. Use the auto-export command in both routing instances.
You are providing carrier-of-carrier VPN services for AS 100 and AS 200. You want to distribute MPLS labels between your PE routers and the AS 100 and AS 200 CE routers.
What must be enabled to accomplish this task?
A. Use BGP with the inet-vpn address family enabled.
B. Use BGP with the labeled-unicast address family enabled.
C. Use RSVP with the lsp-set parameter enabled.
D. Use RSVP with the tunnel-services parameter enabled.
R1 assigns incoming voice traffic to the ef forwarding class. All other traffic is assigned to the best-effort forwarding class. You have configured a CoS re-write rule on R1 to include the correct CoS bit values in packets sent towards R2. You want R2 to classify traffic using the CoS markings created by R1.
Which two configuration steps are necessary to accomplish this task? (Choose two.)
A. Assign the behavior aggregate classifier to the ge-0/0/1.0 interface on R2.
B. Assign the CoS re-write rule to the ge-0/0/1.0 interface on R2.
C. Configure a CoS re-write rule on R2 and assign matching CoS values.
D. Configure a behavior aggregate classifier on R2.
Referring to the exhibit, you need to implement VPLS between CE-A1 and CE-A2. You must ensure that no loops are created due to the multihoming of the connection from CE-A2 to PE2 and PE3.
Based on the type of VPLS, which two solutions will satisfy this requirement? (Choose two.)
A. In an LDP VPLS, configure a primary and backup neighbor.
B. In an LDP VPLS, configure multihoming and local preference on PE-2 and PE-3.
C. In a BGP VPLS, configure multihoming and local preference on PE-2 and PE-3.
D. In a BGP VPLS, configure a primary and backup neighbor.
You are creating an LDP-signaled Layer 2 circuit between two sites. Site1 and Site2 use different VLAN IDs to connect to your PE devices.
In this scenario, which encapsulation type must be used on the logical interfaces?
A. vlan-ccc
B. vlan-vpls
C. vlan-bridge
D. vlan-tcc
Which two statements about virtual links are correct? (Choose two.)
A. Virtual links are point-to-point.
B. Virtual links are used for control plane traffic.
C. Virtual links are excluded from SPF calculations.
D. Virtual links are bidirectional.
You are troubleshooting an issue where R1 is no longer receiving the default IS-IS route from R3. Referring to the exhibit, which action would you take to solve the problem?
A. Delete the protocols isis ignore-attached-bit configuration statement on R1.
B. Delete the protocols isis level 2 disable configuration statement on R3.
C. Delete the protocols isis import configuration statement on R1.
D. Delete the protocols isis ignore-attached-bit configuration statement on R3.