If the SDP between R2 and R1 goes down, what devices will be reachable from R2 through the VPLS?
Click on the exhibit below. If the SDP between R2 and R1 goes down, what devices will be reachable from R2 through the VPLS? A. Only R4 will be reachable through the VPLS. B. All devices will be reachable through the VPLS. C. R4 and R3 will remain reachable. D. No devices will be reachable.
The following VPLS services and SAPs have been configured. Which of the following statements is true?
Click on the exhibit below. The following VPLS services and SAPs have been configured. Which of the following statements is true? A. All untagged frames will be dropped. B. The source MAC address of a frame with a top tag of 200 and bottom tag of 300 will be populated in VPLS 3. C. All […]
Which of the following statements is false?
Which of the following statements is false? A. VPLS is a bridged LAN service. B. VPLS provides L2 VPN services to CEs. C. VPLS is a point-to-point service where CEs are presented with point-to-point virtual circuits. D. CEs that are members of the same VPLS service instance communicate with each other as if they are […]
Assume the port on CE-A is sending two tags, a top tag of 100 and a bottom tag of 500. PE-A is configured with
Click on the exhibit below. Assume the port on CE-A is sending two tags, a top tag of 100 and a bottom tag of 500. PE-A is configured with a SAP id of 1/1/1:100.*. How should PE-B be configured if CE-B is expecting a top tag of 200 and a bottom tag of 500? A. […]
Which of the following statements relating to VPLS is false?
Which of the following statements relating to VPLS is false? A. A VPLS is a multipoint Layer 2 service. B. A VPLS allows multiple customer sites to be connected in a single bridged domain. C. A VPLS on a single node requires a SDP. D. With an IP/MPLS infrastructure, service providers can provide multiple VPLS […]
Port 1/1/1 has been configured as an access port with QinQ encapsulation. Which of the following three stateme
Port 1/1/1 has been configured as an access port with QinQ encapsulation. Which of the following three statements are true for ingress traffic assuming default configuration? (Choose 3) A. sap 1/1/1:*.0 is a valid sap id. B. sap 1/1/1:100* will accept frames with a single tag of 100. C. sap 1/1/1:200* will strip the top […]
Fill in the blank for this next sentence
Fill in the blank for this next sentence. Flooded traffic received on any ____________ in the service is replicated to other spoke SDPs and SAPs and not transmitted on any mesh SDPs. A. Spoke SDP B. Mesh SDP A. Either (a) or (b) will make this sentence true. D. Neither (a) nor (b) will make […]
Assuming TLDP and RSVP are both being used in an MPLS network core which of the following statements is true?
Assuming TLDP and RSVP are both being used in an MPLS network core which of the following statements is true? A. TLDP is used to create the inner label, RSVP is used to create the outer label. B. TLDP is used to create the outer label, RSVP is used to create the inner label. C. […]
Which of the following statements about the VC-ID is false?
Which of the following statements about the VC-ID is false? A. The vc-id is signaled in the control plane. B. The vc-id is part of the data plane encapsulation. C. There is a vc-id to vc-label mapping. D. The vc-id has point to point significance.
What are the limitations of a traditional layer 2 switch?
What are the limitations of a traditional layer 2 switch? (Choose 3} A. Isolates collision domains. B. Requires layer 2 loop prevention. C. Slow response to topology changes. D. Limited to 4094 vlans per switch. E. Increased flooding.