What can you determine from this configuration?
Referring to the exhibit, which type of traffic protection mechanism is used for the LSP?
Which three AS paths match the regular expression? (Choose three.)
You are evaluating a routing policy for an ISP and you find the ^42+ .* (23|9)$ regular expression. Which three AS paths match the regular expression? (Choose three.)
Considering the topology in the exhibit, which statement is true?
Refer to the Exhibit.
R3 and R4 want to establish an EBGP session between each other’s loopback addresses. Static routes have been configured for the loopback addresses and you can ping from loopback to loopback. Their EBGP sessions are configured with multihop to allow for additional hops. The correct AS numbers have been specified at the [routing-options] hierarchy as well. Considering the topology in the exhibit, which statement is true?
What happens to traffic exceeding 100 Mbps?
Refer to the Exhibit.
You manage an MX series router (with 100 ms buffer size per port) that includes the configuration shown in the exhibit. Traffic marked with DSCP 000101 is entering the ge-1/0/4 interface at 102 Mbps. The traffic exits the device on the ge-1/0/5 interface. There is no other traffic transiting the router. What happens to traffic exceeding 100 Mbps?
A route to each loopback address must still be visible in Area 0.Which configuration sample on R3 and R5 will
Referring to the exhibit, which statement is correct?
Which Layer 3 VPN scaling mechanism allows PE3 to begin receiving Customer B routes?
Refer to the Exhibit.
Given the existing operational network shown in the exhibit, you now want to add a remote site for Customer B to the PE3 router. This change should not have an effect on the existing BGP sessions between the PE routers. Which Layer 3 VPN scaling mechanism allows PE3 to begin receiving Customer B routes?
What three solutions can you use to solve this? (Choose three.)
You just added route reflectors to your network and you find that all of your VPN routes are hidden on the route reflectors. What three solutions can you use to solve this? (Choose three.)
Which Layer 2 VPN technology should you propose?
You are asked to design a Layer 2 VPN service between service provider networks that needs Ethernet transport capabilities. The VPN should support two or three endpoints. Which Layer 2 VPN technology should you propose?