Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Nokia 4A0-C01 - Nokia NRS II Composite Exam

Page: 13 / 13
Total 852 questions

Which of the following about Fast Reroute node protection tunnels is FALSE?

A.

Node protection tunnels detour around a failed next downstream router.

B.

Node protection tunnels can only be requested for a primary LSP path.

C.

Node protection tunnels are only used by one-to-one Fast Reroute.

D.

Link protection tunnels are established if a router is unable to establish node protection tunnels.

Which of the following statements is FALSE regarding 6VPE?

A.

Multiple MP-BGP sessions are required to carry VPN-IPv4 and VPN-IPv6 routes.

B.

PE routers must support both IPv4 and IPv6 addresses; customer routers can use either one

C.

In 6VPE, MP-BGP is used to advertise IPv6 prefixes and the associated VPRN label.

D.

In 6VPE, the provider core routers are IPv6-unaware.

E.

All of the above statements are true.

F.

All of the above statements are false.

Click on the exhibit.

An LDP tunnel is established on R1-R2-R4-R6 because the link between routers R3 and R6 is down. With the LDP-IGP Sync feature enabled, what happens immediately after the link is restored?

A.

A new LDP session is established on R1-R3-R6 as soon as the FIB is updated.

B.

The LDP session remains unchanged until the existing path R1-R2-R4-R6 goes down.

C.

A new LDP session is established on R1-R3-R6 as soon as router R1 receives a new label for router R6.

D.

The LDP session remains unchanged until router R3 stops advertising the maximum metric for the link to router R6.

Which of the following about IS-IS Traffic Engineering on an Alcatel-Lucent 7750 SR is FALSE?

A.

Traffic engineering information is carried in the extended TLVs.

B.

Traffic engineering must be enabled on all IP/MPLS routers along the LSP path.

C.

Traffic engineering information is stored in the opaque database,

D.

Traffic engineering is required for constraint-based LSPs.

Which of the following statements best describes a route target?

A.

A route target is a BGP extended community used to identify the VRF table for a prefix at the receiving PE

B.

A route target is a mechanism from which VPRN controls the distribution of VPN routing information.

C.

Route target attributes are earned in a MP-BGP as attributes of the route.

D.

A route target is used by the PE router to identify the VRF that a VPN-lPv4 prefix is associated with.

E.

All of the above statements describe a route target

F.

None of the above statements describe a route target

Epipe services do no consume any MAC resources because MAC learning is disabled.

A.

TRUE

B.

FALSE

Click on the exhibit.

When router R1 forwards a PATH message to router R2, which of the following about the PATH message's IP header is TRUE?

A.

The options field is set to router alert.

B.

The source address is R1's egress interface address.

C.

The destination address is R2's ingress interface address.

D.

The HOP object includes R2's system address.

What is a key benefit of a VPLS service?

A.

The customer maintains complete control over routing.

B.

The adding of new sites is simplified; no re-configuration is required at existing sites.

C.

The clear demarcation of functionality between service provider and customer makes troubleshooting easier.

D.

All of the above.

What can the sdp-ping command be used for? (Choose 2)

A.

To test the ability of reaching the far-end IP address of an SDP within the SDP encapsulation

B.

To determine the path MTU to the far-end IP address over an SDP.

C.

To determine the service MTU of the service using an SDP.

D.

To determine the presence of hosts using the service

Which of the following most accurately describes the default behavior of a VPLS regarding the handling of a tagged frame at the ingress of SAP 1/1/1:100?

A.

The FCS is verified and the customer frame is transported intact over the service provider network.

B.

The FCS is verified and kept in the customer frame. The VLAN tag is removed for transport over the network.

C.

The FCS is verified and removed from the frame. The VLAN tag is kept for transport over the network.

D.

The FCS is verified and removed from the frame. The VLAN tag is removed for transport over the network.

Which of the following about Fast Reroute link protection tunnels is FALSE?

A.

Link protection tunnels are established if a router is unable to establish node protection tunnels.

B.

Link protection tunnels are only requested for a primary LSP path.

C.

Link protection tunnels can be created for both one-to-one or facility Fast Reroute.

D.

Link protection tunnels detour around a failed next downstream router.

Which LSA type is used for OSPF-TE?

A.

Type 8 LSA — Link Local LSA

B.

Type 9 LSA — Link local Opaque LSA

C.

Type 10 LSA — Area local Opaque LSA

D.

Type 11 LSA —AS Opaque LSA

Which of the following statements best describes the flooding of traffic on a PE when traffic is received on a SAP?

A.

Traffic is flooded to all SAPs in the service.

B.

Traffic is flooded to all SAPs and spoke SDPs in the service.

C.

Traffic is flooded to all SAPs and mesh SDPs in the service.

D.

Traffic is flooded to all SAPs, spoke SDPs, and mesh SDPs in the service.

E.

The traffic is not flooded.

Which of the following commands is used in an RSVP signaled MPLS tunnel to validate the path MTU based on signaling across the LSP?

A.

Path MTU is always calculated from the MTU of the egress network port on the head end PE.

B.

oam sdp-mtu

C.

adspec

D.

cspf

Which of the following defines a SAP that will select frames with an outer tag of '4' and ignore any inner lag on a Q-in-Q encapsulated port?

A.

sap 1/1/1:0.*

B.

sap 1/1/1

C.

sap 1/1/1:*.4

D.

sap 1/1/1:4.*