You are on page 1of 6

Take Assessment - Module 4 Exam - CCNP: Implementing Secure Converged Wide -area Networks (Version 5.

0)

1 Which Layer 2 VPN model requires a full mesh of VCs betw een customer sites to provide optimum intersite routing?
non-service-provider peer-to-peer VPN

overlay VPNs

MPLS VPN

peer-to-peer VPNs

2 Which three statements about Cisco Express Forwarding (CEF) are true? (Choose three.)
CEF must be running as a prerequisite to running MPLS on a Cisco router.

CEF refers to the Forwarding Information Base (FIB) to make IP destination, prefix -based switching decisions.

The FIB table contains information about the outgoing interface and the corresponding Layer 2 header.

The generation of entries in the Forwarding Information Base (FIB) table is not change-triggered but packet-triggered.

When routing changes occur in the network, the IP routing table is updated, and those changes are reflected in the FIB.
Whenever a router receives a packet that should be CEF -switched but the destination is not in the ARP cache, the packet is
dropped.

3 What is a route distinguisher (RD) used for?


to inform the router about the next hop for the packet

to transform nonunique 32 -bit customer IPv4 addresses into unique 96 -bit VPNv4 addresses

to transform nonunique 32 -bit customer IPv4 addresses into unique 128 -bit VPNv4 addresses
to carry routing updates between core routers

to determine the best path for the packet

to descibe the path attributes

4 Which statement about a label switch r outer (LSR) and the insertion of a frame -mode MPLS label is true?
An LSR inserts a 24-bit MPLS label before the Layer 2 and Layer 3 headers.

An LSR inserts a 24-bit MPLS label between the Layer 2 and Layer 3 headers.

An LSR inserts a 24-bit MPLS label after the Layer 2 and Layer 3 headers.

An LSR inserts a 32-bit MPLS label before the Layer 2 and Layer 3 headers.

An LSR inserts a 32-bit MPLS label between the Layer 2 and Layer 3 headers.

An LSR inserts a 32-bit MPLS label after the Layer 2 and Layer 3 headers.

5 Which Cisco proprietary frame mode MPLS protocol should be used by tag -switching routers to communicate tag binding information to
their peers?
CEF

LDP

TDP

MPLS Tag Mode

MPLSTM

6 Which two steps are required when configuring frame mode MPLS on a Cisco router? (Choose two.)
Decrease the MTU size on all MPLS backbon e interfaces.

Configure MPLS on a frame mode interface.

Disable CEF on all frame mode interfaces.

Enable IP CEF globally.


Enable fast switching on frame mode interfaces.

Refer to the exhibit. Which two options correctly identi fy labels A and B? (Choose two.)
A = control plane

A = data plane

A = routing plane

B = control plane

B = data plane

B = routing plane

8
Refer to the exhibit. Router RTA is an MPLS router in a provider network. On the basis of the information that is provided in the exhib it,
which three statements are true? (Choose three.)
Interface Fa0/0 could establish an MP LS relationship with a Cisco router.

Interface Fa0/0 could establish an MPLS relationship with a non -Cisco router.

Interface Fa0/1 could establish an MPLS relationship with a Cisco router.

Interface Fa0/1 could establish an MPLS relationship with a non -Cisco router.

Interfaces Fa0/0 and Fa0/1 could establish an MPLS relationship with a non -Cisco router.

MPLS is only enabled on Fa0/0.

9 Which three statements are advantages of an overlay VPN m odel? (Choose three.)
The service provider does not participate in customer routing.

The service provider participates in the customer routing.

The customer network and provider network are well -isolated.


Overlay VPN technology is well -known and easy to implement.

Virtual circuits are provisioned manually.

Bandwidth is provisioned on a site -to-site basis.

10 Which two descriptors indicate the functional ity of the MPLS data plane? (Choose two.)
exchanging routing information via dynamic routing protocols

exchanging labels via LDP, BGP, and RSVP

forwarding packets based on labels

forwarding packets based on Layer 3 forwarding information base

referencing a label forwarding information base

building a label forwarding information base

11 What happens to labels within the MPLS network as they travel between c ore routers?
The core routers leave the MPLS label intact with no changes made and forward the packet to the next core router.

The core routers strip the label and forward the pa cket to the next core router.

The core routers swap the value in the label and forward the packet to the next core router.
The core routers insert an additional label and forward the packet to the next core router.

12

Refer to the exhibit. Labels A and B identify the two major VPN implementation models that are us ed to create private networks over the
shared infrastructure of a service provider. Which category set correctly identifies these two models?
A: overlay VPN
B: peer-to-peer VPN
A: overlay VPN
B: virtual private dialup networks (VPDNs)
A: peer-to-peer VPN
B: overlay VPN
A: peer-to-peer VPN
B: virtual private dialup networks (VPDNs)
A: virtual private dialup networks (VPDNs)
B: overlay VPN
A: virtual private dialup networks (VPDNs)
B: peer-to-peer VPN

13 Which three statements are true about forwarding traffic through an MPLS network? (Choose three.)
The ingress Edge LSR references its FIB table to determine which router to fo rward to.

The ingress Edge LSR references its LFIB table to determine which router to forward to.

An LSR references its LFIB table to determine which router to forward to.

An LSR references its routing table to determine which router to forward to.

The egress Edge LSR references its LFIB table to determine which router to forward to.

The egress Edge LSR references its routing table to determine which router to forward to.

14
Refer to the exhibit. Which three statements about IP routing are true? (Choose three.)
The route distinguisher added by the PE is used to identify the VPN.

The route target that is added b y the PE is used to identify VPN membership.

PE and P routers participate in VPN routing.


Only PE routers support VPN routing.

CE routers view P routers as backbone routers.

CE routers view PE routers as other routers in the customer network.

15 Overlay and peer-to-peer VPNs are two types of VPNs. Which statement is true about overlay VPNs and which statement is true about
peer-to-peer VPNs? (Choose two.)
An MPLS VPN is an example of a peer -to-peer VPN.

An MPLS VPN over a generic routing encapsulation (GRE) tunnel is an example of an overlay VPN.

An MPLS VPN over a generic routing encapsulation (GRE) tunnel is an example of a peer-to-peer VPN.

In an overlay VPN, the service provider participates in customer routing.


In an overlay VPN, the service provider infrastructure appears as p oint-to-point links to customer routes.

In a peer-to-peer VPN, the service provider provides virtual point -to-point links.

16 ABC Company has configured a full mesh of GRE tunnels to link remote sites via the Internet. Which two statements correctly d escribe
the site interconnections? (Choose two.)
ABC Company now has a peer-to-peer Layer 3 VPN between sites.

ABC Company now has an overlay Layer 2 VPN between sites.

ABC Company now has an overlay Layer 3 VPN between sites.

All ABC Company subnets will need to be advertised to the Internet to provide Layer 3 connectivity.

This cannot be considered a virtual private network unless IPsec is enabled.


ABC Company routers attached to the Internet can exchange routing updates directly with one another across GRE tunnels.

17 Which three statements about the MPLS architecture are true? (Choose three.)
The control plane controls forwarding based on either destination addresses or labels.

The control plane controls the routing information exchange and the label exchange between adjacent MPLS devices.

The control plane is dependent on the routing protocol.

The data plane controls forwarding based on either destination addresses or labels.

The data plane controls the routing information exchange and the label exchange between adjacent MPLS devices.
The data plane is dependent on the routing protocol.

18

Refer to the exhibit. Which statement is correct about the peer-to-peer VPN model shown?
The model outlines a network that uses tunnels to establish secure communications between Site#1 and Site#2.

The model outlines a network that i nterconnects Site#1 and Site#2 via Frame Relay permanent virtual circuits.
The model outlines a network that allows routers attached to Site#1 and Site#2 to advertise routes across the WAN without rou ters
inside the WAN participating in the routing updates.
The model outlines a network that provides point -to-point links between Site#1 and Site#2 unknown to devices inside the WAN.
The model outlines a network that allows routers attached to Site#1 and Site#2 to advertise private routes across the WAN with
routers inside the WAN participating in the private routing updates.

19 Which MPLS statement is true about connecting an MPLS enabled Cisco router to a non -Cisco MPLS router?
The mpls mtu 1492 interface configuration command is required on t he interface that is facing the non -Cisco MPLS router.

The mpls mtu 1496 interface configuration command is required on the interface that is facing the non -Cisco MPLS router.

The mpls mtu 1512 interface configuration command is required on the interface that is facing the non -Cisco MPLS router.
The mpls label protocol tdp interface configuration command is required on the interface that is f acing the non-Cisco MPLS
router.
The mpls label protocol ldp interface configuration command is required on the interface that is facing the non -Cisco MPLS
router.

You might also like