Loading questions...
Updated
Refer to the exhibit.
Refer to the exhibit.
An engineer is working to implement segment routing protocol on the customer’s core network. Which step should the engineer take before the segment routing is enabled and is running with BGP?
Refer to the exhibit.
Refer to the exhibit.
Which statement about enabling segment routing for IGPs is true?
Refer to the exhibit.
Refer to the exhibit.
Refer to the exhibit.
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab doses and cannot be reopened.
Create a free account to unlock all questions for this exam.
Log In / Sign UpRefer to the exhibit. The green policy is designed with low delay, and the pink policy is designed with low cost. What is the next hop for node A on its way to node D, with the objective of achieving a low delay?
Refer to the exhibit.
An engineer is troubleshooting IS-IS configuration between two areas. IS-IS Area-A network 30.1.1.0/24 is leaked into IS-IS Area-В. R2 is failing to filter the route updates from network 10.1.1.0/24. Which configuration must the engineer apply to resolve the issue?
CE1 and CE2 are iBGP neighbors in AS 65516. All traffic that exits AS 65516 must use the link from CE1 to PE1. CE1 is advertising a higher local preference to CE2, but traffic from CE2 still prefers the PE2 link. Which action corrects the problem?
Routers R1 and R2 reside in AS 65530, which is multihomed to the Internet. A network engineer expects devices in the AS to use R2 to access the Internet, but they are using R1 as the exit point from the AS. Which action corrects the problem?
Refer to the exhibit. What is the relationship between Router 1 and Router 2?
Refer to the exhibit. Traffic flow from router R1 to router R6 is delay-sensitive. It must consider potential link-failure and node-failure conditions. Which configuration must an engineer apply to router R1 to route traffic to router R6 if router R2 fails?
Refer to the exhibits. A network operator is troubleshooting packet loss seen from the R1 loopback interface to the R2 loopback interface over the core network. The operator is attempting to identify the next leg in the path from PE1. Which interface and label path should the operator investigate next?
An MPLS core network has connectivity issues R4 has failed. It impacts traffic loss between R1 and R8. Customers report no access to their file servers, which delays their transformation work. Which quick action resolves the issue until R4 recovers?
An engineer is troubleshooting connectivity issues on the MPLS core network. A customer connected through R4 cannot reach the OSPF domain on R5. While checking the routing table of R1, the engineer cannot see all the routes from R3 and R5. Which task must the engineer perform so that R4 is able to reach R5?
When implementing SRv6, which SID does R2 propagate into area 0 for the prefix 2001:DB8:1:1/128?
An engineer is configuring service traffic from router R1 to R6 as shown. Which additional configuration must the engineer implement so that the LDP and SR domains will participate and interwork with each other?
VPN users that are connected to PE routers are facing network issues. Traffic that originates from CE1 drops before reaching CE2. An engineer finds no outgoing traffic statistics on PE1 and PE2 routers toward CE devices and finds that the PE1 router is running the older software image. Which action must be implemented to resolve the issues?
Refer to the exhibit. There is a connectivity issue between Customer-1 and Customer-2. File servers between the customers cannot send critical data. R3 routes are missing from the routing table on the Customer-1 router. All interfaces on Customer-1 are up. Which configuration must be applied to router R2 to correct the problem?
Refer to the exhibit. A network engineer configured three new PE routers to expand the network. The new routers run the IS-IS routing protocol and reside in the data center in the same exchange as the existing routers. However, the network is now experiencing suboptimal routing. The Layer 2 configuration and VLANs are configured correctly to provide segregation between networks, but the Level 1 routes are not being converted to Level 2 routes. Which action resolves the issue?
Refer to the exhibit. Company A established BGP sessions with several ISPs. A network engineer at the company must filter out all traffic except for routes that transit AS 152. The engineer configured the filtering policy "permit 152$(_[0-9])" on R1, but after applying the configuration, the engineer notices that other routes are still visible. Which action resolves the issue?
Configure and verify an OSPF neighbor adjacency between R1 and R2 in OSPF area 0 according to the topology to achieve these goals:
Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 1234:56:789 notices that the customer network going through AS30-AS65001-AS65000 is experiencing packet drops when it accesses an application at 172.16.20.1/32 in the DC cloud. The BGP link between AS20 and AS30 is inaccessible because of a fiber cut. Routers RL, RN, and RZ are configured with confederation identifier 10. Which action resolves this issue?
Refer to the exhibit. Routers R2, R3, R4, and R5 all reside in the same area, with R1 in a different area. R3 is overutilized, and the engineer wants to reduce its CPU load. The engineer configured router R4 to summarize routes that it receives from R5, but R3 is still receiving all of the R5 routes. Which action resolves the issue?
Refer to the exhibit. Networks 172.16.31.0/24 and 172.16.30.0/24 are advertised in area 34, and network 172.22.10.0/24 is advertised in area 0. A recent security review discovered that users connected to routers R1 and R2 have been making unauthorized access to an application running on network 172.16.31.0/24. An engineer determined that routers R1 and R2 are receiving updates for network 17.16.31.0/24. Which action resolves the issue?
Refer to the exhibit. A network engineer just replaced five routers on this OSPF network. When the routing protocol is brought up, R5 cannot reach routes that originate on R1. The engineer verified that all connected links have established neighbor relationships. R5 reaches routes originating on R3 and R4. Which action resolves the issue?