[Free] Download New Latest (November) Cisco 400-201 Actual Tests 191-200

Ensurepass

QUESTION 191

Which two routers support cable access? (Choose two.)

 

A.

ME3000

B.

uBR10000

C.

ASR9000

D.

CRS-1

E.

ME3600

F.

uBR7200

Correct Answer: BF

Explanation:

Cisco uBR10000 Series Universal Broadband Routers

Cisco uBR7200 Series Universal Broadband Routers

 

 

QUESTION 192

During the modem boot process, how does the modem acquire the downstream channel?

 

A.

The modem is commanded by the CMTS to set to the specific channel.

B.

The modem uses the default value in the broadcom chipset.

C.

The modem tuner sets a level as defined by the DOCSIS specification.

D.

The modem tuner scans the downstream spectrum until digital QAM modulated signal is encountered

 

Correct Answer: D

 

 

QUESTION 193

Which are three advantages of PPPoA implementation? (Choose three)

 

A.

NAP and NSP provide secure access to corporate gateways without managing end-to- end PVCs. NAP and NSP use Layer 3 routing, Layer 2 Forwarding, or Layer 2 Tunneling Protocol tunnels. Hence, they can scale their business models for selling wholesale service.

B.

The NSP can oversubscribe by deploying idle and session timeouts using an industry standard RADIUS server for each subscriber.

C.

Only a single session per CPE on one virtual channel (VC). The username and password are configured on the CPE, so all users behind the CPE for that particular VC can access only one set of services. Users cannot select different sets of services, although using multiple VCs and establishing different PPP session on different VCs is possible.

D.

If a single IP address is provided to the CPE, and NAT or PA
T is implemented, certain pplications such as IPTV, which embed IP information in the payload, well not work. Additionally, if an IP subnet feature is used, an IP address also has to be reserved for the CPE.

E.

PPPoA can use the features on the Cisco Service Selection Gateway (SSG)

 

Correct Answer: ABE

Explanation:

Advantages:

Per session authentication based on Password Authentication Protocol (PAP) or Challenge Handshake

Authentication Protocol (CHAP). This is the greatest advantage of PPPoA as authentication overcomes the security hole in a bridging architecture.

Per session accounting is possible, which allows the service provider to charge the subscriber based on session time for various services offered. Per session accounting enables a service provider to offer a minimum access level for minimal charge and then charge subscribers for additional services used.

IP address conservation at the CPE. This allows the service provider to assign only one IP address for a CPE, with the CPE configured for network address translation (NAT). All users behind one CPE can use a single IP address to reach different destinations. IP management overhead for the Network Access Provider/Network Services Provider (NAP/NSP) for each individual user is reduced while conserving IP addresses. Additionally, the service provider can provide a small subnet of IP addresses to overcome the limitations of port address translation (PAT) and NAT.

NAPs/NSPs provide secure access to corporate gateways without managing end-to-end PVCs and using Layer 3 routing or Layer 2 Forwarding/Layer 2 Tunneling Protocol (L2F/L2TP) tunnels. Hence, they can scale their business models for selling wholesale services.

Troubleshooting individual subscribers. The NSP can easily identify which subscribers are on or off based on active PPP sessions, rather than troubleshooting entire groups as is the case with bridging architecture. The NSP can oversubscribe by deploying idle and session timeouts using an industry standard Remote Authentication Dial-In User Service (RADIUS) server for each subscriber. Highly scalable as we can terminate a very high number of PPP sessions on an aggregation router. Authentication, authorization, and accounting can be handled for each user using external RADIUS servers. Optimal use of features on the Service Selection Gateway (SSG).

 

Disadvantages:

Only a single session per CPE on one virtual channel (VC). Since the username and password are configured on the CPE, all users behind the CPE for that particular VC can access only one set of services. Users cannot select different sets of services, although using multiple VCs and establishing different PPP sessions on different VCs is possible.

 

Increased complexity of the CPE setup. Help desk personnel at the service provider need to be more knowledgeable. Since the username and password are configured on the CPE, the subscriber or the CPE vendor will need to make setup changes. Using multiple VCs increases configuration complexity. This, however, can be overcome by an autoconfiguration feature which is not yet released.

 

The service provider needs to maintain a database of usernames and passwords for all subscribers. If tunnels or proxy services are used, then the authentication can be done on the basis of the domain name and the user authentication is done at the corporate gateway. This reduces the size of the database that the service provider has to maintain.

 

If a single IP address is provided to the CPE and NAT/PAT is implemented, certain applications such as IPTV, which embed IP information in the payload, will not work. Additionally, if an IP subnet feature is used, an IP address also has to be reserved for the CPE.

 

 

QUESTION 194

In PPPoA architecture, which two methods are most commonly deployed? (Choose two)

 

A.

Terminating PPP sessions at the service provider

B.

PPP framing

C.

PPP multiplexing

D.

GRE tunneling

E.

L2TP tunneling

 

Correct Answer: AE

Explanation:

Reference:

http://www.cisco.com/en/US/tech/tk175/tk819/technologies_white_paper09186a0080093bd2.shtml

 

In PPPoA architectures, the service destination can be reached in different ways. Some of the most commonly deployed methods are:

 

Terminating PPP sessions at the service provider

L2TP Tunneling

Using SSG

 

QUESTION 195

In relation to MPLS Multicast VPN, which three statements about multicast distribution (MDT) groups are true? (Choose three)

 

A.

Default MDT groups are used for PIM control traffic, low-bandwidth sources, and flooding of sparse mode traffic.

B.

MDTs are built in customer networks

C.

Data MDT groups are used for high-bandwidth sources to reduce replication to uninterested PEs.

D.

MDTs are built in provider networks

E.

The number of MDTs depends on PIM modes of MDT groups.

 

Correct Answer: CDE

Explanation:

Default-MDT

Tree created by the MVPN configuration. The Default-MDT is used for customer Control Plane and low rate Data Plane traffic. It connects all of the PE routers with MVRFs in a particular MD and one will exist in every MD whether there is any active source in the respective customer network.

 

 

QUESTION 196

Which statement about the use of Route Target Rewrite is true?

 

A.

It is mainly used in Intra-AS MPLS VPN deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurations.

B.

It is mainly used in Inter-AS MPLS VPN deployments and is configured at the ASBR to avoid misconfiguration of the Route Target assignment for VPN configurations.

C.

It is mainly used in Intra-AS MPLS VPN deployments and is configured at the Router Reflector to avoid misconfiguration in Route Target assignment for VPN configurations

D.

It is mainly used in Inter-AS MPLS VPN deployments and is configured at the Router Reflector to avoid misconfiguration of the Route Target assignment for VPN configurations

E.

It is mainly used in Inter-
AS MPLS VPN deployments and is configured at the PE router to avoid to misconfiguration of the Route Target assignment for VPN configurations

 

Correct Answer: B

Explanation:

The MPLS VPN–Route Target Rewrite feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates. Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets at autonomous system boundaries. Route Reflectors (RRs) and provider edge (PE) routers can also perform route target replacement. The main advantage of the MPLS VPN – Route Target Rewrite feature is that it keeps the administration of routing policy local to the autonomous system.

 

 

 

 

 

 

 

 

 

 

 

 

QUESTION 197

In the Inter-AS VPN deployment shown in the diagram, what is the Next Hop address of MP-IBGP Update for CE4 network received at PE-R2?

 

clip_image001

 

A.

ASBR-2 50.0.0.3

B.

PE-R2 50.0.0.2

C.

PE-R4 50.0.0.4

D.

ASBR-1 50.0.0.1

 

Correct Answer: A

 

 

QUESTION 198

Which two statements about Layer 3 MPLS VPN are true? (Choose two.)

 

A
.

The virtual routing and forwarding table is separate from the global routing table that exists on PE routers.

Routes are injected into the VRF from the CE-PE routing protocols for that VRF and any MP-BGP announcements that match the defined VRF RTs.

B.

Multiprotocol Border Gateway Protocol is run between PE and CE routers to exchange customer prefixes in a VPNv4 format.

C.

A customer edge router peers at Layer 3 to the provider edge. The PE-CE interface runs either a dynamic routing protocol (eBGP, RIPv2, EIGRP, OSPF) or a static routing protocol (Static, Connected).

D.

VPNv4 address is the combination of the RT and customer IPv4 prefix. These VPNv4 prefixes are passed in MP-BGP.

 

Correct Answer: AC

 

 

QUESTION 199

There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packet label stack sequence (from outer to inner) for the VPN traffic on this router?

 

A.

VPN label, IGP label, TE label

B.

TE label, IGP label, VPN label

C.

IGP label, VPN label, TE label

D.

TE label, VPN label, IGP label

E.

IGP label, TE label, VPN label

 

Correct Answer: B

 

 

QUESTION 200

Which three statements about the route target (RT) are true? (Choose three.)

 

A.

The RT is a BGP extended community.

B.

The RT is an 8-byte field that is prefixed to an IPv4 address to make it a unique VPNv4 address.

C.

When a VPN route that is learned from a CE router is injected into BGP, one or more RTs are associated with it

D.

The distribution of VPN routing information is controlled through the use of VPN RTs

E.

When a VPN route that is learned from a CE router is injected into BGP, there is always one RT that is associated with it.

 

Correct Answer: ACD

 

Free VCE & PDF File for Cisco 400-201 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …