Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-515 Implementing Cisco Service Provider VPN Services (300-515 SPVI) Exam Practice Test

Page: 1 / 7
Total 71 questions

Implementing Cisco Service Provider VPN Services (300-515 SPVI) Questions and Answers

Question 1

How do Ethernet virtual circuits provide a way for service providers to maximize the use of VLAN tags'-1

Options:

A.

They add an additional tag to VLANs that allows up to two switch ports to use the same globally configured VLAN ID.

B.

They redefine the VLAN tag to include classification, forwarding, and QoS using MPLS labels and EXP bits

C.

They separate the classification and forwarding concepts for VLAN tagging which allows multiple switch ports to use the same VLAN ID without it being configured globally.

D.

They assign VLAN IDs to VTP domains so that the same VLAN ID are used more than once globally.

Question 2

Refer to the exhibit.

Question # 2

Refer to the exhibit Router 1 is a P router in the ISP MPLS core A connected P router cannot generate an MPLS label for the router 1 loopback0 interface Which action resolves this issue?

Options:

A.

The loopback0 interface must be in OSPF area 0.

B.

The network statement under the routing process must have a wildcard mask of 0 0.0 255.

C.

The OSPF network type must be changed on loopback0 to point-to-point

D.

A static route to null 0 must be added for the loopback interface and then static routes must be redistributed into OSPF

Question 3

How do PE routers exchange CE routes between remote sites?

Options:

A.

by converting CE routes into VPNv4 routes and exchanging them using MP-BGP

B.

by establishing BGP neighbor relationships between all connected CEs to exchange routing information

C.

by learning IPv4 routes from connected CEs and redistributing them into the global IGP

D.

by converting CE routes into VPNv4 routes and exchanging them using the global IGP

Question 4

An engineer is troubleshooting AToM on an IOS XE router and receives an error when creating the xconnect. Which command does he need to complete to create the xconnect in AToM?

Options:

A.

encapsulation mpls

B.

encapsulation 12tpv3

C.

protocol 12tpv3

D.

protocol none

Question 5

While troubleshooting an AToM L2VPN service, a network consultant notices that the AC Layer 2 encapsulations are different. Which action should the consultant take in order to make the MPLS L2VPN work?

Options:

A.

tag-rewrite on the ingress and egress PE router

B.

interworking IP configuration on the last PE router before label disposition

C.

nonrouted interworking setup to properly translate only the Layer 2 information from the AC

D.

interworking IP configuration on both the AC terminations on the PEs

Question 6

A network architect is troubleshooting the L2TPv3 tunneling security due to the untrusted nature of the underlaying network. Which two L2TPv3 features does the architect deploy to address the ongoing issues? (Choose two.)

Options:

A.

TCP MD5 authentication

B.

control message hashing

C.

CHAP authentication

D.

control message rate limiting

E.

asymmetric mutual authentication with PSK

Question 7

In an Ethernet Virtual Circuit environment, which restriction do bridge domains have when STP is running?

Options:

A.

The STP mode must be RSTP or PVST+

B.

Bridge domains must be mapped to a different VLAN.

C.

The STP mode must be MSTP

D.

Bridge domains must belong to different MST instances.

Question 8

Which two statements describe primary differences between MPLS Layer 2 and Layer 3 VPNs? (Choose two.)

Options:

A.

Layer 2 VPNs use IPsec tunneling, but Layer 3 VPNs use L2TPv3 tunneling.

B.

Layer 2 VPNs use AToM, but Layer 3 VPNs use MPLS/BGP.

C.

Layer 2 VPNs use BGP, but Layer 3 VPNs use VPLS.

D.

Layer 2 VPNs use L2TPv3 tunneling, but Layer 3 VPNs use GRE tunneling.

E.

Layer 2 VPNs use IPsec tunneling, but Layer 3 VPNs use pseudowires to provide tunneling.

Question 9

Which two are characteristics of using a non-MPLS peer-to-peer model over a traditional overlay model? (Choose two.)

Options:

A.

The model is suited for nonredundant configurations.

B.

The configuration on a newly added site PE is updated automatically.

C.

Provider routers know the customer network topology.

D.

The customer specifies the exact site-to-site traffic profile.

E.

Routing information is exchanged between the customer router and one or a few PEs.

Question 10

Which condition must be met before an environment can support CSC?

Options:

A.

The CSC-PE and CSC-CE must each be able to ping an interface in its respective global routing table.

B.

The CSC-PE and the CSC-CE must support IPv6.

C.

The CSC-PE and CSC-CE devices must be able to send labels to one another using BGP.

D.

The CSC-CE must support OSPFv3.

Page: 1 / 7
Total 71 questions