CCNP v8 Exam Answers

CCNPv8 ENCOR (Version 8.0) – Multicast and QoS Exam Answers

Chapters 13 - 14: Multicast and QoS Exam Answers

CCNPv8 ENCOR ( Version 8.0) – Multicast and QoS Exam Answers

Chapters 13 – 14: Multicast and QoS Exam Answers

1. A BGP routing policy has been created using route maps. The command route-map TEST permit 10 is part of the configuration. What does the argument 10 indicate?

  • It identifies the access list number to be used by the route map statement.
  • It identifies the position of the route map in relation to other instances.
  • It indicates the local preference to be set for routes that match the route map.
  • It indicates the metric to be set for routes that match the route map.
  • It specifies the route map to be used on autonomous system 10.
[alert-success]Explanation: A route map uses the command syntax route-map route-map-name [permit | deny][*sequence-number*]. It has four components:

  • Sequence number – dictates the processing order of the route map
  • Conditional matching criteria – identifies prefix characteristics (network, BGP path attribute, next hop, and so on) for a specific sequence
  • Processing action – permits or denies the prefix
  • Optional action – allows for manipulations, depending on how the route map is referenced on the router[/alert-success]

2. A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip Which network matches the ACE?

[alert-success]Explanation: One method for conditional matching of routes in BGP is through extended ACLs. When using extended ACLs for this purpose, the source fields match against the network portion of the route, and the destination fields match against the network mask. The matching networks are through[/alert-success]

3. Which DSCP value should be applied to voice traffic?

  • AF11
  • AF31
  • CS1
  • EF
[alert-success]Explanation: Voice traffic is extremely sensitive to bandwidth delays and jitter and should be marked with Expedited Forwarding (EF) DSCP value to ensure QoS. This marking would give voice traffic a iP equivalent precedence level of 5.[/alert-success]

4. What happens when the memory queue of a device fills up and new network traffic is received?

  • The network device sends the received traffic immediately.
  • The network device will drop the arriving packets.
  • The network device drops all traffic in the queue.
  • The network device queues the received traffic while sending previously received trac.
[alert-success]Explanation: Packets received by a network device experiencing congestion cannot be transmitted until previous packets have been processed. If the queue is full, the network device will begin to drop packets as new traffic arrives.[/alert-success]

5. Which well-know multicast group is joined by all PIM-enabled routers to receive RP mappings?

[alert-success]Explanation: RP mapping agents advertise the RP mappings to the well-known multicast group address, (Cisco-RP-Discovery). Advertisements are sent every 60 seconds by default, or when changes are detected. All PIM-enabled routers join and store the RP mappings in cache.[/alert-success]

6. What is the IP address for the Cisco-RP-announce multicast group?

[alert-success]Explanation: The internet Assigned Numbers authority has assigned two group addresses, and, for Auto-RP configuration in order to announce the RP in the multicast group.[/alert-success]

7. Which two IGMPv3 modes are used to signal membership to a multicast host group? (Choose two.)

  • preclude
  • join
  • include
  • rendezvous
  • exclude
  • leave
[alert-success]Explanation: The two IGMP modes that are used to signal membership are Include mode (the receiver announces membership to a multicast group and provides a include list) and Exclude mode (receiver announces membership to multicast group and provides exclude list).

8. Which is a characteristic of PIM sparse mode?

  • It uses a pruning mechanism to stop the flow of unwanted multicast traffic on interfaces with no downstream neighbors.
  • It requires an RP on the network to act as the root of the shared distribution tree.
  • It builds the multicast tree by flooding traffic out all interfaces.
  • It is designed for networks where receivers are located on every subnet in the network.
[alert-success]Explanation: PIM sparse mode chooses one or more routers to operate as rendezvous points (RPs). An RP is a single common root placed at a chosen point of a shared distribution tree.[/alert-success]

9. Which two statements describe IGMP? (Choose two.)

  • IGMPv2 supports multicast source filtering.
  • IGMPv1 only supports queries sent to a predefined group.
  • IGMPv3 provides support for SSM.
  • An IGMPv2 router will only allow IGMPv2 hosts to execute a join request.
  • Multicast flooding on a LAN segment can be mitigated by using IGMP snooping.
[alert-success]Explanation: IGMPv3 is used to provide source filtering for Source Specific Multicast (SSM). IGMP snooping can be used to mitigate multicast flooding and optimize the forwarding of multicast traffic to interested receivers.[/alert-success]

10. The bootstrap router (BSR) mechanism of automating the distribution of rendezvous point (RP) information uses which IP address to disseminate information to all protocol independent multicast (PIM) routers?

[alert-success]Explanation: BSR (bootstrap router) messages are forwarded out of every PIM-enabled interface and use the all PIM router address with a TTL of 1.

11. A network administrator is troubleshooting an IP multicast problem. Where can the administrator view source S, group G, incoming interfaces (IIF), outgoing interfaces (OIFs), and RPF neighbor information for each multicast route?

  • in unicast routing table
  • in the routing information base
  • in the multicast forwarding information base
  • in the multicast routing information base
[alert-success]Explanation: The multicast routing information base (MRIB) is a topology table that is also known as the multicast route table (mroute). The MRIB is built using PIM and the routing table. It contains the source S, group G, incoming interfaces (IIF), outgoing interfaces (OIFs), and RPF neighbor information for each multicast route as well as other multicast-related information. The command show ip mroute is used to display the full contents of the IP multicast routing table.[/alert-success]

12. A network administrator statically assigns a multicast address of to an application running on a server. The NIC on the server is with the MAC address of AB.54.C1.01.B8.9F. Which Layer 2 multicast address will receivers use on their interfaces in order to receive the multicast feed?

  • 01:00:5E:01:B8:9F
  • AB:54:C1:17:A8:02
  • 01:00:5E:7F:08:05
  • AB:54:C1:7F:08:05
[alert-success]Explanation: When a receiver wants to receive multicast feed from a particular multicast service, it will send a IGMP join message with the multicast IP address of the service and then reprogram the receiver interface with the matching multicast MAC address. To find the matching MAC address, do the following:

Convert the IP multicast address to binary form, 11101111.11111111.00001000.00000101
Separate the 23 low-order binary bits from the converted address, 1111111.00001000.00000101
Convert these bits to hexadecimal: 7F:08:05
Because the first 24bits of a multicast MAC address are 01.00.5E, The resulting multicast MAC address is then 01:00:5E:7F:08:05.[/alert-success]

13. Which notation is used to refer to the forwarding state in PIM shared trees?

  • (*,G)
  • (S,G)
  • (*,S)
  • (G,S)
[alert-success]Explanation: In a shared tree uses a rendezvous point (RP) as the tree root instead of the multicast source. Multicast traffic is forwarded down the shared tree to the group address (G). For this reason the forwarding state is referred to as (*,G).[/alert-success]

14. Which statement about IGMPv3 is true?

  • It sends IGMP query messages with a TTL value of 1 addressed to the all-host group (
  • It rejects any group-specific query message that is sent from the hosts that want to join a multicast group.
  • It enables a multicast receiver to signal to the first hop router the multicast sources from which it expects to receive traffic.
  • It does not accept a leave group message from the hosts that have already joined the multicast group.
[alert-success]Explanation: IGMPv3 is an extension of IGMPv2 with added support for multicast source filtering done through the use of a new message type called Version 3 membership report. It supports applications that explicitly signal sources that want to receive multicast traffic by using the membership report in the Include or Exclude mode.[/alert-success]

15. What would be the Tc value in ms for a 1 Gbps interface configured with a policer defined with a CIR of 150 Mbps and a Bc of 12 Mb?

  • 10,000 ms
  • 1000 ms
  • 100 ms
  • 10 ms
[alert-success]Explanation: The Tc value is calculated by using the formula Bc (bits)/ CIR (bps) X 1000
TC = (15 Mb/150 Mbps) X 1000
Tc = (15,000,000 bits/150,000,000 pbs) X 1000
Tc = 100 ms[/alert-success]

16. What statement describes the Class of Service field?

  • It is a Layer 2 field.
  • It is a field that is 6 bits long.
  • It is a field that is 8 bits long.
  • It is a Layer 1 field.
[alert-success]Explanation: The Class of Service is a 3-bit, Layer 2 field that is used as part of quality of service (QOS) between switches. The CoS is also one of the values used for classification and marking of traffic.[/alert-success]

17. An administrator has configured and enabled multicast together with PIM sparse mode on all VLANs on the network. Which feature helps to reduce multicast traffic being broadcast on the access layer switches?

  • source registration
  • PIM Pruning
  • IGMP snooping
  • SPT switchover
[alert-success]Explanation: IGMP snooping stops multicast traffic from being broadcast on the access layer switches by examining IGMP joins that are sent by receivers and maintaining a table of interfaces to IGMP joins.[/alert-success]

18. Which statement describes a characteristic of IP multicast routing?

  • PIM hello messages are sent every 60 seconds by default out each PIM enabled interface.
  • PIM dense mode flood and prune behavior repeats every three minutes.
  • PIM sparse mode builds the multicast tree through flooding of traffic out every interface.
  • PIM sparse mode and PIM dense mode require an RP on the network.
[alert-success]Explanation: PIM dense mode is used in a multicast group that is densely populated across the network. PIM dense mode (PIM-DM) prunes expire after three minutes. This means that the flood and prune behavior of PIM dense mode repeats every three minutes and should be taken into account when designing a network for PIM-DM. A rendezvous point (RP) is required only in networks running Protocol Independent Multicast sparse mode (PIM-SM).[/alert-success]

19. To which multicast group does a candidate RP send announcement messages to advertise its willingness to be an RP?

[alert-success]Explanation: A C-RP advertises its willingness to be an RP every 60 seconds via RP announcement messages to the reserved well-known multicast group (Cisco-RP-Announce). RP mapping agents join group to receive the RP announcements.[/alert-success]

20. Which two statements about Protocol Independent Multicast (PIM) are true? (Choose two.)

  • Three of the forwarding modes for PIM are PIM dense mode (PIM-DM), PIM sparse mode (PIM-SM), and PIM sparse-dense mode.
  • PIM is a multicast routing protocol that makes packet-forwarding decisions independent of the unicast IP routing protocol that is running in the network.
  • PIM should be configured on the device that hosts the source of the muticast traffic.
  • PIM sparse mode is most useful when there are few senders, many receivers, and the volume of multicast traffic is high.
  • PIM should be configured only on the first and the last hop routers in the multicast tree.
  • PIM does not require an IGP protocol to be configured in the network.
[alert-success]Explanation: PIM is a multicast routing protocol that routes multicast traffic between network segments by creating distribution trees. It makes packet-forwarding decisions independent of the unicast IP routing protocol that is running in the network. There are five operating PIM modes:

PIM dense mode (PIM-DM)

PIM sparse mode (PIM-SM)

PIM sparse dense Mode

PIM source specific multicast (PIM-SSM)

PIM bidirectional mode (Bidir-PIM)

21. Which nonproprietary mechanism does PIM use to discover and announce RP set information for each group prefix for all the routers in a PIM domain?

  • Static RP
  • BSR
  • RPF
  • Auto-RP
[alert-success]Explanation: The bootstrap router (BSR) mechanism is used by PIM to discover and announce RP set information for each group prefix for all the routers in a PIM domain. This mechanism provides a fault-tolerant, automated RP discovery and distribution mechanism.[/alert-success]

22. What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?

  • Data is forwarded along the pathway using IntServ but not provided preferential treatment.
  • Data is forwarded along the pathway using DiffServ.
  • Data is forwarded along the pathway using a best-effort approach.
  • Data is not forwarded along the pathway.
[alert-success]Explanation: When the IntServ QoS model is being used, if network devices along a data path can reserve the required bandwidth, the originating application can begin transmitting. If the requested resource reservation cannot be allocated along the path, the originating application does not send any data.[/alert-success]

23. Question as presented: Match the state with its marking in a DSCP two token bucket mechanism environment. (Not all options apply.)

24. What two fields are available in IPv4 and IPv6 headers to mark packets for QoS? (Choose two.)

  • Traffic Class
  • Class of Service
  • Type of Service
  • Priority
[alert-success]Explanation: IPv4 uses an 8-bit Type of Service field to mark packets at Layer 3 and IPv6 uses an 8-bit Traffic Class field to mark packets at Layer 3. The fields are used by receiving devices to forward the packets based on the appropriate assigned QoS policy.[/alert-success]

25. Which statement is true about the Single-Rate Two-Color Markers algorithm?

  • It uses a two bucket algorithm and traffic can be classified as conforming to, exceeding, or violating the CIR.
  • It uses a single token bucket algorithm and traffic can be marked or dropped in both states (conforming to or exceeding the CIR).
  • It uses a two bucket algorithm that causes fewer TCP transmissions and is more efficient for bandwidth utilization.
  • It uses a single bucket algorithm and uses three colors or states to classify the traffic.
[alert-success]Explanation: The Single-Rate Two-Color Markers use a single token algorithm while the Single-Rate Three-Color markers use the two token bucket algorithm.[/alert-success]

26. Question as presented: Match the queuing algorithm with its description. (Not all options apply.)

27. A network administrator has defined the trust boundary of a network. What is the function of trusted endpoints deployed across the network?

  • Trusted endpoints are devices designed to provide network security features.
  • Trusted endpoints provide monitoring and logging solutions.
  • Trusted endpoints have the ability to mark application traffic.
  • Trusted endpoints provide the ability to drop previously marked traffic during congestions.
[alert-success]Explanation: Trusted endpoints are devices that have the capability to mark application traffic at Layer 2 or Layer 3. Trusted endpoints include the following:
IP phones
Wireless access points
Videoconferencing gateways and systems
IP conferencing stations and more[/alert-success]

28. Which is a QoS model that a network engineer would implement to ensure a source to destination quality of service standard for a specified data flow?

  • best effort
  • low latency queuing
  • differentiated services
  • class-based weighted fair queuing
  • integrated services
[alert-success]Explanation: Best effort is the default packet forwarding design and provides no QoS. The differentiated services model enforces and applies QoS mechanisms on a hop-by-hop basis, not source to destination. Class-based weighted fair queuing and low latency queuing are queuing algorithms.[/alert-success]

29. Which protocol operates at Layer 3 and is used for marking packets?

  • CoS
  • IntServ
  • DSCP
  • QoE
[alert-success]Explanation: The differentiated services code point (DSCP) protocol is used to mark a 6-bit field within the DiffServ field that allows for classification of up to 64 values used for QoS.[/alert-success]

30. Match the parameter with the correct description. (Not all options apply.)

31. Match the operation to the appropriate QoS model.

32. What is the recommended maximum one-way latency when implementing video over IP for real-time video applications?

  • Latency is not a factor for smooth video over IP implementation.
  • Latency should be defined for voice traffic only (not for video).
  • The recommended maximum one-way latency should not be more than 150 ms.
  • When mixed video and voice packets are included in the video stream, the latency should be 300 ms.
[alert-success]Explanation: Because voice traffic is very sensitive to delay and jitter, to avoid packet drops care must taken to be ensure a maximum one-way latency of not more then 150ms.[/alert-success]

33. Which two procedures should be implemented when deploying VoIP in a campus network? (Choose two.)

  • voice and data traffic in the same VLAN and mark the traffic for high priority treatment
  • a traffic shaping QoS policy to guarantee minimum delay for the voice traffic
  • packet marking for voice traffic with a 802.1p CoS value of 5
  • priority queuing with voice traffic given the high-priority queue
  • a voice class low-latency queuing (LLQ) QoS policy
[alert-success]Explanation: Because voice traffic is very sensitive to latency and jitter, it would be better to keep it on a separate vlan and prioritize the traffic using QoS mechanisms. Such actions will ensure that the voice traffic has a dedicated bandwidth that is sufficient to meet its needs and the traffic is marked as priority over any other traffic.[/alert-success]

34. What is the value of the DSCP marker for video traffic on a WLAN?

  • AF41
  • O
  • AF11
  • EF
[alert-success]Explanation: The traffic types and their associated DSCP values in a WLAN are as follows:
Best Effort-O

35. Which statement describes NBAR2?

  • NBAR2 can identify a variety of protocols and applications by using up to Layer 6 data.
  • NBAR2 supports only scavenger traffic.
  • NBAR2 uses MQC to match traffic to specific protocols.
  • NBAR2 does not require monthly protocol packs to identify new and emerging applications.
[alert-success]Explanation: NBAR2 is a deep packet inspection engine that uses Layer 3 through 7 data to identify a variety of protocols. it can operate in either Protocol discovery mode or Modular QoS CLI (MQC) mode.[/alert-success]

36. Match QoS techniques with the description. (Not all options are used.)

Related Articles

Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
Back to top button