CCNPv8 ENCOR ( Version 8.0) – Multicast and QoS Exam Answers
Chapters 13 – 14: Multicast and QoS Exam Answers
1. A BGP routing policy has been created using route maps. The command
route-map TEST permit 10 is part of the configuration. What does the argument 10 indicate?
- It identifies the access list number to be used by the route map statement.
- It identifies the position of the route map in relation to other instances.
- It indicates the local preference to be set for routes that match the route map.
- It indicates the metric to be set for routes that match the route map.
- It specifies the route map to be used on autonomous system 10.
- Sequence number – dictates the processing order of the route map
- Conditional matching criteria – identifies prefix characteristics (network, BGP path attribute, next hop, and so on) for a specific sequence
- Processing action – permits or denies the prefix
- Optional action – allows for manipulations, depending on how the route map is referenced on the router[/alert-success]
2. A network administrator is configuring an ACL to match networks for BGP route filtering. The administrator creates an ACE permit ip 10.0.128.0 0.0.63.0 255.255.255.0 0.0.0.0. Which network matches the ACE?
3. Which DSCP value should be applied to voice traffic?
4. What happens when the memory queue of a device fills up and new network traffic is received?
- The network device sends the received traffic immediately.
- The network device will drop the arriving packets.
- The network device drops all traffic in the queue.
- The network device queues the received traffic while sending previously received trac.
5. Which well-know multicast group is joined by all PIM-enabled routers to receive RP mappings?
6. What is the IP address for the Cisco-RP-announce multicast group?
7. Which two IGMPv3 modes are used to signal membership to a multicast host group? (Choose two.)
8. Which is a characteristic of PIM sparse mode?
- It uses a pruning mechanism to stop the flow of unwanted multicast traffic on interfaces with no downstream neighbors.
- It requires an RP on the network to act as the root of the shared distribution tree.
- It builds the multicast tree by flooding traffic out all interfaces.
- It is designed for networks where receivers are located on every subnet in the network.
9. Which two statements describe IGMP? (Choose two.)
- IGMPv2 supports multicast source filtering.
- IGMPv1 only supports queries sent to a predefined group.
- IGMPv3 provides support for SSM.
- An IGMPv2 router will only allow IGMPv2 hosts to execute a join request.
- Multicast flooding on a LAN segment can be mitigated by using IGMP snooping.
10. The bootstrap router (BSR) mechanism of automating the distribution of rendezvous point (RP) information uses which IP address to disseminate information to all protocol independent multicast (PIM) routers?
11. A network administrator is troubleshooting an IP multicast problem. Where can the administrator view source S, group G, incoming interfaces (IIF), outgoing interfaces (OIFs), and RPF neighbor information for each multicast route?
- in unicast routing table
- in the routing information base
- in the multicast forwarding information base
- in the multicast routing information base
12. A network administrator statically assigns a multicast address of 22.214.171.124 to an application running on a server. The NIC on the server is with the MAC address of AB.54.C1.01.B8.9F. Which Layer 2 multicast address will receivers use on their interfaces in order to receive the multicast feed?
Convert the IP multicast address 126.96.36.199 to binary form, 11101111.11111111.00001000.00000101
Separate the 23 low-order binary bits from the converted address, 1111111.00001000.00000101
Convert these bits to hexadecimal: 7F:08:05
Because the first 24bits of a multicast MAC address are 01.00.5E, The resulting multicast MAC address is then 01:00:5E:7F:08:05.[/alert-success]
13. Which notation is used to refer to the forwarding state in PIM shared trees?
14. Which statement about IGMPv3 is true?
- It sends IGMP query messages with a TTL value of 1 addressed to the all-host group (188.8.131.52).
- It rejects any group-specific query message that is sent from the hosts that want to join a multicast group.
- It enables a multicast receiver to signal to the first hop router the multicast sources from which it expects to receive traffic.
- It does not accept a leave group message from the hosts that have already joined the multicast group.
15. What would be the Tc value in ms for a 1 Gbps interface configured with a policer defined with a CIR of 150 Mbps and a Bc of 12 Mb?
- 10,000 ms
- 1000 ms
- 100 ms
- 10 ms
TC = (15 Mb/150 Mbps) X 1000
Tc = (15,000,000 bits/150,000,000 pbs) X 1000
Tc = 100 ms[/alert-success]
16. What statement describes the Class of Service field?
- It is a Layer 2 field.
- It is a field that is 6 bits long.
- It is a field that is 8 bits long.
- It is a Layer 1 field.
17. An administrator has configured and enabled multicast together with PIM sparse mode on all VLANs on the network. Which feature helps to reduce multicast traffic being broadcast on the access layer switches?
- source registration
- PIM Pruning
- IGMP snooping
- SPT switchover
18. Which statement describes a characteristic of IP multicast routing?
- PIM hello messages are sent every 60 seconds by default out each PIM enabled interface.
- PIM dense mode flood and prune behavior repeats every three minutes.
- PIM sparse mode builds the multicast tree through flooding of traffic out every interface.
- PIM sparse mode and PIM dense mode require an RP on the network.
19. To which multicast group does a candidate RP send announcement messages to advertise its willingness to be an RP?
20. Which two statements about Protocol Independent Multicast (PIM) are true? (Choose two.)
- Three of the forwarding modes for PIM are PIM dense mode (PIM-DM), PIM sparse mode (PIM-SM), and PIM sparse-dense mode.
- PIM is a multicast routing protocol that makes packet-forwarding decisions independent of the unicast IP routing protocol that is running in the network.
- PIM should be configured on the device that hosts the source of the muticast traffic.
- PIM sparse mode is most useful when there are few senders, many receivers, and the volume of multicast traffic is high.
- PIM should be configured only on the first and the last hop routers in the multicast tree.
- PIM does not require an IGP protocol to be configured in the network.
PIM dense mode (PIM-DM)
PIM sparse mode (PIM-SM)
PIM sparse dense Mode
PIM source specific multicast (PIM-SSM)
PIM bidirectional mode (Bidir-PIM)
21. Which nonproprietary mechanism does PIM use to discover and announce RP set information for each group prefix for all the routers in a PIM domain?
- Static RP
22. What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested?
- Data is forwarded along the pathway using IntServ but not provided preferential treatment.
- Data is forwarded along the pathway using DiffServ.
- Data is forwarded along the pathway using a best-effort approach.
- Data is not forwarded along the pathway.
23. Question as presented: Match the state with its marking in a DSCP two token bucket mechanism environment. (Not all options apply.)
24. What two fields are available in IPv4 and IPv6 headers to mark packets for QoS? (Choose two.)
- Traffic Class
- Class of Service
- Type of Service
- VLAN ID
25. Which statement is true about the Single-Rate Two-Color Markers algorithm?
- It uses a two bucket algorithm and traffic can be classified as conforming to, exceeding, or violating the CIR.
- It uses a single token bucket algorithm and traffic can be marked or dropped in both states (conforming to or exceeding the CIR).
- It uses a two bucket algorithm that causes fewer TCP transmissions and is more efficient for bandwidth utilization.
- It uses a single bucket algorithm and uses three colors or states to classify the traffic.
26. Question as presented: Match the queuing algorithm with its description. (Not all options apply.)
27. A network administrator has defined the trust boundary of a network. What is the function of trusted endpoints deployed across the network?
- Trusted endpoints are devices designed to provide network security features.
- Trusted endpoints provide monitoring and logging solutions.
- Trusted endpoints have the ability to mark application traffic.
- Trusted endpoints provide the ability to drop previously marked traffic during congestions.
Wireless access points
Videoconferencing gateways and systems
IP conferencing stations and more[/alert-success]
28. Which is a QoS model that a network engineer would implement to ensure a source to destination quality of service standard for a specified data flow?
- best effort
- low latency queuing
- differentiated services
- class-based weighted fair queuing
- integrated services
29. Which protocol operates at Layer 3 and is used for marking packets?
30. Match the parameter with the correct description. (Not all options apply.)
31. Match the operation to the appropriate QoS model.
32. What is the recommended maximum one-way latency when implementing video over IP for real-time video applications?
- Latency is not a factor for smooth video over IP implementation.
- Latency should be defined for voice traffic only (not for video).
- The recommended maximum one-way latency should not be more than 150 ms.
- When mixed video and voice packets are included in the video stream, the latency should be 300 ms.
33. Which two procedures should be implemented when deploying VoIP in a campus network? (Choose two.)
- voice and data traffic in the same VLAN and mark the traffic for high priority treatment
- a traffic shaping QoS policy to guarantee minimum delay for the voice traffic
- packet marking for voice traffic with a 802.1p CoS value of 5
- priority queuing with voice traffic given the high-priority queue
- a voice class low-latency queuing (LLQ) QoS policy
34. What is the value of the DSCP marker for video traffic on a WLAN?
35. Which statement describes NBAR2?
- NBAR2 can identify a variety of protocols and applications by using up to Layer 6 data.
- NBAR2 supports only scavenger traffic.
- NBAR2 uses MQC to match traffic to specific protocols.
- NBAR2 does not require monthly protocol packs to identify new and emerging applications.
36. Match QoS techniques with the description. (Not all options are used.)