Which three components are included in the Cisco IOS XR infrastructure? (Choose three.)
modular line cards
distributed service cards
1.4. SP high end product 1.4.01. IOS-XR structure Distributed Infrastructure The kernel is replicated across the router infrastructure. The services and client
applications can be distributed across the router infrastructure. The infrastructure includes
route processors (RPs), distributed route processors (DRPs), service processors (SPs), shelf controllers (SCs), modular service cards (MSCs), and line cards (LCs).
Which statement about multicast VPN is true?
The MDT group address should be the same for both address families in the same VRF.
The MDT group address should be the same for both address families in the different VRFs.
Configuration of the MDT source on a pre-VRF basis is supported only on IPv6.
The MDT group address should be different for both address families in the same VRF.
Restrictions for Multicast VPN for Multicast Routing
Configuration of the MDT source on a per-VRF basis is only supported on IPv4. • The MDT group address should be the same for both the address families in the same VRF.
Default-MDTs must have the same group address for all VRFs that comprise a MVPN.
Data-MDTs may have the same group address if PIM-SSM is used. If PIM-SM is used, they must have a different group address, as providing the same one could result in the PE router receiving unwanted traffic. This is a PIM-SM protocol issue, not an implementation issue.
Which three statements about the route target (RT) are true? (Choose three.)
The RT is a BGP extended community.
The RT is an 8-byte field that is prefixed to an IPv4 address to make it a unique VPNv4 address.
When a VPN route that is learned from a CE router is injected into BGP, one or more RTs are associated with it
The distribution of VPN routing information is controlled through the use of VPN RTs
When a VPN route that is learned from a CE router is injected into BGP, there is always one RT that is associated with it.
What is the port number of the IPsec Encapsulating Security Payload packet?
UDP port 50
IP protocol 51
TCP port 51
TCP port 50
IP protocol 50
6.2. Managed Security services traversing the core
AH operates directly on top of IP, using IP protocol number 51. ESP operates directly on top of IP, using IP protocol number 50.
Which statement about VPLS is true?
All CE devices emulate a bridge
All provider devices emulate a bridge
Hierarchical VPLS reduces signaling overhead
Each PE device emulates a bridge
Each CE device emulates a bridge
A hierarchical model can be used to improve the scalability characteristics of VPLS. Hierarchical VPLS (HVPLS) reduces signaling overhead and packet replication requirements for the provider edge.
Which three statements about the secure domain router are true? (Choose three.)
The logical router can span across chassis.
The fabric and system controller module are shared by all logical routers.
Each logical router has a distinct fabric and system controller module
The logical router can share a route processor
The logical router cannot share a route processor.
1.4. SP high end product
1.4.04. Secure domain router (SDR)
In Ethernet Aggregation application which option is needed when the U-PE connects to an N-PE and broadband remote access servers?
Ethernet Multipoint Service (EMS)