CCIP Certification Exam Question:

Download Job Interview Questions and Answers PDF

Explain Which three statements about MPLS VPNs are true? (Choose three.)
A. PE routers do not participate in customer routing.
B. MPLS VPN is similar to using the peer-to-peer dedicated PE router approach.
C. Customer can use overlapping addresses.
D. Each customer is assigned an independent routing table (virtual routing and
forwarding table VRF).
E. The P Routers routing table contains both the global IP routes and the customer
routes.
F. CE routers connect directly to the service providers P routers.

CCIP Certification Interview Question
CCIP Certification Interview Question

Answer:

B&C&D:MPLS VPN is similar to using the peer-to-peer dedicated PE router approach./Customer can use overlapping addresses./Each customer is assigned an independent routing table (virtual routing and forwarding table VRF).

Download CCIP Certification Interview Questions And Answers PDF

Previous QuestionNext Question
Explain Which three statements are correct regarding Layer 2 overlay VPNs and peer-to-peer VPNs?

A.Peer-to-peer VPNs require the establishment of virtual circuits to connect the different customer sites
together.
B.Peer-to-peer VPNs require the service provider to participate in the customer routing, accepting
customer routes, transporting them across the service provider backbone, and finally propagating them to
other customer sites.
C.With peer-to-peer VPNs, the service provider is responsible for transport of Layer 2 frames between
customer sites, and the customer takes responsibility for all higher layers.
D.The implementation of Layer 2 overlay VPNs is the traditional switched-WAN model, implemented with
technologies like X.25, Frame Relay or ATM.
E.With Layer 2 overlay VPNs, the service provider is not aware of customer routing and has no
information about customer routes.
F.It is simple to implement Layer 2 overlay VPNs because the Customer Edge (CE) router just needs a
connection to the Service Providers Provider Edge (PE) router.
Suppose After you implement a network scan and view the report, you notice that a
plug-in did not access any of its dependent plug-ins. What did you forget to do?
A. enable the Dependent Plug-in check box on the General Tab form
B. configure dependent plug-in support when you mapped the Nessus scan check to the Nessus plug-in rule
C. install dependent plug-ins when you updated the Cisco NAC Appliance plug-in library
D. load the dependent plug-ins for that plug-in in the Plug-in Updates form