Category: 642-885 Real Dumps

642-885 Realdumps

Preparing Cisco 642-885 exam is not difficult now. You can prepare from Cisco 642-885 Books or 642-885 dumps. Here we have mentioned some sample questions. You can use our free 642-885 study material notes for test preparation. Latest 642-885 study material available.


642-885 Dumps

Preparing Cisco 642-885 exam is not a big deal now with our 642-885 braindumps. You can prepare from officially recommended Cisco 642-885 Books or 642-885 dumps. Here at Cisexams.com, we have mentioned some free 642-885 Questions Answers. You can use our free Cisco 642-885 Study Material to get an idea about the quality and validity of this resource. Our Cisco 642-885 PDF and 642-885 dumps practice tests have helped thousands of candidates from all around the world to get their desired certification. Latest 642-885 Real Exam Questions are available with 100% money back guarantee. You have nothing to lose now!!!

642-885 | Which two statements correctly describe…

Question: 6

Which two statements correctly describe the BGP ttl-security feature? (Choose two.)

A. This feature protects the BGP processes from CPU utilization-based attacks from EBGP neighbors which can be multiple hops away
B. This feature prevents IBGP sessions with non-directly connected IBGP neighbors
C. This feature will cause the EBGP updates from the router to be sent using a TTL of 1
D. This feature needs to be configured on each participating BGP router
E. This feature is used together with the ebgp-multihop command

Answer: A,D

642-885|In Cisco IOS-XR, the ttl-security

Question No : 5

In Cisco IOS-XR, the ttl-security command is configured under which configuration mode?

A. RP/0/RSP0/CPU0:P2(config)#
B. RP/0/RSP0/CPU0:P2(config-bgp)#
C. RP/0/RSP0/CPU0:P2(config-bgp-nbr)#
D. RP/0/RSP0/CPU0:P2(config-bgp-af)#
E. RP/0/RSP0/CPU0:P2(config-bgp-nbr-af)#

Answer: C

642-885 | When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router?

Question No : 4

When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.)

A. A static route to a prefix that is not used in the network with a next hop set to the Null0 interface
B. A static route pointing to the IP address of the attacker
C. uRPF on all external facing interfaces at the edge routers
D. Redistribution into BGP of the static route that points to the IP address of the attacker
E. A route policy to set the redistributed static routes with the no-export BGP community

Answer : A,C

642-885 | Which two statements correctly describe the BGP ttl-security feature?

Question No : 3 

Which two statements correctly describe the BGP ttl-security feature? (Choose two.)

A. This feature protects the BGP processes from CPU utilization-based attacks from EBGP neighbors which can be multiple hops away
B. This feature prevents IBGP sessions with non-directly connected IBGP neighbors
C. This feature will cause the EBGP updates from the router to be sent using a TTL of 1
D. This feature needs to be configured on each participating BGP router
E. This feature is used together with the ebgp-multihop command

Answer : A,D

642-885 | When a BGP route reflector receives an IBGP update from a non-client IBGP peer, the route reflector will then forward the IBGP updates to which other router(s)?

Question No : 1

When a BGP route reflector receives an IBGP update from a non-client IBGP peer, the route reflector will then forward the IBGP updates to which other router(s)?

A. To the other clients only
B. To the EBGP peers only
C. To the EBGP peers and other clients only
D. To the EBGP peers and other clients and non-clients

Answer : C