Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

4A0-100 Exam Dumps - Nokia Scalable IP Networks

Question # 4

The IANA is responsible for:

A.

Intra-city ISP traffic

B.

Allocation of the global IP address space

C.

Allocating IP addresses for residential customer traffic

D.

Allocating North American IP addresses

Full Access
Question # 5

What is the function of an LSR?

A.

Label Switching Routers make switching decisions based on the original MAC Header.

B.

Label Switching Routers make routing decisions based on the original IP Header.

C.

Label Switching Routers make forwarding decisions based on the MPLS label.

D.

Label Switching Routers make decisions based on ATM header information.

Full Access
Question # 6

How do protocols such as ATM and Frame-Relay support differentiating multiple customers or traffic types on the same physical wire?

A.

ATM and Frame-Relay are circuit switched protocols and use Virtual Circuits to create logical separation of traffic.

B.

ATM and Frame-Relay are point-to-point protocols and do not support different customers or traffic type on the same physical wire.

C.

ATM and Frame-Relay are circuit switched protocols and use VLAN's to create logical separation of traffic.

D.

ATM and Frame-Relay are circuit switched protocols and use IP Header information to create logical separation of traffic.

Full Access
Question # 7

Which of the following statements is TRUE regarding IP addressing?

A.

Classful IP addressing provides hierarchy based on variable subnet masks.

B.

Classless IP addresses provide hierarchy based on a variable length subnet mask.

C.

Classless IP addresses provide hierarchy based on fixed subnet masks of /24. /16 and/8.

D.

IP addresses provide hierarchy based on the country code and regional identifier.

Full Access
Question # 8

In the diagram, what type of BGP session is established between the routers of AS 65001 and AS 2002?

A.

IGP

B.

IBGP

C.

EBGP

D.

EGP

E.

BGP cannot be run between routers in different ASs.

Full Access
Question # 9

What distance is supported using CAT-5 cabling for 10/100/1000 TX?

A.

100 m.

B.

500 m.

C.

1 Km.

D.

10 Km.

Full Access
Question # 10

Which of the following are FALSE statements about the OSPF routing protocol? (Choose two.)

A.

OSPF is a link state protocol with fast convergence.

B.

OSPF supports hierarchy with multiple areas.

C.

The default metric for OSPF is hop count.

D.

OSPF does not support VLSM.

E.

OSPF supports neighbor authentication.

Full Access
Question # 11

Which statement best describes how the internet evolved?

A.

The internet emerged in the commercial world in the 1980’s following the US military’s adoption of TCP/IP in 1983.

B.

The internet evolved from a military to a research to a commercial based network.

C.

The internet remained primarily a research based network and was only commercially adopted in 2000 when the world wide web was conceived.

D.

Internet service providers provided the services necessary for military based networks to evolve into research and education based networks.

Full Access
Question # 12

Which of the following statements is TRUE about ICMP?

A.

An IP datagram is encapsulated within an ICMP header.

B.

ICMP messages can only be generated by routers.

C.

ICMP messages are encapsulated within an IP datagram.

D.

ICMP guarantees delivery of a message.

Full Access
Question # 13

What is available for auto completion of commands within the CLI on the Nokia 7750 SR Service Router?

A.

Type the first letters of the command, then press Ctrl C

B.

Type the first letters of the command, then press Esc

C.

Type the first letters of the command, then press Tab

D.

Type the first letters of the command, then type ?

Full Access
Question # 14

What happens next after an incoming packet is de-encapsulated from the Layer 2 frame in an Nokia 7750 router?

A.

The IP datagram is encapsulated in the appropriate Layer 2 frame by the MDA.

B.

The IP datagram passes through the switch fabric to reach the egress IOM.

C.

The IP datagram is passed to the IOM.

D.

A lookup is performed in the FIB to determine the egress interface.

Full Access
Question # 15

Which field in the Routing Information Base (RIB) determines the direction frames will egress the node?

A.

Preference

B.

Metric

C.

Dest prefix

D.

Next-hop

E.

Cost

Full Access
Question # 16

What is the purpose of TCP flow control?

A.

It restricts the sender from sending too much data when there is congestion in the network.

B.

It allows the receiver to control the rate at which the sender transmits data.

C.

It forces the sender to send only one segment at a time.

D.

It allows the receiver to drop segments without the sender having to retransmit.

Full Access
Question # 17

What are the tasks of a Routing Table Manager (RTM)? (Choose two.)

A.

To select the best route from among multiple routing protocols.

B.

To select the best route using the metric as criteria.

C.

To send its best route to all its directly connected neighbors.

D.

To install its best route in the routing table.

Full Access
Question # 18

Which statement best describes a SAP?

A.

The Service ATM Point is used for ATM connections to a PE.

B.

The Service Access Point is defined on the PE device and is the customers access to the service.

C.

The Service Access Point is defined on the P device and is the customers access to the service.

D.

The Service Access Point is defined on the CE device and is the customers access to the service.

Full Access
Question # 19

Which application below would be likely to use UDP?

A.

Real-time audio application such as VoIP.

B.

Web browser.

C.

Email application.

D.

Telnet.

Full Access
Question # 20

Which of the following SAP types can be associated to a VPWS? (Choose three.)

A.

Ethernet

B.

ATM

C.

Token Ring

D.

Frame Relay

Full Access
Question # 21

Which of the following are considered Virtual Private Networks? Choose all that apply.

A.

IES

B.

VPWS

C.

VPLS

D.

VPRN

Full Access
Question # 22

Which of the following protocols belongs to the OSI suite of protocols? (Choose two.)

A.

OSPF

B.

BGP

C.

X.500

D.

IS-IS

E.

Ethernet

Full Access
Question # 23

Which of the following is TRUE regarding Ethernet half-duplex transmission?

A.

Half-duplex transmission is less efficient because the frame MTU is smaller.

B.

An end-station connected to a hub will always be half-duplex.

C.

Ethernet switches only support half-duplex transmission.

D.

All of the above.

Full Access
Question # 24

Which of the following statements BEST describes the purpose of UDP (Select two)?

A.

Provide a connectionless delivery service.

B.

Provide a connection oriented delivery service.

C.

Provide an unreliable transmission service.

D.

Provide a reliable transmission service.

Full Access
Question # 25

Which of the following is NOT a function of TCP?

A.

Maintaining the ordering of data transmitted across the network.

B.

Ensuring the reliable transmission of data across the network.

C.

Providing the receiver with a flow control mechanism.

D.

Defining the method for routing data across the network.

Full Access
Question # 26

A network with address 208.40.224.0/24 is divided into /28 subnets. What is the network address of the third subnet?

A.

208.40.224.16/28

B.

208.40.224.32/28

C.

208.40.224.48/28

D.

208.40.224.64/28

Full Access
Question # 27

Which compact flash on a Control/Switch processor on a Nokia 7750 SR stores the runtime image and the running configuration?

A.

SF 1

B.

SF 2

C.

SF 3

D.

Both CF1 and CF2

Full Access
Question # 28

What does a VPLS solution look like from a customers perspective?

A.

To the customer, it appears as if all sites are directly connected by a single cable.

B.

To the customer, it appears as if all sites are connected through a single switched LAN.

C.

To the customer, it appears as if all sites are connected through a single router.

D.

To the customer, it appears as if all sites are connected through a series of private point-to-point connections.

Full Access
Question # 29

The statement below describes which of the following activities?

"A set of tasks that moves a packet from its entry into an IP network to its exit from the IP network."

A.

IP forwarding

B.

IP decapsulation

C.

IP encapsulation

D.

IP tunneling

Full Access
Question # 30

Which of the following statements about router R3 is TRUE?

A.

Router R3 is the iLER for LSP B.

B.

Router R3 is the eLER for LSP A.

C.

Router R is an LSR for both LSP A and LSP B.

D.

Router R3 is LSR for LSP A and an LER for LSP B.

Full Access
Question # 31

Which of the following statements about router interfaces on a Nokia 7750 SR is FALSE?

A.

They can be used by routers to interconnect subnets.

B.

They can be used in pairs on the same subnet for redundancy.

C.

They can be logical or physical.

D.

The system interface exists by default.

Full Access
Question # 32

Which of the following is IANA responsible for?

A.

The allocation of enterprise IP address space

B.

The allocation of residential IP address space

C.

The allocation of global IP address space

D.

The allocation of North American IP address space

Full Access
Question # 33

Which of the following statements are TRUE about the Nokia SR 7750? (Choose two.)

A.

It can boot without a compact flash in the CF3 slot.

B.

It cannot boot without a compact flash in the CF3 slot.

C.

It can operate without a compact flash in the CF3 slot once it has booted.

D.

It cannot operate without a compact flash in the CF3 slot once it has booted.

Full Access
Question # 34

What happens when a switch receives an Ethernet frame with unknown source and destination MAC

addresses?

A.

The frame is silently discarded.

B.

The source MAC address is saved in the MAC FDB, and the frame is discarded.

C.

The source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the

receiving port.

D.

The source and destination MAC addresses are saved in the MAC FDB, and the frame is flooded to all

ports.

Full Access
Question # 35

Which of the following statements about IP addressing is TRUE?

A.

IP addresses are assigned by IEEE to vendors.

B.

Classless IP addresses provide hierarchy based on a variable length subnet mask.

C.

Classless IP addresses provide hierarchy based on fixed subnet masks of /24, /16, and /8.

D.

IP addresses provide hierarchy based on the country code and regional identifier.

Full Access
Question # 36

Which Ethernet frame field does the receiver use to verify the integrity of the received bits?

A.

Destination address

B.

Frame check sequence

C.

Preamble

D.

Length field

Full Access
Question # 37

Which organization eventually became the standards body for IP and related protocols?

A.

IEEE

B.

IETF

C.

NSFNET

D.

ITU-T

E.

APNIC

Full Access
Question # 38

Which of the following is a characteristic of ATM?

A.

Application data is transported in 53-byte cells.

B.

ATM circuits are identified by a VPI/VCI value.

C.

Provides enhanced QoS support with 5 classes of service.

D.

Ideal for multiple services on the same physical line.

E.

All of the above.

F.

None of the above

Full Access
Question # 39

What is the sequence of events for a client to receive an IP address from the server in the DHCP?

A.

Discover, offer, request, acknowledgement.

B.

Request, offer, discover, acknowledgement.

C.

Discover, request, offer, acknowledgement.

D.

Request, acknowledgement, discover, offer.

Full Access
Question # 40

Complete the following sentence: The introduction of the subnet address added another:

A.

Layer of hierarchy in the addressing structure.

B.

Class to the classful addressing system.

C.

16-bit number to accompany the IP address.

D.

4,294,967,296 addresses to the IP address space.

Full Access
Question # 41

What information is used to separate VLANs on a VLAN trunk that connects multiple VLANs?

A.

VLAN tag.

B.

IP Header.

C.

FCS.

D.

Priority Value.

Full Access
Question # 42

What problems was Spanning Tree Protocol (STP) primarily designed to solve? (Choose two.):

A.

Providing path redundancy.

B.

Preventing loops.

C.

Handling collisions.

D.

Allowing flooding of multicast traffic.

Full Access
Question # 43

Which of the following is a function of the Link layer?

A.

It is responsible for encapsulating packets into frames for transmission on physical media

B.

It is responsible for encapsulating packets into IP datagrams and routing them

C.

It is responsible for encapsulating application data into TCP/UDP messages

D.

It is responsible for the timing of the signals on physical media.

Full Access
Question # 44

How does address summarization reduce the routing table size?

A.

By allowing a block of routes to be represented by one route.

B.

By only keeping best routes in the routing table.

C.

By rejecting duplicate route advertisements.

D.

By not advertising directly connected routes.

Full Access
Question # 45

Which of the following statements about SDPs is FALSE?

A.

The same SDP ID can be used on multiple routers.

B.

Each service requires a unique SDP.

C.

SDPs are not configured on P routers.

D.

SDPs are not configured on CE devices.

Full Access
Question # 46

Which of the following statements best describe the purpose of UDP? (Choose two.)

A.

Provides a connectionless delivery service.

B.

Provides a connection oriented delivery service

C.

Provides an unreliable transmission service,

D.

Provides a reliable transmission service.

Full Access
Question # 47

Which of the following is TRUE about a PE router within a service provider’s MPLS network?

A.

It resides on the customer premises.

B.

It is not aware of the VPN services provided by the service provider.

C.

It should connect to at least one other PE router.

D.

It should connect to at least one CE device.

Full Access
Question # 48

What is the function of Layer 2?

A.

Layer 2 is responsible for encapsulating packets into frames for transmission on physical media.

B.

Layer 2 is responsible for encapsulating packets into IP datagrams and routing them.

C.

Layer 2 is responsible for encapsulating application data into TCP/UDP messages.

D.

Layer 2 is responsible for the timing of the signals on physical media.

Full Access
Question # 49

Which of the following enables service providers to support multiple customers with the same VLAN ID over the same backbone?

A.

VLAN Trunking

B.

VLAN Stacking

C.

VLAN Tagging

D.

VLAN Routing

Full Access
Question # 50

Which of the following describes a default route?

A.

It is used when forwarding control plane data to the local CPM.

B.

It is used when there is no other known route for a given packet’s destination.

C.

It matches a specific /32 host address with the least cost to the destination.

D.

It is used when forwarding multicast and broadcast packets.

Full Access
Question # 51

Which of the following is NOT a characteristic of the Internet protocol layer?

A.

It provides a unique addressing scheme to identify hosts.

B.

It provides a user interface to the network.

C.

It uses routing protocols for path determination.

D.

It provides end-to-end forwarding of datagrams.

Full Access
Question # 52

Which of the following is TRUE regarding routers R2 and R3 in the pictured MPLS network?

A.

Router R2 pushes labels for LSP A, and R3 swaps labels for LSP A.

B.

Router R2 swaps labels for LSP A, and R3 pops labels for LSP A.

C.

Router R2 and R3 swap labels for LSP A and LSP B.

D.

Router R2 and R3 push labels for LSP A and LSP B, respectively.

Full Access