which three statements are correct regarding the BGP routing updates?

Referring to the topology diagram show in the exhibit,

which three statements are correct regarding the BGP routing updates? (Choose three.)

Referring to the topology diagram show in the exhibit,

which three statements are correct regarding the BGP routing updates? (Choose three.)

A.
The EBGP routing updates received by R1 from R5 will be propagated to the R2, R4, and
R7 routers

B.
The EBGP routing updates received by R3 from R6 will be propagated to the R2 and R4
routers

C.
The EBGP routing updates received by R1 from R5 will be propagated to the R2 and R4
routers

D.
The IBGP routing updates received by R3 from R2 will be propagated to the R6 router

E.
The IBGP routing updates received by R2 from R1 will be propagated to the R3 router

F.
The IBGP routing updates received by R1 from R4 will be propagated to the R5, R7, and
R2 routers



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Banddy

Banddy

Hi guys, passed 642-885 exam two day ago! Not easy! So many new questions! some new questions i got in my test:
QUESTION
When a BGP route reflector receives an IBGP update from a non-client IBGP peer, the route
reflector will then forward the IBGP updates to which other router(s)?
A. To the other clients only
B. To the EBGP peers only
C. To the EBGP peers and other clients only
D. To the EBGP peers and other clients and non-clients
Answer: C

QUESTION
Which two BGP mechanisms are used to prevent routing loops when using a design with
redundant route reflectors? (Choose two.)
A. Cluster-list
B. AS-Path
C. Originator ID
D. Community
E. Origin
Answer: AC

QUESTION
Which two statements correctly describe the BGP ttl-security feature? (Choose two.)
A. This feature protects the BGP processes from CPU utilization-based attacks from EBGP neighbors
which can be multiple hops away
B. This feature prevents IBGP sessions with non-directly connected IBGP neighbors
C. This feature will cause the EBGP updates from the router to be sent using a TTL of 1
D. This feature needs to be configured on each participating BGP router
E. This feature is used together with the ebgp-multihop command
Answer: AD

QUESTION
When implementing source-based remote-triggered black hole filtering, which two configurations
are required on the edge routers that are not the signaling router? (Choose two.)
A. A static route to a prefix that is not used in the network with a next hop set to the Null0 interface
B. A static route pointing to the IP address of the attacker
C. uRPF on all external facing interfaces at the edge routers
D. Redistribution into BGP of the static route that points to the IP address of the attacker
E. A route policy to set the redistributed static routes with the no-export BGP community
Answer: AC

QUESTION
In Cisco IOS-XR, the maximum-prefix command, to control the number of prefixes that can be
installed from a BGP neighbor, is configured under which configuration mode?
A. RP/0/RSP0/CPU0:P2(config-bgp)#
B. RP/0/RSP0/CPU0:P2(config-bgp-af)#
C. RP/0/RSP0/CPU0:P2(config-bgp-nbr)#
D. RP/0/RSP0/CPU0:P2(config-bgp-nbr-af)#
Answer: D

I studied 2017 Latest 143Q&As pdf and vce dumps: https://www.braindump2go.com/642-885.html , you also can have a try, most of new questions are from this file.