Nokia 4a0-105 practice test

Nokia Virtual Private LAN Services Exam


Question 1

How does the IEEE 802.1 ag loopback function differently from the loopback feature in 802.3ah?
(Choose 2)

  • A. Theloopbackfuntionin802.1ag is an intrusive test that will stop customer data.
  • B. The loopback function of 802.lag is a non-intrusive "ping" sent from a MEPto a remote MEP or MIP.
  • C. The loopback function in 802.3ah is an intrusive test that will loop customer data.
  • D. The loopback function of 802.lag is an intrusive test that will "loop" all customer data back to the original sender.
Answer:

BC

Discussions
0 / 1000

Question 2

Which element of IEEE 802.1 ag is responsible for initiating CFM messages?

  • A. MEP
  • B. MAP
  • C. MIP
  • D. MUP
Answer:

A

Discussions
0 / 1000

Question 3

In the IEEE 802.1 ag, how are merged services detected?

  • A. The MEP sees the CFM frame from a different MEG.
  • B. The MEP sees a different service-id in the frame sent by a MEP.
  • C. The MIP transmits the service-id for each service. The MIP should only see it's own service-id.
  • D. This is a function of 802,3ah EFM,
Answer:

A

Discussions
0 / 1000

Question 4

Which PDU type is sent periodically over a link in the IEEE 802.3ah EFM as a method of keepalive?

  • A. Event notification.
  • B. Loopback control.
  • C. Information.
  • D. Variable request.
  • E. Variable response.
Answer:

C

Discussions
0 / 1000

Question 5

IEEE 802.3ah is similar to SONET/SDH in that it can count and report bit errors and frame errors.

  • A. TRUE
  • B. FALSE
Answer:

A

Discussions
0 / 1000

Question 6

Which of the following describes the scope of the IEEE 802.3ah EFM standard? (Choose 3)

  • A. Monitor and troubleshoot a point-to-point full-duplex link.
  • B. Monitor and troubleshoot end-to-end services.
  • C. Can be used at the core to trigger MPLS protection mechanisms when a physical failure detection is not possible.
  • D. Should not be used at the core to trigger MPLS protection. BFD is the only method that can be used when physical failure detection is not possible.
  • E. Valuable in the last-mile connection to the Service Provider demarcation device.
Answer:

ACE

Discussions
0 / 1000

Question 7

What is the default remote-age timer of a B-VPLS?

  • A. The same timer is used in all VPLS types,
  • B. Higher than the default timer of an I-VPLS.
  • C. Lower than the default timer of an l-VPLS.
  • D. The same timer as an l-VPLS.
Answer:

C

Discussions
0 / 1000

Question 8

If the max remote-age timer of a B-VPLS is reached, what happens to the remotely learned MAC
addresses in the l-VPLS service?

  • A. There is no effect. The MAC addresses for the l-VPLS age out independently of the aging of B-VPLS addresses.
  • B. The MAC addresses for the l-VPLS will age out immediately following the remote-age out of the backbone-macs of the B-VPLS.
  • C. By default, the remote-age timer of the B-VPLS is configured to 0 and addresses do not age out. The l-VPLS uses its own timer.
  • D. The same timer is used for B-VPLS and l-VPLS addresses on the node.
Answer:

B

Discussions
0 / 1000

Question 9

When a PE node receives a PBB encapsulated frame on a B-VPLS, how does the PE determine which
l-VPLS it belongs to?

  • A. The l-TAG in the l-SID is inspected to determine where the frame should be delivered.
  • B. When the B-MAC header is stripped the customer MAC address is then looked up in the FDB
  • C. The l-SID in the l-TAG is inspected to determine where the frame should be delivered.
  • D. The PE inspects the service label in the MPLS header before stripping the B-MAC header.
Answer:

C

Discussions
0 / 1000

Question 10

Why is MAC explosion a factor to be considered when designing a large VPLS network? (Choose 2)

  • A. The time to relearn thousands of MAC addresses may result in excessive flooding or loss of packets.
  • B. If the FDB reaches the limit, the router will discard frames.
  • C. Discarding frames when the FDB limit is reached could deny SLA guarantees.
  • D. It could take several seconds to relearn thousands of MAC addresses denying QoS/SLA guarantees.
Answer:

AD

Discussions
0 / 1000
To page 2