Pass the Nokia SRC Certification 4A0-107 Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following statements about the token buckets of a policer is FALSE?

Options:

A.

The CIR has no influence on the forwarding rate of the policer traffic.


B.

The CIR influences whether a packet is considered high-profile or low-profile.


C.

The policer discards all incoming packets when PIR bucket reaches the MBS level.


D.

PIR bucket forwards packets that arrive with rates above PIR as out-of-profile.


Questions # 52:

WRED can be used to help avoid TCP slow-start synch problems.

Options:

A.

TRUE


B.

FALSE


Questions # 53:

Without_______, a customer's high priority traffic can be dropped before its low priority traffic.

Options:

A.

packet filtering


B.

prioritization of traffic flows


C.

least cost routing


D.

OAM functionality


E.

separation between the data plane and the control plane


Questions # 54:

How does a shaper rate-limit a traffic stream?

Options:

A.

Packets that arrive in a burst are immediately dropped; packets that arrive with the proper in between space are immediately.


B.

Packets are buffered on arrival and are forwarded at an average rate conforming with PIR, typically, with a reduced burstiness.


C.

Packets with an average arrival rate higher than PIR are immediately dropped; conforming packets are forwarded at the same rate at which they arrive.


D.

Packets with an average arrival rate higher than PIR are buffered for future processing; conforming packets are immediately forwarded.


Questions # 55:

On an Nokia IOM 3, how is buffer memory allocated per forwarding complex?

Options:

A.

512 MB ingress, 512 MB egress


B.

256 MB ingress, 256 MB egress


C.

1 GB dynamically allocated between ingress and egress.


D.

768 MB dynamically allocated between ingress and egress.


E.

768 MB, with a minimum of 256 MB ingress and egress, and an additional 256 MB dynamically allocated.


Questions # 56:

Which of the following statements BEST defines policing?

Options:

A.

The process of delaying packets within a traffic stream to have them conform to a defined traffic profile.


B.

The overall treatment of a defined subset of a customer's traffic within a DiffServ domain.


C.

The process of discarding packets within a traffic stream in accordance with the state of a meter to enforce a defined traffic profile.


D.

The action of setting the DiffServ codepoint of a packet prior to its entry into a downstream DiffServ domain.


E.

A specified algorithm or operation that is implemented in a node in order to realize one or more per-hop behaviors.


Questions # 57:

A packet is to be encapsulated inside an MPLS tunnel which consists of two MPLS headers at the first network egress. Which of the MPLS EXP fields will be marked?

Options:

A.

The EXP field in the bottom MPLS header will be marked.


B.

The EXP field in both the top and bottom MPLS headers will be marked.


C.

For Layer 2 services, the top MPLS header will be marked; for Layer 3 services, the bottom MPLS header will be marked.


D.

The EXP field in the top MPLS header will be marked.


E.

Neither the top nor the bottom EXP field will be marked since EXP remarking can only be done on the network ingress.


Questions # 58:

When allocating scheduling resources, which of the following statements BEST describes how the egress port scheduler allocates bandwidth?

Options:

A.

The egress port scheduler takes the ratio of requested bandwidth to total bandwidth request from all children. It allocates bandwidth fairly, using these percentages and not exceeding the egress interface speed.


B.

The egress port scheduler allocates bandwidth based on a WRR distribution method that takes into account the CIR and PIR requested at each level and the max speed, either default or configured, on egress.


C.

The egress port scheduler allocates bandwidth on a first come, first served distribution method that takes into account the total CIR and PIR requested at each level and the max PIR requested from a single level.


D.

The egress port scheduler will limit the bandwidth offered to the egress port based on the over-subscription factor, provisioned under the router interface, while using a WRR scheduler for the remaining bandwidth.


E.

The egress port scheduler will use the Russian Dolls Method to allocate bandwidth to each level of requested bandwidth. HPO-Only is automatically set to 100%, allowing only high priority traffic to be buffered during congestion.


Questions # 59:

A service provider is using GRE for his transport tunnel on the Nokia 7750 SR. How can traffic be marked as it traverses the service provider's network? (Choose two)

Options:

A.

Using dot1p bits of the 802.1q Ethernet frame header


B.

Using DSCP bits within the ToS field of the IP packet header.


C.

Using the IP precedence bits within the ToS field of the IP packet header.


D.

Using the CLP bit of the ATM cell header.


E.

Using the EXP bits of the MPLS transport label header.


Questions # 60:

Which of the following is an advantage of using queue-groups on a service SAP?

Options:

A.

It enables CFHP.


B.

It more scalable than using policers.


C.

It allows a separate set of queues/policers for each VLAN on a port.


D.

It allows a set of queues to be shared among multiple SAPs.


Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions