2024年最新のEricsson ECP-206リアル試験問題集PDF [Q18-Q40]

Share

2024年最新ののEricsson ECP-206リアル試験問題集PDF

ECP-206試験問題集、ECP-206練習テスト問題

質問 # 18
Which router function advertises external routes in OSPF?

  • A. backbone router
  • B. ABR
  • C. designated router
  • D. ASBR

正解:D

解説:
Explanation
The router function that advertises external routes in OSPF is ASBR, which stands for Autonomous System Boundary Router. An ASBR is a router that connects an OSPF domain to another routing domain, such as another OSPF domain or a different routing protocol domain. An ASBR can redistribute routes from other routing domains into OSPF as external routes, which are carried in type 5 or type 7 LSAs. External routes have two types: E1 and E2. E1 routes include the cost from the ASBR to the destination, while E2 routes only include the cost advertised by the ASBR34.
References: OSPF External Routes IpCisco, OSPF External Route selection algorithm - Cisco Community


質問 # 19
What is the CLI command to obtain the software version in Ericsson Router 6000 products?

  • A. show version
  • B. show sysstat
  • C. show release
  • D. show log

正解:A

解説:
Explanation
The CLI command to obtain the software version in Ericsson Router 6000 products is show version. This command displays information about the software release, the hardware model, the serial number, the uptime, and the boot image of the router. References: [ERICSSON SMARTEDGE 600 HARDWARE MANUAL Pdf Download | ManualsLib], Ericsson Router 6000 Series - Ericsson


質問 # 20
An operator wants to ensure that they can differentiate their traffic types for the purpose of prioritization in their Ethernet LAN and IP/MPLS backbone.
Which three fields would be used? (Choose three.)

  • A. DSCP
  • B. ECN
  • C. Traffic Class (TC)
  • D. VID
  • E. PCP

正解:A、C、E

解説:
Explanation
To differentiate traffic types for the purpose of prioritization in their Ethernet LAN and IP/MPLS backbone, an operator can use the following three fields:
Traffic Class (TC): This is a 3-bit field in the MPLS label that can be used to indicate the priority or class of service (CoS) of the packet. The TC field can be mapped to the DSCP field in the IP header or the PCP field in the Ethernet header. The TC field can be used by MPLS routers to apply different per-hop behaviors (PHBs) such as queuing, scheduling, and dropping policies to different traffic classes12.
DSCP: This is a 6-bit field in the IP header that can be used to mark packets according to the differentiated services (DiffServ) model. The DSCP field can indicate the per-hop behavior (PHB) that the packet should receive at each router along its path. The DSCP field can be mapped to the TC field in the MPLS label or the PCP field in the Ethernet header. The DSCP field can be used by IP routers to provide QoS for different traffic types34.
PCP: This is a 3-bit field in the Ethernet header that can be used to mark packets according to the IEEE
802.1Q standard. The PCP field can indicate the priority or class of service (CoS) of the packet on an Ethernet LAN. The PCP field can be mapped to the TC field in the MPLS label or the DSCP field in the IP header. The PCP field can be used by Ethernet switches to provide QoS for different traffic types56.
References: MPLS Traffic Engineering - DiffServ-Aware Traffic Engineering, MPLS Traffic Engineering - DiffServ-Aware Traffic Engineering Configuration Guide, Differentiated services - Wikipedia, DSCP and Precedence Values - Cisco, 802.1Q VLAN IDs and Ethernet Interface Types - Juniper Networks, Introduction to Virtual LANs (VLANs) and Tagging - Ubiquiti Support and Help Center


質問 # 21
Within an IGP area, which two statements are correct? (Choose two.)

  • A. Routers advertise information about themselves.
  • B. Routers discard valid but inaccurate information from neighbors.
  • C. Routers summarize information they learn from neighbors.
  • D. Routers relay information delivered by neighbors.

正解:A、D

解説:
Explanation
Within an IGP area, routers advertise information about themselves and relay information delivered by neighbors. This is how link-state routing protocols such as OSPF and IS-IS work. They flood information about the network topology to all routers in the same area or domain. That information is then used to build a complete network connectivity map and to calculate the shortest path to destinations. Routers do not summarize or discard information within an area, unless they are configured to do so by some filtering mechanism. References: Ericsson IP Networking - Routing Protocols, IP Routing: ISIS Configuration Guide - IS-IS Overview and Basic Configuration


質問 # 22
What network information is, without additional configuration, shared between two iBGP neighbors by default?

  • A. IP address information from all directly connected interfaces
  • B. BGP routes learned from eBGP neighbors
  • C. BGP routes learned from an OSPF neighbor
  • D. IP address information of loopback interfaces

正解:B

解説:
Explanation
iBGP works by exchanging routing information between two or more routers within an AS. Each router sends its own routing table to its neighbors, which contains information about the networks it knows and how they can be reached from that router. By default, iBGP neighbors only share BGP routes learned from eBGP neighbors, which are routers in different ASes. This is because iBGP assumes that all routers within an AS have consistent internal routing information provided by an IGP, such as OSPF or IS-IS. Therefore, iBGP neighbors do not need to share IP address information of loopbackinterfaces or directly connected interfaces, unless explicitly configured to do so by using commands such as neighbor update-source or network.
References: iBGP Ultimate Guide | How iBGP Is Different From eBGP, Ericsson IP Networking - Routing Protocols


質問 # 23
What does an LDP implicit null label cause?

  • A. swapping with a new label
  • B. penultimate hop popping by an upstream router
  • C. forwarding the packet unchanged
  • D. penultimate hop popping by a downstream router

正解:D

解説:
Explanation
An LDP implicit null label causes penultimate hop popping by a downstream router. LDP is a protocol that distributes labels for MPLS forwarding along the shortest path calculated by an IGP. An implicit null label is a special label value of 3 that indicates that the downstream router does not need a label to forward the packet to its destination. When an upstream router receives an implicit null label from a downstream router, it removes (or pops) the label from the packet before sending it to the downstream router. This process is called penultimate hop popping (PHP) and it reduces the load on the downstream router, which can forward the packet based on its IP header or another label in the stack59.
References: MPLS Label Distribution Protocol Commands - Cisco, Solved: Implicit null and Explicit null - Cisco Community


質問 # 24
A network operator wants to make sure voice data is prioritized.
In this scenario, to which Ethernet traffic class should it be assigned.

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解:D

解説:
Explanation
A network operator who wants to make sure voice data is prioritized should assign it to Ethernet traffic class 6.
Ethernet traffic class is a term used to refer to the priority code point (PCP) field in the VLAN header of an Ethernet frame. The PCP field is a 3-bit field that can encode up to eight different priority levels, ranging from
0 (lowest) to 7 (highest). The PCP values can be mapped to different types of traffic according to their QoS requirements. The recommended mapping is as follows :
PCP 0: Best effort (default)
PCP 1: Background
PCP 2: Spare
PCP 3: Excellent effort
PCP 4: Controlled load
PCP 5: Video
PCP 6: Voice
PCP 7: Network control
Voice data is a type of real-time traffic that requires the highest priority and lowest delay in the network.
Therefore, it should be assigned to PCP 6, which corresponds to Ethernet traffic class 6 .
References: [IEEE 802.1Q - Wikipedia], [What is "link aggregation" and how does it benefit your network? | PC Gamer]


質問 # 25
What is the purpose of penultimate hop popping?

  • A. to reduce the load on the LDP
  • B. to reduce the load on the LSR
  • C. to reduce the load on the LER
  • D. to reduce the load on the LSP

正解:C

解説:
Explanation
Penultimate hop popping (PHP) is a function performed by certain routers in an MPLS enabled network. It refers to the process whereby the outermost label of an MPLS tagged packet is removed by a label switch router (LSR) before the packet is passed to an adjacent label edge router (LER). The purpose of PHP is to reduce the load on the LER, as it saves one cycle of label lookup. The LER can forward the packet based on its IP header or another label in the stack, without having to process the outer label. PHPfunctionality is achieved by the LER advertising a label with a value of 3 to its neighbors. This label is defined as "implicit-null" and informs the neighboring LSRs to perform PHP12.
References: Penultimate hop popping - Wikipedia, MPLS Penultimate hop popping - NetworkLessons.com


質問 # 26
An IS-IS router has been assigned the NSAP address: 49.00F0.0100.5012.3010.00.
What is the Area ID to which the router belongs?

  • A. 49.00F0.0100
  • B. 00F0 0100
  • C. 5012.3010.00
  • D. 49.00F0

正解:A

解説:
Explanation
The Area ID to which the router belongs is 49.00F0.0100. The Area ID is a variable-length field in the NSAP address that identifies the area to which the router belongs. The Area ID can be between 1 and 13 bytes long, but it must start and end with an octet (8 bits). The NSAP address is composed of three parts: the authority and format identifier (AFI), the area ID, and the system ID. The AFI is a one-octet field that indicates the format and authority of the rest of the address. The system ID is a fixed-length field of six octets that uniquely identifies the router within an area. The NSAP address also has a network selector (NSEL) field, which is a one-octet field that identifies the network layer service to which a packet should be sent. For IS-IS routers, the NSEL must always be 00.
In this question, the NSAP address is 49.00F0.0100.5012.3010.00. This means that:
The AFI is 49, which indicates a private address.
The Area ID is 00F0.0100, which is four octets long and starts and ends with an octet.
The system ID is 5012.3010, which is six octets long and identifies the router within the area.
The NSEL is 00, which indicates IS-IS.
Therefore, the answer is B.
References: Ericsson IP Networking - Routing Protocols, IS-IS NSAP address - Cisco Community, Understanding IS-IS NSAP Addresses - Todd Lammle, LLC, IS-IS - Nokia, Network service access point address - Wikipedia


質問 # 27
Which two protocols apply to both IPv4 and IPv6? (Choose two.)

  • A. DNS
  • B. MD
  • C. ARP
  • D. SNMP

正解:A、D

解説:
Explanation
Two protocols that apply to both IPv4 and IPv6 are:
SNMP: This stands for Simple Network Management Protocol, which is a protocol that allows network administrators to monitor and manage network devices such as routers, switches, servers, printers, etc.
SNMP uses a client-server model, where an SNMP manager (client) can query or configure an SNMP agent (server) on a network device using SNMP messages. SNMP can operate over both IPv4 and IPv6 networks56.
DNS: This stands for Domain Name System, which is a protocol that translates human-readable domain names (such as www.example.com) into numerical IPaddresses (such as 192.0.2.1 or 2001:db8::1) that identify network devices. DNS uses a hierarchical distributed database of name servers that store and resolve domain names and IP addresses. DNS can support both IPv4 and IPv6 addresses78.
References: Simple Network Management Protocol - Wikipedia, SNMP over IPv6 - Cisco, Domain Name System - Wikipedia, DNS for IPv6 - Cisco


質問 # 28
Review the exhibit.

Given the routing table shown in the exhibit, what is the next-hop to reach the host 192.168.1.129?

  • A. 10.126.131.251
  • B. 10.126.131.250
  • C. 10.126.131.248
  • D. 10.126.131.252

正解:B

解説:
Explanation
The next-hop to reach the host 192.168.1.129 is 10.126.131.250. This can be determined by looking at the routing table in the exhibit. The host 192.168.1.129 falls within the range of the network 192.168.1.64/26, which has a next-hop of 10.126.131.250. References: Ericsson IP Networking - IP Addressing, Software Installation and Upgrade Overview (Junos OS)


質問 # 29
IPv6 link-local addresses are designed to be used in which three situations? (Choose three.)

  • A. addressing on a single link for purposes such as auto-address configuration
  • B. by routers to forward packets with link-local source addresses to other links
  • C. for neighbor discovery
  • D. for local IP communication on the IPv6 capable routers
  • E. when routers are not present

正解:A、C、D

解説:
Explanation
IPv6 link-local addresses are designed to be used in three situations: for neighbor discovery, for local IP communication on the IPv6 capable routers, and for addressing on a single link for purposes such as auto-address configuration. Neighbor discovery is a protocol that allows IPv6 nodes to discover each other and learn their link-layer addresses on a local network. Neighbor discovery uses link-local addresses to send and receive messages such as router advertisements, router solicitations, neighbor advertisements, and neighbor solicitations34. Local IP communication on the IPv6 capable routers refers to the ability of routers to exchange routing information or management traffic using their link-local addresses as source and destination addresses. This reduces the need for global unicast addresses on router interfaces that are not reachable from outside the local network35. Addressing on a single link for purposes such as auto-address configuration refers to the use of link-local addresses to enable IPv6 nodes to obtain an address without manual configuration or a DHCP server. Link-local addresses can be automatically derived from the interface identifier in the modified EUI-64 format or randomly generated. Link-local addresses can also be used to test the connectivity of a link before obtaining a global unicast address36.
References: Understand the IPv6 Link-Local Address - Cisco, Link Local Address - GeeksforGeeks, IPv6 Address Types | Link-Local, Global Unicast, etc. IPCisco, MPLS Label Distribution Protocol Commands - Cisco


質問 # 30
Which two statements are true about link-state routing protocols? (Choose two.)

  • A. Each router uses a reliable update mechanism to exchange topology information with its neighbors.
    C Link-state routing protocols mainly use hop-counts to determine the link cost
  • B. The advertisement exchange is mainly triggered by a change in the network.
  • C. A distance vector algorithm is very processor intensive compared to Dijkstra's algorithm.

正解:A、B

解説:
Explanation
Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks for computer communications, the other being distance-vector routing protocols. Examples of link-state routing protocols include Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS). The basic concept of link-state routing is that every node constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes. Each node then independently calculates the next best logical path from it to every possible destination in the network.
Each collection of best paths will then form each node's routing table.
Two statements that are true about link-state routing protocols are:
The advertisement exchange is mainly triggered by a change in the network. Link-state routing protocols use a flooding mechanism to distribute information about the network topology to all routers in the same area or domain. This information is encapsulated in link-state packets (LSPs) or link-state advertisements (LSAs), which contain information about the router, its directly connected links, and the state of those links. LSPs or LSAs are sent only when there is a change in the topology, such as a link failure or recovery, or when a periodic refresh timer expires. This way, link-state routing protocols can quickly adapt to network changes and maintain an accurate and consistent view of the network.
Each router uses a reliable update mechanism to exchange topology information with its neighbors.
Link-state routing protocols use a reliable update mechanism to ensure that all routers receive and acknowledge the LSPs or LSAs sent by their neighbors. This mechanism involves sending hello messages to establish and maintain adjacencies with neighbors, sending acknowledgment messages to confirm the receipt of LSPs or LSAs, and requesting missing or outdated LSPs or LSAs from neighbors.
This mechanism ensures that all routers have a synchronized database of LSPs or LSAs, which is used to build a complete network connectivity map and to calculate the shortest path to destinations.
References: Link-state routing protocol - Wikipedia, Ericsson IP Networking - Routing Protocols


質問 # 31
What is the function of LSR from an LDP perspective?

  • A. The LSR distributes packets of LDP to its FEC peers.
  • B. The LSR distributes packets of FEC to its LDP peers.
  • C. The LSR distributes labels of LDP to its FEC peers.
  • D. The LSR distributes labels of FEC to its LDP peers.

正解:D

解説:
Explanation
The function of LSR from an LDP perspective is to distribute labels of FEC to its LDP peers. LSR stands for Label Switching Router, which is a router that forwards packets based on labels rather than IP addresses in an MPLS network. LDP stands for Label Distribution Protocol, which is a protocol that distributes labels for MPLS forwarding along the shortest path calculated by an IGP. FEC stands for Forwarding Equivalence Class, which is a group of packets that are forwarded in the same manner by an LSR. An LSR uses LDP to advertise the label mappings for each FEC to its LDP peers, which are other LSRs that have established an LDP session with it12.
References: Ldp | Microsoft Learn, Label Distribution Protocol - Wikipedia


質問 # 32
Which two statements are true about the Ericsson Router 6000 series? (Choose two.)

  • A. The Router 6000 is solely built as a radio cell site router.
  • B. The Router 6000 products range from all-outdoor small site routers to large aggregation routers.
  • C. The Router 6000 can host containerized applications such as firewalls.
  • D. The Router 6000 uses the same building practice and accessories as the Ericsson Radio System.

正解:B、D

解説:
Explanation
Two statements that are true about the Ericsson Router 6000 series are:
The Router 6000 uses the same building practice and accessories as the Ericsson Radio System. The Ericsson Radio System is a modular and scalableradio access network solution that supports multiple standards, bands, and layers. The Router 6000 series is fully integrated into the Ericsson Radio System, using the same building practice and accessories such as mounting kits, cables, power supplies, etc. This simplifies installation, operation, and maintenance of both radio and transport equipment78.
The Router 6000 products range from all-outdoor small site routers to large aggregation routers. The Router 6000 series consists of three main products: the Router 6672 for access, the Router 6675 for pre-aggregation, and the Router 6274 for metro aggregation. The Router 6672 is an all-outdoor small cell site router with high-capacity and low-power consumption. The Router 6675 is a combined access and E-RAN switch with hardware-accelerated IPSec and high-accuracy internal clock. The Router 6274 is a high-capacity metro aggregation router with SDN functionality and flexible interface options78.
References: Router 6000 Series - Ericsson, New Ericsson Router 6000 series couples radio and IP transport for 5G future - Global Brands Magazine


質問 # 33
Which statement is true about LDP?

  • A. LDP and IGP both exchange their databases every 60 seconds.
  • B. LDP and IGP both exchange their databases every 30 seconds.
  • C. LDP relies on IGP for all routing-related decisions.
  • D. LDP performs routing functions along with IGP.

正解:C

解説:
Explanation
LDP relies on IGP for all routing-related decisions. LDP is a protocol that distributes labels in an MPLS environment, but it does not perform any routing functions. LDP uses the underlying routing information provided by an IGP, such as OSPF or IS-IS, to forward label packets. LDP and IGP do not exchange their databases at regular intervals, but rather use hello messages to maintain adjacencies and sessions. References: Ericsson IP Networking - Routing Protocols, Label Distribution Protocol - Wikipedia


質問 # 34
What is a reason for using VLANs in an IP network?

  • A. to isolate hosts within the same IP subnet
  • B. to implement virtual routing
  • C. to enable MAC address learning on a router port
  • D. to isolate hosts across multiple IP subnets

正解:A

解説:
Explanation
A reason for using VLANs in an IP network is to isolate hosts within the same IP subnet. VLANs (Virtual LANs) are logical grouping of devices in the same broadcast domain. VLANs are usually configured on switches by placing some interfaces into one broadcast domain and some interfaces into another. Each VLAN acts as a subgroup of the switch ports in an Ethernet LAN. VLANs allow network administrators to group hosts together even if the hosts are not directly connected to the same network switch. By using VLANs, hosts within the same IP subnet can be separated into different broadcast domains, which enhances security, reduces network congestion, and simplifies network management78.
References: 8 Different Types of VLANs in TCP/IP Networks, What is a VLAN? - Study-CCNA


質問 # 35
Which two statements are true about router node hardening? (Choose two.)

  • A. Any unnecessary services should be disabled within each context.
  • B. Enabling syslog ensures system events are logged to a remote server.
  • C. LDAP, using the TLS protocol, should be implemented for remote logging.
  • D. IPsec should be implemented to secure IGP routing protocols.

正解:A、B

解説:
Explanation
Two statements that are true about router node hardening are:
Any unnecessary services should be disabled within each context. Router node hardening is a process of securing a router from unauthorized access and attacks by applying various configurations and policies.
One of these configurations is to disable any services that are not needed for the router's functionality or purpose, such as telnet, ftp, http, etc. This reduces the attack surface of the router and prevents potential exploits of these services91.
Enabling syslog ensures system events are logged to a remote server. Syslog is a protocol that allows a router to send system messages and events to a remote server for logging and analysis. By enabling syslog on a router, network administrators can monitor the router's activity and performance, troubleshoot problems, detect anomalies, and audit security events101.
References: Cisco Router Hardening Step-by-Step | SANS Institute, Security Hardening Checklist Guide for Cisco Routers/Switches in 10 Steps, CCNA SEC: Router Hardening - Cisco Press


質問 # 36
For IP destinations not found in the IS-IS Level 1 database, the Level 1 router must forward packets to the nearest Level 1-Level 2 router with which set?

  • A. options bit
  • B. status bit
  • C. attach bit
  • D. overload bit

正解:C

解説:
Explanation
For IP destinations not found in the IS-IS Level 1 database, the Level 1 router must forward packets to the nearest Level 1-Level 2 router with the attach bit set. The attach bit is a flag in the IS-IS Level 1 LSP that indicates that the router is also a Level 2 router and can reach destinations outside the Level 1 area. The Level
1 router will install a default route pointing to the nearest Level 1-Level 2 router with the attach bit set. This way, the Level 1 router can forward packets to other areas without having to maintain a full Level 2 database. References: Ericsson IP Networking - Routing Protocols, Configure Attach Bit Set - Cisco


質問 # 37
How many different priorities are available to use in a VLAN header?

  • A. 0
  • B. 1
  • C. 2
  • D. 3

正解:C

解説:
Explanation
There are 8 different priorities available to use in a VLAN header. A VLAN header is a 4-byte field that is inserted into an Ethernet frame to indicate the VLAN membership and priority of the frame. The VLAN header consists of two subfields: the tag protocol identifier (TPID) and the tag control information (TCI). The TCI subfield contains three subfields: the priority code point (PCP), the drop eligible indicator (DEI), and the VLAN identifier (VID). The PCP subfield is a 3-bit field that specifies the priority level of the frame, ranging from 0 (lowest) to 7 (highest). The PCP values can be used to implement quality of service (QoS) mechanisms on bridges and switches12.
References: HTML rt Tag - W3Schools, VLAN 0 Priority Tagging Support - Cisco


質問 # 38
Which conceptual table created by routing protocols is used when processing an IP packet?

  • A. label information base
  • B. traffic engineering data base
  • C. forwarding information base
  • D. management information base

正解:C

解説:
Explanation
The conceptual table created by routing protocols that is used when processing an IP packet is the forwarding information base (FIB). The FIB is a table that contains the bestroutes to reach each destination network prefix, along with the outgoing interface and the next-hop address for each route. The FIB is derived from the routing information base (RIB), which is a table that contains all the routes learned from different routing protocols and sources. The FIB is used by the router to make fast forwarding decisions for each incoming packet, based on its destination address12.
References: Security Hardening Checklist Guide for Cisco Routers/Switches in 10 Steps, VLAN - Wikipedia


質問 # 39
In an Ericsson Router 6000, which command is used to begin making changes to the router settings?

  • A. commit
  • B. capabilities
  • C. set metric
  • D. configure

正解:D

解説:
Explanation
The command that is used to begin making changes to the router settings in an Ericsson Router 6000 is configure. This command enters the configuration mode, where various commands can be used to modify the router parameters, such as interfaces, protocols, services, security, etc. To exit the configuration mode, the command end can be used. To save the changes made in the configuration mode, the command commit can be used56.
References: Router 6000 Series - Ericsson, Ericsson Router 6000 series (6471/6672/6675) Commands for
2G/3G/4G/5G technologies... - YouTube


質問 # 40
......

PDF問題(2024年最新)実際のEricsson ECP-206試験問題:https://www.goshiken.com/Ericsson/ECP-206-mondaishu.html

問題集返金保証付きのECP-206問題集には90%オフ:https://drive.google.com/open?id=1Xnz_9Sdi0Fcxvtw7movcmw3MQZyvtZtV