Refer to the exihibit.

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service-provider core network with these requirements:
RC must establish LDP peering with the loopback IP address as its Router ID
RA must establish LDP peering with RB. RC, and RY.
How must the team update the network configuration to successfully enable LDP peering between RA and RC?
Answer : B
To establish LDP peering with the loopback IP address as its Router ID, both RA and RC need to configure their LDP router IDs to use their respective loopback addresses. This is done by applying the 'mpls ldp router-id loopback0' command on both routers. This configuration ensures that LDP peering uses the loopback addresses, which is a requirement for the service-provider core network.
An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?
A)

B)

C)

D)

Answer : A
The configuration inOption Ais correct for enabling dial-out telemetry streams usinggRPCon devices withTLS disabled.
It usesmodel-driven telemetry (MDT), which is a new method of monitoring network devices. Unlike traditional methods that pull data from the device, MDT pushes data from the device to the collector.
In this configuration:
Telemetryis model-driven.
It specifies adestination groupwith an IP address and port number where the telemetry data will be sent.
The encoding isself-describing-gpb(Google Protocol Buffers).
The protocol used isTCP.
This setup ensures that telemetry data is sent to the specified collector without requiring TLS encryption.
Which two IS-IS parameters must match before two Level 2 peers can form an adjacency? (Choose two)
Answer : A, E
In IS-IS, Level 2 peers must have matching authentication settings to ensure security and integrity of the routing domain. The hello timer setting must also match to ensure that the peers can maintain a consistent adjacency state. Mismatched hello timers could lead to adjacency flaps or failure to form an adjacency.
The networking team must create a golden configuration to monitor and discover network devices, and also support the capability to configure network devices in the future. Not all devices on the network are capable of gRPC or REST-API calls. The solution should use a username and password, and data in transit should be highly secured. The modern NMS system has been configured with IP address 172.14.15.1, and the snmp-server view iso included command has already been added to the template. Which two commands should the team add to the configuration template to enable SNMPv3 on network devices? (Choose two.)
Answer : A, B
How is RSVP used with MPLS traffic engineering tunnels?
Answer : D
RSVP (Resource Reservation Protocol) is used with MPLS (Multiprotocol Label Switching) traffic engineering tunnels primarily to reserve bandwidth along the path of the tunnel.This ensures that sufficient resources are allocated for the traffic to meet quality of service requirements, which is crucial for maintaining the performance of critical applications that traverse the network.Reference:= For more information on RSVP and MPLS traffic engineering, refer to the Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) course materials, which provide detailed explanations on how these technologies work together to optimize network traffic1.
Refer to the exihibit.

Refer to the exhibit. A network engineer is configuring a new router for iBGP to improve the capacity of a growing network. The router must establish an iBGP peer relationship with its neighbor. The underlay network is already configured with the correct IP addresses. Which step should the engineer apply to complete this task?
Answer : D
What is the function of Cisco NFV infrastructure platform?
Answer : C