[Free] 2017(Sep) CollectDumps Testinsides Cisco 600-210 Dumps with VCE and PDF 41-50

CollectDumps 2017 Sep Cisco Official New Released 600-210
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/600-210.html

Implementing Cisco Service Provider Mobility UMTS Networks (SPUMTS)

Question No: 41

Which option describes how IPsec is used for L2TP configuration on GGSN?

  1. IPsec encapsulated data is sent over the L2TP tunnel.

  2. L2TP encapsulated data is sent over the IPsec tunnel.

  3. L2TP references IPsec for forwarding decisions.

  4. IPsec encapsulated data is sent between MS and GGSN, and data between LAC (GGSN) and LNS is sent via L2TP tunnel.

Answer: B

Question No: 42

According to 3GPP standards, which option is the interface between the Charging Data Function and the Charging Gateway Function?

  1. Gz

  2. Gc

  3. AAA

  4. Rf

  5. Ga

Answer: E

Question No: 43

During the network-initiated PDP activation procedure, which network entity provides the GGSN the address of the SGSN, which the subscriber is attached to?

  1. AAA

  2. OCS

  3. PCRF

  4. HLR

Answer: D

Question No: 44

Refer to the exhibit.

Collectdumps 2017 PDF and VCE

Which three Diameter AVPs are sent within the CCR-I request to the OCS? (Choose three.)

  1. Session-ID

  2. Used-Service-Unit

  3. Request-Service-Unit

  4. 3GPP-Quota-Consumption-Time

  5. Subscription-ID

  6. Event-Trigger

Answer: A,C,E

Question No: 45

When the failure handling mode is configured as Terminate, which behavior is expected on the GGSN when the OCS sends the diameter result code=4012 within the MSCC in CCA-U message?

  1. The GGSN retries sending the CCR-U to the secondary OCS if available, and then terminates the PDP.

  2. The GGSN terminates the PDP.

  3. The GGSN allows the PDP to continue as an offline session, which disables the Gy interface.

  4. The GGSN blacklists the rating group listed within the MSCC AVP.

Answer: D

Question No: 46

Which two AVPs will be sent by the GGSN within the CCR request when an update PDP request with IEs: NSAPI value 6 and Linked NSAPI value 5 is received? (Choose two.)

  1. Called-Station-ID

  2. Used-Service-Unit

  3. Bearer-ID

  4. Requested-Service-Unit

  5. Bearer-Operation= Modification

Answer: A,C

Question No: 47

Refer to the exhibit.

Collectdumps 2017 PDF and VCE

Which two rating groups would be included within the AVP Multiple-Services-Credit-Control within the CCR-I message by the Cisco ASR 5000 GGSN? (Choose two.)

A. 100

B. 400

C. 300

D. 200

E. 500

Answer: C,D

Question No: 48

Which two parameters are used on the Cisco ASR 5000 GGSN to build the RADIUS authentication attribute Acct-Session-ID, sent within the RADIUS Disconnect-Request? (Choose two.)

  1. charging-ID

  2. IMSI

  3. RADIUS client IP address

  4. NSAPI

  5. framed-IP-address

  6. username

Answer: A,C

Question No: 49

When Wi-Fi offloading is enabled, which authentication protocol is used by the TTG over the Wm interface to authenticate/retrieve subscription information at the time of PDP activation?

  1. IPsec

  2. EAP

  3. SSL

  4. CHAP

Answer: B

Question No: 50

Which description of a smurf attack is true?

  1. A smurf attack is an attack in which small TCP packets are sent toward a server from thousands of subscribers, which causes the server network buffer to overflow and drop packets and results in a denial of service.

  2. A smurf attack is an attack in which the attacker sends ICMP echo request packets using a spoofed source IP address destined to remote network broadcast addresses, which results in all recipients replying back to the spoofed source IP address in an attempt to cause a denial of service to the targeted spoofed IP address.

  3. A smurf attack is an attack in which the attacker sends UDP echo packets using a spoofed source IP address destined to remote network broadcast addresses, which results in all recipients replying back to the spoofed source IP address in an attempt to cause a denial of service to the targeted spoofed IP address.

  4. A smurf attack is an attack in which the attacker attempts to change the TCP MSS value to a small value for all TCP flows destined to the target device, which results in many small packets having to be processed by the target, which causes buffer overflows and denial of service.

Answer: B

100% Free Download!
Download Free Demo:600-210 Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps 600-210 Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE