2014 Latest Cisco 350-001 Dump Free Download(301-310)!

QUESTION 301
On a Cisco router that is in ROMMON mode, how can you set the configuration register to its default value?

A.    set confreg 0x2102
B.    confreg 0x2102
C.    config-register 0x2102
D.    set config-register 0x2102

Answer: B
Explanation:
http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a008022493f.s html (configreg)

QUESTION 302
Which two combinations are valid LACP configurations that will set up an LACP channel? (Choose two.)

A.    on-passive
B.    on-auto
C.    passive-active
D.    desirable-auto
E.    active-active
F.    desirable-desirable

Answer: CE
Explanation:
http://www.cisco.com/en/US/tech/tk389/tk213/technologies_configuration_example09186a00800 94470.shtml (background theory, see the table)

QUESTION 303
How many bytes make up the spanning-tree bridge ID?

A.    4
B.    8
C.    12
D.    16

Answer: B
Explanation:
The IEEE 802.1D standard requires that each switch has an unique bridge identifier (bridge ID), which controls the selection of the root switch. Because each VLAN is considered as a different logical bridge with PVST+ and rapid PVST+, the same switch must have a different bridge IDs for each configured VLAN. Each VLAN on the switch has a unique 8-byte bridge ID. The 2 most-significant bytes are used for the switch priority, and the remaining 6 bytes are derived from the switch MAC address.

QUESTION 304
In which two spanning-tree port states is the port learning MAC addresses? (Choose two.)

A.    disabled
B.    blocking
C.    listening
D.    learning
E.    forwarding

Answer: DE
Explanation:
When the spanning-tree algorithm determines that a port should be placed in the forwarding state, the following occurs:
The port is put into the listening state while it waits for protocol information that suggests it should go to the blocking state.
The port waits for the expiration of a protocol timer that moves the port to the learning state.
In the learning state, the port continues to block frame forwarding as it learns station location information for the forwarding database.
The expiration of a protocol timer moves the port to the forwarding state, where both learning and forwarding are enabled.

QUESTION 305
In an 802.1s BPDU, what is the size of the configuration revision number?

A.    8 bits
B.    16 bits
C.    24 bits
D.    32 bits

Answer: B
Explanation:
http://blog.ine.com/tag/8021s/ ( see implementing MSTP, 5th bullet)

QUESTION 306
What is the BPDU protocol version for 802.1w?

A.    0
B.    1
C.    2
D.    3

Answer: C
Explanation:
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtm l (See New BPDU format, second para)

QUESTION 307
Which three options are used in the spanning-tree decision process? (Choose three.)

A.    lowest root bridge ID
B.    lowest path cost to root bridge
C.    lowest sender bridge ID
D.    highest port ID
E.    highest root bridge ID
F.    highest path cost to root bridge

Answer: ABC
Explanation:
http://www.ccnpguide.com/ccnp-switch-642-813-spanning-tree-basics/ (see STP convergence)

QUESTION 308
Which two statements are true about LACP? (Choose two.)

A.    LACP packets are sent with multicast group MAC address 01-80-c2-00-00-02.
B.    The Type/Field value is 0x8808.
C.    During detection, LACP packets are transmitted every second.
D.    The timeout for a failed LACP channel is 30 seconds by default.

Answer: AC
Explanation:
http://www.cisco.com/en/US/docs/ios/cether/configuration/guide/ce_lnkbndl.html

QUESTION 309
Which statement is true about TCN propagation in RSTP (802.1w)?

A.    The originator of the TCN immediately floods this information through the network.
B.    The TCN propagation is a two step process.
C.    A TCN is generated and sent to the root bridge.
D.    The root bridge must flood this information throughout the network.

Answer: A
Explanation:
The TCN propagation in RSTP is unique in the way that the originator of the TCN floods information through the network.

QUESTION 310
When using extended system ID in 802.1d, how many bits are reserved for this field?

A.    6
B.    8
C.    10
D.    12

Answer: D
Explanation:
The priority value is divided into 4 bit priority and 12 bit extended system id. This extended system id is usually equal to the VLAN id. The idea behind it is to conserve MAC addresses – PVST+ requires a different bridge id per VLAN, and this would mean different MACs — unless you ensure that the priorities are different. By re-mapping some of the priority bits, this is ensured and all VLANs can use the same MAC address.
http://www.informit.com/library/content.aspx?b=CCIE_Practical_Studies_II&seqNum=13

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(291-300)!

QUESTION 291
Which QoS mechanism will prevent a decrease in TCP performance?

A.    Shaper
B.    Policer
C.    WRED
D.    Rate-Limit
E.    LLQ
F.    Fair-Queue

Answer: C
Explanation:
http://www.routeralley.com/ra/docs/qos_congestion_avoidance.pdf (page 20

QUESTION 292
Which of the following is true about WRED?

A.    WRED cannot be applied to the same interface as CQ, PQ, and WFQ.
B.    WRED drops packets from all flows.
C.    WRED cannot mark with a probability denominator.
D.    WRED cannot be applied to the voice queue.

Answer: A
Explanation:
http://www.cisco.com/en/US/docs/ios/qos/configuration/guide/config_wred.html

QUESTION 293
What needs to be enabled for Unicast RPF?

A.    BGP
B.    OSPF
C.    CEF
D.    RIP

Answer: C
Explanation:
Cisco Express Forwarding switching must be enabled for Unicast RPF to function. This command has been enabled by default as of IOS version 12.2. If it is not enabled, administrators can enable it with the following global configuration command: ip cef

QUESTION 294
Which QoS mechanism will allow traffic flows an equal share of the bandwidth?

A.    Shaper
B.    Policer
C.    WRED
D.    Rate-Limit
E.    LLQ
F.    Fair-Queue

Answer: F
Explanation:
http://www.cisco.com/en/US/docs/ios/solutions_docs/qos_solutions/QoSVoIP/QoSVoIP.html (see low latency queuing)

QUESTION 295
If shaping is configured with 128 KB/s and a committed burst of 3200 B/s, what would be the value of TC?

A.    25 sec
B.    25 ms
C.    125 sec
D.    125 ms

Answer: B
Explanation:
3200 bits / 128000 bps == 0.025 sec ( 25 ms )
http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a00800a3a25.shtml# comm-anc (search for value of Tc)

QUESTION 296
Which two statements are true about NBAR? (Choose two.)

A.    NBAR performs protocol discovery.
B.    NBAR is not dependent on CEF.
C.    NBAR is used for traffic statistics collection.
D.    NBAR performs traffic classification.

Answer: AD
Explanation:
NBAR Can perform protocol discovery using the sniffing capability of its classification Engine. In cases where is NBAR is not required for defining the QoS Policy, NBAR protocol discovery mode can be used to get information about traffic present on the network and how much bandwidth each traffic type is using.
Command: LABRouter#show ip nbar protocol-discovery stats byte-rate <Interface>

QUESTION 297
You are the network administrator of a large Layer 2 network. At certain times during the day, users complain that the network is responding very slowly.
When troubleshooting the issue, you notice the election of a new root bridge with an unknown MAC address. Knowing that all access ports have the PortFast feature enabled, what should be
done to resolve the issue without losing redundant links?

A.    Enable bpduguard globally.
B.    Enable rootguard.
C.    Enable loopguard.
D.    Enable spanning tree.
E.    Enable UDLD.

Answer: A
Explanation:
Loopguard, spanning tree, and UDLD are obvious red herrings. This leaves enabling rootguard or bpduguard. One key is that enabling bpduguard only affects ports that have portfast enabled; see the following URL under “Configuration.”
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a008009482f.shtml

QUESTION 298
Which value should be used in the configuration register of a router in order to boot into bootstrap?

A.    0x2102
B.    0x2142
C.    0x2124
D.    0x2101

Answer: D
Explanation:
http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a008022493f.s html (configreg – see the table, 3rd row)

QUESTION 299
Which three combinations are valid PAgP configurations that will set up a channel? (Choose three.)

A.    On-On
B.    On-Auto
C.    Passive-Active
D.    Desirable-Auto
E.    Active-Active
F.    Desirable-Desirable

Answer: ADF
Explanation:
http://www.cisco.com/en/US/products/hw/switches/ps607/products_configuration_example09186 a0080094789.shtml (see port aggregation protocol)

QUESTION 300
Which value should be used in a router configuration register in order to ignore the content of the NVRAM?

A.    0x2102
B.    0x2124
C.    0x2142
D.    0x2101

Answer: C
Explanation:
http://books.google.com.pk/books?id=xbfe_tu9DI4C&pg=PA438&lpg=PA438&dq=Which+value+should+be+used+in+a+router+configuration+register+in+order+to+ignore+the+content+of+the+NVRAM&source=bl&ots=0KkTj9rqEk&sig=UF6KGI7ssMpv19ATDoPOYmFEh30&hl=en&sa=X&ei=WSfMUeP3BYaChQfzjIFI&redir_esc=y#v=onepage&q=Which%20value%20should%20be%20used%20in%20a%20router%20configuration%20register%20in%20order%20to%20ignore%20the%20content%20of%20th e%20NVRAM&f=false (see password recovery procedure, second para)

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(281-290)!

QUESTION 281
Where should frame-relay traffic shaping be applied?

A.    on the physical interface
B.    on the subinterface
C.    under the frame-relay map class
D.    on any of the above

Answer: A
Explanation:
http://blog.ine.com/2008/01/22/legacy-frts/ (first bullet on the page)

QUESTION 282
How can excess packets be remarked?

A.    shaping
B.    policing
C.    priority
D.    all of the above

Answer: B
Explanation:
http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a00800a3a25.shtml (see the table – first row)

QUESTION 283
Which feature is used to translate several internal addresses to only one or a few external addresses (also referred to as “overload”)?

A.    Network Address Translation
B.    Address Translation Table
C.    Overload Address Method
D.    Port Address Translation

Answer: D
Explanation:
The PAT feature, a subset of NAT functionality, can be used to translate several internal addresses into only one or a few external addresses. PAT uses unique source port numbers on the private global IP address to distinguish between translations. Because the port number is encoded in 16 bits, the total number could theoretically be as high as 65,536 per IP address. PAT will attempt to preserve the original source port number. If this number is already allocated then PAT will attempt to find the first available port number starting from the beginning of the appropriate port group 0?511, 512?023, or 1024?55351. If there is still no port number available from the appropriate group and more than one IP address is configured, PAT will move to the next IP address in the pool and try to allocate the original source port number again. This continues until it runs out of available ports and IP addresses.

QUESTION 284
Which protocol should be used in order to configure first hop redundancy between a Cisco router and a router from another company?

A.    HSRP
B.    VRRP
C.    GLBP
D.    IRDP

Answer: B
Explanation:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-3s/asr1000/fhp- vrrs.html

QUESTION 285
Which three protocols or applications should be placed in a class that is configured with WRED? (Choose three.)

A.    RTP
B.    streaming video
C.    SMTP
D.    SSH
E.    BitTorrent

Answer: CDE
Explanation:
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfwred_ps1835_TSD_Produ cts_Configuration_Guide_Chapter.html

QUESTION 286
Which QoS mechanism will rate-limit traffic, and limit drops by implementing queuing?

A.    Shaper
B.    Policer
C.    WRED
D.    Rate-Limit
E.    LLQ
F.    Fair-Queue

Answer: A
Explanation:
http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a00800a3a25.shtml

QUESTION 287
What is the default queuing mechanism on slow serial interfaces?

A.    FIFO
B.    WFQ
C.    CQ
D.    LLQ
E.    WRR

Answer: A
Explanation:
Using FIFO in the software queue works just like FIFO in the hardware queue, where you are not truly performing packet manipulation. FIFO is the default queuing method on interfaces that run at speeds of greater than 2.048 Mbps.
Although FIFO is supported widely on all IOS platforms, it can starve out traffic by allowing bandwidth-hungry flows to take an unfair share of the bandwidth.

QUESTION 288
Which two statements are true about traffic shaping? (Choose two.)

A.    Shaping buffers excess packets.
B.    It is applied in the incoming direction only.
C.    Shaping can remark excess packets.
D.    It supports interaction with frame relay congestion indication.

Answer: AD

QUESTION 289
Which three configuration items are required to enable SSH on a router? (Choose three.)

A.    a domain name
B.    an RSA key
C.    a hostname
D.    a self-signed certificate
E.    a RADIUS server
F.    a username and password

Answer: ABC
Explanation:
http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfssh.html (prerequisites to configuring SSH)

QUESTION 290
Refer to the exhibit. Considering the following policer, which statement is valid?

A.    The Tc interval equals 125 ms
B.    Traffic exceeding 8 kb/s is systematically dropped
C.    The policer allows an excess burst of 1 kb
D.    The policer allows traffic to peak to 16 kb/s for the duration of a Tc interval if no traffic passed over
the previous interval
E.    Traffic exceeding 8 kb/s is never dropped

Answer: D
Explanation:
As per the exhibit, you can see the policer allows traffic to peak to 16 kb/s for the duration of a Tc interval if no traffic passed over the previous interval \

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(271-280)!

QUESTION 271
Which two multicast addresses are reserved for use by ALL-PIM-ROUTERS? (Choose two.)

A.    224.0.0.13
B.    224.0.0.17
C.    224.0.0.39
D.    ff02::d
E.    ff02::39
F.    ff02::13

Answer: AD
Explanation:
http://www.routeralley.com/ra/docs/multicast.pdf (see page 2)

QUESTION 272
Which value is used in the PIM TYPE field to indicate a Register message?

A.    0
B.    1
C.    2
D.    3

Answer: B
Explanation:
http://technet.microsoft.com/en-us/library/bb742462.aspx (see Dr election)

QUESTION 273
What does the beginning of a multicast address look like, if it is used for embedded RP?

A.    FF7
B.    FF
C.    FF3
D.    Embedded RP does not use any special IPv6 address.

Answer: A
Explanation:
Embedded RP defines an address allocation policy in which the address of the RP is encoded in an IPv6 multicast group address. This allows an easy deployment of scalable inter-domain multicast and simplifies the intra-domain multicast configuration as well. IPv6 Multicast group addresses embedded with RP information start with ff70::/12 where the flag value of 7 means embedded RP.
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6552/whitepaper_c11- 508498.html

QUESTION 274
Which command is used to enable SSM with the range 232.0.0.0/8?

A.    ip pim ssm default
B.    ip pim ssm 232.0.0.0 255.0.0.0
C.    ip pim ssm range 50 access-list 50 permit 232.0.0.0 15.255.255.255
D.    ip pim enable default

Answer: A
Explanation:
http://packetlife.net/blog/2010/jul/27/source-specific-multicast-pim-ssm/ (see PIM-SSM configuration)

QUESTION 275
Which IPv6 multicast address is reserved for use by all PIM routers?

A.    ff02::39
B.    ff02::13
C.    ff02::d
D.    ff02::17

Answer: C
Explanation:
If the IPv6 Destination Address field is the multicast address ALL-PIM-ROUTERS, the IPv6 form of the address (ff02::d) is used. These IPv6 PIM control messages are of course not transmitted natively over the service provider’s network, but rather are encapsulated in GRE/IPv4.

QUESTION 276
Which RFC number contains the specification for Protocol Independent Multicast sparse mode?

A.    1011
B.    1918
C.    2044
D.    4061

Answer: D
Explanation:
http://www.ietf.org/rfc/rfc4601.txt

QUESTION 277
Which two are differences between IGMPv2 and IGMPv3 reports? (Choose two.)

A.    IGMPv3 adds the ability to include or exclude source lists.
B.    All IGMPv2 hosts send reports to destination address 224.0.0.22.
C.    Only IGMPv3 reports may contain multiple group state records.
D.    All IGMPv3 hosts send reports to destination address 224.0.0.23.
E.    IGMPv2 does not support the Leave Group message.

Answer: AC
Explanation:
http://www.juniper.net/techpubs/software/erx/junose700/swconfig-routing-vol1/html/ip- multicast-config14.html (see including and excluding traffic)

QUESTION 278
Which value is used in the PIM TYPE field to indicate a register-stop message?

A.    0
B.    1
C.    2
D.    3

Answer: C
Explanation:
http://www.iana.org/assignments/pim-parameters/pim-parameters.xhtml (see PIM message types)

QUESTION 279
Which two statements are true about the Inside Global address in NAT? (Choose two.)

A.    the IP address of an inside host as it appears to the outside network
B.    the IP address of an outside host as it appears to the inside network
C.    if the enterprise is connected to the global Internet, this address can be allocated from a globally unique
address space
D.    if the enterprise is connected to the global Internet, this address can be allocated from the space defined
by RFC 1918

Answer: AC
Explanation:
“global” is what you see on the Internet, “local” is what you see in your company “inside”/”outside” is where the box physically resides Obviously, you can only use globally unique addresses for global addresses.

QUESTION 280
Which statement is true about shaping?

A.    Shaping supports queuing of excess traffic.
B.    Shaping can be applied both input and output on interfaces.
C.    Shaping does not introduce delay in voice packet handling in the event of congestion.
D.    Shaping makes instantaneous packet drop decisions.

Answer: A
Explanation:
Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time. The result of traffic shaping is a smoothed packet output rate. In contrast, traffic policing propagates bursts. When the traffic rate reaches the configured maximum rate, excess traffic is dropped (or remarked). The result is an output rate that appears as a saw-tooth with crests and troughs.

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(261-270)!

QUESTION 261
Which two are IPv6 neighbor discovery packets? (Choose two.)

A.    Neighbor Solicitation
B.    Anycast Solicitation
C.    Anycast Advertisement
D.    Router Advertisement

Answer: AD
Explanation:
http://packetlife.net/blog/2008/aug/28/ipv6-neighbor-discovery/

QUESTION 262
Which individual metrics can be used to calculate the composite EIGRP metric?

A.    total delay, minimum bandwidth, reliability, load, MTU
B.    total delay, minimum bandwidth, reliability, load, MTU, hop count
C.    total delay, minimum bandwidth, reliability, load, hop count
D.    total delay, minimum bandwidth, reliability, load
E.    total delay, minimum bandwidth

Answer: D
Explanation:
http://www.cisco.com/en/US/docs/ios-xml/ios/iproute_eigrp/configuration/15-sy/ire-wid- met.html#GUID-736131DE-0B64-46F4-A19A-B0526D24F95B (See table 1)

QUESTION 263
In which two scenarios would MSDP be used? (Choose two.)

A.    Interdomain multicast
B.    Anycast RP
C.    Distributing the RP address to other routers
D.    Implementing PIM-SSM

Answer: AB
Explanation:
http://tools.ietf.org/html/rfc4611 (see introduction)

QUESTION 264
Which four are possible states in the BGP FSM? (Choose four.)

A.    Idle
B.    Established
C.    Wait
D.    Active
E.    OpenSent
F.    Nonconnected

Answer: ABDE
Explanation:
http://www.freesoft.org/CIE/RFC/1771/52.htm (See the table)

QUESTION 265
Which command should be used on a PE router to connect to a CE router (11.1.1.4) in VRF red?

A.    telnet 11.1.1.4 /vrf-source red
B.    telnet 11.1.1.4 source /vrf red
C.    telnet 11.1.1.4 /source vrf red
D.    telnet 11.1.1.4 /vrf red
E.    telnet 11.1.1.4 vrf red

Answer: D
Explanation:
You would need to telnet the ce router in vrf red. The correct syntax is telent ipaddress/vrf red.

QUESTION 266
Which address needs to be present on an interface for OSPFv3 to form an adjacency?

A.    Global unicast
B.    Unique local
C.    Link local
D.    FF02::5
E.    FF02::6

Answer: C
Explanation:
OSPFv3, however, makes use of IPv6’s link-local address scope (FE80::/10). All OSPFv3 adjacencies are formed using link-local addresses:
R1# show ipv6 ospf neighbor detail
Neighbor 3.3.3.3
In the area 1 via interface FastEthernet0/0
Neighbor: interface-id 4, link-local address FE80::C003:7DFF:FE07:0 Neighbor priority is 1, State is FULL, 6 state changes
DR is 3.3.3.3 BDR is 2.2.2.2
Options is 0x6670B96D
Dead timer due in 00:00:32
Neighbor is up for 00:16:48
Index 1/1/1, retransmission queue length 0, number of retransmission 0 First 0x0(0)/0x0(0)/0x0(0) Next 0x0(0)/0x0(0)/0x0(0)
Last retransmission scan length is 0, maximum is 0
Last retransmission scan time is 0 msec, maximum is 0 msec

QUESTION 267
By default, EIGRP will use which percentage of bandwidth on an interface?

A.    10%
B.    25%
C.    50%
D.    75%
E.    80%
F.    100%

Answer: C
Explanation:
The enhanced implementation uses the configured interface bandwidth in order to determine how much EIGRP data to transmit in a given amount of time. By default, EIGRP will limit itself to using no more than 50% of the interface bandwidth. The primary benefit of controlling EIGRP’s bandwidth usage is to avoid losing EIGRP packets, which could occur when EIGRP generates data faster than the interface line can absorb it. This is of particular benefit on Frame Relay networks, where the access interface bandwidth and the PVC capacity may be very different. A secondary benefit is to allow the network administrator to ensure that some bandwidth remains for passing user data, even when EIGRP is very busy.

QUESTION 268
From which IPv6 address are EIGRPv6 hello messages sourced?

A.    Global unicast
B.    Link local
C.    Site local
D.    Unique local
E.    FF02::A

Answer: B
Explanation:
Link local address is the address being used in EIGRPv6 as the next hop address in the IPv6 routing table, it is required that the engineer map both the link-local & global addresses to an interface in the EIGRPv6 configuration as well. EIGRPv6-enabled routers will not become adjacent without the link-local mapping, even if the global address mapping exist on the router.

QUESTION 269
What is the Internet Protocol Number for all PIM control Messages?

A.    15
B.    17
C.    25
D.    103

Answer: D
Explanation:
http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml (search `103′)

QUESTION 270
Which value is used in the PIM TYPE field to indicate a Join/Prune message?

A.    0
B.    1
C.    2
D.    3

Answer: D
Explanation:
http://tools.ietf.org/html/draft-venaas-pim-hierarchicaljoinattr-00

 

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(251-260)!

QUESTION 251
Refer to the exhibit.R1 has two eBGP sessions to ISP1 and ISP2 (one to each ISP router), and R1 receives the same prefixes through both links.
Which configuration should be applied for the link between R1 and ISP2 to be preferred for incoming traffic (ISP2 to R1)?

clip_image001

A.    increase local preference on R1 for sent routes
B.    decrease local preference on R1 for sent routes
C.    increase MED on ISP2 for sent routes
D.    decrease MED on ISP2 for sent routes

Answer: D
Explanation:
http://books.google.com.pk/books?id=V7MIJorqe_kC&pg=PA344&lpg=PA344&dq=decrease+MED+on+ISP2+for+sent+routes&source=bl&ots=pJvKb3dxua&sig=43gSTo8fhtMwu6DET75T3fJw9cU&hl=en&sa=X&ei=mFDLUZDzAcS47AbU3ICgCQ&ved=0CGgQ6AEwCA#v=onepage&q=decrease%20MED%20 on%20ISP2%20for%20sent%20routes&f=false

QUESTION 252
Which two statements are true about bandwidth guarantee? (Choose two.)

A.    When congestion is present, the priority command doesn’t allow exceeding the allocated rate
B.    When congestion isn’t present, the priority command doesn’t allow exceeding the allocated rate
C.    When congestion is present, the priority command allows exceeding the allocated rate
D.    When congestion isn’t present, the priority command allows exceeding the allocated rate

Answer: AD
Explanation:
During congestion conditions, the traffic class is guaranteed bandwidth equal to the specified rate. (Recall that bandwidth guarantees are only an issue when an interface is congested.) In other words, the priority command provides a minimum bandwidth guarantee. In addition, the priority command implements a maximum bandwidth guarantee. Internally, the priority queue uses a token bucket that measures the offered load and ensures that the traffic stream conforms to the configured rate. Only traffic that conforms to the token bucket is guaranteed low latency. Any excess traffic is sent if the link is not congested or is dropped if the link is congested.
“The purpose of the built-in policer is to ensure that the other queues are serviced by the queueing scheduler. In the original Cisco priority queueing feature, which uses the priority-group and priority-list commands, the scheduler always serviced the highest priority queue first. In extreme cases, the lower priority queues rarely were serviced and effectively were starved of bandwidth. The real benefit of the priority command–and its major difference from the bandwidth command– is how it provides a strict de-queueing priority to provide a bound on latency. Here is how the Cisco IOS Configuration Guide describes this benefit: “A strict priority queue (PQ) allows delay-sensitive data such as voice to be de-queued and sent before packets in other queues are de-queued…..”

QUESTION 253
For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would you configure uRPF on the uplink interface?

A.    ip verify unicast source reachable-via any
B.    ip verify unicast reverse-path
C.    ip verify unicast reverse-path loose
D.    ip verify unicast reverse-path strict

Answer: A
Explanation:
Unicast RPF Examples
Cisco IOS Devices
An important consideration for deployment is that Cisco Express Forwarding switching must be enabled for Unicast RPF to function. This command has been enabled by default as of IOS version 12.2. If it is not enabled, administrators can enable it with the following global configuration command: ip cef Unicast RPF is enabled on a per-interface basis. The ip verify unicast source reachable-via rx command enables Unicast RPF in strict mode. To enable loose mode, administrators can use the any option to enforce the requirement that the source IP address for a packet must appear in the routing table. The allow-default option may be used with either therx or any option to include IP addresses not specifically contained in the routing table. The allow-self-ping option should not be used because it could create a denial of service condition. An access list such as the one that follows may also be configured to specifically permit or deny a list of addresses through Unicast RPF:
interface FastEthernet 0/0
ip verify unicast source reachable-via {rx | any} [allow-default] [allow-self-ping] [list]
Addresses that should never appear on a network can be dropped by entering a route to a null interface. The following command will cause all traffic received from the 10.0.0.0/8 network to be dropped even if Unicast RPF is enabled in loose mode with the allow-default option: ip route 10.0.0.0 255.0.0.0 Null0
http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html

QUESTION 254
The EtherChannel between your LAN switch and the Internet router is not load-balancing
efficiently. On the switch, there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? (Choose four.)

A.    source IP address
B.    destination IP address
C.    per-packet load balance
D.    destination MAC address
E.    source MAC address

Answer: ABDE
Explanation:
EtherChannel load balancing can use MAC addresses, IP addresses, or Layer 4 port numbers with a Policy Feature Card 2 (PFC2) and either source mode, destination mode, or both. The mode you select applies to all EtherChannels that you configure on the switch. Use the option that provides the greatest variety in your configuration. For example, if the traffic on a channel only goes to a single MAC address, use of the destination MAC address results in the choice of the same link in the channel each time. Use of source addresses or IP addresses can result in a better load balance. Issue the port-channel load- balance {src-mac | dst-mac | srcdst-mac | src-ip | dst-ip | src-dst-ip | src-port | dst-port | src-dst-port | mpls} global configuration command in order to configure the load balancing.
Issue the show etherchannel load-balance command in order to check the frame distribution policy. You can determine which interface in the EtherChannel forwards traffic, with the frame distribution policy as a basis.
Issue the remote login switch command to log in remotely to the Switch Processor (SP) console in order to make this determination. Then, issue the test etherchannel load-balance interface port- channel number {ip |
l4port | mac} [source_ip_add | source_mac_add | source_l4_port] [dest_ip_add | dest_mac_add | dest_l4_port] command.

QUESTION 255
Before inserting a new switch in the network, the network administrator checks that the VTP
domain name is correct, the VTP mode is set to server, and revision is lower than the switches in the network. The administrator then configures interfaces and trunks, erases existing VLANs, and connects the switch to the network. Following that procedure, there is no connectivity in the
network. What is a possible cause of this problem?

A.    Because the configuration revision of the new switches is lower than the rest of the network, it can
change the VLAN database of the other switches.
B.    As a VTP server, the new switch deleted all VLANs of the network.
C.    Erasing VLANs increases the VTP configuration revision.
D.    Since the configuration revision of the network is higher than the new switch, the VLAN database
was automatically synchronized.

Answer: C
Explanation:
Reset the Configuration Revision Number
You can easily reset the configuration revision number by either of the two procedures provided in this section.
Reset the Configuration Revision using Domain Name Complete these steps in order to reset the configuration revision number with the change of the domain name:
1. Issue “show vtp domain ” in order to see that the configuration is empty
2. Configure the VTP Domain name
3. Change the VTP Domain back
4. Change the VTP Domain to what it was in step 2
Reset the Configuration Revision using VTP Mode
Complete these steps in order to reset the configuration revision number with the change of the domain name:
1. Issue “show vtp domain ” in order to see that the configuration is empty
2. Configure the VTP Domain name
3. Change the VTP mode from server to transparent
4. Change the VTP mode from transparent to server or client.
http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080890613.shtml# topic9

QUESTION 256
The network administrator wants to enable an EtherChannel between two switches in “on” mode.
The administrator connects the cables and enables the interfaces, but while configuring the
EtherChannel in the first switch, a spanning-tree loop was detected. Which two of these
procedures can avoid this problem? (Choose two.)

A.    Configure the EtherChannel as “desirable” first.
B.    Assign all interfaces to the same VLAN.
C.    Disable PortFast on the interfaces in the EtherChannels.
D.    Disable all interfaces first.
E.    Fast Ethernet and Gigabit Ethernet ports cannot be assigned to the same EtherChannel.
F.    Fix cabling problems.

Answer: AD
Explanation:
If a workstation or a server is connected with a single Network Interface Card (NIC) to a switch port, this connection cannot create a physical loop. These connections are considered leaf nodes. There is no reason to make the workstation wait 30 seconds while the switch checks for loops when the workstation cannot cause a loop. With the addition of the PortFast or fast-start feature, the STP for this port assumes that the port is not part of a loop. In this case, the port immediately moves to the forwarding state, and skips the blocking, listening, or learning states. This command does not turn STP off. This command makes STP skip a few steps in the beginning on the selected port, although unnecessary in this circumstance.
Note:
The PortFast feature must never be used on switch ports that connect to other switches, hubs, or routers. These connections can cause physical loops, and it is very important that Spanning Tree go through the full initialization procedure in these situations. A Spanning Tree loop can bring the network down. If the PortFast feature is turned on for a port that is part of a physical loop, it can cause packets to be continuously forwarded and even multiply in such a way that the network cannot recover.
https://supportforums.cisco.com/docs/DOC-4897

QUESTION 257
Customer X has a hub-and-spoke Frame Relay network, with a central office and two branch
offices (RemoteA and RemoteB). Each location has only one physical link to the Frame Relay
cloud and RemoteB has a router that is not a Cisco router. Since the installation, there is no
connectivity between RemoteB and the central office. What is a possible solution to this issue?

A.    Because Frame Relay IETF encapsulation is only configurable at interface level, you must use
IETF encapsulation on all routers.
B.    This is not a possible scenario. A dedicated Frame Relay link to RemoteB is mandatory at the
central office.
C.    The router at RemoteB must be replaced by a Cisco router.
D.    Use Frame Relay IETF encapsulation on a per-VC basis on the central office router.
E.    There is a problem in the Frame Relay cloud, because Cisco routers are compatible with IETF
Frame Relay.

Answer: D

QUESTION 258
You are deploying two core switches, one in each building, 50 km away from each other. The
cross-connection between them will be a Layer 2 2-gigabit EtherChannel with an 802.1Q trunk.
You configured it correctly but the link does not come up. The port is in the “admin up” state, and the line protocol is in the “down” state. The fiber link is OK. What would be the most likely reason for the link not to come up?

A.    The switches are not the same model.
B.    You are not using the correct SFP.
C.    You are not using correct optical media converters.
D.    Configuration should be modified, because the distance is longer.

Answer: B
Explanation:
Verifying the Line Protocol Is Up
In the output from the show interfaces fastethernet, show interfaces gigabitethernet or show interfaces tengigabitethernet command, verify that the line protocol is up. If the line protocol is down, the line protocol software processes have determined that the line is unusable.
Perform the following corrective actions:
Replace the cable.
Check the local and remote interface for misconfiguration. Verify that a hardware failure has not occurred. Observe the LEDs to confirm the failure. See the other troubleshooting sections of this chapter, and refer to the Cisco 7600 Series Router SIP, SSC, and SPA Hardware Installation Guide. If the hardware has failed, replace the SPA as necessary.
http://www.cisco.com/en/US/products/hw/routers/ps368/module_installation_and_configuration_ guides_chapter09186a0080523f70.html#wp1038764

QUESTION 259
You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the
documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation?

A.    The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ON.
B.    The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFF.
C.    The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode as auto.
D.    The firewall does not support DTP. You should set the switchport trunk mode to ON.

Answer: D
Explanation:
PortFast, Channeling, and Trunking
By default, many switches, such as Cisco switches that run the Catalyst operating system (OS), are designed to be plug-and-play devices. As such, many of the default port parameters are not desirable when a PIX is plugged into the switch. For example, on a switch that runs the Catalyst OS, default channeling is set to Auto, trunking is set to Auto, and PortFast is disabled. If you connect a PIX to a switch that runs the Catalyst OS, disable channeling, disable trunking, and enable PortFast. Channeling, also known as Fast EtherChannel or Giga EtherChannel, is used to bind two or more physical ports in a logical group in order to increase the overall throughput across the link. When a port is configured for automatic channeling, it sends out Port Aggregation Protocol (PAgP) frames as the link becomes active in order to determine if it is part of a channel. These frames can cause problems if the other device tries to autonegotiate the speed and duplex of the link. If channeling on the port is set to Auto, it also results in an additional delay of about 3 seconds before the port starts to forward traffic after the link is up.
Note: On the Catalyst XL Series Switches, channeling is not set to Auto by default. For this reason, you should disable channeling on any switch port that connects to a PIX. Trunking, also known by the common trunking protocols Inter-Switch Link (ISL) or Dot1q, combines multiple virtual LANs (VLANs) on a single port (or link). Trunking is typically used between two switches when both switches have more than one VLAN defined on them. When a port is configured for automatic trunking, it sends out Dynamic Trunking Protocol (DTP) frames as the link comes up in order to determine if the port that it connects to wants to trunk. These DTP frames can cause problems with autonegotiation of the link. If trunking is set to Auto on a switch port, it adds an additional delay of about 15 seconds before the port starts to forward traffic after the link is up. PortFast, also known as Fast Start, is an option that informs the switch that a Layer 3 device is connected out of a switch port. The port does not wait the default 30 seconds (15 seconds to listen and 15 seconds to learn); instead, this action causes the switch to put the port into forwarding state immediately after the link comes up. It is important to understand that when you enable PortFast, spanning tree is not disabled. Spanning tree is still active on that port. When you enable PortFast, the switch is informed only that there is not another switch or hub (Layer 2-only device) connected at the other end of the link. The switch bypasses the normal 30-second delay while it attempts to determine if a Layer 2 loop results if it brings up that port. After the link is brought up, it still participates in spanning tree. The port sends out bridge packet data units (BPDUs), and the switch still listens for BPDUs on that port. For these reasons, it is recommended that you enable PortFast on any switch port that connects to a PIX. Note: Catalyst OS releases 5.4 and later include the set port host <mod>/<port> command that allows you to use a single command to disable channeling, disable trunking, and enable PortFast.
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a008009491 c.shtml#portfastchanneltrunk

QUESTION 260
If you have overlapping IP address between two different networks or routing domains, what two commands do you need to globally configure NAT to get this to work?

A.    ip nat outside source list 1 interface x and ip nat inside source list 1 interface x
B.    ip nat outside source static x.x.x.x y.y.y.y and ip nat inside source static x.x.x.x y.y.y.y
C.    ip nat outside source static udp x.x.x.x y.y.y.y and ip nat inside source udp x.x.x.x y.y.y.y
D.    ip nat outside source static tcp x.x.x.x y.y.y.y and ip nat outside source tcp x.x.x.x y.y.y.y

Answer: B

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(241-250)!

QUESTION 241
A router that acts as an Internet border gateway has multiple upstream connections that are used in a load-sharing setup. The NOC has identified a DDoS attack from a specific source entering its network via interface GigabitEthernet0/1.
The NOC wants to block this suspicious traffic on the border router in a scalable way and without major changes to the different interface configurations.
Which configuration would block the DDoS attack from the known source (194.90.1.5)?

A.    interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.252
ip verify unicast source reachable-via any
!
ip route 194.90.1.5 255.255.255.255 Null0
B.    interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.252
ip verify unicast source reachable-via any
!
ip route 194.90.1.5 255.255.255.255 192.168.1.2
C.    interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.252
ip verify unicast source reachable-via rx
!
ip route 194.90.1.5 255.255.255.255 Null0
D.    interface GigabitEthernet0/1
ip address 192.168.1.1 255.255.255.252
ip verify unicast source reachable-via rx
!
ip route 194.90.1.5 255.255.255.255 192.168.1.2

Answer: A

QUESTION 242
In GLBP, which router will answer on client ARP requests?

A.    all active AVF routers as the first response is used by the client
B.    the AVG router, replying with a different AVF MAC address each time
C.    a random AVF router, based on a GLBP seed hash key
D.    only the AVG router that received the ARP request first

Answer: B
Explanation:
LBP Active Virtual Gateway
Members of a GLBP group elect one gateway to be the active virtual gateway (AVG) for that group. Other group members provide backup for the AVG in the event that the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of the GLBP group. Each gateway assumes responsibility for forwarding packets sent to the virtual MAC address assigned to it by the AVG. These gateways are known as active virtual forwarders (AVFs) for their virtual MAC address. The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address.
Load sharing is achieved by the AVG replying to the ARP requests with different virtual MAC addresses.
http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ft_glbp.html#wp1039649

QUESTION 243
Which three protocols or applications should be placed in a class that is configured with WRED? (Choose three.)

A.    HTTP
B.    RTP
C.    streaming video
D.    BitTorrent
E.    POP3

Answer: ADE
Explanation:
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfwred_ps1835_TSD_Produ cts_Configuration_Guide_Chapter.html

QUESTION 244
What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link, but only allow each individual flow to use 1 MB/s?

A.    ip rsvp bandwidth 10000 1000
B.    ip rsvp bandwidth 100000 1
C.    ip rsvp bandwidth 10 1
D.    ip rsvp bandwidth 1000000 1000

Answer: A
Explanation:
This command enables the traffic-engineering tunnels on the interface. It configures the interface to send and receive RSVP signaling to establish traffic-engineering tunnels across this interface; both sides of the link need to have this configuration enabled.
Define the bandwidth allocation on the interfaces:
ip rsvp bandwidth interface-kbps single-flow-kbps [sub-pool kbps] This command enables RSVP reservations for traffic-engineering tunnels. interface-kbps is the amount of bandwidth (in kbps) on the interface that is available for reservation, and it is referred to as global pool.
single-flow-kbps is the maximum amount of bandwidth (in kbps) allowed for a single flow. This parameter is ignored for traffic-engineering tunnel reservations. [sub-pool kbps] is the amount of bandwidth (in kbps) from the global pool available for reservations in a subpool.
ip rsvp bandwidth
To enable RSVP for IP on an interface, use the ip rsvp bandwidth interface configuration command.
To disable
RSVP, use the no form of the command.
ip rsvp bandwidth [interface-kbps] [single-flow-kbps]
no ip rsvp bandwidth [interface-kbps] [single-flow-kbps] Syntax Description interface-kbps
(Optional) Amount of bandwidth (in kbps) on interface to be reserved. The range is 1 to 10, 000, 000. single-flow-kbps (Optional) Amount of bandwidth (in kbps) allocated to a single flow. The range is 1 to 10, 000, 000.

QUESTION 245
Which two statements are true about RED? (Choose two.)

A.    RED randomly drops packets before the queue becomes full.
B.    RED is always useful, without dependency on flow.
C.    RED increases the drop rate as the average queue size increases.
D.    RED has a per-flow intelligence.

Answer: AC
Explanation:
RED aims to control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets.
RED takes advantage of the congestion control mechanism of TCP. By randomly dropping packets prior to periods of high congestion, RED tells the packet source to decrease its transmission rate. Assuming the packet source is using TCP, it will decrease its transmission rate until all the packets reach their destination, indicating that the congestion is cleared. You can use RED as a way to cause TCP to slow down transmission of packets.
TCP not only pauses, but it also restarts quickly and adapts its transmission rate to the rate that the network can support.
RED distributes losses in time and maintains normally low queue depth while absorbing spikes. When enabled on an interface, RED begins dropping packets when congestion occurs at a rate you select during configuration.
Packet Drop Probability
The packet drop probability is based on the minimum threshold, maximum threshold, and mark probability denominator.
When the average queue depth is above the minimum threshold, RED starts dropping packets. The rate of packet drop increases linearly as the average queue size increases until the average queue size reaches the maximum threshold.
The mark probability denominator is the fraction of packets dropped when the average queue depth is at the maximum threshold. For example, if the denominator is 512, one out of every 512 packets is dropped when the average queue is at the maximum threshold.
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfconav.html

QUESTION 246
Which of the following is true about the MPLS header and its EXP field size?

A.    The MPLS header is 2 bytes, and the EXP field is 3 bits long.
B.    The MPLS header is 1 byte, and the EXP field is 3 bits long.
C.    The MPLS header is 4 bytes, and the EXP field is 3 bits long.
D.    The MPLS header is 3 bytes, and the EXP field is 3 bits long.

Answer: C
Explanation:
http://books.google.com.pk/books?id=DoOsh4NsCKwC&pg=PA95&lpg=PA95&dq=MPLS+header+is+4+bytes,+and+the+EXP+field+is+3+bits+long&source=bl&ots=lGc3RcpOUs&sig=MwvvUoDkbWfl8elpSuq_wn53i_I&hl=en&sa=X&ei=HTXLUfSzBsap4gT8tYHoBg&ved=0CCoQ6AEwAA#v=onepage&q=MPLS%20header%20is%204%20bytes%2C%20and%20the%20EXP%20field%20is%203%20bits%20long&f =false (page 100)

QUESTION 247
Which protocol and port have been assigned by IANA for RADIUS authentication?

A.    UDP/1812
B.    UDP/1813
C.    TCP/1812
D.    TCP/1813

Answer: A

QUESTION 248
What is also called Type 0 authentication in OSPF on Cisco Routers?

A.    MD5
B.    There is no Type 0 authentication
C.    SHA1
D.    Null

Answer: D
Explanation:
These are the three different types of authentication supported by OSPF. Null Authentication–This is also called Type 0 and it means no authentication information is included in the packet header. It is the default.
Plain Text Authentication–This is also called Type 1 and it uses simple clear-text passwords. MD5 Authentication–This is also called Type 2 and it uses MD5 cryptographic passwords.
http://www.cisco.com/en/US/tech/tk365/technologies_configuration_example09186a0080094069.
shtml

QUESTION 249
Refer to the exhibit. Which two statements are correct, when the QoS configuration is applied in an outbound direction on a 10-Mb/s interface? (Choose two.)

clip_image002

A.    When reaching 10 Mb/s of input rate, the video class will be policed to 200 kb/s.
B.    The class FTP is allowed to reach more than 1 Mb/s in the event of congestion.
C.    IP precedence 1 traffic is affected by a drop probability.
D.    Video traffic above 200 kb/s is allowed to pass when the total interface output rate does not reach 10 Mb/s.
E.    Video traffic above 200 kb/s is allowed to pass when congestion is present.

Answer: BD
Explanation:
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/intrface.html

QUESTION 250
Choose two commands that are required to enable multicast on a router, when it is known that the receivers use a specific functionality of IGMPv3. (Choose two.)

A.    ip pim rp-address
B.    ip pim ssm
C.    ip pim sparse-mode
D.    ip pim passive

Answer: BC
Explanation:
Source specific multicast only works with IGMPv3
http://www.cisco.com/en/US/docs/ios/ipmulti/command/reference/imc_04.html#wp1043638

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(231-240)!

QUESTION 231
Which two EIGRP options will limit a query domain? (Choose two.)

A.    configuring EIGRP stubs
B.    configuring a second EIGRP AS and redistributing
C.    configuring summary addresses
D.    configuring an offset-list
E.    configuring a prefix-list
F.    configuring unicast neighbors

Answer: AC
Explanation:
Summarization in EIGRP also solves a problem unique to EIGRP: query scoping. EIGRP queries do not stop until they come to a dead-end; because of this, they can loop. Route convergence cannot proceed until all replies have been received. Summarization limits queries by stating: “only these routes are found past this point.” Summarizing at logical points in the network is important to prevent stuck in active (SIA)

QUESTION 232
Which three options are valid ways to filter routes from a BGP peer? (Choose three.)

A.    filter-list
B.    inbound ACL
C.    route-map
D.    outbound ACL
E.    prefix-list
F.    neighbor 10.0.0.1 deny-map my-map command

Answer: ACE
Explanation:
http://www.cisco.com/en/US/docs/ios/12_0/np1/configuration/guide/1cbgp.html#wp7487

QUESTION 233
What is the correct command to set the router ID for an OSPFv3 process?

A.    router-id 1.2.3.4
B.    router-id 2011::1
C.    router-id Loopback0
D.    router-id FF02::5

Answer: A
Explanation:
Stub Router
ipv6 unicast-routing
ipv6 cef
!
interface serial 0/0
no ip address
ipv6 enable
ipv6 address 2001:ABAB::/64 eui-64
ipv6 ospf 1 area 2
!
ipv6 router ospf 1
router-id 3.3.3.3
area 2 stub
!
http://www.cisco.com/en/US/tech/tk872/technologies_configuration_example09186a0080b40d8a.
shtml

QUESTION 234
Which three message types are valid PIMv2 message types? (Choose three.)

A.    Register
B.    Register-Stop
C.    Join/Prune
D.    Reject
E.    Register-Prune
F.    Register-Join

Answer: ABC
Explanation:
PIMv2 message types:
hello: 0
Register (used in PIM-SM only): 1
Register-Stop (used in PIM-SM only): 2
Join/Prune: 3
Bootstrap (used in PIM-SM only): 4
Assert:5
Graft (used in PIM-DM only): 6
Graft-Ack (used in PIM-DM only): 7
Candidate-RP-Advertisement (used in PIM-SM only): 8

QUESTION 235
Which multicast address is reserved for cisco-rp-discovery?

A.    224.0.1.37
B.    224.0.1.38
C.    224.0.1.39
D.    224.0.1.40

Answer: D
Explanation:
Auto-RP is a mechanism to automate distribution of RP information in a multicast network. The Auto-RP mechanism operates using two basic components, the candidate RPs and the RP mapping agents.
Candidate RPs advertise their willingness to be an RP via “RP-announcement” messages. These messages are periodically sent to a reserved well-known group 224.0.1.39 (CISCO-RP-ANNOUNCE). RP mapping agents join group 224.0.1.39 and map the RPs to the associated groups. The RP mapping agents advertise the authoritative RP-mappings to another well-known group address 224.0.1.40 (CISCORP-DISCOVERY). All PIM routers join 224.0.1.40 and store the RP-mappings in their private cache.
Figure 2 shows the Auto-RP mechanism where the RP mapping agent periodically multicasts the RP information that it receives to the Cisco-RP-Discovery group.

clip_image001[4]
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6552/whitepaper_c11- 508498.html

QUESTION 236
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message (knowing that the MSDP router is also configured as an RP for the PIM domain)?

A.    Source-Active Message
B.    PIM Join
C.    PIM Hello
D.    MSDP Register

Answer: A
Explanation:
Information About MSDP
You can use the Multicast Source Discovery Protocol (MSDP) to exchange multicast source information between multiple BGP-enabled Protocol Independent Multicast (PIM) sparse-mode domains.
When a receiver for a group matches the group transmitted by a source in another domain, the rendezvous point (RP) sends PIM join messages in the direction of the source to build a shortest path tree. The designated router (DR) sends packets on the source-tree within the source domain, which may travel through the RP in the source domain and along the branches of the source-tree to other domains. In domains where there are receivers, RPs in those domains can be on the source-tree. The peering relationship is conducted over a TCP connection. Figure 6-1 shows four PIM domains. The connected RPs (routers) are called MSDP peers because each RP maintains its own set of multicast sources. Source host 1 sends the multicast data to group 224.1.1.1. On RP 6, the MSDP process learns about the source through PIM register messages and generates Source-Active (SA) messages to its MSDP peers that contain information about the sources in its domain. When RP 3 and RP 5 receive the SA messages, they forward them to their MSDP peers. When RP 5 receives the request from host 2 for the multicast data on group 224.1.1.1, it builds a shortest path tree to the source by sending a PIM join message in the direction of host 1 at 192.1.1.1.

clip_image001[6]
When you configure MSDP peering between each RP, you create a full mesh. Full MSDP meshing is typically done within an autonomous system, as shown between RPs 1, 2, and 3, but not across autonomous systems.
You use BGP to do loop suppression and MSDP peer-RPF to suppress looping SA messages. For more information about mesh groups, see the “MSDP Mesh Groups” section.
Note
You do not need to configure MSDP in order to use Anycast-RP (a set of RPs that can perform load balancing and failover) within a PIM domain. For more information, see the “Configuring a PIM Anycast-RP Set” section.
For detailed information about MSDP, see RFC 3618.
http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/multicast/configuration/guide/msdp.html

QUESTION 237
Which command is used to enable SSM with the range 232.0.0.0 – 255.0.0.0?

A.    ip pim ssm
B.    ip pim ssm 232.0.0.0 255.0.0.0
C.    ip pim ssm range 50
D.    access-list 50 permit 232.0.0.0 15.255.255.255
E.    ip pim enable default

Answer: A
Explanation:
http://books.google.com.pk/books?id=2Nhv8mdg-
o4C&pg=PA202&lpg=PA202&dq=ip+pim+ssm+enable+SSM+with+the+range+232.0.0.0+- +255.0.0.0&source=bl&ots=ycFzpApLQk&sig=HUz9vxpttyXErIthl14DkZwIo8w&hl=en&sa=X&ei=ZTLLUamUCozY4QTXxoHYBQ&ved=0CEUQ6AEwBQ#v=onepage&q=ip%20pim%20ssm%20enable%20SSM %20with%20the%20range%20232.0.0.0%20-%20255.0.0.0&f=false

QUESTION 238
Which two are differences between IGMPv2 and IGMPv3 reports? (Choose two.)

A.    IGMPv3 has the ability to include or exclude source lists.
B.    All IGMPv3 hosts send reports to destination address 224.0.0.22.
C.    Only IGMPv2 reports may contain multiple group state records.
D.    All IGMPv3 hosts send reports to destination address 224.0.0.23.
E.    IGMPv2 does not support the Leave Group message.

Answer: AB
Explanation:
Version 3 Reports are sent with an IP destination address of 224.0.0.22, to which all IGMPv3-capable multicast routers listen. A system that is operating in version 1 or version 2 compatibility modes sends version 1 or version 2 Reports to the multicast group specified in the Group Address field of the Report.
There are a number of different types of Group Records that may be included in a Report message:
A “Current-State Record” (in response to a Query)
MODE_IS_INCLUDE INCLUDE()
MODE_IS_EXCLUDE EXCLUDE()
A “Filter-Mode-Change Record” (when the filter mode change) CHANGE_TO_INCLUDE_MODE TO_IN()
CHANGE_TO_EXCLUDE_MODE TO_EX()
A “Source-List-Change Record” (when the source list change) ALLOW_NEW_SOURCES ALLOW()
BLOCK_OLD_SOURCES BLOCK()
http://alor.antifork.org/talks/IGMP-v3.ppt

QUESTION 239
Which two statements about SA caching are true? (Choose two.)

A.    Caching allows pacing of MSDP messages.
B.    Caching reduces join latency.
C.    Caching should not be done by an MSDP speaker.
D.    Caching is used to update the BGP MDT address family.

Answer: AB
Explanation:
A MSDP speaker MUST cache SA messages. Caching allows pacing of MSDP messages as well as reducing join latency for new receivers of a group G at an originating RP which has existing MSDP (S, G) state. In addition, caching greatly aids in diagnosis and debugging of various problems.
http://www.ietf.org/rfc/rfc3618.txt

QUESTION 240
What is true about Unicast RPF in strict mode?

A.    It works well with a multihomed environment.
B.    It will inspect IP packets that are encapsulated in tunnels, such as GRE, LT2P, or PPTP.
C.    uRPF is performed within the CEF switching path.
D.    There might be a problem with DHCP as Unicast RPF is blocking packets with a 0.0.0.0 source address.

Answer: C
Explanation:
Understanding uRPF ?Unicast Reverse Path Forwarding
Spoofed packets are a big problem with on the Internet, they are commonly used in DNS amplification attacks, and TCP SYN floods. Unfortunately there is no simple way to totally fix all spoofed packets on the Internet but if service providers implement ingress filtering on their network, it effectively stops such attacks with spoofed source addresses coming from their patch. The process is actually standardised Best Practice in BCP 38 “Network Ingress Filtering” which all service providers should implement if they have Internet facing services for good karma. There are a number of ways of implementing ingress filtering, one of the technically simplest is to create ACLs of your customers global address ranges and only allow packets sourced from those ranges to leave your network. Configuration wise Unicast Reverse Path Forwarding (uRPF) is in my opinion the simplest way of managing this and it has a couple of extra features. uRPF checks incoming unicast packets and validates that a return path exists, there is not much point in forwarding a packet if it doesnt know how to return it right? There are 2 methods of implementation of uRPF strict and loose. Strict mode is where the source of the packet is reachable via the interface that it came from, this is nice for extra security on the edge of your network but not so good if you have multiple edges towards the Internet eg you peer at multiple IXPs where you might expect asymmetric routing. In such cases loose mode is used which checks that a return route exists in the routing table.
Configuration
The configuration is super simple, after CEF has been enabled just go to the interface you wish to check inbound traffic and use the following command, with the “rx” option for strict mode or “any” for loose mode.
Router(config-if)#ip verify unicast source reachable-via
Any Source is reachable via any interface rx Source is reachable via interface on which packet was received Verification
Obviously you can check the running config to see if its configured but if your a fan of using other show commands its visible under the sh cef interface and sh ip interface as shown below; Router#sh cef interface fastEthernet 0/0 | i RPF
IP unicast RPF check is enabled
Router# sh ip int fa0/0 | i verify
IP verify source reachable-via RX

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(221-230)!

QUESTION 221
Which two attributes need to match for two switches to become members of the same MST region? (Choose two.)

A.    the table of 4096 elements that map the respective VLAN to STP instance number
B.    VTP version
C.    configuration revision number
D.    native VLAN ID

Answer: AC
Explanation:
The final implementation adopted by the IEEE 802.1s standard made this mechanics more elegant and simple. Before we process with discussing IEEE’s implementation, let’s define MSTP region as a collection of switches, sharing the same view of physical topology partitioning into set of logical topologies. For two switches to become members of the same region, the following attributes must match:
Configuration name.
Configuration revision number (16 bit value).
The table of 4096 elements that map the respective VLANs to STP instance numbers.

QUESTION 222
An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port, 100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application? (Choose two.)

A.    change the EtherChannel default hashing algorithm from XOR to use source port Layer 4 port
load balancing to better load balance the traffic
B.    change the EtherChannel default hashing algorithm from XOR to use destination Layer 4 port
load balancing to better load balance the traffic
C.    have the application recoded to use multiple connections instead of a single connection so
EtherChannel can better load balance the traffic
D.    upgrade the CPU and memory of the compute devices so they can better process traffic
E.    upgrade the EtherChannel bundle to a single gigabit link because EtherChannel is not well suited
for single-connection traffic

Answer: CE
Explanation:
http://www.cisco.com/en/US/prod/collateral/routers/ps5855/prod_white_paper0900aecd806f698a.pdf

QUESTION 223
Which two are natively included by the IEEE 802.1w standard? (Choose two.)

A.    instances can control a selection of VLANs
B.    load balancing
C.    fast transition to forwarding state
D.    backbone, uplink, and portfast (or equivalent)
E.    root, loop, and BPDU guard (or equivalent)

Answer: CD
Explanation:
802.1D Spanning Tree Protocol (STP) has a drawback of slow convergence. Cisco Catalyst switches support three types of STPs, which are PVST+, rapid-PVST+ and MST. PVST+ is based on IEEE802.1D standard and includes Cisco proprietary extensions such as BackboneFast, UplinkFast, and PortFast. Rapid-PVST+ is based on IEEE 802.1w standard and has a faster convergence than 802.1D. RSTP (IEEE 802.1w) natively includes most of the Cisco proprietary enhancements to the 802.1D Spanning Tree, such as BackboneFast and UplinkFast. Rapid-PVST+ has these unique features:
Uses Bridge Protocol Data Unit (BPDU) version 2 which is backward compatible with the 802.1D STP, which uses BPDU version 0.
All the switches generate BPDUs and send out on all the ports every 2 seconds, whereas in 802.1D STP only the root bridge sends the configuration BPDUs.
Port Roles–Root port, designated port, alternate port and backup port.
Port States–Discarding, Learning, and Forwarding.
Port Types–Edge Port (PortFast), Point-to-Point and Shared port. Rapid-PVST uses RSTP to provide faster convergence. When any RSTP port receives legacy 802.1D BPDU, it falls back to legacy STP and the inherent fast convergence benefits of 802.1w are lost when it interacts with legacy bridges.

QUESTION 224
Which three statements are true about policing? (Choose three.)

A.    Out-of-profile packets are queued.
B.    It causes TCP retransmits.
C.    Marking and remarking are not supported.
D.    It does not respond to BECN and foresight messages.
E.    It uses a single- and two-bucket mechanism for metering.

Answer: BDE
Explanation:
http://books.google.com.pk/books?id=eLa5crPXSOYC&pg=PA642&lpg=PA642&dq=policing+causes+TCP+retransmits&source=bl&ots=KezstlVBgx&sig=HhykMycdtbgEVwP30wqd5yJ3ZCE&hl=en&sa=X&ei=eiTLUeX3PIeL7Aa4k4BA&redir_esc=y#v=onepage&q=policing%20causes%20TCP%20retransmits& f=false

QUESTION 225
Which command can be used to filter a RIPv6 route from getting installed in the routing table?

A.    ipv6 router rip ccie
distribute-list..
B.    ipv6 router rip ccie
offset-list..
C.    interface e0/0
ipv6 rip ccie distribute-list..
D.    interface e0/0
ipv6 rip ccie advertise..

Answer: A
Explanation:
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-rip.html

QUESTION 226
Which three are needed to run VRF lite for IPv6 on a router? (Choose three.)

A.    VRF definition for IPv6
B.    MP BGP for IPv6
C.    LDP
D.    VRF-enabled routing protocol
E.    VRF-enabled interface

Answer: ADE

QUESTION 227
Which information will the Cisco IOS command show ip ospf rib display?

A.    only the local OSPF routes
B.    only the OSPF routes installed in the routing table
C.    only the remotely learned OSPF routes
D.    all the OSPF routes from the OSPF database that are eligible to be put in the routing table

Answer: D

QUESTION 228
What is the Cisco IOS command to turn on explicit null forwarding by LDP?

A.    ldp explicit-null
B.    mpls forwarding explicit-null
C.    mpls ldp advertise-labels explicit null
D.    mpls ldp explicit-null

Answer: D
Explanation:
When you issue the mpls ldp explicit-null command, Explicit Null is advertised in place of Implicit Null for directly connected prefixes.
SUMMARY STEPS
1. enable
2. configure terminal
3. mpls ip
4. mpls label protocol {ldp | tdp | both}
5. interface type number
6. mpls ip
7. exit
8. mpls ldp explicit-null [for prefix-acl | to peer-acl | for prefix-acl to peer-acl]
9. exit
10. show mpls forwarding-table [network {mask | length} | labels label [- label] | interface interface | next-hop address | lsp-tunnel [tunnel-id]] [vrf vpn-name] [detail] Reference
http://www.cisco.com/en/US/docs/ios/12_4t/12_4t2/ftldp41.html

QUESTION 229
How does an IPv6 router deal with a packet that is larger than the outgoing interface MTU?

A.    It will fragment the packet at Layer 2.
B.    It will fragment the packet at Layer 3.
C.    It will drop the packet and send an ICMPv6 message “packet too big” back to the source.
D.    It will drop the packet.

Answer: C

QUESTION 230
What does a unicast prefix-based IPv6 multicast address start with?

A.    FF80
B.    FF3
C.    FF
D.    FF7

Answer: B

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(211-220)!

QUESTION 211
What is a requirement to enable Cisco IOS IPS with 5.x signature?

A.    disable Zone-Based Firewall as the two features are not compatible
B.    disable Cisco Express Forwarding as the two features are not compatible
C.    generate a certificate and export on Cisco.com to receive a signature update
D.    import the public RSA key from the Cisco IPS team that allows the router to verify that a signature
update (which was signed by this key) comes from Cisco

Answer: D
Explanation:
http://www.cisco.com/en/US/docs/ios-xml/ios/sec_data_ios_ips/configuration/12-4t/sec-ips5-sig- fs-ue.html

QUESTION 212
What is the minimum key size to enable SSH v2?

A.    512 bits
B.    768 bits
C.    1024 bits
D.    2048 bits

Answer: B
Explanation:
Technical description for port 1812:
The RADIUS (Remote Authentication Dial-In User Service) protocol running on the system port 1812 is related to its authentication module. This service is primarily an element of a networking protocol which allows for a deployment of centralized accounting, authorization and access procedures. This protocol allows for the management of network resources for the efficient usage of network services.
When a user or a device attempts to connect to a network service, the authentication process is normally executed. The protocol using the computer port 1812 determines the appropriate user privileges for the entered credentials. A corresponding record of the network access is recorded into the accounting server for the implementation of the Triple A process. The protocol supported by the network port 1812 is normally deployed by ISPs (Internet Service Providers) due to its ubiquitous support nature.
This service also supports the implementation of VPNs (Virtual Private Networks) and wireless networking environments.
UDP port numbers
RADIUS has been officially assigned UDP ports 1812 for RADIUS Authentication and 1813 for RADIUS Accounting by the Internet Assigned Numbers Authority (IANA). However, prior to IANA allocation of ports 1812 and 1813, ports 1645 and 1646 (authentication and accounting, respectively) were used unofficially and became the default ports assigned by many RADIUS Client/Server implementations of the time. The tradition of using 1645 and 1646 for backwards compatibility continues to this day. For this reason many RADIUS Server implementations monitor both sets of UDP ports for RADIUS requests. Microsoft RADIUS servers default to 1812 and 1813. Cisco RADIUS servers listen on RADIUS ports UDP 1645 and UDP 1812 for authentication; on ports 1646 and 1813 for accounting and can be configured with non-standard ports. Juniper Networks’ RADIUS servers listen on both unofficial and official ports 1645, 1812, 1646 and 1813 by default but can be configured with arbitrary ports.
http://en.wikipedia.org/wiki/RADIUS
http://www.pc-library.com/ports/tcp-udp-port/1812/

QUESTION 213
Refer to the exhibit. An enterprise network has an upstream connection to two different ISPs that are using eBGP and a publicly assigned PI network.
ISP1 is used as the primary provider, while ISP2 is used for backup. Due to packet loss on the link to ISP1, the network engineers changed the default route on R1 to point to ISP2, but they could not establish any connection until they changed the default route to point back at ISP1.
Which two are possible root causes of the issue? (Choose two.)

clip_image002

A.    “ip verify unicast source reachable-via rx” is configured on the R1 uplinks.
B.    “ip verify unicast source reachable-via any” is configured on the R1 uplinks.
C.    “ip verify unicast source reachable-via rx” is configured on the ISP1 link to R1.
D.    “ip verify unicast source reachable-via any” is configured on the ISP1 link to R1.
E.    “ip verify unicast source reachable-via rx” is configured on the ISP2 link to R1.
F.    “ip verify unicast source reachable-via any” is configured on the ISP2 link to R1.

Answer: AE
Explanation:
ip verify unicast source reachable-via
To enable Unicast Reverse Path Forwarding (Unicast RPF), use the ip verify unicast source reachable- via command in interface configuration mode. To disable Unicast RPF, use the no form of this command.
ip verify unicast source reachable-via {rx | any} [allow-default] [allow-self-ping] [list] no ip verify unicast source reachable-via

clip_image002
http://www.cisco.com/en/US/docs/ios/12_3/security/command/reference/sec_i2g.html#wp110374

QUESTION 214
Which two statements are true about bandwidth guarantee? (Choose two)

A.    When congestion isn’t present, the bandwidth command doesn’t allow exceeding the allocated rate.
B.    When congestion is present, the bandwidth command allows exceeding the allocated rate
C.    When congestion is present, the bandwidth command doesn’t allow exceeding the allocated rate
D.    When congestion isn’t present, the bandwidth command allows exceeding the allocated rate

Answer: BD
Explanation:
http://www.cisco.com/en/US/tech/tk543/tk757/technologies_tech_note09186a0080103eae.shtml

QUESTION 215
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router? (Choose three.)

A.    LDAP
B.    ICMP
C.    RTP
D.    BGP
E.    SSH
F.    RDP

Answer: BDE
Explanation:
Control Plane Security and Packet QoS Overview
To protect the CP on a router from DoS attacks and to provide packet QoS, the Control Plane Policing feature treats the CP as a separate entity with its own ingress (input) and egress (output) ports, which are like ports on a router and switch. Because the Control Plane Policing feature treats the CP as a separate entity, a set of rules can be established and associated with the ingress and egress port of the CP.
These rules are applied only after the packet has been determined to have the CP as its destination or when a packet exits from the CP. Thereafter, you can configure a service policy to prevent unwanted packets from progressing after a specified rate limit has been reached; for example, a system administrator can limit all TCP/SYN packets that are destined for the CP to a maximum rate of 1 megabit per second. Input CP services are executed after router input port services and a routing decision on the input path have been made. As shown in Figure 2, CP security and packet QoS are applied on:
An aggregate level by the central switch engine and applied to all CP packets received from all line cards on the router (see Aggregate Control Plane Services) A distributed level by the distributed switch engine of a line card and applied to all CP packets received from all interfaces on the line card (see Distributed Control Plane Services) Figure 2 Input Control Plane Services: Aggregate and Distributed Services

clip_image001

The following types of Layer 3 packets are forwarded to the control plane and processed by aggregate and distributed control plane policing:
Routing protocol control packets
Packets destined for the local IP address of the router Packets from management protocols (such as Simple Network Management Protocol [SNMP], Telnet, and secure shell [SSH])
Note Ensure that Layer 3 control packets have priority over other packet types that are destined for the control plane.
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gtrtlimt.html

QUESTION 216
What is a characteristic of Network Time Protocol?

A.    NTP updates are sent in the timezone they are collected in, and the syslog server will adjust based
on the input time.
B.    NTP authentication verifies the source, not the recipient.
C.    NTP authentication requires that the recipient has multiple strata clocks to ensure accuracy.
D.    Secure NTP can be configured to use SHA-1 hashing, since NTP is very insecure.
E.    A stratum 0 clock should be configured at the core of every network, so it can connect to an accurate
time source.

Answer: B
Explanation:
http://www.ine.com/resources/01700369.htm

QUESTION 217
You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?

A.    routing issue
B.    denial-of-service attack
C.    MAC flooding
D.    spanning-tree recalculation
E.    Layer 2 loop
F.    ARP spoofing attack

Answer: F
Explanation:
http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a00801f9eb3.shtml

QUESTION 218
You are the network administrator of an enterprise company that just deployed a global IP telephony environment. In order to guarantee good voice quality, you asked your provider to implement QoS on the CE routers of your MPLS network. On your LAN, you have also deployed QoS.
Users, however, keep complaining about bad voice quality, and the provider does not see matches on the DSCP values that you have asked him to match upon. What is most likely the problem?

A.    The phones are not sending traffic with the correct DSCP value.
B.    The Cisco CallManager is not marking the traffic correctly.
C.    This is most likely a bug on the CE routers.
D.    Your LAN QoS is incorrectly configured.

Answer: D
Explanation:
Show ip ospf rib
To display information for the OSPF local Routing Information Base (RIB) or locally redistributed routes, use the show ip ospf rib command in privileged EXEC mode. Show ip ospf process-id rib [redistribution] [network-prefix] [network-mask] [detail] Reference
http://www.cisco.com/en/US/docs/ios/iproute_ospf/command/reference/iro_osp3.html

QUESTION 219
Which configuration would make an IP SLA probe use a precedence value of 5?

A.    ip sla 1
icmp-echo 1.1.1.1
tos 160
B.    ip sla 1
icmp-echo 1.1.1.1
tos 20
C.    ip sla 1
icmp-echo 1.1.1.1
precedence 5
D.    ip sla 1
icmp-echo 1.1.1.1
dscp 20

Answer: A
Explanation:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip sla monitor operation-number
4. type echo protocol ipIcmpEcho {destination-ip-address | destination-hostname} [source-ipaddr {ip-address |
hostname} | source-interface interface-name]
5. buckets-of-history-kept size
6. distributions-of-statistics-kept size
7. enhanced-history [interval seconds] [buckets number-of-buckets]
8. filter-for-history {none | all | overThreshold | failures}
9. frequency seconds
10. hours-of-statistics-kept hours
11. lives-of-history-kept lives
12. owner owner-id
13. request-data-size bytes
14. statistics-distribution-interval milliseconds
15. tag text
16. threshold milliseconds
17. timeout milliseconds
18. tos number
19. verify-data
20. vrf vrf-name
21. exit
22. ip sla monitor schedule operation-number [life {forever | seconds}] [start-time {hh:mm[:ss] [month day | day
month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring]
23. exit
24. show ip sla monitor configuration [operation-number] tos number Example:
Router(config-sla-monitor-echo)# tos 160
(Optional) Defines a type of service (ToS) byte in the IP header of an IP SLAs operation.
http://www.cisco.com/en/US/docs/ios/12_4/ip_sla/configuration/guide/hsicmp.html

QUESTION 220
Multicast is being deployed in the network, and only ip pim sparse-dense mode has been configured on all interfaces in the network to support a new video streaming application. No other multicast configuration was applied anywhere in the network. Since enabling multicast, the network monitoring tools show periodic spikes in link utilization throughout the network, even in areas where the video application is not being used. What could be a possible cause?

A.    PIM sparse mode is being used.
B.    PIM dense mode is being used.
C.    The BGP multicast address family has not been configured.
D.    IGMP version 3 is being used.
E.    IP PIM neighbor filters have not been applied.

Answer: B
Explanation:
PIM DM builds source-based multicast distribution trees. In dense mode, a PIM DM router or multilayer switch assumes that all other routers or multilayer switches forward multicast packets for a group. If a PIM DM device receives a multicast packet and has no directly connected members or PIM neighbors present, a prune message is sent back to the source to stop unwanted multicast traffic. Subsequent multicast packets are not flooded to this router or switch on this pruned branch because branches without receivers are pruned from the distribution tree, leaving only branches that contain receivers.

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

2014 Latest Cisco 350-001 Dump Free Download(201-210)!

QUESTION 201
Which router is doing LSA type 7 to type 5 translation, and why?

A.    Both RTA and RTB will do LSA7/5 translation, since they are both NSSA ABRs.
B.    RTA will do LSA7/5 translation, since it has the lower router ID.
C.    RTB will do LSA7/5 translation, since it has the higher router ID.
D.    The redistributing router will do LSA7/5 translation, since it is within the NSSA.

Answer: C
Explanation:
http://www.hh.se/download/18.4cf286ee134f03ddb7b800015/1326882212358/Chapter3_VT2012.
pdf (see slide 36)

QUESTION 202
Which mechanism does OSPFv3 use when the router LSA is too big to be sent out?

A.    It relies on IPv6 to do the fragmenting.
B.    It splits the LS Update packet into smaller packets.
C.    It splits the LSA into smaller router LSA packets.
D.    It produces an error.

Answer: C
Explanation:
http://en.wikipedia.org/wiki/User:Wbenton

QUESTION 203
Which statement is correct about an OSPF sham-link?

A.    A sham-link is a logical link between PE routers that provides an OSPF adjacency between the
PE routers and forwards customer traffic across it.
B.    A sham-link is a logical link between PE routers that provides an OSPF adjacency between the
PE routers and carries OSPF LSAs.
C.    A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer
traffic across it.
D.    A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers
and carries OSPF LSAs.
E.    A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers
and forwards customer traffic across it.

Answer: B
Explanation:
http://www.juniper.net/techpubs/en_US/junose11.0/information-products/topic- collections/swconfig-bgp-mpls/jd0e45628.html (search for sham links)

QUESTION 204
Which three factors have the biggest influence on OSPF scalability? (Choose three.)

A.    Flooding paths and redundancy
B.    Amount of routing information in the OSPF area or routing domain
C.    Number of routers with Cisco Express Forwarding enabled
D.    Number of neighbor adjacencies
E.    Other routing protocols in use
F.    OSPF timer reconstruction negotiation
G.    Redistribution with BGP neighbors
H.    Redistribution with other IGP routing protocols, such as RIP or EIGRP

Answer: ABD
Explanation:
http://www.ciscopress.com/articles/article.asp?p=1763921&seqNum=6 (see factors influencing OSPF scalability)

QUESTION 205
Refer to the exhibit. Which statement is correct?

clip_image002
A.    Group 232.1.1.1 will be in SSM mode, but without the access-list ssm-groups it would also be in
SSM mode.
B.    Group 232.1.1.1 will not be in SSM mode yet; some further configuration is needed.
C.    Group 232.1.1.1 can never be in SSM mode, regardless of any configuration.
D.    Group 232.1.1.1 will be in SSM mode because of the access-list ssm-groups.
E.    Group 232.1.1.1 is not in SSM mode yet; a different access-list would be needed to achieve this.

Answer: D
Explanation:
http://networklessons.com/multicast/source-specific-multicast-ssm/

QUESTION 206
What is the RP for IPv6 multicast address FF76:0130:2001:db8:3811::2323?

A.    2001:db8:3811::1
B.    2001:db8:3811::2323
C.    2001:db8:3811::0130
D.    2001:db8:3811::3
E.    2001:db8:3811::6

Answer: A
Explanation:
Embedded RP defines an address allocation policy in which the address of the RP is encoded in an IPv6 multicast group address. This allows an easy deployment of scalable inter-domain multicast and simplifies the intra-domain multicast configuration as well. IPv6 Multicast group addresses embedded with RP information start with ff70::/12 where the flag value of 7 means embedded RP.

clip_image001
There is no need to pre-configure routers with the RP address information. Routers can automatically extract and use the RP information from the IPv6 multicast group address. This allows for a large number of RPs to be deployed anywhere in the Internet. Embedded RP requires no change in protocol operations. It can be considered an automatic replacement for static RP configuration.
The router can learn only one RP address for a multicast group using embedded RP. It cannot support RP redundancy. Proposals are being considered to introduce RP redundancy by mechanisms other than BSR for IPv6 multicast. Embedded RP does not support Bidirectional PIM. Embedded RP allows the application to dictate which router is the RP. There is the possibility that a low-end router could end up becoming the RP for hundreds of high data rate sources if the application defines an erroneous RP address (this can be prevented by disabling Embedded RP learning).
For more information on Embedded RP, see RFC3956.
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6552/whitepaper_c11- 508498.html

QUESTION 207
What is the default behaviour of PIM-SSM If there are multiple equal-cost paths to the multicast source?

A.    It will send the join only to the neighbor with the highest IP address.
B.    It will send the join only to the neighbor with the lowest IP address.
C.    It will send the join in a round-robin fashion across all neighbors.
D.    It will send the join to all neighbors.

Answer: A
Explanation:
By default, for Protocol Independent Multicast sparse mode (PIM-SM), Source Specific Multicast (PIMSSM), bidirectional PIM (bidir-PIM), and PIM dense mode (PIM-DM) groups, if multiple equal- cost paths are available, Reverse Path Forwarding (RPF) for IPv4 multicast traffic is based on the PIM neighbor with the highest IP address. This method is referred to as the highest PIM neighbor behavior. This behavior is in accordance with RFC 2362 for PIM-SM, but also applies to PIM-SSM, PIM-DM, and bidir-PIM.

QUESTION 208
What does the command ip pim send-rp-discovery scope 16 achieve?

A.    it enables PIM BSR
B.    it makes the router an Auto-RP mapping agent
C.    it advertises the router as an RP with Auto-RP
D.    it makes the router an Auto-RP client

Answer: B
Explanation:
If no ip pim rp-announce-filter commands are configured, a router enabled to be an RP mapping agent (using the ip pim send-rp-discovery command) will accept all RP announcements for all groups from all C-RPs. Configure one or more ip pim rp-announce-filter commands on RP mapping agents to filter unwanted RP messages.

clip_image002
ip pim send-rp-announce
To use Auto-RP to configure groups for which the router will act as a rendezvous point (RP), use the ip pim send-rp-announce command in global configuration mode. To unconfigure this router as an RP, use the no form of this command.
ip pim [vrf vrf-name] send-rp-announce {interface-type interface-number | ip-address} scopettl- value [group-list access-list] [interval seconds] [bidir] no ip pim [vrf vrf-name] send-rp-announce {interface-type interface-number | ip-address}
Syntax Description

clip_image002[4]

http://www.cisco.com/en/US/docs/ios/ipmulti/command/reference/imc_04.html

QUESTION 209
Which command can be used to check the assignment of RPs to multicast groups?

A.    show ip pim rendez-vous
B.    show ip rpf rp mapping
C.    show ip pim rp mapping
D.    show ip pim rp info
E.    show ip pim

Answer: C
Explanation:
show ip pim rp mapping
Use this command to check the RP assignment by multicast group range, and to verify that the source of RP learning (static or auto-RP) and the mapping are correct. If you find an error, check the local router configuration or auto-RP configuration.
R1# show ip pim rp mapping
PIM Group-to-RP Mappings
Group(s) 224.0.1.40/32
RP 192.168.7.2 (?), v1
Info source: local, via Auto-RP
Uptime: 2d00h, expires: never
Group(s): 224.0.0.0/4, Static
RP: 192.168.7.2 (?)
http://www.cisco.com/en/US/tech/tk828/technologies_tech_note09186a0080093f21.
shtml#showippimrpmapping

QUESTION 210
Refer to the exhibit. Which two statements are correct? (Choose two.)

clip_image002[6]

A.    The packet is received on the private interface.
B.    Zone-Based Firewall is configured on the router.
C.    Logging is enabled for the access list.
D.    Private is an identification of that ACE.
E.    The Telnet connection is successfully set up.

Answer: CD
Explanation:
The log and log-input Access Control Entry Options
The log and log-input options apply to an individual ACE and cause packets that match the ACE to be logged.
The log-input option enables logging of the ingress interface and source MAC address in addition to the packet’s source and destination IP addresses and ports. The first packet logged via the log or log-input options will generate a syslog message. There are two scenarios in which subsequent log messages will not be sent immediately. If the log-enabled ACE matches another packet with identical characteristics to the packet that generated a log message, the number of packets matched is incremented and then reported at five-minute intervals. Similarly, if any log-enabled ACE in any ACL on any interface matches a packet within one second of the initial log message, the match or matches are counted for five minutes and then reported. These periodic updates will contain the number of packets matched since the previous message.
http://www.cisco.com/web/about/security/intelligence/acl-logging.html#2 http://www.cisco.com/en/US/docs/app_ntwk_services/data_center_app_services/ace_appliances/v A1_7_/ configuration/system/message/guide/config.html
http://www.cisco.com/en/US/docs/interfaces_modules/services_modules/ace/v3.00_A2/configurat ion/system/message/guide/config.html

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001

1 2 3