2014 Latest Cisco 350-001 Dump Free Download(11-20)!
Apart from interdomain multicast routing, what else is MSDP used for?
A. Source Specific Multicast and IGMPv2
B. Announcing multicast sources to BGP speakers
C. Anycast RP
D. Intradomain multicast routing
Which IGMPv2 message contains a non-zero “Max Response Time”?
A. Membership Query
B. Membership Report
C. Membership Delay
D. Backward Compatible IGMPv1 Report Message
The Max Response Time field is used only in Membership Query messages. It specifies the maximum allowed time before sending a responding report in units of 1/10 second. In all other messages, it is set to zero by the sender and ignored by receivers.
What is Phantom RP used for?
A. it is used for load balancing in bidirectional PIM
B. it is used for redundancy in bidirectional PIM
C. it is used for redundancy in PIM-SM
D. it is used for load balancing in PIM-SM
In Bidirectional PIM (Bidir-PIM), the RP does not have an actual protocol function. The RP acts as a routing vector in which all the traffic converges. The RP can be configured as an address that is not assigned to any particular device called a Phantom RP. This means that the RP address does not need to reside on a physical router interface, but can just be an address in a subnet. The RP can also be a physical router, but it is not necessary.
Which three statements are true about TACACS+? (Choose three.)
A. It is a Cisco proprietary protocol.
B. It runs on TCP port 59.
C. Authentication and authorization are done at different stages.
D. TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
E. It is an industry standard protocol.
F. TACACS+ encrypts both the entire body of the packet and the TACACS+ header.
TACACS+ utilizes TCP port 49. It consists of three separate protocols, which can be implemented on separate servers.
TACACS+ offers multiprotocol support, such as IP and AppleTalk. Normal operation fully encrypts the body of the packet for more secure communications. It is a Cisco proprietary enhancement to the original TACACS protocol.
What does Cisco recommend when you are enabling Cisco IOS IPS?
A. Do not enable all the signatures at the same time.
B. Do not enable the ICMP signature.
C. Disable the Zone-Based Policy Firewall because it is not compatible with Cisco IOS IPS.
D. Disable CEF because it is not compatible with Cisco IOS IPS.
Router memory and resource constraints prevent a router from loading all Cisco IOS IPS signatures. Thus, it is recommended that you load only a selected set of signatures that are defined by the categories. Because the categories are applied in a “top-down” order, you should first retire all signatures, followed by “unretiring” specific categories. Retiring signatures enables the router to load information for all signatures, but the router does not build the parallel scanning data structure.
Which two statements are true about Unicast Reverse Path Forwarding Loose Mode? (Choose
A. It is used in multihome network scenarios.
B. It can be used with BGP to mitigate DoS and DDoS.
C. It does not need to have CEF enabled.
D. It is enabled via the interface level command ip verify unicast reverse-path.
E. It cannot be used with “classification” access lists.
The Unicast Reverse Path Forwarding Loose Mode feature creates a new option for Unicast Reverse Path Forwarding (Unicast RPF), providing a scalable anti-spoofing mechanism suitable for use in multihome network scenarios. This mechanism is especially relevant for Internet Service Providers (ISPs), specifically on routers that have multiple links to multiple ISPs. In addition, Unicast RPF (strict or loose mode), when used in conjunction with a Border Gateway Protocol (BGP) “trigger, ” provides an excellent quick reaction mechanism that allows network traffic to be dropped on the basis of either the source or destination IP address, giving network administrators an efficient tool for mitigating denial of service (DoS) and distributed denial of service (DDoS) attacks.
Which three protocols should be explicitly managed by using a CoPP policy on an Internet border
router? (Choose three.)
Control Plane Policing (CoPP) is a Cisco IOS-wide feature designed to allow users to manage the flow of traffic handled by the route processor of their network devices. CoPP is designed to prevent unnecessary traffic from overwhelming the route processor that, if left unabated, could affect system performance. Route processor resource exhaustion, in this case, refers to all resources associated with the punt path and route processor(s) such as Cisco IOS process memory and buffers, and ingress packet queues.
What is true about IP Source Guard with port security?
A. Binding should be manually configured.
B. It is not supported if IEEE 802.1x port-based authentication is enabled
C. The DHCP server must support option 82, or the client is not assigned an IP address.
D. It filters based on source IP address only.
http://www.cisco.com/en/US/docs/switches/lan/catalyst3750x_3560x/software/release/12.2_55_s e/configuration/guide/swdhcp82.html (see enabling IP source guard, see the table ?step 3)
Which two commands are required to enable multicast on a router, knowing that the receivers only supports IGMPv2? (Choose Two)
A. IP PIM RP-address
B. IP PIM ssm
C. IP PIM Sparse-mode
D. IP PIM Passive
Sparse mode logic (pull mode) is the opposite of Dense mode logic (push mode), in Dense mode it is supposed that in every network there is someone who is requesting the multicast traffic so PIM-DM routers begin by flooding the multicast traffic out of all their interfaces except those from where a prune message is received to eliminate the “leaf” from the multicasting tree (SPT), the Source-Based Tree (S, G); as opposed to Sparse mode that send the traffic only if someone explicitly requested it. Not like Dense mode, which build a separated source-based tree (S, G) between the source and the requester of the traffic, Sparse mode mechanism is based on a fixed point in the network named Rendez-Vous point.
All sources will have to register with the RP to which they send their traffic and thereby build a source-based tree (S, G) between them and the RP (not with the final multicast receiver like in PIM-DM) and all PIM-SM routers, “whatever” multicast traffic they are requesting, have to register with the RP and build a shared-tree (*. G)
A branch router is configured with an egress QoS policy that was designed for a total number of 10 concurrent VOIP Calls.
Due to Expansion, 15 VOIP Calls are now running over the link, but after the 14th call was
established, all calls were affected and the voice quality was dramatically degraded.
Assuming that there is enough bandwidth on the link for all of this traffic, which part of the QOS configuration should be updated due to the new traffic profile?
A. Increase the shaping rate for the priority queue.
B. Remove the policer applied on the priority queue.
C. Remove the shaper applied on the preiority queue.
D. Increase the policing rate for the priority queue.
The question works on the premise that there was no congestion on the link upto the 13th call. When you please the 14th call there is congestion on the link. When there is NO congestion the priority command is allowed to take as much bandwidth as required. When there is congestion on the link the Priority command has to only use the configured bandwidth.
Adding the 14th call caused congestion, which in turn made the priority command restrict the calls to the configured value of 10 hence affect the quality of all calls.
If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.