2014 Latest Cisco 350-001 Dump Free Download(21-30)!

QUESTION 21
A new Backup Connection is being deployed on a remote site router. the stability of the connection has been a concern. in order to provide more information to EIGRP Regarding this interface, You wish to incorporate the “Reliability” cost metric in the EIGRP Calculation with the command metric weights 1 0 1 0 1.
What impact will this modification on the remote site router have for other existing EIGRP
neighborships from the same EIGRP Domain?

A.    Existing Neighbors will immediately begin using the new metric.
B.    Existing Neighbors will use the new metric after clearing the EIGRP Neighbors.
C.    Existing Neighbors will resync, maintaining the neighbor relationship
D.    All ecisting neighbor relationships will go down

Answer: D
Explanation:
For eigrp Neighbor relationship to form, K values must match on both routers.

QUESTION 22
Refer to the exhibit. R1 has an EBGP session to ISP 1 and an EBGP session to ISP 2. R1 receives the same prefixes through both links.
Which configuration should be applied so that the link between R1 and ISP 2 will be preferred for outgoing traffic (R1 to ISP 2)?

clip_image001

A.    Increase local preference on R1 for routes received from ISP2.
B.    Decrease local preference on R1 for routes received from ISP2.
C.    Increase MED on ISP 2 for routes received from R1.
D.    Decrease MED on ISP 2 for routes received from R1.

Answer: A
Explanation:
Local preference is an indication to the AS about which path has preference to exit the AS in order to reach a certain network. A path with higher local preference is preferred more. The default value of preference is 100.
http://www.cisco.com/en/US/tech/tk872/technologies_configuration_example09186a0080b82d1f.shtml

QUESTION 23
When you are troubleshooting duplex mismatches, which two errors are typically seen on the
fullduplex end? (Choose two.)

A.    runts
B.    FCS errors
C.    interface resets
D.    late collisions

Answer: AB
Explanation:
FCS, or File Check Sequence Errors, are one of the more common errors found in a network. When packets are transmitted and received, each contains a File Check Sequence that allows the receiving device to determine if the packet is complete without having to examine each bit. This is a type of CRC, or Cyclical Redundancy Check. Barring a station powering up or down during a transmission, the most common cause of these errors is noise. Network noise can be caused by cabling being located too close to noise sources such as lights, heavy machinery, etc. If a cabling installation is particularly faulty — such as pairs being untwisted, improper terminations, field terminated patch cables, etc. — these errors will occur on your network. Poorly manufactured components or minimally compliant components that are improperly installed can compound this issue. Cabling segments that are too long can also cause these errors.
Cabling issues, as defined above, or MAC layer packet formation issues (possibly hardware related) cause these errors. A faulty LAN driver can also cause this. Replacement of the driver will correct the latter issue. These errors can also be seen in correlation with RUNT packets or packets that are too short. Noise, however, is the most common cause and can generally be corrected by addressing the cabling channel.

QUESTION 24
Which two options are contained in a VTP subset advertisement? (Choose two.)

A.    followers field
B.    MD5 digest
C.    VLAN information
D.    sequence number

Answer: CD
Explanation:
Subset Advertisements
When you add, delete, or change a VLAN in a Catalyst, the server Catalyst where the changes are made increments the configuration revision and issues a summary advertisement. One or several subset advertisements follow the summary advertisement. A subset advertisement contains a list of VLAN information.
If there are several VLANs, more than one subset advertisement can be required in order to advertise all the VLANs.
Subset Advertisement Packet Format

clip_image001[5]
This formatted example shows that each VLAN information field contains information for a different VLAN. It is ordered so that lowered-valued ISL VLAN IDs occur first:

clip_image001[7]
Most of the fields in this packet are easy to understand. These are two clarifications:
Code — The format for this is 0x02 for subset advertisement. Sequence number — This is the sequence of the packet in the stream of packets that follow a summary advertisement. The sequence starts with 1.
Advertisement Requests
A switch needs a VTP advertisement request in these situations:
The switch has been reset.
The VTP domain name has been changed.
The switch has received a VTP summary advertisement with a higher configuration revision than its own.
Upon receipt of an advertisement request, a VTP device sends a summary advertisement. One or more subset advertisements follow the summary advertisement. This is an example:

clip_image001[9]

Code–The format for this is 0x03 for an advertisement request. Start-Value–This is used in cases in which there are several subset advertisements. If the first (n) subset advertisement has been received and the subsequent one (n+1) has not been received, the Catalyst only requests advertisements from the (n+1)th one.
http://www.cisco.com/en/US/tech/tk389/tk689/technologies_tech_note09186a0080094c52.shtml

QUESTION 25
Which two statements are true about traffic shaping? (Choose two.)

A.    Out-of-profile packets are queued.
B.    It causes TCP retransmits.
C.    Marking/remarking is not supported.
D.    It does not respond to BECN and ForeSight Messages.
E.    It uses a single/two-bucket mechanism for metering.

Answer: AC
Explanation:
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CCwQFjAA&url=http%3A%2F%2Fstaffweb.itsligo.ie%2Fstaff%2Fpflynn%2FTelecoms%25203%2FSlides%2FONT%2520Mod%25204%2520Lesson%25207.ppt&ei=LoDIUfTTGtO3hAeQz4HQCA&usg=AFQjCNGY24UkAfy8tKIHlz Em9gfoIjv6fg&sig2=t4UIzkZ12wnO2988dEDyug&bvm=bv.48293060,d.ZG4 (slide 6)

QUESTION 26
Which three options are features of VTP version 3? (Choose three.)

A.    VTPv3 supports 8K VLANs.
B.    VTPv3 supports private VLAN mapping.
C.    VTPv3 allows for domain discovery.
D.    VTPv3 uses a primary server concept to avoid configuration revision issues.
E.    VTPv3 is not compatible with VTPv1 or VTPv2.
F.    VTPv3 has a hidden password option.

Answer: BDF
Explanation:
Key Benefits of VTP Version 3
Much work has gone into improving the usability of VTP version 3 in three major areas:
The new version of VTP offers better administrative control over which device is allowed to update other devices’ view of the VLAN topology. The chance of unintended and disruptive changes is significantly reduced, and availability is increased. The reduced risk of unintended changes will ease the change process and help speed deployment.
Functionality for the VLAN environment has been significantly expanded. Two enhancements are most beneficial for today’s networks:
?In addition to supporting the earlier ISL VLAN range from 1 to 1001, the new version supports the whole IEEE 802.1Q VLAN range up to 4095.
?In addition to supporting the concept of normal VLANs, VTP version 3 can transfer information regarding Private VLAN (PVLAN) structures.
The third area of major improvement is support for databases other than VLAN (for example, MST).
Brief Background on VTP Version 1 and VTP Version 2
VTP version 1 was developed when only 1k VLANs where available for configuration. A tight internal coupling of the VLAN implementation, the VLAN pruning feature, and the VTP function itself offered an efficient means of implementation. It has proved in the field to reliably support Ethernet, Token Ring, and FDDI networks via VTP.
The use of consistent VLAN naming was a requirement for successful use of VMPS (Vlan Membership Policy Server). VTP ensures the consistency of VLAN names across the VTP domain. Most VMPS implementations are likely to be migrated to a newer, more flexible and feature-rich method. To add support for Token Ring, VTP version 1 was enhanced and called VTP version 2. Certain other minor changes and enhancements were also added at this time. The functional base in VTP version 3 is left unchanged from VTP version 2, so backward compatibility is built in. It is possible, on a per link basis, to automatically discover and support VTP version 2 devices.
VTP version 3 adds a number of enhancements to VTP version 1 and VTP version 2:
Support for a structured and secure VLAN environment (Private VLAN, or PVLAN) Support for up to 4k VLANs
Feature enhancement beyond support for a single database or VTP instance Protection from unintended database overrides during insertion of new switches Option of clear text or hidden password protection
Configuration option on a per port base instead of only a global scheme Optimized resource handling and more efficient transfer of information These new requirements made a new code foundation necessary. The design goal was to make VTP version 3 a versatile vehicle. This was not only for the task of transferring a VLAN DB but also for transferring other databases-for example, the MST database.
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/solution_guide_c78_508010.
html

QUESTION 27
Which three options are considered in the spanning-tree decision process? (Choose three.)

A.    lowest root bridge ID
B.    lowest path cost to root bridge
C.    lowest sender bridge ID
D.    highest port ID
E.    highest root bridge ID
F.    highest path cost to root bridge

Answer: ABC
Explanation:
Configuration bridge protocol data units (BPDUs) are sent between switches for each port. Switches use s four step process to save a copy of the best BPDU seen on every port. When a port receives a better BPDU, it stops sending them. If the BPDUs stop arriving for 20 seconds (default), it begins sending them again.
Step 1 Lowest Root Bridge ID (BID)
Step 2 Lowest Path Cost to Root Bridge
Step 3 Lowest Sender BID
Step 4 Lowest Port ID
Reference
Cisco General Networking Theory Quick Reference Sheets

QUESTION 28
Why would a rogue host that is running a DHCP Server on a Campus LAN network present a
security risk?

A.    It may allocate IP addresses from an unknown subnet to the users
B.    all Multicast traffic can be sniffer y using the DHCO Multicasr capabilities
C.    the CPU utilization of the first hop router can be overloaded by exploiting DHCP Relay open ports
D.    A potential Man-in-the-middle Attack can be used against the clients.

Answer: D
Explanation:
A rogue DHCP server is typically used in conjunction with a network attacker who launches man-in- the-middle (MitM) attacks. MitM is an attack technique in which the attacker exploits normal protocol processing behavior to reroute normal traffic flow between two endpoints. A hacker will broadcast DHCP requests with spoofed MAC addresses, thereby exhausting the address space of the legitimate DHCP server. Once the addresses are exhausted, the rogue DHCP server provides DHCP responses to users’ DHCP requests. These responses would include DNS servers and a default gateway, which would be used to launch a MitM attack.

QUESTION 29
Which Statement is true about TCN Propagation?

A.    The originator of the TCN immediately floods this information through the network
B.    the TCN propagation is a two step process
C.    A TCN is generated and sent to the root bridge
D.    the root bridge must flood this information throught the network

Answer: C
Explanation:
New Topology Change Mechanisms
When an 802.1D bridge detects a topology change, it uses a reliable mechanism to first notify the root bridge.
This is shown in this diagram:

clip_image001[11]
Once the root bridge is aware of a change in the topology of the network, it sets the TC flag on the BPDUs it sends out, which are then relayed to all the bridges in the network. When a bridge receives a BPDU with the TC flag bit set, it reduces its bridging-table aging time to forward delay seconds. This ensures a relatively quick flush of stale information. Refer to Understanding Spanning-Tree Protocol Topology Changes for more information on this process. This topology change mechanism is deeply remodeled in RSTP. Both the detection of a topology change and its propagation through the network evolve.
Topology Change Detection
In RSTP, only non-edge ports that move to the forwarding state cause a topology change. This means that a loss of connectivity is not considered as a topology change any more, contrary to 802.1D (that is, a port that moves to blocking no longer generates a TC). When a RSTP bridge detects a topology change, these occur:
It starts the TC While timer with a value equal to twice the hello-time for all its non-edge designated ports and its root port, if necessary.
It flushes the MAC addresses associated with all these ports. Note: As long as the TC While timer runs on a port, the BPDUs sent out of that port have the TC bit set.
BPDUs are also sent on the root port while the timer is active.
Topology Change Propagation
When a bridge receives a BPDU with the TC bit set from a neighbor, these occur:
It clears the MAC addresses learned on all its ports, except the one that receives the topology change.
It starts the TC While timer and sends BPDUs with TC set on all its designated ports and root port (RSTP no longer uses the specific TCN BPDU, unless a legacy bridge needs to be notified). This way, the TCN floods very quickly across the whole network. The TC propagation is now a one step process. In fact, the initiator of the topology change floods this information throughout the network, as opposed to 802.1D where only the root did. This mechanism is much faster than the 802.1D equivalent. There is no need to wait for the root bridge to be notified and then maintain the topology change state for the whole network for <max age plus forward delay> seconds.

clip_image001[13]
In just a few seconds, or a small multiple of hello-times, most of the entries in the CAM tables of the entire network (VLAN) flush. This approach results in potentially more temporary flooding, but on the other hand it clears potential stale information that prevents rapid connectivity restitution.
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml

QUESTION 30
Which statement is true about loop guard?

A.    Loop Guard only operates on interfaces that are considered point-to-point by the spanning tree.
B.    Loop Guard only operates on root ports.
C.    Loop Guard only operates on designated ports
D.    Loop Guard only operates on edge ports

Answer: A
Explanation:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4000/8.2glx/configuration/guide/stp_enha.
html#wp1048163

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001