2014 Latest Cisco 350-001 Dump Free Download(31-40)!

Which two are effects of connecting a network segment that is running 802.1D to a network
segment that is running 802.1w? (Choose Two.)

A.    the entire network switches to 802.1D and generates BPDUs to determine root bridfe status.
B.    A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge
comes up
C.    The entire network reconverges and a unique root briddge for the 802.1D segment, and a root bridge
for the 802.1W segment, is chosen
D.    the first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1D compatibility mode
and converts the BPDUs to either 802.1D or 802.1W segments of the network
E.    Classic 802.1D timers, Such as forward Delay and Max-age, will only be used as a backup, and will
not be necessary if point-to-point links and edge prots are properly identified and set by the administrator.

Answer: BE
Each port maintains a variable that defines the protocol to run on the corresponding segment. A migration delay timer of three seconds also starts when the port comes up. When this timer runs, the current STP or RSTP mode associated to the port is locked. As soon as the migration delay expires, the port adapts to the mode that corresponds to the next BPDU it receives. If the port changes its mode of operation as a result of a BPDU received, the migration delay restarts. 802.1D works by the concept that the protocol had to wait for the network to converge before it transitioned a port into the forwarding state. With Rapid Spanning Tree it does not have to rely on any timers, the only variables that that it relies on is edge ports and link types. Any uplink port that has an alternate port to the root can be directly placed into the forwarding state (This is the Rapid convergence that you speak of “restored quickly when RSTP is already in use?”). This is what happened when you disconnected the primary look; the port that was ALT, moved to FWD immediately, but the switch also still needs to create a BDU with the TC bit set to notify the rest of the network that a topology has occurred and all non-edge designated ports will transition to BLK, LRN, and then FWD to ensure there are no loops in the rest of the network. This is why if you have a host on a switchport, and you know for a fact that it is only one host, enable portfast to configure the port as an edgeport so that it does not have to transition to all the STP states.

Which command is used to enable Etherchannel hashing for layer 3 IP and Layer 4 Port-based

A.    mpls ip cef
B.    port-channel ip cef
C.    mpls ip port-channel cef
D.    port-channel load balance
E.    mpls ip load-balance
F.    ip cef etherchannel channel-id XOR L4
G.    ip cef connection exchange

Answer: D
Port-channel load balance is normally used for enable etherchannel hashing for Layer 3 IP and Layer 4 port based CEF.

In 802.1s, how is the VLAN to instance mapping represented in the BPDU?

A.    The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.
B.    The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.
C.    The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.
D.    The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.

Answer: C
MST Configuration and MST Region
Each switch running MST in the network has a single MST configuration that consists of these three attributes:
1. An alphanumeric configuration name (32 bytes)
2. A configuration revision number (two bytes)
3. A 4096-element table that associates each of the potential 4096 VLANs supported on the chassis to a given instance.
In order to be part of a common MST region, a group of switches must share the same configuration attributes.It is up to the network administrator to properly propagate the configuration throughout the region. Currently, this step is only possible by the means of the command line interface (CLI) or through Simple Network
Management Protocol (SNMP). Other methods can be envisioned, as the IEEE specification does not explicitly mention how to accomplish that step.
Note: If for any reason two switches differ on one or more configuration attribute, the switches are part of different regions. For more information refer to the Region Boundary section of this document.
Region Boundary
In order to ensure consistent VLAN-to-instance mapping, it is necessary for the protocol to be able to exactly identify the boundaries of the regions. For that purpose, the characteristics of the region are included in the BPDUs. The exact VLANs-to-instance mapping is not propagated in the BPDU, because the switches only need to know whether they are in the same region as a neighbor. Therefore, only a digest of the VLANs-toinstance mapping table is sent, along with the revision number and the name. Once a switch receives a BPDU, the switch extracts the digest (a numerical value derived from the VLAN-to-instance mapping table through a mathematical function) and compares this digest with its own computed digest. If the digests differ, the port on which the BPDU was received is at the boundary of a region.
In generic terms, a port is at the boundary of a region if the designated bridge on its segment is in a different region or if it receives legacy 802.1d BPDUs. In this diagram, the port on B1 is at the boundary of region A, whereas the ports on B2 and B3 are internal to region B:

MST Instances
According to the IEEE 802.1s specification, an MST bridge must be able to handle at least these two instances:
One Internal Spanning Tree (IST)
One or more Multiple Spanning Tree Instance(s) (MSTIs)
The terminology continues to evolve, as 802.1s is actually in a pre-standard phase. It is likely these names will change in the final release of 802.1s. The Cisco implementation supports 16 instances:
one IST (instance 0) and 15 MSTIs.
show vtp status
Cisco switches “show vtp status” Field Descriptions has a MD5 digest field that is a 16-byte checksum of the
VTP configuration as shown below
Router# show vtp status
VTP Version: 3 (capable)
Configuration Revision: 1
Maximum VLANs supported locally: 1005
Number of existing VLANs: 37
VTP Operating Mode: Server
VTP Domain Name: [smartports]
VTP Pruning Mode: Disabled
VTP V2 Mode: Enabled
VTP Traps Generation: Disabled
MD5 digest : 0x26 0xEE 0x0D 0x84 0x73 0x0E 0x1B 0x69
Configuration last modified by at 7-25-08 14:33:43 Local updater ID is on interface Gi5/2 (first layer3 interface fou) VTP version running: 2

Which three combinations are valid LACP configurations that will set up a channel? (Choose

A.    On/On
B.    On/Auto
C.    Passive/Active
D.    Desirable/Auto
E.    Active/Active
F.    Desirable/Desirable

Answer: ACE
http://www.cisco.com/en/US/products/hw/switches/ps663/products_configuration_example09186 a0080094aec.shtml (pagp and lacp modes, see the table)

Which two options does Cisco PfR use to control the entrance link selection with inbound
optimization? (Choose two.)

A.    Prepend extra AS hops to the BGP prefix.
B.    Advertise more specific BGP prefixes (longer mask).
C.    Add (prepend) one or more communities to the prefix that is advertised by BGP.
D.    Have BGP dampen the prefix.

Answer: AC
http://www.cisco.com/en/US/docs/ios-xml/ios/pfr/configuration/15-2s/pfr-bgp- inbound.html#GUID-F8A59E24-1D59-4924-827D-B23B43D9A8E0

Which two orders in the BGP Best Path Selection process are correct? (Choose two.)

A.    Higher local preference, then lowest MED, then eBGP over iBGP paths
B.    Higher local preference, then highest weight, then lowest router ID
C.    Highest weight, then higher local preference, then shortest AS path
D.    Lowest origin type, then higher local preference, then lowest router ID
E.    Highest weight, then higher local preference, then highest MED

Answer: AC
Weight is the first attribute BGP uses in the route selection process. Route with a higher weight is preferred when multiple routes exist to the same destination.

What is the first thing that happens when IPv6 is enabled on an interface on a host?

A.    A router solicitation is sent on that interface.
B.    There is a duplicate address detection on the host interface.
C.    The link local address is assigned on the host interface.
D.    A neighbor redirect message is sent on the host interface.

Answer: B
Duplicate address detection (DAD) is used to verify that an IPv6 home address is unique on the LAN before assigning the address to a physical interface (for example, QDIO). z/OS Communications Server responds to other nodes doing DAD for IP addresses assigned to the interface.
http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=%2Fcom.ibm.zos.r12.hale001 %2Fipv6d0021002145.htm

What is the flooding scope of an OSPFv3 LSA, if the value of the S2 bit is set to 1 and the S1 bit is set to 0?

A.    link local
B.    area wide
C.    AS wide
D.    reserved

Answer: C
The Type 1 router LSA is now link local and the Type 2 Network LSA is AS Wide S2 and S1 indicate the LSA’s flooding scope. Table 9-1 shows the possible values of these two bits and the associated flooding scopes.

Table 9-1 S bits in the OSPFv3 LSA Link State Type field and their associated flooding scopes
LSA Function Code, the last 13 bits of the LS Type field, corresponds to the OSPFv2 Type field. Table 9-2 shows the common LSA types used by OSPFv3 and the values of their corresponding LS Types. If you decode the hex values, you will see that the default U bit of all of them is 0. The S bits of all LSAs except two indicate area scope. Of the remaining two, AS External LSAs have an AS flooding scope and Link LSAs have a linklocal flooding scope. Most of the OSPFv3 LSAs have functional counterparts in OSPFv2; these OSPFv2 LSAs and their types are also shown in Table 9-2. Table 9-2 OSPFv3 LSA types and their OSPFv2 counterparts



How will EIGRPv6 react if there is an IPv6 subnet mask mismatch between the Global Unicast
addresses on a point-to-point link?

A.    EIGRPv6 will form a neighbor relationship.
B.    EIGRPv6 will not form a neighbor relationship.
C.    EIGRPv6 will form a neighbor relationship, but with the log MSG: “EIGRPv6 neighbor not on a
common subnet.”
D.    EIGRPv6 will form a neighbor relationship, but routes learned from that neighbor will not be
installed in the routing table.

Answer: A
Answer: A

Which two tunneling techniques support IPv6 multicasting? (Choose two.)

A.    6to4
B.    6over4
D.    6PE
E.    GRE

Answer: BE
When IPv6 multicast is supported (over a 6to4 tunnel), an IPv6 multicast routing protocol must be used
Restrictions for Implementing IPv6 Multicast
IPv6 multicast for Cisco IOS software uses MLD version 2. This version of MLD is fully backward- compatible with MLD version 1 (described in RFC 2710). Hosts that support only MLD version 1 will interoperate with a router running MLD version 2. Mixed LANs with both MLD version 1 and MLD version 2 hosts are likewise supported.
IPv6 multicast is supported only over IPv4 tunnels in Cisco IOS Release 12.3(2)T, Cisco IOS Release 12.2
(18)S, and Cisco IOS Release 12.0(26)S.
When the bidirectional (bidir) range is used in a network, all routers in that network must be able to understand the bidirectional range in the bootstrap message (BSM). IPv6 multicast routing is disabled by default when the ipv6 unicast-routing command is configured. On Cisco Catalyst 6500 and Cisco 7600 series routers, the ipv6 multicast-routing also must be enabled in order to use IPv6 unicast routing
http://www.cisco.com/web/about/ac123/ac147/ac174/ac197/ about_cisco_ipj_archive_article09186a00800c830a.html
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-multicast.html https://supportforums.cisco.com/thread/183386

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.