2014 Latest Cisco 350-001 Dump Free Download(41-50)!
QUESTION 41
Which two OSPF LSA types are new in OSPF version 3? (Choose two.)
A. Link
B. NSSA external
C. Network link
D. Intra-area prefix
E. AS domain
Answer: AD
Explanation:
New LSA Types
OSPFv3 carries over the seven basic LSA types we’re familiar with from OSPFv2. However, the type 1 and 2 LSAs have been re-purposed, as will be discussed in a bit. OSPFv3 also introduces two new LSA types: Link and Intra-area Prefix.
http://packetlife.net/blog/2010/mar/2/ospfv2-versus-ospfv3/
QUESTION 42
What action will a BGP route reflector take when it receives a prefix marked with the community
attribute NO ADVERTISE from a client peer?
A. It will advertise the prefix to all other client peers and non-client peers.
B. It will not advertise the prefix to EBGP peers.
C. It will only advertise the prefix to all other IBGP peers.
D. It will not advertise the prefix to any peers.
Answer: D
Explanation:
BGP requires that all BGP peers in the same autonomous system form an iBGP session with all peers in the autonomous system. This is too difficult in many environments. Route reflectors are fully functional iBGP speakers that form iBGP sessions with other iBGP speakers, and they also perform a second function – they forward routes from other iBGP speakers to route reflector clients. The route reflector clients and clients form a cluster.
QUESTION 43
Refer to the Exhibit. The displayed QoS configuration has been configured on a router.
IPv6 is being implemented on the router, and it is required to convert the QoS policy to support both IPv4 and IPv6 on the same class.
Which alternative configuration would allow matching DSCP AF41 for both IPv4 and IPv6 on the
same class map?
A. Class-map match-all CLASS1
Match dscp af41
B. Class-map match-all CLASS1
Match ip dscp af41
Match ipv6 dscp af41
C. Class-map match-any CLASS1
Match ip dscp af41
Match ipv6 dscp af41
D. Class-map match-any CLASS1
Match qos-group af41
Answer: A
QUESTION 44
Voice quality is bad due to high delay and jitter on a link. Which two actions will improve the quality of voice calls? (Choose two.)
A. Increase the queue size of the voice class.
B. Guarantee bandwidth during congestion to the voice class with a bandwidth command.
C. Increase the tx-ring of the egress interface.
D. Implement LLQ for the voice class.
E. Decrease the rx-ring of the egress interface.
F. Decrease the queue size of the voice class.
Answer: DF
Explanation:
http://www.cisco.com/en/US/docs/ios/voice/monitor/configuration/guide/vt_qos_voip_tbsh.pdf
QUESTION 45
Which three statements accurately describe a link-state routing protocol? (Choose three.)
A. Each router sends routing information to all nodes in the flooding domain.
B. Each router sends all or some portion of its routing table to neighboring routers.
C. Each router individually builds a picture of the entire flooding domain.
D. Each router has knowledge of all other routers in the flooding domain.
E. Each router is only aware of neighboring routers.
F. Each router installs routes directly from the routing updates into the routing table.
Answer: ACD
QUESTION 46
While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?
A. a routing protocol that is flooding updates
B. a flapping port that is generating BPDUs with the TCN bit set
C. STP is not running on the switch
D. a user that is downloading the output of the show-tech command
E. a corrupted switch CAM table
Answer: B
Explanation:
Spanning-Tree Protocol Topology Changes
Another common issue caused by flooding is Spanning-Tree Protocol (STP) Topology Change Notification (TCN). TCN is designed to correct forwarding tables after the forwarding topology has changed. This is necessary to avoid a connectivity outage, as after a topology change some destinations previously accessible via particular ports might become accessible via different ports. TCN operates by shortening the forwarding table aging time, such that if the address is not relearned, it will age out and flooding will occur. TCNs are triggered by a port that is transitioning to or from the forwarding state. After the TCN, even if the particular destination MAC address has aged out, flooding should not happen for long in most cases since the address will be relearned. The issue might arise when TCNs are occurring repeatedly with short intervals. The switches will constantly be fast-aging their forwarding tables so flooding will be nearly constant. Normally, a TCN is rare in a well-configured network. When the port on a switch goes up or down, there is eventually a TCN once the STP state of the port is changing to or from forwarding. When the port is flapping, repetitive TCNs and flooding occurs.
Ports with the STP portfast feature enabled will not cause TCNs when going to or from the forwarding state. Configuration of portfast on all end-device ports (such as printers, PCs, servers, and so on) should limit TCNs to a low amount. Refer to this document for more information on TCNs:
Understanding Spanning-Tree Protocol Topology Changes Note: In MSFC IOS, there is an optimization that will trigger VLAN interfaces to repopulate their ARP tables when there is a TCN in the respective VLAN. This limits flooding in case of TCNs, as there will be an ARP broadcast and the host MAC address will be relearned as the hosts reply to ARP.
http://www.cisco.com/en/US/products/hw/switches/ps700/products_tech_note09186a00801d080 8.shtml
QUESTION 47
Your network is suffering from regular outages. After troubleshooting, you learn that the transmit lead of a fiber uplink was damaged. Which two features can prevent the same issues in the
future? (Choose two.)
A. root guard
B. loop guard
C. BPDU guard
D. UDLD
E. BPDU skew detection
Answer: BD
Explanation:
STP Loop Guard
The STP loop guard feature provides additional protection against Layer 2 forwarding loops (STP loops). An STP loop is created when an STP blocking port in a redundant topology erroneously transitions to the forwarding state. This usually happens because one of the ports of a physically redundant topology (not necessarily the STP blocking port) no longer receives STP BPDUs. In its operation, STP relies on continuous reception or transmission of BPDUs based on the port role. The designated port transmits BPDUs, and the non-designated port receives BPDUs. When one of the ports in a physically redundant topology no longer receives BPDUs, the STP conceives that the topology is loop free. Eventually, the blocking port from the alternate or backup port becomes designated and moves to a forwarding state. This situation creates a loop. The loop guard feature makes additional checks. If BPDUs are not received on a non-designated port, and loop guard is enabled, that port is moved into the STP loop-inconsistent blocking state, instead of the listening / learning / forwarding state. Without the loop guard feature, the port assumes the designated port role. The port moves to the STP forwarding state and creates a loop.
Loop Guard versus UDLD
Loop guard and Unidirectional Link Detection (UDLD) functionality overlap, partly in the sense that both protect against STP failures caused by unidirectional links. However, these two features differ in functionality and how they approach the problem. This table describes loop guard and UDLD functionality:
Based on the various design considerations, you can choose either UDLD or the loop guard feature. In regards to STP, the most noticeable difference between the two features is the absence of protection in UDLD against STP failures caused by problems in software. As a result, the designated switch does not send BPDUs.
However, this type of failure is (by an order of magnitude) more rare than failures caused by unidirectional links. In return, UDLD might be more flexible in the case of unidirectional links on EtherChannel. In this case, UDLD disables only failed links, and the channel should remain functional with the links that remain. In such a failure, the loop guard puts it into loop-inconsistent state in order to block the whole channel.
Additionally, loop guard does not work on shared links or in situations where the link has been unidirectional since the link-up. In the last case, the port never receives BPDU and becomes designated. Because this behavior could be normal, this particular case is not covered by loop guard.
UDLD provides protection against such a scenario.
As described, the highest level of protection is provided when you enable UDLD and loop guard.
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a0080094640.
shtml#loop_guard_vs_uld
QUESTION 48
Which feature would prevent guest users from gaining network access by unplugging an IP phone
and connecting a laptop computer?
A. IPSec VPN
B. SSL VPN
C. port security
D. port security with statically configured MAC addresses
E. private VLANs
Answer: D
Explanation:
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/port _sec.html#wp1061587
QUESTION 49
After applying a new ACL on a device, its CPU utilization rose significantly and many messages
starting with “%SEC-6-IPACCESSLOG” appeared on the Syslog server.
What can be done to resolve this situation?
A. Increase memory allocation for ACLs.
B. Remove all entries from the ACL and use a single permit ip any any statement.
C. Remove the log keyword from each ACL entry.
D. Reboot the device after the ACL has been applied.
Answer: C
Explanation:
http://www.networksa.org/?p=347
QUESTION 50
You are the network administrator of a medium-sized company, and users are complaining that
they cannot send emails to some organizations. During your troubleshooting, you notice that your DNS MX record is blacklisted by several public blacklist filters. After clearing these listings for your IP address, and assuming that your email server has the right virus protection in place, what are two possible solutions to prevent this from happening in the future? (Choose two.)
A. Change your Internet provider.
B. Change your public IP address.
C. Allow the email server to send traffic only to TCP port 25.
D. Put your email server in a DMZ.
E. Use a separate public IP address for your email server only.
Answer: CE
Explanation:
http://www.parkansky.com/tutorials/dmz.htm
If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.