2014 Latest Cisco 350-001 Dump Free Download(161-170)!

QUESTION 161
As a network administrator, can you tell me what the root guard feature provides in a
bridgednetwork?

A.    It ensures that BPDUs sent by the root bridge are forwarded in a timely manner
B.    It enforces the root bridge placement in the network
C.    It ensures that all ports receiving BPDUs from the root bridge are in the forwarding state.
D.    It ensures that the bridge is elected as root bridge in the network.

Answer: B
Explanation:
Root Guard–Enabled per port; ignores any received superior BPDUs to prevent a switch connected to this port from becoming root. Upon receipt of superior BPDUs, this switch puts the port in a loop- inconsistent state, ceasing forwarding and receiving frames until the superior BPDUs cease. The STP topology can be changed based on one of these unexpected and undesired switches being added to the network. For instance, this newly added and unexpected switch might have the lowest bridge ID and become the root. To prevent such problems, BPDU Guard and Root Guard can be enabled on these access ports to monitor for incoming BPDUs.

QUESTION 162
If you have overlapping IP address between two different networks or routing domains, which two
commands are needed to globally configure NAT to get this to work?

A.    ip nat outside source static udp x.x.x.x y.y.y.y and ip nat inside source udp x.x.x.x y.y.y.y
B.    ip nat outside source static x.x.x.x y.y.y.y and ip nat inside source static x.x.x.x y.y.y.y
C.    ip nat outside source static tcp x.x.x.x y.y.y.y and ip nat outside source tcp x.x.x.x y.y.y.y
D.    ip nat outside source list 1 interface x and ip nat inside source list 1 interface x

Answer: B
Explanation:
IP nat outside source list
Translates the source of the IP packets that are traveling outside to inside. Translates the destination of the IP packets that are traveling inside to outside
IP nat inside source list Translates the source of IP packets that are traveling inside to outside. Translates the destination of the IP packets that are traveling outside to inside

QUESTION 163
Two directly connected routers, R1 and R2, are both configured for OSPF graceful restart. R2 is
able to switch packets in hardware, but R1 is not. If a network administrator logs on to R2 and
performs a system reload, which will be the result?

A.    Traffic forwarded from R2 to or through R1 will continue to be forwarded based on the forwarding
table state at the time of the reload. OSPF will
B.    R2 will continue to forward traffic to R1, but R1 will drop the traffic because its neighbor adjacency
with R2 has failed.
C.    R2 will continue forwarding traffic to and through R1, but R1 will drop this traffic because it is not
capable of maintaining its forwarding state
D.    All the traffic R2 is forwarding to or through R1 will be dropped while OSPF rebuilds its neighbor
adjacency and forwarding tables.

Answer: A

QUESTION 164
In which way can the IPv6 address of 2031:0000:130F:0000:0000:09C0:876A:130B be expressed
most efficiently?

A.    2031:0:130F:0:0:09C0:876A:130B
B.    2031::130F::9C0:876A:130B
C.    2031:0:130F::9C0:876A:130B
D.    2031:0:130F:0:0:9C0:876A:130B

Answer: C
Explanation:
IPv6 Addressing Notation
IP addresses change significantly with IPv6. IPv6 addresses are 16 bytes (128 bits) long rather than four bytes (32 bits). This larger size means that IPv6 supports more than 300,000,000,000,000,000,000,000,000,000,000,000,000 possible addresses! As an increasing number of cell phones and other consumer electronics expand their networking capability and require their own addresses, the smaller IPv4 address space will eventually run out and IPv6 become mandatory.
IPv6 addresses are generally written in the following form:
hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh:hhhh
In this full notation, pairs of IPv6 bytes are separated by a colon and each byte in turns is represented as a pair of hexadecimal numbers, like in the following example:
E3D7:0000:0000:0000:51F4:9BC8:C0A8:6420
As shown above, IPv6 addresses commonly contain many bytes with a zero value. Shorthand notation in IPv6 removes these values from the text representation (though the bytes are still present in the actual network address) as follows:
E3D7::51F4:9BC8:C0A8:6420
Finally, many IPv6 addresses are extensions of IPv4 addresses. In these cases, the rightmost four bytes of an IPv6 address (the rightmost two byte pairs) may be rewritten in the IPv4 notation. Converting the above example to mixed notation yields E3D7::51F4:9BC8:192.168.100.32 IPv6 addresses may be written in any of the full, shorthand or mixed notation illustrated above.
http://compnetworking.about.com/od/tcpiptutorials/a/ipaddrnotation.htm

QUESTION 165
Internet Protocol version 6 (IPv6) is the next-generation Internet Layer protocol for
packet-switched internetworks and the Internet. IPv6 router solicitation is:

A.    A request made by a node for the IP address of the local router
B.    A request made by a node to join a specified multicast group
C.    A request made by a node for a DHCP provided IP address
D.    A request made by a node for the IP address of the DHCP server

Answer: A
Explanation:
In cases when the host (computer or server) needs to prompt an immediate router advertisement, it sends what is called as a Router Solicitation. Examples of this include commands for re-booting or re- starting a running computer. The system is alerted through router solicitation. Router solicitation messages belong to the ICMPv6 set of messages, specific to the IPv6 protocol. They are identified by a Next Header value “x’3A and decimal 58. An IPv6 router solicitation is closely associated to the Neighbor Discovery (ND) function of the IPv6. Under this, the hosts or routers obtain or discover the link-layer addresses for elements that reside on attached links (neighbor) and to cleansed or purge spaces with cached values that are no longer functioning.

QUESTION 166
Which two types of QoS functionality will be provided by Network-Based Application Recognition?
(Choose two.)

A.    NBAR provides the ability to configure MCQ; it is a mandatory MCQ component.
B.    NBAR provides deep packet inspection and is used for advanced packet classification.
C.    NBAR provides per-protocol packet and byte accounting functionality; it is used to track bandwidth
utilization for all protocols described in the loaded PDLMs.
D.    NBAR provides scheduling in an MQC policy map using an advanced algorithm.

Answer: BC
Explanation:
NBAR classes packets that are normally difficult to classify. For instance, some applications use dynamic port numbers. NBAR can look past the UDP and TCP header, and refer to the host name, URL, or MIME type in HTTP requests.

QUESTION 167
Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?

A.    IPsec site-to-site VPN
B.    Cisco AutoSecure
C.    Cisco IOS Firewall
D.    IPS

Answer: C
Explanation:
CBAC is a function of the Cisco IOS feature set. CBAC is configured using the “ip inspect” command. The ip inspect inspection-name {in | out} command is used to apply the inspection rule to an interface. The keyword in is used for inbound traffic when the CBAC is applied on the internal (trusted, or secure) interface. The keyword out is used for outbound traffic when the CBAC is applied on the external, unsecured interface
http://www.ciscopress.com/articles/article.asp?p=26533

QUESTION 168
If a Cisco switch is configured with VTPv1 in transparent mode, what is done with received VTP
advertisements?

A.    They are discarded
B.    The contents are altered to reflect the switch’s own VTP database and then they are forward out
all trunking ports
C.    The changes within the advertisements are made to the switch’s VTP database.
D.    The contents are ignored and they are forwarded out all trunking ports.

Answer: D
Explanation:
VTPv1 & VTPv2 are the same in regards to Transparent mode VTP advertisements. Therefore the Transparent mode switch will NOT update it’s local VTP database but WILL forward the VTP advertisement out all of it’s trunk ports.

QUESTION 169
Refer to the following descriptions, which three are true about Cisco spanning-tree features?
(Choose three.)

A.    RPVST+ converges faster than RSTP during a topology change.
B.    STP BPDUs are relayed by all non-root bridges and RSTP BPDUs are generated by each bridge.
C.    RSTP can only achieve rapid transition to Forwarding on edge ports and on point-to-point links.
D.    RPVST+ and RSTP are both based upon the IEEE 802.1w specification.

Answer: BCD
Explanation:
PVST+ is per-VLAN spanning tree (which is the default for most cisco switches). It means that you will run an spanning-tree instance per VLAN. This is useful when you need different layer 2 behaviors per VLAN, for example you can have different root bridge on different VLANs (so that spanning tree does not have to run as a whole on the layer 2 domain, but can run a different instance per- VLAN) RSTP is rapid STP. It is an enhancement to STP. RSTP does not work with timers as regula
r STP (which takes up to 30-50 seconds to converge due to the transition to all its states) Regular STP can use port-fast for ports not connected to other switches, but all ports connected to other switches need to transition from blocking to listening, learning and finally forwarding. RSTP optimizes this by using P2P links and taking up to only 2 seconds to converge.
RPVST+ Is a mix of PVST+ and RSTP. You have an instance of rapid STP running per VLAN. Also, some use MST which is another variance of STP which can group several VLANs to be part of a single MST region (and behave like RSTP inside that region). MST is useful because if you have 1000 VLANs, normally you don’t need to have 1000 STP/RSTP instances! You can instead have one instance with VLAN 1-500 and another instance with VLANs 501-1000 (just to give you an example)

QUESTION 170
Which switch port error is an indication of duplex mismatches on 10/100/1000 IEEE 802.3u
Gigabit Ethernet ports?

A.    FCS errors
B.    Runts
C.    Multiple collisions
D.    Alignment errors

Answer: C
Explanation:
Communication is possible over a connection in spite of a duplex mismatch. Single packets are sent and acknowledged without problems. As a result, a simple ping command fails to detect a duplex mismatch because single packets and their resulting acknowledgments at 1-second intervals do not cause any problem on the network. A terminal session which sends data slowly (in very short bursts) can also communicate successfully. However, as soon as either end of the connection attempts to send any significant amount of data, the network suddenly slows to very low speed. Since the network is otherwise working, the cause is not so readily apparent.
A duplex mismatch causes problems when both ends of the connection attempt to transfer data at the same time. This happens even if the channel is used (from a high-level or user’s perspective) in one direction only, in case of large data transfers. Indeed, when a large data transfer is sent over a TCP, data is sent in multiple packets, some of which will trigger an acknowledgment packet back to the sender. This results in packets being sent in both directions at the same time. In such conditions, the full-duplex end of the connection sends its packets while receiving other packets; this is exactly the point of a full-duplex connection. Meanwhile, the half-duplex end cannot accept the incoming data while it is sending — it will sense it as a collision. The half-duplex device ceases its current transmission and then retries later as per CSMA/CD. As a result, when both devices are attempting to transmit at the same time, packets sent by the full-duplex end will be lost and packets sent by the half duplex device will be delayed or lost. The lost packets force the TCP protocol to perform error recovery, but the initial (streamlined) recovery attempts fail because the retransmitted packets are lost in exactly the same way as the original packets. Eventually, the TCP transmission window becomes full and the TCP protocol refuses to transmit any further data until the previously-transmitted data is acknowledged. This, in turn, will quiescence the new traffic over the connection, leaving only the retransmissions and acknowledgments. Since the retransmission timer grows progressively longer between attempts, eventually a retransmission will occur when there is no reverse traffic on the connection, and the acknowledgments are finally received. This will restart the TCP traffic, which in turn immediately causes lost packets as streaming resumes. The end result is a connection that is working but performs extremely poorly because of the duplex mismatch. Symptoms of a duplex mismatch are connections that seem to work fine with a ping command, but “lock up” easily with very low throughput on data transfers; the effective data transfer rate is likely to be asymmetrical, performing much worse in one direction than the other. In normal half-duplex operations late collisions do not occur. However, in a duplex mismatch the collisions seen on the half-duplex side of the link are often late collisions. The full-duplex side usually will register frame check sequence errors, or runt frames. Viewing these standard Ethernet statistics can help diagnose the problem.
Contrary to what one might reasonably expect, both sides of a connection need to be identically configured for proper operation. In other words, setting one side to automatic (either speed or duplex or both) and setting the other to be fixed (either speed or duplex or both) will result in a speed mismatch, a duplex mismatch or both. A duplex mismatch can be fixed by either enabling autonegotiation (if available and working) on both ends or by forcing the same settings on both ends (availability of a configuration interface permitting). If there is no option but to have a locked setting on one end and autonegotiation the other (for example, an old device with broken autonegotiation connected to an unmanaged switch) half duplex must be used. All modern LAN equipment comes with autonegotiation enabled and the various compatibility issues have been resolved. The best way to avoid duplex mismatches is to use autonegotiation and to replace any legacy equipment that does not use autonegotiation or does not autonegotiate correctly.

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001