2014 Latest Cisco 350-001 Dump Free Download(171-180)!
Which one of the following potential issues is eliminated by using split horizon?
A. Joined horizons
B. Packet forwarding loops
C. cisco Express Forwarding load-balancing inconsistency
D. Asymmetric routing throughout the network
Split horizon is a base technique used to reduce the chance of routing loops. Split horizon states that it is never useful to send information about a route back in the direction from which the information came and therefore routing information should not be sent back to the source from which it came. In fact, only the interfaces are considered for the direction, not the neighbors. Note that this rule works well not only for routes learned via a distance vector routing protocol but also for routes installed in a routing table as directly connected networks. As they reside on the same network, the neighbors do not need any advertisements on a path to that shared network.
The split horizon rule helps prevent two-node (two-neighbor) routing loops and also improves performance by eliminating unnecessary updates.
Phase I and Phase II DMVPN differ in terms of which of these characteristics?
A. Utilization of spoke-to-spoke dynamic tunnels
B. Utilization of multipoint GRE tunnels at the hub site
C. Utilization of hub-to-spoke dynamic tunnels
D. Support for multicast
Phase 1: Hub and spoke functionality
Phase 2: Spoke-to-spoke functionality
Phase 3: Architecture and scaling
DMVPN Phase 1 Benefits Simplified and Smaller Config’s for Hub and Spoke Zero touch provisioning for adding spokes to the VPN Easily supports dynamically addressed CPEs DMVPN Phase 2 Benefits Future Functionality On-demand spoke-to-spoke tunnels avoids dual encrypts/ decrypts Smaller spoke CPE can participate in the virtual full mesh
Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?
A. End system
Policy-based routing (PBR) provides a mechanism for expressing and implementing forwarding/routing of data packets based on the policies defined by the network administrators. It provides a more flexible mechanism for routing packets through routers, complementing the existing mechanism provided by routing protocols.
Policy-based routing allows network administrators to determine and implement routing policies to allow or deny paths based on the following:
• Identity of a particular end system
• Size of packets
Two routers are connected by a serial link, and are configured to run EIGRP on all interfaces. You examine the EIGRP neighbor table on both routers (using the show ip eigrp neighbor command)
and see that the router connected over the serial link is listed as a neighbor for a certain amount of time, but is periodically removed from the neighbor table. None of the routes from the neighbor
ever seem to be learned, and the neighbor transmission statistics (SRTT, RTO, and Q Count)
seem to indicate that no packets are being transmitted between the neighbors. Which would most
likely cause this problem?
A. While multicast packets are being successfully sent over the link, unicast packets are not
B. There is a bug in the EIGRP code that needs to be fixed.
C. This is correct behavior for the first few minutes of EIGRP neighbor formation. After four or five
cycles, it should straighten itself out and the neighbor
D. The hello or hold intervals are set differently on the two routers.
EIGRP uses five packet types:
Hellos are multicast for neighbor discovery/recovery. They do not require acknowledgment. A hello with no data is also used as an acknowledgment (ack). Acks are always sent using a unicast address and contain a nonzero acknowledgment number.
Updates are used to convey reachability of destinations. When a new neighbor is discovered, update packets are sent so the neighbor can build up its topology table. In this case, update packets are unicast. In other cases, such as a link cost change, updates are multicast. Updates are always transmitted reliably. Queries and replies are sent when destinations go into Active state. Queries are always multicast unless they are sent in response to a received query. In this case, it is unicast back to the successor that originated the query. Replies are always sent in response to queries to indicate to the originator that it does not need to go into Active state because it has feasible successors. Replies are unicast to the originator of the query. Both queries and replies are transmitted reliably. Request packets are used to get specific information from one or more neighbors. Request packets are used in route server applications. They can be multicast or unicast. Requests are transmitted unreliably.
Which two steps below should you perform on the hub router while configuring EIGRP routing over
DMVPN (mGRE tunnel)? (Choose two.)
A. Set the NHRP hold time to match the EIGRP hold time
B. Add the enable eigrp stub command
C. Add the disable eigrp as-member split-horizon command
D. Add the disable eigrp as-member next-hop-self command
To stop EIGRP from assign hub as the next hop for all routes if you don’t disable split horizon on the tunnel interface you will only see the routes the hub itself is responsible for from a spoke router. When configuring an EIGRP AS you use the tunnel network id as a network you want to participate on with EIGRP.
Area Border Router (ABR) is a router located on the border of one or more OSPF areas that
connect those areas to the backbone network. An ABR will inject a default route into which two
types of areas? (Choose two.)
A. Area 0
C. Totally stubby
Totally Stub Areas: These areas do not allow routes other than intra-area and the default routes to be propagated within the area. The ABR injects a default route into the area and all the routers belonging to this area use the default route to send any traffic outside the area. Stub Areas: These areas do not accept routes belonging to external autonomous systems (AS); however, these areas have inter-area and intra-area routes. In order to reach the outside networks, the routers in the stub area use a default route which is injected into the area by the Area Border Router (ABR). A stub area is typically configured in situations where the branch office need not know about all the routes to every other office, instead it could use a default route to the central office and get to other places from there. Hence the memory requirements of the leaf node routers is reduced, and so is the size of the OSPF database.
For the following protocols, which one provides a mechanism to transparently intercept and
redirect CIFS traffic from a client to a local Cisco Wida Area Application engine?
A. Virtual Router Redundancy Protocol (VRRP)
B. File Transport Protocol (FTP)
C. Hot Standby Routing Protocol (HSRP)
D. Web Cache Communication Protocol (WCCP)
Web Cache Control Protocol
The Web Cache Control Protocol (WCCP) feature allows you to use a Cisco Cache Engine to handle web traffic, thus reducing transmission costs and downloading time. This traffic includes user requests to view pages and graphics on World Wide Web servers, whether internal or external to your network, and the replies to those requests. shows a sample WCCP network configuration. Figure 1 Sample Cisco Cache Engine Network Configuration
When a user (client) requests a page from a web server (located in the Internet, in this case), the router sends the request to a Cisco Cache Engine (Cache 1, Cache 2, or Cache 3). If the cache engine has a copy of the requested page in storage, the engine sends the user that page. Otherwise, the engine gets the requested page and the objects on that page from the web server, stores a copy of the page and its objects (caches them), and forwards the page and objects to the user. WCCP transparently redirects HTTP requests from the intended server to a Cisco Cache Engine. End users do not know that the page came from the cache engine rather than the originally requested web server. The Using the Cisco Cache Engine publication contains detailed information about the Cisco Cache Engine and discusses alternative network configurations.
For the following items,what is the mathematical relationship between the committed information
rate (CIR), committed burst (Bc), and committed rate measurement interval (Tc)?
A. CIR = TC / Bc
B. CIR = Be / Tc
C. Tc = CIR / Bc
D. Tc = Bc / CIR
Terminologies: The term CIR refers to the traffic rate for a VC based on a business contract.
Tc is a static time interval, set by the shaper.
Committed burst (Bc) is the number of bits that can be sent in each Tc. Be is the excess burst size, in bits. This is the number of bits beyond Bc that can be sent after a period of inactivity.
When two bridges are competing for the root bridge of an IEEE 802.1D spanning tree and both
have the same bridge priority configured, which parameter determines the winner?
A. highest-numbered IP interface
B. MAC address
C. device uptime
D. root port cost
Select a root bridge. The root bridge of the spanning tree is the bridge with the smallest (lowest) bridge ID.
Each bridge has a unique identifier (ID) and a configurable priority number; the bridge ID contains both numbers. To compare two bridge IDs, the priority is compared first. If two bridges have equal priority, then the MAC addresses are compared. For example, if switches A (MAC=0200.0000.1111) and B (MAC=0200.0000.2222) both have a priority of 10, then switch A will be selected as the root bridge. If the network administrators would like switch B to become the root bridge, they must set its priority to be less than 10.
For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w
network except the root bridge?
A. root port
B. backup port
C. designated port
D. alternate port
The root bridge does not have a root port as this is the port on all non-root bridges that is used to communicate with the root bridge. All ports on the root bridge are designed ports.
If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.