2014 Latest Cisco 350-001 Dump Free Download(231-240)!

QUESTION 231
Which two EIGRP options will limit a query domain? (Choose two.)

A.    configuring EIGRP stubs
B.    configuring a second EIGRP AS and redistributing
C.    configuring summary addresses
D.    configuring an offset-list
E.    configuring a prefix-list
F.    configuring unicast neighbors

Answer: AC
Explanation:
Summarization in EIGRP also solves a problem unique to EIGRP: query scoping. EIGRP queries do not stop until they come to a dead-end; because of this, they can loop. Route convergence cannot proceed until all replies have been received. Summarization limits queries by stating: “only these routes are found past this point.” Summarizing at logical points in the network is important to prevent stuck in active (SIA)

QUESTION 232
Which three options are valid ways to filter routes from a BGP peer? (Choose three.)

A.    filter-list
B.    inbound ACL
C.    route-map
D.    outbound ACL
E.    prefix-list
F.    neighbor 10.0.0.1 deny-map my-map command

Answer: ACE
Explanation:
http://www.cisco.com/en/US/docs/ios/12_0/np1/configuration/guide/1cbgp.html#wp7487

QUESTION 233
What is the correct command to set the router ID for an OSPFv3 process?

A.    router-id 1.2.3.4
B.    router-id 2011::1
C.    router-id Loopback0
D.    router-id FF02::5

Answer: A
Explanation:
Stub Router
ipv6 unicast-routing
ipv6 cef
!
interface serial 0/0
no ip address
ipv6 enable
ipv6 address 2001:ABAB::/64 eui-64
ipv6 ospf 1 area 2
!
ipv6 router ospf 1
router-id 3.3.3.3
area 2 stub
!
http://www.cisco.com/en/US/tech/tk872/technologies_configuration_example09186a0080b40d8a.
shtml

QUESTION 234
Which three message types are valid PIMv2 message types? (Choose three.)

A.    Register
B.    Register-Stop
C.    Join/Prune
D.    Reject
E.    Register-Prune
F.    Register-Join

Answer: ABC
Explanation:
PIMv2 message types:
hello: 0
Register (used in PIM-SM only): 1
Register-Stop (used in PIM-SM only): 2
Join/Prune: 3
Bootstrap (used in PIM-SM only): 4
Assert:5
Graft (used in PIM-DM only): 6
Graft-Ack (used in PIM-DM only): 7
Candidate-RP-Advertisement (used in PIM-SM only): 8

QUESTION 235
Which multicast address is reserved for cisco-rp-discovery?

A.    224.0.1.37
B.    224.0.1.38
C.    224.0.1.39
D.    224.0.1.40

Answer: D
Explanation:
Auto-RP is a mechanism to automate distribution of RP information in a multicast network. The Auto-RP mechanism operates using two basic components, the candidate RPs and the RP mapping agents.
Candidate RPs advertise their willingness to be an RP via “RP-announcement” messages. These messages are periodically sent to a reserved well-known group 224.0.1.39 (CISCO-RP-ANNOUNCE). RP mapping agents join group 224.0.1.39 and map the RPs to the associated groups. The RP mapping agents advertise the authoritative RP-mappings to another well-known group address 224.0.1.40 (CISCORP-DISCOVERY). All PIM routers join 224.0.1.40 and store the RP-mappings in their private cache.
Figure 2 shows the Auto-RP mechanism where the RP mapping agent periodically multicasts the RP information that it receives to the Cisco-RP-Discovery group.

clip_image001[4]
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6552/whitepaper_c11- 508498.html

QUESTION 236
Which message type is constructed and sent from an MSDP router to its MSDP peers when it receives a PIM register message (knowing that the MSDP router is also configured as an RP for the PIM domain)?

A.    Source-Active Message
B.    PIM Join
C.    PIM Hello
D.    MSDP Register

Answer: A
Explanation:
Information About MSDP
You can use the Multicast Source Discovery Protocol (MSDP) to exchange multicast source information between multiple BGP-enabled Protocol Independent Multicast (PIM) sparse-mode domains.
When a receiver for a group matches the group transmitted by a source in another domain, the rendezvous point (RP) sends PIM join messages in the direction of the source to build a shortest path tree. The designated router (DR) sends packets on the source-tree within the source domain, which may travel through the RP in the source domain and along the branches of the source-tree to other domains. In domains where there are receivers, RPs in those domains can be on the source-tree. The peering relationship is conducted over a TCP connection. Figure 6-1 shows four PIM domains. The connected RPs (routers) are called MSDP peers because each RP maintains its own set of multicast sources. Source host 1 sends the multicast data to group 224.1.1.1. On RP 6, the MSDP process learns about the source through PIM register messages and generates Source-Active (SA) messages to its MSDP peers that contain information about the sources in its domain. When RP 3 and RP 5 receive the SA messages, they forward them to their MSDP peers. When RP 5 receives the request from host 2 for the multicast data on group 224.1.1.1, it builds a shortest path tree to the source by sending a PIM join message in the direction of host 1 at 192.1.1.1.

clip_image001[6]
When you configure MSDP peering between each RP, you create a full mesh. Full MSDP meshing is typically done within an autonomous system, as shown between RPs 1, 2, and 3, but not across autonomous systems.
You use BGP to do loop suppression and MSDP peer-RPF to suppress looping SA messages. For more information about mesh groups, see the “MSDP Mesh Groups” section.
Note
You do not need to configure MSDP in order to use Anycast-RP (a set of RPs that can perform load balancing and failover) within a PIM domain. For more information, see the “Configuring a PIM Anycast-RP Set” section.
For detailed information about MSDP, see RFC 3618.
http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/multicast/configuration/guide/msdp.html

QUESTION 237
Which command is used to enable SSM with the range 232.0.0.0 – 255.0.0.0?

A.    ip pim ssm
B.    ip pim ssm 232.0.0.0 255.0.0.0
C.    ip pim ssm range 50
D.    access-list 50 permit 232.0.0.0 15.255.255.255
E.    ip pim enable default

Answer: A
Explanation:
http://books.google.com.pk/books?id=2Nhv8mdg-
o4C&pg=PA202&lpg=PA202&dq=ip+pim+ssm+enable+SSM+with+the+range+232.0.0.0+- +255.0.0.0&source=bl&ots=ycFzpApLQk&sig=HUz9vxpttyXErIthl14DkZwIo8w&hl=en&sa=X&ei=ZTLLUamUCozY4QTXxoHYBQ&ved=0CEUQ6AEwBQ#v=onepage&q=ip%20pim%20ssm%20enable%20SSM %20with%20the%20range%20232.0.0.0%20-%20255.0.0.0&f=false

QUESTION 238
Which two are differences between IGMPv2 and IGMPv3 reports? (Choose two.)

A.    IGMPv3 has the ability to include or exclude source lists.
B.    All IGMPv3 hosts send reports to destination address 224.0.0.22.
C.    Only IGMPv2 reports may contain multiple group state records.
D.    All IGMPv3 hosts send reports to destination address 224.0.0.23.
E.    IGMPv2 does not support the Leave Group message.

Answer: AB
Explanation:
Version 3 Reports are sent with an IP destination address of 224.0.0.22, to which all IGMPv3-capable multicast routers listen. A system that is operating in version 1 or version 2 compatibility modes sends version 1 or version 2 Reports to the multicast group specified in the Group Address field of the Report.
There are a number of different types of Group Records that may be included in a Report message:
A “Current-State Record” (in response to a Query)
MODE_IS_INCLUDE INCLUDE()
MODE_IS_EXCLUDE EXCLUDE()
A “Filter-Mode-Change Record” (when the filter mode change) CHANGE_TO_INCLUDE_MODE TO_IN()
CHANGE_TO_EXCLUDE_MODE TO_EX()
A “Source-List-Change Record” (when the source list change) ALLOW_NEW_SOURCES ALLOW()
BLOCK_OLD_SOURCES BLOCK()
http://alor.antifork.org/talks/IGMP-v3.ppt

QUESTION 239
Which two statements about SA caching are true? (Choose two.)

A.    Caching allows pacing of MSDP messages.
B.    Caching reduces join latency.
C.    Caching should not be done by an MSDP speaker.
D.    Caching is used to update the BGP MDT address family.

Answer: AB
Explanation:
A MSDP speaker MUST cache SA messages. Caching allows pacing of MSDP messages as well as reducing join latency for new receivers of a group G at an originating RP which has existing MSDP (S, G) state. In addition, caching greatly aids in diagnosis and debugging of various problems.
http://www.ietf.org/rfc/rfc3618.txt

QUESTION 240
What is true about Unicast RPF in strict mode?

A.    It works well with a multihomed environment.
B.    It will inspect IP packets that are encapsulated in tunnels, such as GRE, LT2P, or PPTP.
C.    uRPF is performed within the CEF switching path.
D.    There might be a problem with DHCP as Unicast RPF is blocking packets with a 0.0.0.0 source address.

Answer: C
Explanation:
Understanding uRPF ?Unicast Reverse Path Forwarding
Spoofed packets are a big problem with on the Internet, they are commonly used in DNS amplification attacks, and TCP SYN floods. Unfortunately there is no simple way to totally fix all spoofed packets on the Internet but if service providers implement ingress filtering on their network, it effectively stops such attacks with spoofed source addresses coming from their patch. The process is actually standardised Best Practice in BCP 38 “Network Ingress Filtering” which all service providers should implement if they have Internet facing services for good karma. There are a number of ways of implementing ingress filtering, one of the technically simplest is to create ACLs of your customers global address ranges and only allow packets sourced from those ranges to leave your network. Configuration wise Unicast Reverse Path Forwarding (uRPF) is in my opinion the simplest way of managing this and it has a couple of extra features. uRPF checks incoming unicast packets and validates that a return path exists, there is not much point in forwarding a packet if it doesnt know how to return it right? There are 2 methods of implementation of uRPF strict and loose. Strict mode is where the source of the packet is reachable via the interface that it came from, this is nice for extra security on the edge of your network but not so good if you have multiple edges towards the Internet eg you peer at multiple IXPs where you might expect asymmetric routing. In such cases loose mode is used which checks that a return route exists in the routing table.
Configuration
The configuration is super simple, after CEF has been enabled just go to the interface you wish to check inbound traffic and use the following command, with the “rx” option for strict mode or “any” for loose mode.
Router(config-if)#ip verify unicast source reachable-via
Any Source is reachable via any interface rx Source is reachable via interface on which packet was received Verification
Obviously you can check the running config to see if its configured but if your a fan of using other show commands its visible under the sh cef interface and sh ip interface as shown below; Router#sh cef interface fastEthernet 0/0 | i RPF
IP unicast RPF check is enabled
Router# sh ip int fa0/0 | i verify
IP verify source reachable-via RX

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001