2014 Latest Cisco 350-001 Dump Free Download(281-290)!

QUESTION 281
Where should frame-relay traffic shaping be applied?

A.    on the physical interface
B.    on the subinterface
C.    under the frame-relay map class
D.    on any of the above

Answer: A
Explanation:
http://blog.ine.com/2008/01/22/legacy-frts/ (first bullet on the page)

QUESTION 282
How can excess packets be remarked?

A.    shaping
B.    policing
C.    priority
D.    all of the above

Answer: B
Explanation:
http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a00800a3a25.shtml (see the table – first row)

QUESTION 283
Which feature is used to translate several internal addresses to only one or a few external addresses (also referred to as “overload”)?

A.    Network Address Translation
B.    Address Translation Table
C.    Overload Address Method
D.    Port Address Translation

Answer: D
Explanation:
The PAT feature, a subset of NAT functionality, can be used to translate several internal addresses into only one or a few external addresses. PAT uses unique source port numbers on the private global IP address to distinguish between translations. Because the port number is encoded in 16 bits, the total number could theoretically be as high as 65,536 per IP address. PAT will attempt to preserve the original source port number. If this number is already allocated then PAT will attempt to find the first available port number starting from the beginning of the appropriate port group 0?511, 512?023, or 1024?55351. If there is still no port number available from the appropriate group and more than one IP address is configured, PAT will move to the next IP address in the pool and try to allocate the original source port number again. This continues until it runs out of available ports and IP addresses.

QUESTION 284
Which protocol should be used in order to configure first hop redundancy between a Cisco router and a router from another company?

A.    HSRP
B.    VRRP
C.    GLBP
D.    IRDP

Answer: B
Explanation:
http://www.cisco.com/en/US/docs/ios-xml/ios/ipapp_fhrp/configuration/xe-3s/asr1000/fhp- vrrs.html

QUESTION 285
Which three protocols or applications should be placed in a class that is configured with WRED? (Choose three.)

A.    RTP
B.    streaming video
C.    SMTP
D.    SSH
E.    BitTorrent

Answer: CDE
Explanation:
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfwred_ps1835_TSD_Produ cts_Configuration_Guide_Chapter.html

QUESTION 286
Which QoS mechanism will rate-limit traffic, and limit drops by implementing queuing?

A.    Shaper
B.    Policer
C.    WRED
D.    Rate-Limit
E.    LLQ
F.    Fair-Queue

Answer: A
Explanation:
http://www.cisco.com/en/US/tech/tk543/tk545/technologies_tech_note09186a00800a3a25.shtml

QUESTION 287
What is the default queuing mechanism on slow serial interfaces?

A.    FIFO
B.    WFQ
C.    CQ
D.    LLQ
E.    WRR

Answer: A
Explanation:
Using FIFO in the software queue works just like FIFO in the hardware queue, where you are not truly performing packet manipulation. FIFO is the default queuing method on interfaces that run at speeds of greater than 2.048 Mbps.
Although FIFO is supported widely on all IOS platforms, it can starve out traffic by allowing bandwidth-hungry flows to take an unfair share of the bandwidth.

QUESTION 288
Which two statements are true about traffic shaping? (Choose two.)

A.    Shaping buffers excess packets.
B.    It is applied in the incoming direction only.
C.    Shaping can remark excess packets.
D.    It supports interaction with frame relay congestion indication.

Answer: AD

QUESTION 289
Which three configuration items are required to enable SSH on a router? (Choose three.)

A.    a domain name
B.    an RSA key
C.    a hostname
D.    a self-signed certificate
E.    a RADIUS server
F.    a username and password

Answer: ABC
Explanation:
http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfssh.html (prerequisites to configuring SSH)

QUESTION 290
Refer to the exhibit. Considering the following policer, which statement is valid?

A.    The Tc interval equals 125 ms
B.    Traffic exceeding 8 kb/s is systematically dropped
C.    The policer allows an excess burst of 1 kb
D.    The policer allows traffic to peak to 16 kb/s for the duration of a Tc interval if no traffic passed over
the previous interval
E.    Traffic exceeding 8 kb/s is never dropped

Answer: D
Explanation:
As per the exhibit, you can see the policer allows traffic to peak to 16 kb/s for the duration of a Tc interval if no traffic passed over the previous interval \

If you want to pass the Cisco 350-001 Exam sucessfully, recommend to read latest Cisco 350-001 Dump full version.

clip_image001