Tải bản đầy đủ (.pdf) (92 trang)

Tài liệu Fravo Cisco 350-001 Exam Study Guide v5.0 pptx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (640.33 KB, 92 trang )






Fravo.com
Certification Made Easy



MCSE, CCNA, CCNP, OCP, CIW, JAVA, Sun Solaris, Checkpoint
World No1 Cert Guides




CCIE Written
Exam 350-001


Edition 5.0









© Copyrights 1998-2005 Fravo Technologies. All Rights Reserved.


350-001
1
Congratulations!!

You have purchased a Fravo Technologies. Study Guide.

This study guide is a complete collection of questions and answers that have
been developed by our professional & certified team. You must study the
contents of this guide properly in order to prepare for the actual certification test.
The average time that we would suggest you for studying this study guide is
approximately 15 to 20 hours and you will surely pass your exam. We guarantee
it!

GOOD LUCK!




DISCLAIMER
This study guide and/or material is not sponsored by, endorsed by or affiliated
with Microsoft, Cisco, Oracle, Citrix, CIW, CheckPoint, Novell, Sun/Solaris,
CWNA, LPI, ISC, etc. All trademarks are properties of their respective owners.




Guarantee
If you use this study guide correctly and still fail the exam, send a scanned copy
of your official score notice at:


We will gladly refund the cost of this study guide or give you an exchange of
study guide of your choice of the same or lesser value.




This material is protected by copyright law and international treaties.
Unauthorized reproduction or distribution of this material, or any portion thereof,
may result in severe civil and criminal penalties, and will be prosecuted to the
maximum extent possible under law.


© Copyrights 1998-2005 Fravo Technologies. All Rights Reserved.



350-001
2

Q1. Consider the length of the netmask of a route, the administrative distance and
the metric, what comes first when the router performs a route lookup in order to
decide which interface to be forwarded a packet out of?

A. The length of the netmask of a route.
B. The administrative distance.
C. The metric.
D. None of the above.

Answer: A



Q2. (Refer the EXHIBITS given below.)

Exhibit 1:





Exhibit 2:

hostname Router1
i
ipx routing 1000.1000.1000
i
interface Ethernet 0
IPX network ACA1234
i
interface Serial 0
encapsulation frame-relay
ipx network 100
frame-relay ipx 100.1000.1000.1001
i
ipx router rip
no network 100
i
350-001
3
ipx router EIGRP 1
i


Exhibit 3:

hostname Router2
i
ipx routing 1000.1000.1001
i
interface Ethernet 0
ipx network ACA1235
ipx gns-response-delay 10
!
interface Serial 0
encapsulation frame-relay
ipx network 100
frame-relay map ipx 100.1000.1000.1000
i
ipx router rip
no network 100
i
ipx router EIGRP 1

Will a workstation connected to Router 1 be able to attach to a server attached to
the Ethernet interface on Router 2, assuming that the Frame Relay PVCs are up and
running?

A. No - Redistribution has not been configured between EIGRP and RIP.
B. No - EIGRP will not run correctly over the Frame Relay cloud.
C. No - The GNS response delay is configured on the wrong router.
D. No - The IPX routing command is not matching the Ethernet's MAC address.
E. Yes.


Answer: D


Q3. Routers A, B, and C are running IGRP over frame relay connections. No
subinterfaces are used, and a single IP subnet is used for all the Frame Relay
interfaces. Router A is able to see routers from both Router B and Router C, but
Router B and Router C cannot see routers from each other.

Which could be causing this problem?

A. Router A is missing frame maps.
B. Router B and Router C are missing frame maps.
C. Split-horizon is enabled on Router A.
D. Split-horizon is disabled on Router A.

Answer: C


Q4. Transparent bridges forward, flood, or drop frames based upon entries in the
bridge table, which may be dynamically added to or removed from the table.
350-001
4

Which statements are TRUE regarding bridge table entries?

A. Bridge table entries are learned by examining the destination MAC address of
each frame.
B. Bridge table entries are learned by examining the source MAC address of each
frame.

C. Increasing the bridge table aging time would result in a reduction of flooding.
D. Decreasing the bridge table aging time would result in a reduction of flooding.
E. It is important to ensure that the aging time is less than the aggregate time to
detect and recalculate the spanning tree.

Answer: B, C


Q5. What is not a valid DNS resource record?

A. MX
B. PTR
C. A
D. FQDN
E. NS

Answer: D


Q6. What is the purpose of the clock source command used in IOS T1/E1 interface
command mode, wand what is the default setting?

A. Routers are DTEs and NEVER supply clock to T1 /E1 line.
B. clock source identifies the stratum level associated with the router T1 /E1 and
the default us Stratum 1.
C. clock source chooses a source for the interface to clock outbound data.
The default is clock source line -Specifies that the T1 /E1 link uses the recovered
clock from the line.
D. clock source chooses a source for the interface to clock buffered data.
The default is clock source loop-timed-Specifies that the T1 /E1 interface takes

the clock from the Tx (line) and uses it for Rx.

Answer: C


Q7. How does a router behave in relation to an EIGRP stub neighbor?

A. It will send only default-routes toward stub EIGRP neighbors.
B. It well send only summary routes toward stub EIGRP neighbors.
C. It will not query the stub EIGRP neighbor about any internal route.
D. It will not query the stub EIGRP neighbor about any external route.
E. It will not query the stub EIGRP neighbor about any route.

Answer: E

350-001
5

Q8. Current configuration:

!
version 12.0
service timestamps debug uptime
service timestamps log update
no service password-encryption
!
hostname Simon
enable secret 5 $1$XV53$hqb0Ra7gwpky0cmL4u3EW0
enable password cisco


Given the configuration shown above, what should you type to gain enable access on
router Simon?

A. cisco
B. Simon
C. 4u3EW0
D. $1$XV53$hgb0Ra7gwpky0cmL4u3EW0
E. Cannot tell

Answer: D


Q9. Which statement concerning the difference between TACACS+ and RADIUS is
NOT true?

A. TACACS+ uses UDP while RADIUS uses TCP for transport.
B. RADIUS only encrypts the password field of the packet while TACACS+ encrypts
the entire body of the packet.
C. RADIUS is an IETF standard, while TACACS+ is not.
D. TACACS+ sends a separate request for authorization, while RADIUS uses the
same request for authentication and authorization.

Answer: A


Q10. Which statement is true?

A. PNNI has QoS awareness and has layer two reachability support.
B. PNNI ignores QoS and supports both layer two and three routing.
C. PNNI supports redistribution of IP routes to ATM routing tables and route

dampening.
D. PNNI comes up automatically when a switch is brought up, while IP routing
protocols require specific configuration commands.
E. PNNI must be connected in a three-level hierarchical topology; Ip does not
require hierarchy.

Answer: A


Q11. Exhibit: (Refer the EXHIBIT given below.)
350-001
6





Router 1 and Router 2 are configured to use IPSec for securing traffic between
network X and network Y.

What is the correct crypto access-list that needs to be configured on Router 1?

A. access-list 101 permit ip host 192.168. 1.1 host 192.168.1.2
B. access-list 101 permit ip 10.1.1.0.0.0.0.255 host 192.168.1.2
C. access-list 101 permit ip 10.1.1.0.0.0.0.255 10.1.2.0.0.0.0.255
D. access-list 101 permit ip 10.1.1.0.0.0.0.255 10.1.2.0.0.0.0.255
access-list 101 permit ip 10.1.2.0.0.0.0.255 10.1.1.0.0.0.0.255
E. access-list 101 permit ip 10.1.2.0.0.0.0.255 10.1.1.0.0.0.0.255

Answer: C



Q12. What does the EIGRP Feasibility Condition mean?

A. The FD must be unique.
B. The FD must be higher than zero.
C. The FD must be equal to RD.
D. The RD must be lower than FD.
E. None of the above.

Answer: D


Q13. Which are the primary reasons to use traffic shaping? (Choose two.)

A. To control the maximum rate of traffic transmitted or received on an interface.
B. To control access to available bandwidth.
C. To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate
limits.
D. To control the average queue size by indicating to the end hosts when they
should temporarily slow down transmission of packets.
E. To ensure that traffic conforms to the policies established for it.

350-001
7
Answer: B, E


Q14. There is a point-to-point ISDN link between Routers A and B. Router A must be
able to dial Router B, but Router B must NOT be able to dial Router A.


What will accomplish this?

A. Use an IP access-list with the access-group command on the interface.
B. Remove the dial string from Router B.
C. Use the no-dial keyword on the interface.
D. Use the same IP address on both sides of the link.

Answer: B


Q15. The LAPD protocol is formally specified in:

A. ITU-T T.30
B. ITU-T T.261
C. ITU-T Q.920
D. ITU-T T-31
E. ITU-T Q-931

Answer: C


Q16. What is true about Custom Queuing?

A. Custom queuing will always empty a queue before proceeding to the next queue.
B. Custom queuing can be used to restrict a particular type of traffic to a given
bandwidth regardless of the load on that link.
C. Custom queuing looks at groups of packets from the same source-destination
pair.
D. Custom queuing can prevent one type of traffic from dominating a busy link.


Answer: D


Q17. In Frame Relay traffic shaping, the bc and be parameters are expresses as:

A. Bits per second.
B. Bits per interval.
C. Bytes per second.
D. Bytes per interval.

Answer: B


Q18. What effect do these configuration commands have?

line vty 0 4
no login
350-001
8
password cisco

A. The VTY password is cisco.
B. The login password is login
C. The VTY password is required but not set.
D. No password is required for VTY access.

Answer: D



Q19. What statement is TRUE regarding Fast Ethernet Channel?

A. Ports within a Fast Ether Channel do not have to be the same speed and duplex.
B. Port Aggregation Protocol (PAGP) facilitates the automatic creation of Fast Ether
channels links.
C. Fast Ethernet Channels cannot be configured as a trunk.
D. Ports within a Fast Ether Channels cannot be configured as a trunk.
E. Ports within a Fast Ether Channel can be assigned to multiple VLANs.

Answer: B


Q20. Exhibit: (Refer the EXHIBIT given below.)





RouterR1:

ip multicast-routing

interface loopback0
ip address 192.168.1.1 255.255.255.0

ip pim send-RP-announce loopback0 scope 16 group-list 1
ip pim send-RP-discovery loopback0 scope 16

access-list 1 permit 239.0.0.0 0.255.255.255
350-001

9

RouterR2:

ip multicast-routing

interface loopback 0
ip address 192.168.1.2 255.255.255.0

ip pim send-RP-announce loopback0 scope 16 group-list 1
ip pim send-RP-discovery loopback0 scope 16

access-list 1 permit 239.0.0.0 0.255.255.255

Given the configuration shown in the exhibit, which routers will be Mapping Agents
and will actively source Auto-RP Discovery messages to group 224.0.1.40?

A. Both Router A and B will be active Mapping Agents and both will begin sourcing
Auto-RP Discovery messages to 224.0.1.39.
B. Both Router A and B will be active Mapping Agents and both will begin sourcing
Auto-RP Discovery messages to 224.0.1.40.
C. Router A will be the active Mapping Agent and begin sourcing Auto-RP Discovery
messages to 224.0.1.40,
D. Router B will be the active Mapping Agent and begin sourcing Auto-RP
Discovery message to 224.0.1.40.

Answer: D


Q21. RTP typically uses which protocols as a transport?


A. IP/TCP
B. IP/UDP
C. IP/RTCP
D. H.323/H.245
E. None of the above.

Answer: B


Q22. The first ISUP message sent by an originating node when establishing a call
using Signalling System 7 is:

A. an ACM
B. an ANM
C. an IAM
D. a REL
E. A RLC

Answer: C

350-001
10

Q23. In a PIMv2 Sparse Mode network, the "incoming interface" for a (*, G) mroute
entry is calculated using:

A. The address of the source.
B. The address of the PIM neighbor that send the PIM (*, G) Join message.
C. The address of a directory connected member of group "G".

D. The address of the currently active Rendezvous Point for group "G".
E. The address of the Mapping Agent.

Answer: C


Q24. Exhibit: (Refer the EXHIBIT given below.)





RouterR1
no ip routing
i
source-bridge ring-group 100
source-bridge transparent 100 200 1 1
i
interface Ethernet 0
no ip address
bridge-group 1
i
InterfaceToken ring 0
no ip address
source-bridge 10 1 100
source-bridge spanning
i
bridge 1 protocol ieee
bridge 1 bitswap-layer3-addresses


350-001
11
Frames originating from the Ethernet device would contain which ring numbers,
when observed on the Token Ring?

A. Ring 10, Ring 2, and Ring 200.
B. Ring 200, Ring 100, and Ring 2.
C. Ring 100, Ring 200, and Ring 10.
D. Ring 10, and Ring 2.
E. Ring 2, Ring 200, and Ring 1.

Answer: B


Q25. By entering the IOS global configuration command aaa new-model, which
authentication protocols will be disabled?

A. TACACS
B. TACACS+
C. Extended TACACS (XTACACS)
D. Radius
E. Kerberos

Answer: A, C


Q26. Exhibit: (Refer the EXHIBIT given below.)






After issuing the command set spantree root 1 on Switch R1 in the shown diagram,
what scenario would be FALSE?

350-001
12
A. No other switch in the network will be able to become root as long as Switch R1
remains up and running in this topology.
B. Switch R1 will change its Spanning Tree priority to become the root for Vlan 1,
only.
C. The port that used to be blocking on Switch R3 will, after the convergence, be
changed to forwarding.
D. The link between Switch R1 and Switch R2 will remain forwarding even during the
reconvergence of the Spanning Tree domain.

Answer: A


Q27. Exhibit: (Refer the EXHIBIT given below.)





Host A is the only device that has an 8 bit network mask. When Host A needs to
send a packet to Host B, which are required in order for this to work?

Note: Assume both Router 1 and Router 2 have routing entries for all networks
involved.


A. Host A needs to have its default gateway pointing to Router 1.
B. Host B needs to have its default gateway pointing to Router 2.
C. Proxy ARP needs to be enabled on Router 1.
D. Proxy ARP needs to be enabled on Router 2.

Answer: B, C


Q28. Which layer in the OSI reference model are missing from the TCP/IP reference
model? (Choose all that apply.)

A. Network
B. Presentation
C. Transport
D. Session
E. Data link

Answer: B, D, E
350-001
13


Q29. Exhibit: (Refer the EXHIBIT given below.)





In the example shown, what prevents the flow of (S, G) traffic from being Pruned

and cutting off the flow to the receiver?

A. Router C will hear the (S, G) Prune message from router B and will send an
(S, G) join message to router A to override the Prune.
B. Router C will hear the (S, G) Prune message from router B and will send an
(S, G) Join message to router B to override the Prune.
C. Router C will hear the (S, G) Prune message from router B and will send an
(S, G) Graft message to router B to override the Prune from router B.
D. Router A will not respond to the (S, G) Prune because interface EO is in the
outgoing interface list.
E. This is an error condition. Router B would not send an (S, G) Prune because it
would have heard a previous (S, G) Join message sent by router C.

Answer: A


Q30. Which are examples for Physical WAN interface standards?

A. EIA/TIA 232, EIA/TIA 449, RFC 1771, and V.35.
B. EIA/TIA 232, EIA/TIA 449, IEEE 802.3 and IEEE 802.5.
C. IEEE 802.3, IEEE 802.5, ISO 8648 and RFC 1771.
D. EIA/TIA 232, EIA/TIA 449, V.35, HSSI and EIA 530.

Answer: D


Q31. Load sharing of VLAN traffic over parallel ISL trunks is:

A. Not possible due to the nature of ISL.
B. Configurable on a per VLAN basis.

C. Configurable on a per packet basis.
350-001
14
D. Automatic due to the nature of ISL and its interaction with the IEEE Spanning
Tree protocol.

Answer: B


Q32. Assume a Catalyst 6500 with a Supervisor IA with a MSFC. The MSFC has lost
its boot image and the device is now in Rommon.

What method will work to load c6msfc-boot-mz.121-7a-E1-bin?

A. Xmodem
B. FTP
C. TFTP
D. SNMP

Answer: A


Q33. Exhibit: (Refer the EXHIBIT given below.)





The client can ping through the GRE tunnel to the server and receive small files just
fine, but large web page download and file transfer will fail. "debug ip icmp" on

Router 2 shows "frag. needed on DF unreachable" messages sent to the server.

Which are possible solutions to this problem?

A. If the physical link between Router 1 and Router 2 can support a MTU size
greater than 1524 bytes, then increase the interface MTU between the tunnel end
points to greater than 1524.
B. Decrease the physical interface MTU between the tunnel end points to less than
1476 bytes.
C. Increase the IP MTU on the tunnel interfaces to 1500.
350-001
15
D. Enable "ip unreachables" on all interfaces on Router 2.
E. Check to see if there is a filtering device between Router 2 and the server that's
blocking ICMP messages.
If so, change the filter rule to allow ICMP

Answer: A, E


Q34. What trunk mode combination would not produce an operational ISL trunk?

A. Local: auto Remote: auto
B. Local: on Remote: auto
C. Local: nonegotiate Remote: nonegotiate
D. Local: nonegotiate Remote: on
E. Local: auto Remote: desirable

Answer: A



Q35. Exhibit: (Refer the EXHIBIT given below.)





In the MPLS network shown, which subnets would be in the same Forwarding
Equivalence Class (FEC) on Router RS1:

A. 172.16.3.0/24 and 192.1.1.0/28
B. 172.16.1.0/24 and 172.16.2.0/24
C. 172.16.1.0/24 and 193.1.1.0/28
D. 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24
350-001
16

Answer: C


Q36. A company has deployed a new e-commerce web farm. They are using teamed
servers that use multicast to maintain a heartbeat between redundant pairs. All
servers are in the 192.168.202.0/24 network. For increased security, they require
each pair of servers be allowed to see multicast/broadcast traffic from their default
gateway and from each other. No pair of servers should ever see any
broadcast/multicast traffic from any other pair of servers.

Which is the best mechanism for the server ports to accomplish this?

A. Isolated Ports.

B. Promiscuous Ports.
C. Community Ports.
D. Teamed Ports.
E. Span Ports.

Answer: C


Q37. Which is the protocol that On-Demand Routing relies on?

A. IP
B. TCP
C. CDP
D. UDP
E. PPP

Answer: C


Q38. Exhibit: (Refer the EXHIBIT given below.)





350-001
17
When the PC host sends a 1500 byte TCP packet with the DF (Don't Fragment) bit
set to the Internet, what should Router 1 do when it tries to forward this packet to
the serial interface?


A. It should fragment the packet if it does not honor the DF bit since routers are not
required to honor the DF bit.
B. It should not fragment this packet since the DF bit is set.
It should drop the packet and wait for the host to dynamically decrease its MTU
size.
C. It should fragment this packet, and send back ICMP type 3 code 4 (fragmentation
needed but DF bit set) messages back to the host
D. It should drop this packet, and send back ICMP type 3 code 4 (fragmentation
needed but DF bit set) message back to the host.
E. It should drop this packet, and send back a TCP reset back to the host.

Answer: D


Q39. Exhibit:

interface Hssi5/0
rate-limit input access-group 100 256000 8000 8000 conform-action
transmit exceed-action drop

access-list 100 permit icmp any any

In order to protect their network from Denial-of-Service attacks via ICMP floods, the
command shown in the exhibit were configured. This is an example of what QoS
mechanism?

A. CBWFQ
B. LLC
C. RSVP

D. CAR
E. GTS

Answer: D


Q40. Exhibit: (Refer the EXHIBIT given below.)


350-001
18



Given the OSPF network shown above, packets from Router 2 to Router 4 will:

A. Always go through Router 1.
B. Alternate between Router 1 and Router 3 if the costs are equal.
C. Choose a path depending on the costs inside Area 1 only.
D. Choose a path depending on the costs inside both Area 0 and Area 0.

Answer: B


Q41. When using an LX/LH Gbic, what is the maximum supported cable length when
using a Single Mode Fiber with a 8.3/9/19 micron Core?

A. 1504 ft (500 m)
B. 6.2 miles (10 km)
C. 3.1 miles (5 km)

D. 4.6 miles (7.5 km)
E. This type of fiber is not supported with an LX/LH gbic.

Answer: B


Q42. Exhibit: (Refer the EXHIBIT given below.)


350-001
19



Router1:

bridge irb
!
interface Ethernet 0
no ip address
bridge-group 1
!
interface Ethernet 1
no ip address
brige-group 1
!
interface serial 0
ip address 10.1.2.1 255.255.2550
!
inferface BVI 1

ip address 10.1.1.1 255.255.255.0
no ip directed-broadcast
!
router eigrp 1
network 10.1.0.0
!
bridge 1 protocol ieee
bridge 1 route ip

Router2:

interface Ethernet 0
ip address 10.1.3.1 255.255.255.0
350-001
20
i
interface serial 0
ip address 10.1.2.2. 255.255.255.0
i
router eigrp 1
network 10.1.0.0

Assume this network has just been brought up. If device 10.1.1.10 sent a UDP
broadcast destined to FFFF.FFFF.FFFF at the MAC layer, how would Router 1 forward
the broadcast?

A. Router 1 would forward the UDP broadcast out both Serial 0 and Ethernet 1.
B. Router 1 would only forward the UDP broadcast out of Ethernet 1.
C. Router 1 would only forward the UDP broadcast out Serial 0.
D. Router 1 would not forward the UDP broadcast out any interface.


Answer: B


Q43. Which BGP attributes are "well known"?

A. Next-hop
B. Aggregator
C. AS-path
D. Atomic-aggregate
E. MED

Answer: A, C, D


Q44. Exhibit:

Show interface command for Serial 0:

r1#sh in
Seria10 is up, line protocol is up
Hardware is HD64570
MTU 1500 bytes, BW 1544 Kbit, DLY 20000, rely 255/255, load 1/255
Encapsulation FRAME-RELAY, loopback not set, keepalive set (35 sec)
LMI enq sent 7, LMI stat recvd 7, LMI upd recvd 0, DTE LMI up
LMI enq recvd 0, LMI stat sent 0, LMI upd sent 0
LMI DLCI 0 LMI type is ANSI Annex D frame relay DTE
FR SVC disabled, LAPF stat down
Broadcast queue 0/64, broadcasts sent/dropped 2/0, interface broadcast 0
Last input 00:00:30, output 00:00:30, output hang never

Last clearing of "show interface" counters never
Queuing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
1 packets input, 24 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
350-001
21
4 packets output, 608 bytes, 0 underruns
0 output errors, 0 collisions, 4 interface resets
0 output buffer failures, 0 output buffers swapped out
2 carrier transitions
DCD=up DSR=up DTR=up RTS=up CTS=up
Serial 0.2 is down, line protocol is down
Hardware is HD64570
Internet address is 172.16.1.2/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation FRAME-RELAY
Serial 0.3 is down, line protocol is down
Hardware is HD64570
Internet address is 171.16.2.1/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation FRAME-RELAY

A serial interface is brought up, works for a short time, then goes down. According to
the show interface command what is the likely problem?

A. The encapsulation type is not set to Frame-Relay.

B. The Frame-Relay lmi-type is set improperly.
C. The interface is configured with too many sub-interfaces exceeding IDB limits.
D. The DCD not set properly for a Frame-Relay circuit.
E. Keepalives are not set correctly on both ends.

Answer: B


Q45. Suppose a network access server (NAS) is configured to use TACACS+ to
provide user authentication service for remote access users. The NAS get an ERROR
in response to its authentication request when: (Choose three.)

A. The TACACS+ service is not running on the server.
B. The supplied user password is incorrect.
C. The username does not exist in the TACACS+ user database.
D. The NAS TACACS+ server key does not match that on the server.
E. The TACACS+ server is unreachable by the NAS.

Answer: B, C, D


Q46. The BGP backdoor command:

A. Changes the distance of an iBGP route to 20.
B. Changes the distance of an eBGP route to 200.
C. Changes the distance of an IGRP route to 200.
D. Changes the distance of an IGP route to 20.
E. Does not change the distance of the route.

Answer: B



350-001
22
Q47. Exhibit: (Refer the EXHIBIT given below.)





In the MPLS network shown, how many routing tables are on Router MS1?

A. 1
B. 2
C. 3
D. 4
E. 5

Answer: A


Q48. To what IP address does RIPv2 send its own routing update packets?

A. 224.0.0.10
B. 255.255.255.255
C. 224.0.0.13
D. 224.0.0.5
E. 224.0.0.9

Answer: E



Q49. What is the tiebreaker used by ISIS to elect the Designated IS on a LAN in a
case where all the neighbors have the same priority?

A. The lowest MAC address.
350-001
23
B. The highest router-ID.
C. The lowest router-ID.
D. The highest SNPA.
E. The lowest system-ID.

Answer: D


Q50. How many LSPs does a non-pseudonode ISIS router originate?

A. 1 per link.
B. 1 per link and 1 per external route.
C. Always a minimum of 3.
D. 1, but 2 if there are external routes redistributed into ISIS on this router.
E. Always 1.

Answer: E


Q51. Exhibit: (Refer the EXHIBIT given below.)






Both End Stations and both Data Link Switching Plus (DLSW+) routers are in a
common VLAN.

The DLSW+ routers have peers to the Channel Interface Processor (CIP) router. Both
DLSW+ routers show they can reach the Host via 4000.2feb.0001. Users are having
trouble maintaining their SNA sessions. Their IP connectivity is unaffected.

What DLSW+ feature would most likely fix the problem?

350-001
24
A. Load Balancing.
B. Duplicate Path Bias.
C. Static Paths.
D. Ethernet Redundancy.

Answer: A


Q52. A serial interface needs to support IP-based voice traffic in a strict priority
queue. All other traffic should be handled through the weighted fair queuing
mechanism.

What interface level command would enable the queue for the voice traffic?

A. ip llc-queue
B. ip rtp priority

C. priority-group
D. fair-queue

Answer: C


Q53. According to the IEEE 802.11b Wireless LAN specification, what sub-field is NOT
part of the Frame Control Field?

A. Duration
B. Power Management
C. Wired Equivalent Privacy
D. More Fragments
E. Order

Answer: A


Q54. Considering OSPF where a binding between an interface and an area has been
done, what is the effect of defining such an interface as passive?

A. OSPF will not form any adjacency out if that interface but it will accept the
routing updates from the neighbors.
B. OSPF will form all the available adjacencies out of that interface but it wont install
any of the learned routes in the local routing table.
C. OSPF will not form any adjacency out of that interface.
D. OSPF will behave as a passive adjacency at the requests coming from neighbors,
lying out of the interface, ignoring all the incoming requests.
E. None of the above.


Answer: C


Q55. When connecting two different VLAN Trunk Protocol domains together via and
ISL trunk, the switches fail to form the trunk automatically.

What is the likely cause?

×