Exam 350-001 preparation questions

Page 1

Exam 350-001 study material Made available by Testkingprep.com

Free 350-001 Exam Preparation Questions Exam 350-001: Cisco Certified Internetworking Expert ( CCIE ) Exams

Question:1 For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


Phase I and Phase II DMVPN differ in terms of which of these characteristics? A. Utilization of spoke-to-spoke dynamic tunnels B. Utilization of multipoint GRE tunnels at the hub site C. Utilization of hub-to-spoke dynamic tunnels D. Support for multicast Answer: A Question:2 Based on the network provided in the exhibit, how will traffic arriving at P4S-R1 for 10.1.3.1 be routed?

A. Through P4S-R3, since the path through P4S-R3 is through the backbone B. Through P4S-R2, because that is the only path available; no neighbor adjacency will be built between P4S-R1 and P4S-R2 C. Through P4S-R1, since the path through P4S-R1 has the lowest hop count D. Through P4S-R1, since the path through P4S-R1 has the lowest total metric (10+10=20, versu 10+10+10=30 through P4S-R3)

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


Answer: A Question:3 On the basis of the exhibit presented. When performing an internal audit of your network, you come across this configuration in all of your routers. Which three statements correctly describe this configuration? (Choose three.)

A. The Event Manager applet is configured incorrectly B. The IP SNMP process is monitored every 10 seconds C. A publish event is sent to well-known user 798 with an SNMP trap message. D. When CPU process exceeds 50%, an event is generated. Answer: B, C, D Question:4 Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one? A. End system B. Protocol C. Application D. Throughput Answer: D Question:5 Two routers are connected by a serial link, and are configured to run EIGRP on all interfaces. You examine the EIGRP neighbor table on both routers (using the show ip eigrp neighbor command) and see that the router connected over the serial link is listed as a neighbor for a certain amount of time, but is periodically removed from the neighbor table. None of the routes from the neighbor ever seem to be learned, and the neighbor transmission statistics (SRTT, RTO, and Q Count) seem to indicate that no packets are being transmitted between the neighbors. Which would most likely cause this problem? A. While multicast packets are being successfully sent over the link, unicast packets are not B. There is a bug in the EIGRP code that needs to be fixed. C. This is correct behavior for the first few minutes of EIGRP neighbor formation. After four or five cycles, it should straighten itself out and the neighbor D. The hello or hold intervals are set differently on the two routers. Answer: A Question:6 On the basis of the network provided in this exhibit,all routers are configured to place all interfaces displayed in OSPF Area 0. If you examined the OSPF database on P4S-R4, what would the network (type 2) LSA generated by P4S-R3 contain?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. A connection to 10.1.5.0/24, and links to P4S-R3, P4S-R2, and P4S-R1 B. P4S-R3 would not generate a network (type 2) LSA in this network. C. A connection to 10.1.5.0/24, and links to P4S-R2 and P4S-R1 D. Connections to 10.1.5.0/24 and 10.1.1.0/31 Answer: A Question:7 Which table is used by an LSR to perform a forwarding lookup for a packet destined to an address within an RFC 4364 VPN? A. FIB B. IGP C. LFIB D. CEF Answer: C Question:8 On the basis of the network presented in the exhibit, configuring all routers to run EIGRP on all links. If the link between P4S-R1 and P4S-R2 fails, what is the maximum number of queries P4S-R3 will receive for 192.168.1.0/24, assuming that all the packets transmitted during convergence are transmitted once (there are no dropped or retransmitted packets)?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. P4S-R3 will receive up to four queries for 192.168.1.0/24, one each from P4S-R2, P4S-R4, P4SR5, and P4S-R6. B. P4S-R3 will not receive any queries from P4S-R2, because there are no alternate paths for 192.168.1.0/24. C. P4S-R3 will receive up eight queries for 192.168.1.0/24, one from P4S-R2, two from P4S-R4, three from P4S-R5, and four from P4S-R6. D. P4S-R3 will receive one query for 192.168.1.0/24, since the remote routers, P4S-R4, P4S-R5, and P4S-R6, are natural stubs in EIGRP. Answer: A Question:9 Based on the network shown in the exhibit, when P4S-R6 runs SPF, what will be the entry to 10.1.5.0/24 on the resulting shortest path tree?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. P4S-R6 will not have an entry to 10.1.5.0/24 on its shortest path tree. B. P4S-R6 will choose the path through P4S-R5, P4S-R3, P4S-R1, because this is the shortest path through the network. C. P4S-R6 will have an entry to 10.1.5.0/24 through P4S-R4 on its shortest path tree, since P4S-R4 is the closest exit point out of Area 2. D. P4S-R6 will choose the path through P4S-R5, P4S-R2, P4S-R1, because this is the shortest path through the network. Answer: A Question:10 For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wida Area Application engine? A. Virtual Router Redundancy Protocol (VRRP) B. File Transport Protocol (FTP) C. Hot Standby Routing Protocol (HSRP) D. Web Cache Communication Protocol (WCCP) Answer: D Question:11 You work as a network engineer at Company.com, study the exhibit carefullu. In this network, P4S-R1 is redistributing 10.1.5.0/24 into OSPF, and P4S-R2 is originating 10.1.4.0/24 as an internal route. P4S-R6 has received packets destined to 10.1.4.1 and 10.1.5.1. Which statement is true about the path or paths these two packets will take?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. The packet destined to 10.1.5.1 will follow the optimum path through the network, P4S-R4 to P4SR1, while the packet destined to 10.1.4.1 will follow a suboptimal B. There is not enough information provided to determine which packet will take an optimal or suboptimal path through the network. C. Both packets will follow optimal paths through the network to their destinations D. The packet destined to 10.1.4.1 will follow an optimal path through the network, while the packet destined to 10.1.5.1 will follow a suboptimal path through the network Answer: A Question:12 For the following items, which one is not Spanning Tree Protocol IEEE 802.1w port states ? A. Forwarding B. Discarding C. Learning D. Blocking Answer: D Question:13 Which item will be allowed by using a unique route distinguisher per VRF, an RFC 4364 Layer 3 VPN? A. Overlapping IP address spaces B. Traffic engineering C. Multi-homed access D. A unique IGP per VR Answer: A Question:14 For the following items,what is the mathematical relationship between the committed information rate

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


(CIR), committed burst (Bc), and committed rate measurement interval (Tc)? A. CIR = TC / Bc B. CIR = Be / Tc C. Tc = CIR / Bc D. Tc = Bc / CIR Answer: D Question:15 Which two options help minimize router resource requirements and improve manageability? (Choose two.) A. Autosummarization B. Simple Network Management Protocol C. CPU optimization D. Prefix aggregation Answer: A, D Question:16 Which statement is true about the major difference between an IPv4-compatible tunnel and a 6to4 tunnel?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. The deployment of a IPv4-compatible tunnel requires a special code on the edge routers, but a 6to4 tunnel does not require any special code. B. For an IPv4-compatible tunnel, the ISP assigns only IPv4 addresses for each domain, but for a 6to4 tunnel, the ISP assigns only IPv6 addresses for each domain. C. An IPv4-compatible tunnel is typically used only between two IPv6 domains, but a 6to4 tunnel is used to connect to connect two or more IPv6 domains. D. An IPv4-compatible tunnel is a static tunnel, but an 6to4 tunnel is a semiautomatic tunnel. Answer: C Question:17 On the basis of the exhibit provided, assuming that EIGRP is the routing protocol, then at R5, what would be the status of each path to 172.30.1.0/24?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. The path through P4S-R3 would be the successor, the path through P4S-R1 would be a feasible successor, and the path through P4S-R4 would be neither a successor nor a feasible successor B. Not enough information has been given to figure out what the status of each route would be C. The path through P4S-R3 would be the successor, and the paths through P4S-R1 and P4S-R4 would be feasible successors D. The path through P4S-R1 would be the successor, the path through P4S-R3 would be a feasible successor, and the path through P4S-R4 would be neither a successor nor feasible successor Answer: A Question:18 Which three statements best describe penultimate hop popping? (Choose three.)

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. It is used only for directly connected subnets or aggregate routes. B. It is requested through LDP using a special label value that is also called the implicit-null value. C. It is only used when two or more labels are stacked. D. It enables the Edge LSR to request a label pop operation from its upstream neighbors. Answer: A, B, D Question:19 The Discard Eligibility (DE) bit is part of the Address field in the Frame Relay frame header. In Frame Relay, the Discard Eligible bit works in conjunction with which of these mechanisms as part of congestion control? A. Frame Relay traffic shaping (FRTS) settings B. Type of service (TOS) settings C. Class of service (COS) settings D. Forward explicit congestion notification (FECN) settings Answer: D Question:20 If you have multiple DHCP pools configured on the same router, for the following items,which IOS command has to be entered in the DHCP configuration to be processed be using the other DHCP pool configuration?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. Host B. Default-gateway C. Network D. Ip helper Answer: A Question:21 Which statement best describes OSPF external LSAs (type 5)? A. OSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which require that redistribution be configured. B. External LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs. C. Type 5 LSAs are route summaries describing routes to networks outside the OSPF Autonomous System. D. External network LSAs (type 5) redistributed from other routing protocols into OSPF are not permitted to flood into a stub area. Answer: D Question:22 Under what conditions WRED is most effective? A. Most traffic is TCP-based B. Very high bandwidth interfaces such as Gigabit Ethernet C. An equal distribution of TCP and UDP traffic D. A mix of TCP, UDP, and non-IP traffic Answer: A Question:23 You are a network administrator for Company company, study the exhibit carefully. Both multicast sources are sending to the same multicast address. How does a user specify which multicast stream they want to receive?

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


A. The user must know the source address and group address of the desired multicast stream and explicitly join that stream. B. P4S-RA and P4S-RB are set up as rendezvous points. The user joins a multicast group by sending an IGMP request to their local router. The local router then C. Dense mode is used to forward the multicast streams to the end users allowing them to pick the desired stream when it arrives. D. The multicast streams must be separated from each other by specifying a scope for each. This means that each user can only get multicast traffic from one of the Answer: A Question:24 Which keyword will you need to the access-list to provide to the logging message like source address and source mac address? A. log-output B. log-input C. logging D. log Answer: B

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


For complete Exam 350-001 Training kits and Self-Paced Study Material Visit: http://www.testkingprep.com/350-001.html

http://www.testkingprep.com/

For Latest 350-001 Exam Questions and study guides- visit- http://www.testkingprep.com/350-001.html


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.