All4Certs Cisco Archive,Exam Archive [PDF and VCE] Free CertBus 350-001 VCE and PDF, Exam Materials Instant Download

[PDF and VCE] Free CertBus 350-001 VCE and PDF, Exam Materials Instant Download

As a leading IT exam study material provider, CertBus not only provides you the 350-001 exam questions and answers but also the most comprehensive knowledge of the whole 350-001 certifications. We provide our users with the most accurate 350-001 study material about the 350-001 exam and the guarantee of pass. We assist you to get well prepared for 350-001 certification which is regarded valuable the IT sector.

We CertBus has our own expert team. They selected and published the latest 350-001 preparation materials from Official Exam-Center: http://www.certgod.com/

QUESTION NO:10

Which command is used to enable EtherChannel hashing for Layer 3 IP and Layer 4 port-based

CEF?

A. mpls ip cef

B. port-channel ip cef

C. mpls ip port-channel cef

D. port-channel load balance

E. mpls ip load-balance

F. ip cef EtherChannel channel-id XOR L4

G. ip cef connection exchange

Answer: D

Explanation:

QUESTION NO:20

Refer to the exhibit.

What is the potential issue with this configuration?

A. There is no potential issue; OSPF will work fine in any condition.

B. Sub-optimal routing may occur since there is no area 1 adjacency between the ABRs.

C. This is a wrong OSPF configuration because all routers must be in area 0 only.

D. This is a wrong OSPF configuration because /30 requires 0.0.0.3 wild card.

Answer: B

Explanation:

QUESTION NO:3

A new backup connection is being deployed on a remote site router. The stability of the connection

has been a concern. In order to provide more information to EIGRP regarding this interface, you

wish to incorporate the “reliability” cost metric in the EIGRP calculation with the command metric

weights 1 0 1 0 1.

What impact will this modification on the remote site router have for other existing EIGRP

neighborships from the same EIGRP domain?

A. Existing neighbors will immediately begin using the new metric.

B. Existing neighbors will use the new metric after clearing the EIGRP neighbors.

C. Existing neighbors will resync, maintaining the neighbor relationship.

D. All existing neighbor relationships will go down.

Answer: D

Explanation:

QUESTION NO:9

Which two are effects of connecting a network segment that is running 802.1D to a network

segment that is running 802.1w? (Choose two.)

A. The entire network switches to 802.1D and generates BPDUs to determine root bridge status. B.

A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge

comes up.

C. The entire network reconverges and a unique root bridge for the 802.1D segment, and a root

bridge for the 802.1w segment, is chosen.

D. The first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1D compatibility

mode and converts the BPDUs to either 802.1D or 802.1w BPDUs to the 802.1D or 802.1w

segments of the network.

E. Classic 802.1D timers, such as forward delay and max-age, will only be used as a backup, and

will not be necessary if point-to-point links and edge ports are properly identified and set by the

administrator.

Answer: B,E

Explanation:

Each port maintains a variable that defines the protocol to run on the corresponding segment. A

migration delay timer of three seconds also starts when the port comes up. When this timer runs,

the current STP or RSTP mode associated to the port is locked. As soon as the migration delay

expires, the port adapts to the mode that corresponds to the next BPDU it receives. If the port

changes its mode of operation as a result of a BPDU received, the migration delay restarts.

802.1D works by the concept that the protocol had to wait for the network to converge before it

transitioned a port into the forwarding state. With Rapid Spanning Tree it does not have to rely on

any timers, the only variables that that it relies on is edge ports and link types.

Any uplink port that has an alternate port to the root can be directly placed into the forwarding

state (This is the Rapid convergence that you speak of “restored quickly when RSTP is already in

use?”). This is what happened when you disconnected the primary look; the port that was ALT,

moved to FWD immediately, but the switch also still needs to create a BDU with the TC bit set to

notify the rest of the network that a topology has occurred and all non-edge designated ports will

transition to BLK, LRN, and then FWD to ensure there are no loops in the rest of the network. This

is why if you have a host on a switchport, and you know for a fact that it is only one host, enable

portfast to configure the port as an edgeport so that it does not have to transition to all the STP

states.

Reference

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml

QUESTION NO:16

In 802.1s, how is the VLAN to instance mapping represented in the BPDU?

A. The VLAN to instance mapping is a normal 16-byte field in the MST BPDU.

B. The VLAN to instance mapping is a normal 12-byte field in the MST BPDU.

C. The VLAN to instance mapping is a 16-byte MD5 signature field in the MST BPDU.

D. The VLAN to instance mapping is a 12-byte MD5 signature field in the MST BPDU.

Answer: C

Explanation:

MST Configuration and MST Region

Each switch running MST in the network has a single MST configuration that consists of these

three attributes:

1. An alphanumeric configuration name (32 bytes)

2. A configuration revision number (two bytes)

3. A 4096-element table that associates each of the potential 4096 VLANs supported on the

chassis to a given instance.

In order to be part of a common MST region, a group of switches must share the same

configuration attributes.

It is up to the network administrator to properly propagate the configuration throughout the region.

Currently, this step is only possible by the means of the command line interface (CLI) or through

Simple Network

Management Protocol (SNMP). Other methods can be envisioned, as the IEEE specification does

not explicitly mention how to accomplish that step.

Note: If for any reason two switches differ on one or more configuration attribute, the switches are

part of different regions. For more information refer to the Region Boundary section of this

document.

Region Boundary

In order to ensure consistent VLAN-to-instance mapping, it is necessary for the protocol to be able

to exactly identify the boundaries of the regions. For that purpose, the characteristics of the region

are included in the BPDUs. The exact VLANs-to-instance mapping is not propagated in the BPDU,

because the switches only need to know whether they are in the same region as a neighbor.

Therefore, only a digest of the VLANs-toinstance mapping table is sent, along with the revision

number and the name. Once a switch receives a BPDU, the switch extracts the digest (a

numerical value derived from the VLAN-to-instance mapping table through a mathematical

function) and compares this digest with its own computed digest. If the digests differ, the port on

which the BPDU was received is at the boundary of a region.

In generic terms, a port is at the boundary of a region if the designated bridge on its segment is in

a different region or if it receives legacy 802.1d BPDUs. In this diagram, the port on B1 is at the

boundary of region A, whereas the ports on B2 and B3 are internal to region B:

MST Instances

According to the IEEE 802.1s specification, an MST bridge must be able to handle at least these

two instances:

One Internal Spanning Tree (IST)

One or more Multiple Spanning Tree Instance(s) (MSTIs)

The terminology continues to evolve, as 802.1s is actually in a pre-standard phase. It is likely

these names will change in the final release of 802.1s. The Cisco implementation supports 16

instances: one IST (instance 0) and 15 MSTIs.

show vtp status

Cisco switches “show vtp status” Field Descriptions has a MD5 digest field that is a 16-byte

checksum of the

VTP configuration as shown below

Router# show vtp status

VTP Version: 3 (capable)

Configuration Revision: 1

Maximum VLANs supported locally: 1005

Number of existing VLANs: 37

VTP Operating Mode: Server

VTP Domain Name: [smartports]

VTP Pruning Mode: Disabled

VTP V2 Mode: Enabled

VTP Traps Generation: Disabled

MD5 digest : 0x26 0xEE 0x0D 0x84 0x73 0x0E 0x1B 0x69

Configuration last modified by 172.20.52.19 at 7-25-08 14:33:43

Local updater ID is 172.20.52.19 on interface Gi5/2 (first layer3 interface fou)

VTP version running: 2

Reference

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfc.shtml

http://www.cisco.com/en/US/docs/ios-xml/ios/lanswitch/command/lsw-cr-book.pdf

QUESTION NO:12

Which two options are contained in a VTP subset advertisement? (Choose two.)

A. followers field

B. MD5 digest

C. VLAN information

D. sequence number

Answer: C,D

Explanation:

Subset Advertisements

When you add, delete, or change a VLAN in a Catalyst, the server Catalyst where the changes are

made increments the configuration revision and issues a summary advertisement. One or several

subset advertisements follow the summary advertisement. A subset advertisement contains a list

of VLAN information.

If there are several VLANs, more than one subset advertisement can be required in order to

advertise all the VLANs.

Subset Advertisement Packet Format

This formatted example shows that each VLAN information field contains information for a different

VLAN. It is ordered so that lowered-valued ISL VLAN IDs occur first:

Most of the fields in this packet are easy to understand. These are two clarifications:

Code

QUESTION NO:28

Which two orders in the BGP Best Path Selection process are correct? (Choose two.)

A. Higher local preference, then lowest MED, then eBGP over iBGP paths

B. Higher local preference, then highest weight, then lowest router ID

C. Highest weight, then higher local preference, then shortest AS path

D. Lowest origin type, then higher local preference, then lowest router ID

E. Highest weight, then higher local preference, then highest MED

Answer: A,C

Explanation:

QUESTION NO:29

What is the first thing that happens when IPv6 is enabled on an interface on a host?

A. A router solicitation is sent on that interface.

B. There is a duplicate address detection on the host interface.

C. The link local address is assigned on the host interface.

D. A neighbor redirect message is sent on the host interface.

Answer: B

Explanation:

Duplicate address detection (DAD) is used to verify that an IPv6 home address is unique on the

LAN before assigning the address to a physical interface (for example, QDIO). z/OS

Communications Server responds to other nodes doing DAD for IP addresses assigned to the

interface.

Reference

http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=/com.ibm.zos.r12.hale001

/ipv6d0021002145.htm

QUESTION NO:23

What action will a BGP route reflector take when it receives a prefix marked with the community

attribute NO ADVERTISE from a client peer?

A. It will advertise the prefix to all other client peers and non-client peers.

B. It will not advertise the prefix to EBGP peers.

C. It will only advertise the prefix to all other IBGP peers.

D. It will not advertise the prefix to any peers.

Answer: D

Explanation:

QUESTION NO:30

What is the flooding scope of an OSPFv3 LSA, if the value of the S2 bit is set to 1 and the S1 bit is

set to 0?

A. link local

B. area wide

C. AS wide

D. reserved

Answer: C

Explanation:

The Type 1 router LSA is now link local and the Type 2 Network LSA is AS Wide

S2 and S1 indicate the LSA’s flooding scope. Table 9-1 shows the possible values of these two

bits and the associated flooding scopes.

Table 9-1 S bits in the OSPFv3 LSA Link State Type field and their associated flooding scopes

LSA Function Code, the last 13 bits of the LS Type field, corresponds to the OSPFv2 Type field.

Table 9-2 shows the common LSA types used by OSPFv3 and the values of their corresponding

LS Types. If you decode the hex values, you will see that the default U bit of all of them is 0. The S

bits of all LSAs except two indicate area scope. Of the remaining two, AS External LSAs have an

AS flooding scope and Link LSAs have a linklocal flooding scope. Most of the OSPFv3 LSAs have

functional counterparts in OSPFv2; these OSPFv2 LSAs and their types are also shown in Table

9-2.

Table 9-2 OSPFv3 LSA types and their OSPFv2 counterparts

Reference

http://www.networkworld.com/subnets/cisco/050107-ch9-ospfv3.html?page=1

350-001 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mUVBtM1piOS1IMEU/view?usp=sharing

350-001 exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/ [100% Exam Pass Guaranteed]

Why select/choose CertBus?

Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.

BrandCertbusTestkingPass4sureActualtestsOthers
Price$45.99$124.99$125.99$189$69.99-99.99
Up-to-Date Dumps
Free 365 Days Update
Real Questions
Printable PDF
Test Engine
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back
Secure Payment
Privacy Protection