All4Certs Cisco Archive,Exam Archive CertBus 350-001 the Most Up to Date VCE And PDF Instant Download

CertBus 350-001 the Most Up to Date VCE And PDF Instant Download

As a leading IT exam study material provider, CertBus not only provides you the 350-001 exam questions and answers but also the most comprehensive knowledge of the whole 350-001 certifications. We provide our users with the most accurate 350-001 study material about the 350-001 exam and the guarantee of pass. We assist you to get well prepared for 350-001 certification which is regarded valuable the IT sector.

We CertBus has our own expert team. They selected and published the latest 350-001 preparation materials from Official Exam-Center: http://www.certgod.com/

QUESTION NO:25

Refer to the exhibit.

After a link flap in the network, which two EIGRP neighbors will not be queried for alternative

paths? (Choose two.)

A. 192.168.1.1

B. 192.168.3.7

C. 192.168.3.8

D. 192.168.3.6

E. 192.168.2.1

F. 192.168.3.9

Answer: B,C

Explanation:

Explanation

Both 192.168.3.7 and 192.168.3.8 are in an EIGRP Stub area

The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing feature improves network

stability, reduces resource utilization, and simplifies stub router configuration.

Stub routing is commonly used in a hub and spoke network topology. In a hub and spoke network,

one or more end (stub) networks are connected to a remote router (the spoke) that is connected to

one or more distribution routers (the hub). The remote router is adjacent only to one or more

distribution routers. The only route for IP traffic to follow into the remote router is through a

distribution router. This type of configuration is commonly used in WAN topologies where the

distribution router is directly connected to a WAN. The distribution router can be connected to

many more remote routers. Often, the distribution router will be connected to 100 or more remote

routers. In a hub and spoke topology, the remote router must forward all nonlocal traffic to a

distribution router, so it becomes unnecessary for the remote router to hold a complete routing

table. Generally, the distribution router need not send anything more than a default route to the

remote router.

When using the EIGRP Stub Routing feature, you need to configure the distribution and remote

routers to use EIGRP, and to configure only the remote router as a stub. Only specified routes are

propagated from the remote (stub) router. The router responds to queries for summaries,

connected routes, redistributed static routes, external routes, and internal routes with the message

“inaccessible.” A router that is configured as a stub will send a special peer information packet to

all neighboring routers to report its status as a stub router. Any neighbor that receives a packet

informing it of the stub status will not query the stub router for any routes, and a router that has a

stub peer will not query that peer. The stub router will depend on the distribution router to send the

proper updates to all peers.

Reference

http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/eigrpstb.html#wp1021949

QUESTION NO:28

Which two orders in the BGP Best Path Selection process are correct? (Choose two.)

A. Higher local preference, then lowest MED, then eBGP over iBGP paths

B. Higher local preference, then highest weight, then lowest router ID

C. Highest weight, then higher local preference, then shortest AS path

D. Lowest origin type, then higher local preference, then lowest router ID

E. Highest weight, then higher local preference, then highest MED

Answer: A,C

Explanation:

QUESTION NO:18

Refer to the exhibit.

Which statement is correct about the prefix 160.0.0.0/8?

A. The prefix has encountered a routing loop.

B. The prefix is an aggregate with an as-set.

C. The prefix has been aggregated twice, once in AS 100 and once in AS 200.

D. None of these statements is true.

Answer: B

Explanation:

QUESTION NO:9

Which two are effects of connecting a network segment that is running 802.1D to a network

segment that is running 802.1w? (Choose two.)

A. The entire network switches to 802.1D and generates BPDUs to determine root bridge status. B.

A migration delay of three seconds occurs when the port that is connected to the 802.1D bridge

comes up.

C. The entire network reconverges and a unique root bridge for the 802.1D segment, and a root

bridge for the 802.1w segment, is chosen.

D. The first hop 802.1w switch that is connected to the 802.1D runs entirely in 802.1D compatibility

mode and converts the BPDUs to either 802.1D or 802.1w BPDUs to the 802.1D or 802.1w

segments of the network.

E. Classic 802.1D timers, such as forward delay and max-age, will only be used as a backup, and

will not be necessary if point-to-point links and edge ports are properly identified and set by the

administrator.

Answer: B,E

Explanation:

Each port maintains a variable that defines the protocol to run on the corresponding segment. A

migration delay timer of three seconds also starts when the port comes up. When this timer runs,

the current STP or RSTP mode associated to the port is locked. As soon as the migration delay

expires, the port adapts to the mode that corresponds to the next BPDU it receives. If the port

changes its mode of operation as a result of a BPDU received, the migration delay restarts.

802.1D works by the concept that the protocol had to wait for the network to converge before it

transitioned a port into the forwarding state. With Rapid Spanning Tree it does not have to rely on

any timers, the only variables that that it relies on is edge ports and link types.

Any uplink port that has an alternate port to the root can be directly placed into the forwarding

state (This is the Rapid convergence that you speak of “restored quickly when RSTP is already in

use?”). This is what happened when you disconnected the primary look; the port that was ALT,

moved to FWD immediately, but the switch also still needs to create a BDU with the TC bit set to

notify the rest of the network that a topology has occurred and all non-edge designated ports will

transition to BLK, LRN, and then FWD to ensure there are no loops in the rest of the network. This

is why if you have a host on a switchport, and you know for a fact that it is only one host, enable

portfast to configure the port as an edgeport so that it does not have to transition to all the STP

states.

Reference

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml

QUESTION NO:22

Refer to the exhibit.

Which path is selected as best path?

A. path 1, because it is learned from IGP B.

path 1, because the metric is the lowest C.

path 2, because it is external

D. path 2, because it has the higher router ID

Answer: B

Explanation:

QUESTION NO:31

How will EIGRPv6 react if there is an IPv6 subnet mask mismatch between the Global Unicast

addresses on a point-to-point link?

A. EIGRPv6 will form a neighbor relationship.

B. EIGRPv6 will not form a neighbor relationship.

C. EIGRPv6 will form a neighbor relationship, but with the log MSG: “EIGRPv6 neighbor not on a

common subnet.”

D. EIGRPv6 will form a neighbor relationship, but routes learned from that neighbor will not be

installed in the routing table.

Answer: A Explanation:

http://www.ietf.org/rfc/rfc3587.txt

QUESTION NO:27

Refer to the exhibit.

What triggered the first SPF recalculation?

A. changes in a router LSA, subnet LSA, and external LSA

B. changes in a router LSA, summary network LSA, and external LSA

C. changes in a router LSA, summary network LSA, and summary ASBR LSA

D. changes in a router LSA, summary ASBR LSA, and external LSA

Answer: B

Explanation:

OSPFv2

Is built around links, and any IP prefix change in an area will trigger a full SPF. It advertises IP

information in Router and Network LSAs. The routers thus, advertise both the IP prefix information

(or the connected subnet information) and topology information in the same LSAs. This implies

that if an IP address attached to an interface changes, OSPF routers would have to originate a

Router LSA or a Network LSA, which btw also carries the topology information. This would trigger

a full SPF on all routers in that area, since the same LSAs are flooded to convey topological

change information. This can be an issue with an access router or the one sitting at the edge,

since many stub links can change regularly.

Only changes in interarea, external and NSSA routes result in partial SPF calculation (since type

3, 4, 5 and 7 LSAs only advertise IP prefix information) and thus IS-IS

QUESTION NO:13

Which two statements are true about traffic shaping? (Choose two.)

A. Out-of-profile packets are queued.

B. It causes TCP retransmits.

C. Marking/remarking is not supported.

D. It does not respond to BECN and ForeSight Messages.

E. It uses a single/two-bucket mechanism for metering.

Answer: A,C

Explanation:

QUESTION NO:5

Refer to the exhibit.

A small enterprise connects its office to two ISPs, using separate T1 links. A static route is used

for the default route, pointing to both interfaces with a different administrative distance, so that one

of the default routes is preferred.

Recently the primary link has been upgraded to a new 10 Mb/s Ethernet link.

After a few weeks, they experienced a failure. The link did not pass traffic, but the primary static

route remained active. They lost their Internet connectivity, even though the backup link was

operating.

Which two possible solutions can be implemented to avoid this situation in the future? (Choose

two.)

A. Implement HSRP link tracking on the branch router R1.

B. Use a track object with an IP SLA probe for the static route on R1.

C. Track the link state of the Ethernet link using a track object on R1.

D. Use a routing protocol between R1 and the upstream ISP.

Answer: B,D

Explanation:

Interface Tracking

Interface tracking allows you to specify another interface on the router for the HSRP process to

monitor in order to alter the HSRP priority for a given group.

If the specified interface’s line protocol goes down, the HSRP priority of this router is reduced,

allowing another HSRP router with higher priority can become active (if it has preemption

enabled).

To configure HSRP interface tracking, use the standby [group] track interface [priority] command.

When multiple tracked interfaces are down, the priority is reduced by a cumulative amount. If you

explicitly set the decrement value, then the value is decreased by that amount if that interface is

down, and decrements are cumulative. If you do not set an explicit decrement value, then the

value is decreased by 10 for each interface that goes down, and decrements are cumulative.

The following example uses the following configuration, with the default decrement value of 10.

Note: When an HSRP group number is not specified, the default group number is group 0.

interface ethernet0

ip address 10.1.1.1 255.255.255.0

standby ip 10.1.1.3

standby priority 110

standby track serial0

standby track serial1

The HSRP behavior with this configuration is:

0 interfaces down = no decrease (priority is 110)

1 interface down = decrease by 10 (priority becomes100)

2 interfaces down = decrease by 10 (priority becomes 90)

Reference

http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml#i

ntracking

QUESTION NO:7

Which statement is true about TCN propagation?

A. The originator of the TCN immediately floods this information through the network.

B. The TCN propagation is a two step process.

C. A TCN is generated and sent to the root bridge.

D. The root bridge must flood this information throughout the network.

Answer: C

Explanation:

Explanation

New Topology Change Mechanisms

When an 802.1D bridge detects a topology change, it uses a reliable mechanism to first notify the

root bridge.

This is shown in this diagram:

Once the root bridge is aware of a change in the topology of the network, it sets the TC flag on the

BPDUs it sends out, which are then relayed to all the bridges in the network. When a bridge

receives a BPDU with the TC flag bit set, it reduces its bridging-table aging time to forward delay

seconds. This ensures a relatively quick flush of stale information. Refer to Understanding

Spanning-Tree Protocol Topology Changes for more information on this process. This topology

change mechanism is deeply remodeled in RSTP. Both the detection of a topology change and its

propagation through the network evolve.

Topology Change Detection

In RSTP, only non-edge ports that move to the forwarding state cause a topology change. This

means that a loss of connectivity is not considered as a topology change any more, contrary to

802.1D (that is, a port that moves to blocking no longer generates a TC). When a RSTP bridge

detects a topology change, these occur:

It starts the TC While timer with a value equal to twice the hello-time for all its non-edge

designated ports and its root port, if necessary.

It flushes the MAC addresses associated with all these ports.

Note: As long as the TC While timer runs on a port, the BPDUs sent out of that port have the TC

bit set.

BPDUs are also sent on the root port while the timer is active.

Topology Change Propagation

When a bridge receives a BPDU with the TC bit set from a neighbor, these occur:

It clears the MAC addresses learned on all its ports, except the one that receives the topology

change.

It starts the TC While timer and sends BPDUs with TC set on all its designated ports and root port

(RSTP no longer uses the specific TCN BPDU, unless a legacy bridge needs to be notified).

This way, the TCN floods very quickly across the whole network. The TC propagation is now a one

step process. In fact, the initiator of the topology change floods this information throughout the

network, as opposed to 802.1D where only the root did. This mechanism is much faster than the

802.1D equivalent. There is no need to wait for the root bridge to be notified and then maintain the

topology change state for the whole network for seconds.

In just a few seconds, or a small multiple of hello-times, most of the entries in the CAM tables of

the entire network (VLAN) flush. This approach results in potentially more temporary flooding, but

on the other hand it clears potential stale information that prevents rapid connectivity restitution.

Reference

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml

350-001 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mUVBtM1piOS1IMEU/view?usp=sharing

350-001 exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/ [100% Exam Pass Guaranteed]

Why select/choose CertBus?

Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.

BrandCertbusTestkingPass4sureActualtestsOthers
Price$45.99$124.99$125.99$189$69.99-99.99
Up-to-Date Dumps
Free 365 Days Update
Real Questions
Printable PDF
Test Engine
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back
Secure Payment
Privacy Protection