# Fravo Cisco 350-001 Exam Study Guide v5.0

Chia sẻ: Minh Thanh | Ngày: | Loại File: PDF | Số trang:92

0
175
lượt xem
10

## Fravo Cisco 350-001 Exam Study Guide v5.0

Mô tả tài liệu

Which statements are TRUE regarding bridge table entries? A. Bridge table entries are learned by examining the destination MAC address of each frame. B. Bridge table entries are learned by examining the source MAC address of each frame. C. Increasing the bridge table aging time would result in a reduction of flooding. D. Decreasing the bridge table aging time would result in a reduction of flooding. E. It is important to ensure that the aging time is less than the aggregate time to detect and recalculate the spanning tree. ...

Chủ đề:

Bình luận(0)

Lưu

## Nội dung Text: Fravo Cisco 350-001 Exam Study Guide v5.0

3. 350-001 Q1. Consider the length of the netmask of a route, the administrative distance and the metric, what comes first when the router performs a route lookup in order to decide which interface to be forwarded a packet out of? A. The length of the netmask of a route. B. The administrative distance. C. The metric. D. None of the above. Answer: A Q2. (Refer the EXHIBITS given below.) Exhibit 1: Exhibit 2: hostname Router1 i ipx routing 1000.1000.1000 i interface Ethernet 0 IPX network ACA1234 i interface Serial 0 encapsulation frame-relay ipx network 100 frame -relay ipx 100.1000.1000.1001 i ipx router rip no network 100 i 2 http://www. fravo.com
4. 350-001 ipx router EIGRP 1 i Exhibit 3: hostname Router2 i ipx routing 1000.1000.1001 i interface Ethernet 0 ipx network ACA1235 ipx gns-response-delay 10 ! interface Serial 0 encapsulation frame-relay ipx network 100 frame -relay map ipx 100.1000.1000.1000 i ipx router rip no network 100 i ipx router EIGRP 1 Will a workstation connected to Router 1 be able to attach to a server attached to the Ethernet interface on Router 2, assuming that the Frame Relay PVCs are up and running? A. No - Redistribution has not been configured between EIGRP and RIP. B. No - EIGRP will not run correctly over the Frame Relay cloud. C. No - The GNS response delay is configured on the wrong router. D. No - The IPX routing command is not matching the Ethernet's MAC address. E. Yes. Answer: D Q3. Routers A, B, and C are running IGRP over frame relay connections. No subinterfaces are used, and a single IP subnet is used for all the Frame Relay interfaces. Router A is able to see routers from both Router B and Router C, but Router B and Router C cannot see routers from each other. Which could be causing this problem? A. Router A is missing frame maps. B. Router B and Router C are missing frame maps. C. Split-horizon is enabled on Router A. D. Split-horizon is disabled on Router A. Answer: C Q4. Transparent bridges forward, flood, or drop frames based upon entries in the bridge table, which may be dynamically added to or removed from the table. 3 http://www. fravo.com
5. 350-001 Which statements are TRUE regarding bridge table entries? A. Bridge table entries are learned by examining the destination MAC address of each frame. B. Bridge table entries are learned by examining the source MAC address of each frame. C. Increasing the bridge table aging time would result in a reduction of flooding. D. Decreasing the bridge table aging time would result in a reduction of flooding. E. It is important to ensure that the aging time is less than the aggregate time to detect and recalculate the spanning tree. Answer: B, C Q5. What is not a valid DNS resource record? A. MX B. PTR C. A D. FQDN E. NS Answer: D Q6. What is the purpose of the clock source command used in IOS T1/E1 interface command mode, wand what is the default setting? A. Routers are DTEs and NEVER supply clock to T1 /E1 line. B. clock source identifies the stratum level associated with the router T1 /E1 and the default us Stratum 1. C. clock source chooses a source for the interface to clock outbound data. The default is clock source line -Specifies that the T1 /E1 link uses the recovered clock from the line. D. clock source chooses a source for the interface to clock buffered data. The default is clock source loop-timed-Specifies that the T1 /E1 interface takes the clock from the Tx (line) and uses it for Rx. Answer: C Q7. How does a router behave in relation to an EIGRP stub neighbor? A. It will send only default-routes toward stub EIGRP neighbors. B. It well send only summary routes toward stub EIGRP neighbors. C. It will not query the stub EIGRP neighbor about any internal route. D. It will not query the stub EIGRP neighbor about any external route. E. It will not query the stub EIGRP neighbor about any route. Answer: E 4 http://www. fravo.com
6. 350-001 Q8. Current configuration: ! version 12.0 service timestamps debug uptime service timestamps log update no service password-encryption ! hostname Simon enable secret 5 $1$XV53$hqb0Ra7gwpky0cmL4u3EW0 enable password cisco Given the configuration shown above, what should you type to gain enable access on router Simon? A. cisco B. Simon C. 4u3EW0 D.$1$XV53$hgb0Ra7gwpky0cmL4u3EW0 E. Cannot tell Answer: D Q9. Which statement concerning the difference between TACACS+ and RADIUS is NOT true? A. TACACS+ uses UDP while RADIUS uses TCP for transport. B. RADIUS only encrypts the password field of the packet while TACACS+ encrypts the entire body of the packet. C. RADIUS is an IETF standard, while TACACS+ is not. D. TACACS+ sends a separate request for authorization, while RADIUS uses the same request for authentication and authorization. Answer: A Q10. Which statement is true? A. PNNI has QoS awareness and has layer two reachability support. B. PNNI ignores QoS and supports both layer two and three routing. C. PNNI supports redistribution of IP routes to ATM routing tables and route dampening. D. PNNI comes up automatically when a switch is brought up, while IP routing protocols require specific configuration commands. E. PNNI must be connected in a three-level hierarchical topology; Ip does not require hierarchy. Answer: A Q11. Exhibit: (Refer the EXHIBIT given below.) 5 http://www. fravo.com
7. 350-001 Router 1 and Router 2 are configured to use IPSec for securing traffic between network X and network Y. What is the correct crypto access-list that needs to be configured on Router 1? A. access-list 101 permit ip host 192.168. 1.1 host 192.168.1.2 B. access-list 101 permit ip 10.1.1.0.0.0.0.255 host 192.168.1.2 C. access-list 101 permit ip 10.1.1.0.0.0.0.255 10.1.2.0.0.0.0.255 D. access-list 101 permit ip 10.1.1.0.0.0.0.255 10.1.2.0.0.0.0.255 access-list 101 permit ip 10.1.2.0.0.0.0.255 10.1.1.0.0.0.0.255 E. access-list 101 permit ip 10.1.2.0.0.0.0.255 10.1.1.0.0.0.0.255 Answer: C Q12. What does the EIGRP Feasibility Condition mean? A. The FD must be unique. B. The FD must be higher than zero. C. The FD must be equal to RD. D. The RD must be lower than FD. E. None of the above. Answer: D Q13. Which are the primary reasons to use traffic shaping? (Choose two.) A. To control the maximum rate of traffic transmitted or received on an interface. B. To control access to available bandwidth. C. To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate limits. D. To control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets. E. To ensure that traffic conforms to the policies established for it. 6 http://www. fravo.com