Fravo.com Certification Made Easy MCSE, CCNA, CCNP, OCP, CIW, JAVA, Sun Solaris, Checkpoint World No1 Cert Guides info@Fravo.com CCIE Written Exam 350-001 Edition 5.0 © Copyrights 1998-2005 Fravo Technologies. All Rights Reserved. 350-001 http://www.fravo.com 1 Congratulations!! You have purchased a Fravo Technologies. Study Guide. This study guide is a complete collection of questions and answers that have been developed by our professional & certified team. You must study the contents of this guide properly in order to prepare for the actual certification test. The average time that we would suggest you for studying this study guide is approximately 15 to 20 hours and you will surely pass your exam. We guarantee it! GOOD LUCK! DISCLAIMER This study guide and/or material is not sponsored by, endorsed by or affiliated with Microsoft, Cisco, Oracle, Citrix, CIW, CheckPoint, Novell, Sun/Solaris, CWNA, LPI, ISC, etc. All trademarks are properties of their respective owners. Guarantee If you use this study guide correctly and still fail the exam, send a scanned copy of your official score notice at: info@fravo.com We will gladly refund the cost of this study guide or give you an exchange of study guide of your choice of the same or lesser value. This material is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this material, or any portion thereof, may result in severe civil and criminal penalties, and will be prosecuted to the maximum extent possible under law. © Copyrights 1998-2005 Fravo Technologies. All Rights Reserved. http://www.fravo.com 350-001 http://www.fravo.com 2 Q1. Consider the length of the netmask of a route, the administrative distance and the metric, what comes first when the router performs a route lookup in order to decide which interface to be forwarded a packet out of? A. The length of the netmask of a route. B. The administrative distance. C. The metric. D. None of the above. Answer: A Q2. (Refer the EXHIBITS given below.) Exhibit 1: Exhibit 2: hostname Router1 i ipx routing 1000.1000.1000 i interface Ethernet 0 IPX network ACA1234 i interface Serial 0 encapsulation frame-relay ipx network 100 frame-relay ipx 100.1000.1000.1001 i ipx router rip no network 100 i 350-001 http://www.fravo.com 3 ipx router EIGRP 1 i Exhibit 3: hostname Router2 i ipx routing 1000.1000.1001 i interface Ethernet 0 ipx network ACA1235 ipx gns-response-delay 10 ! interface Serial 0 encapsulation frame-relay ipx network 100 frame-relay map ipx 100.1000.1000.1000 i ipx router rip no network 100 i ipx router EIGRP 1 Will a workstation connected to Router 1 be able to attach to a server attached to the Ethernet interface on Router 2, assuming that the Frame Relay PVCs are up and running? A. No - Redistribution has not been configured between EIGRP and RIP. B. No - EIGRP will not run correctly over the Frame Relay cloud. C. No - The GNS response delay is configured on the wrong router. D. No - The IPX routing command is not matching the Ethernet's MAC address. E. Yes. Answer: D Q3. Routers A, B, and C are running IGRP over frame relay connections. No subinterfaces are used, and a single IP subnet is used for all the Frame Relay interfaces. Router A is able to see routers from both Router B and Router C, but Router B and Router C cannot see routers from each other. Which could be causing this problem? A. Router A is missing frame maps. B. Router B and Router C are missing frame maps. C. Split-horizon is enabled on Router A. D. Split-horizon is disabled on Router A. Answer: C Q4. Transparent bridges forward, flood, or drop frames based upon entries in the bridge table, which may be dynamically added to or removed from the table. 350-001 http://www.fravo.com 4 Which statements are TRUE regarding bridge table entries? A. Bridge table entries are learned by examining the destination MAC address of each frame. B. Bridge table entries are learned by examining the source MAC address of each frame. C. Increasing the bridge table aging time would result in a reduction of flooding. D. Decreasing the bridge table aging time would result in a reduction of flooding. E. It is important to ensure that the aging time is less than the aggregate time to detect and recalculate the spanning tree. Answer: B, C Q5. What is not a valid DNS resource record? A. MX B. PTR C. A D. FQDN E. NS Answer: D Q6. What is the purpose of the clock source command used in IOS T1/E1 interface command mode, wand what is the default setting? A. Routers are DTEs and NEVER supply clock to T1 /E1 line. B. clock source identifies the stratum level associated with the router T1 /E1 and the default us Stratum 1. C. clock source chooses a source for the interface to clock outbound data. The default is clock source line -Specifies that the T1 /E1 link uses the recovered clock from the line. D. clock source chooses a source for the interface to clock buffered data. The default is clock source loop-timed-Specifies that the T1 /E1 interface takes the clock from the Tx (line) and uses it for Rx. Answer: C Q7. How does a router behave in relation to an EIGRP stub neighbor? A. It will send only default-routes toward stub EIGRP neighbors. B. It well send only summary routes toward stub EIGRP neighbors. C. It will not query the stub EIGRP neighbor about any internal route. D. It will not query the stub EIGRP neighbor about any external route. E. It will not query the stub EIGRP neighbor about any route. Answer: E 350-001 http://www.fravo.com 5 Q8. Current configuration: ! version 12.0 service timestamps debug uptime service timestamps log update no service password-encryption ! hostname Simon enable secret 5 $1$XV53$hqb0Ra7gwpky0cmL4u3EW0 enable password cisco Given the configuration shown above, what should you type to gain enable access on router Simon? A. cisco B. Simon C. 4u3EW0 D. $1$XV53$hgb0Ra7gwpky0cmL4u3EW0 E. Cannot tell Answer: D Q9. Which statement concerning the difference between TACACS+ and RADIUS is NOT true? A. TACACS+ uses UDP while RADIUS uses TCP for transport. B. RADIUS only encrypts the password field of the packet while TACACS+ encrypts the entire body of the packet. C. RADIUS is an IETF standard, while TACACS+ is not. D. TACACS+ sends a separate request for authorization, while RADIUS uses the same request for authentication and authorization. Answer: A Q10. Which statement is true? A. PNNI has QoS awareness and has layer two reachability support. B. PNNI ignores QoS and supports both layer two and three routing. C. PNNI supports redistribution of IP routes to ATM routing tables and route dampening. D. PNNI comes up automatically when a switch is brought up, while IP routing protocols require specific configuration commands. E. PNNI must be connected in a three-level hierarchical topology; Ip does not require hierarchy. Answer: A Q11. Exhibit: (Refer the EXHIBIT given below.) 350-001 http://www.fravo.com 6 Router 1 and Router 2 are configured to use IPSec for securing traffic between network X and network Y. What is the correct crypto access-list that needs to be configured on Router 1? A. access-list 101 permit ip host 192.168. 1.1 host 192.168.1.2 B. access-list 101 permit ip 10.1.1.0.0.0.0.255 host 192.168.1.2 C. access-list 101 permit ip 10.1.1.0.0.0.0.255 10.1.2.0.0.0.0.255 D. access-list 101 permit ip 10.1.1.0.0.0.0.255 10.1.2.0.0.0.0.255 access-list 101 permit ip 10.1.2.0.0.0.0.255 10.1.1.0.0.0.0.255 E. access-list 101 permit ip 10.1.2.0.0.0.0.255 10.1.1.0.0.0.0.255 Answer: C Q12. What does the EIGRP Feasibility Condition mean? A. The FD must be unique. B. The FD must be higher than zero. C. The FD must be equal to RD. D. The RD must be lower than FD. E. None of the above. Answer: D Q13. Which are the primary reasons to use traffic shaping? (Choose two.) A. To control the maximum rate of traffic transmitted or received on an interface. B. To control access to available bandwidth. C. To define Layer 3 aggregate or granular incoming or outgoing bandwidth rate limits. D. To control the average queue size by indicating to the end hosts when they should temporarily slow down transmission of packets. E. To ensure that traffic conforms to the policies established for it. 350-001 http://www.fravo.com 7 Answer: B, E Q14. There is a point-to-point ISDN link between Routers A and B. Router A must be able to dial Router B, but Router B must NOT be able to dial Router A. What will accomplish this? A. Use an IP access-list with the access-group command on the interface. B. Remove the dial string from Router B. C. Use the no-dial keyword on the interface. D. Use the same IP address on both sides of the link. Answer: B Q15. The LAPD protocol is formally specified in: A. ITU-T T.30 B. ITU-T T.261 C. ITU-T Q.920 D. ITU-T T-31 E. ITU-T Q-931 Answer: C Q16. What is true about Custom Queuing? A. Custom queuing will always empty a queue before proceeding to the next queue. B. Custom queuing can be used to restrict a particular type of traffic to a given bandwidth regardless of the load on that link. C. Custom queuing looks at groups of packets from the same source-destination pair. D. Custom queuing can prevent one type of traffic from dominating a busy link. Answer: D Q17. In Frame Relay traffic shaping, the bc and be parameters are expresses as: A. Bits per second. B. Bits per interval. C. Bytes per second. D. Bytes per interval. Answer: B Q18. What effect do these configuration commands have? line vty 0 4 no login 350-001 http://www.fravo.com 8 password cisco A. The VTY password is cisco. B. The login password is login C. The VTY password is required but not set. D. No password is required for VTY access. Answer: D Q19. What statement is TRUE regarding Fast Ethernet Channel? A. Ports within a Fast Ether Channel do not have to be the same speed and duplex. B. Port Aggregation Protocol (PAGP) facilitates the automatic creation of Fast Ether channels links. C. Fast Ethernet Channels cannot be configured as a trunk. D. Ports within a Fast Ether Channels cannot be configured as a trunk. E. Ports within a Fast Ether Channel can be assigned to multiple VLANs. Answer: B Q20. Exhibit: (Refer the EXHIBIT given below.) RouterR1: ip multicast-routing interface loopback0 ip address 192.168.1.1 255.255.255.0 ip pim send-RP-announce loopback0 scope 16 group-list 1 ip pim send-RP-discovery loopback0 scope 16 access-list 1 permit 239.0.0.0 0.255.255.255 350-001 http://www.fravo.com 9 RouterR2: ip multicast-routing interface loopback 0 ip address 192.168.1.2 255.255.255.0 ip pim send-RP-announce loopback0 scope 16 group-list 1 ip pim send-RP-discovery loopback0 scope 16 access-list 1 permit 239.0.0.0 0.255.255.255 Given the configuration shown in the exhibit, which routers will be Mapping Agents and will actively source Auto-RP Discovery messages to group 224.0.1.40? A. Both Router A and B will be active Mapping Agents and both will begin sourcing Auto-RP Discovery messages to 224.0.1.39. B. Both Router A and B will be active Mapping Agents and both will begin sourcing Auto-RP Discovery messages to 224.0.1.40. C. Router A will be the active Mapping Agent and begin sourcing Auto-RP Discovery messages to 224.0.1.40, D. Router B will be the active Mapping Agent and begin sourcing Auto-RP Discovery message to 224.0.1.40. Answer: D Q21. RTP typically uses which protocols as a transport? A. IP/TCP B. IP/UDP C. IP/RTCP D. H.323/H.245 E. None of the above. Answer: B Q22. The first ISUP message sent by an originating node when establishing a call using Signalling System 7 is: A. an ACM B. an ANM C. an IAM D. a REL E. A RLC Answer: C [...]... of EIGRP packets carry the Init flag embedded? A B C D Hello Update Query Reply 31 http://www fravo. com 350-001 E Ack Answer: A Q74 The configured passwords for a Catalyst 5000 switch have been lost The switch will use a known password for the first 30 seconds after boot What is the password? A B C D E cisco Cisco Enter key Ctrl-shift-x SanFran Answer: C Q75 Which EIGRP packets are sent using a reliable... protect their network from Denial-of-Service attacks via ICMP floods, the command shown in the exhibit were configured This is an example of what QoS mechanism? A B C D E CBWFQ LLC RSVP CAR GTS Answer: D Q40 Exhibit: (Refer the EXHIBIT given below.) 17 http://www fravo. com 350-001 Given the OSPF network shown above, packets from Router 2 to Router 4 will: A B C D Always go through Router 1 Alternate... model are missing from the TCP/IP reference model? (Choose all that apply.) A B C D E Network Presentation Transport Session Data link Answer: B, D, E 12 http://www fravo. com 350-001 Q29 Exhibit: (Refer the EXHIBIT given below.) In the example shown, what prevents the flow of (S, G) traffic from being Pruned and cutting off the flow to the receiver? A Router C will hear the (S, G) Prune message from... Answer: D Q31 Load sharing of VLAN traffic over parallel ISL trunks is: A Not possible due to the nature of ISL B Configurable on a per VLAN basis C Configurable on a per packet basis 13 http://www fravo. com 350-001 D Automatic due to the nature of ISL and its interaction with the IEEE Spanning Tree protocol Answer: B Q32 Assume a Catalyst 6500 with a Supervisor IA with a MSFC The MSFC has lost its boot... tunnel end points to greater than 1524 B Decrease the physical interface MTU between the tunnel end points to less than 1476 bytes C Increase the IP MTU on the tunnel interfaces to 1500 14 http://www fravo. com 350-001 D Enable "ip unreachables" on all interfaces on Router 2 E Check to see if there is a filtering device between Router 2 and the server that's blocking ICMP messages If so, change the filter... Equivalence Class (FEC) on Router RS1: A B C D 172.16.3.0/24 and 192.1.1.0/28 172.16.1.0/24 and 172.16.2.0/24 172.16.1.0/24 and 193.1.1.0/28 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24 15 http://www fravo. com 350-001 Answer: C Q36 A company has deployed a new e-commerce web farm They are using teamed servers that use multicast to maintain a heartbeat between redundant pairs All servers are in the 192.168.202.0/24... Ports Teamed Ports Span Ports Answer: C Q37 Which is the protocol that On-Demand Routing relies on? A B C D E IP TCP CDP UDP PPP Answer: C Q38 Exhibit: (Refer the EXHIBIT given below.) 16 http://www fravo. com 350-001 When the PC host sends a 1500 byte TCP packet with the DF (Don't Fragment) bit set to the Internet, what should Router 1 do when it tries to forward this packet to the serial interface? A... Radius Kerberos Answer: A, C Q26 Exhibit: (Refer the EXHIBIT given below.) After issuing the command set spantree root 1 on Switch R1 in the shown diagram, what scenario would be FALSE? 11 http://www fravo. com 350-001 A No other switch in the network will be able to become root as long as Switch R1 remains up and running in this topology B Switch R1 will change its Spanning Tree priority to become the root... 1504 ft (500 m) 6.2 miles (10 km) 3.1 miles (5 km) 4.6 miles (7.5 km) This type of fiber is not supported with an LX/LH gbic Answer: B Q42 Exhibit: (Refer the EXHIBIT given below.) 18 http://www fravo. com 350-001 Router1: bridge irb ! interface Ethernet 0 no ip address bridge-group 1 ! interface Ethernet 1 no ip address brige-group 1 ! interface serial 0 ip address 10.1.2.1 255.255.2550 ! inferface... 10.1.1.1 255.255.255.0 no ip directed-broadcast ! router eigrp 1 network 10.1.0.0 ! bridge 1 protocol ieee bridge 1 route ip Router2: interface Ethernet 0 ip address 10.1.3.1 255.255.255.0 19 http://www fravo. com 350-001 i interface serial 0 ip address 10.1.2.2 255.255.255.0 i router eigrp 1 network 10.1.0.0 Assume this network has just been brought up If device 10.1.1.10 sent a UDP broadcast destined to FFFF.FFFF.FFFF . 10. 1.1 .0. 0 .0. 0.255 10. 1.2 .0. 0 .0. 0.255 D. access-list 101 permit ip 10. 1.1 .0. 0 .0. 0.255 10. 1.2 .0. 0 .0. 0.255 access-list 101 permit ip 10. 1.2 .0. 0 .0. 0.255 10. 1.1 .0. 0 .0. 0.255. 100 0. 100 0. 100 0 i interface Ethernet 0 IPX network ACA1234 i interface Serial 0 encapsulation frame-relay ipx network 100 frame-relay ipx 100 . 100 0. 100 0. 100 1