Free Share CertBus Cisco 350-001 Exam Dumps and Practice Questions and Answers

CertBus provides the most up to date and accurate preparing materials of the CCIE 350-001 certification exam Q and A , testing software, exam PDF and VCE files to help you prepare your CCIE 350-001 CCIE Routing and Switching Written exam. What training you are looking for? Come to visit our site and choose CertBus online certification materials, you will get a quick and cost-efficient way to become a Cisco CCIE certified professional in IT industry.

We CertBus has our own expert team. They selected and published the latest 350-001 preparation materials from Cisco Official Exam-Center: http://www.certgod.com/350-001.html

QUESTION NO:15

Which three options are considered in the spanning-tree decision process? (Choose three.)

A. lowest root bridge ID

B. lowest path cost to root bridge

C. lowest sender bridge ID

D. highest port ID

E. highest root bridge ID

F. highest path cost to root bridge

Answer: A,B,C

Explanation:

Configuration bridge protocol data units (BPDUs) are sent between switches for each port.

Switches use s four step process to save a copy of the best BPDU seen on every port. When a

port receives a better BPDU, it stops sending them. If the BPDUs stop arriving for 20 seconds

(default), it begins sending them again.

Step 1 Lowest Root Bridge ID (BID)

Step 2 Lowest Path Cost to Root Bridge

Step 3 Lowest Sender BID

Step 4 Lowest Port ID

Reference

Cisco General Networking Theory Quick Reference Sheets


QUESTION NO:27

Refer to the exhibit.

What triggered the first SPF recalculation?

A. changes in a router LSA, subnet LSA, and external LSA

B. changes in a router LSA, summary network LSA, and external LSA

C. changes in a router LSA, summary network LSA, and summary ASBR LSA

D. changes in a router LSA, summary ASBR LSA, and external LSA

Answer: B

Explanation:

OSPFv2

Is built around links, and any IP prefix change in an area will trigger a full SPF. It advertises IP

information in Router and Network LSAs. The routers thus, advertise both the IP prefix information

(or the connected subnet information) and topology information in the same LSAs. This implies

that if an IP address attached to an interface changes, OSPF routers would have to originate a

Router LSA or a Network LSA, which btw also carries the topology information. This would trigger

a full SPF on all routers in that area, since the same LSAs are flooded to convey topological

change information. This can be an issue with an access router or the one sitting at the edge,

since many stub links can change regularly.

Only changes in interarea, external and NSSA routes result in partial SPF calculation (since type

3, 4, 5 and 7 LSAs only advertise IP prefix information) and thus IS-IS


QUESTION NO:22

Refer to the exhibit.

Which path is selected as best path?

A. path 1, because it is learned from IGP B.

path 1, because the metric is the lowest C.

path 2, because it is external

D. path 2, because it has the higher router ID

Answer: B

Explanation:


QUESTION NO:13

Which two statements are true about traffic shaping? (Choose two.)

A. Out-of-profile packets are queued.

B. It causes TCP retransmits.

C. Marking/remarking is not supported.

D. It does not respond to BECN and ForeSight Messages.

E. It uses a single/two-bucket mechanism for metering.

Answer: A,C

Explanation:


QUESTION NO:30

What is the flooding scope of an OSPFv3 LSA, if the value of the S2 bit is set to 1 and the S1 bit is

set to 0?

A. link local

B. area wide

C. AS wide

D. reserved

Answer: C

Explanation:

The Type 1 router LSA is now link local and the Type 2 Network LSA is AS Wide

S2 and S1 indicate the LSA\’s flooding scope. Table 9-1 shows the possible values of these two

bits and the associated flooding scopes.

Table 9-1 S bits in the OSPFv3 LSA Link State Type field and their associated flooding scopes

LSA Function Code, the last 13 bits of the LS Type field, corresponds to the OSPFv2 Type field.

Table 9-2 shows the common LSA types used by OSPFv3 and the values of their corresponding

LS Types. If you decode the hex values, you will see that the default U bit of all of them is 0. The S

bits of all LSAs except two indicate area scope. Of the remaining two, AS External LSAs have an

AS flooding scope and Link LSAs have a linklocal flooding scope. Most of the OSPFv3 LSAs have

functional counterparts in OSPFv2; these OSPFv2 LSAs and their types are also shown in Table

9-2.

Table 9-2 OSPFv3 LSA types and their OSPFv2 counterparts

Reference

http://www.networkworld.com/subnets/cisco/050107-ch9-ospfv3.html?page=1


QUESTION NO:29

What is the first thing that happens when IPv6 is enabled on an interface on a host?

A. A router solicitation is sent on that interface.

B. There is a duplicate address detection on the host interface.

C. The link local address is assigned on the host interface.

D. A neighbor redirect message is sent on the host interface.

Answer: B

Explanation:

Duplicate address detection (DAD) is used to verify that an IPv6 home address is unique on the

LAN before assigning the address to a physical interface (for example, QDIO). z/OS

Communications Server responds to other nodes doing DAD for IP addresses assigned to the

interface.

Reference

http://publib.boulder.ibm.com/infocenter/zos/v1r12/index.jsp?topic=/com.ibm.zos.r12.hale001

/ipv6d0021002145.htm


QUESTION NO:7

Which statement is true about TCN propagation?

A. The originator of the TCN immediately floods this information through the network.

B. The TCN propagation is a two step process.

C. A TCN is generated and sent to the root bridge.

D. The root bridge must flood this information throughout the network.

Answer: C

Explanation:

Explanation

New Topology Change Mechanisms

When an 802.1D bridge detects a topology change, it uses a reliable mechanism to first notify the

root bridge.

This is shown in this diagram:

Once the root bridge is aware of a change in the topology of the network, it sets the TC flag on the

BPDUs it sends out, which are then relayed to all the bridges in the network. When a bridge

receives a BPDU with the TC flag bit set, it reduces its bridging-table aging time to forward delay

seconds. This ensures a relatively quick flush of stale information. Refer to Understanding

Spanning-Tree Protocol Topology Changes for more information on this process. This topology

change mechanism is deeply remodeled in RSTP. Both the detection of a topology change and its

propagation through the network evolve.

Topology Change Detection

In RSTP, only non-edge ports that move to the forwarding state cause a topology change. This

means that a loss of connectivity is not considered as a topology change any more, contrary to

802.1D (that is, a port that moves to blocking no longer generates a TC). When a RSTP bridge

detects a topology change, these occur:

It starts the TC While timer with a value equal to twice the hello-time for all its non-edge

designated ports and its root port, if necessary.

It flushes the MAC addresses associated with all these ports.

Note: As long as the TC While timer runs on a port, the BPDUs sent out of that port have the TC

bit set.

BPDUs are also sent on the root port while the timer is active.

Topology Change Propagation

When a bridge receives a BPDU with the TC bit set from a neighbor, these occur:

It clears the MAC addresses learned on all its ports, except the one that receives the topology

change.

It starts the TC While timer and sends BPDUs with TC set on all its designated ports and root port

(RSTP no longer uses the specific TCN BPDU, unless a legacy bridge needs to be notified).

This way, the TCN floods very quickly across the whole network. The TC propagation is now a one

step process. In fact, the initiator of the topology change floods this information throughout the

network, as opposed to 802.1D where only the root did. This mechanism is much faster than the

802.1D equivalent. There is no need to wait for the root bridge to be notified and then maintain the

topology change state for the whole network for seconds.

In just a few seconds, or a small multiple of hello-times, most of the entries in the CAM tables of

the entire network (VLAN) flush. This approach results in potentially more temporary flooding, but

on the other hand it clears potential stale information that prevents rapid connectivity restitution.

Reference

http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfa.shtml


QUESTION NO:18

Refer to the exhibit.

Which statement is correct about the prefix 160.0.0.0/8?

A. The prefix has encountered a routing loop.

B. The prefix is an aggregate with an as-set.

C. The prefix has been aggregated twice, once in AS 100 and once in AS 200.

D. None of these statements is true.

Answer: B

Explanation:


QUESTION NO:20

Refer to the exhibit.

What is the potential issue with this configuration?

A. There is no potential issue; OSPF will work fine in any condition.

B. Sub-optimal routing may occur since there is no area 1 adjacency between the ABRs.

C. This is a wrong OSPF configuration because all routers must be in area 0 only.

D. This is a wrong OSPF configuration because /30 requires 0.0.0.3 wild card.

Answer: B

Explanation:


QUESTION NO:8

Which statement is true about loop guard?

A. Loop guard only operates on interfaces that are considered point-to-point by the spanning tree.

B. Loop guard only operates on root ports.

C. Loop guard only operates on designated ports.

D. Loop guard only operates on edge ports.

Answer: A

Explanation:

Explanation

Understanding How Loop Guard Works

Unidirectional link failures may cause a root port or alternate port to become designated as root if

BPDUs are absent. Some software failures may introduce temporary loops in the network. Loop

guard checks if a root port or an alternate root port receives BPDUs. If the port is receiving

BPDUs, loop guard puts the port into an inconsistent state until it starts receiving BPDUs again.

Loop guard isolates the failure and lets spanning tree converge to a stable topology without the

failed link or bridge.

You can enable loop guard per port with the set spantree guard loop command.

Note When you are in MST mode, you can set all the ports on a switch with the set spantree

global-defaults loop-guard command.

When you enable loop guard, it is automatically applied to all of the active instances or VLANs to

which that port belongs. When you disable loop guard, it is disabled for the specified ports.

Disabling loop guard moves all loop-inconsistent ports to the listening state.

If you enable loop guard on a channel and the first link becomes unidirectional, loop guard blocks

the entire channel until the affected port is removed from the channel. Figure 8-6 shows loop

guard in a triangle switch configuration.

Figure 8-6 Triangle Switch Configuration with Loop Guard

Figure 8-6 illustrates the following configuration:

Switches A and B are distribution switches.

Switch C is an access switch.

Loop guard is enabled on ports 3/1 and 3/2 on Switches A, B, and C.

Use loop guard only in topologies where there are blocked ports. Topologies that have no blocked

ports, which are loop free, do not need to enable this feature. Enabling loop guard on a root switch

has no effect but provides protection when a root switch becomes a nonroot switch.

Follow these guidelines when using loop guard:

Do not enable loop guard on PortFast-enabled or dynamic VLAN ports.

Do not enable PortFast on loop guard-enabled ports.

Do not enable loop guard if root guard is enabled.

Do not enable loop guard on ports that are connected to a shared link.

Note: We recommend that you enable loop guard on root ports and alternate root ports on access

switches.

Loop guard interacts with other features as follows:

Loop guard does not affect the functionality of UplinkFast or BackboneFast.

Root guard forces a port to always be designated as the root port. Loop guard is effective only if

the port is a root port or an alternate port. Do not enable loop guard and root guard on a port at the

same time.

PortFast transitions a port into a forwarding state immediately when a link is established. Because

a PortFast-enabled port will not be a root port or alternate port, loop guard and PortFast cannot be

configured on the same port. Assigning dynamic VLAN membership for the port requires that the

port is PortFast enabled. Do not configure a loop guard-enabled port with dynamic VLAN

membership.

If your network has a type-inconsistent port or a PVID-inconsistent port, all BPDUs are dropped

until the misconfiguration is corrected. The port transitions out of the inconsistent state after the

message age expires. Loop guard ignores the message age expiration on type-inconsistent ports

and PVID-inconsistent ports. If the port is already blocked by loop guard, misconfigured BPDUs

that are received on the port make loop guard recover, but the port is moved into the type-

inconsistent state or PVID-inconsistent state.

In high-availability switch configurations, if a port is put into the blocked state by loop guard, it

remains blocked even after a switchover to the redundant supervisor engine. The newly activated

supervisor engine recovers the port only after receiving a BPDU on that port.

Loop guard uses the ports known to spanning tree. Loop guard can take advantage of logical ports

provided by the Port Aggregation Protocol (PAgP). However, to form a channel, all the physical

ports grouped in the channel must have compatible configurations. PAgP enforces uniform

configurations of root guard or loop guard on all the physical ports to form a channel.

These caveats apply to loop guard:


CertBus exam braindumps are pass guaranteed. We guarantee your pass for the 350-001 exam successfully with our Cisco materials. CertBus CCIE Routing and Switching Written exam PDF and VCE are the latest and most accurate. We have the best Cisco in our team to make sure CertBus CCIE Routing and Switching Written exam questions and answers are the most valid. CertBus exam CCIE Routing and Switching Written exam dumps will help you to be the Cisco specialist, clear your 350-001 exam and get the final success.

350-001 Latest questions and answers on Google Drive(100% Free Download): https://drive.google.com/file/d/0B_3QX8HGRR1mUVBtM1piOS1IMEU/view?usp=sharing

350-001 Cisco exam dumps (100% Pass Guaranteed) from CertBus: http://www.certgod.com/350-001.html [100% Exam Pass Guaranteed]

Why select/choose CertBus?

Millions of interested professionals can touch the destination of success in exams by certgod.com. products which would be available, affordable, updated and of really best quality to overcome the difficulties of any course outlines. Questions and Answers material is updated in highly outclass manner on regular basis and material is released periodically and is available in testing centers with whom we are maintaining our relationship to get latest material.

BrandCertbusTestkingPass4sureActualtestsOthers
Price$45.99$124.99$125.99$189$69.99-99.99
Up-to-Date Dumps
Free 365 Days Update
Real Questions
Printable PDF
Test Engine
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back
Secure Payment
Privacy Protection