Published on March 7, 2014
Get Success in Passing Your Certification Exam at first attempt! ExamReal.com, All Rights Reserved.
Cisco.350-001.v20090409.660q Vendor : Cisco Exam Name : Cisco Certified Internetworking Expert Exam Code : 350-001 For Full Set of Questions Please Visit : http://www.ExamReal.com/350-001.html
Cisco 350-001 Exam | ExamReal.com Exam A Console connection using Xmodem FTP TFTP SNMP SSH ea l.c A. B. C. D. E. om QUESTION 1 You have a Catalyst 6500 with a Supervisor IA with a MSFC. After a power outage, the MSFC has lost its boot image and now will only boot into ROMMON mode. You want to load a new image onto the Catalyst MSFC boot flash. What method can you use? Correct Answer: A Explanation xa om w QUESTION 2 Which of the following statements regarding the use of SPAN on a Catalyst 6500 are true? l.c m w R w .E ea xa l.c m om R Explanation/Reference: Explanation: The Catalyst 6000 Supervisor I and II modules have an onboard Flash file system that can handle several image files. In addition to this Flash, they also have a PCMCIA Flash slot. These Supervisors run their software from RAM and do not need their Flash system once correctly booted up. If an image is then corrupted or deleted, the standard upgrade procedure is always possible as long as the Supervisor is running a valid image. If the Supervisor is not booting up because there is no valid image to boot from the ROMMON, you will have to use the recovery procedure. 1. Booting from a PCMCIA Flash Card 2. Console Download using Xmodem In this situation option 2 is the only choice, since the MSFC has lost its boot image. Refer to the link below for a detailed discussion of recovery procedures for Catalyst Switches. Reference: http://www.cisco.com/en/US/products/hw/switches/ps663/products_tech_note09186a00800949c3 .shtml#cat6k w .E xa w Correct Answer: ACDE Explanation m w R w .E ea A. With SPAN an entire VLAN can be configured to be the source. B. If the source port is configured as a trunk port, the traffic on the destination port will also be tagged, irrespective of the configuration on the destination port. C. In any active SPAN session, the destination port will not participate in Spanning Tree. D. It is possible to configure SPAN to have a Gigabit port as the destination port. E. In one SPAN session it is possible to monitor multiple ports that do not belong to the same VLAN. w w Explanation/Reference: Explanation: A destination port (also called a monitor port) is a switch port where SPAN sends packets for analysis. If the trunking mode of a SPAN destination port is "on" or "nonegotiate" during SPAN session configuration, the SPAN packets forwarded by the destination port have the ncapsulation as specified by the trunk type; however, the destination port stops trunking, and the show trunk command reflects the trunking status for the port prior to SPAN session configuration. For a detailed discussion on SPAN and RSPAN refer the link below. Reference: http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sw_6_3/confg_gd/span.htm QUESTION 3 From the "show version" command you see that that the system file image is c2500- js-l_121- 7.bin. What IOS feature set is loaded on this router? A. Enterprise Contact Us : firstname.lastname@example.org Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com B. C. D. E. IP IP/IPX/AT/DEC Enterprise Plus IP Plus IPSec 3DES Correct Answer: D Explanation ea l.c om Explanation/Reference: Explanation: The system image file name in the exhibit is c2500-js-l_121-12.bin The table below shows the possible options IOS feature file name IP Plus c2500-is-l.121-7.bin IP c2500-i-l.121-7.bin Enterprise Plus IPSEC 56 c2500- jk8s -l.121-7.bin Enterprise Plus c2500-js-l.121-7.bin Enterprise c2500-j-l.121-7.bin xa ea The TACACS+ service is not running on the server. The password for this user is incorrect. The username does not exist in the TACACS+ user database. The NAS server lost its route to the TACACS+ server. The TACACS+ server is down. l.c xa w m w Correct Answer: BC Explanation om R w .E A. B. C. D. E. l.c m om R QUESTION 4 A new TACACS+ server is configured to provide authentication to a NAS for remote access users. A user tries to connect to the network and fails. The NAS reports a FAIL message. What could be the problem? (Choose all that apply). m w .E xa w w R w .E ea Explanation/Reference: Explanation: A FAIL condition is a result of incorrect username/password information. It means that an authentication request was successfully received, but that it had failed. A FAIL response is significantly different from an ERROR. A FAIL means that the user has not met the criteria contained in the applicable authentication database to be successfully authenticated. Authentication ends with a FAIL response. An ERROR means that the security server has not responded to an authentication query. Because of this, no authentication has been attempted. Only when an ERROR is detected will AAA select the next authentication method defined in the authentication method list. Reference: http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/secur_c/scprt1/scdaaa. htm Incorrect Answers: A, D, E. These would have resulted in an ERROR condition instead of a FAIL condition. With an error, the NAS would query the next authentication method. A. B. C. D. E. cisco abc123 sanfran CTRL+ESC No password, just hit the Enter key w w QUESTION 5 You have forgotten the password to your Catalyst 5000 switch. Immediately after power cycling the switch, you are faced with the password prompt. What default password should you type in? Correct Answer: E Contact Us : email@example.com Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com Explanation Explanation/Reference: Explanation: Password recovery in Cat 5000 switch is performed in the following way. Power cycle the switch. Hit the Enter key during the first 30 sec. The switch will allow you to get into the enable mode. You will have 60 seconds to change the password and save the configuration change made during this period. ea l.c RADIUS RADIUS+ Extended TACACS (XTACACS) TACACS TACACS+ Kerberos om l.c m Correct Answer: CD Explanation R A. B. C. D. E. F. om QUESTION 6 While setting up remote access for your network, you type in the "aaa new-model" configuration line in your Cisco router. Which authentication methods have you disabled as a result of this change? (Choose all that apply.) l.c m m w .E xa Correct Answer: E Explanation w R .E ea xa Reboot the switch using the reload command. Reboot the switch using the restart command. Set the configuration register to ignore the startup configuration. Set the boot register to 0x42. Power cycle the switch. Type in "config-register". w A. B. C. D. E. F. w w w QUESTION 7 You have forgotten the password to a Catalyst switch and need to perform a password recovery. What is the first step that should be taken to do this? om R w .E ea xa Explanation/Reference: Explanation: When you enable AAA, you can no longer access the commands to configure the older deprecated protocols, TACACS or Extended TACACS. If you decided to use TACACS or Extended TACACS in your security solution, do not enable AAA. Explanation/Reference: Explanation: The switch must be manually turned off (or unplugged), and then turned back on (plugged back in). Power cycling the switch is the only way to get into password recovery. w w Reference: http://www.cisco.com/warp/public/474/pswdrec_6000.html QUESTION 8 Which of the following statement is true regarding clocking for a Cisco T1 interface? A. The clock source command selects a source for the interface to clock received data. By default, it is clock source loop-timed (specifies that the T1/E1 interface takes the clock from the Tx (line) and uses it for Rx). B. Routers are DTEs and NEVER supply clocking to T1/E1 line. C. The clock source command specifies the location of the NTP server for timing. Contact Us : firstname.lastname@example.org Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com D. The clock source selects a source for the interface to clock outgoing data. The default is clock source line -Specifies that the T1/E1 link uses the recovered clock from the line. E. The clock source identifies the stratum level associated with the router T1/E1. The default is Stratum 1. Correct Answer: D Explanation ea l.c om Explanation/Reference: Explanation: Clocking can either be internal, looped, or line. The default is line, meaning that the router is receiving clocking from the carrier network line. Incorrect Answers: C, E. These answers relate to NTP services, which are used for providing time stamping information to the router and does not relate to clocking. Stratum levels provide a hierarchy to the NTP source, with the highest level as 1. om l.c m flowcontrol hardware transport input none no exec exec-timeout 0 0 ea xa A. B. C. D. R QUESTION 9 On your Terminal Server you are seeing spurious signals on line 6 of an asynchronous port due to contention issues. What command will fix this issue? R w .E Correct Answer: C Explanation om l.c R w .E ea xa w m w Explanation/Reference: Explanation: The "no exec" command is an optional command for reverse telnet configurations. Adding this line lessons the likelihood of contention over the asynchronous port. An executive process exists on all lines and buffer data to each other. At times, it can make it difficult to use a reverse telnet session. The command "no exec" will fix this. Incorrect Answers: A. Console ports do not use flow control. If the terminal server is connecting to Cisco console ports then the "Flowcontrol hardware" would have no bearing. B. This will fundamentally cut off all telnet and reverse telnet traffic from the line. D. This will disable the timeout value, but will not fix problems relating to spurious signals and contention issues. m Yes. The "no login" command disables all telnet access, even though the password is cisco. Yes. The VTY password is needed but not set, so all access will be denied. No. The VTY password is cisco. No. No password is needed for VTY access. No. The password is login. Correct Answer: D Explanation w w A. B. C. D. E. w .E xa w w QUESTION 10 You want to prevent all telnet access to your Cisco router. In doing so, you type in the following: line vty 0 4 no login password cisco Will this prevent all telnet access to the router as desired? Explanation/Reference: Explanation: "No Login" will not prompt users for any initial login, allowing them to access the router without a password. Contact Us : email@example.com Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com QUESTION 11 You need to upgrade the IOS on your Cisco router. What is the correct command needed to download the IOS image from a TFTP server with an IP address of 10.10.1.5/24? Copy tftp server from flash 10.10.1.5 "source file name" "destination file name" enter Copy flash tftp 10.10.1.5 255.255.255 "source-file-name" "destination-file-name" enter Copy tftp flash 10.10.1.5 "source-file-name" "destination-file-name" enter Copy flash tftp "source-file-name" "destination-file-name" 10.10.1.5 255.255.255.0 enter Copy tftp server 10.10.1.5 "destination-file-name" "source-file-name" enter om A. B. C. D. E. ea l.c Correct Answer: C Explanation om l.c m w w R w .E ea xa w m w R w .E ea xa l.c m om R Explanation/Reference: Explanation: The correct syntax is copy tftp flash source-name destination-name as shown below: Router# copy tftp: flash: System flash partition information: Partition Size Used Free Bank-Size State Copy-Mode 1 4096K 2048K 2048K 2048K Read Only RXBOOT-FLH 2 4096K 2048K 2048K 2048K Read/Write Direct [Type ?<no> for partition directory; ? for full directory; q to abort] Which partition? [default = 2] **** NOTICE **** Flash load helper v1.0 This process will accept the copy options and then terminate the current system image to use the ROM based image for the copy. Routing functionality will not be available during that time. If you are logged in via telnet, this connection will terminate. Users with console access can see the results of the copy operation. ---- ******** ---Proceed? [confirm] System flash directory, partition 1: File Length Name/status 1 3459720 master/igs-bfpx.100-4.3 [3459784 bytes used, 734520 available, 4194304 total] Address or name of remote host [255.255.255.255]? 172.16.1.1 Source file name? master/igs-bfpx-100.4.3 Destination file name [default = source name]? Loading master/igs-bfpx.100-4.3 from 172.16.1.111: ! Erase flash device before writing? [confirm] Flash contains files. Are you sure? [confirm] Copy 'master/igs-bfpx.100-4.3' from TFTP server as 'master/igs-bfpx.100-4.3' into Flash WITH erase? [yes/no] yes Reference: http://www.cisco.com/en/US/products/sw/iosswrel/ps5187/products_command_reference_chapte r09186a008017d031.html#1030138 w .E xa QUESTION 12 Under one of the serial interfaces of your router you see the following configured: Interface serial 0/0 Encapsulation PPP IP address 10.1.1.1 255.255.255.252 Invert txclock What is a reason for the "invert txclock" command being configured? w w A. It synchronizes TXD and RXD clocks. B. It corrects systems that use long cables that experience high error rates when operating at the higher transmission speeds. C. It is used for adjusting the transmit clock properties of the PPP negotiation process. D. It inverts the phase of the local clock used for timing incoming data the serial line. E. It is used to allow the interface to provide clocking, rather than receiving clocking from the line. Correct Answer: B Explanation Contact Us : firstname.lastname@example.org Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com om Explanation/Reference: Explanation: Systems that use long cables or cables that are not transmitting the TxC signal (transmit echoed clock line, also known as TXCE or SCTE clock) can experience high error rates when operating at the higher transmission speeds. For example, if a PA-8T synchronous serial port adapter is reporting a high number of error packets, a phase shift might be the problem. Inverting the clock might correct this shift. Incorrect Answers: B. The invert txclock command is not related to PPP. E. This describes the purpose of the clocking source configuration for a serial line. The correct configuration command for determining the clocking source is "clock source". xa ea cisco ExamS sanfran $1$XV53$hqb0R7gwpky0$ Enter key Unable to be determined om l.c xa w Correct Answer: F Explanation m w R w .E A. B. C. D. E. F. l.c m om R ea l.c QUESTION 13 You are the network administrator at Company. You want to gain access on Router ExamS on the Company network. The current configuration is shown in the following exhibit: ! version 12.2 service timestamps log update no service password-encryption ! hostname ExamS ! enable secret 5 $1$XV53$hqb0R7gwpky0$ enable password sanfran What must you type to gain access to Router ExamS? m w .E xa w w R w .E ea Explanation/Reference: Explanation: The enable secret password takes precedence over the enable password. In this example, the enable secret is encrypted. You would need to type the unencrypted password to gain access. In the configuration file, you can tell that the enable secret command is encrypted due to the fact that the number 5 (for MD5) precedes the password. Incorrect Answers: B. ExamS is simply the host name associated with the router. It has nothing to do with the password. C. The enable secret password always overrides the enable password. Note that in this case the enable password is also normally encrypted (using a less secure type 7 encryption algorithm). However, since the "no service password-encryption" command was used, the normal enable password is shown in the clear. However, this does not apply to the enable secret password. w w QUESTION 14 While troubleshooting an issue with one of the slots on your Cisco device, you issue the "show diag" command as shown below: Router#show diag 10 Slot 10: Physical slot 10, ~physical slot 0x5, logical slot 10, CBus 0 Microcode Status 0x4 Master Enable, LED, WCS Loaded Board is analyzed Pending I/O Status: None EEPROM format version 1 VIP2 RSK controller, HW rev 2.02, board revision D0 Serial number: 17090200 Part number: 73-2167-05 Test history: 0x00 RMA number: 00-00-00 Contact Us : email@example.com Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com Flags: cisco 7000 board; 7500 compatible EEPROM contents (hex): 0x20: 01 1E 02 02 01 04 C6 98 49 08 77 05 00 00 00 00 0x30: 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Slot database information: Flags: 0x4 Insertion time: 0x18C0 (00:29:13 ago) Controller Memory Size: 32 Mbytes DRAM, 4096 Kbytes SRAM Based on the information above, what is the model of the Versatile Interface Processor (VIP)? What would your reply be? om VIP2.50 VIP2.40 VIP2-30 VIP2-20 VIP2-10 ea l.c A. B. C. D. E. Correct Answer: A Explanation om m w R w .E ea xa l.c m om R Explanation/Reference: Explanation: How to Identify the VIP2 Model There are five different versions of the VIP2: the VIP2-10, the VIP2-15, the VIP2-20, the VIP2-40, and the VIP2-50. The VIP2-10, VIP2-15, VIP2-20, and VIP2-40 all use the same motherboard, but differ in the amount of DRAM and SRAM. You can upgrade to a higher performing VIP2 simply by upgrading the DRAM and SRAM. The VIP2-50 uses a different motherboard and SDRAM and SRAM memory devices than the other VIP2 models; therefore, you cannot install VIP2-50 SDRAM or SRAM memory devices on the earlier VIP2 models, and you cannot install DRAM or SRAM memory devices from earlier VIP2 models on the VIP2-50. Also, you cannot use DRAM designated for the Route Switch Processor (RSP) on the VIP2 models. Reference: http://www.ciscosystems.lt/en/US/products/hw/routers/ps359/prod_module_installation_guide091 86a00800fd116.html#108093 R m w .E xa Correct Answer: ACD Explanation l.c ea .E w w Echo Daytime Chargen Discard DHCP Finger w A. B. C. D. E. F. xa w QUESTION 15 What protocols are considered to be UDP small servers? (Choose all that apply) w w Explanation/Reference: Explanation: TCP and UDP small servers are servers (daemons, in Unix parlance) that run in the router which are useful for diagnostics. The UDP small servers are: ?Echo: Echoes the payload of the datagram you send. ?Discard: Silently pitches the datagram you send. ?Chargen: Pitches the datagram you send and responds with a 72 character string of ASCII characters terminated with a CR+LF. These 3 servers are enabled when the "service UDP-smallservers" commands. Reference: http://www.cisco.com/warp/public/66/23.html Incorrect Answers: B. Daytime: Returns system date and time, if correct. It is correct if you are running Network Time Protocol (NTP) or have set the date and time manually from the exec level. The command to use is telnet x.x.x.x daytime. Daytime is a TCP small server. E. Although DHCP uses UDP, it is not considered a UDP small Contact Us : firstname.lastname@example.org Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com server by Cisco. F. The router also offers finger service and async line bootp service, which can be independently turned off with the configuration global commands no service finger and no ip bootp server, respectively. This is in addition to the TCP and UDP small servers. QUESTION 16 The flash on your Cisco 2500 shows that it is running c2500-js-l_121-12.bin as the IOS. What IOS feature set is this? om IP/IPX/AT/IBM IP Enterprise Plus IPSEC 3DES Enterprise Plus Enterprise ea l.c A. B. C. D. E. Correct Answer: D Explanation om l.c m w .E xa w w R w .E ea xa w m w QUESTION 17 The modules of a Catalyst 6509 are shown below: R w .E ea xa l.c m om R Explanation/Reference: Explanation: The system image file name in the exhibit is c2500-js-l_121-12.bin, so it's Enterprise Plus. The following table shows the possible IOS feature sets: IOS feature file name IP Plus c2500-is-l.121-12.bin IP c2500-i-l.121-12.bin Enterprise Plus IPSEC 56 c2500- jk8s -l.121-12.bin Enterprise Plus c2500-js-l.121-12.bin Enterprise c2500-j-l.121-12.bin Reference: CCO login required http://www.cisco.com/warp/customer/432/features.html#select_s A. B. C. D. E. c6sup12-jsv.mz.121-7a.E1.bin c6sup22-jsv-mz.121-8a.E3.bin c6msfc2-jsv-mz.121-7a.E1.bin cat6000-sup2.6-3-3.bin cat6000-sup6-3-3.bin Correct Answer: B Explanation w w The switch is currently running Hybrid code. You wish to convert this switch to native Cisco IOS. What is the correct IOS version needed to do this? Explanation/Reference: Explanation: There are currently four different types of images for the Catalyst Native IOS, based on the MSFC and Contact Us : email@example.com Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com xa l.c m om R ea l.c om Supervisor installed. The naming convention is as follows: C6supxy-Indicates the Supervisor/MSFC combination, where x=supervisor and y=MSFC. The four types are: 1. c6sup-original name for the native IOS. Runs on the original supervisor 1, MSFC1. 2. c6sup11 - supervisor 1, MSFC 1 3. c6sup12 - supervisor 1, MSFC 2 4. c6sup22 - supervisor 2, MSFC 2 As you can see from the output on this question, the CAT has a SUP2/MSFC2, so option B is our only choice. Supervisor Engine 2 with MSFC2 Software Images and Ordering Information Product Number Description Image S6S22AV-12113E Cisco Catalyst 6000 and Cisco 7600 c6sup22-jsv-mz.121-13.E1 Supervisor Engine 2/ MSFC2 Cisco IOS Enterprise with Versatile Interface Processor (VIP) Software Release 12.1(13)E1 S6S22ALV-12113E Cisco Catalyst 6000 and Cisco 7600 c6sup22-js-mz.121-13.E1 Supervisor Engine 2/MSFC2 Cisco IOS Enterprise LAN Only Software Release 12.1(13)E1 S6S22AK2-12113E Cisco Catalyst 6000 and Cisco 7600 c6sup22-jk2sv-mz.121-13.E1 Supervisor Engine 2/MSFC2 Cisco IOS Enterprise with VIP and 3DES Software Release 12.1(13)E1 Incorrect Answers: A. This would be the correct native IOS for a Catalyst with a supervisor 1. C. This is not using the correct naming convention used by Cisco. D, E. IOS that starts with cat6000 means that is Hybrid IOS. w .E ea QUESTION 18 Which protocols are considered to be TCP small servers? (Choose all that apply). l.c m .E Correct Answer: ACDE Explanation ea xa w om R Echo Time Daytime Chargen Discard Finger DHCP w A. B. C. D. E. F. G. m w .E xa w w w w R w Explanation/Reference: Explanation: TCP and UDP small servers are servers (daemons, in Unix parlance) that run in the router which are useful for diagnostics. TCP Small Servers are enabled with the service tcp-small-servers command The TCP small servers are: ?Echo: Echoes back whatever you type by using the telnet x.x.x.x echo command. ?Chargen: Generates a stream of ASCII data. The command to use is telnet x.x.x.x chargen. ?Discard: Throws away whatever you type. The command to use is telnet x.x.x.x discard. ?Daytime: Returns system date and time, if correct. It is correct if you are running Network Time Protocol (NTP) or have set the date and time manually from the exec level. The command to use is telnet x.x.x.x daytime. Replace x.x.x.x with the address of your router. Most routers inside Cisco run the small servers. Incorrect Answers: F. DHCP is not considered a UDP small server by Cisco. G. The router also offers finger service and async line bootp service, which can be independently turned off with the configuration global commands no service finger and no ip bootp server, respectively. This is in addition to the TCP and UDP small servers. QUESTION 19 You have lost the password to your Cisco 3550 switch. Which of the following choices display the correct order for resetting the password? A. Unplug power, Hold mode button down, Connect PC with terminal emulation software to console port, Contact Us : firstname.lastname@example.org Get Success in Passing Your Certification Exam at first attempt
Cisco 350-001 Exam | ExamReal.com m Correct Answer: E Explanation om E. om D. ea l.c C. R B. plug power in, issue flash_init, issue load_helper, issue rename flash:config.text flash:config.old, issue boot, issue no, issue enable, issue rename flash:config.old flash:config.text, reload Connect PC with terminal emulation software to console port, Unplug power, Hold mode button down, ,plug power in, issue flash_init, issue load_helper, issue rename flash:config.etext flash:config.old, issue boot, issue no, issue enable, issue rename flash:config.old flash:config.text, issue config t, issue no enable secret, issue write mem Unplug power, Hold mode button down, plug power in, issue rename flash:config.text flash:config.old, issue boot, issue no, issue enable, issue rename flash:config.old flash:config.text, issue copy flash:config.text system runningconfig, issue config t, issue no enable secret, reload Connect PC with terminal emulation software to console port, Unplug power, plug power in, issue flash_init, issue load_helper, issue rename flash:config.text flash:config.old, issue boot issue no, issue enable, issue rename flash:config.old flash:config.text, issue copy flash:config.text system runningconfig, issue config t, issue no enable secret, issue write mem Connect PC with terminal emulation software to console port, Unplug power, Hold mode button down, ,plug power in, issue flash_init, issue load_helper, issue rename flash:config.text flash:config.old, issue boot, issue no, issue enable, issue rename flash:config.old flash:config.text, issue copy flash:config.text system running-config, issue config t, issue no enable secret, issue write mem om l.c m w .E xa w w w w R w .E ea xa w m w R w .E ea xa l.c Explanation/Reference: Explanation: The following is the complete step by step password recovery procedure for a Cisco 3550: 1. Attach a terminal or PC with terminal emulation (for example, Hyper Terminal) to the console port of the switch. Use the following terminal settings: ?Bits per second (baud): 9600 ?Data bits: 8 ?Parity: None ?Stop bits: 1 ?Flow Control: Xon/Xoff Note: For additional information on cabling and connecting a terminal to the console port, refer to Connecting a Terminal to the Console Port on Catalyst Switches. 2. Unplug the power cable. 3. Hold down the mode button located on the left side of the front panel, while reconnecting the power cable to the switch. For 2900/3500XL and 3550 Series switches: release the mode button after the LED above Port 1x goes out. Note: LED position may vary slightly depending on the model. Catalyst 3524XL For 2950 Series switches: release the mode button after the STAT LED goes out. Note: LED position may vary slightly depending on the model. Catalyst 2950-24 Contact Us : email@example.com Get Success in Passing Your Certification Exam at first attempt
The following instructions appear: The system has been interrupted prior to initializing the flash filesystem. The following commands will initialize the flash filesystem, and finish loading the operating system software: flash_init load_helper boot switch: !--- This output is from a 3500XL switch. Output from a 2900XL, 2950 or 3550 will vary slightly. 4. Issue the flash_init command. switch: flash_init Initializing Flash... flashfs: 143 files, 4 directories flashfs: 0 orphaned files, 0 orphaned directories flashfs: Total bytes: 3612672 flashfs: Bytes used: 2729472 flashfs: Bytes available: 883200 flashfs: flashfs fsck took 86 seconds ....done Initializing Flash. Boot Sector Filesystem (bs:) installed, fsid: 3 Parameter Block Filesystem (pb:) installed, fsid: 4 switch: !--- This output is from a 2900XL switch. Output from a 3500XL, 3550 or 2950 will vary slightly. 5. Issue the load_helper command. switch: load_helper switch: 6. Issue the dir flash: command. The switch file system is displayed: switch: dir flash: Directory of flash:/ 2 -rwx 1803357 <date> c3500xl-c3h2s-mz.120-5.WC7.bin !--- This is the current version of software. 4 -rwx 1131 <date> config.text !--- This is the configuration file. 5 -rwx 109 <date> info 6 -rwx 389 <date> env_vars 7 drwx 640 <date> html 18 -rwx 109 <date> info.ver 403968 bytes available (3208704 bytes used) switch: !--- This output is from a 3500XL switch. Output from a 2900XL, 2950 or 3550 will vary slightly. 7. Type rename flash:config.text flash:config.old to rename the configuration file. switch: rename flash:config.text flash:config.old switch: !--- The config.text file contains the password definition. 8. Issue the boot command to boot the system. switch: boot Loading "flash:c3500xl-c3h2s-mz.1205.WC7.bin"...############################### ###################################################### ########################## ###################################################### ################ File "flash:c3500xl-c3h2s-mz.120-5.WC7.bin" uncompressed and installed, entry po int: 0x3000 executing...
!--- Output truncated. !--- This output is from a 3500XL switch. Output from a 2900XL, 2950 or 3550 will vary slightly. 9. Enter "n" at the prompt to start the Setup program. --- System Configuration Dialog --At any point you may enter a question mark '?' for help. Use ctrl-c to abort configuration dialog at any prompt. Default settings are in square brackets ''. Continue with configuration dialog? [yes/no]: n !--- Type "n" for no. Press RETURN to get started. !--- press Return or Enter. Switch> !--- The Switch> prompt is displayed. 10. At the switch prompt type en to enter enable mode. Switch>en Switch# 11. Type rename flash:config.old flash:config.text to rename the configuration file with its original name. Switch#rename flash:config.old flash:config.text Destination filename [config.text] !--- Press Return or Enter. Switch# 12. Copy the configuration file into memory: Switch#copy flash:config.text system:running-config Destination filename [running-config]? !--- Press Return or Enter. 1131 bytes copied in 0.760 secs Switch# The configuration file is now reloaded. 13. Change the password: Switch#configure terminal Switch(config)#no enable secret !--- This step is necessary if the switch had an enable secret password. Switch(config)#enable password Cisco Switch#(config)#^Z !--- Control/Z. 14. Write the running configuration to the configuration file with the write memory command: Switch#write memory Building configuration... [OK] Switch# QUESTION 20 Unauthorized access to Cisco devices can be prevented through different privilege level settings. How many of these privilege levels exist? A. B. C. D. E. 5 16 4 0 15 Correct Answer: B Explanation Explanation/Reference: Explanation: There are 16 privilege-levels (0 to 15, inclusive). Incorrect Answers: A. This is the default number of vty sessions that can be placed on a router for remote telnet access (vty levels 0-4, inclusive). E. The highest level is level 15, but we must also count the lowest level (level 0) for a total of 16.
QUESTION 21 Which command will display both the local and all remote SNMP engine Identification information? A. B. C. D. E. F. G. Show SNMP ID Show engine Show SNMP engineID Show SNMP engine ID Show SNMP stats Show SNMP mib Show SNMP users Correct Answer: C Explanation Explanation/Reference: Explanation: The following is a sample output from a Cisco router: Company# show snmp ? mib show mib objects context engineID show local and remote SNMP engine IDs group show SNMPv3 groups pending snmp manager pending requests sessions snmp manager sessions stats show snmp statistics user show SNMPv3 users | Output modifiers <cr> Company# show snmp Reference: CCO login required. http://www.cisco.com/en/US/products/sw/iosswrel/ps5207/products_command_reference_chapte r09186a00801a809e.html#1030651 QUESTION 22 From the IOS command line interface, you accidentally press the Esc B keys while typing in a configuration line. What is the result of this action? A. B. C. D. E. The cursor will move to the beginning of the entire command The cursor will move back one character. The cursor will move back one word The cursor will remain in the same location. Noting, this is not a valid shortcut. Correct Answer: C Explanation Explanation/Reference: Explanation: The following table describes the different shortcut options and functions that areavailable from the Cisco Command Line Interface: Keystroke Function Ctrl-A Jumps to the first character of the command line. Ctrl-B or the left arrow Moves the cursor back one character. key Ctrl-C Escapes and terminates prompts and tasks. Ctrl-D Deletes the character at the cursor. Ctrl-E Jumps to the end of the current command line. Ctrl-F or the right
arrow Moves the cursor forward one character. key1 Ctrl-K Deletes from the cursor to the end of the command line. Ctrl-L Ctrl-R Repeats current command line on a new line. Ctrl-N or the down arrow Enters next command line in the history buffer. key1 Ctrl-P or the up Enters previous command line in the history buffer arrow key1 Deletes from the cursor to the beginning of the command Ctrl-U; Ctrl-X line. Ctrl-W Deletes last word typed. Esc B Moves the cursor back one word. Esc D Deletes from the cursor to the end of the word Esc F Moves the cursor forward one word. Delete key or Erases mistake when entering a command; re-enter Backspace command after key using this key. Incorrect Answers: A. This will be the result of the Ctrl-A command. B. This will be the result of the Ctrl-B command, not Esc B. QUESTION 23 Which types of SNMPv1 messages are sent from the NMS (Network Management Station) using SNMP version 1 to the Agent? A. B. C. D. E. Trap, Get and Set Get, Set and Getnext Get, Set, Getnext and GetBulk Get, Set and GetBulk Trap only Correct Answer: B Explanation Explanation/Reference: Explanation: SNMP itself is a simple request/response protocol, and the SNMPv1 operations used bythe NMS are defined as below. Get: Allows the NMS to retrieve an object variable from the agent. GetNext: Allows the NMS to retrieve the next object variable from a table or list within an agent. In SNMPv1, when a NMS wants to retrieve all elements of a table from an agent, it initiates a Get operation, followed by a series of GetNext operations. Set: Allows the NMS to set values for object variables within an agent. Incorrect Answers: A, E. SNMP traps are used by the agent to inform the NMS of some events. C, D. GetBulk is used in SNMPv2, not version 1. SNMPv2 defines two new operations: GetBulk and Inform. The GetBulk operation is used to efficiently retrieve large blocks of data. The Inform operation allows one NMS to send trap information to another NMS and to then receive a response. In SNMPv2, if the agent responding to GetBulk operations cannot provide values for all the variables in a list, it provides partial results. QUESTION 24 What is the difference between the community formats of SNMPv1 SNPMv2c? A. B. C. D. E. With SNPMv1, communities are sent as clear text and on SNPMv2c they are encrypted. On SNPMv1 communities are encrypted and on SNPMv2c they are sent as clear text. There is no difference because both versions send encrypted communities. There is no difference because both versions send communities as clear text. SNMPv2c does not use communities.
Correct Answer: D Explanation Explanation/Reference: Explanation: The original Internet standard Network Management Framework, described in RFCs 1155, 1157, and 1213, is called the SNMP version 1 (SNMPv1) framework. Relevant portions of the proposed framework for version 2C of the Simple Network Management Protocol (SNMPv2C) are described in RFCs 1901 through 1908. SNMPv1 and SNMPv2c use a community string match for user authentication. Community strings provided a weak form of access control in earlier versions of SNMP. SNMPv3 provides much improved access control using strong authentication and should be preferred over SNMPv1 and SNMPv2c wherever it is supported. Both versions send communities as clear text messages. QUESTION 25 Exhibit: What method is being used to secure the console port of this router? A. Authentication is being done using the local database, if the user is not defined on the server at 192.168.1.15. B. Authentication is being done using the login password dfgh456. C. Authentication is being done using the enable password as a default. D. Authentication is being done using the server at IP address 192.168.1.15. If that server fails to respond, the local database will be used. E. Authentication is being done using the server at IP address 192.168.2.27. If that server fails to respond, the server at IP address 192.168.1.15 will be used. Correct Answer: D Explanation Explanation/Reference: Explanation: The router is using the keyword access3 for authentication for the console port. Access3 points to two different methods for authentication; the first is TACACS+ which is located at 192.168.1.15. If the authentication connection to the server fails, then the local database will be used as a backup. Incorrect Answers: A. Based on the configuration file above, TACAS+ is the primary authentication method and the local database is to only be used as a backup method.
B. This is the password that is to be used for Telnet access, not the console password. C. The enable password is not used, since the login authentication information is taken from the "access3" keyword. E. This is the IP address of the RADIUS server, not the TACACS+ server. QUESTION 26 Network management tools use Management Information Base (MIB) information to monitor and manage networks. Which of the following is NOT part of the MIB-2 specification, as defined in RFC 1213? (Choose all that apply) A. B. C. D. E. F. The System Group The TCP Group The Transmission Group The Enterprises Group The RMON Group The ICMP Group Correct Answer: DE Explanation Explanation/Reference: Explanation: RFC 1213 defines the "Management Information Base for Network Management of TCP/IP-based internets: MIB-II" specification. It defines all of the following groups: System, Interfaces, Address Translation, IP, ICMP, TCP, UDP, EGP, Transmission, and SNMP. The RMON group is not part of RFC 1213, nor is the Enterprises Group QUESTION 27 The Company network is displayed in the exhibit below: You want to block all Smurf attacks that originate on the 192.168.2.0 network from being sent into the 192.168.1.0 network. However, all other traffic must be permitted. No access lists currently exist on the router. Which of the following configuration excerpt would accomplish this task when applied to E0 on ES1 as an input filter? A. access-list 1 permit 192.168.2.0 0.0.0.255 access-list 1 deny any B. access-list 1 deny 192.168.1.0 0.0.0.255 access-list 1 permit any
C. access-list 100 permit ip any 192.168.1.0 0.0.0.255 access-list 100 deny ip any any D. access-list 100 deny icmp any 192.168.1.255 0.0.0.0 echo access-list 100 permit icmp any 192.168.1.0 0.0.0.255 echo access-list 100 permit ip any any E. access-list 100 deny icmp any 192.168.1.255 0.0.0.0 echo-reply access-list 100 permit icmp any any echo-reply access-list 100 permit ip any any Correct Answer: D Explanation Explanation/Reference: Explanation: Anatomy of a SMURF Attack A SMURF attack (named after the program used to perform the attack) is a method by which an attacker can send a moderate amount of traffic and cause a virtual explosion of traffic at the intended target. The method used is as follows: ?The attacker sends ICMP Echo Request packets where the source IP address has been forged to be that of the target of the attack. ?The attacker sends these ICMP datagrams to addresses of remote LANs broadcast addresses, using socalled directed broadcast addresses. These datagrams are thus broadcast out on the LANs by the connected router. ?All the hosts which are "alive" on the LAN each pick up a copy of the ICMP Echo Request datagram (as they should), and sends an ICMP Echo Reply datagram back to what they think is the source. If many hosts are "alive" on the LAN, the amplification factor can be considerably (100+ is not uncommon). ?The attacker can use largish packets (typically up to ethernet maximum) to increase the "effectiveness" of the attack, and the faster network connection the attacker has, the more damage he can inflict on the target and the target's network. Not only can the attacker cause problems for the target host, the influx of traffic can in fact be so great as to have a seriously negative effect on the upstream network(s) from the target. In fact, those institutions being abused as amplifier networks can also be similarly affected, in that their network connection can be swamped by the Echo Reply packets destined for the target. In this example, answer choice D is correct as it prevents all ICMP messages destined to the broadcast IP address. Note: The Cisco IOS command "no ip directed-broadcasts" is also an effective way to prevent smurf and fraggle attacks on the network. Incorrect Answers: A. This will permit all traffic sourced from the 192.168.2.0/24 network, including the smurf attack packets. B. This choice will deny all traffic sourced from the 192.168.1.0 incoming on the e0 interface. Although this is probably a good choice, as it will effectively prevent all spoofed IP traffic (as the 192.168.1.0/24 network should never be a source IP address in the incoming direction of this interface) we wish to only prevent the smurfed traffic, so E is a better choice. C. This choice will only permit traffic that is destined to the 192.168.1.0 network. If additional networks exist behind the 192.168.1.0 network, such as traffic to the Internet, it will not be allowed through the ES1 router. E. It would be preferable to stop the attack before the replies are sent, rather than simply filtering the replies. QUESTION 28 What is the standard transport protocol and port used for SYSLOG messages? A. B. C. D. E. UDP 514 TCP 520 UDP 530 TCP 540 UDP 535 Correct Answer: A Explanation Explanation/Reference: Explanation:
For a complete list of TCP/UDP well known port numbers, see the following link: http://www.iana.org/assignments/port-numbers UDP 514 This port has been left open for use by the SYSLOG service. TCP and UDP Ports: In addition to the standard network ports, Cisco Works uses these TCP and UDP ports: Port Type Description Number CiscoWorks2000 Daemon Manager, the tool that manages 42340 TCP server processes 42342 UDP Osagent 42343 TCP JRun 42344 TCP ANI HTTP server 7500 UDP Electronic Switching System (ESS) Service port 7500 TCP ESS Listening port 7580 TCP ESS HTTP port 7588 TCP ESS Routing por 1741 TCP Port used for the CiscoWorks2000 HTTP server 161 UDP/TCP Standard port for SNMP Polling 162 UDP/TCP Standard port for SNMP Traps 514 UDP Standard port for SYSLOG 69 TCP/UDP Standard port for TFTP 23 TCP/UDP Standard port for Telnet Reference: http://www.cisco.com/en/US/products/sw/ps5664/ps5669/products_tech_note09186a0080207605 .shtml#udp514 http://www.cisco.com/en/US/products/sw/cscowork/ps4737/products_tech_note09186a00800e2d 78.shtml QUESTION 29 A new Syslog server is being installed in the Company network to accept network management information. What characteristic applies to these Syslog messages? A. B. C. D. E. F. Its transmission is reliable. Its transmission is secure. Its transmission is acknowledged. Its transmission is not reliable. Its transmission is not acknowledged. Its transmission is not secure. Correct Answer: DEF Explanation Explanation/Reference: Explanation: Syslog is a method to collect messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Cisco devices can send their log messages to a Unix-style SYSLOG service. A SYSLOG service simply accepts messages, and stores them in files or prints them according to a simple configuration file. This form of logging is the best available for Cisco devices because it can provide protected long-term storage for logs. This is useful both in routine troubleshooting and in incident handling. Syslog uses UDP port 514. Since it is UDP based, the transmission is a best effort, and insecure. Incorrect Answers: A, C. Syslog uses UDP as the transport layer protocol, not TCP. Since UDP relies on an unreliable method of communication, syslog is not reliable. B. Syslog has no way of providing a secure transmission by itself. Only by tunneling the syslog data through a secure channel such as IPSec can it be sent securely. QUESTION 30 The Company switched LAN network is upgrading many of the switch links to Gigabit Ethernet. Which of
the following IEEE standards are used for Gigabit Ethernet? (Choose all that apply) A. B. C. D. E. 802.3z 802.3ab 802.3ad 802.3af All of the above Correct Answer: AB Explanation Explanation/Reference: Explanation: The Gigabit Ethernet standard is described in the IEEE 802.3z standard, which was defined in 1998. The 802.3ab document specifically describes the 1000BASE-T standard, which was done in 1999. Both describe Gigabit speed implementations, with 802.3z using fiber and 802.3ab using copper. Incorrect Answers: C. This standard describes Ethernet Link Aggregation. D. The 802.3af standard describes a method for providing DTE power via MDI. This is useful for power over Ethernet implementations such as VOIP phones, providing for 15.4 Watts of power per port. QUESTION 31 A user is having problems reaching hosts on a remote network. No routing protocol is running on the router and it's using only a default to reach all remote networks. An extended ping is used on the local router and a remote file server with IP address 10.5.40.1 is pinged. The results of the ping command produce 5 "U" characters. What does the result of this command indicate about the network? A. B. C. D. E. An upstream router in the path to the destination does not have a route to the destination network. The local router does not have a valid route to the destination network. The ICMP packet successfully reached the destination, but the reply form the destination failed. The ping was successful, but congestion was experienced in the path to the destination. The packet lifetime was exceeded on the way to the destination host. Correct Answer: A Explanation Explanation/Reference: Explanation: Even though the router is using a default route to get to all networks, at some point the packet is reaching a router that does not know how to reach the destination. The underlying reason for the failure is unknown, but when a ping is used and the response is a series of U replies, then the destination is unreachable by a router. Since the nearest router is using a default route, then the problem must be with an upstream router. The table below lists the possible output characters from the ping facility: Character Description ! Each exclamation point indicates receipt of a reply Each period indicates the network server timed out while waiting for a reply U A destination unreachable error PDU was received Q Source quench (destination too busy) M Could not fragment ? Unknown packet type & Packet lifetime exceeded Incorrect Answers: B. The local router is using a default route, so all networks are considered to be known and reachable by the local router. C. If the Ping packet could reach all the way to the remote host, a "U" response would not be generated. D. This type of scenario would most likely result in a source quench response, which would be a Q. E. This would mean a "&" response, as shown in the table above. QUESTION 32 A router is being configured to override the normal routed behavior of certain traffic types. To do this,
Policy Based Routing is used. Which of the following statements is FALSE with regards to the application of policy based routing (PBR)? A. B. C. D. E. PBR can not be used to set the IP precedence. PBR can not set the DSCP in one statement. PBR can be used to set the next hop IP address. PBR can be used to match on the length of a packet. All of the above are true Correct Answer: A Explanation Explanation/Reference: Explanation: PBR gives you a flexible means of routing packets by allowing you to configure a defined policy for traffic flows, lessening reliance on routes derived from routing protocols. To this end, PBR gives you more control over routing by extending and complementing the existing mechanisms provided by routing protocols. PBR allows you to set the IP precedence. It also allows you to specify a path for certain traffic, such as priority traffic over a high-cost link. You can set up PBR as a way to route packets based on configured policies. For example, you can implement routing policies to allow or deny paths based on the identity of a particular end system, an application protocol, or the size of packets. PBR allows you to perform the following tasks: ?Classify traffic based on extended access list criteria. Access lists, then, establish the match criteria. ?Set IP Precedence bits, giving the network the ability to enable differentiated classes of service. ?Route packets to specific traffic-engineered paths; you might need to route them to allow a specific QoS through the network. Policies can be based on IP address, port numbers, protocols, or size of packets. For a simple policy, you can use any one of these descriptors; for a complicated policy, you can use all of them. QUESTION 33 A serial interface on a Cisco router is being connected to an external CSU/DSU. The CSU/DSU has an RS-232 interface with a DB-25 connection. Which cables would be used to connect the router to the external CSU/DSU? A. B. C. D. E. DB-60 female to DB-25 male (DTE) DB-60 male to DB-25 female (DTE) DB-60 male to DB-25 female (DCE) DB-60 female to DB-25 female (DTE) None of the above Correct Answer: A Explanation Explanation/Reference: Explanation: Devices that communicate over a serial interface are divided into two classes: DTE and DCE. The most important difference between these types of devices is that the DCE device supplies the clock signal that paces the communications on the bus. The following chart is a guideline for choosing the correct cable. DTE DCE Selectable DTE or DCE* Device Terminals, Data Service Unit/Channel Service Unit (DSU/CSU), Multiplexors Modems Hubs, Routers Gender Male Female Either * Selectable devices usually have a jumper, switch, or software command used to select DTE or DCE Incorrect Answers: B, D. The DB-25 connection should be male, not female. C. As shown by the chart above, the cable should be DTE, since it is connecting to a CSU/DSU.
QUESTION 34 You are implementing NAT (Network Address Translation) on the Company network. Which of the following are features and functions of NAT? (Choose all that apply) A. B. C. D. Dynamic network address translation using a pool of IP addresses. Destination based address translation using either route maps or extended accesslists. NAT overloading for many to one address translations. Inside and outside source static network translation that allows overlapping network address spaces on the inside and the outside. E. NAT can be used with HSRP to provide for ISP redundancy. F. All of the above. Correct Answer: Explanation Explanation/Reference: Answer: A, B, C, and D Explanation: A, B, C, D all describe various methods of implementing NAT. Incorrect Answers: E. With HSRP, the standby router would not have the NAT entries of the primary router, so when the failover occurs, connections will time out and fail. Reference: http://www.cisco.com/en/US/partner/tech/ES648/ES361/technologies_white_paper09186a008009 1cb9.shtml http://www.cisco.com/en/US/partner/tech/ES648/ES361/technologies_q_and_a_item09186a0080 0e523b.shtml QUESTION 35 With regard to the File Transfer Protocol (FTP), which of the following statements are true? A. FTP always uses one TCP session for both control and data. B. With passive mode FTP, both the control and data TCP sessions are initiated from the client. C. With active mode FTP, the server used the "PORT" command to tell the client on which port it wished to send the data. D. FTP always uses TCP port 20 for the data session and TCP port 21 for the control session. E. FTP always uses TCP port 20 for the control session and TCP port 21 for the data session. Correct Answer: B Explanation Explanation/Reference: Explanation: For a detailed discussion on FTP refer the link below. Incorrect Answers: A. FTP always uses two separate TCP sessions, one for control and one for data. C. In FTP active mode the client (not the server) uses the PORT command to tell the server on which port it expects the server to send the data. D, E. These statements are too general as FTP behaves differently based on whether the mode of operation is active or passive. Reference: http://www.cisco.com/warp/public/759/ipj_2-3/ipj_2-3_oneb.html QUESTION 36 Which of the following types of EIGRP packets contain the Init flag? A. Hello/Ack B. Query C. Reply
D. Update E. None of the above Correct Answer: D Explanation Explanation/Reference: Explanation: In EIGRP header there is an 8-bit flag value. The rightmost bit is init. Which when set to 0x00000001 indicates that the enclosed route entries are the first in a new neighbor relationship. Also the route entries are carried in update packet not hello packet. Additional Info: The following debug output displays the Init Sequence increasing only with the update packet. Router# debug eigrp packet EIGRP: Sending HELLO on Ethernet0/1 AS 109, Flags 0x0, Seq 0, Ack 0 EIGRP: Sending HELLO on Ethernet0/1 AS 109, Flags 0x0, Seq 0, Ack 0 EIGRP: Sending HELLO on Ethernet0/1 AS 109, Flags 0x0, Seq 0, Ack 0 EIGRP: Received UPDATE on Ethernet0/1 from 18.104.22.168, AS 109, Flags 0x1, Seq 1, Ack 0 EIGRP: Sending HELLO/ACK on Ethernet0/1 to 22.214.171.124, AS 109, Flags 0x0, Seq 0, Ack 1 EIGRP: Sending HELLO/ACK on Ethernet0/1 to 126.96.36.199, AS 109, Flags 0x0, Seq 0, Ack 1 EIGRP: Received UPDATE on Ethernet0/1 from 188.8.131.52, AS 109, Flags 0x0, Seq 2, Ack 0 Incorrect Answers: A. Hellos are multicast for neighbor discovery/recovery. They do not require acknowledgment. A hello with no data is also used as an acknowledgment (ack). Acks are always sent using a unicast address and contain a non-zero acknowledgment number. B, C. Queries and replies are sent when destinations go into Active state. Replies are always sent in response to queries to indicate to the originator that it does not need to go into Active state because it has feasible successors. Replies are unicast to the originator of the query. Both queries and replies are transmitted reliably. Reference: "Routing TCP/IP" Jeff Doyle Pg364 QUESTION 37 Which of the following are ATM Reference Model Layers? (Choose all that apply) A. B. C. D. E. F. ATM layer ATM adaptation layer (AAL) Generic Flow Control (GFC) layer Session Physical layer None of the above Correct Answer: Explanation Explanation/Reference: Answer: A, B, and E Explanation: The physical layer, ATM layer, and AAL make up the three layers of the ATM reference model. Incorrect Answers: C. GFC is not a layer of the ATM model. D. The session layer is an OSI model layer but is not part of the ATM model. QUESTION 38 The Company network uses ISIS as its routing protocol. You notice periodic CSNP and PSNP packets going across the network. What are the PSNP and CSNP packets used for? A. PSNP are used to acknowledge the receipt or to request the retransmission of the latest version of an
LSP while the CSNP are used for synchronizing the LS Database on adjacent neighbors. B. CSNP are used to acknowledge the receipt or to request the retransmission of the latest version of an LSP while the PSNP are used for synchronizing the LS Database on adjacent neighbors. C. PSNP are used to acknowledge the receipt of the latest version of an LSP while the CSNP are used to synchronize the LS Database of adjacent neighbors or to request the retransmission of an LSP. D. CSNP are used to acknowledge the receipt of the latest version of an LSP while the PSNP are used to synchronize the LS Database of adjacent neighbors or to request the retransmission of an LSP. Correct Answer: A Explanation Explanation/Reference: Explanation: CSNP (Complete Sequence Number PDU) is sent by the DR to maintain DB synchronization. PSNP (Partial Sequence Number PDU) are used to acknowledge or request one or more LSPs. QUESTION 39 Which of the following EIGRP packets require an acknowledgement? (Choose all that apply) A. B. C. D. E. F. Hello Query Reply Update Ack None of the above Correct Answer: Explanation Explanation/Reference: Answer: B, C, and D Explanation: Updates are used to convey reachability of destinations. When a new neighbor is discovered, update packets are sent so the neighbor can build up its topology table. In this case, update packets are unicast. In other cases, such as a link cost change, updates are multicast. Updates are always transmitted reliably. Queries and replies are sent when destinations go into Active state. Queries are always multicast unless they are sent in response to a received query. In this case, it is unicast back to the successor that originated the query. Replies are always sent in response to queries to indicate to the originator that it does not need to go into Active state because it has feasible successors. Replies are unicast to the originator of the query. Both queries and replies are transmitted reliably. EIGRP reliable packets are: Update, Query and Reply. EIGRP unreliable packets are: Hello and Ack. Incorrect Answers: A, E. Hellos are multicast for neighbor discovery/recovery. They do not require acknowledgment. A hello with no data is also used as an acknowledgment (ack). Acks are always sent using a unicast address and contain a non-zero acknowledgment number. Reference: Cisco BSCN version 1.0 study guide, pages 618. QUESTION 40 The ITU-T Q.920 and ITU-T Q.921 drafts formally specify which protocol? A. B. C. D. E. HDLC PPP LAPD HSRP LLC Correct Answer: C Explanation
Explanation/Reference: Explanation: The LAPD protocol is formally specified in ITU-T Q.920 and ITU-T Q.921. Incorrect Answers: A, D. HDLC and HSRP are both Cisco proprietary and are not formally specified in any ITU-T drafts. QUESTION 41 With regard to TCP headers, what control bit tells the receiver to reset the TCP connection? A. B. C. D. E. F. ACK SYN SND PSH RST CLR Correct Answer: E Explanation Explanation/Reference: Explanation: The RST flag resets the TCP connection. Incorrect Answers: A. ACK is used to acknowledge data that has been sent. B. SYN is used to synchronize the sequence numbers. C. SND is not a TCP control bit. D. PSH is used to pass the tell the receiver to pass the information to the application. F. CLR is not a valid TCP control bit. QUESTION 42 Which of the following are key differences between RIP version 1 and RIP version 2? (Choose all that apply) A. B. C. D. E. RIP version 1 supports authentication while RIP version 2 does not. RIP version 2 uses multicasts while RIP version 1 does not. RIP version 1 uses hop counts as the metric while RIP version 2 uses bandwidth information. RIP version 1 does not support VLSM while RIP version 2 does. RIP version 1 is distance vector while RIP version 2 is not. Correct Answer: BD Explanation Explanation/Reference: Explanation: Both Classless Routing and Multicast updates (184.108.40.206) were impossible with RIP v1 and are available with RIP version 2. Incorrect Answers: A. RIPv2 supports neighbor authentication. RIPv1 does not support this. C. Both RIP version use hop counts as the metric. E. Both RIP versions are distance vector routing protocols. QUESTION 43 You are having connectivity problems with the network shown below:
Router ES2 is able to ping the Catalyst switch ES3, but router ES1 cannot. What is the probable cause of this problem? A. B. C. D. E. There is no VTP domain on the Catalyst switch. The incorrect VLAN is attached to the command interface of the Catalyst. There is no default route configured on the switch. An incorrect IP address on the switch. ICMP packets are being filtered on the switch ES3 Correct Answer: C Explanation Explanation/Reference: Explanation: Without a default route on Cat ES3, ES3 will not know how to get packets back to ES1. Catalyst ES3 would be able to ping router ES2 without a default route, however, because they share the same IP subnet. Incorrect Answers: A, B. VTP and VLAN information that is configured incorrectly could explain problems associated with local LAN users attached to the ES3, but this would not explain why ES1 would not be able to reach ES3. D. If ES3 had an incorrect IP address, then ES2 would not be able to ping ES3. E. If all ICMP packets were filtered, then ES2 would also not be able to ping ES3. This answer could be the problem only if ICMP were being filtered from router ES1. QUESTION 44 Which ISDN reference point is only applicable in North America? A. B. C. D. E. F. R U T A S None of the above. Correct Answer: B Explanation Explanation/Reference: Explanation: The U reference point is used in North America only. U is not specified in any ITU-T standard. Incorrect Answers: A, C, E. R, S, and T are all reference points are specified in I.411 and I.412 and are used in North America as well as internationally. D. A is not a reference point, it is an ISDN switch type used by AT&T. QUESTION 45 The Company network is shown in the following exhibit:
The host sends a 1500 byte TCP packet to the Internet with the DF (Don't Fragment) bit set. Will router ES1 be able to forward this packet to router ES2? A. B. C. D. Yes, it will ignore the DF bit and fragment the packet because routers do not recognize the DF bit. Yes, it will forward the packet without fragmenting it because the DF bit is set. No, it will drop the packet and wait for the host to dynamically decrease its MTU size. Yes, it will fragment the packet, and send back ICMP type 3 code 4 (fragmentation needed but DF bit set) messages back to the host. E. No, it will drop the packet, and send back ICMP type 3 code 4 (fragmentation needed but DF bit set) message back to the host. Correct Answer: E Explanation Explanation/Reference: Explanation: Since the DF bit in the IP packet is set, the router will not be allowed to fragment the packet. Also the MTU size on the routers serial interface is restricted to 576, hence the packet will not be allowed to pass through and it will be dropped. Incorrect Answers: A. Routers do indeed recognize the DF bit and will adhere to it. B. With the DF bit set, the packet will not be fragmented, and since 1500 bytes is too large to go through the 576 byte interface, it will be dropped. C. In this case, router will always send an ICMP error code back to the source stating what the problem is before dropping it. D. With the DF bit set the router is not allowed to fragment the packet. QUESTION 46 What is the signaling protocol used for the MPLS fast reroute (FRR) feature? A. B. C. D. E. B-ISUP LDP RSVP SS7 TDP Correct Answer: C Explanation Explanation/Reference: Explanation: Cisco FRR utilizes MPLS label stacking with RSVP signaling to create a backup tunnel around the link or node that needs to be protected. On detection of loss of signal from the link, the MPLS FRR application in Cisco IOS Software starts forwarding the traffic onto the backup tunnel, transparent to end users or applications such as VoIP or video, in 50 ms or less (actual failover time may be greater or less than 50ms, depending on the hardware platform, the number of TE Tunnels and/or Network prefixes).
Incorrect Answers: A. The ITU-T's broadband ISDN user part (B-ISUP) is based on signaling system no. 7 (SS7) and is used for signaling between the nodes of a public ATM network, that is, across an NNI. B, E. LDP is the Label Distribution Protocol used to distribute label information across the MPLS network. TDP is the Tag Distribution Protocol, which is the Cisco proprietary method of distributing tags across the network in tag switching. MPLS is founded on Cisco's tag switching. D. SS7 is a signaling protocol normally found in Voice circuits. It is not related to MPLS fast reroute. Reference: White Paper, Deploying Guaranteed-Bandwidth Services with MPLS http://www.cisco.com/en/US/tech/ ES436/ES428/technologies_white_paper09186a00800a3e69.s html QUESTION 47 A new data T1 line is being installed. What choices do you have for provisioning the