define('DISABLE_WP_CRON', true); The Professional Cisco 350-001 Exam Free Dumps Help You 100% Pass Exam (111-120) | PassLeader 100% Pass Guaranteed IT Exam Dumps Free Download

PassLeader 100% Pass Guaranteed IT Exam Dumps Free Download

Free Collection of VCE and PDF Braindump with New Exam Questions

The Professional Cisco 350-001 Exam Free Dumps Help You 100% Pass Exam (111-120)

QUESTION 111
Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2. What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails, without using any type of EtherChannel link-bundling?
1111

A.    Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2.
B.    Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
C.    Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.
D.    Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.

Answer: B

QUESTION 112
Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in the MST blocking state?
1121

A.    GE-1/2 and GE 2/1
B.    GE-1/1 and GE-2/2
C.    GE-3/2 and GE 4/1
D.    no ports are in the blocking state
E.    There is not enough information to determine which ports are in the blocking state.

Answer: D

QUESTION 113
Refer to the exhibit. In the diagram, the switches are running IEEE 802.1w RSPT. On which ports
should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?
1131

A.    GE-3/1, GE-3/2
B.    FE-2/1, FE-3/2
C.    GE-1/1, GE-1/2
D.    GE-4/1, GE-4/2
E.    GE-2/1, GE-2/2
F.    GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2

Answer: F

QUESTION 114
Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? (Choose two.)

A.    Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.
B.    UDLD protects against STP failures caused by cabling problems that create one-way links.
C.    Loop guard detects and protects against duplicate packets being received and transmitted on different ports.
D.    UDLD protects against unidirectional cabling problems on copper and fiber media.
E.    Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

Answer: BE

QUESTION 115
Refer to the exhibit. Voice traffic is marked “precedence 5.” How much bandwidth is allocated for voice traffic during periods of congestion?
1151

A.    a minimum of 48 kb/s
B.    a maximum of 48 kb/s
C.    a minimum of 48% of the available bandwidth
D.    a maximum of 48% of the available bandwidth

Answer: B

QUESTION 116
Refer to the exhibit. Which of these is applied to the Bearer class?
1161

A.    WRED
B.    traffic shaping
C.    packet marking
D.    packet classification
E.    FIFO queuing within the class

Answer: E

QUESTION 117
Refer to the exhibit. What is the overall type of queuing being used on the outgoing data for
interface Ethernet0/1?
1171

A.    LLQ
B.    FIFO
C.    CBWFQ
D.    priority queuing
E.    weighted fair queuing
F.    IP RTP priority queuing

Answer: A

QUESTION 118
Which two of these are differences between traffic policing and traffic shaping? (Choose two.)

A.    with traffic shaping, a router stores excess traffic in packet buffers until bandwidth is available again
B.    with policing you can tune the buffer usage for traffic exceeding the specified CIR
C.    with shaping you can tune the buffer usage for traffic exceeding the specified CIR
D.    shaping should only be applied for ingress traffic, policing only for egress
E.    policing uses a token bucket algorithm, shaping uses an SPD algorithm

Answer: AC

QUESTION 119
Which of these is a valid differentiated services PHB?

A.    Guaranteed PHB
B.    Class-Selector PHB
C.    Reserved Forwarding PHB
D.    Discard Eligible PHB
E.    Priority PHB

Answer: B

QUESTION 120
An expanding company is deploying leased lines between its main site and two remote sites. The bandwidth of the leased lines is 128kb/s each, terminated on different serial interfaces on the main router. These links are used for combined VOIP and data traffic. The network administrator has implemented a VOIP solution to reduce costs, and has therefore reserved sufficient bandwidth in a low latency queue on each interface for the VOIP traffic. Users now complain about bad voice quality although no drops are observed in the low latency queue. What action will likely fix this problem?

A.    mark VOIP traffic with IP precedence 6 and configure only ‘fair-queue’ on the links
B.    configure the scheduler allocate 3000 1000 command to allow the QoS code to have enough CPU cycles
C.    enable class-based traffic shaping on the VoIP traffic class
D.    enable Layer 2 fragmentation and interleaving on the links
E.    enable Frame Relay on the links and send voice and data on different Frame Relay PVCs

Answer: D

The Professional Cisco 350-001 Exam Free Dumps Help You 100% Pass Exam

         

Latest and 100% Pass Guaranteed IT Exam Dumps Download © 2015 Frontier Theme