Download New Updated (Spring 2015) Cisco 350-001 Actual Tests 221-230

Ensurepass

 

QUESTION 221

Which three port states are used by RSTP 802.1w? (Choose three.)

 

A.       Listening

B.       Learning

C.       Forwarding

D.      Blocking

E.       Discarding

F.        Disabled

 

Correct Answer: BCE

 

 

QUESTION 222

Refer to the exhibit. Catalyst R is the root bridge for both VLAN 1 and VLAN 2. What is the easiest way to load-share traffic across both trunks and maintain redundancy in case a link fails, without using any type of EtherChannel link-bundling?

 

clip_image001

 

A.       Increase the root bridge priority (increasing the numerical priority number) for VLAN 2 on Catalyst D so that port D2 becomes the root port on Catalyst D for VLAN 2.

B.       Decrease the port priority on R2 for VLAN 2 on Catalyst R so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.

C.       Decrease the path cost on R2 on Catalyst R for VLAN 2 so that port D1 will be blocked for VLAN 2 and port D2 will remain blocked for VLAN 1.

D.       Increase the root bridge priority (decreasing the numerical priority number) for VLAN 2 on Catalyst R so that R2 becomes the root port on Catalyst D for VLAN 2.

 

Correct Answer: B

 

 

QUESTION 223

Refer to the exhibit. In the diagram, the switches are running IEEE 802.1s MST. Which ports are in the MST blocking state?

 

clip_image002

 

A.       GE-1/2andGE2/1

B.       GE-1/1 and GE-2/2

C.       GE-3/2 and GE 4/1

D.       no ports are in the blocking state

E.        There is not enough information to determine which ports are in the blocking state.

 

Correct Answer: A

 

 

QUESTION 224

Refer to the exhibit. In the diagram, the switches are running IEEE 802.1 w RSPT. On which ports should root guard be enabled in order to facilitate deterministic root bridge election under normal and failure scenarios?

 

clip_image003

 

A.  GE-3/1, GE-3/2

B.  FE-2/1, FE-3/2

C.  GE-1/1.GE-1/2

D.  GE-4/1, GE-4/2

E.  GE-2/1, GE-2/2

F.  GE-3/1, GE-3/2, GE-4/1, GE-4/2, FE-2/1, FE-3/2< /font>

 

Correct Answer: F

 

 

QUESTION 225

Loop guard and UniDireclional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? (Choose two.)

 

A.       Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.

B.       UDLD protects against STP failures caused by cabling problems that create one-way links.

C.       Loop guard detects and protects against duplicate packets being received and transmitted on different ports.

D.       UDLD protects against unidirectional cabling problems on copper and fiber media.

E.        Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

 

Correct Answer: BE

 

 

QUESTION 226

Refer to the exhibit. Voice traffic is marked “precedence 5.” How much bandwidth is allocated for voi
ce traffic during periods of congestion?

clip_image004

 

A.       a minimum of 48 kb/s

B.       a maximum of 48 kb/s

C.       a minimum of 48% of the available bandwidth

D.      a maximum of 48% of the available bandwidth

 

Correct Answer: B

 

QUESTION 227

Refer to the exhibit. Which of these is applied to the Bearer class?

 

clip_image005

 

A.       wred

B.       traffic shaping

C.       packet marking

D.       packet classification

E.        FIFO queuing within the class

 

Correct Answer: E

 

 

 

 

 

 

 

 

 

 

QUESTION 228

Refer to the exhibit. What is the overall type of queuing being used on the outgoing data for interface Ethernet0/1?

clip_image006

 

A.       LLQ

B.       FIFO

C.       CBWFQ

D.       priority queuing

E.        weighted fair queuing

 

Correct Answer: A

 

 

QUESTION 229

Which two of these are differences between traffic policing and traffic shaping? (Choose two.)

 

A.       with traffic shaping, a router stores excess traffic in packet buffers until bandwidth is available again

B.       with policing you can tune the buffer usage for traffic exceeding the specified CIR

C.       with shaping you can tune the buffer usage for traffic exceeding the specified CIR

D.       shaping should only be applied for ingress traffic, policing only for egress

E.        policing uses a token bucket algorithm, shaping uses an SPD algorithm

 

Correct Answer: AC

 

 

QUESTION 230

Which of these is a valid differentiated services PHB?

 

A.       Guaranteed PHB

B.       Class-Selector PHB

C.       Reserved Forwarding PHB

D.      Discard Eligible PHB

E.       Priority PHB

 

Correct Answer: B

 

Free VCE & PDF File for Cisco 350-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …