Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 350-027 Exam -

Free 350-027 Sample Questions:

1. Traceroute does not work on Host A (a Unix workstation) to the Internet. Currently, there is an inbound access­list applied to the serial interface on Router 1 that says "access­list 101 permit tcp any any". What access­list entry may need to be added in order to get traceroute to work?
A. access­list 101 permit udp any any
B. access­list 101 permit icmp any any time­exceeded access­list 101 permit icmp any any port­unreachable
C. access­list 101 permit icmp any any time­exceeded access­list 101 permit icmp any any net­unreachable
D. access­list 101 permit icmp any any echo access­list 101 permit icmp any any net­unreachable
E. access­list 101 permit udp any any access­list 101 permit icmp any any protocol­unreachable
Answer: B

2. What Q.931 message cannot be received in response to sending a Q.931 SETUP message?
A. Alerting
B. Call Proceeding
C. Connect
D. USER Information
E. Progress
Answer: D

3. The Hold­Down Timer used in Distance Vector protocols:
A. Sets the time limit of how long a router may keep a packet in its buffer, if the routing protocol is in the process of converging
B. Determines the number of seconds a router will wait before sending another update to neighbor routers
C. Sets a specific period for routers to neither accept nor advertise a route from a destination where an original route was recently lost
D. Sets a duration where routes are not accepted from the neighbor router that caused a routing loop
Answer: C

4. Observing the output below from the PE router, select what path EoMPLS will take before exiting a router: PE#show mpls l2transport vc 100 detail Local interface: Fa0/0.1 up, line protocol up, Eth VLAN 100 up Destination address:, VC ID: 100, VC status: up Preferred path: Tunnel1, active Default path: disabled Tunnel label: 3, next hop point2point Output interface: Tu1, imposed label stack {27 20} Create time: 00:07:11, last status change time: 00:07:11 Signaling protocol: LDP, peer up MPLS VC labels: local 16, remote 20 Group ID: local 0, remote 0 MTU: local 1500, remote 1500 Remote interface description: Sequencing: receive disabled, send disabled
B. FastEthernet 0/0
C. FastEthernet 0/0.1
D. Tunnel1
E. This is an invalid output
Answer: D

5. Which do NOT exist?
A. Per VLAN Spanning Tree (PVST).
B. Per VLAN Spanning Tree Plus (PVST+).
C. Per VLAN Spanning Tree Plus Plus (PVST++).
D. Rapid STP (RSTP).
E. Resilient STP (RSTP).
Answer: C, E

6. Which commands are valid in ethernet or ethernet VLAN attachment circuits?
A. match cos
B. match ethernet cos
C. match source­mac
D. match vlan
E. match ethernet multicast
Answer: A, D

7. OSPF is defined on a Frame Relay interface providing point­to­multipoint connections. The remote neighbors can reach this central site, but are complaining of routing failures between each of the remote sites. The central router has all the routes for each remote site. Based on this
information, what can be diagnosed as the biggest potential problem?
A. An over­subscribed Frame Relay switch will cause some packet loss.
B. There are problems in the use of OSPF Authentication.
C. There is an incorrect selection of the Designated Router.
D. There is an incorrect DLCI assigned on a point­to­point sub­interface.
Answer: C

8. EIGRP applies the principle of Feasible Successor (FS) in resolving a new path to a lost route. What statement regarding the FS is correct?
A. Information is stored for the FS as part of the Link­State Routing updates forwarded for EIGRP.
B. EIGRP estimates the FS from each neighbor for each network after an exchange of database information during the normal update process. It uses this information for path selection when a route is lost.
C. When EIGRP is notified that a route is lost, it will always send requests to each neighbor for ways to reach the lost route. The neighbor that returns the best path will qualify as the FS.
D. EIGRP nominates a central router as the FS for all lost routes during configuration.
Answer: B

9. What technology allows transporting Layer2 attachment circuits over IP­only backbones?
C. L2TPv3
Answer: C

10. Which are supported ways of transporting ATM over MPLS?
C. Packet Cell Relay AAL5 Trunk Mode
D. Packed Cell Relay Trunk mode E.AAL2oMPLS
Answer: A, C

11. What IE is not mandatory in a Q.931 Service msg?
A. Bearer capability
B. Channel ID
C. Message Type
D. Change Status
E. Call Reference
Answer: A

12. Which statements are true regarding VPLS?
A. There is a full mesh of pseudowires.
B. There is a partial mesh of pseudowires.
C. Only L2TPv3 can be used for pseudowire establishment.
D. STP runs in the core.
E. There is split­horizon to avoid loops.
Answer: A, E

13. How many bits does TCI contain?
A. 1
B. 3
C. 6
D. 12
E. 16
F. 20
Answer: E

14. What command is used for Interworking configuration?
A. `interworking {etherner | ip} in interface config mode.
B. `interworking {etherner | ip} in pseudowire­class config mode.
C. `Interworking {bridged | routed} in l2tp­class mode.
D. `{ip | ethernet}Interworking in pseudowire­class config mode.
Answer: B

15. A router is set to boot from flash, but cannot find boot commands in the configuration. Also, valid files do not exist in the default flash device. The router will:
A. Boot from ROM, since there are no valid sources
B. Try to boot from the network, using a default filename
C. Terminate the boot process with an error message
D. Try to boot from the network, then boot from ROM as a backup
Answer: D

16. What specification defines LACP?
A. IEEE 802.11
B. IEEE 802.1q and IEEE 802.1p
C. IEEE 802.3ad
D. ITU Q.922
E. RFC2547
Answer: C

17. Estimating the MTU for EoMPLS Packets Edge MTU of 1500, Transport header, AToM header present, MPLS label, and stack MPLS Label, calculate the core MTU requirements to handle EoMPLS port mode packets.
A. 1518
B. 1520
C. 1524
D. 1526
Answer: D

18. What protocol is not disabled by the 'no service tcp­small­servers' command?
A. Echo
B. Finger
C. Chargen
D. Discard
E. Daytime
Answer: B

19. When using IS­IS for IP routing, Dual IS­IS defined by RFC 1195, what is true? (multiple answer)
A. It is necessary to configure a NSAP address.
B. It is not possible to perform both IP and CLNS routing wih the same process.
C. IP address and subnet information is carried in the TLV field on the L­1/L­1 LSPs.
D. Dual IS­IS does not support VLSM information.
Answer: A, C

20. Which are components of VPLS?
A. BGP extensions
B. Pseudowire technology
C. LDP extensions
D. Etherchannel technology
E. MAC Address learning and forwarding on a virtual port
Answer: A, B, E

21. An incoming frame is received by a transparent bridge. If the destination address of the frame is not present in the database, the bridge will:
A. Discard the frame
B. Send out the frame on all interfaces, except on the interface where the frame originate
C. Put the destination MAC address in the table
D. Broadcast the frame on all interfaces
E. None of the above
Answer: B

22. Within OSPF, what functionality best defines the use of a 'stub' area?
A. It appears only on remote areas to provide connectivity to the OSPF backbone.
B. It is used to inject the default route for OSPF.
C. It uses the no­summary keyword to explicitly block external routes, defines the non­transit area, and uses the default route to reach external networks.
D. It is a non­transit area that does not allow flooding of external networks and uses the default route to reach external networks.
Answer: D

23. What is NOT true regarding PW QoS?
A. A policy action can be applied for packets matched by DLCI.
B. LLQ can be applied to traffic classified per COS on ethernet AC.
C. CB­WFQ can be applied to traffic classified per COS on ethernet AC.
D. The command `set cos' is used to modify the .1p cos bits in a policy.
E. The command `set vlan' is used to modify the VLAN tag in a policy.
F. All of the above
Answer: E

24. What QoS mechanism is used and supported with EoMPLS?
A. 802.1s
B. 802.1d
C. 802.1p
D. 802.1w
E. 802.1q
Answer: C

© 2014, All Rights Reserved