Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 350-029 Exam - Cheat-Test.com

Free 350-029 Sample Questions:

1. What protocol is used for Path Setup in MPLS traffic engineering?
A. OSPF
B. ISIS
C. BGP
D. RSVP
E. PIM
Answer: D

2. Which of the following is a correct arrangement of APS Action Requests in order of priority, with highest priority first?
A. Lockout of Protection, Manual Switch, SD, Forced Switch
B. Manual Switch, Lockout of Protection, Forced Switch, SD
C. Lookout of Protection, Forced Switch, SD, Manual Switch
D. Manual Switch, Forced Switch, Lockout of Protection, SD
E. SD, Lockout of Protection, Forced Switch, Manual Switch
F. None of the above
Answer: C

3. What is the role of Forwarding Equivalence Class (FEC) in MPLS?
A. FEC determines how IP packets are forwarded in MPLS LSP.
B. FEC determines how to establish an LSP path.
C. FEC determines how a group of IP packets are mapped to an LSP.
D. FEC determines how MPLS labels are stacked in LSP.
E. None of above.
Answer: C

4. What is periodically multicasted (every 10 seconds) by the DIS on a LAN to ensure IS­IS Link State Database accuracy?
A. PSNP
B. CSNP
C. LSP
D. IIH
E. ISH
Answer: B

5. What best explains the BGP route­reflector function?
A. BGP route­reflector should be in forwarding path of data coming from its clients.
B. BGP route­reflector does not have to be in the forwarding path of data coming from its clients.
C. BGP route­reflector will stop reflecting the routes if they're not directly­connected clients.
D. None of the above.
Answer: B

6. Which 4 statements regarding MPLS Label Stack Encoding is true?
A. A value of 4 represents the "Implicit NULL Label."
B. A value of 0 represents the "IPv4 Explicit NULL Label."
C. A value of 1 represents the "Router Alert Label". The use of this label is analogous to the use of the "Router Alert Option" in IP packets (for example, ping with record route option).
D. A value of 2 represents the "IPv6 Explicit NULL Label"
E. A value of 1 represents the "IPv1 Explicit NULL Label"
F. A value of 3 represents the "Implicit NULL Label"
Answer: B, C, D, F

7. When should traffic shaping be implemented on Frame Relay PVCs? (Choose two)
A. When you want to drop excess traffic above the CIR
B. When there is a speed mismatch between the central site and the remote site.
C. When using Frame Relay SVCs
D. When over­subscribing the central site link
E. When LLQ is implemented on the Frame Relay PVC.
F. When Multilink PPP LFI is implemented on the Frame Relay PVC.
Answer: B, D

8. There is MPLS VPN traffic traversing through a TE intermediate router. What is the MPLS packet label stack sequence (from outer to inner) for the VPN traffic on this router?
A. TE label, IGP label, VPN label
B. IGP label, TE label, VPN label
C. TE label, VPN label, IGP label
D. VPN label, IGP label, TE label E.IGP label, VPN label, TE label
Answer: A

9. MPLS label headers for packet media consist of:
A. Version
B. Label
C. COS/EXP
D. TTL
E. S flag
Answer: B, C, D, E

10. Which are correct descriptions and configurations of Anycast RP?
A. In Anycast RP, two or more RPs are configured with the same IP address on loopback interfaces.
B. Anycast RP provides redundancy and load­sharing capabilities.
C. Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ip pim rp­address 1.1.1.1
D. Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ip rp­address pim 1.1.1.1
E. Routers with Anycast RP can be configured statically (loopback 1.1.1.1)with the command ip anycast­rp pim 1.1.1.1
Answer: A, B, C

11. In which of the following BGP­related events is an End­of­RIB (EOR) message sent?
A. Just before sending a CEASE message to tear down the session.
B. Following a link flap in the BGP speaker's AS.
C. Following a Route Processor Switchover.
D. During initial convergence.
E. During capability negotiation.
Answer: C, D

12. Assume two routers on the same subnet, R1 and R2, both configured for HSRP. R1 has a priority of 120. Which of the following HSRP interface configurations will always result in the R2 becoming the primary?
A. standby 1 priority 110
B. standby 1 priority 120
C. standby 1 priority 130
D. standby 1 priority 110 preempt
E. standby 1 priority 120 preempt
F. standby 1 priority 130 preempt
Answer: C, F

13. The layer 2 protocol used by POS technology offers a standarized way for mapping IP packets into SONET/SDH payloads. Select the correct sequence of POS operation. 1) Data is scrambled and synchronous mapping takes place by octet into the SONET/SDH frame. 2) Encapsulated via Point­to­Point Protocol (PPP) takes place framing information is added with High­level Data Link Control (HDLC). 3) Gaps between frames are filled with flags, set to value 7E. 4) Octet stuffing occurs if any flags or resultant escape characters (of value 7D) are found in the data. 5) Data is segmented into an IP datagram with its 20­byte IP header.
A. 1,2,3,4,5
B. 1,3,4,5,2
C. 2,3,5,4,1
D. 5,2,3,4,1
E. 5,2,3,1,4
Answer: D

14. Which two statemets are true?
A. DPT/RPR uses a bi­directional ring consisting of two symmetric counter rotating fibre rings.
B. DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C. In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream), thus using both fibres concurrently to maximise bandwidth.
D. DPT/RPR can be deployed in the Core of the SP networks where point­to­point POS links are used to make best use of the Bandwidth.
Answer: A, C

15. Which of the following IOS commands cause syslog messages to be stamped with time and dates?
A. service timestamps log datetime
B. logging trap datetime
C. service logging datetime
D. logging datetime on
E. logging timestamps on
Answer: A

16. The OSPF External LSA for prefix x.x.x.x exists in the OSPF database, but the prefix is not installed in the routing table. Which are possible explanations?
A. Inbound distribute­list is configured under the ospf process and it is denying x.x.x.x
B. ASBR origination the LSA is not reachable.
C. Route to the Forwarding Address in not an internal OSPF route.
D. Route to the Forwarding Address is an internal OSPF route.
E. Route to the ASBR does not follow the same path as the one to the Forwarding Address.
Answer: A, B, C

17. What is the action of "pop" in the context of MPLS switching?
A. It removes the top label in the MPLS label stack.
B. It adds a top label in MPLS label stack.
C. It replaces the top label in the MPLS label stack with another value.
D. It replaces the top label in the MPLS label stack with a set of labels. E.None of above.
Answer: A

18. What are the differences between LLQ and CBWFQ? (Choose two.)
A. LLQ supports the addition of strict priority queuing.
B. With LLQ, bandwidth allocations for the priority queue and all the CBWFQ queues are configured using the priority command.
C. LLQ is configured using MQC and CBWFQ is configured using the fair­queue command.
D. LLQ priority queue bandwidth is policed with a congestion aware policer.
E. LLQ does not support WFQ on the default traffic class (class­default).
Answer: A, D

19. Which command will display the MPLS label binding for IP prefix 1.1.1.0 on the router?
A. show tag­switching tdp binding 1.1.1.0/24
B. show tag­switching tdp bindings neighbor 1.1.1.0
C. show tag­switching interface e0/0
D. A and B both will show the binding. E.All of the above.
Answer: A

20. Which two statements are true about RPF checks in MSDP(Multicast Source Discovery Protocol)?
A. It prevents message looping, Session Advertisement (SA) messages must be RPF checked.
B. RPF check should be done against the route to the source S of the corresponding PIM­SM domain.
C. RPF check should be done against the route to the Rendez­vous Point of the corresponding PIM­SM domain, which originated the SA.
D. RPF checking Session Advertisement (SA) messages will cause message looping.
Answer: A, C

21. Which statements are correct for forwarding traffic into MPLS TE tunnels? (Choose 3)
A. Autoroute causes the tunnel to be treated as a directly connected link to the head­end.
B. Autoroute causes the TE head­end to establish IGP adjacency with the tail­end over the tunnel.
C. Forwarding adjacency makes the TE head­end node advertise the Tunnel LSP into the IGP.
D. Forwarding adjacency supports unequal cost load balancing over multiple TE tunnels.
Answer: A, C, D

22. In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the Default MDT Group? (Choose two.)
A. It is used for PIM control traffic.
B. It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers.
C. Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF
can support multiple multicast sources.
D. There is a reduced multicast state in the MPLS core P routers.
E. When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth.
Answer: A, D

23. What is the encapsulation mode for MPLS running on Ethernet?
A. Packet mode.
B. Frame mode
C. Transparent mode.
D. Channel mode
E. Tunnel mode.
Answer: B

24. When configuring Multicast VPN (MVPN) over an MPLS core, both the Default and Data MDT is configured under which configuration mode?
A. router(config)#
B. router(config­if)#
C. router(config­vrf)#
D. router(config­router)#
E. router(config­router­af)#
Answer: C

25. Based on the following output in R1, which statement is true R1#show mpls forwarding­table 50.0.0.3 detail Local Outgoing Prefix Bytes tag Outgoing Next Hop tag tag or VC or Tunnel Id switched interface 19 17 50.0.0.3/32 0 Et0/0 192.168.0.14 ­­­­­­­
A. If a labeled packet arrives with the top most label of 17, it will be replaced with label 19 and sent out on Ethernet 0/0 interface.
B. If a labeled packet arrives with the top most label of 19, it will be replaced with label 17 and sent out on Ethernet 0/0 interface.
C. If a labeled packet arrives with the top most label of 17, all the labels will be removed and a clear IP packet is sent to Next Hop 192.168.0.14 on Ethernet 0/0.
D. None of the above.
Answer: B

26. BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate what classification of attack?
A. Sniffing attack
B. Denial of service attack
C. Port Scan attack
D. Reconnaisance attack
E. Spoofing attack
Answer: E

27. Which of the following IOS commands can detect whether the SQL slammer virus propagates in your networks?
A. access­list 100 permit any any udp eq 1434
B. access­list 100 permit any any udp eq 1434 log
C. access­list 110 permit any any udp eq 69
D. access­list 110 permit any any udp eq 69 log
E. None of above.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved