Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Cisco 350-060 Exam -

Free 350-060 Sample Questions:

Q: 1
Why are threshold defined based on baseline documents?
A. to ensure that QoS parameters are defined appropriately
B. to help identify current network problems and predict future bottlenecks
C. to suppress duplicate alarms and allow for event correlation
D. to reduce polling traffic on the network E. to verify that interfaces are in the correct state
Answer: B

Q: 2
According to ITIL® v3 framework, which type of tools is best suited to ensure management of a predefined workflow stream containing a set of tasks which can be managed around resource availability, timelines, status, and if needed escalation paths?
A. process control engine
B. configuration management system
C. discovery audit
D. business service management
Answer: A

Q: 3
According to ITIL® v3 framework, which type of warranty assurance provide a customer with a measured confidence that services are supporting defined level of demand and quality?
A. security
B. availability
C. capacity
D. continuity
E. fulfillment
Answer: C

Q: 4
A rollout plan from engineering has been sent to the NOC for deployment. Part of the plan involves a complex software upgrade to a network element. The method of procedure provided by engineering is nearly 100 individual steps long. Where do you expect to find backout procedures to be specified?
A. after each stop that causes a change to the network
B. after every 20 (+/-5) steps
C. after the midway point
D. after the method of procedure is completed
E. both after the midway point and after the method of procedure is completed
Answer: D

Q: 5
You are working in a service provider voice NOC supporting a national VoIP network. The network underwent a capacity expansion that added voice bearer trunks to a newly deployed media gateway. After the new trunks were configured and placed into live service, the service desk began to receive complaints from end customers that their VoIP service is not working for certain calls, the service desk is unable to resolve the problem and due to increasing troubles coming in, they escalate to you.
A. Verify IP connectivity between the media gateway controller and the media gateway.
B. Fail over the media gateway to its backup.
C. Identify which trunks are not functioning.
D. Verify that SIP versions are compatible between the media gateway controller and the media gateway.
Answer: D

Q: 6
Which protocol should be configured on networking devices to assist operational staff in event correlation to resolve service issues?
Answer: A

Q: 7
What the main difference between an SNMP trap and a syslog message?
A. SNMP traps are secure, whereas syslog messages are not.
B. SNMP traps are triggered during network outages, whereas syslog messages are informational only.
C. SNMP traps are forwarded to EMS systems, whereas syslog messages are forwarded to any NMS system.
D. SNMP traps are user-definable and very based on vendor, whereas syslog messages are standards-based.
Answer: D

Q: 8
While evaluating a new hardware rollout plan before deployment, which standards should you review to ensure that the hardware met certain environmental design guidelines?
Answer: D

© 2014, All Rights Reserved