Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Extreme Networks EW0-300 Exam - Cheat-Test.com

Free EW0-300 Sample Questions:

1. Extreme Networks “i” chipset switches allow you to run simultaneously the Radius and Tacacs+ features.
A. TRUE
B. FALSE
Answer: B

2. In a stable OSPF network, all OSPF routers in the same area must have the same LSDB contents.
A. True
B. False
Answer: A

3. The IS-IS Routing Protocol has been developed in ISO to provide routing for pure OSI environments.
A. True
B. False
Answer: A

4. Which of the following is the default ESRP priority setting for an Extreme switch?
A. 0
B. 1
C. 254
D. 255
Answer: A

5. A TCP type ACL that uses the permit-established keyword filters out SYN packets in one direction.
A. TRUE
B. FALSE
Answer: A

6. By default OSPF hello packets are sent out every:
A. 2 seconds.
B. 10 seconds.
C. 30 seconds.
D. 40 seconds.
Answer: B

7. What is an IGP protocol other than OSPF that uses the Dijkstra’s SPF routing algorithm?
A. RIP
B. IS-IS
C. EIGRP
D. All of the above
Answer: B

8. What does the abbreviation PIM stands for?
A. Protocol Implicit Multicast
B. Protocol Independent Multicast.
C. Port Independent Multicast
D. Port Implicit Multicast
Answer: B

9. IP Version 6 has amongst other differences with IP version 4 also a different address length. What is the size of an Ipv6 address?
A. 16 bits
B. 32 bits
C. 64 bits
D. 128 bits
Answer: D

10. An Ethernet Automatic Protection Switching (EAPS) domain relies on a control VLAN.
That control VLAN must be tagged with an 802.1Q tag.
A. TRUE
B. FALSE
Answer: A

11. Select the statements that apply when you compare and differentiate VRRP and ESRP.
A. VRRP does not use the number of active ports as a criteria for Master election.
B. VRRP can be enabled on VLAN default.
C. VRRP and Spanning Tree can be enabled on the same switch and VLAN
D. All of the above
Answer: D

12. The following MAC address, 00:00:5E:00:01:0A represents:
A. The MAC address used for ESRP, instance 01.
B. The MAC address used for ESRP, instance 10.
C. The MAC address used for VRRP, instance 01.
D. The MAC address used for VRRP, instance 10.
Answer: D

13. The Skew time in VRRP is used to ensure that two back-up routers do not switch to master state at the same time in case of a fail-over situation.
A. True
B. False
Answer: A

14. Within VRRP the election process of becoming the master switch takes place with the following precedence:
Step 1: The switch with the virtual router’s IP address becomes the master switch.
Step 2: The switch with the highest VRRP priority becomes the master switch.
Step 3: The switch with the highest IP address becomes the master switch.
A. True
B. False
Answer: A

15. When limit-learning is configured on a port and the limit is reached the following traffic still flows to the port.
A. Packets destined for the active Mac addresses
B. Broadcast traffic
C. EDP traffic
D. All of the above
Answer: D

16. The following modes of operation are supported with the Network login feature. (Choose all that apply)
A. Secure mode
B. Campus mode
C. Quick Mode
D. ISP mode
Answer: BD

17. On a RADIUS server you can distinguish between switch access and Netlogin authentication. Extreme provides a vendor specific attribute Extreme:Extreme-Netlogin-Only = disabled/enabled.
User authentication for both Netlogin and switch access is allowed when the value is disabled.
When the value is enabled user authentication is restricted to Netlogin only.
A. True
B. False
Answer: A

18. In ExtremeWare, what is the normal ACL behavior for incoming traffic when there is no default rule configured?
A. Explicit permit
B. Explicit deny
C. Implicit permit
D. Implicit deny
Answer: C

19. Although you can specify sequence numbers for different ACL entries, the Summit 1i switch checks incoming traffic on a match with the ACL entries in the order of their time in configuration.
A. TRUE
B. FALSE
Answer: B

20. What is the maximum number of ACL rules supported on an Extreme Networks Summit7i switch without the default rule?
A. 1
B. 128
C. 255
D. Unlimited
Answer: C

21. What mechanisms does a master node use to detect a failure in the EAPS ring architecture?
Select the two that apply.
A. The master node receives a trap-message from a transit node when it detects loss of link connectivity on any of its ring ports.
B. The master node uses OSPF to quickly learn about link state topology changes.
C. The master node sends a health-check packet on the control VLAN, when the ring breaks the master node stops receiving this packet on its secondary port.
D. The master node uses IGMP and IGMP snooping to detect the transit nodes and than to learn about failures in the topology between them.
Answer: AC

22. Dealing with Access Control Lists on Extreme Networks switches it’s not required to manually configure the default rule.
A. TRUE
B. FALSE
Answer: A

23. The Summit 7i switch supports how many queues per interface?
A. 1
B. 4
C. 8
D. 16
Answer: C

24. A QoS Policy is the result when you assign a traffic grouping to a QoS profile when configuring QoS on a Summit1i switch.
A. True
B. False
Answer: A

25. Radius on Extreme Networks “i” chipset switches allows validation for the following switch access methods:
A. Telnet
B. VISTA
C. Console
D. All of the above
Answer: D

26. When SSH2 is configured and enabled on a Summit 7i switch, telnet is automatically disabled.
A. TRUE
B. FALSE
Answer: B

27. A QoS building block that defines a class of service by specifying traffic behavior attributes like bandwidth is called:
A. QoS Mode
B. QoS Class of Service
C. QoS Profile
D. QoS Priority
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved