Download New Updated (Spring 2015) Cisco 350-029 Actual Tests 251-260

By | April 26, 2015

Ensurepass

 

QUESTION 251

Which two features must be configured to perform AToM NSF? (Choose two)

 

A.

FRR

B.

SSO

C.

distribute CEF

D.

switch virtual path

E.

graceful restart

 

Correct Answer: BE

Explanation:

Before you configure AToM NSF, you need to configure MPLS LDP Graceful Restart. MPLS LDP GR is enabled globally. When you enable LDP GR, it has no effect on existing LDP sessions.LDP GR is enabled for new sessions that are established after the feature has been globally enabled.

 

How AToM NSF Works

AToM NSF improves the availability of the network of the service provider that uses AToM to provide Layer 2 VPN services. HA provides the ability to detect failures and handle them with minimal disruption to the service being provided. AToM NSF is achieved by SSO and NSF mechanisms. A standby RP provides control-plane redundancy. The control plane state and data plane provisioning information for the attachment circuits (ACs) and AToM pseudowires (PWs) are checkpointed to the standby RP to provide NSF for AToM L2VPNs.

 

 

QUESTION 252

Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? (Choose three.)

 

A.

PWcapabilities list

B.

Message type

C.

Assigned control connection ID

D.

PW type

E.

Remote session ID

F.

Hostname

 

Correct Answer: BDE

Explanation:

The ICRQ can include information such as pseudowire type, required Layer 2specific sublayer, and circuit status.

 

Thefollowing AVPs MUST be present in the ICRQ:

 

Message Type

Local Session ID

Remote Session ID

Serial Number

Pseudowire Type

Remote End ID

Circuit Status

Services

 

 

QUESTION 253

Which two statementsabout NTP version 4 are true? (Choose two)

 

A.

It supports fast synchronization at starting and before network failures.

B.

It supports automatic server discovery.

C.

It uses a fixed-point arithmetic

D.

It supports the “nanokernel”kernel implementation.

E.

It does not support Public-Key Cryptography

 

Correct Answer: BD

Explanation:

4.1.9. What’s new in Version 4?

According to the NTP Version 4 Release Notes found in release.htm, the newfeatures of version four (as compared to version three) are.

 

Use of floating-point arithmetic instead of fixed-point arithmetic.

Redesigned clock discipline algorithm that improves accuracy, handling of network jitter, and polling intervals.

Support forthe nanokernel kernel implementation that provides nanosecond precision as well as improved algorithms.

Public-Key cryptography known as autokey that avoids having common secret keys.

Automatic server discovery (manycast mode)

Fast synchronization at startup and after network failures (burst mode) New and revised drivers for reference clocks

Support for new platforms and operating systems

 

 

QUESTION 254

Referring to the exhibit, if RTP header compression is used on the link, the header’s overhead on thevoice packet will be reduced by what percent?

 

clip_image002

 

A.

from 50% to 25%

B.

from 50% to 20%

C.

from 70% to 20%

D.

from 70% to 33%

 

Correct Answer: D

 

 

QUESTION 255

What is the port number of the IPsec Authentication Header packet?

 

A.

IP protocol 50

B.

TCP port 51

C.

UDP port 50

D.

IP protocol 51

E.

UDP port 51

F.

TCP port 50

 

Correct Answer: D

Explanation:

6.2. Managed Security services traversing the core

AH operates directly on top of IP, using IP protocol number 51.

ESP operates directly on top of IP, using IP protocol number 50.

 

 

QUESTION 256

What is the port number of the IPsec Encapsulating Security Payload packet?

 

A.

UDP port 50

B.

IP protocol 51

C.

TCP port 51

D.

TCP port 50

E.

IP protocol 50

F.

UDP port51

 

Correct Answer: E

Explanation:

6.2. Managed Security services traversing the core

AHoperates directly on top of IP, using IP protocol number 51.

ESP operates directly on top of IP, using IP protocol number 50.

 

 

QUESTION 257

How many messages does Internet Key Exchange (IKE) use to negotiate SA characteristics when running in aggressivemode?

 

A.

3 messages

B.

4 messages

C.

5 messag
es

D.

2 messagesE. 6 messages

 

Correct Answer: A

Explanation:

The Aggressive Mode is an exchange in the first phase of IKE/ISAKMP (The ISAKMP Aggressive Exchange) is like the Main Mode, but some messages are embedded to the others. The first message proposes the policy, and passes data for key-exchange, the nonce and some information for identification. The second message is a response which authenticates the responder and concludes the policy and key-exchange. At this point allthe information for encryption key for the ISAKMP SA is exchanged and last the message could be encrypted, but doesn’t have to be. The last message is used for authenticating the initiator and provides a proof of participation in the exchange. The identityof the responder could not be protected, but by encrypting the last message the identity of the initiator is protected.

 

 

QUESTION 258

How many messages does Internet Key Exchange (IKE) use to negotiate SA characteristics when running in main mode?

 

A.

3 messages

B.

6 messages

C.

4 messages

D.

2 messages

E.

5 messages

 

Correct Answer: B

Explanation:

3.1.1 Main Mode

The Main Mode is an exchange in the first phase of IKE/ISAKMP (The ISAKMP Identity Protection Exchange) the first two messages are used for negotiating the security policy for the exchange. The next two messages are used for the Diffie-Hellman keying material exchange. The last two messages are used for authenticating the peers with signatures or hashes and optional certificates. Last two authentication messages are encrypted with the previously negotiated key and the identities of the parties are protected from eavesdroppers.

 

 

QUESTION 259

Which four statements about an IP service level agreement (SLA) are true? (Choose four)

 

A.

SLA responder knows type of operation, the port used, and duration.

B.

SLA responder inserts in and out timestamps in the packet payload.

C.

SLA sender and responder use the IP SLA Control Protocol to communicate with each other before sending test packets.

D.

SLA sender and responder communication can be encrypted.

E.

SLA sender and responder communication can be authenticated with MD5.

 

Correct Answer: ABCE

 

 

QUESTION 260

Which three of these statements about the IP service level agreement (SLA) sender are true? (Choose three)

 

A.

SLAsender target can be an IP host

B.

SLA sender sends a probe packet and a response probe packet

C.

SLA sender sends a probe packet

D.

SLA sender target must be a router

E.

SLA sender target can be an IP SLA responder

 

Correct Answer: ACE

 

Free VCE & PDF File for Cisco 350-029 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …