Download New Updated (Spring 2015) Cisco 350-030 Actual Tests 1-10

By | April 26, 2015




What are two advantages of multicast technologies? (Choose two.)


A.      Denial of service attacks in the network are prevented.

B.      They eliminate multipoint applications.

C.      They reduce traffic by delivering a separate stream of information to each corporate recipient or home environment, which reduces bandwidth.

D.      They control network traffic and reduce server and CPU load.

E.       They eliminate traffic redundancy.


Correct Answer: DE




Which two descriptions apply to the Calling Search Space function in Cisco Unified Communications Manager? (Choose two.)


A.      It defines which numbers are available for a device to call.

B.      It provides a group of dial patterns to look through when making a call.

C.      Within a partition, each CSS has a directory number.

D.      It defines route patterns and directory numbers from which calls can be received.

E.       It defines the search for directory numbers in assigned partitions according to dial patterns.


Correct Answer: AE




Which two statements apply to the partitions function in Cisco Unified Communications Manager? (Choose two.)


A.      When a directory number or route pattern is placed into a certain partition, this creates a rule for who can call that device or route list.

B.      A partition is a logical grouping of directory numbers and route patterns that have similar reachability characteristics.

C.      Calling Search Spaces are assigned to partitions.

D.      A directory number may appear in only one partition.

E.       Within the partition, each CSS has a directory number.


Correct Answer: AB







Which three statements are true about multicast IGMP snooping? (Choose three.)


A.      When a host in a multicast group sends an IGMP leave message, only that port is deleted from the multicast group.

B.      An IP multicast stream to the IP host can be stopped only by an IGMP leave message.

C.      IGMP snooping does not examine or snoop Layer 3 information in packets that are sent between the hosts and the router.

D.      When the switch hears the IGMP host report from a host for a particular mu
lticast group, the switch adds the host’s port number to the associated multicast table entry.

E.       IGMP control messages are transmitted as IGMP multicast packets so that they can be distinguished from normal multicast data at Layer 2.

F.       A switch that is running IGMP snooping examines every multicast data packet to verify whether it contains any pertinent IGMP “must control” information.


Correct Answer: ADF




Which three options are valid SCCP call states sent to an IP phone?


A.      Ring Off

B.      On Hook

C.      Call Transmit

D.      Connected

E.       Disconnected

F.       In Use Remotely


Correct Answer: BDF




Which three statements are true about Cisco Discovery Protocol? (Choose three.)


A.      It is an excellent tool for displaying the interface status on switches.

B.      It works on top of the network layer and data link level.

C.      It uses a multicast packet with a destination MAC address of 01-00-CC-CC-CC.

D.      The platform TLV (TLV type 0x0006) contains an ASCII character string that describes the hardware platform of the device.

E.       You can use the CDP timer feature to change update times. The default is 60 seconds.

F.       It uses a broadcast packet with a destination MAC address of 01-00-CC-CC-CC.


Correct Answer: ADE



Which two of the following are functions of DHCP snooping? (Choose two.)


A.      relies on already discovered trusted and untrusted ports

B.      dynamic ARP inspection

C.      defines trusted and untrusted ports

D.      uses existing binding tables

E.       builds a binding table

F.       automatically builds ACLs


Correct Answer: CE




Refer to the exhibit. Traffic flows from the IP phone that is connected to SW1 to the IP phone on SW2. If the trust boundary has been extended to the IP phone on SW1, in what two places will traffic be marked and classified so that the proper QoS settings may be carried through
the network? (Choose two.)




A.      IP phone attached to SW1

B.      SW1 ingress port

C.      R1 ingress port

D.      SW1 egress port

E.       R1 egress port


Correct Answer: BC









Refer to the exhibit. Which gatekeeper mechanism prevents the gatekeeper from using all the resources on either gateway 1 or gateway 2 when sending calls to zones SE and NW?




A.      bandwidth remote

B.      resource availability indicator

C.      bandwidth total

D.      bandwidth zone

E.       lrq immediate advance

F.       ras timeout brq


Correct Answer: B




When implementing a Cisco Unified Communications Manager solution over an MPLS WAN, which two rules must be observed to prevent overrunning the priority queue
? (Choose two.)


A.      RSVP will transparently pass application IDs from the customer network across the MPLS WAN.

B.      The media streams must be the same size in both directions.

C.      Only the connection to the MPLS WAN where the Cisco Unified Communications Manager resides must be enabled as a CE device.

D.      The media has to be symmetrically routed.

E.       If the CE is under corporate control, it may support either topology-aware or measurement-based CAC.


Correct Answer: BD


Free VCE & PDF File for Cisco 350-030 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …