Latest CCIE 350-001 New Question (36-40)
QUESTION 36
Which three options are considered in the spanning-tree decision process? (Choose three.)
A. lowest root bridge ID
B. lowest path cost to root bridge
C. lowest sender bridge ID
D. highest port ID
E. highest root bridge ID
F. highest path cost to root bridge
Answer: ABC
QUESTION 37
Refer to the exhibit.
A small enterprise connects its office to two ISPs, Using Separate T1 links. A Static Route is used for the default Route, Pointing to both interfaces with a different Administrative distance, So that one of the default router is preferred.
Recently the primary link has been upgraded to a new 10 MB/S ethernet link
After a Few Weeks, they experinced a failure. the link didn’t pass traffic, but the primary static route remained active. they lost their internet connectivity, even though the backup link was
operating.
Which two possible solutions can be implemented to avoid this situation in the future? (Choose
two)
A. Implement HSRP link tracking on the branch router L2P-R1
B. Use a track object with an IP SLA probe for the static route on L2P-R1.
C. Track the link state of the ethernet link using a track object on L2P-R1
D. Use a routing protocol between L2P-R1 and the upstream ISP
Answer: BD
QUESTION 38
Why would a rogue host that is running a DHCP Server on a Campus LAN network present a
security risk?
A. It may allocate IP addresses from an unknown subnet to the users
B. all Multicast traffic can be sniffer y using the DHCO Multicasr capabilities
C. the CPU utilization of the first hop router can be overloaded by exploiting DHCP Relay open ports
D. A potential Man-in-the-middle Attack can be used against the clients.
Answer: D
QUESTION 39
Which Statement is true about TCN Propagation?
A. The originator of the TCN immediately floods this information through the network
B. the TCN propagation is a two step process
C. A TCN is generated and sent to the root bridge
D. the root bridge must flood this information throught the network
Answer: A
QUESTION 40
Which statement is true about loop guard?
A. Loop Guard only operates on interfaces that are considered point-to-point by the spanning tree.
B. Loop Guard only operates on root ports.
C. Loop Guard only operates on designated ports
D. Loop Guard only operates on edge ports
Answer: A
More 350-001 New Questions from http://www.lead2pass.com/350-001.html