Latest CCIE 350-001 New Question (71-75)

QUESTION 71

While you are troubleshooting network performance issues, you notice that a switch is periodically flooding all unicast traffic. Further investigation reveals that periodically the switch is also having spikes in CPU utilization, causing the MAC address table to be flushed and relearned. What is the most likely cause of this issue?
A.    a routing protocol that is flooding updates
B.    a flapping port that is generating BPDUs with the TCN bit set
C.    STP is not running on the switch
D.    a user that is downloading the output of the show-tech command
E.    a corrupted switch CAM table
Answer: B

QUESTION 72
Your network is suffering from regular outages. After troubleshooting, you learn that the transmit lead of a fiber uplink was damaged. Which two features can prevent the same issues in the future? (Choose two.)
A.    root guard
B.    loop guard
C.    BPDU guard
D.    UDLD
E.    BPDU skew detection
Answer: BD

QUESTION 73
Refer to the exhibit. You are trying to police down to 100 Mb/s. While testing, you notice that you rarely exceed 70-80 Mb/s.
What do you need to change in your MQC configuration to allow for 100 Mb/s speeds?
A.    Change the CIR value from 100 Mb/s to 200 Mb/s.
B.    Change the Bc value to allow for a large enough burst.
C.    Change the QoS queue from default to priority.
D.    Change the exceed-action to transmit.
Answer: B

QUESTION 74
Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?
A.    IPSec VPN
B.    SSL VPN
C.    port security
D.    port security with statically configured MAC addresses
E.    private VLANs
Answer: D

QUESTION 75
After applying a new ACL on a device, its CPU utilization rose significantly and many messages starting with “%SEC-6-IPACCESSLOG” appeared on the Syslog server.
What can be done to resolve this situation?
A.    Increase memory allocation for ACLs.
B.    Remove all entries from the ACL and use a single permit ip any any statement.
C.    Remove the log keyword from each ACL entry.
D.    Reboot the device after the ACL has been applied.
Answer: C

Comments are closed.