Do not you know how to choose the Cisco https://www.pass4itsure.com/350-026.html exam dumps? Being worried about the changed questions? Just try Flydumps new version Cisco 350-026 exam dumps. All the new questions and answers were added to the new dumps,visit Flydumps.com to free download Cisco 350-026 exam!
QUESTION 116
How is Equal Cost Multipath Protocol configured on the CSS?
A. ECMP command in the router service
B. Global IP ECMP command
C. VLAN1 IP ECMP command
D. ECMP command in a content rule
E. VLAN1 enable ECMP command
Correct Answer: B
QUESTION 117
Telcordia has defined national ISDN, which is basically within the construct of Q.931 protocol with some modifications. If National ISDN requires a new information element (IE), how will this need be handled?
A. No new IE can be defined by standard bodies other than ITU-T; therefore, Telcordia must pass the information in open fields of existing IE.
B. Telcorida has to define a new codeset (CS) 0 IE.
C. Telcordia should define a new CS7 IE
D. Telcordia should define a new CS5 IE
E. Use CS8 IE
Correct Answer: D
QUESTION 118
In MPLS what is an LSP?
A. Label Selection Pair
B. Label Switched Path
C. Lightweight Signaling Protocol
D. Large Sampling Path
Correct Answer: B
QUESTION 119
Within a Content Delivery Network there are 3 ways to get a client to the closest Content Engine for delivery of Content. One way is using Simplified Hybrid Routing. The other 2 ways are:
A. Using WCCP on a router for transparent redirection or setting the proxy settings in a browser point to the closest Content Engine.
B. Using WCCP on a router for transparent redirection or using DNS to resolve to the correct Content Engine.
C. Using DNS to direct the request to a content router and using a HTTP redirect to have the client go directly to the Content Engine.
D. Using a Coverage Zone file on the client and then using an HTTP redirect to have the client redirect to the closest Content Engine.
E. Setting up proxy settings in a browser pointing to the closest CE or using DNS to provide the IP address of the closest CE.
Correct Answer: A
QUESTION 120
Click the Exhibit button to view the topology. Host 1 and Host 2 are on Ethernet LANs in different buildings. A serial line is installed between two Cisco routers using Cisco HDLC serial line encapsulation. Routers A and B are configured to route IP traffic. Host 1 sends a packet to Host 2. A line hit on the serial line causes an error in the packet. When this is detected, the retransmission is sent by:
A. Host 1
B. Host 2
C. Router A
D. Router B
E. Protocol analyzer
Correct Answer: A
QUESTION 121
Click the Exhibit button to view the configuration. Debug is enabled on Router B, but no debug messages appear on the terminal. Other commands (show commands, etc.) seem to be working. What are the probable causes for this? (multiple answer)
A. Router B is not turned on.
B. Debug information is being sent to A.
C. The “terminal monitor” command needs to be executed if this is a virtual terminal session.
D. Debug information is being sent to the buffer instead of to the console terminal.
E. Debug information is configured at low priority, and will be displayed at a time when the router is less congested.
Correct Answer: CD
QUESTION 122
Click the Exhibit button to view the topology. The diagram shows a collapsed L3 switched building backbone consisting of two L3 switches: W and U. Each L3 switch has a routed interface on every subnet (VLAN) in the building. There are no VLAN trunks in the network. In other words the L3 switches are acting as native routers. There are exactly 4 client-side VLANs (subnets): a, b, c, d. There are exactly 2 server-side VLANs (subnets): x and y. There is one routed link (Subnet e) connecting the L3 switches in the core. How many equal-cost paths to Subnet d does L3 Switch W keep in its routing table?
A. 1
B. 2
C. 3
D. 4
E. 5
Correct Answer: A
QUESTION 123
How long is an ATM cell header?
A. 5 octets (bytes)
B. 3 octets (bytes)
C. 8 octets (bytes)
D. The size varies by AAL type used
Correct Answer: A
QUESTION 124
Which protocols are used to authenticate users?
A. HMAC-MD5
B. NTLM
C. LDAP
D. S/MIME
E. Diffie-Hellman
Correct Answer: BC
QUESTION 125
What statement regarding Network Qualifier Lists (NQL) is most correct?
A. It is used to define a list of IP addresses and networks to simplify and enhance the implementation of ACLs.
B. It is used to define a list of IP addresses to simplify and enhance the implementation of advanced balanced sticky source IP.
C. It is used to define a list of IP addresses of hosts allowed SNMP access to a Content Smart Switch.
D. It is used to define a list of IP addresses of FTP servers.
Correct Answer: A
QUESTION 126
Which three fundamental elements characterize the PKIs used in asymmetric cryptography?
A. Confidentiality, authorization, message integrity
B. Confidentiality, authentication, accounting
C. Confidentiality, authentication, authorization
D. Confidentiality, authentication, message integrity
E. Authentication, authorization, accounting
Correct Answer: D
QUESTION 127
In box-to-box redundancy on the CSS, to configure an ip circuit (VLAN) as a redundant circuit, what command is used?
A. Redundant-circuit
B. Redundant-type-circuit
C. Redundancy
D. Redundancy-type-circuit
E. None of the above
Correct Answer: C
QUESTION 128
It is desired to have the CSM match on the following URLs: /index.html /Index.html abc/index.html abc/ Index.html What should be used?
A. map TESTMAP url match protocol http url */?ndex.html
B. map TESTMAP url match protocol http url */i*Index.html
C. map TESTMAP url match protocol http url *ndex.html
D. map TESTMAP urlmatch protocol http url “*/ndex.html
Correct Answer: A
QUESTION 129
On a Cisco router running WCCP web-cache, what command will show the number of redirected packets?
A. show ip wccp web-cache redirect
B. show ip wccp web-cache view
C. show ip wccp web-cache detail
D. show ip wccp web-cache routers
E. show ip wccp web-cache redirect out
Correct Answer: C
QUESTION 130
Click the Exhibit button. Given the four networks listed, what valid summary address (below) contains the longest prefix?
A. 10.1.0.0/20
B. 10.1.0.0/16
C. 10.1.1.0/23
D. 10.1.16.0/19
E. These networks cannot be summarized.
Correct Answer: A
QUESTION 131
Click the Exhibit button to view the topology. Customers green and blue must communicate with each other. Which condition is required?
A. Customer Blue and Customer Green must use BGP for routing to the Internet.
B. Customer Blue and Customer Green must use unique addresses in their corporate networks.
C. All Service Provider routers must use BGP.
D. The Service Provider must provide BGP Peering to another Service Provider.
Correct Answer: B
QUESTION 132
Given an address of 10.1.1.1 with a subnet mask of 255.255.255.224, how many hosts can be addressed in this subnet?
A. 16
B. 15
C. 30
D. 31
E. 63
Correct Answer: C
QUESTION 133
If the following url is put into a browser – ftp://ftp.cisco.com/ – what port does the browser initially use to communicate to the origin server?
A. 443
B. 80
C. 20
D. 21
E. 8080
Correct Answer: D QUESTION 134
Click the Exhibit button to view the topology. In the MPLS network shown, which subnets would be in the same Forwarding Equivalence Class (FEC) on router PE1:
A. 172.16.3.0/24 and 193.1.1.0/28
B. 172.16.1.0/24 and 172.16.2.0/24
C. 172.16.1.0/24 and 193.1.1.0/28
D. 172.16.1.0/24, 172.16.2.0/24, and 172.16.3.0/24
Correct Answer: C
QUESTION 135
A router is set up to redistribute routing updates from OSPF to RIP. What answer best describes issues the network administrator needs to be aware of?
A. Split Horizon, Poison Reverse, Holddown
B. Slow convergence, limited hop-count metric, lack of network mask information, periodic broadcasts
C. None, OSPF is a link-state routing protocol which overcomes issues found in RIP.
D. Difference in metrics (e.g. hops vs. cost), subnet mask allocation/addressing (e.g. VLSM vs. fixed subnet mask length), routing protocol summarization (e.g. network boundaries)
Correct Answer: D
QUESTION 136
MPLS does not support:
A. Multicast
B. OSPF
C. BGP
D. Multicast and OSPF
Correct Answer: A
QUESTION 137
The website www.foo.com is having problems. The PC you are troubleshooting from does not have a web browser or sniffer software installed. Which method is the next best way to verify that the website will return the web page with content:
A. tracert www.foo.com 80
B. ping www.foo.com
C. telnet www.foo.com 80 GET / HTTP/1.0
D. telnet www.foo.com 80
E. telnet www.foo.com 80 HEAD / HTTP/1.0
Correct Answer: C
QUESTION 138
What is the WCCP Service Group number for Reverse Proxy?
A. 80
B. 90
C. 82
D. 99
E. 0
Correct Answer: D
QUESTION 139
What ISDN timer is started after Q.931 SETUP msg is sent?
A. T301
B. T303
C. T302
D. T310
E. T305
Correct Answer: B
QUESTION 140
What is the difference between pre-positioned and pre-loaded content in an ACNS 5.X Content Delivery Network?
A. Pre-loaded content is content that has been fetched by the root Content Engine and distributed to all the Content Engines. Pre-positioned content is content that all Content Engines fetch independently from an origin server.
B. Pre-loaded content is content that has been fetched by the Content Distrubution Manager and distributed to all the Content Engines. Pre-positioned content is content that all Content Engines fetch independently from an origin server.
C. Pre-positioned content is content that has been fetched by the root Content Engine and distributed to all the Content Engines. Pre-loaded content is content that all Content Engines fetch independently from an origin server.
D. Both are exactly the same and do the same function.
E. Pre-positioned content is content that has been fetched by the Content Distrubution Manager and distributed to all the Content Engines. Pre-loaded content is content that all Content Engines fetch independently from an origin server.
Correct Answer: C
QUESTION 141
Click the Exhibit button to view the topology. In a reorganization, OSPF areas are realigned. Is this a valid network design? If not, which changes could be made to the network and/or router configurations? (multiple answer)
A. No changes are necessary.
B. A virtual link could be configured between Area 60 and Area 0.
C. A serial line or other physical connection could be installed between devices in Area 60 and Area 0.
D. Router B could be configured as an Area Border Router between Area 60 and Area 6.
E. This is not a valid design, and no changes can make it work.
Correct Answer: BC
QUESTION 142
Click the Exhibit button to view the topology. Using the above diagram, which are valid BGP AS_Path Attributes received at Net1 for a route originating from AS65100? (multiple answer)
A. 200 57000 100 65100
B. 200 57000 100 100
C. 100 57000 200
D. 200 57000 100
E. 65100 100 57000 200
Correct Answer: ADE
QUESTION 143
Click the Exhibit button to view the configuration. What effect will this configuration command have? line vty 0 4 no password vtypassword
A. All telnet connections to the router will be denied.
B. Only one telnet connection at the router will be allowed at a time.
C. Virtual terminal sessions will not be able to enter enable mode.
D. Virtual terminal sessions will not be asked a user-level password.
E. It will have no effect.
Correct Answer: A
QUESTION 144
What statement regarding an SSL transaction is NOT correct?
A. An SSL transaction begins with an SSL handshake where the client and server negotiate encrypted communication.
B. Both the TCP and IP headers are encrypted in order to prevent a third party from seeing the contents of the communication.
C. SSL can be used to encrypt different protocols including, HTTP, FTP, and Mail.
D. Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers for e-commerce Web sites.
Correct Answer: B
QUESTION 145
The Hold-Down Timer used in Distance Vector protocols:
A. Sets the time limit of how long a router may keep a packet in its buffer, if the routing protocol is in the process of converging
B. Determines the number of seconds a router will wait before sending another update to neighbor routers
C. Sets a specific period for routers to neither accept nor advertise a route from a destination where an original route was recently lost
D. Sets a duration where routes are not accepted from the neighbor router that caused a routing loop
Correct Answer: C
QUESTION 146
Click the Exhibit button. In the shown diagram the two web servers are configured for port 81 and the content rule for port 80. If a client wishes to connect to the virtual IP address 172.16.0.100:
A. A source group is needed to make this work properly.
B. This configuration will work as configured.
C. This configuration will not work.
D. Access-lists must be configured to allow this to work.
E. DNS must be configured on the CSS for this to work properly.
Correct Answer: C
QUESTION 147
To maintain schema-consistency in an LDAP Directory Information Tree (DIT), the LDAP standard specifies that:
A. The client first downloads the DIT schema from the server and then makes sure every request it sends conforms to the schema; The server therefore doesn’t have to check DIT for consistency
B. The operator periodically scans the DIT to check that the schema is not violated, and manually corrects any inconsistencies caused by clients
C. The server periodically scans the DIT to check that the schema is not violated, and sends a notification to the operator when it finds an inconsistency caused by clients
D. The server periodically converts the DIT to an SQL database; Schema-checking is done by the SQL engine and then the database is converted back to a DIT
E. The server checks every client operation for schema consistency, and ignores requests that would result in a DIT inconsistency
Correct Answer: E QUESTION 148
What route selection options are available for ECMP in the CSS?
A. Round Robin
B. Weighted Round Robin
C. Round Robin and Address Based
D. Round Robin and Least Bandwidth
E. Round Robin, Weighted Round Robin, and Address Based
Correct Answer: C
QUESTION 149
Click the Exhibit button to view the diagram. The address field contains: (multiple answer)
A. The DLCI Value
B. The Extended Address (EA)
C. Congestion Control
D. FCS
Correct Answer: ABC
QUESTION 150
When a proxy requires NTLM Authentication from a user and the system administrator does not want an authentication window to come up on the browser for the user to authenticate. The user must be:
A. Using a Netscape browser, the windows domain controller configured on the CE and the user logged into the domain
B. Using Internet Explorer, Radius configured on the CE and the user logged into the domain
C. Using a Netscape browser, Websense configured on the CE and the user logged into a domain
D. Using Internet Explorer, Windows Domain Controller configured on the CE and the user logged into the domain
E. DNS, WINS, Internet Explore and TACACS configured on the CE, does not matter what browser is being used and the user logged into the domain
Correct Answer: D
QUESTION 151
WCCP is a communication protocol used between routers and cache devices. On what port does this protocol communicate?
A. 80
B. 2180
C. 8080
D. 52
E. 2048
Correct Answer: E
QUESTION 152
How does TACACS+ implement AAA?
A. Authentication, Authorization and Accounting are in separate exchanges, yet on the same TCP connection. The entire connection is encrypted.
B. Authentication, Authorization and Accounting are in separate exchanges and each occurs on a different TCP connection. Only the authentication connection is encrypted.
C. Authentication, Authorization and Accounting are in separate exchanges. Authentication and Authorization happen on the same TCP encrypted connection ; Accounting data is carried unencrypted over UDP.
D. Authentication, Authorization and Accounting are in separate exchanges, yet on the same TCP connection. Only passwords are encrypted.
E. Authentication and Authorization is combined in one exchange. Accounting happens in a separate exchange. Authentication and Authorization data are carried on a UDP transport. Only passwords are encrypted. Accounting data is carried unencrypted over another UDP transport.
Correct Answer: A
QUESTION 153
Click the Exhibit button: In the shown diagram the browser fails to return a web page when browsing to www.foo.com. The IP addressing is represented by letters next to each device. The domain name www.foo.com resolves to IP address E. A sniffer trace is taken at the PC. What sequence of packets would be observed for this problem:
A. A -> E SYN F -> A SYN-ACK A -> F RST
B. A -> D SYN D -> A RST
C. C -> E SYN E -> C SYN-ACK C -> E ACK
D. D -> G SYN G -> D SYN-ACK D -> G ACK
E. A -> E FIN E -> A ACK
E -> A FIN Correct Answer: A QUESTION 154 What is the proper format for the inverse DNS mapping for the following address: 198.133.219.25?
A. 198.133.219.25.in-addr.arpa.
B. 198.133.219.0.in-addr.arpa.
C. 0.219.133.198.in-addr.arpa.
D. 25.219.133.198.in-addr.arpa.
E. 198.133.25.219.in-addr.arpa.
Correct Answer: D QUESTION 155
Click the Exhibit to view the topology. In this network, Host A is trying to reach Host D. There is no routing protocol running, but Router B and C have the following static routes configured: Router B: ip route
10.1.3.0 255.255.255.0 ethernet 1 Router C: ip route 10.1.1.0 255.255.255.0 ethernet 1
A. This will not work because Router B has no idea of how to forward traffic to the 10.1.3.0/24 network.
B. This will work because Router B will recognize that Router C is on the 10.1.2.0/24 network through a router discovery protocol and will forward traffic for 10.1.3.0/24 to Router C.
C. This will not work because a broadcast interface in a static route command cannot be specified.
D. This will work because Router B will ARP for Host D’s IP address on the 10.1.2.0/24 network and Router C will answer.
Correct Answer: D
QUESTION 156
A root CA certificate distinguishes itself from other certificates because:
A. The root CA certificate has a special bit set in the Key Usage field.
B. The root CA certificate has its serial number in a dedicated range.
C. The root CA certificate issuer and subject are the same.
D. The root CA certificate has a Subject Type equal to CA in its Basic Constraints.
E. The root CA certificate has a Thumbprint.
Correct Answer: C
QUESTION 157
Click the Exhibit to view the topology. Router A has a 512K-access port into the frame relay cloud. Router B has 128K-access port into the frame relay cloud. The two routers are connected with symmetrical PVCs that are configured for 64K committed information rate (CIR). What Frame Relay Traffic Shaping map-class sub-command should be entered on Router A to prevent workstation A from overrunning the access port on Router B?
A. frame-relay traffic-rate 128000 512000
B. frame-relay traffic-rate 64000 512000
C. frame-relay traffic-rate 512000 64000
D. frame-relay traffic-rate 128000 64000
E. frame-relay traffic-rate 64000 128000
Correct Answer: E
QUESTION 158
A router is receiving updates for a subnet from different routing protocols. The administrator wishes to take advantage of a path via a route with a less favorable Administrative Distance. What can be done to affect this without losing any of the updates?
A. Configure a static route with an Administrative Distance of 120
B. Use the Router Configuration mode command distance with an appropriate ‘weight’ for this subnet
C. Create a distribute-list to block this subnet
D. Modify the default-metric weight of the routing protocol offering the more favorable Administrative Distance
Correct Answer: B
QUESTION 159
Click the Exhibit button. When loadbalancing TACACS+, the loadbalancer needs to:
A. Loadbalance UDP traffic on port 1645, and TCP on port 49
B. Loadbalance TCP traffic on ports 1645 and 1812.
C. Be TACACS+-aware and loadbalance on TCP port 49.
D. Loadbalance TCP traffic on port 49.
E. Be TACACS+-aware and loadbalance on UDP traffic on port 49.
Correct Answer: D
The Cisco 350-026 training is a vital way of becoming the best.This Cisco https://www.pass4itsure.com/350-026.html certification has helped the candidates to enhance their capabilities by providing a great learning platform to them so that they can polish their skills.
The post Cisco 350-026 Exam, Helpful Cisco 350-026 Dumps Latest Version PDF&VCE appeared first on Best IT Certification Exam Providers - I-tec; VCE Exam Simulator 2.