CertCities.com -- The Ultimate Site for Certified IT Professionals
Register today for a Free Web Seminar and you could WIN!
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: Secrets of the Windows Gurus

Reader Review: Word 2007 -- Not Exactly a Must-Have

Access Anywhere

Windows Vista: Learning To Play Nice

Product Review: WhatsUp Gold 11.0, Premium Edition


CertCities.com
Let us know what you
think! E-mail us at:



Visit Redmond Media Group
 
 
...Home ... Editorial ... Pop Quiz ..Pop Quiz Article Saturday: November 17, 2007
TechBusiness: Resources for Innovation Through Software Technology on Redmond Developer News
Secure Computing: Visit SWAT Now!
Dice: The Career Hub for Tech Insiders


Cisco CCIE Qualification Exam #350-001: Routing and Switching
9 questions. Answers can be found at the end of the pop quiz.


courtesy of   CC Prep

Question:
1. Which of the following is true of the configuration line below?

access-list 10 permit 153.19.0.128 ...
0.0.255.127

A. The source address less than 153.19.10.126 would be permitted

B. The destination address less then 153.19.0.129 would be denied

C. The source address greater than 153.19.100.129 would be permitted.

D. The destination address less than 153.19.129.12 would be permitted

E. Configuration statement shown is illegal.

2. Which of the following protocols defines LAN Based multimedia and voice capabilities?

A. H.324

B. I.123

C. H.323

D. Erlang B

E. There is no such protocol.

3. If a bridge receives a unknown unicast, which of the following is true?

A. it will be sent out all ports

B. it will be sent out all ports except for the port on which in was received

C. it will be sent out the port it was received on

D. it can not be sent out any port since it is unknown

E. all unicast must be known

4. FDDI normally uses which of the following VLAN encapsulations? (Choose the best answer)

A. 802.1

B. 802.2

C. 802.10

D. ISL

E. 802.6

5. Which of the following are metrics for EIGRP?

A. bandwidth, delay, load, reliability and MTU

B. cost

C. hop count

D. ticks and hops

6. When using IPXWAN, what is the default tick count assigned to the interface?

A. 1

B. 6

C. 10

D. bandwidth/clockrate

E. There is no default tick count

7. If you typed the command "snmp-server community" from Global Configuration mode, what would happen?

A. Return an error message

B. Enable SNMP process on router

C. Set the SNMP group to community

D. Allows the router to send trap messages

8. Review the results of the show frame map command. What is the encapsulation method being used?

Router_A#sh frame map
Router_A#
%FR-5-DLCICHANGE: Interface Serial0/0 - ...
DLCI 201 state changed to ACTIVE
Router_A#sh frame map
Serial0/0 (up): ip 65.62.245.2 dlci...
201(0xC9,0x3090), dynamic,
broadcast,, status defined, active

A. IETF

B. CISCO

C. ANSI

D. RFC 1490

E. can not be determined

9. If every Ethernet frame were being sent at the MTU, approximately how may packets per second would be transmitted?

A. 200

B. 500

C. 800

D. 1000

E. 10000

1) Answer C. The 0.0.255.127 portion of this configuration line is the wild card mask.

  • A 0 means to match the corresponding bit of the address.
  • A 1 means "I don't care" what the value is.
  • The first two octets must match the address 153.19.
  • The third octet can have any value.
  • The fourth octet must be greater than 128.

Let's examine the fourth octet. The only bit that has to match is the 128 bit, therefore the remaining bits may have any value, which gives us the range of 128-255.

2) Answer: C. H.323 is a standard for deploying Voice and Videoconferencing over LAN based media.

3) Answer: B. Here we have a bridge, when a bridge receives a frame for which the destination MAC address is not in the bridge table the frame will be sent out all ports except for the port on which it was received. The bridge in this case is "learning" MAC addresses.

4) Answer: C. FDDI does not run over ISL or other encapsulations listed above. 802.10 is the IEEE standards that describes the use of FDDI VLANS. VTP provides the configuration for 802.10 VLANS in a Cisco environment.

5) Answer: A. Keep in mind that it is the lowest bandwidth configured on any link between the source and the destination. For example, if you have a Router1 connected to Router3 and the best path passes through Router 2: Assume that the link from Router1 to Router2 is a T1 and the link from Router2 to Router3 is 56k. The 56k parameter will be used by the EIGRP algorithm to calculate the metric.

6) Answer: E. IPXWAN was developed by Novell to standardize how IPX treats serial links. The TICK count will be negotiated between the IPXWAN interfaces. There is no default. There is a default TICK count of 6 if IPXWAN is NOT used.

7) Answer: A. "% Incomplete command" is the response you will get if you type the command in as above. B) & C) would be correct if you added the name of the community on the end of the above command. d) is enabled by another command: snmp-server enable traps. Below is the command and its options.

routerb(config)#snmp-server enable traps ?
bgp Enable BGP state change traps
config Enable SNMP config traps
frame-relay Enable SNMP frame-relay traps
isdn Enable SNMP isdn traps
rtr Enable SNMP Response Time Reporter traps
snmp Enable SNMP traps
syslog Enable SNMP syslog traps

8) Answer: B. Cisco is the default encapsulation type, but it will not be displayed by the show command. When IETF is configured it will be displayed.

Router_A#sh frame map
Serial0/0 (up): ip 65.62.245.2 dlci ...
201(0xC9,0x3090), dynamic, broadcast,...
IETF, status defined, active

When connecting a Cisco device to a non Cisco device IETF must be used.

9) Answer: C. Assuming a MTU 1500 bytes and a 10 megabit LAN we would have the following:

  • 1500*8=12000 bits.
  • 10000000/12000= 800+

These questions and answers are provided by CCPrep.com, An EarthWeb Company. Order the full version of this exam, plus other Cisco simulations, elabs, bootcamps, and online learning with a Cisco Learning Partner online at www.ccprep.com, phone US & Canada (877) 224- 3123 International (904) 394-0051, fax (904) 460-0139, 129 Herons Nest Lane St. Augustine, FL 32084.

Questions

1. You install Windows XP Professional on your home computer. When the installation concludes, you see only the Recycle Bin icon on the desktop. You do not see the My Computer, My Network Places or My Documents icons on the desktop. You want these icons to appear on the desktop.

Which of the following actions should you perform?

a. Enable Use Windows classic folders in Folder Options.
b. Switch to the Classic Start menu style.
c. Configure folders to use the simple folder view.
d. Right-click the desktop, and select Show Desktop Icons.

2. . You are a sales representative for a company that sells address lists for direct mail purposes. You use a Windows XP Professional laptop computer when you are traveling. You purchase a PC card that combines a modem and a NIC. You insert the PC card, and you are prompted to reboot. You discover that the devices appear in Device Manager; however, neither device is operational. You want to make these devices functional.

Which of the following actions should you perform?

a. Install the drivers manually.
b. Reboot the computer.
c. Connect the modem to an IEEE 1394 interface.
d. Obtain a PS2-to-USB adapter, and connect the mouse to a USB port.

3. Your Windows XP Professional computer has two partitions: C and D. The C partition is formatted with FAT32 and has 1 GB of free space. The D partition is formatted with NTFS and has 250 MB of free space. You need to copy the Financial folder from a file server to your computer. The folder contains 150 MB of sensitive data. You must secure the files on your computer.

Which of the following actions should you perform?

a. Copy Financial to D, and encrypt its contents.
b. Copy Financial to C, and encrypt its contents.
c. Request that Financial be encrypted on the file server, then copy Financial to C.
d. Copy Financial to C, then convert the folder to NTFS.

4. You administer a single Windows 2000 domain, and you are responsible for managing users' workstations. Jennifer shares a printer on her Windows XP Professional computer. Jennifer and a Help Desk technician, Eric, must be able to control access to this printer. All domain users other than Jennifer and Eric should be allowed only to submit and manage their own print jobs.

Which of the following permissions should you assign?

a. Assign the Allow - Manage Printers and Allow - Manage Documents permissions to Jennifer and Eric. Assign the Allow - Manage Documents and Allow - Print permissions to the Users group.
b. Assign the Allow - Manage Printers and Allow - Manage Documents permissions to Jennifer and Eric. Assign the Allow - Print permission to the Users group.
c. Assign the Allow - Manage Printers permission to Jennifer and Eric. Assign the Allow - Manage Documents permission to the Users group.
d. Assign the Allow - Manage Printers permission to Jennifer and Eric. Assign the Allow - Manage Documents and Allow - Print permissions to the Users group.ore.


5. You administer a Windows 2000 domain for a company that manufactures and distributes electronic equipment. Brad, the Director of Marketing, asks you to upgrade 25 of the computers in his department from the Windows 2000 Professional operating system to the Windows XP Professional operating system. You successfully upgrade the computers with the default configurations.

One month later, Brad notifies you that those users who received the upgraded computers can no longer log on.

Which of the following actions should you perform?

a. Instruct the users to log on to their computers by using their local accounts rather than their domain accounts.
b. Set each of the 25 users' Apply Group Policy permission for the GPO that controls the account lockout policy to Deny.
c. Reinstall Windows XP Professional on those 25 computers.
d. Activate Windows XP Professional with Microsoft Clearing House.

6. You are a help desk technician for InterConn. The InterConn Active Directory-based network consists of several branch offices that are connected to headquarters through private WAN links. None of the offices is connected to the Internet. E-mail services are provided by Exchange 2000 Server. You must implement Remote Assistance. You work at headquarters, and you must be able to establish Remote Assistance sessions with all Windows XP Professional computers on the network.

Which of the following actions should you perform?

a. Configure MSN Messenger on all Windows XP Professional computers to use Exchange 2000 Server.
b. Download the latest version of MSN Messenger from the Microsoft Web site, and deploy it on all Windows XP computers.
c. Add the domain user accounts of the technical support personnel to the list of Remote Desktop Users on the Remote tab of System Properties in Control Panel.
d. Assign the Allow - Modify NTFS permission for the Network Service folder to the technical support personnel on all Windows XP Professional computers.

7. You are an architect, and you use a computer that runs Windows XP Professional. You have installed a CAD application on your computer. When it is running, you notice that all other applications on the computer become noticeably slower. You require access to this application, but you must be able to perform other tasks while the CAD application is running.

Which of the following actions should you perform?

a. Reduce the priority of the CAD application.
b. Increase the priority of the remaining applications.
c. Reduce the priorities of all applications.
d. Increase the priorities of all applications.

Answers:

1) Choice b is correct. When Windows XP Professional is installed, the default desktop displays only the Recycle Bin icon. To cause the My Computer, My Network Places and My Documents icons to appear on the desktop, you can right-click the taskbar, select Properties and enable Classic Start menu on the Start Menu tab. Alternatively, you can open Control Panel, start the Display program, select the Desktop tab, click Customize Desktop and enable the appropriate icons on the General tab of the Desktop Items page. If you enabled the desktop icons by performing these actions, then switching between the new and Classic Start menu styles would have no effect on the visibility of those shortcuts.

Enabling the Use Windows classic folders option on the General tab of Folder Options in Windows Explorer would prevent the contents of all folders from behaving like Web pages. Enabling Display simple folder view in Explorer's Folders list on the View tab of Folder Options in Windows Explorer would enable new behavior when a folder was selected in the left pane in Windows Explorer; the folder would expand in the left pane and simultaneously display its contents in the right pane. You do not need to enable Show Desktop Icons immediately after the installation of Windows XP because this option is enabled by default. Reference:WXPHSC, Search, "desktop icons," "To add a desktop icon."

2) Choice a is correct. Typically, when you insert a card into a computer that is running the Windows XP Professional operating system, the system detects the card and attempts to install drivers. If a problem occurs, then it might be attributed to the fact that the operating system cannot find the appropriate drivers, thereby preventing the devices from working properly. Another possibility might be that the operating system has installed inappropriate drivers. If such a situation exists, then you should open Device Manager, right-click the device, open its Properties sheet and click either Update Driver or Reinstall Driver. When prompted, you should specify the location, such as a floppy disk, where the operating system can find the manufacturer's driver.

The scenario stipulates that you rebooted the computer once; doing so again is unlikely to restore the functionality of the devices. You are not required connect a modem by using cables unless the modem is external. The modem in this scenario is internal; thus, you cannot perform this action. If you are using an external PS2 mouse, then obtaining a PS2-to-USB adapter and connecting the mouse to a USB port would have no effect on the modem, which may require a COM port. Windows XP is a Plug and Play operating system, and it would be able to assign the appropriate hardware settings to a PC card modem without creating a conflict with the computer's built-in COM port. Reference:WXPRK, Contents, "Part II Desktop Management," "Ch 9 Managing Devices," "Device Installation," "Installing Drivers." WXPRK, Contents, "Part IV Networking," "Ch 22 Configuring Telephony and Conferencing," "Configuring Modems."

3) Choice a is correct. The encryption of files and folders through Encrypting File System (EFS) is supported only by the NTFS file system. Encrypted files that are copied to a non-encrypted folder retain their encryption, provided that the folder resides on a volume that has been formatted with NTFS 5.0 or later. The FAT file system does not support encryption; therefore, copying an encrypted file to a FAT file system would decrypt the file. Folders cannot be converted to NTFS. Reference:WXPRK, Contents, "Part III Security," "Ch 17 Encrypting File System," "Overview of EFS."WXPRK, Contents, "Part III Security," "Ch 17 Encrypting File System," "Troubleshooting EFS," "Encrypted File Is Unencrypted When Copied or Moved."

4) Choice b is correct. Three standard printer permissions are available in Windows XP Professional: Manage Printers, Print and Manage Documents. When you assign the Allow - Manage Printers permission to a user's account, that user's account is automatically assigned the Allow - Print permission. Additionally, that user has the ability to take ownership of the printer and to assign permissions to other users. When you assign the Allow - Manage Documents permission to a user's account, that user has the authority to manage print jobs submitted by other users. In this scenario, Jennifer and Eric should be assigned the Allow - Manage Printers and Allow - Manage Documents permissions so that they can fully manage the shared printer on Jennifer's Windows XP Professional computer. All other users in the domain should be assigned only the Allow - Print permission. The Print permission allows a user to print and manage his or her own print jobs. To allow the users any additional permissions would grant them more authority than they require. Jennifer and Eric could assign more granular permissions to users if necessary. All users in a domain automatically belong to the Domain Users group. Members of Domain Users, by default, belong to the Users group on all Windows XP Professional computers in the domain. Reference: WXPHSC, Search, "Security permissions for printing."

5) Choice d is correct. All retail versions and editions of Windows XP must be activated within 30 days of the installation. You can activate an installation either by connecting to the Internet and selecting the appropriate command on the Start menu or by contacting a Microsoft Clearing House representative. You cannot attribute the logon failures experienced by these users to password expiration. By default, passwords expire only after 42 days; this option is set both in the default Domain Policy Group Policy Object (GPO) in a Windows 2000 domain and in the default local GPO.

The scenario stipulates that only those users who received computers on which the Windows XP Professional operating system was installed are unable to log on. Because the operating system has not been activated with Microsoft Clearing House, these users would not be able to use their local accounts to log on to their Windows XP Professional computers. The scenario does not stipulate whether a GPO that enforces an account lockout policy has been configured. Furthermore, such a policy would not prevent authorized network users from logging on to their computers or to their respective domains. It is not necessary to reinstall the Windows XP Professional operating system on those 25 computers. If you did so, then you would still be required to activate the software within 30 days. Reference: WXPRK, Contents, "Part I Deployment," "Ch 1 Planning Deployments," "Planning Installations," "Planning for Windows Product Activation." TechNet, Search, "Deploying Windows XP Part I: Planning," "Deployment Overviews and Guidelines." TechNet, Search, "Microsoft Product Activation," "Evaluate."

6) Choice a is correct. Remote Assistance is a Windows XP Professional feature that can be used to provide support for users at remote locations whose computers are running Windows XP Professional. A user should send an invitation through MSN Messenger, as an e-mail message attachment or in a file in order to initiate a Remote Assistance session. When you accept the invitation, a connection to the remote computer's desktop will be established automatically. Remote Assistance relies on MSN Messenger, which requires an Instant Messaging server to enable users to communicate. This server does not have to be the Instant Messaging server that provides those services for Internet users who have .NET Passport. In this scenario, the InterConn network is not connected to the Internet. However, e-mail services are provided by Exchange 2000 Server, which supports instant messaging. To provide Remote Assistance support to the users on the InterConn network, you should create a virtual Instant Messaging server on an Exchange 2000 Server computer, install the version of MSN Messenger that is bundled with Exchange 2000 Server, and configure MSN Messenger on all Windows XP computers to use that server for Instant Messaging connectivity. Remote Assistance will then work.

The latest version of MSN Messenger that is available on the Microsoft Web site cannot be configured to use an arbitrary Instant Messaging server. This version works only with one Instant Messaging server that Microsoft provides access to on its Web site. Adding the domain user accounts of the technical support personnel to the list of Remote Desktop Users on the Remote tab of System Properties in Control Panel is related to Remote Desktop connections. In this scenario, you must establish Remote Assistance connections, which are performed under the security context of the current user on the remote computer. Therefore, Remote Assistance connections do not require any additional configurations on user accounts, and no additional permissions for file system resources are required. The Network Service folder contains a user profile for a special account that is used to provide the security context for some of the services that run on Windows XP computers. This user account is irrelevant to the task presented in this scenario. Reference: TechNet, Search, "Chapter 11 - Instant Messaging and Presence Monitoring," "Exchange 2000 Server Planning and Installation."

7) Choice a is correct. Processes can belong to one of six priority classes: Realtime, High, AboveNormal, Normal, Low and BelowNormal. The higher the assigned priority relative to priorities of other concurrent processes, the more a process will monopolize processor time. In such a situation, the processes with lower priorities lose required processor time and, consequently, might slow down significantly or even become inoperable. Typically, all applications run with a priority of Normal. In this scenario, all applications, with the exception of the CAD application, should be run with a priority of Normal. To ensure that these applications receive adequate processor time, you should reduce the base priority of the CAD application. To temporarily adjust the base priority of an application at run time, you can right-click the corresponding process in Task Manager and select the appropriate priority. In this scenario, you might choose to run the CAD application with a priority of Low or BelowNormal. To permanently adjust the base priority of an application, you can use a command, such as start /belownormal program_name. The application will run properly, but its threads will receive a lesser portion of the CPU's time.

Application priorities work as they are intended only in situations where one or more applications are assigned higher priorities than other applications. If the priorities of all applications were reduced or increased, then you would experience no change in performance.
Reference: W2KSRK, Contents, "Server Operations Guide," "Performance Monitoring," "Analyzing Processor Activity," "Advanced Topic: Changing Thread Priority to Improve Performance (entire section)."

These questions and answers are provided by Transcender LLC. Order the full version of this exam simulation online at www.transcender.com, phone 615-726-8779, 8 a.m. - 6 p.m., (CST), M - F, fax 615-726-8884, or mail to or mail to Transcender LLC, 565 Marriott Drive, Suite 300, Nashville, TN 37214.

For more pop quizzes, click here. To access our list of free, non-braindump practice exams on the Web, click here.


More Pop Quiz:


There are 4 CertCities.com user Comments for “Cisco CCIE Qualification Exam #350-001: Routing and Switching”
Page 1 of 1
2/1/01: genhuai says: if you can give me more question
7/5/01: Johannes says: Where I can do the "Cisco CCIE Qualification Exam #350-001"?? I acquired the knowledge myself, and i need no more Training Courses. How much costs the exam for this Certificate (all inclusive in Euro? Friendly Greetings Johannes Voetter Germany, SChwäbisch Hall
10/29/01: Slapme says: Oh im good, no challenge here, i thinikn ill take the otheres
3/16/02: adnan adnan mustafa from suadi arabia says: i need too much questions
Your comment about: “Cisco CCIE Qualification Exam #350-001: Routing and Switching”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

top


Sponsored Links
Work Smarter with Citrix Education
Learn how to maximize the performance of your IT environment
Get 25% Off Certification Practice Exams
Introductory offer at SybexTestsuccess.com through November
Capella U. IT career with a degree online.
Click here to learn about our many specializations



Home | Microsoft® | Cisco® | Oracle® | A+/Network+" | Linux/Unix | MOS | Security | List of Certs
Advertise | Contact Us | Contributors | Features | Forums | News | Pop Quiz | Tips | Press Releases | RSS Feeds RSS Feeds from CertCities.com
Search | Site Map | Redmond Media Group | TechMentor Conferences | Tech Library Webcasts
This Web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc., Microsoft Corp., Oracle Corp., The Computing Technology Industry Association, Linus Torvolds, or any other certification or technology vendor. Cisco® and Cisco Systems® are registered trademarks of Cisco Systems, Inc. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corp. Oracle® is a registered trademark of Oracle Corp. A+®, i-Net+T, Network+T, and Server+T are trademarks and registered trademarks of The Computing Technology Industry Association. (CompTIA). LinuxT is a registered trademark of Linus Torvalds. All other trademarks belong to their respective owners.
Reprints allowed with written permission from the publisher. For more information, e-mail
Application Development Trends | Campus Technology | CertCities.com | The Data Warehousing Institute
E-Gov | EduHound | ENTmag.com | Enterprise Systems | Federal Computer Week | FTPOnline.com | Government Health IT
IT Compliance Institute | MCPmag.com | Recharger | Redmond Developer News | Redmond
Redmond Channel Partner | TCPmag.com | T.H.E. Journal | TechMentor Conferences | Visual Studio Magazine | VSLive!
Copyright 1996-2007 1105 Media, Inc. See our Privacy Policy.
1105 Redmond Media Group