Free 351-001 Exam Braindumps (page: 5)

Page 4 of 60

What information can you get from TCP flags while assessing an attack?

  1. Source of the attack
  2. Type of attack
  3. Target of the attack
  4. Priority of the attack traffic

Answer(s): B



Which two steps can be taken by the sinkhole technique? (Choose two.)

  1. Reverse the direction of an attack
  2. Redirect an attack away from its target
  3. Monitor attack noise, scans, and other activity
  4. Delay an attack from reaching its target

Answer(s): B,C



In the network presented in the following exhibit, all routers are configured to run EIGRP on all links. All packets transmitted during convergence are transmitted once (there are no dropped or retransmitted packets). What is the maximum number of queries P4S-R3 might receive for 192.168.1.0/24 if the link between P4S-R1 and P4S-R2 fails?

  1. Four queries, one each from P4S-R2, P4S-R4, P4S-R5, and P4S-R6
  2. No queries, because there aren't any alternate paths for 192.168.1.0/24
  3. Seven queries, one from P4S-R2 and two each from P4S-R4, P4S-R5, and P4S-R6
  4. One query, since the remote routers P4S-R4, P4S-R5, and P4S-R6 are natural stubs in EIGRP

Answer(s): A



All routers in this network are running EIGRP according to the exhibit. Which step is the most important to make sure that this network core will converge quickly should a link failure occur?


  1. Make certain the maximum number of paths on both of the routers is two
  2. Make certain EIGRP is not running across non-transit links
  3. Add another link between the two routers with no servers and set the metric on this new link equal to the other four links
  4. Make certain EIGRP is running across all links

Answer(s): B






Post your Comments and Discuss Cisco® 351-001 exam with other Community members:

351-001 Discussions & Posts