New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Questions 4

The service provider is serving hosts with two different multicast streams from source X and source Y. Source X is multicast group 224.0.0.0/8, and source Y is multicast group 226.0.0.0/8. Multicast source X should send its stream through bidirectional RP address 10.20.1.1, and multicast source Y should send its stream through RP address 10.20.2.1. Which configuration meets these requirements?

Options:

A.

Enable ip pim ssm default on RA and RB.

B.

Add ip pim bidir-enable in global mode on RB.

C.

Permit the source X and source Y IP addresses in the access list on RB.

D.

Set PIM sparse mode with a static RP address of 10.20.2.1 on RA and RC.

Buy Now
Questions 5

Refer to the exhibit.

350-501 Question 5

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

350-501 Question 5

B)

350-501 Question 5

C)

350-501 Question 5

D)

350-501 Question 5

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 6

Refer to the exhibit.

350-501 Question 6

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

350-501 Question 6

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 7

Refer to the exhibit.

350-501 Question 7

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

Options:

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Buy Now
Questions 8

350-501 Question 8

Refer to the exhibit. The application server in the data center hosts voice, video, and data applications over the internet. The data applications run more slowly than the voice and video applications. To ensure that all applications run smoothly, the service provider decided to implement a QoS policy on router PER 2 to apply traffic shaping. Which two actions must an engineer take to implement the task? (Choose two.)

Options:

A.

Configure the scheduling function to handle delayed packets.

B.

Enable packet remarking for priority traffic.

C.

Configure a queue to buffer excess traffic.

D.

Set the token value for secondary traffic.

E.

Set a threshold to discard excess traffic.

Buy Now
Questions 9

350-501 Question 9

Refer to the exhibit. Over the last few months. ISP A has doubled Its user base. The IT Director asked the engineering team to monitor memory consumption and buffer statistics on all P and PE devices In the MPLS core. Most devices have CPU usage of 70% or more, so the solution must be targeted and secure. Which two commands must the engineering team implement on P and PE devices to meet these requirements? (Choose two.)

Options:

A.

snmp-server host 192.168.101.1 version 3 auth community1 memory

B.

snmp-server enable traps memory bufferpeak

C.

snmp-server host 192.168.101.1 version 2c community1 memory

D.

snmp-server host 192.168.101.1 version 1 community1 auth memory

E.

snmp-server enable snmp-traps community1 bufferpeak

Buy Now
Questions 10

350-501 Question 10

Refer to the exhibit. EIGRP is running between routers R5 and R1, and OSPF is used in the rest of the network. Users in a network attached to router R3 need to access a server connected to R5. Which task must the engineer perform so that only the users attached to R3 are able to access the server, but no other network is shared to OSPF?

Options:

A.

Configure redistribution using route maps to filter the routes that are shared

B.

Configure redistribution using an offset list to filter the routes that are shared.

C.

Configure an OSPF virtual link between R1 and R3 to route traffic between the two areas.

D.

Configure R1 as a stub router for EIGRP and OSPF so that only the default route is shared

Buy Now
Questions 11

Refer to the exhibit:

350-501 Question 11

A network administrator wants to enhance the security for SNMP for this configuration.

Which action can the network administrator implement?

Options:

A.

Re-configure to use SNMPv2 with MD5 authentication

B.

Add a community string to the existing entry

C.

Re-configure to use SNMPv3.

D.

Maintain the configuration but switch to an encrypted password for device access through SSH

Buy Now
Questions 12

Which programmable API allows the service provider to plan and optimize the automation of network operations and achieve closed-loop operations?

Options:

A.

Network Services Orchestrator

B.

WAN Automation Engine

C.

Evolved Programmable Network Manager

D.

Crosswork Network Automation

Buy Now
Questions 13

In an EVPN operation, how does the PE determine and advertise Ethernet segment reachability?

Options:

A.

The PE discovers the remote PEs in the EVI and builds a flood list linked with the EVI.

B.

The PE discovers and shared routing information for the B-MAC addresses associated with local Ethernet segments.

C.

The PE discovers other PEs in the same Ethernet segment and elects a DF.

D.

The PE discovers remote ESIs and determines their redundancy mode.

Buy Now
Questions 14

Drag and drop the NAT64 descriptions from the left onto the correct NAT64 types on the right.

350-501 Question 14

Options:

Buy Now
Questions 15

350-501 Question 15

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?

Options:

A.

Configure transport connection-mod© passive on R2.

B.

Configure neighbor 172.16.172.1 authentication on R1

C.

Configure neighbor update-source lo0 on R2

D.

Configure remote-as 16213 on R1.

Buy Now
Questions 16

Which technology enables the addition of new wavelengths in a fiber-optic network?

Options:

A.

IPoDWDM

B.

CWDM

C.

DWDM

D.

ROADM

Buy Now
Questions 17

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

Options:

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

Buy Now
Questions 18

Drag and drop the descriptions from the left onto the corresponding OS types on the right.

350-501 Question 18

Options:

Buy Now
Questions 19

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices'?

Options:

A.

It requires certificates for authentication.

B.

It is provided using NGINX acting as a proxy web server

C.

It is used for HTTP and HTTPS requests.

D.

It is not supported on Cisco devices

Buy Now
Questions 20

Which benefit is provided by FRR?

Options:

A.

It provides fast forwarding path failure detection times for all media.

B.

It provides rapid failure detection between forwarding engines.

C.

It provides performance data for the service provider network.

D.

It protects Cisco MPLS TE LSPs from link and node failures.

Buy Now
Questions 21

Refer to the exhibit.

350-501 Question 21

An engineer configured multicast routing on client's network. What is the effect of this multicast implementation?

Options:

A.

R2 floods information about R1 throughout the multicast domain.

B.

R2 is unable to share information because the ip pirn autorp listener command is missing.

C.

R1 floods information about R2 throughout the multicast domain.

D.

R2 is elected as the RP for this domain.

Buy Now
Questions 22

Refer to the exhibit.

350-501 Question 22

A network engineer is implementing an LDP-based MPLS solution to enable packet flow between the two bank sites The engineer was given two requirements

·LDP peering must stay up when there is a link failure between R3 and R6

·LDP peering must not flap when there is a link failure between R5 and R6

Which action meets these requirements?

Options:

A.

Enable Link LDP on R4 and R6

B.

Reset the LDP session between R4 and R6

C.

Configure LDP Session Protection on R4

D.

Implement an LDP targeted session with R4 on R6

Buy Now
Questions 23

350-501 Question 23

Refer to the exhibit. A service provider engineer Is configuring the connection between CE1 and CE2. AS 200 of the service provider and AS 100 of enterprise ABC should connect using BGP. The engineer already completed the configuration of VRF RT 100:10 of enterprise ABC. Which configuration must the engineer apply on PE1 to meet the requirement?

350-501 Question 23

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 24

Refer to the exhibit:

350-501 Question 24

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

Options:

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Buy Now
Questions 25

Refer to the exhibit.

350-501 Question 25

A network engineer is configuring customer edge routers to finalize a L2VPN over MPLS deployment Assume that the AToM L2VPN service that connects the two CEs is configured correctly on the service provider network Which action causes the solution to fail?

Options:

A.

A loopback with a /32 IP address has not been used

B.

OSPF does not work with L2VPN services

C.

The xconnect statement has not been defined

D.

The routing protocol network types are not compatible

Buy Now
Questions 26

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

350-501 Question 26

Options:

A.

Remove route filtering to speed repopulation of the link-state database

B.

Copy the router s existing state information and share the file with its peers to enable BGP soft resets

C.

Implement MPLS to forward packets while the RIB updates after a faliover.

D.

Implement Graceful Restart to mitigate the delay in MPLS LDP synchronization when the IGP starts up.

Buy Now
Questions 27

Refer to the exhibit.

350-501 Question 27

Router R1 is reporting that its BGP neighbor adjacency to router R2 is down, but its state is Active as shown. Which configuration must be applied to routers R1 and R2 to fix the problem?

A)

350-501 Question 27

B)

350-501 Question 27

C)

350-501 Question 27

D)

350-501 Question 27

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 28

What is the purpose of OSPF-TE extensions to MPLS traffic engineering functionality?

Options:

A.

carrying OSPF routing information for TE tunnels

B.

advertising the TE tunnel routes to the OSPF domain

C.

calculating and establishing TE tunnels in accordance with network constraints

D.

calculating fast reroute to provide a backup path for TE tunnels

Buy Now
Questions 29

350-501 Question 29

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLAN-based to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

Options:

A.

LSP lifetime maximum

B.

advertise-passive-only

C.

overload bit passive

D.

attached bit on ISIS instance

E.

passive-interface Loopback0

Buy Now
Questions 30

350-501 Question 30

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

Options:

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Buy Now
Questions 31

Refer to the exhibit.

350-501 Question 31

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

Options:

A.

350-501 Question 31 Option 1

B.

31

C.

31

D.

31

Buy Now
Questions 32

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

Options:

A.

bandwidth

B.

affinity

C.

explicit path

D.

SLRG

Buy Now
Questions 33

Refer to the exhibit.

350-501 Question 33

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

350-501 Question 33

B)

350-501 Question 33

C)

350-501 Question 33

D)

350-501 Question 33

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 34

350-501 Question 34

Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?

Options:

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

Buy Now
Questions 35

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

Options:

A.

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

B.

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

C.

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

D.

The link state database provides segmentation by area, which improves the path-selection process

Buy Now
Questions 36

350-501 Question 36

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

Options:

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Buy Now
Questions 37

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Buy Now
Questions 38

350-501 Question 38

Refer to the exhibit. Users on a LAN connected to router R5 frequently open high-traffic connections with servers connected to R1 and R4. Users on R2 also require access to the servers, but performance is not a major concern and their traffic can be treated as secondary. As traffic on all links grows, the network architect wants to mitigate the potential for congestion on the link between R2 and R4.

Which action must the engineering team take to improve performance on the R2-R4 link for users on R5 while still allowing other traffic to flow?

Options:

A.

Implement traffic policing on R2 to drop unnecessary traffic from secondary users when that traffic exceeds a given threshold.

B.

Implement traffic shaping on R2 to control transmission between R1 and R4 for traffic identified in a class map.

C.

Implement LLQ for the whole network with a strict policy to ensure that all traffic from the servers is sent to priority users without interruption.

D.

Implement FIFO on R1, R2, and R4 to queue traffic so that all traffic can pass with maximum efficiency.

Buy Now
Questions 39

350-501 Question 39

Refer to the exhibit. ISP A provides MPLS L3VPN service to customer A with BGP as the external routing protocol. Customer A has just opened a new branch office in London and requested the service provider to implement lossless service between its two offices. The LDP is enabled over the MPLS backbone and label exchange is working normally. Which action must the ISP engineering team take to enable the service?

Options:

A.

Configure LDP and redistribute the route from EIGRP.

B.

Configure BGP address family VPNv4.

C.

Configure IGP and redistribute the route from BGP.

D.

Configure IGP LDP synchronization

Buy Now
Questions 40

350-501 Question 40

Refer to the exhibit. A host connected to R3 must connect with a server on R1 that provides critical, time-sensitive data. Traffic between the host and server must always be given bandwidth to traverse the links when they are congested, with other traffic being dropped. How must the network engineer implement a QoS strategy with classification to ensure that the traffic is given the appropriate bandwidth?

Options:

A.

Implement FIFO to guarantee that the server traffic is sent first while other traffic is queued.

B.

Implement policing to rate-limit noncritical traffic that exceeds designated thresholds.

C.

Implement traffic shaping to delay noncritical traffic when the link is congested.

D.

Implement strict priority to guarantee bandwidth for the server traffic.

Buy Now
Questions 41

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

Options:

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Buy Now
Questions 42

350-501 Question 42

Refer to the exhibit. An engineer is scripting ACLs to handle traffic on the given network. The engineer must block users on the network between R1 and R2 from leaving the network through R5. but these users must still be able to access all resources within the administrative domain. How must the engineer implement the ACL configuration?

Options:

A.

Configure an ACL that permits traffic to any internal address, and apply it to the R5 interfaces to R3 and R4 in the egress direction

B.

Configure a permit any ACL on the R1 interface to R2 in the egress direction, and a deny any ACL on the interface in the ingress direction

C.

Configure an ACL that permits traffic to all internal networks and denies traffic to any external address, and apply it to the R2 interface to R1 in the ingress direction.

D.

Configure an ACL that denies traffic to any internal address and denies traffic to any external address, and apply it to the R5 interfaces to R3 and R4 in the ingress direction

Buy Now
Questions 43

SIMULATION 4

350-501 Question 43

350-501 Question 43

Options:

Buy Now
Questions 44

Which statement about Network Services Orchestrator (NSO) is true?

Options:

A.

It is used only in service provider environments

B.

It can be used only with XML coding

C.

It uses YANG modeling language to automate devices

D.

It must use SDN as an overlay for addressing

Buy Now
Questions 45

Under which circumstance does BGP ignore the best-path algorithm after receiving multiple routes to a destination?

Options:

A.

when the routes are synchronized

B.

when the route's first hop has a different AS number

C.

when the routes have local-preference values less than 100

D.

when the route's next hop is unreachable

Buy Now
Questions 46

What is a characteristic of MVPN?

Options:

A.

It bypasses the use of MPLS in the service provider core and transmits packets using IP only.

B.

It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP core.

C.

It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.

D.

It creates GRE tunnels to route multicast traffic over a service provider IP core.

Buy Now
Questions 47

350-501 Question 47

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

Options:

A.

It returns an AAA users with the last name CiscoTest.

B.

It creates a class map named aaauser with traffic tagged from AAA.

C.

It queries the local database to find a user named aaaUser.Json

D.

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Buy Now
Questions 48

Refer to the exhibit:

350-501 Question 48

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

350-501 Question 48

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Buy Now
Questions 49

Refer to the exhibit.

350-501 Question 49

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

Options:

A.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Buy Now
Questions 50

350-501 Question 50

Refer to the exhibit. A network operations team is implementing eBGP on the service provider network. Data traffic between routers R1 and R4 must use the R2-R3 link, which connects AS 65101 and AS65201. iBGP sessions with adjacent routers are up on 10.10.10.1 and 10.10.10.4. The team is now updating the configuration for eBGP peers on routers R2 and R3. Which action must be taken to meet the requirements?

Options:

A.

Add the soft-reconfiguration command.

B.

Add the ebgp-multihop command.

C.

Remove the update-source command.

D.

Remove the next-hop-self command.

Buy Now
Questions 51

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

Options:

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Buy Now
Questions 52

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services For which reason do you make this decision?

Options:

A.

It enables you to choose whether to separate or centralize each individual service.

B.

It is easier to manage a system in which services are mixed

C.

It requires only one edge router

D.

It enables EGP and IGP to operate independently

Buy Now
Questions 53

Refer to the exhibit:

350-501 Question 53

A network engineer is implementing a BGP protocol. Which effect of the local-as keyword in this configuration is true?

Options:

A.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 and the VPNv4 address family

B.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 without additional configuration

C.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 and the VPNv4 address family

D.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 without additional configuration.

Buy Now
Questions 54

Refer to the exhibit.

350-501 Question 54

What type of configuration is it?

Options:

A.

It is configuration that requires an explicit Cisco MPLS TE path to be configured for the tunnel to run.

B.

It is configuration that requires OSPF to also be running to have optimized Cisco MPLS TE tunnels.

C.

It is configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing.

D.

It is configuration that requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run.

Buy Now
Questions 55

350-501 Question 55

Refer to the exhibit. Customer C-101 in ASN 65123 requested that the ISP blackholes a host route 198.19.44.195, to which the customer is receiving a significant amount of malicious traffic. Which configuration must the network engineer implement on the trigger router TR-1 to fulfill the request without affecting other IP destinations in the customer's block?

Options:

A.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

B.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.195/32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

C.

configure terminal

ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

D.

Configure terminal

Buy Now
Questions 56

Refer to the exhibit:

350-501 Question 56

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Buy Now
Questions 57

Drag and drop the message types from the left onto the target field of the message originator on the right.

350-501 Question 57

Options:

Buy Now
Questions 58

Refer to the exhibit.

350-501 Question 58

An engineer at a new ISP must configure many Cisco devices in the data center. To make the process more efficient, the engineer decides to automate the task with a REST API. Which action does this JSON script automate?

Options:

A.

Configure the IP address for the existing loopback interface.

B.

Configure a physical interface on the router with an IP address and then create a loopback interface.

C.

Configure a physical interface on the router with an IP address.

D.

Delete the existing loopback Interface and replace it with a new loopback interface.

Buy Now
Questions 59

An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone that encapsulates Layer 2 and Layer 3 data Which action must the engineer perform on the routers to accomplish this task?

Options:

A.

Configure a EtherChannel for E-LAN.

B.

Configure a pseudowire for E-LINE.

C.

Configure Cisco MPLS TE for use with E-TREE.

D.

Configure QoS for MPLS and E-ACCESS

Buy Now
Questions 60

350-501 Question 60

Refer to the exhibit. The four PE routers in the network are connected and running OSPF to share routes. MPLS is enabled on the four routers. The routers are connected and configured to use /30 networks. A network engineer must implement Layer 3 VPN support for traffic between customer sites.

Which task must the engineer perform?

Options:

A.

Deploy IGP in the network to exchange intranet data between the PEs.

B.

Configure the devices to establish LDP neighbor relationships to share label information.

C.

Implement MPLS TE tunnels between each router to provide dedicated bandwidth for Layer 3 VPN traffic.

D.

Update the subnet between each router to a /24 prefix.

Buy Now
Questions 61

Which configuration enables BGP FlowSpec client function and installation of policies on all local interfaces?

A)

350-501 Question 61

B)

350-501 Question 61

C)

350-501 Question 61

D)

350-501 Question 61

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 62

350-501 Question 62

Refer to the exhibit. OSPF is running in the network, which is segmented into three areas. MPLS is enabled on all routers to support Layer 3 VPN. The network architect is concerned about potential packet loss when new OSPF adjacencies form. Which two tasks should the architect perform to implement MPLS LDP synchronization? (Choose two.)

Options:

A.

Enable MPLS functionality on all interfaces that are involved in MPLS.

B.

Configure OSPF to use the same router ID for each router that is involved in MPLS.

C.

Enable LDP sync under the OSPF process.

D.

Establish MPLS targeted sessions for connected LDP neighbors only.

E.

Establish a virtual link between the areas to support LDP sync between segments.

Buy Now
Questions 63

Which utility must be used to locate MPLS faults?

Options:

A.

QoS

B.

MPLS LSP ping

C.

MPLStraceroute

D.

EEM

Buy Now
Questions 64

350-501 Question 64

Refer to the exhibit. A large enterprise streams training videos from a server connected to R4 to hosts connected to R5. PIM-SM is configured in the network using IGMPv2, with R2 serving as the RP. OSPF is configured in the network to support IGP routing, and the network uses BGP to access the internet through R3. The network engineering team must migrate the network to SSM.

Which action must the team take to begin the migration?

Options:

A.

Enable the MDT address family in BGP.

B.

Change the PIM version from PIM-SM to PIM-DM.

C.

Upgrade IGMPv2 to IGMPv3.

D.

Update the device configurations so that R5 will serve as the RP.

Buy Now
Questions 65

350-501 Question 65

Refer to the exhibit. The NOC is configuring PE router R4 for BGP-originated traffic. R4 is connected to a CE device at a customer location. The customer requires:

    BGP peers must establish a neighborship with NSR and NSF capability.

    BGP must maintain state with the CE and provide continuous forwarding during ISSU and RP switchover events.

Which action meets the NSR requirement on PE routers?

Options:

A.

Set the BGP administrative distance to 15 for BGP neighbors.

B.

Set the BGP restart-time to 120 seconds.

C.

Set the BGP peering with ha-mode sso.

D.

Set the BGP stalepath-time to 360 seconds.

Buy Now
Questions 66

An engineer is implementing MPLS to monitor within the MPLS domain. Which must the engineer perform to prevent packets from being forwarded beyond the service provider domain when the LSP is down?

350-501 Question 66

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 67

350-501 Question 67

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

Options:

A.

Disable the MPLS LDP IGP sync holddown.

B.

Configure OSPF or IS-IS as the routing protocol.

C.

Configure EIGRP as the routing protocol using stub areas only.

D.

Enable MPLS LDP sync delay timers.

Buy Now
Questions 68

You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.

350-501 Question 68

If you apply this code to BGP filters, which effect does the code have on your router?

Options:

A.

denies routes from AS 7070

B.

allows routes from AS 7077

C.

denies routes from AS 7007

D.

allows routes from AS 770

Buy Now
Questions 69

Which additional configuration is required for NetFlow to provide traceback information?

Options:

A.

Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported.

B.

A classification ACL must be configured to identify which type of traffic will be analyzed.

C.

The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5.

D.

LLDP must be configured or the device will be unable to locate a NetFlow analyzer.

Buy Now
Questions 70

350-501 Question 70

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

Options:

A.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.

Configure the redistribute static and redistribute connected commands on R1.

Buy Now
Questions 71

350-501 Question 71

Refer to the exhibit. Company A is running OSPF within its network, comprised of routers R2, R3, R4, and R5 and consisting of two areas. Company A just acquired Company B, which uses EIGRP on its own R1. R1 has several routes in its routing table. The network engineering team at Company A needs access to the Company B network to manage network devices there, but each company will otherwise operate independently. R2 will serve as the ASBR between the two networks. Which action must the team take to reduce the number of EIGRP routes received on R2 and include only the necessary routes in the routing table?

Options:

A.

Apply an outbound distribute list on R3 and R4 to filter unnecessary intra-area routes from reaching the rest of the OSPF domain.

B.

Apply an inbound distribute list on R2 with a route map that permits only the necessary networks.

C.

Implement an offset list on R1 for the necessary networks.

D.

Attach an access list to the R2 interface connected to R1 that denies all traffic except for the necessary engineering team traffic.

Buy Now
Questions 72

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

350-501 Question 72

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Options:

Buy Now
Questions 73

Refer to the exhibit.

350-501 Question 73

Which type of DDoS attack will be mitigated by this configuration?

Options:

A.

SYN flood

B.

smurf attack

C.

SIP INVITE flood attacks

D.

teardrop attack

Buy Now
Questions 74

350-501 Question 74

Refer to the exhibit. MPLS is running in the network with OSPF as the IGP. Full routes are shared between the routers, and each connected link has an MPLS neighbor relationship. A network engineer must update the network configuration so that it will maintain LDP neighbor relationships if a directly connected link goes down. Which action must the engineer take as part of the process?

Options:

A.

Implement Unified MPLS to unify the OSPF areas.

B.

Implement MPLS OAM with BFD on the links.

C.

Implement LDP sync on links with a greater risk of faults.

D.

Implement LDP session protection on the network.

Buy Now
Questions 75

Which capability does the MPLS TE FRR facility backup protection method provide?

Options:

A.

defining the set of characteristics for the backup TE LSP

B.

leveraging label stacking to protect selected TE LSPs using a single backup TE LSP

C.

creating a bypass LSP for each protected LSP at each point of local repair

D.

assigning a backup TE LSP tunnel to the protected node at the headend of the protected TE LSP

Buy Now
Questions 76

Refer to the exhibit.

350-501 Question 76

A network operator working for a telecommunication company with an employee ID: 4350:47:853 must implement an IGP solution based on these requirements:

• Subnet 10.50.10.0 traffic must exit through the R1 router to connect with the Syslog server.

• Subnet 10.50.20.0 traffic must exit through the R2 router to connect with the NTP server.

• In case of link failure between R2 and R4, traffic must be routed via R1 and R3.

Which two configurations must be implemented on R5 to meet these requirements? (Choose two.)

Options:

A.

Apply a route policy to redistribute 10.50.0.0 prefixes in OSPF to ISIS and ISIS to OSPF.

B.

Apply a route policy to redistribute 10.50.20.0 from ISIS-L2 to OSPF Area 0 at a higher cost.

C.

Enable a route policy to advertise 10.50.20.0 in ISIS-L2 at a higher cost.

D.

Apply a route policy to redistribute 10.50.10.0 from OSPF Area 0 to ISIS-L2 at a lower cost.

E.

Enable a route policy to advertise 10.50.10.0 In OSPF Area 0 at a low cost.

Buy Now
Questions 77

350-501 Question 77

Refer to the exhibit. Company A has two offices that communicate via a service provider in AS 65516. CE1 and CE2 provide connections to the service provider from site 1 and site 2 respectively. Both customer sites use BGP as the PE-CE routing protocol. Which configuration must the engineer apply to ensure that traffic passes between the two sites?

Options:

A.

CE2(config)#router bgp 65514

CE2(config-router)#neighbor 192.168.1.1 as-override

B.

CE1(config)#router bgp 65514

CE1(config-router)#neighbor 192.168.1.2 allowas-in

C.

PE2(config)#router bgp 65516

PE2(config-router)#neighbor 192.168.1.1 next-hop-self

PE4(config)#router bgp 65516

PE4(config-router)#neighbor 192.168.2.1 next-hop-self

D.

CE1(config)#router bgp 65514

CE1(config-router)#neighbor 192.168.1.2 next-hop-self

CE2(config)#router bgp 65514

CE2(config-router)#neighbor 192.168.2.2 next-hop-self

Buy Now
Questions 78

350-501 Question 78

Refer to the exhibit. Router R13 is operating in Level 1 / Level 2 mode. A network engineer with an employee ID: 5209:82:636 must change the IS-IS cost of the route IP address 10.212.124.1 to 90. The metric update must be carried over in TLV 128. Which configuration must be implemented to complete the task?

Options:

A.

metric-style isis wide 90 under interface loopback1 on R13

B.

metric cost 90 under interface Gi1/1/1 on R12

C.

isis metric 80 under interface loopback1 on R13

D.

Isis metric 90 under interface Gi1/1/1 on R12

Buy Now
Questions 79

Which is the benefit of implementing model-driven telemetry in a service provider environment?

Options:

A.

It reduces the number of network monitoring tools that are necessary to verify device statistics.

B.

It increases the efficiency of SNMP by pulling system data to requesting servers.

C.

It reduces or eliminates the need to monitor Layer 2 traffic between switches.

D.

It uses reliable transport to push Information to network monitoring tools

Buy Now
Questions 80

A network architect plans to implement MPLS OAM to provide additional troubleshooting functionality for the NOC team. After analyzing the configuration on the MPLS P/PE nodes, the architect decides to revise the CoPP policies. Which two actions ensure that the new solution is secure? (Choose two.)

Options:

A.

Allow port 3505 in the outbound direction only.

B.

Allow the ICMP protocol only.

C.

Allow the TCP and UDP protocols.

D.

Allow the UDP protocol only.

E.

Allow port 3503 in the inbound direction only.

Buy Now
Questions 81

What is a feature of model-driven telemetry?

Options:

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

Buy Now
Questions 82

Refer to the exhibit.

350-501 Question 82

While troubleshooting a connectivity issue on router R2, a network engineer with an employee id:3876.13.497 notices that although it detects three OSPF links from R1, the OSPF prefixes are missing from the routing table. What is the reason for the problem?

Options:

A.

The serial interfaces have different MTUs

B.

Both loopback interfaces on R1 are configured as stub

C.

The R2 Serial 1/0 interface is configured with an IP address, but the R1 Serial R1 Serial 1/0 interface in unnumbered.

D.

The subnet masks on the serial interfaces are mismatched.

Buy Now
Questions 83

You are configuring MPLS traffic-engineering tunnels in the core.

Which two ways exist for the tunnel path across the core? (Choose two )

Options:

A.

Tunnel links inherit IGP metrics by default unless overridden

B.

Tunnels can be configured with dynamic path or explicitly defined path

C.

A zero bandwidth tunnel is not a valid option

D.

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

Buy Now
Questions 84

Refer to the exhibit:

350-501 Question 84

Which statement describes this configuration?

Options:

A.

Router 1 has its running configuration locked so changes can be made only when the administrator issues a kill session

B.

Router 1 can be remotely managed by the CLI using Telnet

C.

Router 1 has a new data store to collect SNMP information, but configuration must still be done at the CLI only

D.

Router 1 has a temporary data store where a copy of the running configuration can be manipulated and verified before committing the configuration

Buy Now
Questions 85

Simulation1

350-501 Question 85

350-501 Question 85

350-501 Question 85

Options:

Buy Now
Questions 86

Refer to the exhibit.

350-501 Question 86

An engineer is reviewing the BGP configuration. Which routes must be advertised to 10.10.10.1

Options:

A.

Local routes are permitted, and routes from other ASNs are denied.

B.

All routes whether local or from other ASNs are denied.

C.

Local routes are denied, and routes from other ASNs are permitted.

D.

All routes whether local or from other ASNs are permitted.

Buy Now
Questions 87

Refer to the exhibit:

350-501 Question 87

If router RA is configured as shown, which IPv4 multicast address space does it use?

Options:

A.

224.0. 0.0/8

B.

225.0. 0.0/8

C.

232.0. 0.0/8

D.

239.0. 0.0/8

Buy Now
Questions 88

What is a feature of mVPN?

Options:

A.

It requires-uncast to be disabled on the multicast domain

B.

It establishes multiple static MDTs for each multicast domain.

C.

It provides the ability to support multicast over a Layer 3 VPN.

D.

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Buy Now
Questions 89

An ISP Is Implementing end-to-end fault monitoring for a customer based on the IEEE 802.3ah standard. The solution must detect when 15 or more corrupted Ethernet packets arrive within 10 ms and stop propagating traffic through the ISP backbone network or to the customer side. Which configuration must the ISP engineer apply?

Options:

A.

ethernet oam link-monitoring enable

ethernet oam link-monitor crc-errors ingress time-window 10

ethernet oam link-monitor crc-errors ingress threshold high 15 ethernet oam link-monitor crc-errors egress time-window 10 ethernet oam link-monitor crc-errors egress threshold high 15 ethernet oam link-monitor high-threshold action shutdown-interface

B.

ethernet oam link-monitoring

ethernet oam link-monitor receive-crc window 15

ethernet oam link-monitor receive-crc threshold high 10

ethernet oam link-monitor high-threshold action disable-interface

C.

ethernet oam

ethernet oam link-monitor receive-crc window 10

ethernet oam link-monitor receive-crc threshold high 15

ethernet oam link-monitor transmit-crc window 10

ethernet oam link-monitor transmit-crc threshold high 15

ethernet oam link-monitor high-threshold action errordisable-interface

D.

ethernet oam link-monitoring global enable

ethernet oam link-monitor receive crc-errors period 15

ethernet oam link-monitor receive crc-errors limit 15

ethernet oam link-monitor transmit crc-errors period 10

ethernet oam link-monitor transmit crc-errors limit 15

ethernet oam link-monitor limit action error-disable interface

Buy Now
Questions 90

Company A is implementing VoIP services across the company. The network architect designed a QoS policy to allow only specific IP subnets and mark the signaling flow with DSCP 36. The solution should be as secure as possible. Phones receive their IP addresses from the 172.184.12.0/24 pool and are assigned by the RADIUS server to VLAN 1021. Skinny Client Control Protocol is used as a signaling protocol in the network. For security reasons, switchport port-security maximum 1 vlan voice has been preconfigured on the switch side. Which two tasks must an engineer perform on SW_1 to achieve this goal? (Choose two.)

Options:

A.

Implement a class map with the set dscp af42 command.

B.

Implement a class map with the set dscp af43 command.

C.

Implement an ACL with the set dscp af41 command.

D.

Implement an ACL with the permit udp 172.184.12.0 0.0.0.255 any range 2000 2002 command.

E.

Implement an ACL with the permit tcp 10.124.121.0 0.0.0.255 range 16384 32767 command.

Buy Now
Questions 91

Drag and drop the OSPF area types from the left onto the correct statements on the right

350-501 Question 91

Options:

Buy Now
Questions 92

350-501 Question 92

Refer to the exhibit. A network engineer is implementing multicast services on CPE-1 and CPE-2. CPE-1 must be configured as the preferred IGMP querier for the LAN segment. PIM-SM must be implemented on the LAN interfaces with an IGMP version that supports (*, G) joins only. Which configurations must the engineer implement on CPE-1 and CPE-2?

Options:

A.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

B.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255. 128

ip pim sparse-mode

ip igmp version 3

C.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

D.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

Buy Now
Questions 93

What must a network engineer consider when designing a Cisco MPLS TE solution with OSPF?

Options:

A.

The OSPF extensions and RSVP-TE must be enabled on all routers in the network.

B.

OSPF extensions for RSVP-TE are supported in Area 1.

C.

The OSPF extensions and RSVP-TE must be enabled on the egress routers.

D.

OSPF extensions for RSVP-TE are implemented in Type 6, 7, and 8 LSAs.

Buy Now
Questions 94

350-501 Question 94

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

    Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.

    Other SNMP managers must not have access to objects.

    SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

350-501 Question 94

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 95

Refer to the exhibit:

350-501 Question 95

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Buy Now
Questions 96

350-501 Question 96

Refer to the exhibit. An engineer must Implement a traceroute operation to verity the R1 point-to-multipoint LSP connections. The traceroute operation must return all labels and hop-by-hop IP addresses for destinations 10.20.0.1. 10.30.0.1, and 10.40.0.1. and the maximum number of hops is 4. Which command must be executed to meet the requirements?

Options:

A.

traceroute mpls traffic-eng tunnel-mte 10 ttl 4

B.

traceroute mpls traffic-eng tunnel-mte 10 responder-id 10.40.0.1

C.

traceroute mpls ipv4 10.30.0.1/32 fee-type generic

D.

traceroute mpls ipv4 10.20.0.1/32 ttl 4

Buy Now
Questions 97

How does SR policy operate in Segment Routing Traffic Engineering?

Options:

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Buy Now
Questions 98

Refer to the exhibit.

350-501 Question 98

An engineer is trying to implement BGP configuration on a router Which configuration error prevents the ASBR from establishing a BGP neighborship to a directly connected BGP speaker?

Options:

A.

The routing policy is absent for this Cisco IOS XR eBGP instance.

B.

The IPv4 address family configuration under neighbor configuration-mode must be removed.

C.

The VPNv4 address family interferes with the 8GP IPv4 address family negotiations.

D.

The TCP session parameters are not specified.

Buy Now
Questions 99

A mid-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company's two sites across the service provider core. To meet service requirements, the service provider must extend the Layer 2 domain between the company's two locations.

Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

Options:

A.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

B.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag push dot1q 21 symmetric

C.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag pop 13

D.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag translate 1-to-1 dot1q 2

Buy Now
Questions 100

350-501 Question 100

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements:

Session protection is provided for core loopback IP addresses only.

The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails.

Which configuration must the team implement on PE-XR1?

Options:

A.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

B.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

C.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

D.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

Buy Now
Questions 101

What Is the primary role of Ansible In a network?

Options:

A.

It is used as a debugging tool for connectivity issues between the DMZ and an enterprise intranet.

B.

It Is used to diagnose Layer 11ssues In data centers that span more than one city block.

C.

It is used to deploy IPv6 configuration is networks That are dual slack.

D.

It is used as a network automation provisioning and configuration tool.

Buy Now
Questions 102

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

350-501 Question 102

B)

350-501 Question 102

C)

350-501 Question 102

D)

350-501 Question 102

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 103

Which additional feature does MPLS DiffServ tunneling support?

Options:

A.

matching EXP and DSCP values

B.

interaction between MPLS and IGP

C.

using GRE tunnels to hide markings

D.

PHB layer management

Buy Now
Questions 104

After troubleshooting multiple outages on the network due to repeated configuration errors, the network architect asked an engineer to enable NETCONF to facilitate future configurations. The configuration must enable syslog messaging to record NETCONF notifications from each of the numerous devices on the network. Which configuration must the engineer apply?

Options:

A.

username cisco test taker privilege 15 password 0 cisco test

aaa new-model

aaa authorization exec default local

snmp-server community cisco test RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history warnings

B.

username cisco test taker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco

logging history critical

C.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history debugging

D.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history informational

Buy Now
Questions 105

350-501 Question 105

350-501 Question 105

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

350-501 Question 105

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 106

350-501 Question 106

Refer to the exhibit. A network engineer is implementing BGP in AS 65101 and AS 65201. R3 sends data traffic to 192.168.1.1 /32 via the path R3-R2-R1. The traffic must travel via alternate path R6-R5 for prefix 192.168.1.1/32. Which action must be taken to meet the requirement?

Options:

A.

Apply route-map HIGH-MED out on R2 for neighbor R3.

B.

Apply route-map HIGH-LP in on R3 for neighbor R6

C.

Apply route-map LOW-LP out on R2 for neighbor R3.

D.

Apply route-map LOW-MED in on R5 for neighbor R2

Buy Now
Questions 107

How does TI-LFA reduce packet loss in Segment routing?

Options:

A.

It determines which link to use when load balancing to prevent packet fragmentation loss.

B.

It establishes multiple labels per path using more than one IGP.

C.

It calculates loop-free backup paths that are rapidly implemented in case of a link failure.

D.

It enables path selection in SR-TE to support MPLS label allocation.

Buy Now
Questions 108

350-501 Question 108

Refer to the exhibit. The company is running IS-IS in its core. A network engineer must segment the network into two areas to isolate departments. However, some networks must be shared from area 2 to area 1, so the engineer has decided to implement route filtering between devices.

Which action must the engineer take so that the correct networks are shared between IS-IS areas?

Options:

A.

Apply an ACL on RE to deny unnecessary routes from exiting the interface toward RD.

B.

Implement a route map and attach it to a distribute list on RD to filter inbound routes from RE.

C.

Set a unique area ID on each router to fully segment the network.

D.

Implement route-tagging on RB and RD to identify and allow only the routes that should be shared from area 2.

Buy Now
Questions 109

A customer site is being connected to a Frame Relay network via a T1 link. The customer has a contract for 512 kbps service with a Tc value of 125 ms. Under peak line conditions, customer traffic can reach four times the contracted speed. Which QoS configuration must the service provider implement to limit the customer to the contracted values?

350-501 Question 109

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 110

Refer to the exhibit.

350-501 Question 110

An engineer is implementing BGP selective prefix suppression. The router must advertise only 10.16.4.0/24,10.16.5.0/24. and summarized route 10.16.0.0/21. and suppress 10.16.6.0/24. Which configuration must the engineer apply to the router?

A)

350-501 Question 110

B)

350-501 Question 110

C)

350-501 Question 110

D)

350-501 Question 110

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 111

Refer to the exhibit:

350-501 Question 111

What is the URL used for with REST API?

Options:

A.

It is used to contact a URL filter to determine the efficacy of a web address

B.

It is used to send a TACACS+ authentication request to a server

C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

D.

It is used to initiate an FTP session to save a running configuration of a device.

Buy Now
Questions 112

350-501 Question 112

Refer to the exhibit. A network engineer installed router R1 as the new core router and must secure the control plane. The configuration has been applied, and now the engineer is creating ACL 120. Only hosts 192.168.1.1 and 192.168.2.2 should be allowed to access the router using Telnet. All other hosts should be rate-limited, with excess traffic dropped. Which configuration accomplishes this goal?

Options:

A.

access-list 120 deny tcp any any eq telnet

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.1.2 any eq telnet

B.

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

access-list 120 permit tcp any any eq telnet

C.

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.2.2 any eq telnet

access-list 120 deny tcp any any eq telnet

D.

access-list 120 permit tcp any any eq telnet

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

Buy Now
Questions 113

Refer to the exhibit.

350-501 Question 113

What does the number 2 mean in the configuration?

Options:

A.

It dictates the number of sessions that will be open with the SNMP manager

B.

It represents the version of SNMP running.

C.

It indicates two SNMP managers are able to read and write with the agent using community string ciscotest.

D.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent.

Buy Now
Questions 114

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?

350-501 Question 114

350-501 Question 114

350-501 Question 114

350-501 Question 114

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 115

350-501 Question 115

Refer to the exhibit. ISP_A is about to launch a new internet service. ISP_A is already providing MPLS VPN Layer 3 services to Customer_A and Customer_B, which are connected to ISP_A via OSPF. A network engineer completed the BGP and VRF configurations on R2 to support the new internet service. Which additional action completed the launch?

Options:

A.

Implement the BGP routing protocol in the customer VRFs on R1 and R2

B.

Import route-target 62:101 into the customer VRFs on R1 and R3.

C.

Enable the route-replicate command under the customer VRFs on R1 and R2

D.

Activate NAT CE in the customer VRFs on R1. R2. and R3.

Buy Now
Questions 116

Refer to the exhibit:

350-501 Question 116

Which information is provided for traceback analysis when this configuration is applied?

Options:

A.

BGP version

B.

packet size distribution

C.

source interface

D.

IP sub flow cache

Buy Now
Questions 117

350-501 Question 117

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

Options:

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Buy Now
Questions 118

The network team is planning to implement IPv6 on the company’s existing IPv4 network infrastructure. The network currently uses IS-IS to share routes between peers. Which task must the team perform so that IS-IS will run in multitopology mode on the updated IPv6 network?

Options:

A.

Configure the links between the network routers as point-to-point.

B.

Configure the network routers to use metric-style wide.

C.

Configure the network routers as Level 2 routers.

D.

Configure the IS-IS IPv6 metric on the dual-stack links.

Buy Now
Questions 119

Which OS uses a distributed subsystem architecture?

Options:

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Buy Now
Questions 120

After implement MPLS protocol for multiple VRFs on a single Cisco device, the engineer notices all VRFs on the router still do to not LDP session protection feature enabled. Which configuration must the engineer apply to enable the LDP session protection feature FOR LDP neighbors within each VRF?

Options:

A.

Configure LDP session protection globally on the device only.

B.

Configure LDP session protection globally on the device and on each neighbor that requires session protection.

C.

Configure LDP session authentication on the device to enable LDP session protection on each VRF automatically.

D.

Configure LDP session protection within the individual VRFs.

Buy Now
Questions 121

Refer to the exhibit.

350-501 Question 121

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

350-501 Question 121

B)

350-501 Question 121

C)

350-501 Question 121

D)

350-501 Question 121

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 122

Which statement describes the advantage of a Multi-Layer control plane?

Options:

A.

It automatically provisions monitors, and manages traffic across Layer 0 to Layer 3

B.

It minimizes human error configuring converged networks

C.

It supports dynamic wavelength restoration in Layer 0

D.

It provides multivendor configuration capabilities for Layer 3 to Layer 1

Buy Now
Questions 123

350-501 Question 123

Refer to the exhibit. A global company plans to implement BGP at its newest location to provide connectivity to other offices. The global infrastructure of the company is a multivendor environment. An engineer must review the BGP core configurations at headquarters to determine if they can be repurposed at the new location. The engineer copied this JSON script for review. What is the effect of the script?

Options:

A.

It configures BGP with neighbor 192.168.1.2 residing in AS 65514.

B.

It sets the BGP router-ID to 192.168.1.2 and sets the AS of the router to 65514.

C.

It configures BGP on the device and inserts 192.168.1.0/24 into the BGP table using the origin AS 65514.

D.

It configures a VRF named cisconode1 and a BGP instance using the VPNv4 address family.

Buy Now
Questions 124

350-501 Question 124

Refer to the exhibit. A network engineer with an employee ID 4379:43:595 is setting up an IS-IS network with these requirements:

    Routes with a tag of 80 and IP prefixes other than 192.168.10.20/24 must be redistributed from Level 1 into Level 2.

    Route leaking must be configured from Level 2 into the Level 1 domain for routes that are tagged with only 50 or 40.

Which configuration must be implemented on RB to meet the requirements?

Options:

A.

Add match tag 80 in route-map Ieak2-1

B.

DUMPS Add match ip address 152 in route-map redist1-2

C.

Remove match tag 40 from route-map Ieak2-1

D.

Change match tag 80 to match tag 50 in route-map redist1-2.

Buy Now
Questions 125

350-501 Question 125

Refer to the exhibit. A large organization is merging the network assets of a recently acquired competitor with one of its own satellite offices in the same geographic area. The newly acquired network is running different routing protocol than the company's primary network. As part of the merger a network engineer implemented this route map Which task must the engineer perform to complete the Implementation?

Options:

A.

Attach the route map to an IS-IS network statement to advertise the routes learned on this interface to IS-IS

B.

Enable metric style wide to allow the use of extended metrics from the protocols

C.

Attach the route map to the redistribution command to manipulate the routes as they are shared

D.

Configure an additional route map sequence to override the implicit deny at the end of the route map

Buy Now
Questions 126

350-501 Question 126

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service provider core network with these requirements:

R1 must establish LDP peering with the loopback IP address as its Router-ID.

Session protection must be enabled on R2.

How must the team update the network configuration to successfully enable LDP peering between R1 and R2?

Options:

A.

Change the LDP password on R2 to Cisco.

B.

Configure mpls ldp router-id loopback0 on R1 and R2.

C.

Configure LDP session protection on R1.

D.

Change the discover hello hold time and interval to their default values.

Buy Now
Questions 127

An engineer implemented LDP protocol on the ISP network. The engineer must ensure that there are no packet loss issues when IGP and LDP protocols are not synchronized. Which configuring must the engineer implement so that the IGP routing protocol will wait until LDP convergence is completed?

Options:

A.

Disable IP CEF routers running LDP and enable LDP protocol.

B.

Configure MPLS LDP IGP synchronization on the network.

C.

Configure LDP sessions protection on the network.

D.

Disable MPLS LDP IGP synchronization on the network.

Buy Now
Questions 128

What do Ansible and Salt Stack have in common?

Options:

A.

They both use DSL configuration language

B.

They both use YAML configuration language

C.

They both have agents running on the client machine

D.

They both can be designed with more than one master server

Buy Now
Questions 129

Refer to the exhibit:

350-501 Question 129

What does the REST API command do?

Options:

A.

It retrieves the information requested by Descriptions xml

B.

It removes the information identified by Descriptions xml

C.

It executes the commands specified in Descriptions xml

D.

It displays the information identified by Descriptions xml

Buy Now
Questions 130

Refer to the exhibit.

350-501 Question 130

A network administrator implemented MPLS LDP changes on PE-A LSR device. The engineer must ensure there are no LDP peer are fully operational. Which LDP feature must the engineer apply to the existing configuration to eliminate the problem?

Options:

A.

Configure MPLS LDP IGP synchronization on the network.

B.

Configure MPLS LDP NSR for all LDP sessions.

C.

Enable LDP session protection under the routing protocol.

D.

Disable IP CEF on routers running LDP and enable LDP.

Buy Now
Questions 131

Drag and drop the LDP features from the left onto the correct usages on the right.

350-501 Question 131

Options:

Buy Now
Questions 132

Refer to the exhibit.

350-501 Question 132

While troubleshooting the OSPF adjacency between routers R1 and R2 an engineer noticed that both routers are stuck in the EXCHANGE/EXSTART state. What should the engineer fix to solve the ongoing issue?

Options:

A.

match IPv4 addresses

B.

match OSPF areas

C.

match OSPF network types

D.

match MTU values

Buy Now
Questions 133

Refer the exhibit.

350-501 Question 133

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

Options:

A.

first-in, first-out

B.

traffic shaping

C.

class-based weighted fair queueing

D.

traffic policing

Buy Now
Questions 134

Refer to the exhibit: 350-501 Question 134

BGPsec is implemented on R1. R2. R3. and R4 BGP peering is established between neighboring autonomous systems Which statement about implementation is true?

Options:

A.

BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator

B.

BGP updates from the iBGP peers are appended with a community of local-as

C.

BGP updates from the all BGP peers are appended with a community of no export

D.

BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature

Buy Now
Questions 135

What is the purpose of RSVP tear messages?

Options:

A.

to notify the tail-end router of resource unavailability on the transit router

B.

to inform the headend router of LSP issues

C.

to reuse router resources for other reservation requests

D.

to confirm successful end-to-end resource allocation

Buy Now
Questions 136

Refer to the exhibit.

350-501 Question 136

Which show command shows statistics for the control plane policy and is used to troubleshoot?

Options:

A.

show control-plane CoPP

B.

show control-plane

C.

show policy-map control-plane

D.

show policy control-plane

Buy Now
Questions 137

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

Options:

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Buy Now
Questions 138

What happens when a segment-routing TE tunnel loses the link and there is no secondary path in place?

Options:

A.

The headend router generates a new path to the tail-end router using bandwidth to determine the best path.

B.

The tail-end router sends an alert to the syslog server that the tunnel and the secondary route are inaccessible.

C.

The headend router starts the invalidation timer to bring the tunnel down.

D.

The headend and tail-end routers revalidate SID hops to determine the proper label stack to reroute the traffic.

Buy Now
Questions 139

A network engineer is configuring RIP as the routing protocol between multiple PEs and CEs. The engineer must avoid advertising the same routes back to their sources. Which action should be performed on the routers to accomplish this task?

Options:

A.

Configure a different route distinguisher for each prefix.

B.

Define the site of origin on each interface.

C.

Define VRFs on each device to separate the traffic.

D.

Enable bidirectional forwarding detection on each device.

Buy Now
Questions 140

How much must the MTU be increased when configuring the 802.1q VLAN tag?

Options:

A.

2 bytes

B.

4 bytes

C.

8 bytes

D.

12 bytes

Buy Now
Questions 141

350-501 Question 141

Refer to the exhibit. A growing company wants to ensure high availability and redundancy for its critical web servers, which are located in an offsite data center. The network architect decided to implement BGP so that the network can use redundant paths for outbound traffic toward the destination subnet 10.2.2.0/24. A network engineer already configured basic BGP settings on edge router R1, which is a Cisco ASR-1001X router. The engineer also confirmed loopback reachability to routers R2 and R3, and the AS path length toward the destination is the same via R2 and R3. Which action must the engineer take on R1 to complete the implementation?

Options:

A.

Implement as-path multipath under the BGP neighbor configuration.

B.

Implement maximum-paths ibgp 2 under the BGP neighbor configuration.

C.

Implement maximum-paths 2 under the BGP global configuration.

D.

Implement bestpath as-path multipath-relax under the BGP global configuration.

Buy Now
Questions 142

How does TACACS+ facilitate secure connections for user access to network routers?

Options:

A.

The user's end device uses CHAP to securely query the network access server to authenticate the user via the TACACS+ protocol.

B.

The network access server communicates securely with a TACACS+ daemon to authenticate the user.

C.

The user provides a password over a secure connection to the TACACS+ server for authorization.

D.

The network access server communicates securely with the router via the TACACS+ protocol to authorize Telnet access by the user to specific parts of a router.

Buy Now
Questions 143

Refer to the exhibits:

350-501 Question 143

R1 and R2 are directly connected and IS-IS routing has been enabled between R1 and R2 R1 message periodically Based on this output, which statement is true?

Options:

A.

IS-IS neighbor authentication is failing for Level 2 first and then for Level 1 PDUs

B.

1S-1S neighbor authentication is failing for Level 1 and Level 2 PDUs .

C.

IS-IS neighbor authentication is failing for Level 1 PDUs only

D.

IS-IS neighbor authentication is failing for Level 2 PDUs only.

Buy Now
Questions 144

Exhibit:

350-501 Question 144

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

Options:

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Buy Now
Questions 145

350-501 Question 145

Refer to the exhibit. Company A is connected to multiple upstream ISPs, with ISP_A serving as the primary upstream ISP. The company A subnet 172.43.232.0 should be announced to the secondary ISP_B only when the FTP server with IP address 10.10.1.1 is not accessible via the primary ISP. Which configuration must be applied on R1?

Options:

A.

neighbor 10.182.213.2 Condition-map Non-RIB prefix-map Advertise-route

B.

neighbor 10.182.213.3 prefix-map Non-RIB Condition-map Advertise-route

C.

neighbor 10.182.213.3 advertise-map Advertise-route non-exist-map Non-RIB

D.

neighbor 10.182.213.3 advertise-map Advertise-route exist-map Non-RIB

Buy Now
Questions 146

350-501 Question 146

Refer to the exhibit. Users on a LAN that is connected to RD communicate to multiple servers on the corporate network. Initially, the servers were located on the same LAN. However, after congestion was reported, the engineering team decided to relocate the servers to two different networks.

Which task should the team perform to improve performance on the overall network while still allowing traffic to flow between the different hosts?

Options:

A.

Identify the traffic to each server in a prefix list and apply a traffic policing policy.

B.

Identify the traffic to each server with an ACL and apply the ACL to a threshold policy that drops excessive traffic.

C.

Identify the traffic to each server in a distribute list and implement FIFO to the interfaces in the egress direction.

D.

Identify the traffic to each server with a class map and apply it to a traffic-shaping policy.

Buy Now
Questions 147

350-501 Question 147

Refer to the exhibit. A network engineer must deny access from spoofed addresses to the LAN. The edge router currently has two active BGP sessions established with Tier 1 ISP_A. Due to asymmetric routing, no ACL is configured on either interface. Which two configurations must the engineer perform on the edge router to complete the task? (Choose two.)

Options:

A.

ip verify unicast source reachable-via tx under FA0/0

B.

ip verify unicast source reachable-via under FA0/1

C.

ip verify unicast source reachable-via any under FA0/1

D.

ip verify unicast source reachable-via both under FA0/0

E.

ip verify unicast source reachable-via any under FA0/0

Buy Now
Questions 148

Refer to the exhibit.

350-501 Question 148

A network engineer notices that router R2 is failing to install network 172.16.33.1/32 in the routing table. Which configuration must the engineer apply to R2 to fix the problem?

Options:

A.

R2(config)# access-Iist 1 permit 172.16.33.0 255.0.0.0

B.

R2(config)# access-list 1 permit 172,16,33.0 255,255,255,0

C.

R2(config)# access-list 1 permit 172.16.33.0 0.0.0.255

D.

R2(config)# access-list 1 permit 172,16,33.0 255.255,0,0

Buy Now
Questions 149

350-501 Question 149

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

Options:

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Buy Now
Questions 150

Egress PE NAT is being used via a single centralized router to provide Internet access to L3VPN customers.

Which description of the NAT operation is true?

Options:

A.

Users m different VRFs cannot share the same outside global IP address

B.

The NAT table contains a field to identify the inside VRF of a translation

C.

Multiple address pools are needed for the same L3VPN because each site has a separate NAT

D.

The different L3VPNs using the Internet access must not have IP overlaps internally

Buy Now
Questions 151

350-501 Question 151

Refer to the exhibit. R1 has two upstream Tier 1 service providers. BGP is in use as the exterior routing protocol, and ISP_A and ISP_B are sending the full BGP table. A network engineer must assign local-preference 70 to all routes with multiple exit discriminator 30. Which configuration must the network engineer apply?

350-501 Question 151

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 152

When configuring traffic engineering tunnels in Cisco MPLS core network, you see the traffic is not taking the expected path in the core.

Which command do you use to quickly check path of a TE tunnel?

Options:

A.

Traceroute mpls ipv4 -tunnel destination

B.

Ping

C.

show mpls traffic-engineering tunnels

D.

traceroute

Buy Now
Questions 153

Drag and drop the functionalities from the left onto the correct target fields on the right.

350-501 Question 153

Options:

Buy Now
Questions 154

350-501 Question 154

Refer to the exhibit. A large enterprise is migrating its network to use MPLS VPNs between different business divisions. Within the core, routes are shared between the routers using OSPF, and each connected link maintains an MPLS neighbor relationship.

Which action must the migration team take so that LDP neighbor relationships are maintained if a directly-connected link goes down?

Options:

A.

Implement targeted LDP sessions between directly connected routers and between routers that are one hop away.

B.

Implement LDP session protection between each directly connected LDP neighbor.

C.

Implement LDP sync between routers that are directly connected to each business division.

D.

Implement targeted LDP sessions between routers that are directly connected to each business division.

Buy Now
Questions 155

What is a characteristic of the YANG model?

Options:

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Buy Now
Questions 156

An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?

Options:

A.

vrf upgrade-cli

B.

bgp upgrade-cli

C.

address-family ipv4

D.

ip bgp-community new-format

Buy Now
Questions 157

Why do packet loops occur during the configuration of BlDlR-PIM?

Options:

A.

The network does not support BIDIR-PIM

B.

The network is partially upgraded to support BIDlR-PIM

C.

No interface for carrying traffic for multicast groups has been configured

D.

The router has not been configured to advertise itself

Buy Now
Questions 158

Refer to the exhibit.

350-501 Question 158

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

350-501 Question 158

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 159

350-501 Question 159350-501 Question 159

Refer to the exhbit. ISP A has a BGP peering with ISP C with the maximum-prefix 150 configuration on R1. After a recent security breach on the ISP A network, a network engineer has been asked to enable a lightweight security mechanism to protect the R1 CPU and BGP membership from spoofing attacks. Which solution must ISP A implement?

Options:

A.

Configure bgp maxas-limit 1 in the IPv4 address family urateUhe global BGP configuration.

B.

Configure neighbor 10.163.83.54 enable-connected-check under the BGP IPv4 address family.

C.

Configure neighbor 10.163.83.55 password Cisco under the global BGP IPv4 address family.

D.

Configure neighbor 10.163.83.55 ttl-stcurity hops 2 under the global BGP configuration.

Buy Now
Questions 160

Which condition must be met for TI-LFA to protect LDP traffic?

Options:

A.

For single-segment protection, the PQ node must be LDP and SR-capable.

B.

The protected destination must have an associated LDP label and prefix-SID.

C.

The point of local repair must be LDP-capable.

D.

For double-segment protection, the P and Q nodes must be SR-capable.

Buy Now
Questions 161

Which type of attack is an application attack?

Options:

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Buy Now
Questions 162

350-501 Question 162

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

350-501 Question 162

Tasks

-

R1 and R2 are having issues forming an eBGP neighbor relationship. Troubleshoot and resolve the issue to achieve these goals:

1. Configure R1 and R2 to form a BGP neighborship using their Loopback interfaces.

2. Form the neighbor relationship using a BGP multihop mechanism. Use minimal values to solve the issue.

Options:

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
Last Update: Dec 26, 2025
Questions: 547

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 350-501 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 350-501 pdf