Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Questions 4

Drag and drop the LDP features from the left onto the correct usages on the right.

350-501 Question 4

Options:

Buy Now
Questions 5

Refer to the exhibit:

350-501 Question 5

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

Options:

A.

LDP needs to be enabled on the R2 physical interface

B.

R2 does not see any hellos from R1

C.

LDP needs to be enabled on the R2 loopback interface

D.

R2 sees the wrong type of hellos from R1

Buy Now
Questions 6

Which configuration mode do you use to apply the mpls Idp graceful-restart command in IOS XE Software? MPLS

Options:

A.

MPLS

B.

LDP neighbor

C.

global

D.

interface

Buy Now
Questions 7

Drag and drop the NAT64 descriptions from the left onto the correct NAT64 types on the right.

350-501 Question 7

Options:

Buy Now
Questions 8

350-501 Question 8

Refer to the exhibit. Which part of the diagram will host OpenStack components?

Options:

A.

Aggregation

B.

UCS Series

C.

Access

D.

Core

Buy Now
Questions 9

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

350-501 Question 9

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Options:

Buy Now
Questions 10

Refer to the exhibit:

350-501 Question 10

What is significant about the number 2 in the configuration?

Options:

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Buy Now
Questions 11

350-501 Question 11

Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?

Options:

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

Buy Now
Questions 12

Refer to the exhibit:

350-501 Question 12

Which statement supports QPPB implementation?

Options:

A.

QoS policies are identified in the MPLS forwarding table

B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

C.

QoS policies use BGP to gain full coverage on the network.

D.

QPPB policies affect only egress traffic

Buy Now
Questions 13

Drag and drop the characteristics from the left onto the automation tool on the right.

350-501 Question 13

Options:

Buy Now
Questions 14

What is the difference between SNMP and model-driven telemetry?

Options:

A.

Telemetry allows for modeled network data to be pushed to the network administrator on an as-needed basis

B.

Telemetry uses traps and inform messages to deliver data to a network administrator on a polling basis

C.

SNMP uses the YANG data modeling language

D.

SNMP pushes network data to the network administrator whenever it is queried

Buy Now
Questions 15

Refer to the exhibit:

350-501 Question 15

What is the effect of this configuration?

Options:

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Buy Now
Questions 16

Refer to me exhibit.

350-501 Question 16

A network operator recently configured BGP FlowSpec for me internal IT network What will be inferred from the configuration deployed on me network?

Options:

A.

The policy is configured locally on CSRl and drops all traffic for TCP ports 80 and 443

B.

The policy is learned via BGP FlowSpec and drops all traffic for TCP ports 80 and 443

C.

The policy is warned via BC FlowSpec aid has active traffic

D.

The policy is configured locally on CSR1 and currently has no active traffic

Buy Now
Questions 17

350-501 Question 17

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

  • Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.
  • Other SNMP managers must not have access to objects.
  • SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

350-501 Question 17

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 18

Refer to the exhibit.

350-501 Question 18

350-501 Question 18

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

Options:

A.

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Buy Now
Questions 19

Refer To the exhibit.

350-501 Question 19

Which BGP attribute should be manipulated to have CE1 use PE1 as the primary path to the Internet?

Options:

A.

The weight attribute should be manipulated on PE1 on outbound routes advertised to CE1.

B.

The MED should be manipulated on CE1 on inbound routes from PE1.

C.

The local preference attribute should be manipulated on PE2 on inbound routes advertised to CE1.

D.

The origin of all routes should be modified on each router on inbound and outbound routes advertised to CE1.

Buy Now
Questions 20

350-501 Question 20

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

Options:

A.

It returns an AAA users with the last name CiscoTest.

B.

It creates a class map named aaauser with traffic tagged from AAA.

C.

It queries the local database to find a user named aaaUser.Json

D.

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Buy Now
Questions 21

Drag and drop the multicast concepts from the left onto the correct descriptions on the right.

350-501 Question 21

Options:

Buy Now
Questions 22

350-501 Question 22

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

Options:

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Buy Now
Questions 23

Refer to the exhibit.

350-501 Question 23

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

350-501 Question 23

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 24

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

Options:

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Buy Now
Questions 25

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Buy Now
Questions 26

350-501 Question 26

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

Options:

A.

Change the helper-address value to 192.168.10.2 on RC.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Buy Now
Questions 27

Refer to the exhibit.

350-501 Question 27

AN engineer is configuring segment routing on an ISP to simplify traffic engineering and management across network domains. What should the engineer do to complete the implementation of segment routing?

Options:

A.

OSPF must be configured with wide area metrics to support routing.

B.

The segment will run without any further configuration.

C.

Area authentication must be enable before segment routing will run.

D.

Area Authentication must be enable before segment routing will run.

Buy Now
Questions 28

What is the role of NSO?

Options:

A.

Provides public cloud services for customers that need Internet access.

B.

Controls the turn-up of a device.

C.

Provides network monitoring services for Layer 3 devices.

D.

Maintains data storage.

Buy Now
Questions 29

Refer to the exhibit.

350-501 Question 29

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

350-501 Question 29

B)

350-501 Question 29

C)

350-501 Question 29

D)

350-501 Question 29

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

Refer to the exhibit.

350-501 Question 30

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

Options:

A.

neighbor ebgp-multihop

B.

ebgp-multihop

C.

ttl-security

D.

neighbor-ttl-security

Buy Now
Questions 31

Exhibit:

350-501 Question 31

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

Options:

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Buy Now
Questions 32

Refer to the exhibit:

350-501 Question 32

A network engineer is implementing an OSPF configuration Based on the output, which statement is true?

Options:

A.

In the ospfv3 1 area 1 ipv4 command, area 0 must be configured instead of area 1.

B.

OSPFv3 does not run for IPv4 on FastEthemet0/0 until IPv6 routing is enabled on the router and IPv6 is enabled on interface Fastfc.thernet0/0

C.

OSPFv3 cannot be configured for IPv4; OSPFv3 works only for IPv6.

D.

IPv6 routing not enabled" is just an informational message and OSPFv3 runs for IPv4 on interface FastEthernet0/0 anyway

Buy Now
Questions 33

Which two features describe TI-LFA? (Choose two.)

Options:

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Buy Now
Questions 34

350-501 Question 34

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

Options:

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Buy Now
Questions 35

An ISP Is Implementing end-to-end fault monitoring for a customer based on the IEEE 802.3ah standard. The solution must detect when 15 or more corrupted Ethernet packets arrive within 10 ms and stop propagating traffic through the ISP backbone network or to the customer side. Which configuration must the ISP engineer apply?

Options:

A.

ethernet oam link-monitoring enable

ethernet oam link-monitor crc-errors ingress time-window 10

ethernet oam link-monitor crc-errors ingress threshold high 15 ethernet oam link-monitor crc-errors egress time-window 10 ethernet oam link-monitor crc-errors egress threshold high 15 ethernet oam link-monitor high-threshold action shutdown-interface

B.

ethernet oam link-monitoring

ethernet oam link-monitor receive-crc window 15

ethernet oam link-monitor receive-crc threshold high 10

ethernet oam link-monitor high-threshold action disable-interface

C.

ethernet oam

ethernet oam link-monitor receive-crc window 10

ethernet oam link-monitor receive-crc threshold high 15

ethernet oam link-monitor transmit-crc window 10

ethernet oam link-monitor transmit-crc threshold high 15

ethernet oam link-monitor high-threshold action errordisable-interface

D.

ethernet oam link-monitoring global enable

ethernet oam link-monitor receive crc-errors period 15

ethernet oam link-monitor receive crc-errors limit 15

ethernet oam link-monitor transmit crc-errors period 10

ethernet oam link-monitor transmit crc-errors limit 15

ethernet oam link-monitor limit action error-disable interface

Buy Now
Questions 36

A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?

350-501 Question 36

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 37

What are the two uses of the YANG data modeling language? (Choose two.)

Options:

A.

It is used to access a device by HTTP.

B.

It Is used to model the configuration used by NETCONF operations.

C.

It is used to shape state data of network elements.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

E.

It is used to replace the OSI model for troubleshooting.

Buy Now
Questions 38

Refer to the exhibit:

350-501 Question 38

This output is included at the end of an output that was provided by a device using NETCONF.

What does the code show?

Options:

A.

It shows the hostname of the device as rpc-reply

B.

It shows that the running configuration is blank

C.

It shows NETCONF uses remote procedure calls.

D.

It shows that the full configuration is being modeled by VANG

Buy Now
Questions 39

350-501 Question 39

350-501 Question 39

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

350-501 Question 39

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 40

Refer to the exhibit A network engineer is in the process of implementing IS-IS Area 1 and Area 2 on this network to segregate traffic between different segments of the network The hosts in the two new areas must maintain the ability to communicate with one another In both directions. Which additional change must be applied?

350-501 Question 40

Options:

A.

Reconfigure either R3 or R4 as a Level 1/Level 2 router.

B.

Reconfigure routers R1, R2 R5. and R6 as Level 1/Level 2 routers.

C.

Reconfigure routers R2 and R5 as Level 1/Level 2 routers.

D.

Reconfigure routers R4, R5 and R6 as Level 1 routers

Buy Now
Questions 41

What is a characteristics of the Pipe model for MPLS QoS?

Options:

A.

The same QoS policy is applied to all customer traffic on the egress PE.

B.

If the outer EXP is changed, it is copied to the DSCP value.

C.

The MPLS EXP bits are set by the CE.

D.

The DSCP value determines how the packet is forwarded

Buy Now
Questions 42

An engineer must apply an 802.1ad-compliant configuration to a new switchport with these requirements:

The switchport must tag all traffic when it enters the port.

The switchport is expected to provide the same level of service to traffic from any customer VLAN.

Which configuration must the engineer use?

Options:

A.

interface GigabitEthernet1/0/1

switchport mode trunk

switchport trunk encapsulation dot1q

encapsulation ISL

bridge-domain 12

B.

interface GigabitEthernet1/0/1

ethernet dot1ad uni c-port

service instance 12

encapsulation dot1q

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

C.

interface GigabitEthernet1/0/1

ethernet dot1ad uni s-port

service instance 12

encapsulation default

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

D.

interface GigabitEthernet1/0/1

ethernet dot1ad nni

service instance 12

encapsulation dot1ad

bridge-domain 12

Buy Now
Questions 43

Refer to the exhibit.

350-501 Question 43

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

Options:

A.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Buy Now
Questions 44

How do intent APIs make it easier for network engineers to deploy and manage networks?

350-501 Question 44

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 45

350-501 Question 45

Refer to the exhibit. An engineer is implementing the BGP attribute on the customer's network to select the preferred path. Only BGP's well-known discretionary attribute must be used FTP prefixes should not be selected as part of this implementation. Which configuration must the engineer implement to complete the task?

Options:

A.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest in

B.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest

C.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest both

D.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest out

Buy Now
Questions 46

What must a network engineer consider when designing a Cisco MPLS TE solution with OSPF?

Options:

A.

The OSPF extensions and RSVP-TE must be enabled on all routers in the network.

B.

OSPF extensions for RSVP-TE are supported in Area 1.

C.

The OSPF extensions and RSVP-TE must be enabled on the egress routers.

D.

OSPF extensions for RSVP-TE are implemented in Type 6, 7, and 8 LSAs.

Buy Now
Questions 47

What are two factors to consider when implementing NSR High Availability on an MPLS PE router? (Choose two.)

Options:

A.

It consumes more memory and CPU resources than NSF

B.

It operates normally without NSR support on the PE peers.

C.

It requires all PE-CE sessions to support NSR

D.

It requires routing protocol extensions

E.

It cannot sync state information across redundant RPs

Buy Now
Questions 48

A network engineer has configured TE tunnels in the MPLS provider core. Which two steps ensure traffic traverse? (Choose two.)

Options:

A.

Static routes is the only option for directing traffic into a tunnel.

B.

ECMP between tunnels allows RSVP to function correctly.

C.

Forwarding adjacency features allows a tunnel to be Installed in the IGP table as a link.

D.

The IGP metric of a tunnel is configured to prefer a certain path

E.

A tunnel weight is configured in SPF database the same way as a native link.

Buy Now
Questions 49

Refer to the exhibit.

350-501 Question 49

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

Options:

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Buy Now
Questions 50

Refer to the exhibit:

350-501 Question 50

A network engineer is implementing a BGP routing policy.

Which effect of this configuration is true?

Options:

A.

All traffic that matches acl10 is allowed without any change to its local-preference

B.

All traffic that matches acl10 is dropped without any change to its local-preference

C.

If traffic matches acl10, it is allowed and its local-preference is set to 300

D.

All traffic is assigned a local-preference of 30O regardless of its destination

Buy Now
Questions 51

Refer to the exhibit:

350-501 Question 51

Which effect of this configuration is true?

Options:

A.

it creates a pseudowire class named Cisco

B.

It enables tagging for VLAN 12 on the interface

C.

It enables MPLS on the interface

D.

It enables AToM on interface gigabitethemet1/0

Buy Now
Questions 52

What is a characteristic of the YANG model?

Options:

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Buy Now
Questions 53

Drag and drop the OSPF area types from the left onto the correct statements on the right

350-501 Question 53

Options:

Buy Now
Questions 54

Refer to the exhibit.

350-501 Question 54

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

350-501 Question 54

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 55

350-501 Question 55

Refer to the exhibit. Router 1 and Router 2 were installed in the data center. Router 1 is the core router in the network, but it fails to establish an OSPF peering with Router 2. and customer traffic is unable to pass. Router 1 also reports an increase in CPU and memory usage. However, the CPU for R2 is stable. Which action resolves this issue?

Options:

A.

Disable Cisco Express Forwarding on Router 2.

B.

Change the transport mode to WAN on Router 1.

C.

Change the MTU to 1524 on Router 1.

D.

Enable MPLS on Router 2.

Buy Now
Questions 56

Which Cisco software OS uses monolithic architecture?

Options:

A.

NX-OS

B.

IOS XE

C.

IOS XR

D.

IOS

Buy Now
Questions 57

Refer to the exhibit:

350-501 Question 57

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Buy Now
Questions 58

Refer to the exhibit.

350-501 Question 58

An administrator working for large ISP must connect its two POP sites to provide internet connectivity to its customers. Which configuration must the administrator perform to establish an iBGP session between routers PE1 on POP site 1 and PE2 on POP site 2?

Options:

A.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#no neighbor 172.18.10.1 shutdown

PE2(config-router)#end

B.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#no neighbor 172.19.10.10 shutdown

PE1(config-router)#end

C.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#address-family ipv4 unicast

PE1(config-router-af)#neighbor 172.19.10.10 activate

PE1(config-router-af)#end

D.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#address-family ipv4 unicast

PE2(config-router-af)#neighbor 172.18.10.1 activate

PE2(config-router-af)#end

Buy Now
Questions 59

Refer to the exhibit:

350-501 Question 59

A network engineer is implementing a BGP protocol. Which effect of the local-as keyword in this configuration is true?

Options:

A.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 and the VPNv4 address family

B.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 without additional configuration

C.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 and the VPNv4 address family

D.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 without additional configuration.

Buy Now
Questions 60

Refer to the exhibit.

350-501 Question 60

An engineer is configuring two routers to support MPLS LDP sessions between them. The R1 configuration is complete, and work has started on R2 as shown. Which additional configuration must the engineer apply to R2 to complete the task?

350-501 Question 60

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 61

350-501 Question 61

Refer to the exhibit. A network engineer is configuring router RB to secure BGP advertisements against route hijacking activity. RB must validate all prefixes that it receives from origin AS 200 before installing them in the BGP route table. Which configuration meets the requirement?

Options:

A.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

RB(config-router-af)# bgp bestpath origin-as use validity

B.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation signal ibgp

RB(config-bgp)# bgp bestpath origin-as allow invalid

C.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation time off

D.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

PB(config-router-af)# bgp origin-as validation enable

Buy Now
Questions 62

What Is one of the differences between Ansible and Chef?

Options:

A.

Ansible uses YAML and Chef uses Ruby.

B.

Chef requires the use of Windows in the environment and Ansible requires Linux.

C.

Chef is highly scalable and Ansible is highly secure.

D.

Ansible uses Ruby and Chef uses Python.

Buy Now
Questions 63

What are two features of stateful NAT64? (Choose two.)

Options:

A.

It uses address overloading.

B.

It provides 1:N translations, so it supports an unlimited number of endpoints.

C.

It requires IPv4-translatable IPv6 address assignments.

D.

It requires the IPv6 hosts to use either DHCPv6-based address assignments or manual address assignments.

E.

It provides 1:1 translation, so it supports a limited number of endpoints.

Buy Now
Questions 64

A network engineer is implementing BFD configuration changes on a customer's equipment. How is the bfd interval configuration on the interface disconnected?

Options:

A.

The status of the interface changes.

B.

The IPv4 or IPv6 address configuration on the interface changes.

C.

It is automatically disconnected when the BFD-configured subinterface is removed.

D.

It is automatically disconnected when the BFD main interface is removed.

Buy Now
Questions 65

Drag and drop the descriptions from the left onto the corresponding OS types on the right.

350-501 Question 65

Options:

Buy Now
Questions 66

350-501 Question 66

Refer to the exhibit. A host connected to R3 must connect with a server on R1 that provides critical, time-sensitive data. Traffic between the host and server must always be given bandwidth to traverse the links when they are congested, with other traffic being dropped. How must the network engineer implement a QoS strategy with classification to ensure that the traffic is given the appropriate bandwidth?

Options:

A.

Implement FIFO to guarantee that the server traffic is sent first while other traffic is queued.

B.

Implement policing to rate-limit noncritical traffic that exceeds designated thresholds.

C.

Implement traffic shaping to delay noncritical traffic when the link is congested.

D.

Implement strict priority to guarantee bandwidth for the server traffic.

Buy Now
Questions 67

350-501 Question 67

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service-provider core network with these requirements:

  • RC must establish LDP peering with the loopback IP address as its Router ID
  • RA must establish LDP peering with RB. RC, and RY.

How must the team update the network configuration to successfully enable LDP peering between RA and RC?

Options:

A.

Enable the mpls ip command on RC interface Gi2/0. DUMPS

B.

Configure the mpls Idp router-Id loopback0 command on RA and RC.

C.

Implement LDP session protection on RA.

D.

DUMPS Reset the discover hello hold time and interval to their default values.

Buy Now
Questions 68

Which protocol does a Cisco MPLS TE tunnel use to maintain paths within the core?

Options:

A.

RSVP

B.

VTP

C.

STP

D.

RPF

Buy Now
Questions 69

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

Options:

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

Buy Now
Questions 70

A network engineer must collect traffic statistics for an internal LAN toward the internet The sample must include the source and destination IP addresses, the destination ports, the total number of bytes from each flow using a 64-bit counter, and all transport flag information. Because of CPU limits, the flow collector processes samples that are a maximum of 20 seconds long. Which two configurations must the network engineer apply to the router? (Choose two.)

350-501 Question 70

350-501 Question 70

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 71

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

Options:

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.

Buy Now
Questions 72

BGP has been implemented on a IOS XR router. Which configuration sends BGP IPv4 labels to build inter-domain LSPs?

Options:

A.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community extended

B.

router bgp 65515 no bgp default ipv4-unicast

C.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community

D.

router bgp 65515 neighbor 172.16.70.23 address-family ipv4 labeled-unicast

Buy Now
Questions 73

When Cisco lOS XE REST API uses HTTP request methods what is the purpose of a PUT request?

Options:

A.

retrieves the specified resource or representation

B.

submits data to be processed to the specified resource

C.

updates the specified resource with new information

D.

creates a new resource

Buy Now
Questions 74

How can a network administrator secure rest APIs?

Options:

A.

They can allow read and write privileges to all users

B.

They can ensure that user sessions are authenticated using TACACS+ only

C.

They can have a general administrator login for multiple users to access that has command entries logged

D.

They can authenticate user sessions and provide the appropriate privilege level

Buy Now
Questions 75

350-501 Question 75

Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is Mbps. The company XYZ security team asked the ISP to redirect ICMP requests which are currently going to the web server to a new local security appliance which configuration must an ISPP engineer apply to router R2 to redirect the ICMP traffic?

A)

350-501 Question 75

B)

350-501 Question 75

C)

350-501 Question 75

D)

350-501 Question 75

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 76

Which regular expression query modifier function indicates the start of a string?

Options:

A.

^

B.

[^]

C.

+

D.

$

Buy Now
Questions 77

What is a feature of model-driven telemetry?

Options:

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

Buy Now
Questions 78

Refer to the exhibit:

350-501 Question 78

What does this value mean when it is received in XML?

Options:

A.

It shows the ending of the script

B.

It indicates a break in a sequence

C.

It indicates a value assigned by a network administrator to tag a route

D.

It means a data field is blank

Buy Now
Questions 79

Refer to the exhibit.

350-501 Question 79

A network engineer must meet these requirements to provide a connects, solution:

  • The customer connected to Area 2 needs to access the application in Area 1 on the 10.10.10.0/24 subnet
  • The Customer must not have access to the 20.10 30.0/24 subnet.
  • The service provider must make sure that the Area 2 routing database limits the number of IP addresses in the routing table

Which two configurations must be implemented to meet the requirements? (Choose two)

Options:

A.

Set a tag value of 200 to match the summary address 10.0.0/16 on R2.

B.

Set a tag value of 200 to match the summary address 10.0.0.0/16 on R3.

C.

Apply the route map for tag 200 and leak Level 2 routes into Level 1 Area 2 on R3

D.

Apply the route map for tag 200 and teak Level 2 routes into Level 1 Area 2 on R4.

E.

Set a tag value of 200 to match the summary address 10.0.0./16 on R1.

Buy Now
Questions 80

Refer to the exhibit.

350-501 Question 80

While troubleshooting the network, a network operator with an employee id: 3812:12:993 is trying to ping XR1. Which result should the operator expect when trying to ping to an XR1 local address?

Options:

A.

ICMP traffic works at a policed rate of 19 bytes per second every 100 ms

B.

All ICMP traffic responds successfully.

C.

All ICMP traffic is dropped.

D.

ICMP traffic works at a policed rate of 19 packets every 100 ms.

Buy Now
Questions 81

What is a characteristic of MVPN?

Options:

A.

It bypasses the use of MPLS in the service provider core and transmits packets using IP only.

B.

It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP core.

C.

It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.

D.

It creates GRE tunnels to route multicast traffic over a service provider IP core.

Buy Now
Questions 82

Drag and drop the OSs from the left onto the correct deceptions on the right.

350-501 Question 82

Options:

Buy Now
Questions 83

A customer has requested that the service provider use a Cisco MPLS TE tunnel to force the E-line service to take a specific route What is used to send the traffic over the tunnel?

Options:

A.

static route

B.

preferred path

C.

forwarding adjacency

D.

autoroute destination

Buy Now
Questions 84

An engineer is implementing MPLS to monitor within the MPLS domain. Which must the engineer perform to prevent packets from being forwarded beyond the service provider domain when the LSP is down?

350-501 Question 84

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 85

Which action occurs during the traceback phase of the six-phase approach to service provider security?

Options:

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Buy Now
Questions 86

Refer to the exhibit:

350-501 Question 86

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

Options:

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Buy Now
Questions 87

A network engineer must implement SNMPv2 with these parameters

  • Enable SNMP community string C1sc0 with read-only permissions.
  • Enable interface index persistence.
  • Restrict the SNMP community to only the monitoring server with IP address 198.18 19 100/32.
  • Provide view-only access to ospflfEntry and ospfNbrEntry.

Which configuration must the engineer apply?

350-501 Question 87

350-501 Question 87

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 88

What is the role of NFVI?

Options:

A.

domain name service

B.

intrusion detection

C.

monitor

D.

network address translation

Buy Now
Questions 89

A customer of an ISP requests support to setup a BGP routing policy. Which BGP attribute should be configured to choose specific BGP speakers as preferred exit

points for the customer AS?

Options:

A.

highest local preference outbound

B.

lowest local preference inbound

C.

highest local preference inbound

D.

lowest multi-exit discriminator

Buy Now
Questions 90

Which OoS model allows hosts to report their QoS needs to the network?

Options:

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Buy Now
Questions 91

350-501 Question 91

Refer to the exhibit. A network engineer is implementing iBGP and eBGP between AS 600 and AS 500 with these requirements:

  • R2 must establish eBGP peering on 192.168.3.0/30 with R5 for sending unicast and multicast traffic
  • R2 must wait for 30 seconds before sending BGP updates to R5 for multicast traffic.

Which action must be taken on R2 to meet the requirements?

Options:

A.

Configure advertisement-interval 30 In address-family ipv4 unicast

B.

Configure advertisement-Interval 30 in address-family Ipv4 multicast

C.

Apply timers bgp 30 in address-family ipv4 unicast

D.

Apply timers bgp 30 in address-family ipv4 multicast.

Buy Now
Questions 92

350-501 Question 92

Refer to the exhibit. A network engineer is implementing multicast services on CPE-1 and CPE-2. CPE-1 must be configured as the preferred IGMP querier for the LAN segment. PIM-SM must be implemented on the LAN interfaces with an IGMP version that supports (*, G) joins only. Which configurations must the engineer implement on CPE-1 and CPE-2?

Options:

A.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

B.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255. 128

ip pim sparse-mode

ip igmp version 3

C.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

D.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

Buy Now
Questions 93

How does model-driven telemetry use YANG?

Options:

A.

to reset network devices that malfunction

B.

to set informs and traps on clients to report back to a centralized server

C.

to subscribe to data that is streamed from a device

D.

to poll network devices on a 30-minute interval

Buy Now
Questions 94

Which feature describes the adjacency SID?

Options:

A.

It applies only to point-to-point links.

B.

It applies only to multipoint links

C.

It is locally unique

D.

It is globally unique.

Buy Now
Questions 95

350-501 Question 95

Refer to the exhibit. Router P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering P4 is the primary Internet gateway router, and P5 is its Backup. P5 is already advertising a default route into OSPF domain. Which configuration must Be applied to P4 so that advertises a default route Into OSPF and Becomes me primary internet gateway for the network?

350-501 Question 95

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 96

Refer to the exhibit.

350-501 Question 96

An engineer is configuring an administrative domain in the given multi-vendor environment with PIM-SM. Which feature must the engineer implement so that devices will dynamically learn the RP?

Options:

A.

Auto-RP

B.

BIDIR-PIM

C.

SSM

D.

BSR

Buy Now
Questions 97

350-501 Question 97

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

350-501 Question 97

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 98

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

Options:

A.

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Buy Now
Questions 99

Refer to the exhibit.

350-501 Question 99

An engineer implemented OSPF neighbor relationship on an IOS device. Which configuration must be applied to get the OR/BOR election removed from interfaces running OSPF?

Options:

A.

ip ospf network broadcast on interfaces running OSPF

B.

ip ospf network point-to-point on interfaces running OSPF

C.

ip ospf network multipoint-point on interfaces running OSPF

D.

ip ospf network non-broadcast on n:erfaces running OSPF

Buy Now
Questions 100

What do Ansible and Salt Stack have in common?

Options:

A.

They both use DSL configuration language

B.

They both use YAML configuration language

C.

They both have agents running on the client machine

D.

They both can be designed with more than one master server

Buy Now
Questions 101

Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?

Options:

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

C.

Chef is written in Python, and SaltStack is written in Ruby.

D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

Buy Now
Questions 102

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices'?

Options:

A.

It requires certificates for authentication.

B.

It is provided using NGINX acting as a proxy web server

C.

It is used for HTTP and HTTPS requests.

D.

It is not supported on Cisco devices

Buy Now
Questions 103

What is the function of Cisco NFV infrastructure platform?

Options:

A.

It does not have a security audit feature.

B.

It does not offer high availability.

C.

It offers consistent performance.

D.

It offers decentralized logging.

Buy Now
Questions 104

What is a feature of mVPN?

Options:

A.

It requires-uncast to be disabled on the multicast domain

B.

It establishes multiple static MDTs for each multicast domain.

C.

It provides the ability to support multicast over a Layer 3 VPN.

D.

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Buy Now
Questions 105

Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?

Options:

A.

routing and tunneling when doing symmetric IRB

B.

routing when doing asymmetric IRB

C.

routing and bridging when doing asymmetric IRB

D.

bridging when doing symmetric IRB

Buy Now
Questions 106

Which statement about segment routing prefix segments is true?

Options:

A.

It is linked to a prefix SID that is globally unique within segment routing domain.

B.

It is the longest path to a node.

C.

It is linked to an adjacency SID that is globally unique within the router.

D.

It requires using EIGRP to operate.

Buy Now
Questions 107

A network operator working for a telecommunication company with an employee Id: 4065 96080 it trying to implement BFD configuration on an existing network of Cisco devices Which task must the engineer perform to enable BFD on the interfaces?

Options:

A.

Disable Cisco Express Forwarding on the interfaces

B.

Disable SSO on the interfaces

C.

Remove any static routes that point to the interfaces

D.

Remove the log option from any ACLs on the interfaces.

Buy Now
Questions 108

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

Options:

A.

Enable communication over TCP port 646 for T-LDP hello messages.

B.

Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers.

C.

Enable LDP session protection on either one of the routers, which allows them to autonegotiate.

D.

Set the LDP session protection timer on each router to the same value.

Buy Now
Questions 109

Refer to the exhibit:

350-501 Question 109

In which way does router R1 operate differently than router R2?

Options:

A.

R1 sends LSA type 2 only, while R2 sends type 1 and type 7 LSAs

B.

R1 sends LSA types 1 and 2, while R2 sends type 1. 2. and 7 LSAs

C.

R1 sends LSA type 2 only and R2 sends LSA type 1 only

D.

R1 sends LSA types 5 and 7, while R2 sends type 1, 2, and 7 LSAs

Buy Now
Questions 110

What does DWDM use to combine multiple optical signals?

Options:

A.

frequency

B.

IP protocols

C.

time slots

D.

wavelength

Buy Now
Questions 111

A company is expanding its existing office space to a new floor of the building, and the networking team is installing a new set of switches. The new switches are running IGMPv2, and the engineers configured them for VLAN10 only. The rest of the existing network includes numerous Layer 2 switches in multiple other VLANs, all running IGMPv3. Which additional task must the team perform when deploying the new switches so that traffic is switched correctly through the entire network?

Options:

A.

Configure the new switches to use IGMPv3 on all VLANs on the network.

B.

Configure all switches on the network to support IGMPv2 and IGMPv3 on all VLANs on the network.

C.

Configure the new switches to use IGMPv3 on VLAN10 only.

D.

Configure all switches on the network to support IGMPv2 and IGMPv3 on VLAN10 only.

Buy Now
Questions 112

Refer to the exhibit.

350-501 Question 112

Router 1 and router 2 are running OSPF Area 0. The router logs on both routers show that the LDP link has flapped. Which configuration must the engineer apply to the two routers to implement session protection on the link?

350-501 Question 112

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 113

350-501 Question 113

Refer to the exhibit. The ISP is implementing a new hosting-as-a-service solution for its business customers. Service accessibility must be unique and separate for each customer. The network architect must ensure that multiple paths toward the hosting-as-a-service solution are always available. Basic protection against traffic black-holing on the MPLS network is required in case of link failure. Which two actions must the engineering team perform to meet the requirements? (Choose two.)

Options:

A.

Create the hosting-as-a-service VRF on router R4 and configure It with the route target both 65123:88 command.

B.

Configure the fast-reroute per-prefix command for the IS-IS protocol in the MPLS network and enable the BGP route-reflector feature on R2.

C.

Enable the VRF-Lite feature on router R4 and enable BGP address-family VPNv4.

D.

Configure the mpls Idp sync command in the MPLS network with the BGP additional-paths receive and additional-paths send options.

E.

Configure the fast-hello command under the IS-IS routing protocol with the BGP multipath 2 option enabled.

Buy Now
Questions 114

A network administrator is planning a new network with a segment-routing architecture using a distributed control plane. How is routing information distributed on such a network?

Options:

A.

Each segment is signaled by a compatible routing protocol, and each segment makes its own steering decisions based on SR policy.

B.

Each segment is signaled by MPLS, and each segment makes steering decisions based on the routing policy pushed by BGP.

C.

Each segment is signaled by an SR controller, but each segment makes its own steering decisions based on SR policy.

D.

Each segment is signaled by an SR controller that makes the steering decisions for each node.

Buy Now
Questions 115

Refer to the exhibit.

350-501 Question 115

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Options:

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Buy Now
Questions 116

What do Chef and Puppet have in common?

Options:

A.

use Ruby

B.

use a master server

C.

require modules to be created from scratch

D.

manage agents referred to as minions

Buy Now
Questions 117

Drag and drop the methods of Cisco MPLS TE tunnel traffic assignment from the left onto their characteristics on the right.

350-501 Question 117

Options:

Buy Now
Questions 118

A regional MPLS VPN provider operates m two regions and wants to provide MPLS L 3VPN service for a customer with two sites in these separate locations. The VPN provider approaches another organization to provide backbone carrier services so that the provider can connect to these two locations.

Which statement about this scenario is true?

Options:

A.

When edge routers at different regional sites are connected over the global carrier backbone, MP-eBGP must run between the routers to exchange the customer VPNv4 routes

B.

When eBGP is used for label exchange using the send label option, MPLS-BGP forwarding is configured under the global ABC CSC PE-to CE interface

C.

When IGP is used for route exchange and LDP for label exchange, MPLS is enabled only on the VRF interface on the backbone-earner PE side.

D.

When BGP is used for both route and label exchange, the neighbor a.b.c.d send-lable command is used under the address family VPNv4 command mode.

Buy Now
Questions 119

Refer to the exhibit:

350-501 Question 119

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

350-501 Question 119

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Buy Now
Questions 120

Refer to the exhibit:

350-501 Question 120

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

Options:

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Buy Now
Questions 121

Refer to the exhibit:

350-501 Question 121

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Buy Now
Questions 122

Refer to the exhibit.

350-501 Question 122

An engineer is implementing Auto-RP and reviewing the configuration of the PE-A. Which configuration permits Auto-RP messages to be forwarded over this interface?

Options:

A.

PE-A(config-if)#ip pim sparse-mode

B.

PE-A(config-if)#no ip pim bsr-border

C.

PE-A(config-if)#ip igmp version 3

D.

PE-A(config-if)#ip pim sparse-dense-mode

Buy Now
Questions 123

350-501 Question 123

Refer to the exhibit. ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to CE-1?

Options:

A.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-export additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

B.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community local-as additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

C.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefixlist AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop local-address

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

D.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

Buy Now
Questions 124

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

350-501 Question 124

Options:

Buy Now
Questions 125

350-501 Question 125

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

Options:

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

Buy Now
Questions 126

Which additional feature does MPLS DiffServ tunneling support?

Options:

A.

matching EXP and DSCP values

B.

interaction between MPLS and IGP

C.

using GRE tunnels to hide markings

D.

PHB layer management

Buy Now
Questions 127

Refer to the exhibit.

350-501 Question 127

While troubleshooting the OSPF adjacency between routers R1 and R2 an engineer noticed that both routers are stuck in the EXCHANGE/EXSTART state. What should the engineer fix to solve the ongoing issue?

Options:

A.

match IPv4 addresses

B.

match OSPF areas

C.

match OSPF network types

D.

match MTU values

Buy Now
Questions 128

What is the function of the FEC field within the OTN signal structure?

Options:

A.

It allows the sending devices to apply QoS within the OTN forwarding structure.

B.

It allows source nodes to discard payload errors before transmitting data on the network.

C.

It allows receivers to correct errors upon data arrival.

D.

It allows deep inspection of data payload fields.

Buy Now
Questions 129

Refer to the exhibit:

350-501 Question 129

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Buy Now
Questions 130

Refer to the exhibit.

350-501 Question 130

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

Options:

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Buy Now
Questions 131

350-501 Question 131

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

Options:

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Buy Now
Questions 132

Refer to the exhibit:

350-501 Question 132

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to create a subscription to specify the streaming interval

B.

It is used to identify traps for SNMP polling

C.

It is used to identify MIB entries and has a list of YANG models

D.

It is used to create a sensor-group and has a list of YANG models for streaming

Buy Now
Questions 133

Refer to the exhibit.

350-501 Question 133

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

350-501 Question 133

B)

350-501 Question 133

C)

350-501 Question 133

D)

350-501 Question 133

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 134

What is the characteristic of the Tl-LFA?

Options:

A.

It guarantees a loop-free path for all interfaces in the OSPf- super backbone .

B.

It applies on each area and instance and makes all the interfaces inherit the configuration

C.

It guarantees a loop-free path for all areas configured m OSPF

D.

It applies only on the instance and makes at the interfaces inherit the configuration

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
Last Update: Apr 22, 2024
Questions: 452

PDF + Testing Engine

$70  $174.99

Testing Engine

$54  $134.99
buy now 350-501 testing engine

PDF (Q&A)

$48  $119.99
buy now 350-501 pdf