Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Questions 4

How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?

Options:

A.

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

B.

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

C.

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

D.

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

Buy Now
Questions 5

350-501 Question 5

Refer to the exhibit. AS 65517 is running OSPF within the core. BGP is running between all four autonomous systems, interconnecting several ISPs that provide intranet and extranet services. All of the PE routers are connected, and eBGP peering relationships have been established. A network engineer also configured an iBGP peering between PE3 and P1, and the peering is up. However, P1 cannot reach routes outside of AS 65517. Which action must the engineer take so that P1 reaches external routes?)

Options:

A.

Synchronize BGP and OSPF with AS 65517.

B.

Add the next-hop-self attribute under the BGP neighbor configuration for P1 on PE3.

C.

Install route targets on all PE routers under the VRF configuration for intranet services.

Buy Now
Questions 6

What is the purpose of DS-Lite technology?

Options:

A.

It enables networks to pass encapsulated IPv4-in-IPv6 traffic over the ISP backbone.

B.

It allows network administrators to implement shared IPv4 addresses between the ISP and its customers.

C.

It allows an ISP to service IPv6 networks over an IPv4-enabled ISP backbone.

D.

It allows network administrators to transition a network to IPv6 while maintaining IPv4 support.

Buy Now
Questions 7

350-501 Question 7

Refer to the exhibit. A client wants to filter routes to a BGP peer to limit access to restricted areas within the network. The engineer configures the route map ciscotest to filter routes from the BGP neighbor. The engineer also sets a tag that will be used for QoS in the future. Which task must be performed to complete the Implementation?

Options:

A.

Attach the new route map to the BGP neighbor statement in the inbound direction.

B.

Create a policy map named ciscotest and apply It to inbound traffic on the link that is directly connected to the BGP neighbor.

C.

Create a route map, configure BGP with an IPv4 address family, and activate the neighbor.

D.

Add a route map statement with sequence 40 that links a BGP community to the routing protocol

Buy Now
Questions 8

350-501 Question 8

Refer to the exhibit. A service provider engineer Is configuring the connection between CE1 and CE2. AS 200 of the service provider and AS 100 of enterprise ABC should connect using BGP. The engineer already completed the configuration of VRF RT 100:10 of enterprise ABC. Which configuration must the engineer apply on PE1 to meet the requirement?

350-501 Question 8

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 9

Refer to the exhibit.

350-501 Question 9

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

350-501 Question 9

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 10

Refer to the exhibit:

350-501 Question 10

Which three outcomes occur if the prefix list is added to the neighbor? (Choose three)

Options:

A.

192.168 0.0/19 is denied.

B.

192.168 0.0/17 is denied.

C.

192.168 0.0/17 is permitted

D.

192.168.0.0/16 is denied

E.

192.168 0.0/16 is permitted

F.

192.168 0.0/19 is permitted

Buy Now
Questions 11

350-501 Question 11

Refer to the exhibit. A large organization is merging the network assets of a recently acquired competitor with one of its own satellite offices in the same geographic area. The newly acquired network is running different routing protocol than the company's primary network. As part of the merger a network engineer implemented this route map Which task must the engineer perform to complete the Implementation?

Options:

A.

Attach the route map to an IS-IS network statement to advertise the routes learned on this interface to IS-IS

B.

Enable metric style wide to allow the use of extended metrics from the protocols

C.

Attach the route map to the redistribution command to manipulate the routes as they are shared

D.

Configure an additional route map sequence to override the implicit deny at the end of the route map

Buy Now
Questions 12

Refer to the exhibit.

350-501 Question 12

A Cisco engineer is implementing gRPC dial-out on an ASR. Receiver 192.168 1.1 will be assigned one of the subscriptions, and it will manage the ASR. Which command is needed to complete the router configuration?

Options:

A.

protocol grpc

B.

protocol all

C.

protocol tcp

D.

protocol any

Buy Now
Questions 13

Refer to the exhibit.

350-501 Question 13

An administrator working for large ISP must connect its two POP sites to provide internet connectivity to its customers. Which configuration must the administrator perform to establish an iBGP session between routers PE1 on POP site 1 and PE2 on POP site 2?

Options:

A.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#no neighbor 172.18.10.1 shutdown

PE2(config-router)#end

B.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#no neighbor 172.19.10.10 shutdown

PE1(config-router)#end

C.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#address-family ipv4 unicast

PE1(config-router-af)#neighbor 172.19.10.10 activate

PE1(config-router-af)#end

D.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#address-family ipv4 unicast

PE2(config-router-af)#neighbor 172.18.10.1 activate

PE2(config-router-af)#end

Buy Now
Questions 14

Drag and drop the message types from the left onto the target field of the message originator on the right.

350-501 Question 14

Options:

Buy Now
Questions 15

Refer to the exhibit.

350-501 Question 15

An engineer configured BGP summarization on a customer's network. Which route is advertised to BGP peers?

Options:

A.

192.0.0.0/16

B.

192168.0.0/16

C.

192.168.1.0/24

D.

192168.0.5/30

Buy Now
Questions 16

A mod-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company’s two sites across the service provider core. To meet service requirements, the service provider must extend the layer 2 domain between the company’s two locations. Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

350-501 Question 16

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 17

350-501 Question 17

Refer to the exhibit. A network engineer installed router R1 as the new core router and must secure the control plane. The configuration has been applied, and now the engineer is creating ACL 120. Only hosts 192.168.1.1 and 192.168.2.2 should be allowed to access the router using Telnet. All other hosts should be rate-limited, with excess traffic dropped. Which configuration accomplishes this goal?

Options:

A.

access-list 120 deny tcp any any eq telnet

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.1.2 any eq telnet

B.

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

access-list 120 permit tcp any any eq telnet

C.

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.2.2 any eq telnet

access-list 120 deny tcp any any eq telnet

D.

access-list 120 permit tcp any any eq telnet

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

Buy Now
Questions 18

Refer To the exhibit.

350-501 Question 18

Which BGP attribute should be manipulated to have CE1 use PE1 as the primary path to the Internet?

Options:

A.

The weight attribute should be manipulated on PE1 on outbound routes advertised to CE1.

B.

The MED should be manipulated on CE1 on inbound routes from PE1.

C.

The local preference attribute should be manipulated on PE2 on inbound routes advertised to CE1.

D.

The origin of all routes should be modified on each router on inbound and outbound routes advertised to CE1.

Buy Now
Questions 19

Which two features will be used when defining SR-TE explicit path hops if the devices are using IP unnumbered interfaces? (Choose two.)

Options:

A.

router ID

B.

labels

C.

node address

D.

next hop address

E.

output interface

Buy Now
Questions 20

350-501 Question 20

Refer to the exhibit. This enterprise configured MPLS within its network to connect offices that span different geographic areas, with LDP running between connected neighbors. At each office, including headquarters, the networks are running OSPF with a similar configuration.

Which additional action must the engineering team take to support a more reliable connection between MPLS and OSPF?

Options:

A.

Implement targeted LDP sessions between the peers connected to interface g0/1 and g0/2.

B.

Implement MD5 authentication between LDP and OSPF neighbors to secure the connection.

C.

Implement LDP session protection to maintain uptime during outages.

D.

Implement MPLS LDP sync to synchronize OSPF and LDP.

Buy Now
Questions 21

In MPLS traffic engineering, which FRR operation swaps the label and pushes the backup label?

Options:

A.

Merge Point

B.

Point of Local Repair

C.

Branch Point

D.

Mid-Point

Buy Now
Questions 22

When configuring traffic engineering tunnels in Cisco MPLS core network, you see the traffic is not taking the expected path in the core.

Which command do you use to quickly check path of a TE tunnel?

Options:

A.

Traceroute mpls ipv4 -tunnel destination

B.

Ping

C.

show mpls traffic-engineering tunnels

D.

traceroute

Buy Now
Questions 23

350-501 Question 23

Refer to the exhibit. A network engineer observed congestion between routers R1 and R4, which are connected on a point-to-point link. Two servers that reside on networks on R1 and R4 generate heavy traffic between them with most traffic going from R4 to R1. To improve overall performance, the engineer wants to drop inbound packets that exceed a configured threshold, without disrupting traffic that passes from R4 to R3. Which action must the engineer take to resolve the issue?

Options:

A.

Implement traffic policing to drop packets that exceed the given threshold.

B.

Implement FIFO to queue excess traffic for transmission when bandwidth is available.

C.

Implement traffic shaping to drop excess packets.

D.

Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.

Buy Now
Questions 24

Which Cisco software OS uses monolithic architecture?

Options:

A.

NX-OS

B.

IOS XE

C.

IOS XR

D.

IOS

Buy Now
Questions 25

Which type of attack is an application attack?

Options:

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Buy Now
Questions 26

Refer to the exhibit.

350-501 Question 26

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Options:

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Buy Now
Questions 27

Which is the benefit of implementing model-driven telemetry in a service provider environment?

Options:

A.

It reduces the number of network monitoring tools that are necessary to verify device statistics.

B.

It increases the efficiency of SNMP by pulling system data to requesting servers.

C.

It reduces or eliminates the need to monitor Layer 2 traffic between switches.

D.

It uses reliable transport to push Information to network monitoring tools

Buy Now
Questions 28

350-501 Question 28

350-501 Question 28

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

350-501 Question 28

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

When implementing a REST API, how does an engineer mitigate security risks?

Options:

A.

by configuring the system to authenticate the client's identity and avoid broken authentication

B.

by configuring object properties to protect data

C.

by configuring separate authorization schemes to securely compartmentalize different areas of the business

D.

by configuring rate limiting to reduce the risk of DOS and DDOS attacks against the system

Buy Now
Questions 30

A company uses PIM-SM multicast with IGMPv2 to stream training videos from a server in one network to hosts in a different network. As the company has grown, the networking team decided to implement SSM to improve efficiency for multicast within Layer 2. Which action must the team take to begin the process?

Options:

A.

Configure an IGMP querier and implement Cisco Express Forwarding across the network.

B.

Implement PIM-DM to enable the routers on the LAN to identify SSM-capable multicast hosts.

C.

Implement IGMPv3 and deprecate IGMPv2.

D.

Implement IGMPv3 simultaneously with IGMPv2 on the individual links that must support SSM and PIM-DM.

Buy Now
Questions 31

Refer to the exhibit:

350-501 Question 31

Which two statements about the ISIS topology are true? (Choose two.)

Options:

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

All four routers are operating as Level 1-2 routers.

D.

R1 and R2 are Level 2 neighbors.

E.

R1 and R4 are Level 2 neighbors

Buy Now
Questions 32

350-501 Question 32

Refer to the exhibit. Customer C-101 in ASN 65123 requested that the ISP blackholes a host route 198.19.44.195, to which the customer is receiving a significant amount of malicious traffic. Which configuration must the network engineer implement on the trigger router TR-1 to fulfill the request without affecting other IP destinations in the customer's block?

Options:

A.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

B.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.195/32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

C.

configure terminal

ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

D.

Configure terminal

Buy Now
Questions 33

Simulation 8

350-501 Question 33350-501 Question 33

350-501 Question 33

Options:

Buy Now
Questions 34

Refer to the exhibit.

350-501 Question 34

The network engineer who manages ASN 65001 must configure a BGP routing policy on GW-XR1 with these requirements:

• Advertise locally-originated routes and /24 prefixes assigned within the 198.18.0.0/15 range. All other prefixes must be dropped.

• Reachability to 198.18.100.0/24 must be preferred via the EDGE-1 connection.

• Reachability to 198.19.100.0/24 must be preferred via the EDGE-2 connection.

Which configuration must the network engineer implement on GW-XR1?

Options:

A.

350-501 Question 34 Option 1

B.

34

C.

34

D.

34

Buy Now
Questions 35

Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?

Options:

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

C.

Chef is written in Python, and SaltStack is written in Ruby.

D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

Buy Now
Questions 36

350-501 Question 36

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

Options:

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Buy Now
Questions 37

A network operator working for a telecommunication company with an employee Id: 4065 96080 it trying to implement BFD configuration on an existing network of Cisco devices Which task must the engineer perform to enable BFD on the interfaces?

Options:

A.

Disable Cisco Express Forwarding on the interfaces

B.

Disable SSO on the interfaces

C.

Remove any static routes that point to the interfaces

D.

Remove the log option from any ACLs on the interfaces.

Buy Now
Questions 38

350-501 Question 38

Refer to the exhibit. Company A has two offices that communicate via a service provider in AS 65516. CE1 and CE2 provide connections to the service provider from site 1 and site 2 respectively. Both customer sites use BGP as the PE-CE routing protocol. Which configuration must the engineer apply to ensure that traffic passes between the two sites?

Options:

A.

CE2(config)#router bgp 65514

CE2(config-router)#neighbor 192.168.1.1 as-override

B.

CE1(config)#router bgp 65514

CE1(config-router)#neighbor 192.168.1.2 allowas-in

C.

PE2(config)#router bgp 65516

PE2(config-router)#neighbor 192.168.1.1 next-hop-self

PE4(config)#router bgp 65516

PE4(config-router)#neighbor 192.168.2.1 next-hop-self

D.

CE1(config)#router bgp 65514

CE1(config-router)#neighbor 192.168.1.2 next-hop-self

CE2(config)#router bgp 65514

CE2(config-router)#neighbor 192.168.2.2 next-hop-self

Buy Now
Questions 39

Which configuration mode do you use to apply the mpls Idp graceful-restart command in IOS XE Software? MPLS

Options:

A.

MPLS

B.

LDP neighbor

C.

global

D.

interface

Buy Now
Questions 40

Simulation 6

350-501 Question 40

350-501 Question 40

Options:

Buy Now
Questions 41

A network engineer has configured TE tunnels in the MPLS provider core. Which two steps ensure traffic traverse? (Choose two.)

Options:

A.

Static routes is the only option for directing traffic into a tunnel.

B.

ECMP between tunnels allows RSVP to function correctly.

C.

Forwarding adjacency features allows a tunnel to be Installed in the IGP table as a link.

D.

The IGP metric of a tunnel is configured to prefer a certain path

E.

A tunnel weight is configured in SPF database the same way as a native link.

Buy Now
Questions 42

350-501 Question 42

Refer to the exhibit. A network operations team is implementing eBGP on the service provider network. Data traffic between routers R1 and R4 must use the R2-R3 link, which connects AS 65101 and AS65201. iBGP sessions with adjacent routers are up on 10.10.10.1 and 10.10.10.4. The team is now updating the configuration for eBGP peers on routers R2 and R3. Which action must be taken to meet the requirements?

Options:

A.

Add the soft-reconfiguration command.

B.

Add the ebgp-multihop command.

C.

Remove the update-source command.

D.

Remove the next-hop-self command.

Buy Now
Questions 43

What is a primary benefit of IPoATM or MPLS over ATM backbone service provider networks?

Options:

A.

dedicated circuits

B.

variable-length packets

C.

isochronous system

D.

fixed-length cells

Buy Now
Questions 44

350-501 Question 44

Refer to the exhibit. What is the effect of this REST API script?

Options:

A.

It creates the interface in an enabled state.

B.

It disables the interface until a configurable timer expires and then enables it.

C.

It enables the interface immediately when executed.

D.

It shuts down the interface until the interface is manually turned up.

Buy Now
Questions 45

Refer to the exhibit:

350-501 Question 45

You are configuring an administrative domain implement so that devices can dynamically learn the RP?

Options:

A.

SSM

B.

BID1R-PIM

C.

BSR

D.

Auto-RP

Buy Now
Questions 46

A network engineer is configuring RIP as the routing protocol between multiple PEs and CEs. The engineer must avoid advertising the same routes back to their sources. Which action should be performed on the routers to accomplish this task?

Options:

A.

Configure a different route distinguisher for each prefix.

B.

Define the site of origin on each interface.

C.

Define VRFs on each device to separate the traffic.

D.

Enable bidirectional forwarding detection on each device.

Buy Now
Questions 47

350-501 Question 47

Refer to the exhibit. The network administrator is configuring memory telemetry on router R1. Only kvGPB encoding and gRPC protocol based on RFC 7540 should be used. Updates should be sent every two seconds. Which two commands must the administrator apply to complete the task? (Choose two.)

Options:

A.

stream native

B.

stream yang-notif-native

C.

update-policy periodic 200

D.

update-policy periodic 2

E.

stream yang-push

Buy Now
Questions 48

You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tunnel’s router?

Options:

A.

error

B.

reservation

C.

path

D.

tear

Buy Now
Questions 49

Drag and drop the functionalities from the left onto the target fields on the right.

350-501 Question 49

Options:

Buy Now
Questions 50

Which feature describes the adjacency SID?

Options:

A.

It applies only to point-to-point links.

B.

It applies only to multipoint links

C.

It is locally unique

D.

It is globally unique.

Buy Now
Questions 51

Refer to the exhibit. After a networking team configured this MPLS topology, the supervisor wants to view MPLS labels to verify the path that packets take from router R1 to router R7 The team already Issued an ICMP ping to verify connectivity between the devices. Which task must the team perform to allow the supervisor to view the label switch path?

350-501 Question 51

Options:

A.

Configure MPLS TE to display the labels in the stack between the head and tail-end routers

B.

Implement MPLS LDP to assign labels to all the routes in the transit path.

C.

Configure MPLS LDP Sync to sync labels from the routing table to the MPLS forwarding table.

D.

Implement MPLS OAM to display the labels for each hop along the path

Buy Now
Questions 52

Drag and drop the functions from the left onto the Path Computation Element Protocol roles on the right.

350-501 Question 52

Options:

Buy Now
Questions 53

Company A must increase throughput between two non-IEEE 802.3ad switches located in the access and distribution layers. A network engineer must create a link group with the same speed and duplex. The STP protocol must not block any of the group ports. Which action completes the implementation?

Options:

A.

Group Ethernet interfaces with mode desirable under the physical interfaces.

B.

Enable Port Aggregation Protocol with mode auto under the logical group interface.

C.

Configure a group logical interface with mode active enabled.

D.

Bundle the physical interfaces with mode lacp configured on each of them.

Buy Now
Questions 54

An engineer is configuring IEEE 802.1 ad on the access port on a new Cisco router. The access port handles traffic from multiple customer VLANs, and it is expected to mark all customer traffic to the same VLAN without dropping any traffic. Which configuration must the engineer apply?

A)

350-501 Question 54

B)

350-501 Question 54

C)

350-501 Question 54

D)

350-501 Question 54

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 55

Which OS uses a distributed subsystem architecture?

Options:

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Buy Now
Questions 56

A network engineer implements OSPF on the network and then notices frequent faults in traffic between two routers, particularly on interface TenGigE 0/0/1. The engineer decides to configure NetFlow to monitor the issue. Which configuration must the engineer apply to the router?

Options:

A.

interface tenGigE 0/0/1

ip flow egress

snmp-server community public

snmp-server enable traps lsdn

snmp-server host 192.168.1.27 version 2c public

B.

interface tenGigE 0/0/1

ip flow ingress

ip flow-export version 9

ip flow-cache timeout active 1

C.

ip flow-export destination 192.168.2.1 2055

ip flow-export source loopback0

ip flow-export version 9

ip flow-cache timeout active 1

ip flow-cache timeout inactive 15

snmp-server ifindex persist

D.

ip flow-export destination 192.168.2.1 2055

ip flow-export source loopback0

ip flow-export version 9

ip flow-cache timeout active 1

ip flow-cache timeout inactive 15

snmp-server ifindex persist

interface tenGigE 0/0/1

ip flow ingress

Buy Now
Questions 57

350-501 Question 57

Refer to the exhibit. An engineer is configuring IS-IS on ISP network. Which IS-IS configuration must an engineer implement on router AGG1 so that it establishes connectivity to router AGG6 via the BB3 core router?

Options:

A.

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-2

B.

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-2

C.

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-1

D.

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-1

Buy Now
Questions 58

Which component is similar to an EVPN instance?

Options:

A.

MPLS label

B.

IGP router ID

C.

VRF

D.

router distinguisher

Buy Now
Questions 59

Which utility can you use to locate MPLS faults?

Options:

A.

MPLS traceroute

B.

EEM

C.

MPLS LSP ping

D.

QoS

Buy Now
Questions 60

350-501 Question 60

Refer to the exhibit. Company A is connected to multiple upstream ISPs, with ISP_A serving as the primary upstream ISP. The company A subnet 172.43.232.0 should be announced to the secondary ISP_B only when the FTP server with IP address 10.10.1.1 is not accessible via the primary ISP. Which configuration must be applied on R1?

Options:

A.

neighbor 10.182.213.2 Condition-map Non-RIB prefix-map Advertise-route

B.

neighbor 10.182.213.3 prefix-map Non-RIB Condition-map Advertise-route

C.

neighbor 10.182.213.3 advertise-map Advertise-route non-exist-map Non-RIB

D.

neighbor 10.182.213.3 advertise-map Advertise-route exist-map Non-RIB

Buy Now
Questions 61

Which feature describes the weight parameter for BGP path selection?

Options:

A.

Its value is local to the router

B.

Its value is set either locally or globally.

C.

Its default value is 0.

D.

Its value is global to the router.

Buy Now
Questions 62

Which two tasks must an engineer perform when implementing LDP NSF on the network? (Choose two.)

Options:

A.

Disable Cisco Express Forwarding.

B.

Enable NSF for EIGRP.

C.

Enable NSF for the link-state routing protocol that is in use on the network.

D.

Implement direct connections for LDP peers.

E.

Enable NSF for BGP.

Buy Now
Questions 63

350-501 Question 63

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

Options:

A.

It returns an AAA users with the last name CiscoTest.

B.

It creates a class map named aaauser with traffic tagged from AAA.

C.

It queries the local database to find a user named aaaUser.Json

D.

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Buy Now
Questions 64

What is a role of NSO?

Options:

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Buy Now
Questions 65

A new PE router is configured to run OSPF as an IGP with LDP on all interfaces. The engineer is trying to prevent black holes after convergence when the PERSON device loses an LDP session with other PE routers. Which action must the engineer take to implement LDP session protection on a new PE router?

Options:

A.

Configure the mpls ldp session protection and mpls label protocol ldp commands on the interfaces on the new PE router that connect to the CENTER routers.

B.

Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands on the interfaces on the new PE router that connect to the CE routers.

C.

Configure the new PE router with the mpls ldp session protection command and on neighboring routers that connect to this new PE router.

D.

Configure the new PE router with the mpls ldp session protection command on interfaces with directly connected neighbors.

Buy Now
Questions 66

Drag and drop the BGP Best Path Algorithm rules from the left into the corresponding order of importance on the right.

350-501 Question 66

Options:

Buy Now
Questions 67

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

350-501 Question 67

Options:

A.

Remove route filtering to speed repopulation of the link-state database

B.

Copy the router s existing state information and share the file with its peers to enable BGP soft resets

C.

Implement MPLS to forward packets while the RIB updates after a faliover.

D.

Implement Graceful Restart to mitigate the delay in MPLS LDP synchronization when the IGP starts up.

Buy Now
Questions 68

Refer to the exhibit:

350-501 Question 68

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Buy Now
Questions 69

Refer to the exhibit.

350-501 Question 69

What does this REST API script configure?

Options:

A.

application profile

B.

VRF

C.

public community string for SNMP

D.

interface with IP address 192.168.0.1

Buy Now
Questions 70

What is a characteristics of the Pipe model for MPLS QoS?

Options:

A.

The same QoS policy is applied to all customer traffic on the egress PE.

B.

If the outer EXP is changed, it is copied to the DSCP value.

C.

The MPLS EXP bits are set by the CE.

D.

The DSCP value determines how the packet is forwarded

Buy Now
Questions 71

350-501 Question 71

Refer to the exhibit. ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to CE-1?

Options:

A.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-export additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

B.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community local-as additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

C.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefixlist AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop local-address

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

D.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

Buy Now
Questions 72

While implementing TTL security, an engineer issues the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command. After issuing this command, which BGP packets does the PE accept?

Options:

A.

from 2.2.2.2, with a TTL of less than 2

B.

to 2.2.2.2, with a TTL of less than 253

C.

from 2.2.2.2, with a TTL of 253 or more

D.

to 2.2.2.2, with a TTL of 2 or more

Buy Now
Questions 73

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

350-501 Question 73

Options:

Buy Now
Questions 74

Which programmable API allows the service provider to plan and optimize the automation of network operations and achieve closed-loop operations?

Options:

A.

Network Services Orchestrator

B.

WAN Automation Engine

C.

Evolved Programmable Network Manager

D.

Crosswork Network Automation

Buy Now
Questions 75

Refer to me exhibit.

350-501 Question 75

A network operator recently configured BGP FlowSpec for me internal IT network What will be inferred from the configuration deployed on me network?

Options:

A.

The policy is configured locally on CSRl and drops all traffic for TCP ports 80 and 443

B.

The policy is learned via BGP FlowSpec and drops all traffic for TCP ports 80 and 443

C.

The policy is warned via BC FlowSpec aid has active traffic

D.

The policy is configured locally on CSR1 and currently has no active traffic

Buy Now
Questions 76

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Buy Now
Questions 77

A network engineer Is implementing a QoS policy for outbound management traffic classification and marking on a CPE device with these requirements:

• Management protocols must be marked with DSCP AF class 2 w4h low drop probability.

• Monitoring protocols must be marked with DSCP AF class 1 with low drop probability.

• All remaining traffic must be marked with a DSCP value of 0.

Which configuration must the engineer implement to satisfy the requirements?

A)

350-501 Question 77

B)

350-501 Question 77

C)

350-501 Question 77

D)

350-501 Question 77

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 78

350-501 Question 78

Refer to the exhibit. A large enterprise is migrating its network to use MPLS VPNs between different business divisions. Within the core, routes are shared between the routers using OSPF, and each connected link maintains an MPLS neighbor relationship.

Which action must the migration team take so that LDP neighbor relationships are maintained if a directly-connected link goes down?

Options:

A.

Implement targeted LDP sessions between directly connected routers and between routers that are one hop away.

B.

Implement LDP session protection between each directly connected LDP neighbor.

C.

Implement LDP sync between routers that are directly connected to each business division.

D.

Implement targeted LDP sessions between routers that are directly connected to each business division.

Buy Now
Questions 79

350-501 Question 79

Refer to the exhibit. Tier 1 ISP A purchased several Tier 2 ISPs to increase their customer base and provide more regional coverage. ISP A plans to implement MPLS services in the access layer, with scalability up to 100.000 devices In one packet network and service recovery up to 50 ms. The network architect decided to use different independent IGP and LDP domains and interconnect LSPs that are based on RFC 3107. Which two actions must the network engineer perform to meet the requirements? (Choose two.)

Options:

A.

Implement BGP PIC core functionality on routers R2 and R3.

B.

Configure three OSPF areas, with Area 0 In the core domain, and Areas 2 and 3 in the aggregation domain.

C.

Implement BGP connectivity between routers R1 and R4 with VPNv4 address family enabled.

D.

Implement BGP inline RR functionality with next-hop-self capabilities on routers R2 and R3.

E.

Implement the IS-IS routing protocol on the access domain.

Buy Now
Questions 80

Simulation 5

350-501 Question 80

350-501 Question 80

Options:

Buy Now
Questions 81

350-501 Question 81

Refer to the exhibit. A network engineer with an employee ID: 5086:72:817 is configuring a connection to manage CE1 from the OAM server on VLAN 100. PE1 must push S-VLAN tag 10 toward PE2 while forwarding traffic from CE1 to the OAM server. PE1 must push S-VLAN tag 20 toward PE2 while forwarding traffic from CE2 to the data traffic gateway. Which configuration must the engineer implement on PE2?

Options:

A.

interface GigE0/1

encapsulation dot1q 100

rewrite ingress tag pop 10

rewrite ingress tag push 20

B.

interface Ge0/0

encapsulation dot1q 100

rewrite ingress tag push dot1q 10 symmetric

interface Ge0/1

encapsulation dot1q 200

rewrite ingress tag push dot1q 20 symmetric

C.

interface GigE0/1

encapsulation dot1q 10

rewrite ingress tag push dot1q 10 symmetric

Interface Ge0/0

encapsulation dot1q 20

rewrite ingress tag push dot1q 20 symmetric

D.

Interface Ge0/1

encapsulation dot1q 100

Buy Now
Questions 82

An engineer is implementing IGMP with SSM on a multicampus network that supports video streaming. Which task must the engineer perform as part of the process?

Options:

A.

Configure the network to use IGMPv3.

B.

Configure the network to use bidirectional PIM.

C.

Configure an RP that uses static assignments only.

D.

Configure the network to use the PIM bsr-candidate

Buy Now
Questions 83

What is the function of Cisco NFV infrastructure platform?

Options:

A.

It does not have a security audit feature.

B.

It does not offer high availability.

C.

It offers consistent performance.

D.

It offers decentralized logging.

Buy Now
Questions 84

What is the primary purpose of Terraform in the network?

Options:

A.

to manage the Cisco network infrastructure as code to ensure consistent configuration and scalability

B.

to facilitate the integration of Cisco networking solutions with cloud platforms to improve scalability

C.

to schedule and manage maintenance tasks on Cisco network devices to minimize errors and downtime

D.

to enable the seamless migration of Cisco network configurations between diverse network environments

Buy Now
Questions 85

Which action occurs during the traceback phase of the six-phase approach to service provider security?

Options:

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Buy Now
Questions 86

350-501 Question 86

Refer to the exhibit. A network engineer configures CPE-1 for QoS with these requirements:

IPv4 and IPv6 traffic originated by the CPE-1 WAN IP address must be marked with DSCP CS3.

IPv4 LAN traffic must be marked with DSCP CS1.

IPv6 LAN traffic must be marked with DSCP default.

Which configuration must the engineer implement on CPE-1?

Options:

A.

class-map match-any SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

B.

class-map match-all SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

C.

class-map match-all SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

D.

class-map match-any SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

Buy Now
Questions 87

An engineer needs to implement QOS mechanism on customer's network as some applications going over the internet are slower than others are. Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task? (Choose two)

Options:

A.

Configure a queue with sufficient memory to buffer excess packets.

B.

Configure the token values in bytes.

C.

Implement packet remarking for excess traffic.

D.

Implement a scheduling function to handle delayed packets.

E.

Configure a threshold over which excess packets are discarded.

Buy Now
Questions 88

350-501 Question 88

350-501 Question 88

Refer to the exhibit. LDP peering between routers R1 and R2 is dropped when the link between R1 and R2 is taken offline. However, LDP peering between R2 and R3 stays up when the link between R2 and R3 is taken offline. Which action allows MPLS traffic forwarding to continue normally if the link between R1 and R2 goes down?

Options:

A.

Enable IGP and LDP Synchronization on R1.

B.

Implement LDP Session Protection on R1.

C.

Enable IGP and LDP Synchronization on R2.

D.

Implement LDP Session Protection on R2.

Buy Now
Questions 89

Refer to the exhibit:

350-501 Question 89

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

Options:

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Buy Now
Questions 90

Refer to the exhibit:

350-501 Question 90

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to create a subscription to specify the streaming interval

B.

It is used to identify traps for SNMP polling

C.

It is used to identify MIB entries and has a list of YANG models

D.

It is used to create a sensor-group and has a list of YANG models for streaming

Buy Now
Questions 91

350-501 Question 91

router(config)# route-map blackhole-trigger

router(config-route-map)# match tag 777

router(config-route-map)# set ip next-hop 10.0.1.1

router(config-route-map)# set origin igp

router{config-route-map)# set community no-export

Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and each router maintains iBGP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which is used as a black hole route as shown. Which configuration should the operator implement to the management router to create a route map that will redistribute tagged static routes into BGP and create a static route to blackhole traffic with tag 777 that is destined to the server at 192.168.10.100?

Options:

A.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

B.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

C.

router(config)# router bgp 55100

router(config-router)# redistribute connected

router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

D.

router(config)# router bgp 55100

router(config-router)# redistribute connected route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

Buy Now
Questions 92

Refer to the exhibit.

350-501 Question 92

A network engineer is implementing OSPF multiarea. Which command on interface GO/1 resolves adjacency issues in the new area?

Options:

A.

ip ospf network broadcast

B.

ip ospf network point-to-point

C.

ip ospf network non-broadcast

D.

ip ospf network point-to-multipoint

Buy Now
Questions 93

350-501 Question 93

Refer to the exhibit. Routers R1 and R2 support traffic between multiple departments at a company's remote office and exchange routes using OSPF. The link between R1 and R2 has been providing inconsistent performance, particularly during times of peak usage. To help identify the cause, an engineer was asked to implement BFD to detect failures on the link. Which task must the engineer perform?

Options:

A.

Configure the session parameters individually on each interface.

B.

Configure IS-IS to share routes between the routers.

C.

Change the network between R1 and R2 to a /30 prefix.

D.

Configure echo mode on both devices to support asymmetry.

Buy Now
Questions 94

350-501 Question 94

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

350-501 Question 94

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 95

What are the four primary components of an API?

Options:

A.

methods, actions, objects, and formats

B.

GET, PUT, DELETE, and SET

C.

Modularity, Abstraction, Stability, and Resources

D.

running config, startup config, VLAN database, and routing database

Buy Now
Questions 96

Refer to the exhibit:

350-501 Question 96

If router A is the RP, which PIM mode can you configure so that devices will send multicast traffic toward the RP?

Options:

A.

PIM-SM

B.

PI MM-DM

C.

BIDIR-PIM

D.

PIM-SSM

Buy Now
Questions 97

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

Options:

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Buy Now
Questions 98

What should a network engineer consider before implementing segment routing?

Options:

A.

It is an MPLS-based routing technique.

B.

It is a source-based routing technique.

C.

It is a multicast-based routing technique.

D.

It is a destination-based routing technique.

Buy Now
Questions 99

Refer to the exhibit.

350-501 Question 99

350-501 Question 99

The engineering team wants to limit control traffic on router RX with the following IP address assignments:

• Accepted traffic for router: 10.0.0.0/24

• NOC users IP allocation: 192.168.10.0/24

Which additional configuration must be applied to RX to apply the policy for MSDP?

Options:

A.

RX(config)#access-list 151 permit tcp any gt 1024 10.10.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit tcp any eq 639 10.10.0.0 0.0.0.255 gt 1024 established

B.

RX(config)#access-list 150 permit tcp any gt 1024 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit tcp any eq 639 10.0.0.0 0.0.0.255 gt 1024 established

C.

RX(config)#access-list 151 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit udp any 10.0.0.0 0.0.0.255 eq 639

D.

RX(config)#access-list 150 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit udp any 10.0.0.0 0.0.0.255 eq 639

Buy Now
Questions 100

A service provider requires continuous real-time network monitoring to provide reliable SLAs to its customers. To satisfy this requirement, a network administrator is implementing gRPC dial out on an ASR with TLS. Receiver 192.168.10.2 will be assigned one of the subscriptions, and it will manage the ASR. Which configuration must the engineer apply to the router as part of the configuration process?

Options:

A.

snmp-server community public

snmp-server enable traps

snmp-server host 192.168.10.2 version 2c public.

B.

telemetry model-driven

destination-group DGroup1

address family ipv4 192.168.10.2 1 port 10

encoding self-describing-gpb

C.

snmp-server community public

snmp-server enable traps

snmp-server enable traps snmp authentication

snmp-server manager

snmp-server manager session-timeout 1000

D.

telemetry model-driven

destination-group ciscotest

address family ipv4 192.168.10.2 port 10

encoding self-describing-gpb

protocol grpc tis-hostname ciscotest.com

Buy Now
Questions 101

Refer to the exhibit:

350-501 Question 101

Based on the show/ command output, which result m true after BGP session is established?

Options:

A.

The IOS XR router advertises all routes to the neighbor 192.168.2.2, but it does not accept any routes from 192.168.2.2

B.

The IOS XR router advertises and accepts all routes to and from eBGP neighbor 192.168.2.2 C. No routes are accepted from the neighbor 192.168.2.2, nor are any routes advertised to it

C.

The IOS XR router does not advertise any routes to the neighbor 192.168.2.2,but it accepts all routes from 192.168.2.2.

Buy Now
Questions 102

You are configuring MPLS traffic-engineering tunnels in the core.

Which two ways exist for the tunnel path across the core? (Choose two )

Options:

A.

Tunnel links inherit IGP metrics by default unless overridden

B.

Tunnels can be configured with dynamic path or explicitly defined path

C.

A zero bandwidth tunnel is not a valid option

D.

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

Buy Now
Questions 103

Refer To the exhibit:

350-501 Question 103

On R1, which output does the show isis neighbors command generate?

A)

350-501 Question 103

B)

350-501 Question 103

C)

350-501 Question 103

D)

350-501 Question 103

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 104

Which module refers to the network automation using Ansible?

Options:

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Buy Now
Questions 105

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

Options:

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

Buy Now
Questions 106

Which additional configuration is required for NetFlow to provide traceback information?

Options:

A.

Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported.

B.

A classification ACL must be configured to identify which type of traffic will be analyzed.

C.

The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5.

D.

LLDP must be configured or the device will be unable to locate a NetFlow analyzer.

Buy Now
Questions 107

Refer to the exhibit.

350-501 Question 107

A network engineer at a large ISP Is configuring telemetry streams to monitor the health status of PE routers on the network using gRPC dial-out. The PE routers are located at several data centers in different physical locations, and they are using IS-IS and BGP for routing. Which additional configuration must the engineer implement on the PE routers to meet the goal?

Options:

A.

350-501 Question 107 Option 1

B.

107

C.

107

D.

107

Buy Now
Questions 108

How does TACACS+ facilitate secure connections for user access to network routers?

Options:

A.

The user's end device uses CHAP to securely query the network access server to authenticate the user via the TACACS+ protocol.

B.

The network access server communicates securely with a TACACS+ daemon to authenticate the user.

C.

The user provides a password over a secure connection to the TACACS+ server for authorization.

D.

The network access server communicates securely with the router via the TACACS+ protocol to authorize Telnet access by the user to specific parts of a router.

Buy Now
Questions 109

Refer to the exhibit.

350-501 Question 109

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

Options:

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Buy Now
Questions 110

Which function does orchestrated fulfillment perform under the Cisco Network Services Orchestrator model?

Options:

A.

It maintains the service topology in an inventory system to enable accurate assessment of service impact and support root-cause analysis.

B.

It translates the networking service high-level intent into device configurations, and pushes the configurations to physical and virtual devices.

C.

It leverages open-source NFV components such as OpenStack virtual infrastructure manager and Open vSwitch to create necessary service chains among VNFs.

D.

It instantiates virtual test probes to perform activation testing and provide ongoing measurement of service KPIs against defined SLAs.

Buy Now
Questions 111

ASN 65001 is peering with ASN 65002 to exchange IPv6 BGP routes. All routes that originate in ASN 65001 have a standard community value of 65001:100, and ASN 65002 is allowed to advertise only 2001 :db8:aaaa::/48. An engineer needs to update the ASN 65001 route-filtering configuration to meet these conditions:

* Looped routes into ASN 65001 and routes that have traversed 10 or more ASNs must be denied.

* Routes accepted into ASN 65001 must be assigned a community value of 65001:200.

Which configuration must the engineer apply to the ASN 65001 border router?

350-501 Question 111

350-501 Question 111

350-501 Question 111

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 112

Why is the keyword none needed when implementing management plane security using TACACS?

Options:

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Buy Now
Questions 113

350-501 Question 113

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?

Options:

A.

Configure transport connection-mod© passive on R2.

B.

Configure neighbor 172.16.172.1 authentication on R1

C.

Configure neighbor update-source lo0 on R2

D.

Configure remote-as 16213 on R1.

Buy Now
Questions 114

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

Options:

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.

Static routes on CE routers allow route leakage from a PE global routing table

Buy Now
Questions 115

350-501 Question 115

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

Options:

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Buy Now
Questions 116

350-501 Question 116

Refer to the exhibit. A growing company with an increasing international presence requires a secure and scalable solution for inter-office data transfer across their geographically dispersed locations. To ensure departmental privacy, the network must enforce granular access control. BGP is running in the network, and two VRF instances with unique route distinguishers and route targets have been configured to segregate critical financial data from regular network traffic. A network engineer with an employee ID: 5086:72:617 must find a solution that allows for future network expansion while maintaining robust security and data privacy between departments. The solution must comply with the RFC 4364 standard. Which action must the engineer take to meet the requirements?

Options:

A.

Configure a GRE tunnel in AH mode between the two routers.

B.

Configure MPLS in L3VPN mode between the two routers.

C.

Configure a DMVPN connection between the two routers with Phase 2 mode enabled.

D.

Configure an IPsec VPN connection between the two routers with ESP protocol enabled.

Buy Now
Questions 117

Which protocol does a Cisco MPLS TE tunnel use to maintain paths within the core?

Options:

A.

RSVP

B.

VTP

C.

STP

D.

RPF

Buy Now
Questions 118

350-501 Question 118

Refer to the exhibit. Router R1 is configured with class map CE with match Ip precedence critical to align with customer contract SLAs. The customer is sending all traffic from CE1 toward the FTP server with IP precedence 5 A network engineer must allow 10% of interface capacity on router R3 Which two actions must the engineer take to accomplish the task? (Choose two )

Options:

A.

lmptem4Dt4M$§ map on R1 to match all packets with QoS IP precedence value 100.

B.

Implement a class map on R3 to match all packets with QoS IP precedence value 101.

C.

Apply a policy map to R1 to reserve the remaining 10% of interface bandwidth.

D.

Apply a policy map to R3 to reserve 10% of interface bandwidth.

E.

Implement a class map on R3 to match all packets with QoS IP precedence.

Buy Now
Questions 119

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

Options:

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Buy Now
Questions 120

How does SR policy operate in Segment Routing Traffic Engineering?

Options:

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Buy Now
Questions 121

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

Options:

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Buy Now
Questions 122

What is the main purpose of EVPN?

Options:

A.

to provide simplified and flexible underlay connectivity for private VPN services

B.

to provide scalable, interoperable multitenancy in data center and cloud networks

C.

to provide advanced security features for IoT devices

D.

to provide application-aware networking capabilities in a cloud environment

Buy Now
Questions 123

Refer to the exhibit.

350-501 Question 123

Which the link aggregation configuration router is running on Cisco IOS XR software, which LACP interface configuration is needed to add the interface to the bundle?

350-501 Question 123

350-501 Question 123

350-501 Question 123

350-501 Question 123

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 124

350-501 Question 124

Refer to the exhibit. A company recently deployed a new network using OSPF in the core to share routes. The network administrator selected OSPF as the routing protocol because of its ability to maintain a route database. When the new network was started up, all routers booted normally, but the link between routers R1 and R2 failed to come up. The two routers are located in the same rack at the data center. Which task should an engineer perform to correct the problem?

Options:

A.

Synchronize the dead timers.

B.

Change one of the OSPF router IDs so that the router IDs are in different subnets

C.

Change the OSPF process ID on one of the devices so that the two IDs match

D.

Configure the MTUs on the interface to match.

Buy Now
Questions 125

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.

After you issue this command, which BGP packets does the PE accept?

Options:

A.

from 2.2.2.2, with a TTL ol 253 Of more

B.

from 2.2.2.2, with a TTL of less than 2

C.

to 2.2.2.2, with a TTL of less than 253

D.

to 2.2.2.2, with a TTL of 2 or more

Buy Now
Questions 126

Refer to the exhibit:

350-501 Question 126

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

Options:

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Buy Now
Questions 127

What is a characteristic of data modeling language?

Options:

A.

It provides an interface for state data.

B.

It separates configuration and state data.

C.

It ensures devices are individually configured.

D.

It replaces SNMP.

Buy Now
Questions 128

Refer to the exhibit.

350-501 Question 128

Router 1 is missing the route for the router 2 loopback 0. What should the engineer change to fix the problem?

Options:

A.

the area numbers on Router 1 and Router 2 to be similar

B.

the wildcard mask network statement in OSPF of Router 2

C.

Router 1 to be an ABR

D.

the hello timers on Router 1 and Router 2 to be different

Buy Now
Questions 129

An engineer Is implementing NSR with OSPF on a large campus that requires high availability. Which task must an engineer perform to complete the process with minimal disruption to traffic?

Options:

A.

Reset OSPF neighbor sessions to maintain state Information during router switchover

B.

Configure the device to repopulate state information using routing updates received from the BDR

C.

increase the keepalive interval on the OSPF neighbors so that traffic continues to pass during the switchover.

D.

Ensure that the dual RP has synchronized their state information before performing the switchover operation.

Buy Now
Questions 130

FRR is configured on a network. What occurs when the headend router on the path is alerted to a link failure over IGP?

Options:

A.

LSP attempts fast switching on the backup path until the primary path returns to the active state.

B.

The headend router uses a presignaled LSP to bypass the failure point.

C.

A new backup tunnel is established past the PLR to pass through the protected nodes

D.

Backup tunnel is established and intersects with the primary tunnel at the headend.

Buy Now
Questions 131

350-501 Question 131

Refer to the exhibit. A network engineer just upgraded the Cisco IOS XE Software to the newest version on OSPF routers R1 and R2, added the point-to-point network type under Gi0/0 on R2, and configured ip route 192.168.10.0 255.255.255.0 192.168.1.2 on R1. After the engineer restarted the routers, R1 entered the Exstart state with its neighbor, but the adjacency has not been established. Which action must the engineer take to resolve the issue?

Options:

A.

Set the network type of the R2 OSPF interface to broadcast.

B.

Add a static route toward 192.168.20.0 on R2.

C.

Change the R2 OSPF router ID to 10.1.1.1.

D.

Decrease the OSPF cost of the network on R2 to 10.

Buy Now
Questions 132

350-501 Question 132

Refer to the exhibit. An operations team recently located an archive of scripts for deploying routine network changes with an error-free approach. A junior network engineer, who is working to modify the scripts to support RESTCONF, has been asked to document the purpose of each updated script. Which two actions does the given script take? (Choose two.)

Options:

A.

Send a patch request to the API endpoint.

B.

Print a fail message when the response code is 204.

C.

Pass an XML data-format request in the API header.

D.

Print a success message when the device receives a full-content response code.

E.

Ignore SSL certificate verification.

Buy Now
Questions 133

Refer to the exhibit.

350-501 Question 133

An engineer is implementing Auto-RP and reviewing the configuration of the PE-A. Which configuration permits Auto-RP messages to be forwarded over this interface?

Options:

A.

PE-A(config-if)#ip pim sparse-mode

B.

PE-A(config-if)#no ip pim bsr-border

C.

PE-A(config-if)#ip igmp version 3

D.

PE-A(config-if)#ip pim sparse-dense-mode

Buy Now
Questions 134

Refer to the exhibit:

350-501 Question 134

A network engineer is implementing QoS services. Which two statements about the QoS-group keyword on Cisco IOS XR 3re true? (Choose two )

Options:

A.

The QoS group numbering corresponds to priority level

B.

QoS group marking occurs on the ingress

C.

It marks packets for end to end QoS pokey enforcement across the network

D.

QoS group can be used in fabric QoS policy as a match criteria

E.

It cannot be used with priority traffic class

Buy Now
Questions 135

Refer to the exhibit.

350-501 Question 135

If RC is a stub router, which entry must be injected so that it will send traffic outside the OSPF domain?

Options:

A.

virtual link between RB and RC

B.

sham link

C.

more specific route

D.

default route

Buy Now
Questions 136

Which regular expression query modifier function indicates the start of a string?

Options:

A.

^

B.

[^]

C.

+

D.

$

Buy Now
Questions 137

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

Options:

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Buy Now
Questions 138

350-501 Question 138

Refer to the exhibit. A junior network engineer has been configuring OSPF on two directly connected routers, R1 and R2, to establish a neighbor adjacency. The engineer also configured ip route 10.1.1.0 255.255.255.0 GigabitEthernet 0/1 10.10.10.1 on R1 to allow inbound management. After the initial configuration, the adjacency failed to form. The engineer changed the cost and area type under the OSPF configuration on R1, but the problem persists. Which action must the engineer take to resolve the issue?

Options:

A.

Change the network type on R2 to point-to-multipoint.

B.

Remove the static route on R1 and enable OSPF under the Gi0/1 interface.

C.

Set the OSPF process ID on R1 to match the OSPF process ID on R2.

D.

Decrease the OSPF cost on R1 to match the cost on R2.

Buy Now
Questions 139

Refer to the exhibit:

350-501 Question 139

Which command is used to complete this configuration for QoS class-based marking?

Options:

A.

PE-A(config-pmap-c)#set dscp ef

B.

PE-A(config-pmap-c)#fair-queue

C.

PE-A(config-pmap-c)#random-detect

D.

PE-A(config -pmap-c)#priority

Buy Now
Questions 140

What Is one of the differences between Ansible and Chef?

Options:

A.

Ansible uses YAML and Chef uses Ruby.

B.

Chef requires the use of Windows in the environment and Ansible requires Linux.

C.

Chef is highly scalable and Ansible is highly secure.

D.

Ansible uses Ruby and Chef uses Python.

Buy Now
Questions 141

Refer to the exhibit:

350-501 Question 141

Which configuration prevents the OSPF neighbor from establishing?

Options:

A.

mtu

B.

duplex

C.

network statement

D.

default-metric

Buy Now
Questions 142

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices'?

Options:

A.

It requires certificates for authentication.

B.

It is provided using NGINX acting as a proxy web server

C.

It is used for HTTP and HTTPS requests.

D.

It is not supported on Cisco devices

Buy Now
Questions 143

What are the two uses of the YANG data modeling language? (Choose two.)

Options:

A.

It is used to access a device by HTTP.

B.

It Is used to model the configuration used by NETCONF operations.

C.

It is used to shape state data of network elements.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

E.

It is used to replace the OSI model for troubleshooting.

Buy Now
Questions 144

Simulation2

TOPOLOGY

350-501 Question 144

350-501 Question 144

350-501 Question 144

Options:

Buy Now
Questions 145

Which statement describes the advantage of a Multi-Layer control plane?

Options:

A.

It automatically provisions monitors, and manages traffic across Layer 0 to Layer 3

B.

It minimizes human error configuring converged networks

C.

It supports dynamic wavelength restoration in Layer 0

D.

It provides multivendor configuration capabilities for Layer 3 to Layer 1

Buy Now
Questions 146

What happens when a segment-routing TE tunnel loses the link and there is no secondary path in place?

Options:

A.

The headend router generates a new path to the tail-end router using bandwidth to determine the best path.

B.

The tail-end router sends an alert to the syslog server that the tunnel and the secondary route are inaccessible.

C.

The headend router starts the invalidation timer to bring the tunnel down.

D.

The headend and tail-end routers revalidate SID hops to determine the proper label stack to reroute the traffic.

Buy Now
Questions 147

350-501 Question 147

Refer to the exhibit. A global company plans to implement BGP at its newest location to provide connectivity to other offices. The global infrastructure of the company is a multivendor environment. An engineer must review the BGP core configurations at headquarters to determine if they can be repurposed at the new location. The engineer copied this JSON script for review. What is the effect of the script?

Options:

A.

It configures BGP with neighbor 192.168.1.2 residing in AS 65514.

B.

It sets the BGP router-ID to 192.168.1.2 and sets the AS of the router to 65514.

C.

It configures BGP on the device and inserts 192.168.1.0/24 into the BGP table using the origin AS 65514.

D.

It configures a VRF named cisconode1 and a BGP instance using the VPNv4 address family.

Buy Now
Questions 148

Refer to the exhibit.

350-501 Question 148

An engineer must configure router R2 as the new P router in the network. Which configuration must be applied to R2 to enable LDP-IGP Sync on its L2 IS-IS adjacencies?

350-501 Question 148

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 149

A network engineer must enable multicast on the network to support a new series of webcasts. The PIM protocol has been enabled on the LAN side, with PIM and MSDP capabilities on edge router R1. The multicast source has been configured with IP address FF3A:121, and IP protocol 58 has been enabled and successfully tested in the network. Due to the limitations of some devices on the network, the data flow should take the most efficient path.

Which task must the engineer perform to achieve the goal?

Options:

A.

Enable PIM BSR on R1.

B.

Implement Anycast RP on R1.

C.

Implement PIM-SM in the LAN.

D.

Enable PIM-SSM across the network.

Buy Now
Questions 150

350-501 Question 150

Refer to the exhibit. A network engineer is configuring a new router for iBGP to improve the capacity of a growing network. The router must establish an iBGP peer relationship with its neighbor. The underlay network is already configured with the correct IP addresses. Which step should the engineer apply to complete this task?

Options:

A.

Implement multicast routing on the router to support BGP hellos.

B.

Configure the AS number for the router to share with its iBGP peers.

C.

Configure the new router as an iBGP route reflector to support multiple iBGP peers.

D.

Activate the BGP peers under the correct address family on the router.

Buy Now
Questions 151

Refer to the exhibit.

350-501 Question 151

An engineer with an employee 10:4350:47:853 is implementing IS-IS as the new routing protocol in the network. All routers in the network operate as Level 2 routers in the same private autonomous system, and the three branches are connected via dark fibre. The engineer has already implemented IS-IS on router R1 with NET address 49.0133.532b.ca14.6915.21311.F40F.1B3a.ba10.00. Which IS-IS NET address configuration must be implemented on R3 to establish IS-IS connectivity?

Options:

A.

49.0133.532b.ca14.6915.21311.f40f.1b4a.bb87.00

B.

49.0135.332b.ca14.6975.28371.1721.1b3b.ca11.10

C.

48.0133.532b.ca14.6915.21311.f40f.1626.bb98.00

D.

49.0133.532b.ca14.6915.21311.1721.1b4a.0013.01

Buy Now
Questions 152

Refer to the exhibit:

350-501 Question 152

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Buy Now
Questions 153

350-501 Question 153

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

Options:

A.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.

Configure the redistribute static and redistribute connected commands on R1.

Buy Now
Questions 154

350-501 Question 154

Refer to the exhibit. The radio network and packet core are using the route RX-RZ-RB to establish communication. The LDP session between 10.10.10.5 and 10.10.10.1 is experiencing link flapping at random intervals for 30-45 seconds each time. A network engineer must protect the LDP session and improve MPLS traffic convergence. Which action meets these requirements?

Options:

A.

Enable IGP_LDP sysnc on RZ and RX

B.

Add session protection duration 60 for peer_acl_1 under the MPLS LDP instance on RZ.

C.

Attach peer_acl_1 in for session protection duration 1 on RX.

D.

Configure Peer_acl_2 on RX and allow IP address 10.10.10.6 in LDP

Buy Now
Questions 155

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A)

350-501 Question 155

B)

350-501 Question 155

C)

350-501 Question 155

D)

350-501 Question 155

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 156

Refer to the exhibit:

350-501 Question 156

A network administrator wants to enhance the security for SNMP for this configuration.

Which action can the network administrator implement?

Options:

A.

Re-configure to use SNMPv2 with MD5 authentication

B.

Add a community string to the existing entry

C.

Re-configure to use SNMPv3.

D.

Maintain the configuration but switch to an encrypted password for device access through SSH

Buy Now
Questions 157

Which service is a VNF role?

Options:

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Buy Now
Questions 158

Refer to the exhibit:

350-501 Question 158

Which condition must be met by the OSPF peer of router R1 before the two devices can establish communication?

Options:

A.

The interface on the OSPF peer must use the same key ID and key value as the configured interface

B.

The interface on the OSPF peer may have a different key ID, but it must use the same key value as the configured interface

C.

The OSPF peer must be configured as an OSPF stub router

D.

The OSPF peer must use clear-text authentication

Buy Now
Questions 159

350-501 Question 159

Refer to the exhibit. Routers R1 and R2 are connected over the internet, with the connection passing over four different autonomous systems. The company must mitigate potential DDoS attacks and protect the CPUs of the routers. A network engineer must secure all external connections on edge router R1 based on RFC 5082. R2 has already been secured. Which task should the engineer perform on R1 to achieve the goal?

Options:

A.

Configure ip neighbor 182.12.91.5 bgp multihop-ttl 4 under the global configuration.

B.

Configure ip neighbor 182.12.91.5 ttl 4 under the global configuration.

C.

Configure neighbor 182.12.91.5 ttl-security hops 4 under the BGP configuration.

D.

Configure neighbor 182.12.91.5 bgp-ttl 4 under the BGP configuration.

Buy Now
Questions 160

How does Cisco DNA Center enhance network automation?

Options:

A.

It allows network administrators to quickly deploy Cisco Layer 2 devices without requiring STP and broadcast transport.

B.

It allows network administrators to reduce inconsistencies when they deploy and validate network configurations.

C.

It allows network administrators to reduce the number of VRFs in a multi customer environment by automatically implementing a single VLAN per customer.

D.

It allows network administrators to combine voice and data networks into a single topology without manual configuration.

Buy Now
Questions 161

350-501 Question 161

Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?

Options:

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

Buy Now
Questions 162

Refer to the exhibit.

350-501 Question 162

Which show command shows statistics for the control plane policy and is used to troubleshoot?

Options:

A.

show control-plane CoPP

B.

show control-plane

C.

show policy-map control-plane

D.

show policy control-plane

Buy Now
Questions 163

350-501 Question 163

Refer to the exhibit. An engineer must update the configuration of the network with these requirements:

    PE routers must define labels for IS-IS learned routes in AS100.

    P routers must not receive LDP bindings for the external network in the IPv6 address family.

Which configuration must the engineer implement to meet these requirements?

Options:

A.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global host-routes

B.

CE1(config)# mpls Idp label

 CE1(config-Idp-Ibl)# allocate global host-routes

C.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global prefix-list SPLDP

D.

PE1(config)# mpls Idp label

 PE1(config-Idp-Ibl)# no allocate global prefix-list Ipv6_All

Buy Now
Questions 164

Refer to the exhibit:

350-501 Question 164

Which statement about the status of the neighbor relationship between R1 and R2 is true?

Options:

A.

The neighbor relationship is down because the two routers are configured with different area types

B.

The neighbor relationship is down because the two routers are in the same subnet.

C.

The neighbor relationship is up because R2 is level 1 and level 2 router.

D.

The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different area

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
Last Update: Jan 19, 2026
Questions: 547

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99