Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) Questions and Answers

Questions 4

Which action occurs during the traceback phase of the six-phase approach to service provider security?

Options:

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Buy Now
Questions 5

Refer to the exhibit.

An engineer is updating this network to meet these conditions:

• Area 10 will receive inter-area routes and support mutual redistribution of external routes with the extranet.

• The ::/0 route is prohibited in Area 10.

• Area 11 will receive only the ::/0 route from the ABR.

• External route redistribution is not supported in Area 11.

• The ABR in Area 11 will advertise no interarea routes.

Which two configurations must be performed to meet the requirements? (Choose two.)

Options:

A.

Configure area 11 as nssa no-summary on R7 and as nssa on XR31.

B.

Configure area 10 as stub on R9 and XR32.

C.

Configure area 11 as stub no-summary on R7 and as stub on XR31.

D.

Configure area 11 as nssa default-information-originate on R7 and as nssa on XR31.

E.

Configure area 10 as nssa on R9 and XR32.

Buy Now
Questions 6

Which statement about the Cisco MPLS TE forwarding adjacency feature is true?

Options:

A.

It enables the headend and tailend routers to establish a bidirectional tunnel

B.

It enables the tailend router to advertise routes to the headend router over the tunnel

C.

It enables the MPLS core to use EIGRP as the routing protocol

D.

It enables the Cisco MPLS TE tunnel to be advertised into the running IGP.

Buy Now
Questions 7

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

Options:

A.

Change the helper-address value to 192.168.10.2 on RC.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Buy Now
Questions 8

Refer to the exhibit.

An engineer is trying to implement BGP configuration on a router Which configuration error prevents the ASBR from establishing a BGP neighborship to a directly connected BGP speaker?

Options:

A.

The routing policy is absent for this Cisco IOS XR eBGP instance.

B.

The IPv4 address family configuration under neighbor configuration-mode must be removed.

C.

The VPNv4 address family interferes with the 8GP IPv4 address family negotiations.

D.

The TCP session parameters are not specified.

Buy Now
Questions 9

What does DWDM use to combine multiple optical signals?

Options:

A.

frequency

B.

IP protocols

C.

time slots

D.

wavelength

Buy Now
Questions 10

Drag and drop the multicast concepts from the left onto the correct descriptions on the right.

Options:

Buy Now
Questions 11

Refer to the exhibit. The operations team for a service provider network is implementing a route map policy. OSPF area 0 should originate the default route with a type 2 metric of 2 when the application server on the connected interface (192.168.1.1) is up. Routers RL and RM have set up OSPF peering with other adjacent routers. Which action meets this requirement?

Options:

A.

Apply default-information originate route-map ospf-default-route on router RL.

B.

Configure distribute-list route-map ospf-default-route out on router RM.

C.

Configure distribute-list route-map ospf-default-route out on router RL.

D.

Apply default-information originate route-map ospf-default-route on router RM.

Buy Now
Questions 12

What are the two uses of the YANG data modeling language? (Choose two.)

Options:

A.

It is used to access a device by HTTP.

B.

It Is used to model the configuration used by NETCONF operations.

C.

It is used to shape state data of network elements.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

E.

It is used to replace the OSI model for troubleshooting.

Buy Now
Questions 13

What do Ansible and Salt Stack have in common?

Options:

A.

They both use DSL configuration language

B.

They both use YAML configuration language

C.

They both have agents running on the client machine

D.

They both can be designed with more than one master server

Buy Now
Questions 14

What do Chef and Puppet have in common?

Options:

A.

use Ruby

B.

use a master server

C.

require modules to be created from scratch

D.

manage agents referred to as minions

Buy Now
Questions 15

Drag and drop the LDP features from the left onto the correct usages on the right.

Options:

Buy Now
Questions 16

Which module refers to the network automation using Ansible?

Options:

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Buy Now
Questions 17

What is an enhancement that Cisco IOS XE Software has over Cisco IOS Software?

Options:

A.

It support symmetric multiprocessing

B.

It allows all processes to use the same pool of memory.

C.

It runs on a 32-bit operating system.

D.

It is built on a GNX Neutrino Microkernel.

Buy Now
Questions 18

FRR is configured on a network. What occurs when the headend router on the path is alerted to a link failure over IGP?

Options:

A.

LSP attempts fast switching on the backup path until the primary path returns to the active state.

B.

The headend router uses a presignaled LSP to bypass the failure point.

C.

A new backup tunnel is established past the PLR to pass through the protected nodes

D.

Backup tunnel is established and intersects with the primary tunnel at the headend.

Buy Now
Questions 19

An engineer must implement QoS to prioritize traffic that requires better service throughout the network. The engineer started by configuring a class map to identify the high-priority traffic. Which additional tasks must the engineer perform to implement the new QoS policy?

Options:

A.

Attach the class map to a policy map that sets the minimum bandwidth allocated to the classified traffic and designates the action to be taken on the traffic.

B.

Attach the class map to a policy map that designates the action to be taken on the classified traffic and then attach the policy map to an interface using a service policy.

C.

Attach the class map to a policy map within a VRF to segregate the high-priority traffic and then attach the policy map to an interface in another VRF.

D.

Create a route map to manipulate the routes that are entered into the routing table and then attach the route map to an interface using a service policy.

Buy Now
Questions 20

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

  • Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.
  • Other SNMP managers must not have access to objects.
  • SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 21

Refer to the exhibit.

Which task completes the configuration?

Options:

A.

Specify the maximum number of prefixes that R1 receives from neighbor 192.168.1.2.

B.

Specify the source interface in the neighbor statement.

C.

Specify the activate neighbor 192.168.1.2 under the IPv4 address family.

D.

Specify the local-as value in the neighbor statement.

Buy Now
Questions 22

Refer to the exhibit.

While troubleshooting the OSPF adjacency between routers R1 and R2 an engineer noticed that both routers are stuck in the EXCHANGE/EXSTART state. What should the engineer fix to solve the ongoing issue?

Options:

A.

match IPv4 addresses

B.

match OSPF areas

C.

match OSPF network types

D.

match MTU values

Buy Now
Questions 23

SIMULATION 4

Options:

Buy Now
Questions 24

What causes multicast traffic to permanently stay on the shared tree and not switch to the source tree?

Options:

A.

The SPT threshold is set to infinity.

B.

The RP IP address is configured incorrectly.

C.

The RP announcements are being filtered.

D.

SSM range is being used.

Buy Now
Questions 25

Refer to the exhibit:

What is the effect of this configuration?

Options:

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Buy Now
Questions 26

Refer to the exhibit:

Which condition must be met by the OSPF peer of router R1 before the two devices can establish communication?

Options:

A.

The interface on the OSPF peer must use the same key ID and key value as the configured interface

B.

The interface on the OSPF peer may have a different key ID, but it must use the same key value as the configured interface

C.

The OSPF peer must be configured as an OSPF stub router

D.

The OSPF peer must use clear-text authentication

Buy Now
Questions 27

Refer to the exhibit.

A network engineer with an employee id: 3812:12:993 has started to configure router R1 for IS-IS as shown. Which additional configuration must be applied to configure the IS-IS instance to advertise only network prefixes associated to passive interfaces?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 28

Simulation2

TOPOLOGY

Options:

Buy Now
Questions 29

Refer to the exhibit.

An engineer is configuring two routers to support MPLS LDP sessions between them. The R1 configuration is complete, and work has started on R2 as shown. Which additional configuration must the engineer apply to R2 to complete the task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

Options:

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.

Buy Now
Questions 31

Refer to the exhibit. A company recently deployed a new network using OSPF in the core to share routes. The network administrator selected OSPF as the routing protocol because of its ability to maintain a route database. When the new network was started up, all routers booted normally, but the link between routers R1 and R2 failed to come up. The two routers are located in the same rack at the data center. Which task should an engineer perform to correct the problem?

Options:

A.

Synchronize the dead timers.

B.

Change one of the OSPF router IDs so that the router IDs are in different subnets

C.

Change the OSPF process ID on one of the devices so that the two IDs match

D.

Configure the MTUs on the interface to match.

Buy Now
Questions 32

Refer to the exhibit:

What is the URL used for with REST API?

Options:

A.

It is used to contact a URL filter to determine the efficacy of a web address

B.

It is used to send a TACACS+ authentication request to a server

C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

D.

It is used to initiate an FTP session to save a running configuration of a device.

Buy Now
Questions 33

Which core component of MDT describes the data that an MDT-capable device streams to a collector?

Options:

A.

subscription

B.

encoder

C.

sensor path

D.

transport protocol

Buy Now
Questions 34

An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone that encapsulates Layer 2 and Layer 3 data Which action must the engineer perform on the routers to accomplish this task?

Options:

A.

Configure a EtherChannel for E-LAN.

B.

Configure a pseudowire for E-LINE.

C.

Configure Cisco MPLS TE for use with E-TREE.

D.

Configure QoS for MPLS and E-ACCESS

Buy Now
Questions 35

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

Options:

A.

Remove route filtering to speed repopulation of the link-state database

B.

Copy the router s existing state information and share the file with its peers to enable BGP soft resets

C.

Implement MPLS to forward packets while the RIB updates after a faliover.

D.

Implement Graceful Restart to mitigate the delay in MPLS LDP synchronization when the IGP starts up.

Buy Now
Questions 36

Refer to the exhibit.

An engineer is configuring router R1 for OSPFv3 as shown. Which additional configuration must be performed so that the three active interfaces on the router will advertise routes and participate in OSPF IPv6 processes?

A)

B)

C)

Options:

Buy Now
Questions 37

Refer to the exhibit.

What reestablishes the OSPF neighbor relationship between Router 1 and Router 2?

Options:

A.

authentication is added to the configuration

B.

correct wildcard mask is used on Router 2

C.

OSPF process IDs match

D.

hello intervals match

Buy Now
Questions 38

A network engineer is implementing NetFlow to observe traffic patterns on the network. The engineer is planning to review the patterns to help plan future strategies for monitoring and preventing congestion as the network grows. If the captures must include BGP next-hop flows, which configuration must the engineer apply to the router?

Options:

A.

ip cef

ip flow-export version 5 bgp-nexthop

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow egress

B.

ip cef

ip flow-export version 9 bgp-nexthop

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

C.

ip cef

ip flow-export version 5

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow ingress

cdp enable

D.

no ip cef

ip flow-export version 9

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

ip flow egress

Buy Now
Questions 39

Refer to the exhibit:

Which statement about the neighbor statements for 192.168.1.1 is true?

Options:

A.

The router must have TDP configured for the send-label command to operate

B.

The neighbor router receives at least four labels from this router

C.

The router sends BGP labels for its prefixes to this peer

D.

The router sends only a label for the prefix for LoopbackO.

Buy Now
Questions 40

Refer to the exhibit an engineer working for a private telecommunication company with an employee Id: 4065:96:080 upgrades the WAN link between routers ASBR-101 and ASBR-201 to 1Gb by Installing a new physical connection between the Gi3 Interfaces. Which BGP attribute must the engineer configure on ASBR-201 so that the existing WAN link on Gi2 Is maintained as a backup?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 41

Refer to the exhibit:

A network engineer is implementing a BGP protocol. Which effect of the local-as keyword in this configuration is true?

Options:

A.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 and the VPNv4 address family

B.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 without additional configuration

C.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 and the VPNv4 address family

D.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 without additional configuration.

Buy Now
Questions 42

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

Options:

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Buy Now
Questions 43

What is the role of NSO?

Options:

A.

Provides public cloud services for customers that need Internet access.

B.

Controls the turn-up of a device.

C.

Provides network monitoring services for Layer 3 devices.

D.

Maintains data storage.

Buy Now
Questions 44

Refer to the exhibit.

A network engineer Is implementing OSPF multiarea. Which command on interface G0/1 resolves adjacency Issues in the new area?

Options:

A.

Ip ospf network broadcast

B.

Ip ospf network non-broadcast

C.

Ip ospf network polnt-to-multlpoint

D.

Ip ospf network point-to-point

Buy Now
Questions 45

Which additional configuration is required for NetFlow to provide traceback information?

Options:

A.

Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported.

B.

A classification ACL must be configured to identify which type of traffic will be analyzed.

C.

The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5.

D.

LLDP must be configured or the device will be unable to locate a NetFlow analyzer.

Buy Now
Questions 46

What is a characteristic of the YANG model?

Options:

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Buy Now
Questions 47

A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 48

Refer to the exhibit.

A network operator working for a telecommunication company with an employee 3994:37:650 is implementing a cisco Unified MPLS solution. What is the effect of this implementation?

Options:

A.

EIGRP is deployed between the PEs and ABRs with RFC 3107.

B.

OSPF is deployed between the PEs and ABRs with RFC 3107.

C.

IS-IS is deployed between the PEs and ABRs with RFC 3107.

D.

BGP is deployed between the PEs and ABRs with RFC 3107.

Buy Now
Questions 49

Refer to the exhibit.

The network engineer who manages ASN 65001 must configure a BGP routing policy on GW-XR1 with these requirements:

• Advertise locally-originated routes and /24 prefixes assigned within the 198.18.0.0/15 range. All other prefixes must be dropped.

• Reachability to 198.18.100.0/24 must be preferred via the EDGE-1 connection.

• Reachability to 198.19.100.0/24 must be preferred via the EDGE-2 connection.

Which configuration must the network engineer implement on GW-XR1?

Options:

A.

Graphical user interface, text, application Description automatically generated

B.

Text Description automatically generated

C.

Graphical user interface, text, application, letter, email Description automatically generated

D.

Text, letter, email Description automatically generated

Questions 50

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

Options:

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

Buy Now
Questions 51

Refer to the exhibit.

An engineer applied a gRPC dial-in configuration on customer's router to provide connection multiplexing and two-way streaming. What does this configuration accomplish in a gRPC?

Options:

A.

It is the encoding requested by the gRPC server.

B.

IT is the encoding that is used for dial-in and dial-out.

C.

It is used for encoding with the default protocol buffers

D.

It is the encoding requested by the gRPC client.

Buy Now
Questions 52

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 53

Refer to the exhibit.

A network engineer must meet these requirements to provide a connects, solution:

  • The customer connected to Area 2 needs to access the application in Area 1 on the 10.10.10.0/24 subnet
  • The Customer must not have access to the 20.10 30.0/24 subnet.
  • The service provider must make sure that the Area 2 routing database limits the number of IP addresses in the routing table

Which two configurations must be implemented to meet the requirements? (Choose two)

Options:

A.

Set a tag value of 200 to match the summary address 10.0.0/16 on R2.

B.

Set a tag value of 200 to match the summary address 10.0.0.0/16 on R3.

C.

Apply the route map for tag 200 and leak Level 2 routes into Level 1 Area 2 on R3

D.

Apply the route map for tag 200 and teak Level 2 routes into Level 1 Area 2 on R4.

E.

Set a tag value of 200 to match the summary address 10.0.0./16 on R1.

Buy Now
Questions 54

Which statement describes the advantage of a Multi-Layer control plane?

Options:

A.

It automatically provisions monitors, and manages traffic across Layer 0 to Layer 3

B.

It minimizes human error configuring converged networks

C.

It supports dynamic wavelength restoration in Layer 0

D.

It provides multivendor configuration capabilities for Layer 3 to Layer 1

Buy Now
Questions 55

Refer to the exhibit.

A Cisco engineer is implementing gRPC dial-out on an ASR. Receiver 192.168 1.1 will be assigned one of the subscriptions, and it will manage the ASR. Which command is needed to complete the router configuration?

Options:

A.

protocol grpc

B.

protocol all

C.

protocol tcp

D.

protocol any

Buy Now
Questions 56

An engineer working for a telecommunication company with an employee ID: 4460:35:466 must configure an OSPF router in a multivendor network so that it performs NSF in the event of a route processor switchover. Which configuration must the engineer apply?

Options:

A.

router ospf 1 nsf Cisco

B.

router ospf 1 nsf ietf

C.

router ospf 1 nsf ietf helper

D.

router ospf 1 nsf Cisco helper

Buy Now
Questions 57

Refer to the exhibit:

Which configuration prevents the OSPF neighbor from establishing?

Options:

A.

mtu

B.

duplex

C.

network statement

D.

default-metric

Buy Now
Questions 58

Refer to the exhibit. Four midsize service providers provide access to different customers that use Layer 3 VPN services to enable communication across geographic regions. The service providers are connected as shown in the exhibit, and the PEs have established eBGP relationships. PE4 has an IBGP relationship with PE5. The routes that PE4 learns from PE5 must reach the other PE routers, but they are absent from the routing tables on the other PES. Which action should the engineers take to correct the problem?

Options:

A.

Configure a peering between all five Pes.

B.

Disable BGP synchronization on PE4.

C.

Enable BOP IPv4 unicast on PE4 and PE5

D.

Advertise the route targets for PE5 to the other PEs

Buy Now
Questions 59

Drag and drop the OSPF area types from the left onto the correct statements on the right

Options:

Buy Now
Questions 60

What is the characteristic of the Tl-LFA?

Options:

A.

It guarantees a loop-free path for all interfaces in the OSPf- super backbone .

B.

It applies on each area and instance and makes all the interfaces inherit the configuration

C.

It guarantees a loop-free path for all areas configured m OSPF

D.

It applies only on the instance and makes at the interfaces inherit the configuration

Buy Now
Questions 61

Refer to the exhibit.

An administrator working for large ISP must connect its two POP sites to provide internet connectivity to its customers. Which configuration must the administrator perform to establish an iBGP session between routers PE1 on POP site 1 and PE2 on POP site 2?

Options:

A.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#no neighbor 172.18.10.1 shutdown

PE2(config-router)#end

B.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#no neighbor 172.19.10.10 shutdown

PE1(config-router)#end

C.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#address-family ipv4 unicast

PE1(config-router-af)#neighbor 172.19.10.10 activate

PE1(config-router-af)#end

D.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#address-family ipv4 unicast

PE2(config-router-af)#neighbor 172.18.10.1 activate

PE2(config-router-af)#end

Buy Now
Questions 62

When Cisco lOS XE REST API uses HTTP request methods what is the purpose of a PUT request?

Options:

A.

retrieves the specified resource or representation

B.

submits data to be processed to the specified resource

C.

updates the specified resource with new information

D.

creates a new resource

Buy Now
Questions 63

Refer to the exhibit A network engineer is in the process of implementing IS-IS Area 1 and Area 2 on this network to segregate traffic between different segments of the network The hosts in the two new areas must maintain the ability to communicate with one another In both directions. Which additional change must be applied?

Options:

A.

Reconfigure either R3 or R4 as a Level 1/Level 2 router.

B.

Reconfigure routers R1, R2 R5. and R6 as Level 1/Level 2 routers.

C.

Reconfigure routers R2 and R5 as Level 1/Level 2 routers.

D.

Reconfigure routers R4, R5 and R6 as Level 1 routers

Buy Now
Questions 64

Refer to the exhibit.

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 65

Refer to the exhibit.

Which configuration must be implemented on router R8 so that it will establish OSPF adjacency with R5?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 66

A customer of an ISP requests support to setup a BGP routing policy. Which BGP attribute should be configured to choose specific BGP speakers as preferred exit

points for the customer AS?

Options:

A.

highest local preference outbound

B.

lowest local preference inbound

C.

highest local preference inbound

D.

lowest multi-exit discriminator

Buy Now
Questions 67

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 68

Which OoS model allows hosts to report their QoS needs to the network?

Options:

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Buy Now
Questions 69

Which benefit is provided by FRR?

Options:

A.

It provides fast forwarding path failure detection times for all media.

B.

It provides rapid failure detection between forwarding engines.

C.

It provides performance data for the service provider network.

D.

It protects Cisco MPLS TE LSPs from link and node failures.

Buy Now
Questions 70

Drag and drop the OSPF and IS-IS Cisco MPLS TE extensions from the left to their functional descriptions on the right.

Options:

Buy Now
Questions 71

Drag and drop the functionalities from the left onto the target fields on the right.

Options:

Buy Now
Questions 72

Refer to the exhibit. A large organization is merging the network assets of a recently acquired competitor with one of its own satellite offices in the same geographic area. The newly acquired network is running different routing protocol than the company's primary network. As part of the merger a network engineer implemented this route map Which task must the engineer perform to complete the Implementation?

Options:

A.

Attach the route map to an IS-IS network statement to advertise the routes learned on this interface to IS-IS

B.

Enable metric style wide to allow the use of extended metrics from the protocols

C.

Attach the route map to the redistribution command to manipulate the routes as they are shared

D.

Configure an additional route map sequence to override the implicit deny at the end of the route map

Buy Now
Questions 73

A remote operation center is deploying a set of l-BGP and E-BGP connections for multiple IOS-XR platforms using the same template. The l-BGP sessions exchange prefixes with no apparent issues, but the E-BGP sessions do not exchange routes. What causes this issue?

Options:

A.

A PASS ALL policy has no! been implemented for the l-BGP neighbors.

B.

The next-hop-self command is not implemented on both E-BGP neighbors.

C.

The E-BGP neighbors are not allowed to exchange information doe to the customer platforms default policy.

D.

The l-BGP neighbors are mistyped and HELLO packets cannot be exchanged successfully between routers.

Buy Now
Questions 74

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

Options:

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

Buy Now
Questions 75

How is RSVP used with MPLS traffic engineering tunnels?

Options:

A.

It assigns a tag to a packet as it travels through the tunnel.

B.

It removes and reassigns an MPLS label when the packet enters the tunnel.

C.

It reduces the CPU burden when a packet travels through the tunnel.

D.

It reserves bandwidth along the path of the tunnel.

Buy Now
Questions 76

Which two tasks must you perform when you implement LDP NSF on your network? (Choose two.)

Options:

A.

Enable NSF for EIGRP

B.

Enable NSF for the link-state routing protocol that is in use on the network.

C.

Disable Cisco Express Forwarding

D.

Implement direct connections for LDP peers

E.

Enable NSF for BGP

Buy Now
Questions 77

Refer to the exhibit. Which additional configuration must an engineer to the adge router to inject a default router into the MP-BGP address family for the internet_Shared_Services dedicated VRF?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 78

Refer to the exhibit.

A network engineer is deploying SNMP configuration on client's routers. Encrypted authentication must be included on router 1 to provide security and protect message confidentially. Which action should the engineer perform on the routers to accomplish this task?

Options:

A.

snmp-server host 192.168.0.254 informs version 3 auth testuser config.

B.

snmp-server user testuser group 1 remote 192.168.0.254 v3 auth md5 testpassword

C.

snmp-server group group 1 v3 auth.

D.

snmp-server community public

Buy Now
Questions 79

Refer to the exhibit.

What does the number 2 mean in the configuration?

Options:

A.

It dictates the number of sessions that will be open with the SNMP manager

B.

It represents the version of SNMP running.

C.

It indicates two SNMP managers are able to read and write with the agent using community string ciscotest.

D.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent.

Buy Now
Questions 80

Refer to the exhibit. A global company plans to implement BGP at its newest location to provide connectivity to other offices. The global infrastructure of the company is a multivendor environment. An engineer must review the BGP core configurations at headquarters to determine if they can be repurposed at the new location. The engineer copied this JSON script for review. What is the effect of the script?

Options:

A.

It configures BGP with neighbor 192.168.1.2 residing in AS 65514.

B.

It sets the BGP router-ID to 192.168.1.2 and sets the AS of the router to 65514.

C.

It configures BGP on the device and inserts 192.168.1.0/24 into the BGP table using the origin AS 65514.

D.

It configures a VRF named cisconode1 and a BGP instance using the VPNv4 address family.

Buy Now
Questions 81

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 82

Refer to the exhibit. A network engineer received a complaint about these problems in OSPF stub area 100:

  • The Ethernet link is down between routers RX and RY because the fiber was cut.
  • CE site A traffic to the hub site is being dropped.

Which action resolves these issues?

Options:

A.

Set the OSPF authentication type to MD5 between RX and RY DUMPS

B.

Change the OSPF area 100 type to stub on RZ.

C.

Change the OSPF priority to 100 on the interfaces that connect RX and RY.

D.

DUMPS Set the OSPF MTU to 1500 on the link between RX and RZ.

Buy Now
Questions 83

Which feature describes the adjacency SID?

Options:

A.

It applies only to point-to-point links.

B.

It applies only to multipoint links

C.

It is locally unique

D.

It is globally unique.

Buy Now
Questions 84

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

Options:

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

Buy Now
Questions 85

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Buy Now
Questions 86

Refer to the exhibit.

What is the result of this configuration?

Options:

A.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization.

B.

Router 1 and the TACACS+ server maintain one open connection between them only when network administrator is accessing the router with password ciscotest.

C.

Router 1 and the TACACS+ server maintain one open connection between them.

D.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authentication.

Buy Now
Questions 87

Refer to the exhibit.

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

Options:

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Buy Now
Questions 88

Refer to the exhibit. A network engineer observed congestion between routers R1 and R4, which are connected on a point-to-point link. Two servers that reside on networks on R1 and R4 generate heavy traffic between them with most traffic going from R4 to R1. To improve overall performance, the engineer wants to drop inbound packets that exceed a configured threshold, without disrupting traffic that passes from R4 to R3. Which action must the engineer take to resolve the issue?

Options:

A.

Implement traffic policing to drop packets that exceed the given threshold.

B.

Implement FIFO to queue excess traffic for transmission when bandwidth is available.

C.

Implement traffic shaping to drop excess packets.

D.

Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.

Buy Now
Questions 89

Refer to the exhibit:

If router RA is configured as shown, which IPv4 multicast address space does it use?

Options:

A.

224.0. 0.0/8

B.

225.0. 0.0/8

C.

232.0. 0.0/8

D.

239.0. 0.0/8

Buy Now
Questions 90

Refer to the exhibit. The radio network and packet core are using the route RX-RZ-RB to establish communication. The LDP session between 10.10.10.5 and 10.10.10.1 is experiencing link flapping at random intervals for 30-45 seconds each time. A network engineer must protect the LDP session and improve MPLS traffic convergence. Which action meets these requirements?

Options:

A.

Enable IGP_LDP sysnc on RZ and RX

B.

Add session protection duration 60 for peer_acl_1 under the MPLS LDP instance on RZ.

C.

Attach peer_acl_1 in for session protection duration 1 on RX.

D.

Configure Peer_acl_2 on RX and allow IP address 10.10.10.6 in LDP

Buy Now
Questions 91

An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?

Options:

A.

vrf upgrade-cli

B.

bgp upgrade-cli

C.

address-family ipv4

D.

ip bgp-community new-format

Buy Now
Questions 92

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

Options:

A.

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

B.

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

C.

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

D.

The link state database provides segmentation by area, which improves the path-selection process

Buy Now
Questions 93

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

Options:

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Buy Now
Questions 94

Drag and drop the characteristics from the left onto the automation tool on the right.

Options:

Buy Now
Questions 95

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service-provider core network with these requirements:

  • RC must establish LDP peering with the loopback IP address as its Router ID
  • RA must establish LDP peering with RB. RC, and RY.

How must the team update the network configuration to successfully enable LDP peering between RA and RC?

Options:

A.

Enable the mpls ip command on RC interface Gi2/0. DUMPS

B.

Configure the mpls Idp router-Id loopback0 command on RA and RC.

C.

Implement LDP session protection on RA.

D.

DUMPS Reset the discover hello hold time and interval to their default values.

Buy Now
Questions 96

What are two factors to consider when implementing NSR High Availability on an MPLS PE router? (Choose two.)

Options:

A.

It consumes more memory and CPU resources than NSF

B.

It operates normally without NSR support on the PE peers.

C.

It requires all PE-CE sessions to support NSR

D.

It requires routing protocol extensions

E.

It cannot sync state information across redundant RPs

Buy Now
Questions 97

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

Options:

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Buy Now
Questions 98

Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?

Options:

A.

OTCP

B.

OMP

C.

UDP

D.

BGP

Buy Now
Questions 99

Refer to the exhibit.

If RC is a stub router, which entry must be injected so that it will send traffic outside the OSPF domain?

Options:

A.

virtual link between RB and RC

B.

sham link

C.

more specific route

D.

default route

Buy Now
Questions 100

A network engineer must configure a router for Flexible NetFlow IPFIX export. The IP address of the destination server is 172.17.12.1. The source address must be set to the Loopback0 IPv4 address and exported packets must be set to DSCP CS3. The TTL must be 64 and the transport protocol must be set to UDP with destination port 4739. Which configuration must the engineer apply to the router?

Options:

A.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 3

ttl 64

export-protocol netflow-v9

transport udp 4739

end

B.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 24

ttl 64

export-protocol ipfix

end

C.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 24

ttl 64

export-protocol netflow-v9

transport udp 4739

end

D.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 3

ttl 64

export-protocol ipfix

end

Questions 101

Refer to the exhibit. Which part of the diagram will host OpenStack components?

Options:

A.

Aggregation

B.

UCS Series

C.

Access

D.

Core

Buy Now
Questions 102

A network engineer is implementing BFD configuration changes on a customer's equipment. How is the bfd interval configuration on the interface disconnected?

Options:

A.

The status of the interface changes.

B.

The IPv4 or IPv6 address configuration on the interface changes.

C.

It is automatically disconnected when the BFD-configured subinterface is removed.

D.

It is automatically disconnected when the BFD main interface is removed.

Buy Now
Questions 103

A network architect plans to implement MPLS OAM to provide additional troubleshooting functionality for the NOC team. After analyzing the configuration on the MPLS P/PE nodes, the architect decides to revise the CoPP policies. Which two actions ensure that the new solution is secure? (Choose two.)

Options:

A.

Allow port 3505 in the outbound direction only.

B.

Allow the ICMP protocol only.

C.

Allow the TCP and UDP protocols.

D.

Allow the UDP protocol only.

E.

Allow port 3503 in the inbound direction only.

Buy Now
Questions 104

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

Options:

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Buy Now
Questions 105

Refer to the exhibit.

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

Options:

A.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Buy Now
Questions 106

Refer to the exhibit:

What does the REST API command do?

Options:

A.

It retrieves the information requested by Descriptions xml

B.

It removes the information identified by Descriptions xml

C.

It executes the commands specified in Descriptions xml

D.

It displays the information identified by Descriptions xml

Buy Now
Questions 107

Refer to the exhibit. Tier 2 ISP A on AS 653 is connected to two Tier 1 ISPs on AS 321 and AS 51 respectively. The network architect at ISP A is planning traffic flow inside the network to provide predictable network services. Cisco Express Forwarding is disabled on the edge router. How should the architect implement BGP to direct all traffic via the Tier 1 ISP with next-hop 7.4.5.2?

Options:

A.

Implement the BGP routing protocol and run the bgp deterministic-med command.

B.

Implement MP-BGP with a 4-byte AS number with the bgp best path compare-routerid command.

C.

Implement the BGP routing protocol and the maximum-paths 2 configuration.

D.

Implement BGP route-reflector functionality with the bgp always-compare-med configuration.

Buy Now
Questions 108

Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?

Options:

A.

routing and tunneling when doing symmetric IRB

B.

routing when doing asymmetric IRB

C.

routing and bridging when doing asymmetric IRB

D.

bridging when doing symmetric IRB

Buy Now
Questions 109

Refer To the exhibit.

Which BGP attribute should be manipulated to have CE1 use PE1 as the primary path to the Internet?

Options:

A.

The weight attribute should be manipulated on PE1 on outbound routes advertised to CE1.

B.

The MED should be manipulated on CE1 on inbound routes from PE1.

C.

The local preference attribute should be manipulated on PE2 on inbound routes advertised to CE1.

D.

The origin of all routes should be modified on each router on inbound and outbound routes advertised to CE1.

Buy Now
Questions 110

Refer to the exhibit:

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

Options:

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Buy Now
Questions 111

Which component is similar to an EVPN instance?

Options:

A.

MPLS label

B.

IGP router ID

C.

VRF

D.

router distinguisher

Buy Now
Questions 112

Refer to the exhibit.

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 113

Refer to the exhibit.

What type of configuration is it?

Options:

A.

It is configuration that requires an explicit Cisco MPLS TE path to be configured for the tunnel to run.

B.

It is configuration that requires OSPF to also be running to have optimized Cisco MPLS TE tunnels.

C.

It is configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing.

D.

It is configuration that requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run.

Buy Now
Questions 114

A network engineer has configured TE tunnels in the MPLS provider core. Which two steps ensure traffic traverse? (Choose two.)

Options:

A.

Static routes is the only option for directing traffic into a tunnel.

B.

ECMP between tunnels allows RSVP to function correctly.

C.

Forwarding adjacency features allows a tunnel to be Installed in the IGP table as a link.

D.

The IGP metric of a tunnel is configured to prefer a certain path

E.

A tunnel weight is configured in SPF database the same way as a native link.

Buy Now
Questions 115

After a series of unexpected device failures on the network. a Cisco engineer is deploying NSF on the network devices so that packets continue to be forwarded during switchovers The network devices reside in the same holding, but they are physically separated into two different data centers Which task must the engineer perform as part of the deployment?

Options:

A.

implement OSPF to maintain the link-state database during failover.

B.

implement VRFs and specify the forwarding instances that must remain active during failover.

C.

implement an L2VPN with the failover peer to share state Information between the active and standby devices.

D.

implement Cisco Express Forwarding to provide forwarding during failover

Buy Now
Questions 116

Refer to the exhibit.

An engineer is reviewing the BGP configuration. Which routes must be advertised to 10.10.10.1

Options:

A.

Local routes are permitted, and routes from other ASNs are denied.

B.

All routes whether local or from other ASNs are denied.

C.

Local routes are denied, and routes from other ASNs are permitted.

D.

All routes whether local or from other ASNs are permitted.

Buy Now
Questions 117

Refer to the exhibit.

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 118

An engineer working for telecommunication company with an employee id: 3715 15 021 needs to secure the LAN network using a prefix list Which best practice should the engineer follow when he implements a prefix list?

Options:

A.

An engineer must use non sequential sequence numbers in the prefix list so that he can insert additional entries later.

B.

The final entry in a prefix list must be /32

C.

An engineer must identity the prefix list with a number only

D.

An engineer must include only the prefixes for which he needs to log activity.

Buy Now
Questions 119

Which statement about Network Services Orchestrator (NSO) is true?

Options:

A.

It is used only in service provider environments

B.

It can be used only with XML coding

C.

It uses YANG modeling language to automate devices

D.

It must use SDN as an overlay for addressing

Buy Now
Questions 120

Refer to the exhibit.

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs to the interface states of Gi0/0/0/0 and Gi0/0/0/1?

Options:

A.

Gi0/0/0/1 and Gi0/0/0/0 become active

B.

Gi0/0/0/1 and Gi0//0/0 remains standby

C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby

D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby

Buy Now
Questions 121

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

Options:

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Buy Now
Questions 122

What are two features of stateful NAT64? (Choose two.)

Options:

A.

It uses address overloading.

B.

It provides 1:N translations, so it supports an unlimited number of endpoints.

C.

It requires IPv4-translatable IPv6 address assignments.

D.

It requires the IPv6 hosts to use either DHCPv6-based address assignments or manual address assignments.

E.

It provides 1:1 translation, so it supports a limited number of endpoints.

Buy Now
Questions 123

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

Options:

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Buy Now
Questions 124

Refer to the exhibit. The application server in the data center hosts voice, video, and data applications over the internet. The data applications run more slowly than the voice and video applications. To ensure that all applications run smoothly, the service provider decided to implement a QoS policy on router PER 2 to apply traffic shaping. Which two actions must an engineer take to implement the task? (Choose two.)

Options:

A.

Configure the scheduling function to handle delayed packets.

B.

Enable packet remarking for priority traffic.

C.

Configure a queue to buffer excess traffic.

D.

Set the token value for secondary traffic.

E.

Set a threshold to discard excess traffic.

Buy Now
Questions 125

A network engineer is deploying VPLS configuration between multiple PE routers so that customer's remote offices have end-to-end LAN connectivity. Which additional configuration should the engineer perform on the PE routers to enable the virtual switch instance?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 126

Refer to the exhibit.

A network engineer at a large ISP Is configuring telemetry streams to monitor the health status of PE routers on the network using gRPC dial-out. The PE routers are located at several data centers in different physical locations, and they are using IS-IS and BGP for routing. Which additional configuration must the engineer implement on the PE routers to meet the goal?

Options:

A.

Text, letter Description automatically generated

B.

Text Description automatically generated

C.

Graphical user interface, text Description automatically generated

D.

Text, letter Description automatically generated

Buy Now
Questions 127

Refer to the exhibit:

Which statement describes the effect of this configuration?

Options:

A.

It applies a service policy to all interfaces remarking HTTP traffic

B.

It creates an ACL named WEB that filters HTTP traffic.

C.

It matches HTTP traffic for use in a policy map

D.

It modifies the default policy map to allow all HTTP traffic through the router

Buy Now
Questions 128

Simulation 6

Options:

Buy Now
Questions 129

Refer to the exhibit.

Router R1 is reporting that its BGP neighbor adjacency to router R2 is down, but its state is Active as shown. Which configuration must be applied to routers R1 and R2 to fix the problem?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 130

A network engineer is configuring Flexible NetFlow and enters these commands

What are two results of implementing this feature instead of traditional NetFlow? (Choose two.)

Options:

A.

CPU and memory utilization are reduced.

B.

Only the flows of top 100 talkers are exported.

C.

The data export flow is more secure

D.

The number of packets to be analyzed are reduced.

E.

The accuracy of the data to be analyzed is improved.

Buy Now
Questions 131

Refer to the exhibit:

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Buy Now
Questions 132

Which service is a VNF role?

Options:

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Buy Now
Questions 133

Refer to the exhibit.

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Last Update: Apr 24, 2024
Questions: 452

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90