Summer Sale - Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

350-501 Sample Questions Answers

Questions 4

Refer to the exhibit.

A network engineer is implementing OSPF multiarea. Which command on interface GO/1 resolves adjacency issues in the new area?

Options:

A.

ip ospf network broadcast

B.

ip ospf network point-to-point

C.

ip ospf network non-broadcast

D.

ip ospf network point-to-multipoint

Buy Now
Questions 5

The network team is planning to implement IPv6 on the company’s existing IPv4 network infrastructure. The network currently uses IS-IS to share routes between peers. Which task must the team perform so that IS-IS will run in multitopology mode on the updated IPv6 network?

Options:

A.

Configure the links between the network routers as point-to-point.

B.

Configure the network routers to use metric-style wide.

C.

Configure the network routers as Level 2 routers.

D.

Configure the IS-IS IPv6 metric on the dual-stack links.

Buy Now
Questions 6

Refer to the exhibits:

R1 and R2 are directly connected and IS-IS routing has been enabled between R1 and R2 R1 message periodically Based on this output, which statement is true?

Options:

A.

IS-IS neighbor authentication is failing for Level 2 first and then for Level 1 PDUs

B.

1S-1S neighbor authentication is failing for Level 1 and Level 2 PDUs .

C.

IS-IS neighbor authentication is failing for Level 1 PDUs only

D.

IS-IS neighbor authentication is failing for Level 2 PDUs only.

Buy Now
Questions 7

Refer to the exhibit.

A network engineer is configuring customer edge routers to finalize a L2VPN over MPLS deployment Assume that the AToM L2VPN service that connects the two CEs is configured correctly on the service provider network Which action causes the solution to fail?

Options:

A.

A loopback with a /32 IP address has not been used

B.

OSPF does not work with L2VPN services

C.

The xconnect statement has not been defined

D.

The routing protocol network types are not compatible

Buy Now
Questions 8

Why do packet loops occur during the configuration of BlDlR-PIM?

Options:

A.

The network does not support BIDIR-PIM

B.

The network is partially upgraded to support BIDlR-PIM

C.

No interface for carrying traffic for multicast groups has been configured

D.

The router has not been configured to advertise itself

Buy Now
Questions 9

What is a characteristics of the Pipe model for MPLS QoS?

Options:

A.

The same QoS policy is applied to all customer traffic on the egress PE.

B.

If the outer EXP is changed, it is copied to the DSCP value.

C.

The MPLS EXP bits are set by the CE.

D.

The DSCP value determines how the packet is forwarded

Buy Now
Questions 10

Which BGP attribute is used first when determining the best path?

Options:

A.

origin

B.

AS path

C.

local preference

D.

weight

Buy Now
Questions 11

Refer to the exhibit:

After implementing a new design for the network, a technician reviews the pictured CLI output as part of the MOP.

Which two statements describe what the technician can ascertain from the ImpNull output? (Choose two.)

Options:

A.

Label 0 is used for the prefix displayed but will not be part of the MPLS label stack for packets destined for 192 168.10.10.

B.

Ultimate Hop Popping is in use for the prefix displayed.

C.

Label 0 is used for the prefix displayed and will be part of the MPLS label stack for packets destined for 192.168.10.10

D.

Penultimate Hop Popping is in use for the prefix displayed

E.

Label 3 is in use for the prefix displayed and will be part of the MPLS label stack for packets destined for 192.168.10.10

Buy Now
Questions 12

Refer to the exhibit:

Which two statements about the ISIS topology are true? (Choose two.)

Options:

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

All four routers are operating as Level 1-2 routers.

D.

R1 and R2 are Level 2 neighbors.

E.

R1 and R4 are Level 2 neighbors

Buy Now
Questions 13

Refer to the exhibit:

What is significant about the number 2 in the configuration?

Options:

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Buy Now
Questions 14

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

Options:

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Buy Now
Questions 15

Refer to the exhibit. A network engineer is implementing iBGP and eBGP between AS 600 and AS 500 with these requirements:

  • R2 must establish eBGP peering on 192.168.3.0/30 with R5 for sending unicast and multicast traffic
  • R2 must wait for 30 seconds before sending BGP updates to R5 for multicast traffic.

Which action must be taken on R2 to meet the requirements?

Options:

A.

Configure advertisement-interval 30 In address-family ipv4 unicast

B.

Configure advertisement-Interval 30 in address-family Ipv4 multicast

C.

Apply timers bgp 30 in address-family ipv4 unicast

D.

Apply timers bgp 30 in address-family ipv4 multicast.

Buy Now
Questions 16

Refer to the exhibit.

Which task completes the configuration?

Options:

A.

Specify the maximum number of prefixes that R1 receives from neighbor 192.168.1.2.

B.

Specify the source interface in the neighbor statement.

C.

Specify the activate neighbor 192.168.1.2 under the IPv4 address family.

D.

Specify the local-as value in the neighbor statement.

Buy Now
Questions 17

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

Options:

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.

Static routes on CE routers allow route leakage from a PE global routing table

Buy Now
Questions 18

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

Options:

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Buy Now
Questions 19

Which capability does the MPLS TE FRR facility backup protection method provide?

Options:

A.

defining the set of characteristics for the backup TE LSP

B.

leveraging label stacking to protect selected TE LSPs using a single backup TE LSP

C.

creating a bypass LSP for each protected LSP at each point of local repair

D.

assigning a backup TE LSP tunnel to the protected node at the headend of the protected TE LSP

Buy Now
Questions 20

Egress PE NAT is being used via a single centralized router to provide Internet access to L3VPN customers.

Which description of the NAT operation is true?

Options:

A.

Users m different VRFs cannot share the same outside global IP address

B.

The NAT table contains a field to identify the inside VRF of a translation

C.

Multiple address pools are needed for the same L3VPN because each site has a separate NAT

D.

The different L3VPNs using the Internet access must not have IP overlaps internally

Buy Now
Questions 21

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

Options:

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Buy Now
Questions 22

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-

Configure and verify the OSPF neighbor adjacency between R1 and R2 in OSPF area 0 according to the topology to achieve these goals:

1. Establish R1 and R2 OSPF adjacency. All interfaces must be advertised in OSPF by using the OSPF interface command method. Use Loopback0 as the OSPF ID.

2. There must be no DR/BDR elections in OSPF Area 0 when establishing the neighbor relationship between R1 and R2. OSPF must not generate the host entries /32 for the adjacent interfaces.

3. Enable OSPF MD5 Authentication between both routers at the interface level with password C1sc0!.

Options:

Buy Now
Questions 23

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Buy Now
Questions 24

Which core component of MDT describes the data that an MDT-capable device streams to a collector?

Options:

A.

subscription

B.

encoder

C.

sensor path

D.

transport protocol

Buy Now
Questions 25

Refer to the exhibit.

An engineer wants to determine which paths are best, second best, third best, and fourth best. Drag and drop the peer addresses on the left to the corresponding BGP best-path selection order on the right.

Options:

Buy Now
Questions 26

Refer to the exhibit.

A network engineer notices that router R2 is failing to install network 172.16.33.1/32 in the routing table. Which configuration must the engineer apply to R2 to fix the problem?

Options:

A.

R2(config)# access-Iist 1 permit 172.16.33.0 255.0.0.0

B.

R2(config)# access-list 1 permit 172,16,33.0 255,255,255,0

C.

R2(config)# access-list 1 permit 172.16.33.0 0.0.0.255

D.

R2(config)# access-list 1 permit 172,16,33.0 255.255,0,0

Buy Now
Questions 27

Refer to the exhibit.

An engineer working for private Service Provider with employee id: 3948:11:613 is configuring the BGPsec framework. Which two conditions must the engineer take into account? (Choose two.)

Options:

A.

BGPsec uses IPsec tunnel for security.

B.

The BGPsec framework secures the AS path.

C.

In BGPsec. all route advertisements are given an expiry time by the originator of the route.

D.

Private keys are part of the router key pair used to sign route updates.

E.

In BGPsec. route advertisements are not given an expiration time by the originator of the route.

Buy Now
Questions 28

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Buy Now
Questions 29

Why is the keyword none needed when implementing management plane security using TACACS?

Options:

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Buy Now
Questions 30

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 31

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Buy Now
Questions 32

Refer to the exhibit.

A network engineer is deploying SNMP configuration on client's routers. Encrypted authentication must be included on router 1 to provide security and protect message confidentially. Which action should the engineer perform on the routers to accomplish this task?

Options:

A.

snmp-server host 192.168.0.254 informs version 3 auth testuser config.

B.

snmp-server user testuser group 1 remote 192.168.0.254 v3 auth md5 testpassword

C.

snmp-server group group 1 v3 auth.

D.

snmp-server community public

Buy Now
Questions 33

Refer to the exhibit:

What is the effect of this configuration?

Options:

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Buy Now
Questions 34

Refer to the exhibit.

A network engineer must meet these requirements to provide a connects, solution:

  • The customer connected to Area 2 needs to access the application in Area 1 on the 10.10.10.0/24 subnet
  • The Customer must not have access to the 20.10 30.0/24 subnet.
  • The service provider must make sure that the Area 2 routing database limits the number of IP addresses in the routing table

Which two configurations must be implemented to meet the requirements? (Choose two)

Options:

A.

Set a tag value of 200 to match the summary address 10.0.0/16 on R2.

B.

Set a tag value of 200 to match the summary address 10.0.0.0/16 on R3.

C.

Apply the route map for tag 200 and leak Level 2 routes into Level 1 Area 2 on R3

D.

Apply the route map for tag 200 and teak Level 2 routes into Level 1 Area 2 on R4.

E.

Set a tag value of 200 to match the summary address 10.0.0./16 on R1.

Buy Now
Questions 35

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

Options:

A.

global configuration mode

B.

routing configuration mode

C.

BGP neighbor configuration

D.

mode BGP address-family configuration mode

Buy Now
Questions 36

A network engineer is deploying VRF on ASBR router R1. The interface must have connectivity over an MPLS VPN inter-AS Option AB network. Which configuration must the engineer apply on the router to accomplish this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 37

An engineer must implement QoS to prioritize traffic that requires better service throughout the network. The engineer started by configuring a class map to identify the high-priority traffic. Which additional tasks must the engineer perform to implement the new QoS policy?

Options:

A.

Attach the class map to a policy map that sets the minimum bandwidth allocated to the classified traffic and designates the action to be taken on the traffic.

B.

Attach the class map to a policy map that designates the action to be taken on the classified traffic and then attach the policy map to an interface using a service policy.

C.

Attach the class map to a policy map within a VRF to segregate the high-priority traffic and then attach the policy map to an interface in another VRF.

D.

Create a route map to manipulate the routes that are entered into the routing table and then attach the route map to an interface using a service policy.

Buy Now
Questions 38

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

Options:

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Buy Now
Questions 39

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLAN-based to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

Options:

A.

LSP lifetime maximum

B.

advertise-passive-only

C.

overload bit passive

D.

attached bit on ISIS instance

E.

passive-interface Loopback0

Buy Now
Questions 40

Refer to the exhibit. A network engineer must configure XR-PE1 for uninterruptible failover from active RP to the standby RP Neither peer devices CGW1 nor the network of ASN 64512 support restart extensions Which configuration must the engineer apply to XR PEI to complete tasks?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 41

Refer for the exhibit. To optimize network operations, the senior architect created this Python 3.9 script for network automation tasks and to leverage Ansible 4.0 playbooks. Devices In the network support only RFC 2617-based authentication What does the script do?

Options:

A.

The script logs in via SSH and configures interface GigabitEthernetO/1 with IP address 10.1.131.112/30.

B.

The script leverages REST API calls and configures Interface GlgabilEthemet0/1 with IP address 10.1.131.112/30.

C.

The script performs a configuration sanity check on the device with IP address 172.168.211.65 via HTTP and returns an alert If the payload field falls to match.

D.

The script parses the JSON response from the router at IP address 172 168.211.65 and checks If the interface GigaWtEthernet0/1 with IP address 10.1.131.112 exists on the router.

Buy Now
Questions 42

Drag and drop the characteristics from the left onto the automation tool on the right.

Options:

Buy Now
Questions 43

After a series of unexpected device failures on the network. a Cisco engineer is deploying NSF on the network devices so that packets continue to be forwarded during switchovers The network devices reside in the same holding, but they are physically separated into two different data centers Which task must the engineer perform as part of the deployment?

Options:

A.

implement OSPF to maintain the link-state database during failover.

B.

implement VRFs and specify the forwarding instances that must remain active during failover.

C.

implement an L2VPN with the failover peer to share state Information between the active and standby devices.

D.

implement Cisco Express Forwarding to provide forwarding during failover

Buy Now
Questions 44

Refer to the exhibit.

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 45

Refer to the exhibit:

Export statistics received do not include the BGP next hop.

Which statement about the NetFlow export statistics is true?

Options:

A.

Only the origin AS of the source router will be included in the export statistics.

B.

Loopback 0 must be participating in BGP for it to be included in the export statistics.

C.

The origin AS and the peer-as will be included in the export statistics.

D.

To include the BGP next hop in the export statistics, those keywords must be included with the version 9 entry.

Buy Now
Questions 46

A network engineer must collect traffic statistics for an internal LAN toward the internet The sample must include the source and destination IP addresses, the destination ports, the total number of bytes from each flow using a 64-bit counter, and all transport flag information. Because of CPU limits, the flow collector processes samples that are a maximum of 20 seconds long. Which two configurations must the network engineer apply to the router? (Choose two.)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 47

Refer to the exhibit. A network engineer is configuring router RB to secure BGP advertisements against route hijacking activity. RB must validate all prefixes that it receives from origin AS 200 before installing them in the BGP route table. Which configuration meets the requirement?

Options:

A.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

RB(config-router-af)# bgp bestpath origin-as use validity

B.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation signal ibgp

RB(config-bgp)# bgp bestpath origin-as allow invalid

C.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation time off

D.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

PB(config-router-af)# bgp origin-as validation enable

Buy Now
Questions 48

Refer to the exhibit. A global company plans to implement BGP at its newest location to provide connectivity to other offices. The global infrastructure of the company is a multivendor environment. An engineer must review the BGP core configurations at headquarters to determine if they can be repurposed at the new location. The engineer copied this JSON script for review. What is the effect of the script?

Options:

A.

It configures BGP with neighbor 192.168.1.2 residing in AS 65514.

B.

It sets the BGP router-ID to 192.168.1.2 and sets the AS of the router to 65514.

C.

It configures BGP on the device and inserts 192.168.1.0/24 into the BGP table using the origin AS 65514.

D.

It configures a VRF named cisconode1 and a BGP instance using the VPNv4 address family.

Buy Now
Questions 49

Refer to the exhibit:

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

Options:

A.

LDP needs to be enabled on the R2 physical interface

B.

R2 does not see any hellos from R1

C.

LDP needs to be enabled on the R2 loopback interface

D.

R2 sees the wrong type of hellos from R1

Buy Now
Questions 50

A network operator needs to implement PIM-SSM multicast configuration on customer's network so that users in different domains are able to access and stream live traffic. Which two actions must the engineer perform on the network

to make the streaming work? (Choose two.)

Options:

A.

Configure at least one MSDP peer on the network

B.

Enable IGMP version 2 at the interface lever.

C.

Enable PIM sparse mode on the device.

D.

Enable IGMP version 3 at the interface level.

E.

Enable PM dense mode on the device.

Buy Now
Questions 51

Refer to the exhibit:

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Buy Now
Questions 52

Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?

Options:

A.

routing and tunneling when doing symmetric IRB

B.

routing when doing asymmetric IRB

C.

routing and bridging when doing asymmetric IRB

D.

bridging when doing symmetric IRB

Buy Now
Questions 53

Refer to the exhibit.

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 54

What is the role of NSO in network automation?

Options:

A.

It is GUI used to manage wireless devices in a campus infrastructure.

B.

It Is a type of REST API used to configure an APIC.

C.

It is a tool that uses CLl only to configure virtual network devices.

D.

It is a tool used to bridge automation to the physical network infrastructure.

Buy Now
Questions 55

Refer to the exhibit. An engineer configured R6 as the headend LSR of an RSVP-TE LSP to router XR2, with the dynamic path signaled as R6-R2-R5-XR2. and set the OSPF cost of all links to 1. MPLS autotunnel backup Is enabled on all routers to protect the LSP. Which two NNHOP backup tunnels should the engineer use to complete the implementation? (Choose two.)

Options:

A.

The R6 backup tunnel path R6-R1-R4-R5.

B.

The R2 backup tunnel path R2-R5 across the alternate link.

C.

The R2 backup tunnel path R2-R1-R4-XR1-XR2.

D.

The R6 backup tunnel path R6-R2-R5

E.

The R6 backup tunnel path R6-R1-R2.

Buy Now
Questions 56

Which module refers to the network automation using Ansible?

Options:

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Buy Now
Questions 57

Simulation 5

Options:

Buy Now
Questions 58

Drag and drop the multicast concepts from the left onto the correct descriptions on the right.

Options:

Buy Now
Questions 59

A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 60

Drag and drop the message types from the left onto the target field of the message originator on the right.

Options:

Buy Now
Questions 61

Which statement about segment routing prefix segments is true?

Options:

A.

It is linked to a prefix SID that is globally unique within segment routing domain.

B.

It is the longest path to a node.

C.

It is linked to an adjacency SID that is globally unique within the router.

D.

It requires using EIGRP to operate.

Buy Now
Questions 62

Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?

Options:

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

C.

Chef is written in Python, and SaltStack is written in Ruby.

D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

Buy Now
Questions 63

Which feature describes the weight parameter for BGP path selection?

Options:

A.

Its value is local to the router

B.

Its value is set either locally or globally.

C.

Its default value is 0.

D.

Its value is global to the router.

Buy Now
Questions 64

Refer to the exhibit:

It the NetFlow configuration is updated to version 9, which additional piece of information can be reported"?

Options:

A.

IPv6 flow information

B.

flow sequence numbers

C.

BGP AS information

D.

IPv4 flow information

Buy Now
Questions 65

Refer to the exhibit:

Which effect of this configuration is true?

Options:

A.

R1 can support a peer that is configured for LDP SSO/NSF as the peer recovers from an outage

B.

R1 can failover only to a peer that is configured for LDP SSO/NSF

C.

R1 can failover to any peer

D.

R1 can support a graceful restart operation on the peer, even if graceful restart is disabled on the peer

Buy Now
Questions 66

Simulation 3

Options:

Buy Now
Questions 67

Refer to the exhibit.

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

Options:

A.

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Buy Now
Questions 68

Refer to the exhibit.

While troubleshooting the OSPF adjacency between routers R1 and R2 an engineer noticed that both routers are stuck in the EXCHANGE/EXSTART state. What should the engineer fix to solve the ongoing issue?

Options:

A.

match IPv4 addresses

B.

match OSPF areas

C.

match OSPF network types

D.

match MTU values

Buy Now
Questions 69

How do intent APIs make it easier for network engineers to deploy and manage networks?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 70

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

Options:

A.

Change the helper-address value to 192.168.10.2 on RC.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Buy Now
Questions 71

Which task must be performed first to Implement BFD in an IS-IS environment?

Options:

A.

Disable Cisco Express Forward.ng on all interfaces running routing protocols other than IS-IS

B.

Configure BFD under the IS-IS process

C.

Configure all ISIS routers as Level 2 devices

D.

Configure BFD in an interface configuration mode

Buy Now
Questions 72

How is a telemetry session established for data analytics?

Options:

A.

A router initiates a session using the dial-out to a destination.

B.

A destination initiate a session to a router.

C.

The destination initiate a session using the dial-out more to the router.

D.

A router requests the data using Teinet.

Buy Now
Questions 73

What is a constraint of Cisco MPLS TE tunnel configurations?

Options:

A.

Tunnels cannot span multiple OSPF areas.

B.

With ISIS as an IGP. only older-style metrics are used.

C.

Tunnels cannot be configured over IP unnumbered links.

D.

QoS-aware tunneling is not supported.

Buy Now
Questions 74

An engineer is configuring IEEE 802.1 ad on the access port on a new Cisco router. The access port handles traffic from multiple customer VLANs, and it is expected to mark all customer traffic to the same VLAN without dropping any traffic. Which configuration must the engineer apply?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 75

What is a characteristic of data modeling language?

Options:

A.

It provides an interface for state data.

B.

It separates configuration and state data.

C.

It ensures devices are individually configured.

D.

It replaces SNMP.

Buy Now
Questions 76

How does SR policy operate in Segment Routing Traffic Engineering?

Options:

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Buy Now
Questions 77

Which OS uses a distributed subsystem architecture?

Options:

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Buy Now
Questions 78

Refer to the exhibit.

Routers R2 and R3 are Level 1/Level 2 IS-IS routers that redistribute 198 18.x.x/24 prefixes to routers R5 and R6 In the Level 1 area R2 Is to be the preferred router for all redistributed prefixes in the Level 1 area. Which configuration sets this preference?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 79

Drag and drop the OSPF area types from the left onto the correct statements on the right

Options:

Buy Now
Questions 80

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

Options:

A.

bandwidth

B.

affinity

C.

explicit path

D.

SLRG

Buy Now
Questions 81

A network administrator is planning a new network with a segment-routing architecture using a distributed control plane. How is routing information distributed on such a network?

Options:

A.

Each segment is signalled by an SR controller, but each segment makes Its own steering decisions based on SR policy.

B.

Each segment is signalled by MPLS, and each segment makes steering decisions based on the routing policy pushed by BGP.

C.

Each segment is signalled by an SR controller that makes the steering decisions for each node.

D.

Each segment is signalled by a compatible routing protocol and each segment makes its own steering decisions based on SR policy.

Buy Now
Questions 82

Refer to the exhibit. An engineer is implementing the BGP attribute on the customer's network to select the preferred path. Only BGP's well-known discretionary attribute must be used FTP prefixes should not be selected as part of this implementation. Which configuration must the engineer implement to complete the task?

Options:

A.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest in

B.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest

C.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest both

D.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest out

Buy Now
Questions 83

Refer to the exhibit. LDP peering between routers R1 and R2 is dropped when the link between R1 and R2 is taken offline. However, LDP peering between R2 and R3 stays up when the link between R2 and R3 is taken offline. Which action allows MPLS traffic forwarding to continue normally if the link between R1 and R2 goes down?

Options:

A.

Enable IGP and LDP Synchronization on R1.

B.

Implement LDP Session Protection on R1.

C.

Enable IGP and LDP Synchronization on R2.

D.

Implement LDP Session Protection on R2.

Buy Now
Questions 84

Which two features describe TI-LFA? (Choose two.)

Options:

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Buy Now
Questions 85

Refer to the exhibit:

In which way does router R1 operate differently than router R2?

Options:

A.

R1 sends LSA type 2 only, while R2 sends type 1 and type 7 LSAs

B.

R1 sends LSA types 1 and 2, while R2 sends type 1. 2. and 7 LSAs

C.

R1 sends LSA type 2 only and R2 sends LSA type 1 only

D.

R1 sends LSA types 5 and 7, while R2 sends type 1, 2, and 7 LSAs

Buy Now
Questions 86

Which two IS-IS parameters must match before two Level 2 peers can form an adjacency? (Choose two)

Options:

A.

authentication settings

B.

area ID

C.

system ID

D.

MTU

E.

hello timer setting

Buy Now
Questions 87

Simulation1

Options:

Buy Now
Questions 88

What is a role of NSO?

Options:

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Buy Now
Questions 89

What Is one of the differences between Ansible and Chef?

Options:

A.

Ansible uses YAML and Chef uses Ruby.

B.

Chef requires the use of Windows in the environment and Ansible requires Linux.

C.

Chef is highly scalable and Ansible is highly secure.

D.

Ansible uses Ruby and Chef uses Python.

Buy Now
Questions 90

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

Options:

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Buy Now
Questions 91

Refer to the exhibit.

Router 1 and router 2 are running OSPF Area 0. The router logs on both routers show that the LDP link has flapped. Which configuration must the engineer apply to the two routers to implement session protection on the link?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 92

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

Options:

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Buy Now
Questions 93

Refer to the exhibit:

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

Options:

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Buy Now
Questions 94

Refer to the exhibit.

Which show command should be implemented to display per-interface statistics about uRPF drops and suppressed drops?

Options:

A.

show ip traffic

B.

showip interface

C.

show cef interface

D.

show ip interface brief

Buy Now
Questions 95

Which programmable API allows the service provider to plan and optimize the automation of network operations and achieve closed-loop operations?

Options:

A.

Network Services Orchestrator

B.

WAN Automation Engine

C.

Evolved Programmable Network Manager

D.

Crosswork Network Automation

Buy Now
Questions 96

Drag and drop the OSPF and IS-IS Cisco MPLS TE extensions from the left to their functional descriptions on the right.

Options:

Buy Now
Questions 97

Refer to the exhibit.

The engineering team wants to limit control traffic on router RX with the following IP address assignments:

• Accepted traffic for router: 10.0.0.0/24

• NOC users IP allocation: 192.168.10.0/24

Which additional configuration must be applied to RX to apply the policy for MSDP?

Options:

A.

RX(config)#access-list 151 permit tcp any gt 1024 10.10.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit tcp any eq 639 10.10.0.0 0.0.0.255 gt 1024 established

B.

RX(config)#access-list 150 permit tcp any gt 1024 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit tcp any eq 639 10.0.0.0 0.0.0.255 gt 1024 established

C.

RX(config)#access-list 151 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit udp any 10.0.0.0 0.0.0.255 eq 639

D.

RX(config)#access-list 150 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit udp any 10.0.0.0 0.0.0.255 eq 639

Buy Now
Questions 98

Refer to the exhibit. Users in AS 65010 are connected with the application server in AS 65050 with these requirements:

AS 65010 users are experiencing latency and congestion to connect with application server 172.16.50.10.

AS 65030 must be restricted to become Transient Autonomous System for traffic flow.

Links connected to AS 65020 and AS 65040 are underutilized and must be used efficiently for traffic.

Which two configurations must be implemented to meet these requirements? (Choose two.)

Options:

A.

Apply the AS-Path route-map policy for traffic received from R3.

B.

Configure the route map to prepend the AS-Path attribute for R5-R3 BGP peering.

C.

Apply the MED route-map policy for traffic received from R4.

D.

Configure a higher Local preference for R5-R4 BGP peering.

E.

Configure the route map to set the MED 50 attribute for R5-R4 BGP peering.

Buy Now
Questions 99

Refer to the exhibit. R1 has two upstream Tier 1 service providers. BGP is in use as the exterior routing protocol, and ISP_A and ISP_B are sending the full BGP table. A network engineer must assign local-preference 70 to all routes with multiple exit discriminator 30. Which configuration must the network engineer apply?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 100

A network team has failed to implement IS-IS multitopology. What is the reason for it?

Options:

A.

The router did not support VRFs.

B.

The routing process did not support extended metrics.

C.

The router did not have Cisco Discovery Protocol and Cisco Express Forwarding disabled.

D.

The routing process supported Level 1 only.

Buy Now
Questions 101

Refer to the exhibit. After a networking team configured this MPLS topology, the supervisor wants to view MPLS labels to verify the path that packets take from router R1 to router R7 The team already Issued an ICMP ping to verify connectivity between the devices. Which task must the team perform to allow the supervisor to view the label switch path?

Options:

A.

Configure MPLS TE to display the labels in the stack between the head and tail-end routers

B.

Implement MPLS LDP to assign labels to all the routes in the transit path.

C.

Configure MPLS LDP Sync to sync labels from the routing table to the MPLS forwarding table.

D.

Implement MPLS OAM to display the labels for each hop along the path

Buy Now
Questions 102

An engineer is implementing IGMP with SSM on a multicampus network that supports video streaming. Which task must the engineer perform as part of the process?

Options:

A.

Configure the network to use IGMPv3.

B.

Configure the network to use bidirectional PIM.

C.

Configure an RP that uses static assignments only.

D.

Configure the network to use the PIM bsr-candidate

Buy Now
Questions 103

Refer to the exhibit.

An engineer is configuring an administrative domain in the given multi-vendor environment with PIM-SM. Which feature must the engineer implement so that devices will dynamically learn the RP?

Options:

A.

Auto-RP

B.

BIDIR-PIM

C.

SSM

D.

BSR

Buy Now
Questions 104

Refer to the exhibit. Router 1 and Router 2 were installed in the data center. Router 1 is the core router in the network, but it fails to establish an OSPF peering with Router 2. and customer traffic is unable to pass. Router 1 also reports an increase in CPU and memory usage. However, the CPU for R2 is stable. Which action resolves this issue?

Options:

A.

Disable Cisco Express Forwarding on Router 2.

B.

Change the transport mode to WAN on Router 1.

C.

Change the MTU to 1524 on Router 1.

D.

Enable MPLS on Router 2.

Buy Now
Questions 105

Refer to the exhibit. The USER mat is connecting an application on an Internet connection in AS 100 is facing these issues:

  • The USER lost the connection to the application during a failure Between IG and R2.
  • Router R2 configuration a lost due to a power outage.
  • The application the USER is connecting to a hosted behind CE2.

What action resolves the issues on R3 and R4 routers?

Options:

A.

Set R4 as a route reflector for R3 and CE2

B.

Apply high Local Preference on R3 toward R1

C.

Set R3 as a route reflector for R4 and CE1

D.

Apply low Local Preference on R4 toward R2.

Buy Now
Questions 106

Which utility must be used to locate MPLS faults?

Options:

A.

QoS

B.

MPLS LSP ping

C.

MPLStraceroute

D.

EEM

Buy Now
Questions 107

Which type of attack is an application attack?

Options:

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Buy Now
Questions 108

What do Ansible and Salt Stack have in common?

Options:

A.

They both use DSL configuration language

B.

They both use YAML configuration language

C.

They both have agents running on the client machine

D.

They both can be designed with more than one master server

Buy Now
Questions 109

Drag and drop the BGP Best Path Algorithm rules from the left into the corresponding order of importance on the right.

Options:

Buy Now
Questions 110

Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?

Options:

A.

OTCP

B.

OMP

C.

UDP

D.

BGP

Buy Now
Questions 111

Refer to the exhibit.

A network administrator implemented MPLS LDP changes on PE-A LSR device. The engineer must ensure there are no LDP peer are fully operational. Which LDP feature must the engineer apply to the existing configuration to eliminate the problem?

Options:

A.

Configure MPLS LDP IGP synchronization on the network.

B.

Configure MPLS LDP NSR for all LDP sessions.

C.

Enable LDP session protection under the routing protocol.

D.

Disable IP CEF on routers running LDP and enable LDP.

Buy Now
Questions 112

Refer to the exhibit.

An engineer is updating this network to meet these conditions:

• Area 10 will receive inter-area routes and support mutual redistribution of external routes with the extranet.

• The ::/0 route is prohibited in Area 10.

• Area 11 will receive only the ::/0 route from the ABR.

• External route redistribution is not supported in Area 11.

• The ABR in Area 11 will advertise no interarea routes.

Which two configurations must be performed to meet the requirements? (Choose two.)

Options:

A.

Configure area 11 as nssa no-summary on R7 and as nssa on XR31.

B.

Configure area 10 as stub on R9 and XR32.

C.

Configure area 11 as stub no-summary on R7 and as stub on XR31.

D.

Configure area 11 as nssa default-information-originate on R7 and as nssa on XR31.

E.

Configure area 10 as nssa on R9 and XR32.

Buy Now
Questions 113

Refer to the exhibit:

What does this value mean when it is received in XML?

Options:

A.

It shows the ending of the script

B.

It indicates a break in a sequence

C.

It indicates a value assigned by a network administrator to tag a route

D.

It means a data field is blank

Buy Now
Questions 114

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service-provider core network with these requirements:

  • RC must establish LDP peering with the loopback IP address as its Router ID
  • RA must establish LDP peering with RB. RC, and RY.

How must the team update the network configuration to successfully enable LDP peering between RA and RC?

Options:

A.

Enable the mpls ip command on RC interface Gi2/0. DUMPS

B.

Configure the mpls Idp router-Id loopback0 command on RA and RC.

C.

Implement LDP session protection on RA.

D.

DUMPS Reset the discover hello hold time and interval to their default values.

Buy Now
Questions 115

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

Options:

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

Buy Now
Questions 116

The administrator of a small company network notices that intermittent network issues occasionally cause inbound notifications to its SNMP servers to be lost. Which configuration must the administrator apply so that the SNMP servers acknowledge the notifications that they receive?

Options:

A.

snmp-server community ciscotest rw 10

B.

snmp-server host tests.cisco.com public

snmp-server community ciscotest rw 10

C.

snmp-server enable traps bgp

snmp-server host 192.169.2.1 Informs

D.

snmp-server enable traps snmp

Buy Now
Questions 117

Refer to the exhibit:

What does the REST API command do?

Options:

A.

It retrieves the information requested by Descriptions xml

B.

It removes the information identified by Descriptions xml

C.

It executes the commands specified in Descriptions xml

D.

It displays the information identified by Descriptions xml

Buy Now
Questions 118

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

Options:

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.

Buy Now
Questions 119

Which two actions describe ISP delegation to PCE servers? (Choose two)

Options:

A.

adding a new PCE server with lower precedence than the primary PCE

B.

changing the precedence of any of the PCE servers

C.

removing TE re-optimization timer timeouts

D.

entering the mpls traffic-eng reoptimize command

E.

adding a new PCE server with higher precedence than the primary PCE

Buy Now
Questions 120

Refer to the exhibit. The network operations team reported that the access site that is connected to R3 is not connecting to the application server in the data center and that all packets that are sent from the application server to the access site are dropped. The team verified that OSPF and BGP peerings are up in BGP AS 65101 and BGP AS 65201. R4 is expected to receive traffic from the application server route via OSPF. Which action resolves this issue?

Options:

A.

Remove the route-map on R4 when advertising 172.16.20.1 in BGP to R3.

B.

Advertise application server 172.16.20.1 in the OSPF routing table on R6.

C.

Allow 172.16.20.1 in the BGP advertisement on R3 in the route-map.

D.

Add the next-hop-self command on R6 to enable R3 iBGP peering.

Buy Now
Questions 121

Refer to the exhibit:

A network engineer is implementing an OSPF configuration Based on the output, which statement is true?

Options:

A.

In the ospfv3 1 area 1 ipv4 command, area 0 must be configured instead of area 1.

B.

OSPFv3 does not run for IPv4 on FastEthemet0/0 until IPv6 routing is enabled on the router and IPv6 is enabled on interface Fastfc.thernet0/0

C.

OSPFv3 cannot be configured for IPv4; OSPFv3 works only for IPv6.

D.

IPv6 routing not enabled" is just an informational message and OSPFv3 runs for IPv4 on interface FastEthernet0/0 anyway

Buy Now
Questions 122

Refer to the exhibit A user is performing QoS marking on internet traffic and sending it with IPv4 and IPv6 headers on the provider edge device PE1. IPv4 traffic is classified with DSCP 4 and IPv6 traffic is classified with DSCP 6. Which action must the engineer take to begin implementing a QoS configuration on PE1 for the IPv6 traffic?

Options:

A.

Create an access list that includes any IPv6 traffic and apply it to CM-20.

B.

Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM-10 and CM-20.

C.

Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.

D.

Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.

Buy Now
Questions 123

Refer to the exhibit. EIGRP is running between routers R5 and R1, and OSPF is used in the rest of the network. Users in a network attached to router R3 need to access a server connected to R5. Which task must the engineer perform so that only the users attached to R3 are able to access the server, but no other network is shared to OSPF?

Options:

A.

Configure redistribution using route maps to filter the routes that are shared

B.

Configure redistribution using an offset list to filter the routes that are shared.

C.

Configure an OSPF virtual link between R1 and R3 to route traffic between the two areas.

D.

Configure R1 as a stub router for EIGRP and OSPF so that only the default route is shared

Buy Now
Questions 124

Refer to the exhibit.

Router 1 and router 2 are running IBGP. and router 2 and router 3 are running OSPF Area 0. Router 1 is advertising loopback interlaces Lo0 and Lo2 and router 2 is redistributing BGP into OSPF Area 0. Which configuration must an administrator apply so that router 2 uses a route map to redistribute only the internal route from Lo 2?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 125

A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 126

Drag and drop the methods of Cisco MPLS TE tunnel traffic assignment from the left onto their characteristics on the right.

Options:

Buy Now
Questions 127

A network engineer is configuring a BGP route policy for the SUBNET prefix set. Matching traffic must be dropped, and other traffic must have its MED value set to 400 and community 4:400 added to the route. Which configuration must an engineer apply?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 128

router(config)# route-map blackhole-trigger

router(config-route-map)# match tag 777

router(config-route-map)# set ip next-hop 10.0.1.1

router(config-route-map)# set origin igp

router{config-route-map)# set community no-export

Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and each router maintains iBGP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which is used as a black hole route as shown. Which configuration should the operator implement to the management router to create a route map that will redistribute tagged static routes into BGP and create a static route to blackhole traffic with tag 777 that is destined to the server at 192.168.10.100?

Options:

A.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

B.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

C.

router(config)# router bgp 55100

router(config-router)# redistribute connected

router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

D.

router(config)# router bgp 55100

router(config-router)# redistribute connected route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

Buy Now
Questions 129

Refer to the exhibit. An engineer is scripting ACLs to handle traffic on the given network. The engineer must block users on the network between R1 and R2 from leaving the network through R5. but these users must still be able to access all resources within the administrative domain. How must the engineer implement the ACL configuration?

Options:

A.

Configure an ACL that permits traffic to any internal address, and apply it to the R5 interfaces to R3 and R4 in the egress direction

B.

Configure a permit any ACL on the R1 interface to R2 in the egress direction, and a deny any ACL on the interface in the ingress direction

C.

Configure an ACL that permits traffic to all internal networks and denies traffic to any external address, and apply it to the R2 interface to R1 in the ingress direction.

D.

Configure an ACL that denies traffic to any internal address and denies traffic to any external address, and apply it to the R5 interfaces to R3 and R4 in the ingress direction

Buy Now
Questions 130

Refer to the exhibit.

What type of configuration is it?

Options:

A.

It is configuration that requires an explicit Cisco MPLS TE path to be configured for the tunnel to run.

B.

It is configuration that requires OSPF to also be running to have optimized Cisco MPLS TE tunnels.

C.

It is configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing.

D.

It is configuration that requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run.

Buy Now
Questions 131

Which configuration enables BGP FlowSpec client function and installation of policies on all local interfaces?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 132

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 133

Refer to the exhibit.

A network operator working for a telecommunication company with an employee 3994:37:650 is implementing a cisco Unified MPLS solution. What is the effect of this implementation?

Options:

A.

EIGRP is deployed between the PEs and ABRs with RFC 3107.

B.

OSPF is deployed between the PEs and ABRs with RFC 3107.

C.

IS-IS is deployed between the PEs and ABRs with RFC 3107.

D.

BGP is deployed between the PEs and ABRs with RFC 3107.

Buy Now
Questions 134

Refer the exhibit.

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

Options:

A.

first-in, first-out

B.

traffic shaping

C.

class-based weighted fair queueing

D.

traffic policing

Questions 135

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

Options:

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
Last Update: Apr 16, 2024
Questions: 452
$76.5  $169.99
$58.5  $129.99
$49.5  $109.99
buy now 350-501