Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

350-501 PDF

$42

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

350-501 PDF + Testing Engine

$57

$189.99

3 Months Free Update

  • Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
  • Last Update: Oct 31, 2025
  • Questions and Answers: 501
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

350-501 Engine

$48

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

350-501 Practice Exam Questions with Answers Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Certification

Question # 6

Drag and drop the functionalities from the left onto the target fields on the right.

350-501 question answer

Full Access
Question # 7

350-501 question answer

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Full Access
Question # 8

Refer to the exhibit.

350-501 question answer

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

A.

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

B.

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

C.

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

D.

The link state database provides segmentation by area, which improves the path-selection process

Full Access
Question # 10

What is a feature of mVPN?

A.

It requires-uncast to be disabled on the multicast domain

B.

It establishes multiple static MDTs for each multicast domain.

C.

It provides the ability to support multicast over a Layer 3 VPN.

D.

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Full Access
Question # 11

Refer to the exhibit:

350-501 question answer

After implementing a new design for the network, a technician reviews the pictured CLI output as part of the MOP.

Which two statements describe what the technician can ascertain from the ImpNull output? (Choose two.)

A.

Label 0 is used for the prefix displayed but will not be part of the MPLS label stack for packets destined for 192 168.10.10.

B.

Ultimate Hop Popping is in use for the prefix displayed.

C.

Label 0 is used for the prefix displayed and will be part of the MPLS label stack for packets destined for 192.168.10.10

D.

Penultimate Hop Popping is in use for the prefix displayed

E.

Label 3 is in use for the prefix displayed and will be part of the MPLS label stack for packets destined for 192.168.10.10

Full Access
Question # 12

Egress PE NAT is being used via a single centralized router to provide Internet access to L3VPN customers.

Which description of the NAT operation is true?

A.

Users m different VRFs cannot share the same outside global IP address

B.

The NAT table contains a field to identify the inside VRF of a translation

C.

Multiple address pools are needed for the same L3VPN because each site has a separate NAT

D.

The different L3VPNs using the Internet access must not have IP overlaps internally

Full Access
Question # 13

Which type of attack is an application attack?

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Full Access
Question # 14

350-501 question answer

Refer to the exhibit. A large organization is merging the network assets of a recently acquired competitor with one of its own satellite offices in the same geographic area. The newly acquired network is running different routing protocol than the company's primary network. As part of the merger a network engineer implemented this route map Which task must the engineer perform to complete the Implementation?

A.

Attach the route map to an IS-IS network statement to advertise the routes learned on this interface to IS-IS

B.

Enable metric style wide to allow the use of extended metrics from the protocols

C.

Attach the route map to the redistribution command to manipulate the routes as they are shared

D.

Configure an additional route map sequence to override the implicit deny at the end of the route map

Full Access
Question # 15

Drag and drop the functions from the left onto the correct Path Computation Element Protocol roles on the right

350-501 question answer

Full Access
Question # 16

Refer to the exhibit.

350-501 question answer

Routers R2 and R3 are Level 1/Level 2 IS-IS routers that redistribute 198 18.x.x/24 prefixes to routers R5 and R6 In the Level 1 area R2 Is to be the preferred router for all redistributed prefixes in the Level 1 area. Which configuration sets this preference?

350-501 question answer

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 17

350-501 question answer

Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is Mbps. The company XYZ security team asked the ISP to redirect ICMP requests which are currently going to the web server to a new local security appliance which configuration must an ISPP engineer apply to router R2 to redirect the ICMP traffic?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 18

Refer to the exhibit.

350-501 question answer

Router 4 is added to the network and must be in the same area as router 1. Which NET should the engineer assign?

A.

49.0001.0000.0000.0004.00

B.

49.0111.0000.0000.0001.00

C.

49.0011.0000.0000.0003.00

D.

49.0011.0000.0000.0002.00

Full Access
Question # 19

350-501 question answer

router(config)# route-map blackhole-trigger

router(config-route-map)# match tag 777

router(config-route-map)# set ip next-hop 10.0.1.1

router(config-route-map)# set origin igp

router{config-route-map)# set community no-export

Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and each router maintains iBGP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which is used as a black hole route as shown. Which configuration should the operator implement to the management router to create a route map that will redistribute tagged static routes into BGP and create a static route to blackhole traffic with tag 777 that is destined to the server at 192.168.10.100?

A.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

B.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

C.

router(config)# router bgp 55100

router(config-router)# redistribute connected

router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

D.

router(config)# router bgp 55100

router(config-router)# redistribute connected route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

Full Access
Question # 20

An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?

A.

vrf upgrade-cli

B.

bgp upgrade-cli

C.

address-family ipv4

D.

ip bgp-community new-format

Full Access
Question # 21

Which condition must be met for TI-LFA to protect LDP traffic?

A.

For single-segment protection, the PQ node must be LDP and SR-capable.

B.

The protected destination must have an associated LDP label and prefix-SID.

C.

The point of local repair must be LDP-capable.

D.

For double-segment protection, the P and Q nodes must be SR-capable.

Full Access
Question # 22

Drag and drop the technologies from the left onto the correct definitions on the right.

350-501 question answer

Full Access
Question # 23

Refer to the exhibit:

350-501 question answer

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Full Access
Question # 24

Refer to the exhibit:

350-501 question answer

A network engineer is implementing a BGP protocol. Which effect of the local-as keyword in this configuration is true?

A.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 and the VPNv4 address family

B.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 without additional configuration

C.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 and the VPNv4 address family

D.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 without additional configuration.

Full Access
Question # 25

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

350-501 question answer

Full Access
Question # 26

Refer to the exhibit:

350-501 question answer

If router RA is configured as shown, which IPv4 multicast address space does it use?

A.

224.0. 0.0/8

B.

225.0. 0.0/8

C.

232.0. 0.0/8

D.

239.0. 0.0/8

Full Access
Question # 27

An engineer must apply an 802.1ad-compliant configuration to a new switchport with these requirements:

The switchport must tag all traffic when it enters the port.

The switchport is expected to provide the same level of service to traffic from any customer VLAN.

Which configuration must the engineer use?

A.

interface GigabitEthernet1/0/1

switchport mode trunk

switchport trunk encapsulation dot1q

encapsulation ISL

bridge-domain 12

B.

interface GigabitEthernet1/0/1

ethernet dot1ad uni c-port

service instance 12

encapsulation dot1q

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

C.

interface GigabitEthernet1/0/1

ethernet dot1ad uni s-port

service instance 12

encapsulation default

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

D.

interface GigabitEthernet1/0/1

ethernet dot1ad nni

service instance 12

encapsulation dot1ad

bridge-domain 12

Full Access
Question # 28

350-501 question answer

Refer to the exhibit. A network engineer with an employee ID 4379:43:595 is setting up an IS-IS network with these requirements:

  • Routes with a tag of 80 and IP prefixes other than 192.168.10.20/24 must be redistributed from Level 1 into Level 2.
  • Route leaking must be configured from Level 2 into the Level 1 domain for routes that are tagged with only 50 or 40.

Which configuration must be implemented on RB to meet the requirements?

A.

Add match tag 80 in route-map Ieak2-1

B.

DUMPS Add match ip address 152 in route-map redist1-2

C.

Remove match tag 40 from route-map Ieak2-1

D.

Change match tag 80 to match tag 50 in route-map redist1-2.

Full Access
Question # 29

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Full Access
Question # 30

Which BGP attribute is used first when determining the best path?

A.

origin

B.

AS path

C.

local preference

D.

weight

Full Access
Question # 31

Which regular expression query modifier function indicates the start of a string?

A.

^

B.

[^]

C.

+

D.

$

Full Access
Question # 32

Refer to the exhibit:

350-501 question answer

Which statement supports QPPB implementation?

A.

QoS policies are identified in the MPLS forwarding table

B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

C.

QoS policies use BGP to gain full coverage on the network.

D.

QPPB policies affect only egress traffic

Full Access
Question # 33

Refer to the exhibit.

350-501 question answer

What reestablishes the OSPF neighbor relationship between Router 1 and Router 2?

A.

authentication is added to the configuration

B.

correct wildcard mask is used on Router 2

C.

OSPF process IDs match

D.

hello intervals match

Full Access
Question # 34

An engineer implemented LDP protocol on the ISP network. The engineer must ensure that there are no packet loss issues when IGP and LDP protocols are not synchronized. Which configuring must the engineer implement so that the IGP routing protocol will wait until LDP convergence is completed?

A.

Disable IP CEF routers running LDP and enable LDP protocol.

B.

Configure MPLS LDP IGP synchronization on the network.

C.

Configure LDP sessions protection on the network.

D.

Disable MPLS LDP IGP synchronization on the network.

Full Access
Question # 35

A network engineer must implement SNMPv2 with these parameters

  • Enable SNMP community string C1sc0 with read-only permissions.
  • Enable interface index persistence.
  • Restrict the SNMP community to only the monitoring server with IP address 198.18 19 100/32.
  • Provide view-only access to ospflfEntry and ospfNbrEntry.

Which configuration must the engineer apply?

350-501 question answer

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 36

350-501 question answer

Refer to the exhibit. A network engineer is configuring router RB to secure BGP advertisements against route hijacking activity. RB must validate all prefixes that it receives from origin AS 200 before installing them in the BGP route table. Which configuration meets the requirement?

A.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

RB(config-router-af)# bgp bestpath origin-as use validity

B.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation signal ibgp

RB(config-bgp)# bgp bestpath origin-as allow invalid

C.

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation time off

D.

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

PB(config-router-af)# bgp origin-as validation enable

Full Access
Question # 37

Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

C.

Chef is written in Python, and SaltStack is written in Ruby.

D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

Full Access
Question # 38

350-501 question answer

Refer for the exhibit. To optimize network operations, the senior architect created this Python 3.9 script for network automation tasks and to leverage Ansible 4.0 playbooks. Devices In the network support only RFC 2617-based authentication What does the script do?

A.

The script logs in via SSH and configures interface GigabitEthernetO/1 with IP address 10.1.131.112/30.

B.

The script leverages REST API calls and configures Interface GlgabilEthemet0/1 with IP address 10.1.131.112/30.

C.

The script performs a configuration sanity check on the device with IP address 172.168.211.65 via HTTP and returns an alert If the payload field falls to match.

D.

The script parses the JSON response from the router at IP address 172 168.211.65 and checks If the interface GigaWtEthernet0/1 with IP address 10.1.131.112 exists on the router.

Full Access
Question # 39

Refer to the exhibit.

350-501 question answer

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Full Access
Question # 40

An engineer is configuring IEEE 802.1 ad on the access port on a new Cisco router. The access port handles traffic from multiple customer VLANs, and it is expected to mark all customer traffic to the same VLAN without dropping any traffic. Which configuration must the engineer apply?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Exhibit:

350-501 question answer

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Full Access
Question # 42

The network team is planning to implement IPv6 on the company’s existing IPv4 network infrastructure. The network currently uses IS-IS to share routes between peers. Which task must the team perform so that IS-IS will run in multitopology mode on the updated IPv6 network?

A.

Configure the links between the network routers as point-to-point.

B.

Configure the network routers to use metric-style wide.

C.

Configure the network routers as Level 2 routers.

D.

Configure the IS-IS IPv6 metric on the dual-stack links.

Full Access
Question # 43

Refer to me exhibit.

350-501 question answer

A network operator recently configured BGP FlowSpec for me internal IT network What will be inferred from the configuration deployed on me network?

A.

The policy is configured locally on CSRl and drops all traffic for TCP ports 80 and 443

B.

The policy is learned via BGP FlowSpec and drops all traffic for TCP ports 80 and 443

C.

The policy is warned via BC FlowSpec aid has active traffic

D.

The policy is configured locally on CSR1 and currently has no active traffic

Full Access
Question # 44

Refer to the exhibit:

350-501 question answer

It the NetFlow configuration is updated to version 9, which additional piece of information can be reported"?

A.

IPv6 flow information

B.

flow sequence numbers

C.

BGP AS information

D.

IPv4 flow information

Full Access
Question # 45

Simulation 7

350-501 question answer

350-501 question answer

Full Access
Question # 46

Refer to the exhibit:

350-501 question answer

What is significant about the number 2 in the configuration?

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Full Access
Question # 47

How does SR policy operate in Segment Routing Traffic Engineering?

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Full Access
Question # 48

350-501 question answer

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

A.

Change the helper-address value to 192.168.10.2 on RC.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Full Access
Question # 49

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

A.

global configuration mode

B.

routing configuration mode

C.

BGP neighbor configuration

D.

mode BGP address-family configuration mode

Full Access
Question # 50

Refer to the exhibit.

350-501 question answer

Which configuration must be applied to each of the four routers on the network to reduce LDP LIB size and advertise label bindings for the /32 loopback IP space only?

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

Refer to the exhibit:

350-501 question answer

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Full Access
Question # 52

Refer to me exhibit.

350-501 question answer

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

A.

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Full Access
Question # 53

350-501 question answer

Refer to the exhibit. A network engineer received a complaint about these problems in OSPF stub area 100:

  • The Ethernet link is down between routers RX and RY because the fiber was cut.
  • CE site A traffic to the hub site is being dropped.

Which action resolves these issues?

A.

Set the OSPF authentication type to MD5 between RX and RY DUMPS

B.

Change the OSPF area 100 type to stub on RZ.

C.

Change the OSPF priority to 100 on the interfaces that connect RX and RY.

D.

DUMPS Set the OSPF MTU to 1500 on the link between RX and RZ.

Full Access
Question # 54

Refer to the exhibit.

350-501 question answer

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 55

Refer to the exhibit.

350-501 question answer

An engineer is configuring router R1 for OSPFv3 as shown. Which additional configuration must be performed so that the three active interfaces on the router will advertise routes and participate in OSPF IPv6 processes?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

Full Access
Question # 56

350-501 question answer

Refer to the exhibit. R1 has two upstream Tier 1 service providers. BGP is in use as the exterior routing protocol, and ISP_A and ISP_B are sending the full BGP table. A network engineer must assign local-preference 70 to all routes with multiple exit discriminator 30. Which configuration must the network engineer apply?

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 57

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Full Access
Question # 58

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.

Full Access
Question # 59

350-501 question answer

Refer to the exhibit. Over the last few months. ISP A has doubled Its user base. The IT Director asked the engineering team to monitor memory consumption and buffer statistics on all P and PE devices In the MPLS core. Most devices have CPU usage of 70% or more, so the solution must be targeted and secure. Which two commands must the engineering team implement on P and PE devices to meet these requirements? (Choose two.)

A.

snmp-server host 192.168.101.1 version 3 auth community1 memory

B.

snmp-server enable traps memory bufferpeak

C.

snmp-server host 192.168.101.1 version 2c community1 memory

D.

snmp-server host 192.168.101.1 version 1 community1 auth memory

E.

snmp-server enable snmp-traps community1 bufferpeak

Full Access
Question # 60

What are two features of 6RD IPv6 transition mechanism? (Choose two.)

A.

It inserts IPv4 bits into an IPv6 delegated prefix.

B.

It uses a native IPv6-routed network between CE routers and the BR router.

C.

It allows dynamic 1:N translation of IPv6 address.

D.

It uses stateful automatic 6to4 tunnels between CE routers and the BR router.

E.

It uses stateless automatic 6to4 tunnels between CE routers and the BR router.

Full Access
Question # 61

Refer to the exhibit.

350-501 question answer

A network operator working for a telecommunication company with an employee 3994:37:650 is implementing a cisco Unified MPLS solution. What is the effect of this implementation?

A.

EIGRP is deployed between the PEs and ABRs with RFC 3107.

B.

OSPF is deployed between the PEs and ABRs with RFC 3107.

C.

IS-IS is deployed between the PEs and ABRs with RFC 3107.

D.

BGP is deployed between the PEs and ABRs with RFC 3107.

Full Access
Question # 62

Drag and drop the OSs from the left onto the correct deceptions on the right.

350-501 question answer

Full Access
Question # 63

What do Chef and Puppet have in common?

A.

use Ruby

B.

use a master server

C.

require modules to be created from scratch

D.

manage agents referred to as minions

Full Access
Question # 64

Which capability does the MPLS TE FRR facility backup protection method provide?

A.

defining the set of characteristics for the backup TE LSP

B.

leveraging label stacking to protect selected TE LSPs using a single backup TE LSP

C.

creating a bypass LSP for each protected LSP at each point of local repair

D.

assigning a backup TE LSP tunnel to the protected node at the headend of the protected TE LSP

Full Access
Question # 65

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Full Access
Question # 66

Which fact must a network engineer consider when planning to deploy RSVP-TE FRR?

A.

The FRR backup tunnel reserves the total bandwidth of all protected tunnels

B.

FRR protects MPLS LDP and RSVP-TE LSPs.

C.

PLR prefers FRR NHOP backup tunnels over NNHOP tunnels.

D.

PLR prefers FRR NNHOP backup tunnels over NHOP tunnels.

Full Access
Question # 67

350-501 question answer

Refer to the exhibit. The network engineer who manages ASN 65001 is troubleshooting suboptimal routing to the 198.18.15.0/24 prefix. According to the network requirements:

Routing to IP destinations in the 198.18.15.0/25 block must be preferred via the EDGE-1 PE.

Routing to IP destinations in the 198.18.15.128/25 block must be preferred via the EDGE-2 PE.

More specific prefixes of the 198.18.15.0/24 block must not be advertised beyond the boundaries of ASN 64611.

Routing to 198.18.15.0/24 must be redundant in case one of the uplinks on INT-R1 fails.

Which configuration must the network engineer implement on INT-R1 to correct the suboptimal routing and fix the issue?

A.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-export, peeras:65001)

done

endif

if destination in (198.18.15.0/24) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT out

B.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (internal, peeras:65001)

done

endif

if destination in (198.18.15.0/24) then

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT out

end

C.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-advertise, peeras:65001)

done

endif

if destination in (198.18.15.128/25) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OU

D.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-export, peeras:65001)

done

endif

if destination in (198.18.15.128/25) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT i

Full Access
Question # 68

What is the difference between SNMP and model-driven telemetry?

A.

Telemetry allows for modeled network data to be pushed to the network administrator on an as-needed basis

B.

Telemetry uses traps and inform messages to deliver data to a network administrator on a polling basis

C.

SNMP uses the YANG data modeling language

D.

SNMP pushes network data to the network administrator whenever it is queried

Full Access
Question # 69

What is a characteristic of data modeling language?

A.

It provides an interface for state data.

B.

It separates configuration and state data.

C.

It ensures devices are individually configured.

D.

It replaces SNMP.

Full Access
Question # 70

350-501 question answer

Refer to the exhibit. A network engineer must configure XR-PE1 for uninterruptible failover from active RP to the standby RP Neither peer devices CGW1 nor the network of ASN 64512 support restart extensions Which configuration must the engineer apply to XR PEI to complete tasks?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 71

Drag and drop the LDP features from the left onto the correct usages on the right.

350-501 question answer

Full Access
Question # 72

A network operator needs to implement PIM-SSM multicast configuration on customer's network so that users in different domains are able to access and stream live traffic. Which two actions must the engineer perform on the network

to make the streaming work? (Choose two.)

A.

Configure at least one MSDP peer on the network

B.

Enable IGMP version 2 at the interface lever.

C.

Enable PIM sparse mode on the device.

D.

Enable IGMP version 3 at the interface level.

E.

Enable PM dense mode on the device.

Full Access
Question # 73

Refer to the exhibit.

350-501 question answer

An engineer ran this show telemetry command to view subscription SUB11 on RouterX. The engineer then decided that RouterY should provide the same output lor sensor group SGroup13 as RouterX. The engineer cannot access RouterX to copy its configuration No access lists on the router block user access Which configuration must the engineer apply on RouterY to provide the same output from the show telemetry command?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 74

350-501 question answer

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Full Access
Question # 75

Refer to the exhibit:

350-501 question answer

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

350-501 question answer

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Full Access
Question # 76

Refer to the exhibit.

350-501 question answer

Which the link aggregation configuration router is running on Cisco IOS XR software, which LACP interface configuration is needed to add the interface to the bundle?

350-501 question answer

350-501 question answer

350-501 question answer

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 77

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

Full Access
Question # 78

Drag and drop the LDP features from the left onto their usages on the right.

350-501 question answer

Full Access
Question # 79

Refer to the exhibit.

350-501 question answer

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs to the interface states of Gi0/0/0/0 and Gi0/0/0/1?

A.

Gi0/0/0/1 and Gi0/0/0/0 become active

B.

Gi0/0/0/1 and Gi0//0/0 remains standby

C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby

D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby

Full Access
Question # 80

350-501 question answer

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Full Access
Question # 81

An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone that encapsulates Layer 2 and Layer 3 data Which action must the engineer perform on the routers to accomplish this task?

A.

Configure a EtherChannel for E-LAN.

B.

Configure a pseudowire for E-LINE.

C.

Configure Cisco MPLS TE for use with E-TREE.

D.

Configure QoS for MPLS and E-ACCESS

Full Access
Question # 82

Why is the keyword none needed when implementing management plane security using TACACS?

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Full Access
Question # 83

The engineering team at a large ISP has been alerted a customer network is experiencing high traffic congestion. After a discussion between the ISP and technical personnel at the customer site, the team agrees that traffic to the customer network that exceeds a specific threshold will be dropped. Which task must the engineer perform on the network to implement traffic policing changes?

A.

Configure RSVP to reserve bandwidth on all interfaces when a path is congested.

B.

Enable Cisco Discovery Protocol on the interface sending the packets.

C.

Enable Cisco Express Forwarding on the interfaces sending and receiving the packets.

D.

Set IP precedence values to take effect when traffic exceeds a given threshold.

Full Access
Question # 84

350-501 question answer

Refer to the exhibit. ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to CE-1?

A.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-export additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

B.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community local-as additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

C.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefixlist AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop local-address

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

D.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

Full Access
Question # 85

Which core component of MDT describes the data that an MDT-capable device streams to a collector?

A.

subscription

B.

encoder

C.

sensor path

D.

transport protocol

Full Access
Question # 86

Refer to the exhibit.

350-501 question answer

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 87

Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?

A.

routing and tunneling when doing symmetric IRB

B.

routing when doing asymmetric IRB

C.

routing and bridging when doing asymmetric IRB

D.

bridging when doing symmetric IRB

Full Access
Question # 88

A network engineer Is implementing a QoS policy for outbound management traffic classification and marking on a CPE device with these requirements:

• Management protocols must be marked with DSCP AF class 2 w4h low drop probability.

• Monitoring protocols must be marked with DSCP AF class 1 with low drop probability.

• All remaining traffic must be marked with a DSCP value of 0.

Which configuration must the engineer implement to satisfy the requirements?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 89

350-501 question answer

Refer to the exhibit. A client wants to filter routes to a BGP peer to limit access to restricted areas within the network. The engineer configures the route map ciscotest to filter routes from the BGP neighbor. The engineer also sets a tag that will be used for QoS in the future. Which task must be performed to complete the Implementation?

A.

Attach the new route map to the BGP neighbor statement in the inbound direction.

B.

Create a policy map named ciscotest and apply It to inbound traffic on the link that is directly connected to the BGP neighbor.

C.

Create a route map, configure BGP with an IPv4 address family, and activate the neighbor.

D.

Add a route map statement with sequence 40 that links a BGP community to the routing protocol

Full Access
Question # 90

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

350-501 question answer

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Full Access
Question # 91

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Full Access
Question # 92

350-501 question answer

350-501 question answer

Refer to the exhibit. The USER mat is connecting an application on an Internet connection in AS 100 is facing these issues:

  • The USER lost the connection to the application during a failure Between IG and R2.
  • Router R2 configuration a lost due to a power outage.
  • The application the USER is connecting to a hosted behind CE2.

What action resolves the issues on R3 and R4 routers?

A.

Set R4 as a route reflector for R3 and CE2

B.

Apply high Local Preference on R3 toward R1

C.

Set R3 as a route reflector for R4 and CE1

D.

Apply low Local Preference on R4 toward R2.

Full Access
Question # 93

Refer to the exhibit.

350-501 question answer

While troubleshooting the network, a network operator with an employee id: 3812:12:993 is trying to ping XR1. Which result should the operator expect when trying to ping to an XR1 local address?

A.

ICMP traffic works at a policed rate of 19 bytes per second every 100 ms

B.

All ICMP traffic responds successfully.

C.

All ICMP traffic is dropped.

D.

ICMP traffic works at a policed rate of 19 packets every 100 ms.

Full Access
Question # 94

How does model-driven telemetry use YANG?

A.

to reset network devices that malfunction

B.

to set informs and traps on clients to report back to a centralized server

C.

to subscribe to data that is streamed from a device

D.

to poll network devices on a 30-minute interval

Full Access
Question # 95

Drag and drop the message types from the left onto the target field of the message originator on the right.

350-501 question answer

Full Access
Question # 96

Refer to the exhibit.

350-501 question answer

A network engineer Is implementing OSPF multiarea. Which command on interface G0/1 resolves adjacency Issues in the new area?

A.

Ip ospf network broadcast

B.

Ip ospf network non-broadcast

C.

Ip ospf network polnt-to-multlpoint

D.

Ip ospf network point-to-point

Full Access
Question # 97

350-501 question answer

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 98

ASN 65001 is peering with ASN 65002 to exchange IPv6 BGP routes. All routes that originate in ASN 65001 have a standard community value of 65001:100, and ASN 65002 is allowed to advertise only 2001 :db8:aaaa::/48. An engineer needs to update the ASN 65001 route-filtering configuration to meet these conditions:

* Looped routes into ASN 65001 and routes that have traversed 10 or more ASNs must be denied.

* Routes accepted into ASN 65001 must be assigned a community value of 65001:200.

Which configuration must the engineer apply to the ASN 65001 border router?

350-501 question answer

350-501 question answer

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 99

350-501 question answer

Refer to the exhibit. The radio network and packet core are using the route RX-RZ-RB to establish communication. The LDP session between 10.10.10.5 and 10.10.10.1 is experiencing link flapping at random intervals for 30-45 seconds each time. A network engineer must protect the LDP session and improve MPLS traffic convergence. Which action meets these requirements?

A.

Enable IGP_LDP sysnc on RZ and RX

B.

Add session protection duration 60 for peer_acl_1 under the MPLS LDP instance on RZ.

C.

Attach peer_acl_1 in for session protection duration 1 on RX.

D.

Configure Peer_acl_2 on RX and allow IP address 10.10.10.6 in LDP

Full Access
Question # 100

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

A.

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Full Access
Question # 101

350-501 question answer

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

A.

It returns an AAA users with the last name CiscoTest.

B.

It creates a class map named aaauser with traffic tagged from AAA.

C.

It queries the local database to find a user named aaaUser.Json

D.

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Full Access
Question # 102

An engineer Is implementing NSR with OSPF on a large campus that requires high availability. Which task must an engineer perform to complete the process with minimal disruption to traffic?

A.

Reset OSPF neighbor sessions to maintain state Information during router switchover

B.

Configure the device to repopulate state information using routing updates received from the BDR

C.

increase the keepalive interval on the OSPF neighbors so that traffic continues to pass during the switchover.

D.

Ensure that the dual RP has synchronized their state information before performing the switchover operation.

Full Access
Question # 103

350-501 question answer350-501 question answer

Refer to the exhbit. ISP A has a BGP peering with ISP C with the maximum-prefix 150 configuration on R1. After a recent security breach on the ISP A network, a network engineer has been asked to enable a lightweight security mechanism to protect the R1 CPU and BGP membership from spoofing attacks. Which solution must ISP A implement?

A.

Configure bgp maxas-limit 1 in the IPv4 address family urateUhe global BGP configuration.

B.

Configure neighbor 10.163.83.54 enable-connected-check under the BGP IPv4 address family.

C.

Configure neighbor 10.163.83.55 password Cisco under the global BGP IPv4 address family.

D.

Configure neighbor 10.163.83.55 ttl-stcurity hops 2 under the global BGP configuration.

Full Access
Question # 104

Which two IS-IS parameters must match before two Level 2 peers can form an adjacency? (Choose two)

A.

authentication settings

B.

area ID

C.

system ID

D.

MTU

E.

hello timer setting

Full Access
Question # 105

An engineer working for a telecommunication company with an employee ID: 4460:35:466 must configure an OSPF router in a multivendor network so that it performs NSF in the event of a route processor switchover. Which configuration must the engineer apply?

A.

router ospf 1 nsf Cisco

B.

router ospf 1 nsf ietf

C.

router ospf 1 nsf ietf helper

D.

router ospf 1 nsf Cisco helper

Full Access
Question # 106

What is the role of NFVI?

A.

domain name service

B.

intrusion detection

C.

monitor

D.

network address translation

Full Access
Question # 107

Refer to the exhibit:

350-501 question answer

An engineer is preparing to implement link aggregation configuration.

Which statement al about this configuration is true?

A.

The switch port actively sends packets to negotiate an EtherChannel using PAgP

B.

The switch port accepts LACP and PAgP packets from a connected peer and negotiate an EtherChannel using the common EtherChannel mode.

C.

The switch port passively negotiates an EtherChannel if it receives PAgP packets from a connected peer

D.

The switch port negotiates an EtherChannel if it receives LACP packets from a connected peer

Full Access
Question # 108

What is an enhancement that Cisco IOS XE Software has over Cisco IOS Software?

A.

It support symmetric multiprocessing

B.

It allows all processes to use the same pool of memory.

C.

It runs on a 32-bit operating system.

D.

It is built on a GNX Neutrino Microkernel.

Full Access
Question # 109

A network engineer is configuring a BGP route policy for the SUBNET prefix set. Matching traffic must be dropped, and other traffic must have its MED value set to 400 and community 4:400 added to the route. Which configuration must an engineer apply?

350-501 question answer

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 110

Refer to the exhibit.

350-501 question answer

Which show command should be implemented to display per-interface statistics about uRPF drops and suppressed drops?

A.

show ip traffic

B.

showip interface

C.

show cef interface

D.

show ip interface brief

Full Access
Question # 111

Which utility must be used to locate MPLS faults?

A.

QoS

B.

MPLS LSP ping

C.

MPLStraceroute

D.

EEM

Full Access
Question # 112

Simulation 5

350-501 question answer

350-501 question answer

Full Access
Question # 113

Refer to the exhibit:

350-501 question answer

Which command is used to complete this configuration for QoS class-based marking?

A.

PE-A(config-pmap-c)#set dscp ef

B.

PE-A(config-pmap-c)#fair-queue

C.

PE-A(config-pmap-c)#random-detect

D.

PE-A(config -pmap-c)#priority

Full Access
Question # 114

350-501 question answer

Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

Full Access
Question # 115

350-501 question answer

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Full Access
Question # 116

Refer to the exhibit.

350-501 question answer

A Cisco engineer is implementing gRPC dial-out on an ASR. Receiver 192.168 1.1 will be assigned one of the subscriptions, and it will manage the ASR. Which command is needed to complete the router configuration?

A.

protocol grpc

B.

protocol all

C.

protocol tcp

D.

protocol any

Full Access
Question # 117

350-501 question answer

Refer to the exhibit. A company recently deployed a new network using OSPF in the core to share routes. The network administrator selected OSPF as the routing protocol because of its ability to maintain a route database. When the new network was started up, all routers booted normally, but the link between routers R1 and R2 failed to come up. The two routers are located in the same rack at the data center. Which task should an engineer perform to correct the problem?

A.

Synchronize the dead timers.

B.

Change one of the OSPF router IDs so that the router IDs are in different subnets

C.

Change the OSPF process ID on one of the devices so that the two IDs match

D.

Configure the MTUs on the interface to match.

Full Access
Question # 118

Which service is a VNF role?

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Full Access
Question # 119

FRR is configured on a network. What occurs when the headend router on the path is alerted to a link failure over IGP?

A.

LSP attempts fast switching on the backup path until the primary path returns to the active state.

B.

The headend router uses a presignaled LSP to bypass the failure point.

C.

A new backup tunnel is established past the PLR to pass through the protected nodes

D.

Backup tunnel is established and intersects with the primary tunnel at the headend.

Full Access
Question # 120

Refer to the exhibit: 350-501 question answer

BGPsec is implemented on R1. R2. R3. and R4 BGP peering is established between neighboring autonomous systems Which statement about implementation is true?

A.

BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator

B.

BGP updates from the iBGP peers are appended with a community of local-as

C.

BGP updates from the all BGP peers are appended with a community of no export

D.

BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature

Full Access
Question # 121

Refer to the exhibit.

350-501 question answer

Router R1 is reporting that its BGP neighbor adjacency to router R2 is down, but its state is Active as shown. Which configuration must be applied to routers R1 and R2 to fix the problem?

A)

350-501 question answer

B)

350-501 question answer

C)

350-501 question answer

D)

350-501 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 122

What is a characteristics of the Pipe model for MPLS QoS?

A.

The same QoS policy is applied to all customer traffic on the egress PE.

B.

If the outer EXP is changed, it is copied to the DSCP value.

C.

The MPLS EXP bits are set by the CE.

D.

The DSCP value determines how the packet is forwarded

Full Access
Question # 123

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.

After you issue this command, which BGP packets does the PE accept?

A.

from 2.2.2.2, with a TTL ol 253 Of more

B.

from 2.2.2.2, with a TTL of less than 2

C.

to 2.2.2.2, with a TTL of less than 253

D.

to 2.2.2.2, with a TTL of 2 or more

Full Access
Question # 124

After implement MPLS protocol for multiple VRFs on a single Cisco device, the engineer notices all VRFs on the router still do to not LDP session protection feature enabled. Which configuration must the engineer apply to enable the LDP session protection feature FOR LDP neighbors within each VRF?

A.

Configure LDP session protection globally on the device only.

B.

Configure LDP session protection globally on the device and on each neighbor that requires session protection.

C.

Configure LDP session authentication on the device to enable LDP session protection on each VRF automatically.

D.

Configure LDP session protection within the individual VRFs.

Full Access
Question # 125

Refer to the exhibit:

350-501 question answer

Which statement about the neighbor statements for 192.168.1.1 is true?

A.

The router must have TDP configured for the send-label command to operate

B.

The neighbor router receives at least four labels from this router

C.

The router sends BGP labels for its prefixes to this peer

D.

The router sends only a label for the prefix for LoopbackO.

Full Access
Question # 126

350-501 question answer

Refer to the exhibit. In the service provider network, routers PE1, PE2, and PE4 have access to the internet and provide access to customer networks. Router PE3 is used for access to other customer systems. In accordance with a new SLA, an engineer is updating settings on this network so that router CE1 accesses the internet via PE1 instead of PE2. Which two tasks must the engineer perform to complete the process? (Choose two.)

A.

On PE1, configure the internet VRF with import route target 102:102.

B.

On PE1 and PE4, configure the internet VRF with import route targets 102:102 and 104:104.

C.

On PE2, configure the internet VRF with import route target 102:102.

D.

On PE2 and PE3, configure the internet VRF with import route target 101:101.

E.

On PE2, configure the CE1 VRF with import route target 101:101.

Full Access
Question # 127

Which protocol is used for communication between the PCE and PCC?

A.

ICMP

B.

PCEP

C.

CEF

D.

POP

Full Access
Question # 128

350-501 question answer

Refer to the exhibit. The link between Office A and Office B is running at 90% load, and occasionally the CPU on router R1 is overloaded. The company implemented QoS for business-critical applications at both offices as a temporary solution. A network engineer must update the R1 configuration to 600 ms to reduce CPU load and limit downtime after connection failure to avoid data loss. Which action meets this requirement?

A.

Configure the fast-hello feature for OSPF with the command ip ospf dead-interval minimal hello-multiplier 3.

B.

Configure BFD demand mode with the command bfd-demand timer 150 interval 250 retransmit 5.

C.

Configure BFD non-echo mode with the command echo interval 250 minimal 300 echo-multiplier 2.

D.

Configure BFD echo mode with the command bfd interval 150 min_rx 200 multiplier 3.

Full Access
Question # 129

How does Cisco DNA Center enhance network automation?

A.

It allows network administrators to quickly deploy Cisco Layer 2 devices without requiring STP and broadcast transport.

B.

It allows network administrators to reduce inconsistencies when they deploy and validate network configurations.

C.

It allows network administrators to reduce the number of VRFs in a multi customer environment by automatically implementing a single VLAN per customer.

D.

It allows network administrators to combine voice and data networks into a single topology without manual configuration.

Full Access
Question # 130

A network engineer is configuring a router to send multicast traffic for the 239.10.10.10 group. Which configuration must an .... forward the traffic?

A.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp max-groups action replace

B.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp filter

C.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp access-group 239.10.10.10

D.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp join-group 239.10.10.10

Full Access
Question # 131

Drag and drop the NAT64 descriptions from the left onto the correct NAT64 types on the right.

350-501 question answer

Full Access
Question # 132

350-501 question answer

Refer to the exhibit. A network engineer is implementing iBGP and eBGP between AS 600 and AS 500 with these requirements:

  • R2 must establish eBGP peering on 192.168.3.0/30 with R5 for sending unicast and multicast traffic
  • R2 must wait for 30 seconds before sending BGP updates to R5 for multicast traffic.

Which action must be taken on R2 to meet the requirements?

A.

Configure advertisement-interval 30 In address-family ipv4 unicast

B.

Configure advertisement-Interval 30 in address-family Ipv4 multicast

C.

Apply timers bgp 30 in address-family ipv4 unicast

D.

Apply timers bgp 30 in address-family ipv4 multicast.

Full Access
Question # 133

You are configuring MPLS traffic-engineering tunnels in the core.

Which two ways exist for the tunnel path across the core? (Choose two )

A.

Tunnel links inherit IGP metrics by default unless overridden

B.

Tunnels can be configured with dynamic path or explicitly defined path

C.

A zero bandwidth tunnel is not a valid option

D.

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

Full Access
Question # 134

A regional MPLS VPN provider operates m two regions and wants to provide MPLS L 3VPN service for a customer with two sites in these separate locations. The VPN provider approaches another organization to provide backbone carrier services so that the provider can connect to these two locations.

Which statement about this scenario is true?

A.

When edge routers at different regional sites are connected over the global carrier backbone, MP-eBGP must run between the routers to exchange the customer VPNv4 routes

B.

When eBGP is used for label exchange using the send label option, MPLS-BGP forwarding is configured under the global ABC CSC PE-to CE interface

C.

When IGP is used for route exchange and LDP for label exchange, MPLS is enabled only on the VRF interface on the backbone-earner PE side.

D.

When BGP is used for both route and label exchange, the neighbor a.b.c.d send-lable command is used under the address family VPNv4 command mode.

Full Access
Question # 135

Refer to the exhibit.

350-501 question answer

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Full Access