New Year Special Sales Coupon - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s55disc

350-501 PDF

$49.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

350-501 PDF + Testing Engine

$76.5

$169.99

3 Months Free Update

  • Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
  • Last Update: Jan 22, 2022
  • Questions and Answers: 281
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

350-501 Engine

$58.5

$129.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) Questions and Answers

Question # 6

Refer to the exhibit:

If router A is the RP, which PIM mode can you configure so that devices will send multicast traffic toward the RP?

A.

PIM-SM

B.

PI MM-DM

C.

BIDIR-PIM

D.

PIM-SSM

Full Access
Question # 7

Refer to the exhibit.

An engineer began to configure LDP between R1 and R2, but R1 and R2 cannot yet establish an LDP TCP connection. Which additional task must be completed to finish the implementation?

A.

Configure the mpls Idp neighbor 172.16.0.1 password command on R1

B.

Configure the mpls Idp neighbor 10.0.12.1 password command on R1

C.

Configure the no mpls Idp password option 1 command on R2

D.

Configure the no mpls Idp password option 1 command on R1

Full Access
Question # 8

A network engineer is configuring Flexible NetFlow and enters these commands

What are two results of implementing this feature instead of traditional NetFlow? (Choose two.)

A.

CPU and memory utilization are reduced.

B.

Only the flows of top 100 talkers are exported.

C.

The data export flow is more secure

D.

The number of packets to be analyzed are reduced.

E.

The accuracy of the data to be analyzed is improved.

Full Access
Question # 9

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 10

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

Full Access
Question # 11

Drag and drop the functions from the left onto the correct Path Computation Element Protocol roles on the right

Full Access
Question # 12

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

A.

global configuration mode

B.

routing configuration mode

C.

BGP neighbor configuration

D.

mode BGP address-family configuration mode

Full Access
Question # 13

What is the role of NSO in network automation?

A.

It is GUI used to manage wireless devices in a campus infrastructure.

B.

It Is a type of REST API used to configure an APIC.

C.

It is a tool that uses CLl only to configure virtual network devices.

D.

It is a tool used to bridge automation to the physical network infrastructure.

Full Access
Question # 14

A network engineer is deploying VPLS configuration between multiple PE routers so that customer's remote offices have end-to-end LAN connectivity. Which additional configuration should the engineer perform on the PE routers to enable the virtual switch instance?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 15

What is the characteristic of the Tl-LFA?

A.

It guarantees a loop-free path for all interfaces in the OSPf- super backbone .

B.

It applies on each area and instance and makes all the interfaces inherit the configuration

C.

It guarantees a loop-free path for all areas configured m OSPF

D.

It applies only on the instance and makes at the interfaces inherit the configuration

Full Access
Question # 16

Refer to the exhibit.

An engineer has started to configure a router for OSPF, as shown Which configuration must an engineer apply on the network so that area 15 traffic from R5 to R1 will prefer the route through R4?

A.

Place the link between R3 and R5 in a stub area to force traffic to use the route through R4.

B.

Increase the cost on the link between R2 and R4, to influence the path over R3 and R4.

C.

Implement a multiarea adjacency on the link between R2 and R4, with the cost manipulated to make the path through R4 preferred.

D.

Implement a sham link on the between R3 and R2 to extend area 0 area 15.

Full Access
Question # 17

What is a primary benefit of IPoATM or MPLS over ATM backbone service provider networks?

A.

dedicated circuits

B.

variable-length packets

C.

isochronous system

D.

fixed-length cells

Full Access
Question # 18

The administrator of a small company network notices that intermittent network issues occasionally cause inbound notifications to its SNMP servers to be lost. Which configuration must the administrator apply so that the SNMP servers acknowledge the notifications that they receive?

A.

snmp-server community ciscotest rw 10

B.

snmp-server host tests.cisco.com public

snmp-server community ciscotest rw 10

C.

snmp-server enable traps bgp

snmp-server host 192.169.2.1 Informs

D.

snmp-server enable traps snmp

Full Access
Question # 19

Refer to the exhibit an engineer working for a private telecommunication company with an employee Id: 4065:96:080 upgrades the WAN link between routers ASBR-101 and ASBR-201 to 1Gb by Installing a new physical connection between the Gi3 Interfaces. Which BGP attribute must the engineer configure on ASBR-201 so that the existing WAN link on Gi2 Is maintained as a backup?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 20

Drag and drop the OSPF and IS-IS Cisco MPLS TE extensions from the left to their functional descriptions on the right.

Full Access
Question # 21

While implementing TTL security, an engineer issues the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command. After issuing this command, which BGP packets does the PE accept?

A.

from 2.2.2.2, with a TTL of less than 2

B.

to 2.2.2.2, with a TTL of less than 253

C.

from 2.2.2.2, with a TTL of 253 or more

D.

to 2.2.2.2, with a TTL of 2 or more

Full Access
Question # 22

Refer to the exhibit:

An engineer is preparing to implement link aggregation configuration.

Which statement al about this configuration is true?

A.

The switch port actively sends packets to negotiate an EtherChannel using PAgP

B.

The switch port accepts LACP and PAgP packets from a connected peer and negotiate an EtherChannel using the common EtherChannel mode.

C.

The switch port passively negotiates an EtherChannel if it receives PAgP packets from a connected peer

D.

The switch port negotiates an EtherChannel if it receives LACP packets from a connected peer

Full Access
Question # 23

Refer to the exhibit.

A network engineer must meet these requirements to provide a connects, solution:

  • The customer connected to Area 2 needs to access the application in Area 1 on the 10.10.10.0/24 subnet
  • The Customer must not have access to the 20.10 30.0/24 subnet.
  • The service provider must make sure that the Area 2 routing database limits the number of IP addresses in the routing table

Which two configurations must be implemented to meet the requirements? (Choose two)

A.

Set a tag value of 200 to match the summary address 10.0.0/16 on R2.

B.

Set a tag value of 200 to match the summary address 10.0.0.0/16 on R3.

C.

Apply the route map for tag 200 and leak Level 2 routes into Level 1 Area 2 on R3

D.

Apply the route map for tag 200 and teak Level 2 routes into Level 1 Area 2 on R4.

E.

Set a tag value of 200 to match the summary address 10.0.0./16 on R1.

Full Access
Question # 24

Refer to the exhibit:

Which statement about this configuration is true"?

A.

It requires an explicit Cisco MPLS TE path to be configured for the tunnel to run

B.

It requires OSPF to also be running to have optimized Cisco MPLS TE tunnels

C.

It requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run

D.

It is the configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing

Full Access
Question # 25

Which statement about Network Services Orchestrator (NSO) is true?

A.

It is used only in service provider environments

B.

It can be used only with XML coding

C.

It uses YANG modeling language to automate devices

D.

It must use SDN as an overlay for addressing

Full Access
Question # 26

Refer to the exhibit.

An ISP provides shared VoIP Extranet services to a customer in VRF-100 with these settings:

  • The VoIP services are hosted in the 198.19.1000/24 space.
  • The customer has been assigned the 198.18.10/29 IP address bloc*.
  • VRF-100 is assigned Import and export route target 85010:100.

Which configuration must the engineer Apply to PE-1 to provision VRF-100 and provide access to the shared services?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

Refer to the exhibit.

Router 4 is added to the network and must be in the same area as router 1. Which NET should the engineer assign?

A.

49.0001.0000.0000.0004.00

B.

49.0111.0000.0000.0001.00

C.

49.0011.0000.0000.0003.00

D.

49.0011.0000.0000.0002.00

Full Access
Question # 28

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Full Access
Question # 29

You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.

If you apply this code to BGP filters, which effect does the code have on your router?

A.

denies routes from AS 7070

B.

allows routes from AS 7077

C.

denies routes from AS 7007

D.

allows routes from AS 770

Full Access
Question # 30

Which protocol does a Cisco MPLS TE tunnel use to maintain paths within the core?

A.

RSVP

B.

VTP

C.

STP

D.

RPF

Full Access
Question # 31

Refer to the exhibit:

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Full Access
Question # 32

Refer to the exhibit.

An engineer working for private Service Provider with employee id: 3948:11:613 is configuring the BGPsec framework. Which two conditions must the engineer take into account? (Choose two.)

A.

BGPsec uses IPsec tunnel for security.

B.

The BGPsec framework secures the AS path.

C.

In BGPsec. all route advertisements are given an expiry time by the originator of the route.

D.

Private keys are part of the router key pair used to sign route updates.

E.

In BGPsec. route advertisements are not given an expiration time by the originator of the route.

Full Access
Question # 33

How much must the MTU be increased when configuring the 802.1q VLAN tag?

A.

2 bytes

B.

4 bytes

C.

8 bytes

D.

12 bytes

Full Access
Question # 34

Refer to the exhibit:

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Full Access
Question # 35

Drag and drop the OSPF area types from the left onto the correct statements on the right

Full Access
Question # 36

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 37

The network-engineering team of a service provider is integrating several recently acquired networks into a more scalable common Unified MPLS architecture. The new network architecture will support end-to-end VPNv4 and VPNv6 services with these requirements:

• The IGP of the core layer is IS-IS In Area 0.

• The IGP of the aggregation layers is OSPF in Area 0.

• The LDP protocol Is used to distribute label bindings within each IGP domain.

Which task must the network engineer perform when implementing this new architecture?

A.

Configure BGP-LU between ABR routers of each IGP domain to carry MPLS label information in NLRI.

B.

Configure a BGP session between the ABR routers of each IGP domain to exchange VPNv4 or VPNv6 prefixes

C.

Configure the ABR in each IGP domain to preserve next-hop information on all VPNv4 and VPNv6 prefixes advertised by the PE.

D.

Configure mutual redistribution of each IGP domain's loopback prefix to provide end-to-end LDP LSP

Full Access
Question # 38

A network engineer is implementing BFD configuration changes on a customer's equipment. How is the bfd interval configuration on the interface disconnected?

A.

The status of the interface changes.

B.

The IPv4 or IPv6 address configuration on the interface changes.

C.

It is automatically disconnected when the BFD-configured subinterface is removed.

D.

It is automatically disconnected when the BFD main interface is removed.

Full Access
Question # 39

Refer to the exhibit.

What is the effect of this configuration?

A.

R1 supports a graceful restart operation on the peer, even if graceful restart is disabled on the peer.

B.

R1 supports a peer that is configured for LDP SSO/NSF as the peer recovers from an outage.

C.

R1 failovers only to a peer that is configured for LDP SSO/NSF.

D.

R1 failovers to any peer.

Full Access
Question # 40

A network engineer is configuring a BGP route policy for the SUBNET prefix set. Matching traffic must be dropped, and other traffic must have its MED value set to 400 and community 4:400 added to the route. Which configuration must an engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

Drag and drop the descriptions from the left onto the corresponding OS types on the right.

Full Access
Question # 42

Refer to the exhibit.

What type of configuration is it?

A.

It is configuration that requires an explicit Cisco MPLS TE path to be configured for the tunnel to run.

B.

It is configuration that requires OSPF to also be running to have optimized Cisco MPLS TE tunnels.

C.

It is configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing.

D.

It is configuration that requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run.

Full Access