New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Questions 4

Refer to the exhibit.

An engineer is configuring an administrative domain in the given multi-vendor environment with PIM-SM. Which feature must the engineer implement so that devices will dynamically learn the RP?

Options:

A.

Auto-RP

B.

BIDIR-PIM

C.

SSM

D.

BSR

Buy Now
Questions 5

Which three OSPF parameters must match before two devices can establish an OSPF adjacency? (Choose three.)

Options:

A.

IP address

B.

interface cost

C.

subnet mask

D.

process ID

E.

hello timer setting

F.

area number

Buy Now
Questions 6

Refer to the exhibit. A growing company wants to ensure high availability and redundancy for its critical web servers, which are located in an offsite data center. The network architect decided to implement BGP so that the network can use redundant paths for outbound traffic toward the destination subnet 10.2.2.0/24. A network engineer already configured basic BGP settings on edge router R1, which is a Cisco ASR-1001X router. The engineer also confirmed loopback reachability to routers R2 and R3, and the AS path length toward the destination is the same via R2 and R3. Which action must the engineer take on R1 to complete the implementation?

Options:

A.

Implement as-path multipath under the BGP neighbor configuration.

B.

Implement maximum-paths ibgp 2 under the BGP neighbor configuration.

C.

Implement maximum-paths 2 under the BGP global configuration.

D.

Implement bestpath as-path multipath-relax under the BGP global configuration.

Buy Now
Questions 7

Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?

Options:

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

Buy Now
Questions 8

An engineer is configuring IEEE 802.1 ad on the access port on a new Cisco router. The access port handles traffic from multiple customer VLANs, and it is expected to mark all customer traffic to the same VLAN without dropping any traffic. Which configuration must the engineer apply?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 9

Refer to the exhibit.

The network engineer who manages ASN 65001 must configure a BGP routing policy on GW-XR1 with these requirements:

• Advertise locally-originated routes and /24 prefixes assigned within the 198.18.0.0/15 range. All other prefixes must be dropped.

• Reachability to 198.18.100.0/24 must be preferred via the EDGE-1 connection.

• Reachability to 198.19.100.0/24 must be preferred via the EDGE-2 connection.

Which configuration must the network engineer implement on GW-XR1?

Options:

A.

B.

C.

D.

Buy Now
Questions 10

Refer to the exhibit.

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 11

Which function does RSVP perform in a Cisco MPLS TE environment?

Options:

A.

It establishes targeted LDP sessions between neighbors that are directly connected.

B.

It signals to LDP protocol along the path that a Cisco MPLS TE will be configured.

C.

It reserves bandwidth for LDP sessions between routers participating in a Cisco MPLS TE.

D.

It reserves the bandwidth along the path between the head-end and tail-end router.

Buy Now
Questions 12

Refer to the exhibit.

A network engineer is deploying SNMP configuration on client's routers. Encrypted authentication must be included on router 1 to provide security and protect message confidentially. Which action should the engineer perform on the routers to accomplish this task?

Options:

A.

snmp-server host 192.168.0.254 informs version 3 auth testuser config.

B.

snmp-server user testuser group 1 remote 192.168.0.254 v3 auth md5 testpassword

C.

snmp-server group group 1 v3 auth.

D.

snmp-server community public

Buy Now
Questions 13

Refer to the exhibit.

Router 4 is added to the network and must be in the same area as router 1. Which NET should the engineer assign?

Options:

A.

49.0001.0000.0000.0004.00

B.

49.0111.0000.0000.0001.00

C.

49.0011.0000.0000.0003.00

D.

49.0011.0000.0000.0002.00

Buy Now
Questions 14

Refer to the exhibit.

AN engineer is configuring segment routing on an ISP to simplify traffic engineering and management across network domains. What should the engineer do to complete the implementation of segment routing?

Options:

A.

OSPF must be configured with wide area metrics to support routing.

B.

The segment will run without any further configuration.

C.

Area authentication must be enable before segment routing will run.

D.

Area Authentication must be enable before segment routing will run.

Buy Now
Questions 15

Refer to Exhibit.

A network engineer is trying to retrieve SNMP MIBs with RESTCONF on the Cisco switch but fails. End-to-end routing is in place. Which configuration must the engineer implement on the switch to complete?

Options:

A.

netconf-yang cisco-ia snamp-community -string Public

B.

snmp-server community cisco RW

C.

snmp-server community public RO

D.

netconf-yang cisco-Ia snmp-community-string Private

Buy Now
Questions 16

Which utility can you use to locate MPLS faults?

Options:

A.

MPLS traceroute

B.

EEM

C.

MPLS LSP ping

D.

QoS

Buy Now
Questions 17

Refer to the exhibit. The link between Office A and Office B is running at 90% load, and occasionally the CPU on router R1 is overloaded. The company implemented QoS for business-critical applications at both offices as a temporary solution. A network engineer must update the R1 configuration to 600 ms to reduce CPU load and limit downtime after connection failure to avoid data loss. Which action meets this requirement?

Options:

A.

Configure the fast-hello feature for OSPF with the command ip ospf dead-interval minimal hello-multiplier 3.

B.

Configure BFD demand mode with the command bfd-demand timer 150 interval 250 retransmit 5.

C.

Configure BFD non-echo mode with the command echo interval 250 minimal 300 echo-multiplier 2.

D.

Configure BFD echo mode with the command bfd interval 150 min_rx 200 multiplier 3.

Buy Now
Questions 18

Refer to the exhibit. R1 and R3 have a pseudowire connection between them, which allows R2 and R4 to communicate via Layer 2. R2 uses VLAN 10. R4 also uses VLAN 10, but with a different subnet associated.

Which configuration should the engineer apply to R3 to rewrite the VLAN on traffic from R2 to VLAN 15?

Options:

A.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag translate 1-to-2 dot1q 15 second-dot1q 20

B.

interface TenGigE0/0/0/0.2 I2transport

 encapsulation dot1q 15

C.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag pop 1

D.

interface TenGigE0/0/0/0.2 12transport

 encapsulation dot1q 10

 rewrite ingress tag push dot1q 15 symmetric

Buy Now
Questions 19

Refer to the exhibit:

Which three outcomes occur if the prefix list is added to the neighbor? (Choose three)

Options:

A.

192.168 0.0/19 is denied.

B.

192.168 0.0/17 is denied.

C.

192.168 0.0/17 is permitted

D.

192.168.0.0/16 is denied

E.

192.168 0.0/16 is permitted

F.

192.168 0.0/19 is permitted

Buy Now
Questions 20

According to RFC5305 on IS-IS extensions for traffic engineering, what is the 4-octet sub-TLV type 10 of extended IS-IS reachability TLV type 22?

Options:

A.

TE default metric

B.

maximum reservable link bandwidth

C.

administrative group (color)

D.

IPv4 neighbor address

Buy Now
Questions 21

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

Options:

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

Buy Now
Questions 22

After implement MPLS protocol for multiple VRFs on a single Cisco device, the engineer notices all VRFs on the router still do to not LDP session protection feature enabled. Which configuration must the engineer apply to enable the LDP session protection feature FOR LDP neighbors within each VRF?

Options:

A.

Configure LDP session protection globally on the device only.

B.

Configure LDP session protection globally on the device and on each neighbor that requires session protection.

C.

Configure LDP session authentication on the device to enable LDP session protection on each VRF automatically.

D.

Configure LDP session protection within the individual VRFs.

Buy Now
Questions 23

Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is Mbps. The company XYZ security team asked the ISP to redirect ICMP requests which are currently going to the web server to a new local security appliance which configuration must an ISPP engineer apply to router R2 to redirect the ICMP traffic?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 24

Refer to the exhibit.

Refer to the exhibit. An ISP provides shared VoIP Extranet services to a customer in VRF-100 with these settings:

The VoIP services are hosted in the 198.19.100.0/24 space.

The customer has been assigned the 198.18.1.0/29 IP address block.

VRF-100 is assigned import and export route target 65010:100.

Which configuration must the engineer apply to PE-1 to provision VRF-100 and provide access to the shared services?

Options:

A.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

import map VRF-100-IMPORT

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65010:100

!

route-map VRF-100-I

B.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:2999

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:1999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65

C.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:1999

exit address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity r 650

D.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

route-target export 65010:100

route-target export 65010:1999

route-target import 65010:100

route-target import 65010:2999

exit-address-family

Buy Now
Questions 25

How do intent APIs make it easier for network engineers to deploy and manage networks?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 26

Refer to the exhibit. An engineer must update the configuration of the network with these requirements:

    PE routers must define labels for IS-IS learned routes in AS100.

    P routers must not receive LDP bindings for the external network in the IPv6 address family.

Which configuration must the engineer implement to meet these requirements?

Options:

A.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global host-routes

B.

CE1(config)# mpls Idp label

 CE1(config-Idp-Ibl)# allocate global host-routes

C.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global prefix-list SPLDP

D.

PE1(config)# mpls Idp label

 PE1(config-Idp-Ibl)# no allocate global prefix-list Ipv6_All

Buy Now
Questions 27

Refer to the exhibit. A network operations team is implementing eBGP on the service provider network. Data traffic between routers R1 and R4 must use the R2-R3 link, which connects AS 65101 and AS65201. iBGP sessions with adjacent routers are up on 10.10.10.1 and 10.10.10.4. The team is now updating the configuration for eBGP peers on routers R2 and R3. Which action must be taken to meet the requirements?

Options:

A.

Add the soft-reconfiguration command.

B.

Add the ebgp-multihop command.

C.

Remove the update-source command.

D.

Remove the next-hop-self command.

Buy Now
Questions 28

Which Cisco software OS uses monolithic architecture?

Options:

A.

NX-OS

B.

IOS XE

C.

IOS XR

D.

IOS

Buy Now
Questions 29

A service provider is in the process of implementing Unified MPLS on an enterprise network with many nodes. After the migration, several new customers will be added to the environment. RFC 3107 is used to build BGP LSPs across the domains. Which action must the networking team take to reduce the full-mesh requirement for IBGP?

Options:

A.

Implement route reflectors on all ABRs.

B.

Implement a confederation with the network segmented according to business units.

C.

Implement route reflectors on all P routers.

D.

Implement a confederation with each ABR serving as a gateway between secondary AS numbers.

Buy Now
Questions 30

An engineer is implementing IGMP with SSM on a multicampus network that supports video streaming. Which task must the engineer perform as part of the process?

Options:

A.

Configure the network to use IGMPv3.

B.

Configure the network to use bidirectional PIM.

C.

Configure an RP that uses static assignments only.

D.

Configure the network to use the PIM bsr-candidate

Buy Now
Questions 31

Refer to the exhibit:

If router RA is configured as shown, which IPv4 multicast address space does it use?

Options:

A.

224.0. 0.0/8

B.

225.0. 0.0/8

C.

232.0. 0.0/8

D.

239.0. 0.0/8

Buy Now
Questions 32

Refer to the exhibit. The ISP is implementing a new hosting-as-a-service solution for its business customers. Service accessibility must be unique and separate for each customer. The network architect must ensure that multiple paths toward the hosting-as-a-service solution are always available. Basic protection against traffic black-holing on the MPLS network is required in case of link failure. Which two actions must the engineering team perform to meet the requirements? (Choose two.)

Options:

A.

Create the hosting-as-a-service VRF on router R4 and configure It with the route target both 65123:88 command.

B.

Configure the fast-reroute per-prefix command for the IS-IS protocol in the MPLS network and enable the BGP route-reflector feature on R2.

C.

Enable the VRF-Lite feature on router R4 and enable BGP address-family VPNv4.

D.

Configure the mpls Idp sync command in the MPLS network with the BGP additional-paths receive and additional-paths send options.

E.

Configure the fast-hello command under the IS-IS routing protocol with the BGP multipath 2 option enabled.

Buy Now
Questions 33

Refer to the exhibit.

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

Options:

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Buy Now
Questions 34

Which utility must be used to locate MPLS faults?

Options:

A.

QoS

B.

MPLS LSP ping

C.

MPLStraceroute

D.

EEM

Buy Now
Questions 35

How do CSC VPN services use BGP to support connectivity between customer sites?

Options:

A.

BGP uses address families for IPv6 support in networks that use IPv4 and IPv6 between customers in different geographies.

B.

The BGP AS-Override feature allows the CSC network to use the same autonomous system number.

C.

BGP eliminates the need for an IGP to run within the backbone carrier core and provides more efficient label distribution.

D.

BGP sends labels to the CSC-PE router so that traffic can traverse the backbone carrier.

Buy Now
Questions 36

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 37

Refer to the exhibit. The network operations team reported that the access site that is connected to R3 is not connecting to the application server in the data center and that all packets that are sent from the application server to the access site are dropped. The team verified that OSPF and BGP peerings are up in BGP AS 65101 and BGP AS 65201. R4 is expected to receive traffic from the application server route via OSPF. Which action resolves this issue?

Options:

A.

Remove the route-map on R4 when advertising 172.16.20.1 in BGP to R3.

B.

Advertise application server 172.16.20.1 in the OSPF routing table on R6.

C.

Allow 172.16.20.1 in the BGP advertisement on R3 in the route-map.

D.

Add the next-hop-self command on R6 to enable R3 iBGP peering.

Buy Now
Questions 38

Refer to the exhibit:

Which purpose of implementing NSF with this configuration is true?

Options:

A.

The router uses NSF to load balance traffic between two links, with the primary link alternating every 90 seconds

B.

The router uses NSF to reduce neighbor-relationship downtime during RP switchover

C.

The router uses NSF to load balance traffic on a routed EtherChannel

D.

The router uses NSF to handle RP switchover while allowing neighbor relationships to remain up

Buy Now
Questions 39

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

Options:

A.

Disable the MPLS LDP IGP sync holddown.

B.

Configure OSPF or IS-IS as the routing protocol.

C.

Configure EIGRP as the routing protocol using stub areas only.

D.

Enable MPLS LDP sync delay timers.

Buy Now
Questions 40

Refer to the exhibit.

An engineer is updating this network to meet these conditions:

• Area 10 will receive inter-area routes and support mutual redistribution of external routes with the extranet.

• The ::/0 route is prohibited in Area 10.

• Area 11 will receive only the ::/0 route from the ABR.

• External route redistribution is not supported in Area 11.

• The ABR in Area 11 will advertise no interarea routes.

Which two configurations must be performed to meet the requirements? (Choose two.)

Options:

A.

Configure area 11 as nssa no-summary on R7 and as nssa on XR31.

B.

Configure area 10 as stub on R9 and XR32.

C.

Configure area 11 as stub no-summary on R7 and as stub on XR31.

D.

Configure area 11 as nssa default-information-originate on R7 and as nssa on XR31.

E.

Configure area 10 as nssa on R9 and XR32.

Buy Now
Questions 41

Refer to the exhibit:

Which effect of this configuration is true?

Options:

A.

it creates a pseudowire class named Cisco

B.

It enables tagging for VLAN 12 on the interface

C.

It enables MPLS on the interface

D.

It enables AToM on interface gigabitethemet1/0

Buy Now
Questions 42

Refer to the exhibit. The NOC is configuring PE router R4 for BGP-originated traffic. R4 is connected to a CE device at a customer location. The customer requires:

    BGP peers must establish a neighborship with NSR and NSF capability.

    BGP must maintain state with the CE and provide continuous forwarding during ISSU and RP switchover events.

Which action meets the NSR requirement on PE routers?

Options:

A.

Set the BGP administrative distance to 15 for BGP neighbors.

B.

Set the BGP restart-time to 120 seconds.

C.

Set the BGP peering with ha-mode sso.

D.

Set the BGP stalepath-time to 360 seconds.

Buy Now
Questions 43

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

Options:

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Buy Now
Questions 44

Which OS uses a distributed subsystem architecture?

Options:

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Buy Now
Questions 45

Which capability does the MPLS TE FRR facility backup protection method provide?

Options:

A.

defining the set of characteristics for the backup TE LSP

B.

leveraging label stacking to protect selected TE LSPs using a single backup TE LSP

C.

creating a bypass LSP for each protected LSP at each point of local repair

D.

assigning a backup TE LSP tunnel to the protected node at the headend of the protected TE LSP

Buy Now
Questions 46

Company A is implementing VoIP services across the company. The network architect designed a QoS policy to allow only specific IP subnets and mark the signaling flow with DSCP 36. The solution should be as secure as possible. Phones receive their IP addresses from the 172.184.12.0/24 pool and are assigned by the RADIUS server to VLAN 1021. Skinny Client Control Protocol is used as a signaling protocol in the network. For security reasons, switchport port-security maximum 1 vlan voice has been preconfigured on the switch side. Which two tasks must an engineer perform on SW_1 to achieve this goal? (Choose two.)

Options:

A.

Implement a class map with the set dscp af42 command.

B.

Implement a class map with the set dscp af43 command.

C.

Implement an ACL with the set dscp af41 command.

D.

Implement an ACL with the permit udp 172.184.12.0 0.0.0.255 any range 2000 2002 command.

E.

Implement an ACL with the permit tcp 10.124.121.0 0.0.0.255 range 16384 32767 command.

Buy Now
Questions 47

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

Options:

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Buy Now
Questions 48

Refer to the exhibit. Company A is connected to multiple upstream ISPs, with ISP_A serving as the primary upstream ISP. The company A subnet 172.43.232.0 should be announced to the secondary ISP_B only when the FTP server with IP address 10.10.1.1 is not accessible via the primary ISP. Which configuration must be applied on R1?

Options:

A.

neighbor 10.182.213.2 Condition-map Non-RIB prefix-map Advertise-route

B.

neighbor 10.182.213.3 prefix-map Non-RIB Condition-map Advertise-route

C.

neighbor 10.182.213.3 advertise-map Advertise-route non-exist-map Non-RIB

D.

neighbor 10.182.213.3 advertise-map Advertise-route exist-map Non-RIB

Buy Now
Questions 49

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to create a subscription to specify the streaming interval

B.

It is used to identify traps for SNMP polling

C.

It is used to identify MIB entries and has a list of YANG models

D.

It is used to create a sensor-group and has a list of YANG models for streaming

Buy Now
Questions 50

Refer to the exhibit. A growing company with an increasing international presence requires a secure and scalable solution for inter-office data transfer across their geographically dispersed locations. To ensure departmental privacy, the network must enforce granular access control. BGP is running in the network, and two VRF instances with unique route distinguishers and route targets have been configured to segregate critical financial data from regular network traffic. A network engineer with an employee ID: 5086:72:617 must find a solution that allows for future network expansion while maintaining robust security and data privacy between departments. The solution must comply with the RFC 4364 standard. Which action must the engineer take to meet the requirements?

Options:

A.

Configure a GRE tunnel in AH mode between the two routers.

B.

Configure MPLS in L3VPN mode between the two routers.

C.

Configure a DMVPN connection between the two routers with Phase 2 mode enabled.

D.

Configure an IPsec VPN connection between the two routers with ESP protocol enabled.

Buy Now
Questions 51

Drag and drop the LDP features from the left onto the correct usages on the right.

Options:

Buy Now
Questions 52

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 53

Refer to the exhibit.

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 54

What do Ansible and Salt Stack have in common?

Options:

A.

They both use DSL configuration language

B.

They both use YAML configuration language

C.

They both have agents running on the client machine

D.

They both can be designed with more than one master server

Buy Now
Questions 55

Refer to the exhibit.

An engineer wants to determine which paths are best, second best, third best, and fourth best. Drag and drop the peer addresses on the left to the corresponding BGP best-path selection order on the right.

Options:

Buy Now
Questions 56

Which condition must be met for TI-LFA to protect LDP traffic?

Options:

A.

For single-segment protection, the PQ node must be LDP and SR-capable.

B.

The protected destination must have an associated LDP label and prefix-SID.

C.

The point of local repair must be LDP-capable.

D.

For double-segment protection, the P and Q nodes must be SR-capable.

Buy Now
Questions 57

Refer to the exhibit. Company A is running OSPF within its network, comprised of routers R2, R3, R4, and R5 and consisting of two areas. Company A just acquired Company B, which uses EIGRP on its own R1. R1 has several routes in its routing table. The network engineering team at Company A needs access to the Company B network to manage network devices there, but each company will otherwise operate independently. R2 will serve as the ASBR between the two networks. Which action must the team take to reduce the number of EIGRP routes received on R2 and include only the necessary routes in the routing table?

Options:

A.

Apply an outbound distribute list on R3 and R4 to filter unnecessary intra-area routes from reaching the rest of the OSPF domain.

B.

Apply an inbound distribute list on R2 with a route map that permits only the necessary networks.

C.

Implement an offset list on R1 for the necessary networks.

D.

Attach an access list to the R2 interface connected to R1 that denies all traffic except for the necessary engineering team traffic.

Buy Now
Questions 58

How does TI-LFA reduce packet loss in Segment routing?

Options:

A.

It determines which link to use when load balancing to prevent packet fragmentation loss.

B.

It establishes multiple labels per path using more than one IGP.

C.

It calculates loop-free backup paths that are rapidly implemented in case of a link failure.

D.

It enables path selection in SR-TE to support MPLS label allocation.

Buy Now
Questions 59

A network engineer is implementing NetFlow to observe traffic patterns on the network. The engineer is planning to review the patterns to help plan future strategies for monitoring and preventing congestion as the network grows. If the captures must include BGP next-hop flows, which configuration must the engineer apply to the router?

Options:

A.

ip cef

ip flow-export version 5 bgp-nexthop

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow egress

B.

ip cef

ip flow-export version 9 bgp-nexthop

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

C.

ip cef

ip flow-export version 5

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow ingress

cdp enable

D.

no ip cef

ip flow-export version 9

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

ip flow egress

Buy Now
Questions 60

Refer to the exhibit. EIGRP is running between routers R5 and R1, and OSPF is used in the rest of the network. Users in a network attached to router R3 need to access a server connected to R5. Which task must the engineer perform so that only the users attached to R3 are able to access the server, but no other network is shared to OSPF?

Options:

A.

Configure redistribution using route maps to filter the routes that are shared

B.

Configure redistribution using an offset list to filter the routes that are shared.

C.

Configure an OSPF virtual link between R1 and R3 to route traffic between the two areas.

D.

Configure R1 as a stub router for EIGRP and OSPF so that only the default route is shared

Buy Now
Questions 61

Which statement about the Cisco MPLS TE forwarding adjacency feature is true?

Options:

A.

It enables the headend and tailend routers to establish a bidirectional tunnel

B.

It enables the tailend router to advertise routes to the headend router over the tunnel

C.

It enables the MPLS core to use EIGRP as the routing protocol

D.

It enables the Cisco MPLS TE tunnel to be advertised into the running IGP.

Buy Now
Questions 62

An engineer needs to implement QOS mechanism on customer's network as some applications going over the internet are slower than others are. Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task? (Choose two)

Options:

A.

Configure a queue with sufficient memory to buffer excess packets.

B.

Configure the token values in bytes.

C.

Implement packet remarking for excess traffic.

D.

Implement a scheduling function to handle delayed packets.

E.

Configure a threshold over which excess packets are discarded.

Buy Now
Questions 63

Drag and drop the functions from the left onto the correct Path Computation Element Protocol roles on the right

Options:

Buy Now
Questions 64

Refer to me exhibit.

A network operator recently configured BGP FlowSpec for me internal IT network What will be inferred from the configuration deployed on me network?

Options:

A.

The policy is configured locally on CSRl and drops all traffic for TCP ports 80 and 443

B.

The policy is learned via BGP FlowSpec and drops all traffic for TCP ports 80 and 443

C.

The policy is warned via BC FlowSpec aid has active traffic

D.

The policy is configured locally on CSR1 and currently has no active traffic

Buy Now
Questions 65

Drag and drop the characteristics from the left onto the automation tool on the right.

Options:

Buy Now
Questions 66

Refer to the exhibit.

Which task completes the configuration?

Options:

A.

Specify the maximum number of prefixes that R1 receives from neighbor 192.168.1.2.

B.

Specify the source interface in the neighbor statement.

C.

Specify the activate neighbor 192.168.1.2 under the IPv4 address family.

D.

Specify the local-as value in the neighbor statement.

Buy Now
Questions 67

Refer to the exhibit.

An engineer is configuring router R1 for OSPFv3 as shown. Which additional configuration must be performed so that the three active interfaces on the router will advertise routes and participate in OSPF IPv6 processes?

A)

B)

C)

Options:

A.

Option A

B.

Option B

C.

Option C

Buy Now
Questions 68

Refer to the exhibit. ISP_A is a Tier-1 ISP that provides private Layer 2 and Layer 3 VPN services across the globe using an MPLS-enabled backbone network. Routers R1, R2, R13, and R14 are PE devices. ASRs R3 and R4 and ASBRs R11 and R12 are acting as route reflectors with preconfigured next-hop-self for all BGP neighbors. After the network experienced IGP RIB overflow with multiple routes, a network engineer is working on a more scalable network design to minimize the impact on local RIBs. The solution should be based on RFC 3107 and maintain existing QoS capabilities.

Which task must the engineer perform to achieve the goal?

Options:

A.

Implement Seamless Segment Routing on the ABR routers.

B.

Implement MPLS Traffic Engineering on PE routes only.

C.

Implement Hierarchical MPLS VPLS across all LDP-enabled routers.

D.

Implement Unified MPLS on all MPLS-enabled routers.

Buy Now
Questions 69

Refer to the exhibit. A network engineer with an employee ID: 5086:72:817 is configuring a connection to manage CE1 from the OAM server on VLAN 100. PE1 must push S-VLAN tag 10 toward PE2 while forwarding traffic from CE1 to the OAM server. PE1 must push S-VLAN tag 20 toward PE2 while forwarding traffic from CE2 to the data traffic gateway. Which configuration must the engineer implement on PE2?

Options:

A.

interface GigE0/1

encapsulation dot1q 100

rewrite ingress tag pop 10

rewrite ingress tag push 20

B.

interface Ge0/0

encapsulation dot1q 100

rewrite ingress tag push dot1q 10 symmetric

interface Ge0/1

encapsulation dot1q 200

rewrite ingress tag push dot1q 20 symmetric

C.

interface GigE0/1

encapsulation dot1q 10

rewrite ingress tag push dot1q 10 symmetric

Interface Ge0/0

encapsulation dot1q 20

rewrite ingress tag push dot1q 20 symmetric

D.

Interface Ge0/1

encapsulation dot1q 100

Buy Now
Questions 70

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

Options:

A.

Enable communication over TCP port 646 for T-LDP hello messages.

B.

Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers.

C.

Enable LDP session protection on either one of the routers, which allows them to autonegotiate.

D.

Set the LDP session protection timer on each router to the same value.

Buy Now
Questions 71

Refer to the exhibit:

What is significant about the number 2 in the configuration?

Options:

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Buy Now
Questions 72

Refer to the exhibit.

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs to the interface states of Gi0/0/0/0 and Gi0/0/0/1?

Options:

A.

Gi0/0/0/1 and Gi0/0/0/0 become active

B.

Gi0/0/0/1 and Gi0//0/0 remains standby

C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby

D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby

Buy Now
Questions 73

What is the purpose of OSPF-TE extensions to MPLS traffic engineering functionality?

Options:

A.

carrying OSPF routing information for TE tunnels

B.

advertising the TE tunnel routes to the OSPF domain

C.

calculating and establishing TE tunnels in accordance with network constraints

D.

calculating fast reroute to provide a backup path for TE tunnels

Buy Now
Questions 74

An engineer implemented LDP protocol on the ISP network. The engineer must ensure that there are no packet loss issues when IGP and LDP protocols are not synchronized. Which configuring must the engineer implement so that the IGP routing protocol will wait until LDP convergence is completed?

Options:

A.

Disable IP CEF routers running LDP and enable LDP protocol.

B.

Configure MPLS LDP IGP synchronization on the network.

C.

Configure LDP sessions protection on the network.

D.

Disable MPLS LDP IGP synchronization on the network.

Buy Now
Questions 75

A regional company is planning to bolster the security of their LAN infrastructure by implementing advanced encryption techniques between their core switch and their distribution switch. The solution must leverage hardware-accelerated encryption capabilities to transparently encrypt all traffic between the two switches at the data-link layer to safeguard against unauthorized access. However, it is important for the solution to have minimal impact on network performance and latency.

Which action must the engineer take to meet the requirements?

Options:

A.

Deploy an IPsec tunnel with MD5 hashing between the two switches.

B.

Enable SSL VPN with SHA-256 encryption on all interfaces on both switches.

C.

Enable L2TP with RSA encryption on both switches.

D.

Implement MACsec with AES-256 encryption on both switches.

Buy Now
Questions 76

Refer to the exhibit:

Which information is provided for traceback analysis when this configuration is applied?

Options:

A.

BGP version

B.

packet size distribution

C.

source interface

D.

IP sub flow cache

Buy Now
Questions 77

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

Options:

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Buy Now
Questions 78

Drag and drop the 5G RAN architecture types from the bottom next to the corresponding topologies on the right.

Options:

Buy Now
Questions 79

Which regular expression query modifier function indicates the start of a string?

Options:

A.

^

B.

[^]

C.

+

D.

$

Buy Now
Questions 80

SIMULATION 4

Options:

Buy Now
Questions 81

Refer to the exhibit.

A network engineer is implementing a standard customer route-policy on ASBR1 with these requirements:

• It must accept only customer-assigned prefixes

• It must preserve customer advertised BGP communities

• It must set the local-preference to 110 for all prefixes

• It must attach the ORIGINATION-PE and LOCAL-CITY communities to all accepted prefixes.

Which route policy must the engineer implement on ASBR1 to satisfy the requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 82

Refer to the exhibit.

What type of configuration is it?

Options:

A.

It is configuration that requires an explicit Cisco MPLS TE path to be configured for the tunnel to run.

B.

It is configuration that requires OSPF to also be running to have optimized Cisco MPLS TE tunnels.

C.

It is configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing.

D.

It is configuration that requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run.

Buy Now
Questions 83

Simulation 5

Options:

Buy Now
Questions 84

A new PE router is configured to run OSPF as an IGP with LDP on all interfaces. The engineer is trying to prevent black holes after convergence when the PERSON device loses an LDP session with other PE routers. Which action must the engineer take to implement LDP session protection on a new PE router?

Options:

A.

Configure the mpls ldp session protection and mpls label protocol ldp commands on the interfaces on the new PE router that connect to the CENTER routers.

B.

Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands on the interfaces on the new PE router that connect to the CE routers.

C.

Configure the new PE router with the mpls ldp session protection command and on neighboring routers that connect to this new PE router.

D.

Configure the new PE router with the mpls ldp session protection command on interfaces with directly connected neighbors.

Buy Now
Questions 85

What is the primary purpose of Terraform in the network?

Options:

A.

to manage the Cisco network infrastructure as code to ensure consistent configuration and scalability

B.

to facilitate the integration of Cisco networking solutions with cloud platforms to improve scalability

C.

to schedule and manage maintenance tasks on Cisco network devices to minimize errors and downtime

D.

to enable the seamless migration of Cisco network configurations between diverse network environments

Buy Now
Questions 86

Refer to the exhibit. The network manager asked a network engineer to increase data-plane security on an Edge router connected to the internet with these requirements:

*Allow incoming HTTP traffic from any source to the Web server with IP address 192.168.1.10.

*Allow incoming SSH traffic from the management host with IP address 10.0.0.10.

*Block incoming Telnet traffic from all sources.

Which action must the engineer take to meet the requirements?

Options:

A.

Implement port security under the Gi0/0 interface.

B.

Implement uRPF under the Gi1/0 interface.

C.

Implement an access control list under the Gi1/0 interface.

D.

Implement Network Address Translation under the Gi0/0 interface.

Buy Now
Questions 87

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?

Options:

A.

Configure transport connection-mod© passive on R2.

B.

Configure neighbor 172.16.172.1 authentication on R1

C.

Configure neighbor update-source lo0 on R2

D.

Configure remote-as 16213 on R1.

Buy Now
Questions 88

Which two features describe TI-LFA? (Choose two.)

Options:

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Buy Now
Questions 89

What is a characteristic of MVPN?

Options:

A.

It bypasses the use of MPLS in the service provider core and transmits packets using IP only.

B.

It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP core.

C.

It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.

D.

It creates GRE tunnels to route multicast traffic over a service provider IP core.

Buy Now
Questions 90

Refer to the exhibit. R1 has two upstream Tier 1 service providers. BGP is in use as the exterior routing protocol, and ISP_A and ISP_B are sending the full BGP table. A network engineer must assign local-preference 70 to all routes with multiple exit discriminator 30. Which configuration must the network engineer apply?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 91

A network architect plans to implement MPLS OAM to provide additional troubleshooting functionality for the NOC team. After analyzing the configuration on the MPLS P/PE nodes, the architect decides to revise the CoPP policies. Which two actions ensure that the new solution is secure? (Choose two.)

Options:

A.

Allow port 3505 in the outbound direction only.

B.

Allow the ICMP protocol only.

C.

Allow the TCP and UDP protocols.

D.

Allow the UDP protocol only.

E.

Allow port 3503 in the inbound direction only.

Buy Now
Questions 92

Refer to the exhibit. ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to CE-1?

Options:

A.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-export additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

B.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community local-as additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

C.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefixlist AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop local-address

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

D.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

Buy Now
Questions 93

Refer to the exhibit. A network engineer must deny access from spoofed addresses to the LAN. The edge router currently has two active BGP sessions established with Tier 1 ISP_A. Due to asymmetric routing, no ACL is configured on either interface. Which two configurations must the engineer perform on the edge router to complete the task? (Choose two.)

Options:

A.

ip verify unicast source reachable-via tx under FA0/0

B.

ip verify unicast source reachable-via under FA0/1

C.

ip verify unicast source reachable-via any under FA0/1

D.

ip verify unicast source reachable-via both under FA0/0

E.

ip verify unicast source reachable-via any under FA0/0

Buy Now
Questions 94

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

Options:

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Buy Now
Questions 95

What is the purpose of RSVP tear messages?

Options:

A.

to notify the tail-end router of resource unavailability on the transit router

B.

to inform the headend router of LSP issues

C.

to reuse router resources for other reservation requests

D.

to confirm successful end-to-end resource allocation

Buy Now
Questions 96

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 97

Refer to the exhibit. This enterprise configured MPLS within its network to connect offices that span different geographic areas, with LDP running between connected neighbors. At each office, including headquarters, the networks are running OSPF with a similar configuration.

Which additional action must the engineering team take to support a more reliable connection between MPLS and OSPF?

Options:

A.

Implement targeted LDP sessions between the peers connected to interface g0/1 and g0/2.

B.

Implement MD5 authentication between LDP and OSPF neighbors to secure the connection.

C.

Implement LDP session protection to maintain uptime during outages.

D.

Implement MPLS LDP sync to synchronize OSPF and LDP.

Buy Now
Questions 98

Refer to the exhibit.

CE1 and CE2 require connectivity to the internet through the ISP connected to PE3 What should an engineer configure to complete this task?

Options:

A.

PE2 must be configured to serve as a route reflector for PE3 routes learned from the internet. PE2 then shares the routes with CE1 and CE2.

B.

CE1 and CE2 must be configured with a route distinguisher in the PE1 VRF that dynamically imports the route from the internet.

C.

CE1 and CE2 must be configured to use a static default route with a next-hop of PE3 to reach internet routes.

D.

PE1 must be configured with an import route target in the CE1 VRF that matches the export route target for the internet VRF on PE3.

Buy Now
Questions 99

Refer to the exhibit. An operations team recently located an archive of scripts for deploying routine network changes with an error-free approach. A junior network engineer, who is working to modify the scripts to support RESTCONF, has been asked to document the purpose of each updated script. Which two actions does the given script take? (Choose two.)

Options:

A.

Send a patch request to the API endpoint.

B.

Print a fail message when the response code is 204.

C.

Pass an XML data-format request in the API header.

D.

Print a success message when the device receives a full-content response code.

E.

Ignore SSL certificate verification.

Buy Now
Questions 100

Refer to the exhibit:

If router A is the RP, which PIM mode can you configure so that devices will send multicast traffic toward the RP?

Options:

A.

PIM-SM

B.

PI MM-DM

C.

BIDIR-PIM

D.

PIM-SSM

Buy Now
Questions 101

Refer to the exhibit. AS 65517 is running OSPF within the core. BGP is running between all four autonomous systems, interconnecting several ISPs that provide intranet and extranet services. All of the PE routers are connected, and eBGP peering relationships have been established. A network engineer also configured an iBGP peering between PE3 and P1, and the peering is up. However, P1 cannot reach routes outside of AS 65517. Which action must the engineer take so that P1 reaches external routes?)

Options:

A.

Synchronize BGP and OSPF with AS 65517.

B.

Add the next-hop-self attribute under the BGP neighbor configuration for P1 on PE3.

C.

Install route targets on all PE routers under the VRF configuration for intranet services.

Buy Now
Questions 102

Refer to the exhibit. A multinational corporation with a Cisco-based network wants to leverage Cisco security features to enhance the security of their LAN and protect against eavesdropping and man-in-the-middle attacks. The solution must comply with the IEEE 802.1AE standard. A network engineer must implement the new security configurations on a pair of interconnected Cisco switches. The engineer already completed the configuration to enable AAA new-model and set up a basic AAA configuration for user authentication. Management VLAN 10 is in place for network administration. Which action must the engineer take to meet the requirements?

Options:

A.

Implement CTS for role-based access control on both switches.

B.

Implement MACsec on both switches with encryption mode GCM and a shared key.

C.

Implement open authentication via the management VLAN on both switches.

D.

Implement IPsec on both switches to secure data transmissions.

Buy Now
Questions 103

Which statement describes the advantage of a Multi-Layer control plane?

Options:

A.

It automatically provisions monitors, and manages traffic across Layer 0 to Layer 3

B.

It minimizes human error configuring converged networks

C.

It supports dynamic wavelength restoration in Layer 0

D.

It provides multivendor configuration capabilities for Layer 3 to Layer 1

Buy Now
Questions 104

An engineer is implementing a router redistribution within BGP. The route map must be configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 105

Refer to the exhibit. A junior engineer must update a group of scripts to use on a newly deployed subnet. However, one of the scripts is not documented or commented. What are the two effects of this script? (Choose two.)

Options:

A.

The script configures a loopback interface.

B.

The script stores output with leading or trailing spaces.

C.

The script calls a Telnet process to connect to a network device.

D.

The script stores output in the cli.txt file.

Buy Now
Questions 106

Refer to the exhibit:

What does this value mean when it is received in XML?

Options:

A.

It shows the ending of the script

B.

It indicates a break in a sequence

C.

It indicates a value assigned by a network administrator to tag a route

D.

It means a data field is blank

Buy Now
Questions 107

Refer to the exhibit:

You are configuring an administrative domain implement so that devices can dynamically learn the RP?

Options:

A.

SSM

B.

BID1R-PIM

C.

BSR

D.

Auto-RP

Buy Now
Questions 108

How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?

Options:

A.

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

B.

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

C.

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

D.

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

Buy Now
Questions 109

Refer to the exhibit. In the service provider network, routers PE1, PE2, and PE4 have access to the internet and provide access to customer networks. Router PE3 is used for access to other customer systems. In accordance with a new SLA, an engineer is updating settings on this network so that router CE1 accesses the internet via PE1 instead of PE2. Which two tasks must the engineer perform to complete the process? (Choose two.)

Options:

A.

On PE1, configure the internet VRF with import route target 102:102.

B.

On PE1 and PE4, configure the internet VRF with import route targets 102:102 and 104:104.

C.

On PE2, configure the internet VRF with import route target 102:102.

D.

On PE2 and PE3, configure the internet VRF with import route target 101:101.

E.

On PE2, configure the CE1 VRF with import route target 101:101.

Buy Now
Questions 110

Refer to the exhibit. Which additional configuration must an engineer to the adge router to inject a default router into the MP-BGP address family for the internet_Shared_Services dedicated VRF?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 111

You are configuring MPLS traffic-engineering tunnels in the core.

Which two ways exist for the tunnel path across the core? (Choose two )

Options:

A.

Tunnel links inherit IGP metrics by default unless overridden

B.

Tunnels can be configured with dynamic path or explicitly defined path

C.

A zero bandwidth tunnel is not a valid option

D.

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

Buy Now
Questions 112

Refer to the exhibit.

A network engineer is configuring customer edge routers to finalize a L2VPN over MPLS deployment Assume that the AToM L2VPN service that connects the two CEs is configured correctly on the service provider network Which action causes the solution to fail?

Options:

A.

A loopback with a /32 IP address has not been used

B.

OSPF does not work with L2VPN services

C.

The xconnect statement has not been defined

D.

The routing protocol network types are not compatible

Buy Now
Questions 113

A network engineer is deploying VPLS configuration between multiple PE routers so that customer's remote offices have end-to-end LAN connectivity. Which additional configuration should the engineer perform on the PE routers to enable the virtual switch instance?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 114

Refer to the exhibit:

Which command is used to complete this configuration for QoS class-based marking?

Options:

A.

PE-A(config-pmap-c)#set dscp ef

B.

PE-A(config-pmap-c)#fair-queue

C.

PE-A(config-pmap-c)#random-detect

D.

PE-A(config -pmap-c)#priority

Buy Now
Questions 115

Under which circumstance does BGP ignore the best-path algorithm after receiving multiple routes to a destination?

Options:

A.

when the routes are synchronized

B.

when the route's first hop has a different AS number

C.

when the routes have local-preference values less than 100

D.

when the route's next hop is unreachable

Buy Now
Questions 116

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLAN-based to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

Options:

A.

LSP lifetime maximum

B.

advertise-passive-only

C.

overload bit passive

D.

attached bit on ISIS instance

E.

passive-interface Loopback0

Buy Now
Questions 117

Drag and drop the message types from the left onto the target field of the message originator on the right.

Options:

Buy Now
Questions 118

Refer to the exhibit. A network engineer is configuring Ethernet Layer 2 service to connect CE2 and CE3 for video and data application sharing with these requirements:

    A point-to-point cross-connect service must be established between 10.10.10.10 and 20.20.20.20.

    PE1 and PE2 must learn neighbors dynamically in PW 10.

Which configuration must be implemented on PE1 to meet the requirements?

Options:

A.

xconnect group XCON1

 p2p XCON1_PE1PE2

 interface GigE 0/0

 pw-class Path1

 backup neighbor 20.20.20.20 pw-id 10

B.

12vpn

 xconnect group XCON1

 interface GigE 0/0

 interface GigE 0/1

C.

12vpn

 xconnect group XCON1

 p2p XCON1_PE1PE2

 interface GigE 0/0

 neighbor 20.20.20.20 pw-id 10

 mpls static label local 699 remote 890

D.

12vpn

 p2p XCON1_PE1PE2

 interface GigE 0/1

 neighbor 20.20.20.20 pw-id 10

Buy Now
Questions 119

How does Cisco MPLS TE use OSPF extensions to allow for optimized transit between a headend router and a destination router?

Options:

A.

Router LSAs share router link advertisements to each router within the MPLS environment so that tunnels can be built bidirectionally.

B.

ASBR Summary LSAs share OSPF domain information so that the two routers know how to reach each other during tunnel setup.

C.

Network LSAs share RSVP information to build the tunnel between the two routers.

D.

Opaque LSAs calculate and establish unidirectional tunnels that are set according to the network constraint.

Buy Now
Questions 120

Refer to the exhibit. What is the purpose of this JSON script?

Options:

A.

It changes the existing password.

B.

It updates a user authentication record.

C.

It deletes a user’s authentication record.

D.

It confirms a user’s login credentials.

Buy Now
Questions 121

What is the function of Cisco NFV infrastructure platform?

Options:

A.

It does not have a security audit feature.

B.

It does not offer high availability.

C.

It offers consistent performance.

D.

It offers decentralized logging.

Buy Now
Questions 122

A network operator needs to implement PIM-SSM multicast configuration on customer's network so that users in different domains are able to access and stream live traffic. Which two actions must the engineer perform on the network

to make the streaming work? (Choose two.)

Options:

A.

Configure at least one MSDP peer on the network

B.

Enable IGMP version 2 at the interface lever.

C.

Enable PIM sparse mode on the device.

D.

Enable IGMP version 3 at the interface level.

E.

Enable PM dense mode on the device.

Buy Now
Questions 123

The NOC engineer in a service provider network must configure an SNMP community on switch SW with these security attributes:

* Event messages must be authenticated with the MD5 algorithm and encrypted.

* The remote user name for the SNMP server at 172.16.10.1 is AuthNocUser.

Which configuration must the engineer apply to the switch?

Options:

A.

SW(config)# snmp-server group group2 v3 auth

SW(config)# snmp-server user AuthNocUser group2 remote 172.16.10.1 v3 auth md5 password1

B.

SW(config)# snmp-server group group3 v3 priv

SW(config)# snmp-server user AuthNocUser group3 remote 172.16.10.1 v3 auth md5 Cisco@123 priv des 56

C.

SW(config)# snmp-server group group1 v3 noauth

SW(config)# snmp-server user AuthNocUser group1 remote 172.16.10.1

SW(config)# snmp-server host 172.16.10.1 informs version 3 noauth remoteuser config

D.

SW(config)# snmp-server community comaccess ro 4

SW(config)# snmp-server enable traps snmp authentication

SW(config)# snmp-server host cisco.com version 2c public

Buy Now
Questions 124

Refer to the exhibit. Customers report occasional forwarding issues from hosts connected to R6 to hosts connected to R1. A network engineer has just updated the MPLS configuration on the network, and a targeted LDP session has been established between R1 and R5. Which additional task must the engineer perform so that the team can identify the path from R6 to R1 in case the forwarding issues continue?

Options:

A.

Configure an MPLS TE from R4 to R1 that routes through R5.

B.

Implement MPLS OAM within the network.

C.

Implement MPLS VPLS within the network.

D.

Configure MPLS LDP Sync on each router.

Buy Now
Questions 125

Drag and drop the technologies from the left onto the correct definitions on the right.

Options:

Buy Now
Questions 126

Refer to the exhibit. Users on a LAN connected to router R5 frequently open high-traffic connections with servers connected to R1 and R4. Users on R2 also require access to the servers, but performance is not a major concern and their traffic can be treated as secondary. As traffic on all links grows, the network architect wants to mitigate the potential for congestion on the link between R2 and R4.

Which action must the engineering team take to improve performance on the R2-R4 link for users on R5 while still allowing other traffic to flow?

Options:

A.

Implement traffic policing on R2 to drop unnecessary traffic from secondary users when that traffic exceeds a given threshold.

B.

Implement traffic shaping on R2 to control transmission between R1 and R4 for traffic identified in a class map.

C.

Implement LLQ for the whole network with a strict policy to ensure that all traffic from the servers is sent to priority users without interruption.

D.

Implement FIFO on R1, R2, and R4 to queue traffic so that all traffic can pass with maximum efficiency.

Buy Now
Questions 127

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

Options:

A.

It returns an AAA users with the last name CiscoTest.

B.

It creates a class map named aaauser with traffic tagged from AAA.

C.

It queries the local database to find a user named aaaUser.Json

D.

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Buy Now
Questions 128

What is a characteristic of the YANG model?

Options:

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Buy Now
Questions 129

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

Options:

A.

The traffic uses the default MDT transmit the data Only if it is a (S, G) multicast route entry.

B.

A data MDT is created if is a Multicast route entries

C.

A data and default MDT are created to flood the multicast stream of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmit through the core for multicast route entries.

Buy Now
Questions 130

Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?

Options:

A.

OTCP

B.

OMP

C.

UDP

D.

BGP

Buy Now
Questions 131

Which characteristic describes prefix segment identifier?

Options:

A.

It contains the interface address of the device per each link.

B.

It Is globally unique.

C.

It is locally unique.

D.

It contains a router to a neighbor.

Buy Now
Questions 132

Refer to the exhibit. A large enterprise is migrating its network to use MPLS VPNs between different business divisions. Within the core, routes are shared between the routers using OSPF, and each connected link maintains an MPLS neighbor relationship.

Which action must the migration team take so that LDP neighbor relationships are maintained if a directly-connected link goes down?

Options:

A.

Implement targeted LDP sessions between directly connected routers and between routers that are one hop away.

B.

Implement LDP session protection between each directly connected LDP neighbor.

C.

Implement LDP sync between routers that are directly connected to each business division.

D.

Implement targeted LDP sessions between routers that are directly connected to each business division.

Buy Now
Questions 133

Refer to the exhibit. A network engineer is implementing BGP in AS 65101 and AS 65201. R3 sends data traffic to 192.168.1.1 /32 via the path R3-R2-R1. The traffic must travel via alternate path R6-R5 for prefix 192.168.1.1/32. Which action must be taken to meet the requirement?

Options:

A.

Apply route-map HIGH-MED out on R2 for neighbor R3.

B.

Apply route-map HIGH-LP in on R3 for neighbor R6

C.

Apply route-map LOW-LP out on R2 for neighbor R3.

D.

Apply route-map LOW-MED in on R5 for neighbor R2

Buy Now
Questions 134

Refer to the exhibit.

The network engineer is performing end-to-end MPLS path testing with these conditions:

• Users must perform MPLS OAM for all available same-cost paths from R1 to R4.

• Traceroute operations must return all of the next-hop IP details.

Which configuration meets these requirements?

Options:

A.

traceroute mpls ipv4 10.10.10.4 255.255.255.255 verbose

B.

traceroute mpls multipath ipv4 10.10.10.4 255.255.255.255

C.

traceroute mpls multipath ipv4 10.10.10.4 255.255.255.255 verbose

D.

traceroute mpls ipv4 10.10.10.4 255.255.255.255 source 10.10.10.1

Buy Now
Questions 135

BGP has been implemented on a IOS XR router. Which configuration sends BGP IPv4 labels to build inter-domain LSPs?

Options:

A.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community extended

B.

router bgp 65515 no bgp default ipv4-unicast

C.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community

D.

router bgp 65515 neighbor 172.16.70.23 address-family ipv4 labeled-unicast

Buy Now
Questions 136

Refer to the exhibit.

What reestablishes the OSPF neighbor relationship between Router 1 and Router 2?

Options:

A.

authentication is added to the configuration

B.

correct wildcard mask is used on Router 2

C.

OSPF process IDs match

D.

hello intervals match

Buy Now
Questions 137

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

Options:

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Buy Now
Questions 138

Refer to the exhibit.

An engineer is configuring path selection on router R1 for two ASNs as shown. Which additional task must the engineer perform on Router 1 so that all outbound traffic utilizes the link between R1 and R3 to reach ASN 4567?

Options:

A.

Configure a low weigh! on the peer to ASN 4567.

B.

Configure a high weight on the peer to ASN 4567.

C.

Configure an AS path prepend on the peer to ASN 4567.

D.

Configure a high med on the peer to ASN 4567.

Buy Now
Questions 139

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

Options:

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Buy Now
Questions 140

What is a feature of model-driven telemetry?

Options:

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

Buy Now
Questions 141

Refer to the exhibit. A regional company is implementing a network-health monitoring solution on their Cisco ISR routers to monitor network performance metrics and gather real-time data. The router R1 Ethernet interface, GigabitEthernet0/0, is assigned IP address 192.168.1.1/24, and basic IP addressing and connectivity to the data-collection server have already been configured. A network engineer must update R1 to ensure secure and reliable data transmission to the monitoring server, which is located at IP address 192.168.50.50 on port 50051. To achieve secure communication, the configuration must comply with RFC 5246, and to ensure reliable data transmission, it must follow RFC 793. Which command must the engineer execute to configure data collection?

Options:

A.

telemetry ietf subscription 1 receiver ip address 192.168.50.50 50051 protocol grpc-tcp

B.

gnmi dialout address 192.168.50.50 port 50051

C.

telemetry ietf subscription 1 source-address 10.1.1.1 50051 protocol grpc-ucmp

Buy Now
Questions 142

Refer to the exhibit. A service provider is running MPLS in the core to support Layer 3 VPN. OSPF is configured to support dynamic routing, and BGP is enabled throughout the network. A network engineer is adding a new P router to the infrastructure and is connecting it to P1 and P3.

Which task must the engineer perform on the new router to allow it to participate in the Layer 3 VPN?

Options:

A.

Enable LDP sync under the OSPF routing process.

B.

Establish an LDP neighbor relationship with P1 and P3.

C.

Configure OSPF and BGP to support MPLS.

D.

Enable LDP and establish an OSPF adjacency in a new area.

Buy Now
Questions 143

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

    Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.

    Other SNMP managers must not have access to objects.

    SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 144

You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tunnel’s router?

Options:

A.

error

B.

reservation

C.

path

D.

tear

Buy Now
Questions 145

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

Options:

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Buy Now
Questions 146

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

Options:

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.

Static routes on CE routers allow route leakage from a PE global routing table

Buy Now
Questions 147

What is the primary purpose of Secure ZTP?

Options:

A.

to securely and seamlessly encrypt traffic across the entire network

B.

to provide real-time threat detection and mitigation for devices in the network

C.

to automate the secure provisioning of network devices during initial deployment

D.

to provide secure remote access to network devices for management and troubleshooting

Buy Now
Questions 148

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services For which reason do you make this decision?

Options:

A.

It enables you to choose whether to separate or centralize each individual service.

B.

It is easier to manage a system in which services are mixed

C.

It requires only one edge router

D.

It enables EGP and IGP to operate independently

Buy Now
Questions 149

Refer to the exhibit.

The engineering team wants to limit control traffic on router RX with the following IP address assignments:

• Accepted traffic for router: 10.0.0.0/24

• NOC users IP allocation: 192.168.10.0/24

Which additional configuration must be applied to RX to apply the policy for MSDP?

Options:

A.

RX(config)#access-list 151 permit tcp any gt 1024 10.10.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit tcp any eq 639 10.10.0.0 0.0.0.255 gt 1024 established

B.

RX(config)#access-list 150 permit tcp any gt 1024 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit tcp any eq 639 10.0.0.0 0.0.0.255 gt 1024 established

C.

RX(config)#access-list 151 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit udp any 10.0.0.0 0.0.0.255 eq 639

D.

RX(config)#access-list 150 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit udp any 10.0.0.0 0.0.0.255 eq 639

Buy Now
Questions 150

Refer to the exhibit:

What is the effect of this configuration?

Options:

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Buy Now
Questions 151

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

Options:

A.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.

Configure the redistribute static and redistribute connected commands on R1.

Buy Now
Questions 152

Refer to the exhibit.

An engineer working for private Service Provider with employee id: 3948:11:613 is configuring the BGPsec framework. Which two conditions must the engineer take into account? (Choose two.)

Options:

A.

BGPsec uses IPsec tunnel for security.

B.

The BGPsec framework secures the AS path.

C.

In BGPsec. all route advertisements are given an expiry time by the originator of the route.

D.

Private keys are part of the router key pair used to sign route updates.

E.

In BGPsec. route advertisements are not given an expiration time by the originator of the route.

Buy Now
Questions 153

Refer to the exhibit.

If RC is a stub router, which entry must be injected so that it will send traffic outside the OSPF domain?

Options:

A.

virtual link between RB and RC

B.

sham link

C.

more specific route

D.

default route

Buy Now
Questions 154

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

Options:

A.

global configuration mode

B.

routing configuration mode

C.

BGP neighbor configuration

D.

mode BGP address-family configuration mode

Buy Now
Questions 155

Refer to the exhibit.

An engineer configured multicast routing on client's network. What is the effect of this multicast implementation?

Options:

A.

R2 floods information about R1 throughout the multicast domain.

B.

R2 is unable to share information because the ip pirn autorp listener command is missing.

C.

R1 floods information about R2 throughout the multicast domain.

D.

R2 is elected as the RP for this domain.

Buy Now
Questions 156

Refer to the exhibit. MPLS is running in the network with OSPF as the IGP. Full routes are shared between the routers, and each connected link has an MPLS neighbor relationship. A network engineer must update the network configuration so that it will maintain LDP neighbor relationships if a directly connected link goes down. Which action must the engineer take as part of the process?

Options:

A.

Implement Unified MPLS to unify the OSPF areas.

B.

Implement MPLS OAM with BFD on the links.

C.

Implement LDP sync on links with a greater risk of faults.

D.

Implement LDP session protection on the network.

Buy Now
Questions 157

Refer to the exhibit.

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

Options:

A.

neighbor ebgp-multihop

B.

ebgp-multihop

C.

ttl-security

D.

neighbor-ttl-security

Buy Now
Questions 158

What does DWDM use to combine multiple optical signals?

Options:

A.

frequency

B.

IP protocols

C.

time slots

D.

wavelength

Buy Now
Questions 159

Which configuration modifies Local Packet Transport Services hardware policies?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 160

Which two PHY modes are available to implement an IOS XR Gigabit Ethernet interface interface? (Choose two.)

Options:

A.

SONET

B.

MAN

C.

WDWM

D.

LAN

E.

WAN

Buy Now
Questions 161

Refer to the exhibit.

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

Options:

A.

B.

C.

D.

Buy Now
Questions 162

Refer to the exhibit. Customer C-101 in ASN 65123 requested that the ISP blackholes a host route 198.19.44.195, to which the customer is receiving a significant amount of malicious traffic. Which configuration must the network engineer implement on the trigger router TR-1 to fulfill the request without affecting other IP destinations in the customer's block?

Options:

A.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

B.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.195/32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

C.

configure terminal

ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

D.

Configure terminal

Buy Now
Questions 163

Which is the benefit of implementing model-driven telemetry in a service provider environment?

Options:

A.

It reduces the number of network monitoring tools that are necessary to verify device statistics.

B.

It increases the efficiency of SNMP by pulling system data to requesting servers.

C.

It reduces or eliminates the need to monitor Layer 2 traffic between switches.

D.

It uses reliable transport to push Information to network monitoring tools

Buy Now
Questions 164

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
Last Update: Jan 5, 2026
Questions: 547
350-501 pdf

350-501 PDF

$28.5  $94.99
350-501 Engine

350-501 Testing Engine

$33  $109.99
350-501 PDF + Engine

350-501 PDF + Testing Engine

$43.5  $144.99