New Year Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Questions 4

What is a constraint of Cisco MPLS TE tunnel configurations?

Options:

A.

Tunnels cannot span multiple OSPF areas.

B.

With ISIS as an IGP. only older-style metrics are used.

C.

Tunnels cannot be configured over IP unnumbered links.

D.

QoS-aware tunneling is not supported.

Buy Now
Questions 5

Refer to the exhibit. A growing company with an increasing international presence requires a secure and scalable solution for inter-office data transfer across their geographically dispersed locations. To ensure departmental privacy, the network must enforce granular access control. BGP is running in the network, and two VRF instances with unique route distinguishers and route targets have been configured to segregate critical financial data from regular network traffic. A network engineer with an employee ID: 5086:72:617 must find a solution that allows for future network expansion while maintaining robust security and data privacy between departments. The solution must comply with the RFC 4364 standard. Which action must the engineer take to meet the requirements?

Options:

A.

Configure a GRE tunnel in AH mode between the two routers.

B.

Configure MPLS in L3VPN mode between the two routers.

C.

Configure a DMVPN connection between the two routers with Phase 2 mode enabled.

D.

Configure an IPsec VPN connection between the two routers with ESP protocol enabled.

Buy Now
Questions 6

Refer to the exhibit.

To protect in-band management access to CPE-R7, an engineer wants to allow only SSH management and provisioning traffic from management network 192.168.0.0/16. Which infrastructure ACL change must be applied to router PE-R9 to complete this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 7

Refer to the exhibit. The network operations team reported that the access site that is connected to R3 is not connecting to the application server in the data center and that all packets that are sent from the application server to the access site are dropped. The team verified that OSPF and BGP peerings are up in BGP AS 65101 and BGP AS 65201. R4 is expected to receive traffic from the application server route via OSPF. Which action resolves this issue?

Options:

A.

Remove the route-map on R4 when advertising 172.16.20.1 in BGP to R3.

B.

Advertise application server 172.16.20.1 in the OSPF routing table on R6.

C.

Allow 172.16.20.1 in the BGP advertisement on R3 in the route-map.

D.

Add the next-hop-self command on R6 to enable R3 iBGP peering.

Buy Now
Questions 8

Refer to the exhibit. OSPF is running in the core, with MPLS configured on all links. A Cisco MPLS TE tunnel is configured with R1 as the headend and R4 as the tail-end router. As traffic on the network increases, the network engineering team is concerned about identifying failures between the tunnel endpoints.

Which action should the engineering team take that will allow them to identify and locate any faults in the path?

Options:

A.

Implement NetFlow to determine whether traffic is traversing the egress interfaces as expected.

B.

Implement an ICMP ping utility to send periodic test packets and identify the failure location.

C.

Implement RSVP to determine whether bandwidth is properly allocated along the path.

D.

Implement MPLS OAM with traceroute to follow the path and determine where packets are failing.

Buy Now
Questions 9

Refer to the exhibit. A network engineer installed router R1 as the new core router and must secure the control plane. The configuration has been applied, and now the engineer is creating ACL 120. Only hosts 192.168.1.1 and 192.168.2.2 should be allowed to access the router using Telnet. All other hosts should be rate-limited, with excess traffic dropped. Which configuration accomplishes this goal?

Options:

A.

access-list 120 deny tcp any any eq telnet

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.1.2 any eq telnet

B.

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

access-list 120 permit tcp any any eq telnet

C.

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.2.2 any eq telnet

access-list 120 deny tcp any any eq telnet

D.

access-list 120 permit tcp any any eq telnet

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

Buy Now
Questions 10

Refer To the exhibit:

On R1, which output does the show isis neighbors command generate?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 11

Refer to the exhibit.

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

Options:

A.

neighbor ebgp-multihop

B.

ebgp-multihop

C.

ttl-security

D.

neighbor-ttl-security

Buy Now
Questions 12

Refer to the exhibit.

Which configuration must be applied to each of the four routers on the network to reduce LDP LIB size and advertise label bindings for the /32 loopback IP space only?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 13

Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?

Options:

A.

OTCP

B.

OMP

C.

UDP

D.

BGP

Buy Now
Questions 14

Refer to the exhibit.

A network operator working for a telecommunication company with an employee 3994:37:650 is implementing a cisco Unified MPLS solution. What is the effect of this implementation?

Options:

A.

EIGRP is deployed between the PEs and ABRs with RFC 3107.

B.

OSPF is deployed between the PEs and ABRs with RFC 3107.

C.

IS-IS is deployed between the PEs and ABRs with RFC 3107.

D.

BGP is deployed between the PEs and ABRs with RFC 3107.

Buy Now
Questions 15

What are two factors to consider when implementing NSR High Availability on an MPLS PE router? (Choose two.)

Options:

A.

It consumes more memory and CPU resources than NSF

B.

It operates normally without NSR support on the PE peers.

C.

It requires all PE-CE sessions to support NSR

D.

It requires routing protocol extensions

E.

It cannot sync state information across redundant RPs

Buy Now
Questions 16

Refer to the exhibit.

What type of configuration is it?

Options:

A.

It is configuration that requires an explicit Cisco MPLS TE path to be configured for the tunnel to run.

B.

It is configuration that requires OSPF to also be running to have optimized Cisco MPLS TE tunnels.

C.

It is configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing.

D.

It is configuration that requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run.

Buy Now
Questions 17

Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise then into OSPF area 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default router 0.0.0.0/0 is still missing. Which configuration must an engineer apply to resolve this problem?

      Option A

      Option B

      Option C

Options:

A.

Option D

Buy Now
Questions 18

What is the function of the FEC field within the OTN signal structure?

Options:

A.

It allows the sending devices to apply QoS within the OTN forwarding structure.

B.

It allows source nodes to discard payload errors before transmitting data on the network.

C.

It allows receivers to correct errors upon data arrival.

D.

It allows deep inspection of data payload fields.

Buy Now
Questions 19

What is the purpose of RSVP tear messages?

Options:

A.

to notify the tail-end router of resource unavailability on the transit router

B.

to inform the headend router of LSP issues

C.

to reuse router resources for other reservation requests

D.

to confirm successful end-to-end resource allocation

Buy Now
Questions 20

Refer to the exhibit.

What does the number 2 mean in the configuration?

Options:

A.

It dictates the number of sessions that will be open with the SNMP manager

B.

It represents the version of SNMP running.

C.

It indicates two SNMP managers are able to read and write with the agent using community string ciscotest.

D.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent.

Buy Now
Questions 21

Refer to the exhibit. The enterprise is running BGP between sites to provide connectivity to users across the company's geographic regions. A network engineer must update the configuration so that the operations team can confirm that BGP prefixes that are received on each router originated from the correct autonomous system.

Which configuration must the engineer apply?

Options:

A.

bgp bestpath prefix-validate disable

B.

bgp rpki server tcp 192.168.1.2 port 1029 refresh 500

C.

bgp bestpath prefix-validate allow-invalid

D.

bgp synchronization

Buy Now
Questions 22

A network team has failed to implement IS-IS multitopology. What is the reason for it?

Options:

A.

The router did not support VRFs.

B.

The routing process did not support extended metrics.

C.

The router did not have Cisco Discovery Protocol and Cisco Express Forwarding disabled.

D.

The routing process supported Level 1 only.

Buy Now
Questions 23

Refer to the exhibit.

The network engineer is performing end-to-end MPLS path testing with these conditions:

• Users must perform MPLS OAM for all available same-cost paths from R1 to R4.

• Traceroute operations must return all of the next-hop IP details.

Which configuration meets these requirements?

Options:

A.

traceroute mpls ipv4 10.10.10.4 255.255.255.255 verbose

B.

traceroute mpls multipath ipv4 10.10.10.4 255.255.255.255

C.

traceroute mpls multipath ipv4 10.10.10.4 255.255.255.255 verbose

D.

traceroute mpls ipv4 10.10.10.4 255.255.255.255 source 10.10.10.1

Buy Now
Questions 24

An engineer working for a telecommunication company with an employee ID: 4460:35:466 must configure an OSPF router in a multivendor network so that it performs NSF in the event of a route processor switchover. Which configuration must the engineer apply?

Options:

A.

router ospf 1 nsf Cisco

B.

router ospf 1 nsf ietf

C.

router ospf 1 nsf ietf helper

D.

router ospf 1 nsf Cisco helper

Buy Now
Questions 25

An engineer working for a private service provider with employee id: 3994 37 650 is configuring a Cisco device to redistribute OSPF into BGP. Which task enables the device to filter routes?

Options:

A.

Configure a distribute list and associate it to the BGP peer interface

B.

Configure a prefix list and associate it to the BGP peer interface

C.

Configure a route map and reference it with the redistribute command

D.

Configure an access list and reference it with the redistribute command

Buy Now
Questions 26

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service-provider core network with these requirements:

    RC must establish LDP peering with the loopback IP address as its Router ID

    RA must establish LDP peering with RB. RC, and RY.

How must the team update the network configuration to successfully enable LDP peering between RA and RC?

Options:

A.

Enable the mpls ip command on RC interface Gi2/0. DUMPS

B.

Configure the mpls Idp router-Id loopback0 command on RA and RC.

C.

Implement LDP session protection on RA.

D.

DUMPS Reset the discover hello hold time and interval to their default values.

Buy Now
Questions 27

How much must the MTU be increased when configuring the 802.1q VLAN tag?

Options:

A.

2 bytes

B.

4 bytes

C.

8 bytes

D.

12 bytes

Buy Now
Questions 28

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

Options:

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Buy Now
Questions 29

Refer to the exhibit.

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 30

Refer to the exhibit. An engineer is scripting ACLs to handle traffic on the given network. The engineer must block users on the network between R1 and R2 from leaving the network through R5. but these users must still be able to access all resources within the administrative domain. How must the engineer implement the ACL configuration?

Options:

A.

Configure an ACL that permits traffic to any internal address, and apply it to the R5 interfaces to R3 and R4 in the egress direction

B.

Configure a permit any ACL on the R1 interface to R2 in the egress direction, and a deny any ACL on the interface in the ingress direction

C.

Configure an ACL that permits traffic to all internal networks and denies traffic to any external address, and apply it to the R2 interface to R1 in the ingress direction.

D.

Configure an ACL that denies traffic to any internal address and denies traffic to any external address, and apply it to the R5 interfaces to R3 and R4 in the ingress direction

Buy Now
Questions 31

A network engineer must configure a router for Flexible NetFlow IPFIX export. The IP address of the destination server is 172.17.12.1. The source address must be set to the Loopback0 IPv4 address and exported packets must be set to DSCP CS3. The TTL must be 64 and the transport protocol must be set to UDP with destination port 4739. Which configuration must the engineer apply to the router?

Options:

A.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 3

ttl 64

export-protocol netflow-v9

transport udp 4739

end

B.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 24

ttl 64

export-protocol ipfix

end

C.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 24

ttl 64

export-protocol netflow-v9

transport udp 4739

end

D.

configure terminal

flow exporter EXPORTER-1

destination 172.17.12.1

source Loopback0

dscp 3

ttl 64

export-protocol ipfix

end

Buy Now
Questions 32

How do intent APIs make it easier for network engineers to deploy and manage networks?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 33

Refer to the exhibit.

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

Options:

A.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Buy Now
Questions 34

Refer to the exhibit:

Which purpose of implementing NSF with this configuration is true?

Options:

A.

The router uses NSF to load balance traffic between two links, with the primary link alternating every 90 seconds

B.

The router uses NSF to reduce neighbor-relationship downtime during RP switchover

C.

The router uses NSF to load balance traffic on a routed EtherChannel

D.

The router uses NSF to handle RP switchover while allowing neighbor relationships to remain up

Buy Now
Questions 35

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 36

Refer to the exhibit. Routers R1 and R2 are connected over the internet, with the connection passing over four different autonomous systems. The company must mitigate potential DDoS attacks and protect the CPUs of the routers. A network engineer must secure all external connections on edge router R1 based on RFC 5082. R2 has already been secured. Which task should the engineer perform on R1 to achieve the goal?

Options:

A.

Configure ip neighbor 182.12.91.5 bgp multihop-ttl 4 under the global configuration.

B.

Configure ip neighbor 182.12.91.5 ttl 4 under the global configuration.

C.

Configure neighbor 182.12.91.5 ttl-security hops 4 under the BGP configuration.

D.

Configure neighbor 182.12.91.5 bgp-ttl 4 under the BGP configuration.

Buy Now
Questions 37

Refer to the exhibit.

What does the script configure?

Options:

A.

a VLAN namespace

B.

selectors for the in-band management

C.

a physical domain

D.

a static VLAN

Buy Now
Questions 38

Which statement about segment routing prefix segments is true?

Options:

A.

It is linked to a prefix SID that is globally unique within segment routing domain.

B.

It is the longest path to a node.

C.

It is linked to an adjacency SID that is globally unique within the router.

D.

It requires using EIGRP to operate.

Buy Now
Questions 39

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

Options:

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Buy Now
Questions 40

A network engineer is deploying VRF on ASBR router R1. The interface must have connectivity over an MPLS VPN inter-AS Option AB network. Which configuration must the engineer apply on the router to accomplish this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 41

Refer to the exhibit:

Which statement describes the effect of this configuration?

Options:

A.

It applies a service policy to all interfaces remarking HTTP traffic

B.

It creates an ACL named WEB that filters HTTP traffic.

C.

It matches HTTP traffic for use in a policy map

D.

It modifies the default policy map to allow all HTTP traffic through the router

Buy Now
Questions 42

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

Options:

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Buy Now
Questions 43

Which type of attack is an application attack?

Options:

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Buy Now
Questions 44

Refer to the exhibit. Users on a LAN connected to router R5 frequently open high-traffic connections with servers connected to R1 and R4. Users on R2 also require access to the servers, but performance is not a major concern and their traffic can be treated as secondary. As traffic on all links grows, the network architect wants to mitigate the potential for congestion on the link between R2 and R4.

Which action must the engineering team take to improve performance on the R2-R4 link for users on R5 while still allowing other traffic to flow?

Options:

A.

Implement traffic policing on R2 to drop unnecessary traffic from secondary users when that traffic exceeds a given threshold.

B.

Implement traffic shaping on R2 to control transmission between R1 and R4 for traffic identified in a class map.

C.

Implement LLQ for the whole network with a strict policy to ensure that all traffic from the servers is sent to priority users without interruption.

D.

Implement FIFO on R1, R2, and R4 to queue traffic so that all traffic can pass with maximum efficiency.

Buy Now
Questions 45

Refer to the exhibit Routers R1 and R2 are connected via a señal link and use the IS-IS routing protocol for route exchange After a configuration change on R2. IS-IS connectivity is interrupted A network engineer confirmed that the interfaces are in the UP state and connectivity exists between the two routers. Which two actions must the engineer perform to resolve the problem? (Choose two.)

Options:

A.

Disable padding for hello packets under the serial interface on R2 DUMPS

B.

Change the hello interface timer to 10 seconds on R1.

C.

Change the MTU to 1500 bytes on R2.

D.

Enable hello packet padding globally on R1.

E.

Change R2 to an IS-IS Level 1 router.

Buy Now
Questions 46

An engineer needs to implement QOS mechanism on customer's network as some applications going over the internet are slower than others are. Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task? (Choose two)

Options:

A.

Configure a queue with sufficient memory to buffer excess packets.

B.

Configure the token values in bytes.

C.

Implement packet remarking for excess traffic.

D.

Implement a scheduling function to handle delayed packets.

E.

Configure a threshold over which excess packets are discarded.

Buy Now
Questions 47

An engineer is implementing IGMP with SSM on a multicampus network that supports video streaming. Which task must the engineer perform as part of the process?

Options:

A.

Configure the network to use IGMPv3.

B.

Configure the network to use bidirectional PIM.

C.

Configure an RP that uses static assignments only.

D.

Configure the network to use the PIM bsr-candidate

Buy Now
Questions 48

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-

Configure and verify the OSPF neighbor adjacency between R1 and R2 in OSPF area 0 according to the topology to achieve these goals:

1. Establish R1 and R2 OSPF adjacency. All interfaces must be advertised in OSPF by using the OSPF interface command method. Use Loopback0 as the OSPF ID.

2. There must be no DR/BDR elections in OSPF Area 0 when establishing the neighbor relationship between R1 and R2. OSPF must not generate the host entries /32 for the adjacent interfaces.

3. Enable OSPF MD5 Authentication between both routers at the interface level with password C1sc0!.

Options:

Buy Now
Questions 49

Refer to the exhibit.

Router 1 is missing the route for the router 2 loopback 0. What should the engineer change to fix the problem?

Options:

A.

the area numbers on Router 1 and Router 2 to be similar

B.

the wildcard mask network statement in OSPF of Router 2

C.

Router 1 to be an ABR

D.

the hello timers on Router 1 and Router 2 to be different

Buy Now
Questions 50

Refer to the exhibit. The network is configured with OSPF. A networking team just connected a streaming multicast server to router R7, and they now must enable access for users throughout the network to stream video from the server.

Which action must the team take so that users can stream video without overloading the network?

Options:

A.

Implement PIM-DM on the link between the server and R7.

B.

Implement PIM-SM on the LAN network connecting R5, R6, R3, and R4.

C.

Implement PIM-SM on all routers and connected links.

D.

Implement PIM-DM on all interfaces in the network except the LAN connection between R5, R6, R3, and R4.

Buy Now
Questions 51

Simulation 7

Options:

Buy Now
Questions 52

Drag and drop the functions from the path computation element protocol roles on the right.

Options:

Buy Now
Questions 53

Refer to the exhibit. A company recently deployed a new network using OSPF in the core to share routes. The network administrator selected OSPF as the routing protocol because of its ability to maintain a route database. When the new network was started up, all routers booted normally, but the link between routers R1 and R2 failed to come up. The two routers are located in the same rack at the data center. Which task should an engineer perform to correct the problem?

Options:

A.

Synchronize the dead timers.

B.

Change one of the OSPF router IDs so that the router IDs are in different subnets

C.

Change the OSPF process ID on one of the devices so that the two IDs match

D.

Configure the MTUs on the interface to match.

Buy Now
Questions 54

Which module refers to the network automation using Ansible?

Options:

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Buy Now
Questions 55

What is the primary purpose of routed optical networks?

Options:

A.

to simplify network management by collapsing multiple layers into a single architecture

B.

to provide redundancy for failed network connections by automatically switching to backup paths

C.

to convert analog signals to digital signals for transmission over fiber-optic cables

D.

to encrypt and secure data traveling across the network

Buy Now
Questions 56

Refer to the exhibit.

Refer to the exhibit. An ISP provides shared VoIP Extranet services to a customer in VRF-100 with these settings:

The VoIP services are hosted in the 198.19.100.0/24 space.

The customer has been assigned the 198.18.1.0/29 IP address block.

VRF-100 is assigned import and export route target 65010:100.

Which configuration must the engineer apply to PE-1 to provision VRF-100 and provide access to the shared services?

Options:

A.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

import map VRF-100-IMPORT

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65010:100

!

route-map VRF-100-I

B.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:2999

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:1999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65

C.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:1999

exit address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity r 650

D.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

route-target export 65010:100

route-target export 65010:1999

route-target import 65010:100

route-target import 65010:2999

exit-address-family

Buy Now
Questions 57

How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?

Options:

A.

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

B.

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

C.

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

D.

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

Buy Now
Questions 58

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

Options:

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Buy Now
Questions 59

Refer to the exhibit. The operations team for a service provider network is implementing a route map policy. OSPF area 0 should originate the default route with a type 2 metric of 2 when the application server on the connected interface (192.168.1.1) is up. Routers RL and RM have set up OSPF peering with other adjacent routers. Which action meets this requirement?

Options:

A.

Apply default-information originate route-map ospf-default-route on router RL.

B.

Configure distribute-list route-map ospf-default-route out on router RM.

C.

Configure distribute-list route-map ospf-default-route out on router RL.

D.

Apply default-information originate route-map ospf-default-route on router RM.

Buy Now
Questions 60

Refer to the exhibit:

P3 and PE4 are at the edge of the service provider core and serve as ABR routers Aggregation areas are on either side of the core.

Which statement about the architecture is true?

Options:

A.

If each area is running its own IGP. the ABR routers must redistribute the IGP routing table into BGP

B.

To support seamless MPLS. TDP must be used as the label protocol

C.

If each area is running its own IGP. BGP must provide an end-to-end MPLS LSP

D.

To support seamless MPLS, the BGP route reflector feature must be disabled

Buy Now
Questions 61

Exhibit:

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

Options:

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Buy Now
Questions 62

What is a characteristics of the Pipe model for MPLS QoS?

Options:

A.

The same QoS policy is applied to all customer traffic on the egress PE.

B.

If the outer EXP is changed, it is copied to the DSCP value.

C.

The MPLS EXP bits are set by the CE.

D.

The DSCP value determines how the packet is forwarded

Buy Now
Questions 63

Simulation 8

Options:

Buy Now
Questions 64

A network architect must implement CSC VPN services for a new backbone carrier. Which two benefits does the architecture provide? (Choose two.)

Options:

A.

It maintains.a single backbone, which simplifies the VPN implementation to customers.

B.

It eliminates the need to maintain a centralized network-maintenance and operations strategy.

C.

It leverages IPsec to establish connections within the backbone. which eliminates the need for BGP to distribute routes.

D.

It supports a scalable growth strategy that services multiple customers efficiently

E.

It relies on IP communications, which simplifies the network design.

Buy Now
Questions 65

Refer to the exhibit.

A network operator has two IPv4 and IPv6 dual-stacked network on each side of the IPv4 core network. The operator must be able to provide connectivity between them while using specific assigned IPv6 space provided from the company IP administrator team. Which technology should the network operator use to accomplish this goal?

Options:

A.

6rd

B.

NAT46

C.

DS-Lite

D.

NAT44

Buy Now
Questions 66

Refer to the exhibit. An operations team recently located an archive of scripts for deploying routine network changes with an error-free approach. A junior network engineer, who is working to modify the scripts to support RESTCONF, has been asked to document the purpose of each updated script. Which two actions does the given script take? (Choose two.)

Options:

A.

Send a patch request to the API endpoint.

B.

Print a fail message when the response code is 204.

C.

Pass an XML data-format request in the API header.

D.

Print a success message when the device receives a full-content response code.

E.

Ignore SSL certificate verification.

Buy Now
Questions 67

Why is the keyword none needed when implementing management plane security using TACACS?

Options:

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Buy Now
Questions 68

Refer to the exhibit:

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Buy Now
Questions 69

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-

R1 and R2 are having issues forming an eBGP neighbor relationship. Troubleshoot and resolve the issue to achieve these goals:

1. Configure R1 and R2 to form a BGP neighborship using their Loopback interfaces.

2. Form the neighbor relationship using a BGP multihop mechanism. Use minimal values to solve the issue.

Options:

Buy Now
Questions 70

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

Options:

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Buy Now
Questions 71

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 72

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

Options:

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Buy Now
Questions 73

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to create a subscription to specify the streaming interval

B.

It is used to identify traps for SNMP polling

C.

It is used to identify MIB entries and has a list of YANG models

D.

It is used to create a sensor-group and has a list of YANG models for streaming

Buy Now
Questions 74

What is a feature of model-driven telemetry?

Options:

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

Buy Now
Questions 75

Drag and drop the descriptions from the left onto the corresponding OS types on the right.

Options:

Buy Now
Questions 76

An engineer is implementing a router redistribution within BGP. The route map must be configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 77

An engineer is implementing MPLS to monitor within the MPLS domain. Which must the engineer perform to prevent packets from being forwarded beyond the service provider domain when the LSP is down?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 78

Refer to the exhibit.

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 79

A network operator needs to implement PIM-SSM multicast configuration on customer's network so that users in different domains are able to access and stream live traffic. Which two actions must the engineer perform on the network

to make the streaming work? (Choose two.)

Options:

A.

Configure at least one MSDP peer on the network

B.

Enable IGMP version 2 at the interface lever.

C.

Enable PIM sparse mode on the device.

D.

Enable IGMP version 3 at the interface level.

E.

Enable PM dense mode on the device.

Buy Now
Questions 80

Refer to the exhibit. A service provider engineer Is configuring the connection between CE1 and CE2. AS 200 of the service provider and AS 100 of enterprise ABC should connect using BGP. The engineer already completed the configuration of VRF RT 100:10 of enterprise ABC. Which configuration must the engineer apply on PE1 to meet the requirement?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 81

Refer to the exhibit. A global company plans to implement BGP at its newest location to provide connectivity to other offices. The global infrastructure of the company is a multivendor environment. An engineer must review the BGP core configurations at headquarters to determine if they can be repurposed at the new location. The engineer copied this JSON script for review. What is the effect of the script?

Options:

A.

It configures BGP with neighbor 192.168.1.2 residing in AS 65514.

B.

It sets the BGP router-ID to 192.168.1.2 and sets the AS of the router to 65514.

C.

It configures BGP on the device and inserts 192.168.1.0/24 into the BGP table using the origin AS 65514.

D.

It configures a VRF named cisconode1 and a BGP instance using the VPNv4 address family.

Buy Now
Questions 82

Refer to the exhibit. The application server in the data center hosts voice, video, and data applications over the internet. The data applications run more slowly than the voice and video applications. To ensure that all applications run smoothly, the service provider decided to implement a QoS policy on router PER 2 to apply traffic shaping. Which two actions must an engineer take to implement the task? (Choose two.)

Options:

A.

Configure the scheduling function to handle delayed packets.

B.

Enable packet remarking for priority traffic.

C.

Configure a queue to buffer excess traffic.

D.

Set the token value for secondary traffic.

E.

Set a threshold to discard excess traffic.

Buy Now
Questions 83

Which additional configuration is required for NetFlow to provide traceback information?

Options:

A.

Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported.

B.

A classification ACL must be configured to identify which type of traffic will be analyzed.

C.

The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5.

D.

LLDP must be configured or the device will be unable to locate a NetFlow analyzer.

Buy Now
Questions 84

Which utility can you use to locate MPLS faults?

Options:

A.

MPLS traceroute

B.

EEM

C.

MPLS LSP ping

D.

QoS

Buy Now
Questions 85

Drag and drop the characteristics from the left onto the automation tool on the right.

Options:

Buy Now
Questions 86

Drag and drop the LDP features from the left onto their usages on the right.

Options:

Buy Now
Questions 87

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

Options:

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Buy Now
Questions 88

Refer to the exhibit. A network engineer received a complaint about these problems in OSPF stub area 100:

    The Ethernet link is down between routers RX and RY because the fiber was cut.

    CE site A traffic to the hub site is being dropped.

Which action resolves these issues?

Options:

A.

Set the OSPF authentication type to MD5 between RX and RY DUMPS

B.

Change the OSPF area 100 type to stub on RZ.

C.

Change the OSPF priority to 100 on the interfaces that connect RX and RY.

D.

DUMPS Set the OSPF MTU to 1500 on the link between RX and RZ.

Buy Now
Questions 89

Refer to the exhibit.

An engineer wants to determine which paths are best, second best, third best, and fourth best. Drag and drop the peer addresses on the left to the corresponding BGP best-path selection order on the right.

Options:

Buy Now
Questions 90

Refer to the exhibit. After a networking team configured this MPLS topology, the supervisor wants to view MPLS labels to verify the path that packets take from router R1 to router R7 The team already Issued an ICMP ping to verify connectivity between the devices. Which task must the team perform to allow the supervisor to view the label switch path?

Options:

A.

Configure MPLS TE to display the labels in the stack between the head and tail-end routers

B.

Implement MPLS LDP to assign labels to all the routes in the transit path.

C.

Configure MPLS LDP Sync to sync labels from the routing table to the MPLS forwarding table.

D.

Implement MPLS OAM to display the labels for each hop along the path

Buy Now
Questions 91

Refer to the exhibit. An engineer is implementing the BGP attribute on the customer's network to select the preferred path. Only BGP's well-known discretionary attribute must be used FTP prefixes should not be selected as part of this implementation. Which configuration must the engineer implement to complete the task?

Options:

A.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest in

B.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest

C.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest both

D.

router bgp 100

neighbor 10.0.0.1 remote-as 500

neighbor 10.0.0.1 route-map ciscotest out

Buy Now
Questions 92

Refer to the exhibit.

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

Options:

A.

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Buy Now
Questions 93

Refer to the exhibit.

An engineer at a new ISP must configure many Cisco devices in the data center. To make the process more efficient, the engineer decides to automate the task with a REST API. Which action does this JSON script automate?

Options:

A.

Configure the IP address for the existing loopback interface.

B.

Configure a physical interface on the router with an IP address and then create a loopback interface.

C.

Configure a physical interface on the router with an IP address.

D.

Delete the existing loopback Interface and replace it with a new loopback interface.

Buy Now
Questions 94

Refer to the exhibit. Router R1 is configured with class map CE with match Ip precedence critical to align with customer contract SLAs. The customer is sending all traffic from CE1 toward the FTP server with IP precedence 5 A network engineer must allow 10% of interface capacity on router R3 Which two actions must the engineer take to accomplish the task? (Choose two )

Options:

A.

lmptem4Dt4M$§ map on R1 to match all packets with QoS IP precedence value 100.

B.

Implement a class map on R3 to match all packets with QoS IP precedence value 101.

C.

Apply a policy map to R1 to reserve the remaining 10% of interface bandwidth.

D.

Apply a policy map to R3 to reserve 10% of interface bandwidth.

E.

Implement a class map on R3 to match all packets with QoS IP precedence.

Buy Now
Questions 95

Refer to the exhibit. The radio network and packet core are using the route RX-RZ-RB to establish communication. The LDP session between 10.10.10.5 and 10.10.10.1 is experiencing link flapping at random intervals for 30-45 seconds each time. A network engineer must protect the LDP session and improve MPLS traffic convergence. Which action meets these requirements?

Options:

A.

Enable IGP_LDP sysnc on RZ and RX

B.

Add session protection duration 60 for peer_acl_1 under the MPLS LDP instance on RZ.

C.

Attach peer_acl_1 in for session protection duration 1 on RX.

D.

Configure Peer_acl_2 on RX and allow IP address 10.10.10.6 in LDP

Buy Now
Questions 96

A network engineer is configuring a BGP route policy for the SUBNET prefix set. Matching traffic must be dropped, and other traffic must have its MED value set to 400 and community 4:400 added to the route. Which configuration must an engineer apply?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 97

Which action occurs during the traceback phase of the six-phase approach to service provider security?

Options:

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Buy Now
Questions 98

Refer to the exhibit.

A network engineer at a large ISP Is configuring telemetry streams to monitor the health status of PE routers on the network using gRPC dial-out. The PE routers are located at several data centers in different physical locations, and they are using IS-IS and BGP for routing. Which additional configuration must the engineer implement on the PE routers to meet the goal?

Options:

A.

B.

C.

D.

Buy Now
Questions 99

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Buy Now
Questions 100

What is a role of NSO?

Options:

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Buy Now
Questions 101

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

Options:

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Buy Now
Questions 102

A network engineer must enable multicast on the network to support a new series of webcasts. The PIM protocol has been enabled on the LAN side, with PIM and MSDP capabilities on edge router R1. The multicast source has been configured with IP address FF3A:121, and IP protocol 58 has been enabled and successfully tested in the network. Due to the limitations of some devices on the network, the data flow should take the most efficient path.

Which task must the engineer perform to achieve the goal?

Options:

A.

Enable PIM BSR on R1.

B.

Implement Anycast RP on R1.

C.

Implement PIM-SM in the LAN.

D.

Enable PIM-SSM across the network.

Buy Now
Questions 103

Refer to the exhibit. The network administrator is configuring memory telemetry on router R1. Only kvGPB encoding and gRPC protocol based on RFC 7540 should be used. Updates should be sent every two seconds. Which two commands must the administrator apply to complete the task? (Choose two.)

Options:

A.

stream native

B.

stream yang-notif-native

C.

update-policy periodic 200

D.

update-policy periodic 2

E.

stream yang-push

Buy Now
Questions 104

Refer to the exhibit. Four midsize service providers provide access to different customers that use Layer 3 VPN services to enable communication across geographic regions. The service providers are connected as shown in the exhibit, and the PEs have established eBGP relationships. PE4 has an IBGP relationship with PE5. The routes that PE4 learns from PE5 must reach the other PE routers, but they are absent from the routing tables on the other PES. Which action should the engineers take to correct the problem?

Options:

A.

Configure a peering between all five Pes.

B.

Disable BGP synchronization on PE4.

C.

Enable BOP IPv4 unicast on PE4 and PE5

D.

Advertise the route targets for PE5 to the other PEs

Buy Now
Questions 105

How is RSVP used with MPLS traffic engineering tunnels?

Options:

A.

It assigns a tag to a packet as it travels through the tunnel.

B.

It removes and reassigns an MPLS label when the packet enters the tunnel.

C.

It reduces the CPU burden when a packet travels through the tunnel.

D.

It reserves bandwidth along the path of the tunnel.

Buy Now
Questions 106

Refer to the exhibit:

Assume all other configurations are correct and the network is otherwise operating normally. Which conclusion can you draw about the neighbor relationship between routers R1 and R2?

Options:

A.

The neighbor relationship will be up only if the two devices have activated the correct neighbor relationships under the IPv4 address family

B.

The neighbor relationship is down because R1 believes R2 is in AS 65012.

C.

The neighbor relationship is up

D.

The neighbor relationship is down because the loco I-as value for R2 is missing in the R1 neighbor statement

Buy Now
Questions 107

Refer to the exhibit:

Which command is used to complete this configuration for QoS class-based marking?

Options:

A.

PE-A(config-pmap-c)#set dscp ef

B.

PE-A(config-pmap-c)#fair-queue

C.

PE-A(config-pmap-c)#random-detect

D.

PE-A(config -pmap-c)#priority

Buy Now
Questions 108

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services For which reason do you make this decision?

Options:

A.

It enables you to choose whether to separate or centralize each individual service.

B.

It is easier to manage a system in which services are mixed

C.

It requires only one edge router

D.

It enables EGP and IGP to operate independently

Buy Now
Questions 109

An ISP that provides private network services across the country has recently migrated their infrastructure to support MPLS technology. A network engineer configured mpls ip on all routers and implemented the OSPF routing protocol with TE extensions in the backbone area. The ISP wants to ensure that label exchange is performed only on MPLS-enabled interfaces that are associated with the IGP instance.

Which action must the engineer take to accomplish the goal?

Options:

A.

Enable Cisco Express Forwarding on all routers in the backbone area.

B.

Implement mpls Idp sync on all routers in the segment.

C.

Update the routers in the segment to use RSVP-TE for label distribution.

D.

Implement mpls Idp autoconfig on all routers in the segment.

Buy Now
Questions 110

Refer to the exhibit.

An engineer began to configure LDP between R1 and R2, but R1 and R2 cannot yet establish an LDP TCP connection. Which additional task must be completed to finish the implementation?

Options:

A.

Configure the mpls Idp neighbor 172.16.0.1 password command on R1

B.

Configure the mpls Idp neighbor 10.0.12.1 password command on R1

C.

Configure the no mpls Idp password option 1 command on R2

D.

Configure the no mpls Idp password option 1 command on R1

Buy Now
Questions 111

An organization with big data requirements is implementing NETCONF as part of its migration to a new cloud-based environment. The organization has multiple offices across widespread geography. A network engineer is configuring NETCONF on one of the border routers. Which configuration must the engineer apply to save the running configuration?

Options:

A.

B.

C.

snmp-server community public RW

snmp-server trap link left

snmp-server enable traps snmp authentication linkdown linkup

snmp-server enable traps syslog

snmp-server manager

D.

logging history debugging

logging snmp-trap emergencies

logging snmp-trap alerts

logging snmp-trap critical

logging snmp-trap errors

logging snmp-trap warnings

logging snmp-trap notifications

logging snmp-trap information

logging snmp-trap debugging

Buy Now
Questions 112

A company uses PIM-SM multicast with IGMPv2 to stream training videos from a server in one network to hosts in a different network. As the company has grown, the networking team decided to implement SSM to improve efficiency for multicast within Layer 2. Which action must the team take to begin the process?

Options:

A.

Configure an IGMP querier and implement Cisco Express Forwarding across the network.

B.

Implement PIM-DM to enable the routers on the LAN to identify SSM-capable multicast hosts.

C.

Implement IGMPv3 and deprecate IGMPv2.

D.

Implement IGMPv3 simultaneously with IGMPv2 on the individual links that must support SSM and PIM-DM.

Buy Now
Questions 113

Refer to the exhibit. R1 has two upstream Tier 1 service providers. BGP is in use as the exterior routing protocol, and ISP_A and ISP_B are sending the full BGP table. A network engineer must assign local-preference 70 to all routes with multiple exit discriminator 30. Which configuration must the network engineer apply?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 114

Which condition must be met for TI-LFA to protect LDP traffic?

Options:

A.

For single-segment protection, the PQ node must be LDP and SR-capable.

B.

The protected destination must have an associated LDP label and prefix-SID.

C.

The point of local repair must be LDP-capable.

D.

For double-segment protection, the P and Q nodes must be SR-capable.

Buy Now
Questions 115

A company is expanding its existing office space to a new floor of the building, and the networking team is installing a new set of switches. The new switches are running IGMPv2, and the engineers configured them for VLAN10 only. The rest of the existing network includes numerous Layer 2 switches in multiple other VLANs, all running IGMPv3. Which additional task must the team perform when deploying the new switches so that traffic is switched correctly through the entire network?

Options:

A.

Configure the new switches to use IGMPv3 on all VLANs on the network.

B.

Configure all switches on the network to support IGMPv2 and IGMPv3 on all VLANs on the network.

C.

Configure the new switches to use IGMPv3 on VLAN10 only.

D.

Configure all switches on the network to support IGMPv2 and IGMPv3 on VLAN10 only.

Buy Now
Questions 116

Refer to the exhibit.

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

Options:

A.

B.

C.

D.

Buy Now
Questions 117

Simulation 5

Options:

Buy Now
Questions 118

Refer to the exhibit. ISP A provides MPLS L3VPN service to customer A with BGP as the external routing protocol. Customer A has just opened a new branch office in London and requested the service provider to implement lossless service between its two offices. The LDP is enabled over the MPLS backbone and label exchange is working normally. Which action must the ISP engineering team take to enable the service?

Options:

A.

Configure LDP and redistribute the route from EIGRP.

B.

Configure BGP address family VPNv4.

C.

Configure IGP and redistribute the route from BGP.

D.

Configure IGP LDP synchronization

Buy Now
Questions 119

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 120

Refer to the exhibit. A large enterprise is migrating its network to use MPLS VPNs between different business divisions. Within the core, routes are shared between the routers using OSPF, and each connected link maintains an MPLS neighbor relationship.

Which action must the migration team take so that LDP neighbor relationships are maintained if a directly-connected link goes down?

Options:

A.

Implement targeted LDP sessions between directly connected routers and between routers that are one hop away.

B.

Implement LDP session protection between each directly connected LDP neighbor.

C.

Implement LDP sync between routers that are directly connected to each business division.

D.

Implement targeted LDP sessions between routers that are directly connected to each business division.

Buy Now
Questions 121

Refer to the exhibit.

An engineer is configuring path selection on router R1 for two ASNs as shown. Which additional task must the engineer perform on Router 1 so that all outbound traffic utilizes the link between R1 and R3 to reach ASN 4567?

Options:

A.

Configure a low weigh! on the peer to ASN 4567.

B.

Configure a high weight on the peer to ASN 4567.

C.

Configure an AS path prepend on the peer to ASN 4567.

D.

Configure a high med on the peer to ASN 4567.

Buy Now
Questions 122

Which two features will be used when defining SR-TE explicit path hops if the devices are using IP unnumbered interfaces? (Choose two.)

Options:

A.

router ID

B.

labels

C.

node address

D.

next hop address

E.

output interface

Buy Now
Questions 123

What happens when a segment-routing TE tunnel loses the link and there is no secondary path in place?

Options:

A.

The headend router generates a new path to the tail-end router using bandwidth to determine the best path.

B.

The tail-end router sends an alert to the syslog server that the tunnel and the secondary route are inaccessible.

C.

The headend router starts the invalidation timer to bring the tunnel down.

D.

The headend and tail-end routers revalidate SID hops to determine the proper label stack to reroute the traffic.

Buy Now
Questions 124

Refer to the exhibit.

Routers R2 and R3 are Level 1/Level 2 IS-IS routers that redistribute 198 18.x.x/24 prefixes to routers R5 and R6 In the Level 1 area R2 Is to be the preferred router for all redistributed prefixes in the Level 1 area. Which configuration sets this preference?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 125

Refer to the exhibit.

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Options:

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Buy Now
Questions 126

Refer to the exhibit. OSPF is running in the network, which is segmented into three areas. MPLS is enabled on all routers to support Layer 3 VPN. The network architect is concerned about potential packet loss when new OSPF adjacencies form. Which two tasks should the architect perform to implement MPLS LDP synchronization? (Choose two.)

Options:

A.

Enable MPLS functionality on all interfaces that are involved in MPLS.

B.

Configure OSPF to use the same router ID for each router that is involved in MPLS.

C.

Enable LDP sync under the OSPF process.

D.

Establish MPLS targeted sessions for connected LDP neighbors only.

E.

Establish a virtual link between the areas to support LDP sync between segments.

Buy Now
Questions 127

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

Options:

A.

global configuration mode

B.

routing configuration mode

C.

BGP neighbor configuration

D.

mode BGP address-family configuration mode

Buy Now
Questions 128

Refer to the exhibit:

A network administrator wants to enhance the security for SNMP for this configuration.

Which action can the network administrator implement?

Options:

A.

Re-configure to use SNMPv2 with MD5 authentication

B.

Add a community string to the existing entry

C.

Re-configure to use SNMPv3.

D.

Maintain the configuration but switch to an encrypted password for device access through SSH

Buy Now
Questions 129

Refer to the exhibit.

Router 1 and router 2 are running IBGP. and router 2 and router 3 are running OSPF Area 0. Router 1 is advertising loopback interlaces Lo0 and Lo2 and router 2 is redistributing BGP into OSPF Area 0. Which configuration must an administrator apply so that router 2 uses a route map to redistribute only the internal route from Lo 2?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 130

Which service is a VNF role?

Options:

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Buy Now
Questions 131

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Buy Now
Questions 132

Refer to the exhibit:

Which three outcomes occur if the prefix list is added to the neighbor? (Choose three)

Options:

A.

192.168 0.0/19 is denied.

B.

192.168 0.0/17 is denied.

C.

192.168 0.0/17 is permitted

D.

192.168.0.0/16 is denied

E.

192.168 0.0/16 is permitted

F.

192.168 0.0/19 is permitted

Buy Now
Questions 133

Refer to the exhibit.

A network engineer notices that router R2 is failing to install network 172.16.33.1/32 in the routing table. Which configuration must the engineer apply to R2 to fix the problem?

Options:

A.

R2(config)# access-Iist 1 permit 172.16.33.0 255.0.0.0

B.

R2(config)# access-list 1 permit 172,16,33.0 255,255,255,0

C.

R2(config)# access-list 1 permit 172.16.33.0 0.0.0.255

D.

R2(config)# access-list 1 permit 172,16,33.0 255.255,0,0

Buy Now
Questions 134

Refer to the exhibit.

An engineer is updating this network to meet these conditions:

• Area 10 will receive inter-area routes and support mutual redistribution of external routes with the extranet.

• The ::/0 route is prohibited in Area 10.

• Area 11 will receive only the ::/0 route from the ABR.

• External route redistribution is not supported in Area 11.

• The ABR in Area 11 will advertise no interarea routes.

Which two configurations must be performed to meet the requirements? (Choose two.)

Options:

A.

Configure area 11 as nssa no-summary on R7 and as nssa on XR31.

B.

Configure area 10 as stub on R9 and XR32.

C.

Configure area 11 as stub no-summary on R7 and as stub on XR31.

D.

Configure area 11 as nssa default-information-originate on R7 and as nssa on XR31.

E.

Configure area 10 as nssa on R9 and XR32.

Buy Now
Questions 135

Refer to the exhibit. A network engineer must deny access from spoofed addresses to the LAN. The edge router currently has two active BGP sessions established with Tier 1 ISP_A. Due to asymmetric routing, no ACL is configured on either interface. Which two configurations must the engineer perform on the edge router to complete the task? (Choose two.)

Options:

A.

ip verify unicast source reachable-via tx under FA0/0

B.

ip verify unicast source reachable-via under FA0/1

C.

ip verify unicast source reachable-via any under FA0/1

D.

ip verify unicast source reachable-via both under FA0/0

E.

ip verify unicast source reachable-via any under FA0/0

Buy Now
Questions 136

What is a characteristic of data modeling language?

Options:

A.

It provides an interface for state data.

B.

It separates configuration and state data.

C.

It ensures devices are individually configured.

D.

It replaces SNMP.

Buy Now
Questions 137

After a series of unexpected device failures on the network. a Cisco engineer is deploying NSF on the network devices so that packets continue to be forwarded during switchovers The network devices reside in the same holding, but they are physically separated into two different data centers Which task must the engineer perform as part of the deployment?

Options:

A.

implement OSPF to maintain the link-state database during failover.

B.

implement VRFs and specify the forwarding instances that must remain active during failover.

C.

implement an L2VPN with the failover peer to share state Information between the active and standby devices.

D.

implement Cisco Express Forwarding to provide forwarding during failover

Buy Now
Questions 138

Refer to the exhibit. An engineer started to configure a router for OSPF. Which configuration must the engineer perform on the router without changing any interface configuration so that the router establishes an OSPF neighbor relationship with its peer?

Options:

A.

router(config)# router ospf 11router(config-if)# no passive-interface ethernet 1/1

B.

router(config)# interface ethernet 1/1router(config-if)# no shutdown

C.

router(config)# interface ethernet 1/1router(config-if)# ip ospf hello-interval

D.

router(config)# interface ethernet 1/1router(config-if)# ip ospf priority 0

Buy Now
Questions 139

What is the primary purpose of Terraform in the network?

Options:

A.

to manage the Cisco network infrastructure as code to ensure consistent configuration and scalability

B.

to facilitate the integration of Cisco networking solutions with cloud platforms to improve scalability

C.

to schedule and manage maintenance tasks on Cisco network devices to minimize errors and downtime

D.

to enable the seamless migration of Cisco network configurations between diverse network environments

Buy Now
Questions 140

Refer to the exhibit:

What is significant about the number 2 in the configuration?

Options:

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Buy Now
Questions 141

Refer to the exhibit. A network engineer observed congestion between routers R1 and R4, which are connected on a point-to-point link. Two servers that reside on networks on R1 and R4 generate heavy traffic between them with most traffic going from R4 to R1. To improve overall performance, the engineer wants to drop inbound packets that exceed a configured threshold, without disrupting traffic that passes from R4 to R3. Which action must the engineer take to resolve the issue?

Options:

A.

Implement traffic policing to drop packets that exceed the given threshold.

B.

Implement FIFO to queue excess traffic for transmission when bandwidth is available.

C.

Implement traffic shaping to drop excess packets.

D.

Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.

Buy Now
Questions 142

Refer to the exhibits:

R1 and R2 are directly connected and IS-IS routing has been enabled between R1 and R2 R1 message periodically Based on this output, which statement is true?

Options:

A.

IS-IS neighbor authentication is failing for Level 2 first and then for Level 1 PDUs

B.

1S-1S neighbor authentication is failing for Level 1 and Level 2 PDUs .

C.

IS-IS neighbor authentication is failing for Level 1 PDUs only

D.

IS-IS neighbor authentication is failing for Level 2 PDUs only.

Buy Now
Questions 143

Refer to the exhibit. A multinational corporation with a Cisco-based network wants to leverage Cisco security features to enhance the security of their LAN and protect against eavesdropping and man-in-the-middle attacks. The solution must comply with the IEEE 802.1AE standard. A network engineer must implement the new security configurations on a pair of interconnected Cisco switches. The engineer already completed the configuration to enable AAA new-model and set up a basic AAA configuration for user authentication. Management VLAN 10 is in place for network administration. Which action must the engineer take to meet the requirements?

Options:

A.

Implement CTS for role-based access control on both switches.

B.

Implement MACsec on both switches with encryption mode GCM and a shared key.

C.

Implement open authentication via the management VLAN on both switches.

D.

Implement IPsec on both switches to secure data transmissions.

Buy Now
Questions 144

Drag and drop the BGP Best Path Algorithm rules from the left into the corresponding order of importance on the right.

Options:

Buy Now
Questions 145

Refer to the exhibit:

It the NetFlow configuration is updated to version 9, which additional piece of information can be reported"?

Options:

A.

IPv6 flow information

B.

flow sequence numbers

C.

BGP AS information

D.

IPv4 flow information

Buy Now
Questions 146

How do PE routers operate with the MDT in a multicast VPN?

Options:

A.

When the sending PE router recognizes that multicast data has exceeded the bandwidth threshold, it creates a data MDT and sends a UDP message to all routers using the default MDT.

B.

After the default MDT and BGP VPNv4 neighbor is configured, a different PE neighbor in the IPv6 MDT address family is configured automatically for migrating to MDT SAFI.

C.

When the source PE router establishes adjacency using PIM SM mode in the default MDT, the receiving PE requests information about the source PE for BGP advertisement.

D.

The default MDT uses PIM sparse mode and PIM establishes adjacency over the shortest path tree toward the destination PE router.

Buy Now
Questions 147

BGP has been implemented on a IOS XR router. Which configuration sends BGP IPv4 labels to build inter-domain LSPs?

Options:

A.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community extended

B.

router bgp 65515 no bgp default ipv4-unicast

C.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community

D.

router bgp 65515 neighbor 172.16.70.23 address-family ipv4 labeled-unicast

Buy Now
Questions 148

Refer to the exhibit. The NOC is configuring PE router R4 for BGP-originated traffic. R4 is connected to a CE device at a customer location. The customer requires:

    BGP peers must establish a neighborship with NSR and NSF capability.

    BGP must maintain state with the CE and provide continuous forwarding during ISSU and RP switchover events.

Which action meets the NSR requirement on PE routers?

Options:

A.

Set the BGP administrative distance to 15 for BGP neighbors.

B.

Set the BGP restart-time to 120 seconds.

C.

Set the BGP peering with ha-mode sso.

D.

Set the BGP stalepath-time to 360 seconds.

Buy Now
Questions 149

Refer to the exhibit.

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

Options:

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Buy Now
Questions 150

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

Options:

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

Buy Now
Questions 151

A mod-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company’s two sites across the service provider core. To meet service requirements, the service provider must extend the layer 2 domain between the company’s two locations. Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 152

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

Options:

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Buy Now
Questions 153

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

Options:

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Buy Now
Questions 154

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Buy Now
Questions 155

What should a network engineer consider before implementing segment routing?

Options:

A.

It is an MPLS-based routing technique.

B.

It is a source-based routing technique.

C.

It is a multicast-based routing technique.

D.

It is a destination-based routing technique.

Buy Now
Questions 156

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements:

Session protection is provided for core loopback IP addresses only.

The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails.

Which configuration must the team implement on PE-XR1?

Options:

A.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

B.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

C.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

D.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

Buy Now
Questions 157

Refer to the exhibit. A network engineer with an employee ID 4379:43:595 is setting up an IS-IS network with these requirements:

    Routes with a tag of 80 and IP prefixes other than 192.168.10.20/24 must be redistributed from Level 1 into Level 2.

    Route leaking must be configured from Level 2 into the Level 1 domain for routes that are tagged with only 50 or 40.

Which configuration must be implemented on RB to meet the requirements?

Options:

A.

Add match tag 80 in route-map Ieak2-1

B.

DUMPS Add match ip address 152 in route-map redist1-2

C.

Remove match tag 40 from route-map Ieak2-1

D.

Change match tag 80 to match tag 50 in route-map redist1-2.

Buy Now
Questions 158

An engineer is configuring IEEE 802.1 ad on the access port on a new Cisco router. The access port handles traffic from multiple customer VLANs, and it is expected to mark all customer traffic to the same VLAN without dropping any traffic. Which configuration must the engineer apply?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 159

Refer to the exhibit.

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

Options:

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Buy Now
Questions 160

Refer to the exhibit. MPLS is configured within the network. The routers use OSPF to exchange routing information. Hosts that are connected to routers R1 and R3 use routers R2 and R4 to access servers that run a variety of intranet applications. A network engineer must ensure that R1 and R3 maintain an LDP session between them to support the flow of traffic between hosts and servers in case of failure on the path between R1 and R3. Which task should the engineer perform to provide LDP bindings in case of failure on the path between R1 and R3?

Options:

A.

Implement session protection to send targeted hellos between R1 and R3.

B.

Implement multicast in the network to share data between hosts and servers without targeted routing.

C.

Implement LDP sync on the four devices to give MPLS and OSPF the ability to maintain continuous uptime.

D.

Implement BFD to monitor and detect link failures between R1 and R3.

Buy Now
Questions 161

Refer to the exhibit.

An engineer is implementing BGP selective prefix suppression. The router must advertise only 10.16.4.0/24,10.16.5.0/24. and summarized route 10.16.0.0/21. and suppress 10.16.6.0/24. Which configuration must the engineer apply to the router?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 162

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Options:

Buy Now
Questions 163

What is a characteristic of the YANG model?

Options:

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Buy Now
Questions 164

Refer to the exhibit:

Which statement supports QPPB implementation?

Options:

A.

QoS policies are identified in the MPLS forwarding table

B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

C.

QoS policies use BGP to gain full coverage on the network.

D.

QPPB policies affect only egress traffic

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
Last Update: Jan 11, 2026
Questions: 547
350-501 pdf

350-501 PDF

$28.5  $94.99
350-501 Engine

350-501 Testing Engine

$33  $109.99
350-501 PDF + Engine

350-501 PDF + Testing Engine

$43.5  $144.99