image


350-501 Dumps

350-501 Braindumps

350-501 Real Questions

350-501 Practice Test

350-501 Actual Questions


Cisco


350-501


Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)


https://killexams.com/pass4sure/exam-detail/350-501

Question: 315


Which configuration mode do you use to apply the mpls ldp graceful-restart command in IOS XE Software? A . MPLS LDP neighbor

B . interface C . MPLS

D . global


Answer: D Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_ha/configuration/xe-3s/mp-ha-xe-3sbook/mp-ldp- grace-rstrt.html


Question: 316


Why do Cisco MPLS TE tunnels require a link-state routing protocol?

A . The link-state database provides segmentation by area, which improves the path-selection process.

B . The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source I

D . Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel. E . The tunnel endpoints use the link-state database to evaluate the entire topology and determine the best path.


Answer: D


Question: 317


Which task must be performed first to implement BFD in an IS-IS environment? A . Configure BFD in an interface configuration mode.

B . Disable Cisco Express Forwarding on all interfaces running routing protocols other than IS-I D . Configure all IS-IS routers as Level 2 devices.

E . Configure BFD under the IS-IS process.


Answer: D Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html#wp1131797


Question: 318


An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate.


Which configuration accomplishes these objectives? A)

image


B)


image


C)


image


D)


image


A . Option A B . Option B C . Option C D . Option D

Answer: B Question: 319 DRAG DROP

Drag and drop the technologies from the left onto the correct definitions on the right.


image


Answer:

image


Question: 320


Refer to the exhibit.


image


Router 1 was experiencing a DDoS attack that was traced to interface gigabitethernet0/1. Which statement about this configuration is true?

A . Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1.

B . Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface.

C . Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface. D . Router 1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.


Answer: C Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx- os/security/configuration/guide/sec_nx-os-cfg/sec_urpf.html


Question: 321


Refer to the exhibit.


image


Which three outcomes occur if the prefix list is added to the neighbor? (Choose three.) A . 192.168.0.0/16 is denied.

B . 192.168.0.0/16 is permitted. C . 192.168.0.0/19 is permitted D . 192.168.0.0/19 is denied.

E . 192.168.0.0/17 is permitted F . 192.168.0.0/17 is denied.


Answer: ACF


Question: 322


Which configuration enables BGP FlowSpec client function and installation of policies on all local interfaces? A . flowspec

address-family ipv4 local-install interface-all B . flowspec

address-family ipv4 install interface-all local C . flowspec

address-family ipv4 install interface-all D . flowspec address-family ipv4

local-install all-interface


Answer: A Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bgp/configuration/xe-16-6/irg-xe-166- book/C3PL-BGP-Flowspec-Client.html


Question: 323


Refer to the exhibit.


image


A network engineer is implementing an OSPF configuration. Based on the output, which statement is true?

A . OSPFv3 does not run for IPv4 on FastEthernet0/0 until IPv6 routing is enabled on the router and IPv6 is enabled on interface FastEthernet0/0.

B . In the ospfv3 1 area 1 ipv4 command, area 0 must be configured instead of area 1. C . OSPFv3 cannot be configured for IPv4; OSPFv3 works only for IPv6.

D . “IPv6 routing not enabled” is just an informational message and OSPFv3 runs for IPv4 on interface FastEthernet0/0 anyway.


Answer: C Question: 324 Refer to the exhibit.

image


What does the REST API command do?

A . It removes the information identified by Descriptions.xml. B . It executes the information specified in Descriptions.xml. C . It retrieves the information requested by Descriptions.xml. D . It displays the information identified by Descriptions.xml.


image

Answer: C Question: 325 Refer to the exhibit.


This output is included at the end of an output that was provided by a device using NETCONF. What does the code show?

A . It shows that the full configuration is being modeled by YAN C . It shows NETCONF uses remote procedure calls.

D . It shows the hostname of the device as rpc-reply. E . It shows that the running configuration is blank.


Answer: B


Question: 326


You are creating new Cisco MPLS TE tunnels.


Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tailend router? A . path

B . tear C . error

D . reservation


Answer: A Explanation:

Reference: https://packetpushers.net/rsvp-te-protocol-deep-dive/


Question: 327

An engineer working for telecommunication company needs to secure the LAN network using a prefix list.


Which best practice should the engineer follow when he implements a prefix list? A . An engineer must identify the prefix list with a number only.

B . The final entry in a prefix list must be /32.

C . An engineer must include only the prefixes for which he needs to log activity.

D . An engineer must use nonsequential sequence numbers in the prefix list so that he can insert additional entries later.


Answer: D


Question: 328


Which statement about Network Services Orchestrator (NSO) is true? A . It must use SDN as an overlay for addressing.

B . It uses YANG modeling language to automate devices. C . It is used only in service provider environments.

D . It can be used only with XML coding.


Answer: B Question: 329 Refer to the exhibit.

image


Which effect of this configuration is true? A . It enables MPLS on the interface.

B . It creates a pseudowire class named cisco.

C . It enables AToM on interface gigabitethernet1/0. D . It enables tagging for VLAN 12 on the interface.


Answer: C Explanation:

Reference: https://community.cisco.com/t5/service-providers-documents/configuration-example-atom-anytransport- over-mpls-for-like-to/ta-p/3144810


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG