Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-501 - Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)

Page: 2 / 14
Total 452 questions

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

What are two characteristics of MPLS TE turrets? (Choose two)

A.

They require EIGRP to be running in the core.

B.

They use RSVP to provide bandwidth for the tunnel.

C.

They are run over Ethernet cores only.

D.

The headend and tailend routes of the tunnel must have a BGP relationship

E.

They are unidirectional

Which role does the Adjacency-SID sub-TLV extension perform in the IS-IS routing protocol?

A.

It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.

B.

It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.

C.

It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.

D.

It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one

Drag and drop the OSPF and IS-IS Cisco MPLS TE extensions from the left to their functional descriptions on the right.

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

What is the difference between SNMP and model-driven telemetry?

A.

Telemetry allows for modeled network data to be pushed to the network administrator on an as-needed basis

B.

Telemetry uses traps and inform messages to deliver data to a network administrator on a polling basis

C.

SNMP uses the YANG data modeling language

D.

SNMP pushes network data to the network administrator whenever it is queried

Refer to the exhibit:

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

A.

LDP needs to be enabled on the R2 physical interface

B.

R2 does not see any hellos from R1

C.

LDP needs to be enabled on the R2 loopback interface

D.

R2 sees the wrong type of hellos from R1