Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 350-501 - Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)

Page: 5 / 14
Total 452 questions

Refer to the exhibit:

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Refer to the exhibit:

Which effect of this configuration is true?

A.

R1 can support a peer that is configured for LDP SSO/NSF as the peer recovers from an outage

B.

R1 can failover only to a peer that is configured for LDP SSO/NSF

C.

R1 can failover to any peer

D.

R1 can support a graceful restart operation on the peer, even if graceful restart is disabled on the peer

The engineering team at a large ISP has been alerted a customer network is experiencing high traffic congestion. After a discussion between the ISP and technical personnel at the customer site, the team agrees that traffic to the customer network that exceeds a specific threshold will be dropped. Which task must the engineer perform on the network to implement traffic policing changes?

A.

Configure RSVP to reserve bandwidth on all interfaces when a path is congested.

B.

Enable Cisco Discovery Protocol on the interface sending the packets.

C.

Enable Cisco Express Forwarding on the interfaces sending and receiving the packets.

D.

Set IP precedence values to take effect when traffic exceeds a given threshold.

Refer to the exhibit A network engineer is in the process of implementing IS-IS Area 1 and Area 2 on this network to segregate traffic between different segments of the network The hosts in the two new areas must maintain the ability to communicate with one another In both directions. Which additional change must be applied?

A.

Reconfigure either R3 or R4 as a Level 1/Level 2 router.

B.

Reconfigure routers R1, R2 R5. and R6 as Level 1/Level 2 routers.

C.

Reconfigure routers R2 and R5 as Level 1/Level 2 routers.

D.

Reconfigure routers R4, R5 and R6 as Level 1 routers

Refer to the exhibit.

An engineer is configuring an administrative domain in the given multi-vendor environment with PIM-SM. Which feature must the engineer implement so that devices will dynamically learn the RP?

A.

Auto-RP

B.

BIDIR-PIM

C.

SSM

D.

BSR

Exhibit:

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Refer to the exhibit:

What does this value mean when it is received in XML?

A.

It shows the ending of the script

B.

It indicates a break in a sequence

C.

It indicates a value assigned by a network administrator to tag a route

D.

It means a data field is blank

Refer to the exhibit:

What is the URL used for with REST API?

A.

It is used to contact a URL filter to determine the efficacy of a web address

B.

It is used to send a TACACS+ authentication request to a server

C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

D.

It is used to initiate an FTP session to save a running configuration of a device.

Which type of attack is an application attack?

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack