Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Exam Practice Test

Page: 1 / 45
Total 452 questions

Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Question 1

Which OS uses a distributed subsystem architecture?

Options:

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Question 2

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?

Question # 2

Question # 2

Question # 2

Question # 2

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 3

An engineer working for a private service provider with employee id: 3994 37 650 is configuring a Cisco device to redistribute OSPF into BGP. Which task enables the device to filter routes?

Options:

A.

Configure a distribute list and associate it to the BGP peer interface

B.

Configure a prefix list and associate it to the BGP peer interface

C.

Configure a route map and reference it with the redistribute command

D.

Configure an access list and reference it with the redistribute command

Question 4

Simulation 5

Question # 4

Question # 4

Options:

Question 5

Question # 5

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

Options:

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Question 6

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

Options:

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Question 7

You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tunnel’s router?

Options:

A.

error

B.

reservation

C.

path

D.

tear

Question 8

Question # 8

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLAN-based to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

Options:

A.

LSP lifetime maximum

B.

advertise-passive-only

C.

overload bit passive

D.

attached bit on ISIS instance

E.

passive-interface Loopback0

Question 9

Question # 9

Question # 9

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

Question # 9

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 10

Which is the benefit of implementing model-driven telemetry in a service provider environment?

Options:

A.

It reduces the number of network monitoring tools that are necessary to verify device statistics.

B.

It increases the efficiency of SNMP by pulling system data to requesting servers.

C.

It reduces or eliminates the need to monitor Layer 2 traffic between switches.

D.

It uses reliable transport to push Information to network monitoring tools

Question 11

Which statement about TLS is accurate when using RESTCONF to write configurations on network devices'?

Options:

A.

It requires certificates for authentication.

B.

It is provided using NGINX acting as a proxy web server

C.

It is used for HTTP and HTTPS requests.

D.

It is not supported on Cisco devices

Question 12

Question # 12

Refer to the exhibit. Which part of the diagram will host OpenStack components?

Options:

A.

Aggregation

B.

UCS Series

C.

Access

D.

Core

Question 13

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Question 14

Refer to the exhibit.

Question # 14

An engineer is implementing BGP selective prefix suppression. The router must advertise only 10.16.4.0/24,10.16.5.0/24. and summarized route 10.16.0.0/21. and suppress 10.16.6.0/24. Which configuration must the engineer apply to the router?

A)

Question # 14

B)

Question # 14

C)

Question # 14

D)

Question # 14

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 15

A network architect must implement CSC VPN services for a new backbone carrier. Which two benefits does the architecture provide? (Choose two.)

Options:

A.

It maintains.a single backbone, which simplifies the VPN implementation to customers.

B.

It eliminates the need to maintain a centralized network-maintenance and operations strategy.

C.

It leverages IPsec to establish connections within the backbone. which eliminates the need for BGP to distribute routes.

D.

It supports a scalable growth strategy that services multiple customers efficiently

E.

It relies on IP communications, which simplifies the network design.

Question 16

Refer to the exhibit.

Question # 16

An engineer implemented OSPF neighbor relationship on an IOS device. Which configuration must be applied to get the OR/BOR election removed from interfaces running OSPF?

Options:

A.

ip ospf network broadcast on interfaces running OSPF

B.

ip ospf network point-to-point on interfaces running OSPF

C.

ip ospf network multipoint-point on interfaces running OSPF

D.

ip ospf network non-broadcast on n:erfaces running OSPF

Question 17

What is a characteristic of data modeling language?

Options:

A.

It provides an interface for state data.

B.

It separates configuration and state data.

C.

It ensures devices are individually configured.

D.

It replaces SNMP.

Question 18

Question # 18

Refer to the exhibit. An engineer is scripting ACLs to handle traffic on the given network. The engineer must block users on the network between R1 and R2 from leaving the network through R5. but these users must still be able to access all resources within the administrative domain. How must the engineer implement the ACL configuration?

Options:

A.

Configure an ACL that permits traffic to any internal address, and apply it to the R5 interfaces to R3 and R4 in the egress direction

B.

Configure a permit any ACL on the R1 interface to R2 in the egress direction, and a deny any ACL on the interface in the ingress direction

C.

Configure an ACL that permits traffic to all internal networks and denies traffic to any external address, and apply it to the R2 interface to R1 in the ingress direction.

D.

Configure an ACL that denies traffic to any internal address and denies traffic to any external address, and apply it to the R5 interfaces to R3 and R4 in the ingress direction

Question 19

What are two features of stateful NAT64? (Choose two.)

Options:

A.

It uses address overloading.

B.

It provides 1:N translations, so it supports an unlimited number of endpoints.

C.

It requires IPv4-translatable IPv6 address assignments.

D.

It requires the IPv6 hosts to use either DHCPv6-based address assignments or manual address assignments.

E.

It provides 1:1 translation, so it supports a limited number of endpoints.

Question 20

Question # 20

Question # 20

Refer to the exhibit. LDP peering between routers R1 and R2 is dropped when the link between R1 and R2 is taken offline. However, LDP peering between R2 and R3 stays up when the link between R2 and R3 is taken offline. Which action allows MPLS traffic forwarding to continue normally if the link between R1 and R2 goes down?

Options:

A.

Enable IGP and LDP Synchronization on R1.

B.

Implement LDP Session Protection on R1.

C.

Enable IGP and LDP Synchronization on R2.

D.

Implement LDP Session Protection on R2.

Question 21

Refer to the exhibit.

Question # 21

What is the result of this configuration?

Options:

A.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization.

B.

Router 1 and the TACACS+ server maintain one open connection between them only when network administrator is accessing the router with password ciscotest.

C.

Router 1 and the TACACS+ server maintain one open connection between them.

D.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authentication.

Question 22

How can a network administrator secure rest APIs?

Options:

A.

They can allow read and write privileges to all users

B.

They can ensure that user sessions are authenticated using TACACS+ only

C.

They can have a general administrator login for multiple users to access that has command entries logged

D.

They can authenticate user sessions and provide the appropriate privilege level

Question 23

Question # 23

Refer to the exhibit. A network support engineer for ASN 65502 receives a technical support ticket from a customer in ASN 65503 who reports that an eBGP session is down. The engineer determines that the peering failed after a recent change to the device at 192.168.26.2. EDGE-GW-1 must establish an eBGP session with the peering router 192.168.26.2. Which configuration establishes this session?

Options:

A.

configure terminal

no router bgp 65502

router bgp 65503

neighbor 192.168.26.2 remote-as 65503

address-family ipv4

neighbor 192.168.26.2 activate

end

B.

configure terminal

router bgp 65502

address-family ipv4

neighbor 192.168.26.2 activate

end

C.

configure terminal

no router bgp 65502

router bgp 65503

neighbor 192.168.26.2 remote-as 65123

address-family ipv4

neighbor 192.168.26.2 activate

end

D.

configure terminal

router bgp 65502

no neighbor 192.168.26.2 remote-as 65503

neighbor 192.168.26.2 remote-as 65123

address-family ipv4

neighbor 192.168.26.2 activate

end

Question 24

Refer to the exhibit:

Question # 24

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

Question # 24

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Question 25

Refer to the exhibit.

Question # 25

If RC is a stub router, which entry must be injected so that it will send traffic outside the OSPF domain?

Options:

A.

virtual link between RB and RC

B.

sham link

C.

more specific route

D.

default route

Question 26

What is the function of the FEC field within the OTN signal structure?

Options:

A.

It allows the sending devices to apply QoS within the OTN forwarding structure.

B.

It allows source nodes to discard payload errors before transmitting data on the network.

C.

It allows receivers to correct errors upon data arrival.

D.

It allows deep inspection of data payload fields.

Question 27

Refer to the exhibit A network engineer is in the process of implementing IS-IS Area 1 and Area 2 on this network to segregate traffic between different segments of the network The hosts in the two new areas must maintain the ability to communicate with one another In both directions. Which additional change must be applied?

Question # 27

Options:

A.

Reconfigure either R3 or R4 as a Level 1/Level 2 router.

B.

Reconfigure routers R1, R2 R5. and R6 as Level 1/Level 2 routers.

C.

Reconfigure routers R2 and R5 as Level 1/Level 2 routers.

D.

Reconfigure routers R4, R5 and R6 as Level 1 routers

Question 28

How do intent APIs make it easier for network engineers to deploy and manage networks?

Question # 28

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 29

Which technology enables the addition of new wavelengths in a fiber-optic network?

Options:

A.

IPoDWDM

B.

CWDM

C.

DWDM

D.

ROADM

Question 30

Refer to the exhibit.

Question # 30

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

Question # 30

B)

Question # 30

C)

Question # 30

D)

Question # 30

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 31

Which utility must be used to locate MPLS faults?

Options:

A.

QoS

B.

MPLS LSP ping

C.

MPLStraceroute

D.

EEM

Question 32

Drag and drop the NAT64 descriptions from the left onto the correct NAT64 types on the right.

Question # 32

Options:

Question 33

An engineer must implement QoS to prioritize traffic that requires better service throughout the network. The engineer started by configuring a class map to identify the high-priority traffic. Which additional tasks must the engineer perform to implement the new QoS policy?

Options:

A.

Attach the class map to a policy map that sets the minimum bandwidth allocated to the classified traffic and designates the action to be taken on the traffic.

B.

Attach the class map to a policy map that designates the action to be taken on the classified traffic and then attach the policy map to an interface using a service policy.

C.

Attach the class map to a policy map within a VRF to segregate the high-priority traffic and then attach the policy map to an interface in another VRF.

D.

Create a route map to manipulate the routes that are entered into the routing table and then attach the route map to an interface using a service policy.

Question 34

Which statement about segment routing prefix segments is true?

Options:

A.

It is linked to a prefix SID that is globally unique within segment routing domain.

B.

It is the longest path to a node.

C.

It is linked to an adjacency SID that is globally unique within the router.

D.

It requires using EIGRP to operate.

Question 35

An engineer is implementing MPLS to monitor within the MPLS domain. Which must the engineer perform to prevent packets from being forwarded beyond the service provider domain when the LSP is down?

Question # 35

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 36

Question # 36

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

Options:

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Question 37

What are two factors to consider when implementing NSR High Availability on an MPLS PE router? (Choose two.)

Options:

A.

It consumes more memory and CPU resources than NSF

B.

It operates normally without NSR support on the PE peers.

C.

It requires all PE-CE sessions to support NSR

D.

It requires routing protocol extensions

E.

It cannot sync state information across redundant RPs

Question 38

After a possible security breach, the network administrator of an ISP must verify the times that several different users logged into the network. Which command must the administrator enter to display the login time of each user that activated a session?

Options:

A.

show netconf-yang sessions detail

B.

show netconf-yang datastores

C.

show platform software yang-management process

D.

show netconf-yang sessions

Question 39

A new PE router is configured to run OSPF as an IGP with LDP on all interfaces. The engineer is trying to prevent black holes after convergence when the PERSON device loses an LDP session with other PE routers. Which action must the engineer take to implement LDP session protection on a new PE router?

Options:

A.

Configure the mpls ldp session protection and mpls label protocol ldp commands on the interfaces on the new PE router that connect to the CENTER routers.

B.

Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands on the interfaces on the new PE router that connect to the CE routers.

C.

Configure the new PE router with the mpls ldp session protection command and on neighboring routers that connect to this new PE router.

D.

Configure the new PE router with the mpls ldp session protection command on interfaces with directly connected neighbors.

Question 40

Which service is a VNF role?

Options:

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Question 41

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

Options:

A.

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Question 42

Question # 42

Refer to the exhibit. ISP_A is about to launch a new internet service. ISP_A is already providing MPLS VPN Layer 3 services to Customer_A and Customer_B, which are connected to ISP_A via OSPF. A network engineer completed the BGP and VRF configurations on R2 to support the new internet service. Which additional action completed the launch?

Options:

A.

Implement the BGP routing protocol in the customer VRFs on R1 and R2

B.

Import route-target 62:101 into the customer VRFs on R1 and R3.

C.

Enable the route-replicate command under the customer VRFs on R1 and R2

D.

Activate NAT CE in the customer VRFs on R1. R2. and R3.

Question 43

Question # 43

Refer to the exhibit. The network engineer who manages ASN 65001 is troubleshooting suboptimal routing to the 198.18.15.0/24 prefix. According to the network requirements:

Routing to IP destinations in the 198.18.15.0/25 block must be preferred via the EDGE-1 PE.

Routing to IP destinations in the 198.18.15.128/25 block must be preferred via the EDGE-2 PE.

More specific prefixes of the 198.18.15.0/24 block must not be advertised beyond the boundaries of ASN 64611.

Routing to 198.18.15.0/24 must be redundant in case one of the uplinks on INT-R1 fails.

Which configuration must the network engineer implement on INT-R1 to correct the suboptimal routing and fix the issue?

Options:

A.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-export, peeras:65001)

done

endif

if destination in (198.18.15.0/24) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT out

B.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (internal, peeras:65001)

done

endif

if destination in (198.18.15.0/24) then

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT out

end

C.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-advertise, peeras:65001)

done

endif

if destination in (198.18.15.128/25) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OU

D.

configure terminal

route-policy ASN65001-SPECIFIC-OUT

if destination in (198.18.15.0/25) then

set community (no-export, peeras:65001)

done

endif

if destination in (198.18.15.128/25) then

prepend as-path 65001 3

done

endif

drop

end-policy

!

router bgp 65001

neighbor 100.65.0.1

address-family ipv4 unicast

route-policy ASN65001-SPECIFIC-OUT i

Question 44

Question # 44

Refer to the exhibit. The application server in the data center hosts voice, video, and data applications over the internet. The data applications run more slowly than the voice and video applications. To ensure that all applications run smoothly, the service provider decided to implement a QoS policy on router PER 2 to apply traffic shaping. Which two actions must an engineer take to implement the task? (Choose two.)

Options:

A.

Configure the scheduling function to handle delayed packets.

B.

Enable packet remarking for priority traffic.

C.

Configure a queue to buffer excess traffic.

D.

Set the token value for secondary traffic.

E.

Set a threshold to discard excess traffic.

Question 45

Drag and drop the BGP Best Path Algorithm rules from the left into the corresponding order of importance on the right.

Question # 45

Options:

Question 46

Which benefit is provided by FRR?

Options:

A.

It provides fast forwarding path failure detection times for all media.

B.

It provides rapid failure detection between forwarding engines.

C.

It provides performance data for the service provider network.

D.

It protects Cisco MPLS TE LSPs from link and node failures.

Question 47

Which role does the Adjacency-SID sub-TLV extension perform in the IS-IS routing protocol?

Options:

A.

It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.

B.

It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.

C.

It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.

D.

It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one

Question 48

Refer to the exhibit.

Question # 48

Routers R2 and R3 are Level 1/Level 2 IS-IS routers that redistribute 198 18.x.x/24 prefixes to routers R5 and R6 In the Level 1 area R2 Is to be the preferred router for all redistributed prefixes in the Level 1 area. Which configuration sets this preference?

Question # 48

Question # 48

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 49

Which statement about the Cisco MPLS TE forwarding adjacency feature is true?

Options:

A.

It enables the headend and tailend routers to establish a bidirectional tunnel

B.

It enables the tailend router to advertise routes to the headend router over the tunnel

C.

It enables the MPLS core to use EIGRP as the routing protocol

D.

It enables the Cisco MPLS TE tunnel to be advertised into the running IGP.

Question 50

Question # 50

Refer to the exhibit. An engineer started to configure a router for OSPF. Which configuration must the engineer perform on the router without changing any interface configuration so that the router establishes an OSPF neighbor relationship with its peer?

Options:

A.

router(config)# router ospf 11router(config-if)# no passive-interface ethernet 1/1

B.

router(config)# interface ethernet 1/1router(config-if)# no shutdown

C.

router(config)# interface ethernet 1/1router(config-if)# ip ospf hello-interval

D.

router(config)# interface ethernet 1/1router(config-if)# ip ospf priority 0

Question 51

Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?

Options:

A.

routing and tunneling when doing symmetric IRB

B.

routing when doing asymmetric IRB

C.

routing and bridging when doing asymmetric IRB

D.

bridging when doing symmetric IRB

Question 52

Refer to the exhibit.

Question # 52

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

Options:

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Question 53

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

Options:

A.

Enable communication over TCP port 646 for T-LDP hello messages.

B.

Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers.

C.

Enable LDP session protection on either one of the routers, which allows them to autonegotiate.

D.

Set the LDP session protection timer on each router to the same value.

Question 54

What is a role of NSO?

Options:

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Question 55

Refer to the exhibit.

Question # 55

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

Question # 55

B)

Question # 55

C)

Question # 55

D)

Question # 55

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 56

According to RFC5305 on IS-IS extensions for traffic engineering, what is the 4-octet sub-TLV type 10 of extended IS-IS reachability TLV type 22?

Options:

A.

TE default metric

B.

maximum reservable link bandwidth

C.

administrative group (color)

D.

IPv4 neighbor address

Question 57

Question # 57

Refer to the exhibit. A network engineer is configuring a new router for iBGP to improve the capacity of a growing network. The router must establish an iBGP peer relationship with its neighbor. The underlay network is already configured with the correct IP addresses. Which step should the engineer apply to complete this task?

Options:

A.

Implement multicast routing on the router to support BGP hellos.

B.

Configure the AS number for the router to share with its iBGP peers.

C.

Configure the new router as an iBGP route reflector to support multiple iBGP peers.

D.

Activate the BGP peers under the correct address family on the router.

Question 58

Refer to the exhibit.

Question # 58

A network operator working for a telecommunication company with an employee 3994:37:650 is implementing a cisco Unified MPLS solution. What is the effect of this implementation?

Options:

A.

EIGRP is deployed between the PEs and ABRs with RFC 3107.

B.

OSPF is deployed between the PEs and ABRs with RFC 3107.

C.

IS-IS is deployed between the PEs and ABRs with RFC 3107.

D.

BGP is deployed between the PEs and ABRs with RFC 3107.

Question 59

Refer to the exhibit.

Question # 59

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

Question # 59

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 60

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

Question # 60

Options:

Question 61

How does SR policy operate in Segment Routing Traffic Engineering?

Options:

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Question 62

Refer to the exhibit.

Question # 62

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

Question # 62

B)

Question # 62

C)

Question # 62

D)

Question # 62

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 63

A network engineer is implementing BFD configuration changes on a customer's equipment. How is the bfd interval configuration on the interface disconnected?

Options:

A.

The status of the interface changes.

B.

The IPv4 or IPv6 address configuration on the interface changes.

C.

It is automatically disconnected when the BFD-configured subinterface is removed.

D.

It is automatically disconnected when the BFD main interface is removed.

Question 64

Question # 64

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

Options:

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Question 65

Refer to the exhibit. Which additional configuration must an engineer to the adge router to inject a default router into the MP-BGP address family for the internet_Shared_Services dedicated VRF?

A)

Question # 65

B)

Question # 65

C)

Question # 65

D)

Question # 65

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 66

Question # 66

router(config)# route-map blackhole-trigger

router(config-route-map)# match tag 777

router(config-route-map)# set ip next-hop 10.0.1.1

router(config-route-map)# set origin igp

router{config-route-map)# set community no-export

Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and each router maintains iBGP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which is used as a black hole route as shown. Which configuration should the operator implement to the management router to create a route map that will redistribute tagged static routes into BGP and create a static route to blackhole traffic with tag 777 that is destined to the server at 192.168.10.100?

Options:

A.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

B.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

C.

router(config)# router bgp 55100

router(config-router)# redistribute connected

router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

D.

router(config)# router bgp 55100

router(config-router)# redistribute connected route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

Question 67

What is a primary benefit of IPoATM or MPLS over ATM backbone service provider networks?

Options:

A.

dedicated circuits

B.

variable-length packets

C.

isochronous system

D.

fixed-length cells

Question 68

Question # 68

Refer to the exhibit. The ISP is implementing a new hosting-as-a-service solution for its business customers. Service accessibility must be unique and separate for each customer. The network architect must ensure that multiple paths toward the hosting-as-a-service solution are always available. Basic protection against traffic black-holing on the MPLS network is required in case of link failure. Which two actions must the engineering team perform to meet the requirements? (Choose two.)

Options:

A.

Create the hosting-as-a-service VRF on router R4 and configure It with the route target both 65123:88 command.

B.

Configure the fast-reroute per-prefix command for the IS-IS protocol in the MPLS network and enable the BGP route-reflector feature on R2.

C.

Enable the VRF-Lite feature on router R4 and enable BGP address-family VPNv4.

D.

Configure the mpls Idp sync command in the MPLS network with the BGP additional-paths receive and additional-paths send options.

E.

Configure the fast-hello command under the IS-IS routing protocol with the BGP multipath 2 option enabled.

Question 69

Refer the exhibit.

Question # 69

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

Options:

A.

first-in, first-out

B.

traffic shaping

C.

class-based weighted fair queueing

D.

traffic policing

Question 70

Which programmable API allows the service provider to plan and optimize the automation of network operations and achieve closed-loop operations?

Options:

A.

Network Services Orchestrator

B.

WAN Automation Engine

C.

Evolved Programmable Network Manager

D.

Crosswork Network Automation

Question 71

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

Question # 71

B)

Question # 71

C)

Question # 71

D)

Question # 71

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 72

Question # 72

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

Options:

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Question 73

A network engineer is configuring RIP as the routing protocol between multiple PEs and CEs. The engineer must avoid advertising the same routes back to their sources. Which action should be performed on the routers to accomplish this task?

Options:

A.

Configure a different route distinguisher for each prefix.

B.

Define the site of origin on each interface.

C.

Define VRFs on each device to separate the traffic.

D.

Enable bidirectional forwarding detection on each device.

Question 74

Refer to the exhibit.

Question # 74

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

Options:

A.

Option A74Text Description automatically generated

B.

Option B74Text Description automatically generated

C.

Option C74Text Description automatically generated

D.

Option D74Text, letter Description automatically generated

Question 75

Refer to the exhibit.

Question # 75

The network engineer who manages ASN 65001 must configure a BGP routing policy on GW-XR1 with these requirements:

• Advertise locally-originated routes and /24 prefixes assigned within the 198.18.0.0/15 range. All other prefixes must be dropped.

• Reachability to 198.18.100.0/24 must be preferred via the EDGE-1 connection.

• Reachability to 198.19.100.0/24 must be preferred via the EDGE-2 connection.

Which configuration must the network engineer implement on GW-XR1?

Options:

A.

Option A75Graphical user interface, text, application Description automatically generated

B.

Option B75Text Description automatically generated

C.

Option C75Graphical user interface, text, application, letter, email Description automatically generated

D.

Option D75Text, letter, email Description automatically generated

Question 76

Which statement about Network Services Orchestrator (NSO) is true?

Options:

A.

It is used only in service provider environments

B.

It can be used only with XML coding

C.

It uses YANG modeling language to automate devices

D.

It must use SDN as an overlay for addressing

Question 77

Refer to the exhibit.

Question # 77

What is the effect of this configuration?

Options:

A.

R1 supports a graceful restart operation on the peer, even if graceful restart is disabled on the peer.

B.

R1 supports a peer that is configured for LDP SSO/NSF as the peer recovers from an outage.

C.

R1 failovers only to a peer that is configured for LDP SSO/NSF.

D.

R1 failovers to any peer.

Question 78

After implement MPLS protocol for multiple VRFs on a single Cisco device, the engineer notices all VRFs on the router still do to not LDP session protection feature enabled. Which configuration must the engineer apply to enable the LDP session protection feature FOR LDP neighbors within each VRF?

Options:

A.

Configure LDP session protection globally on the device only.

B.

Configure LDP session protection globally on the device and on each neighbor that requires session protection.

C.

Configure LDP session authentication on the device to enable LDP session protection on each VRF automatically.

D.

Configure LDP session protection within the individual VRFs.

Question 79

Question # 79

Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is Mbps. The company XYZ security team asked the ISP to redirect ICMP requests which are currently going to the web server to a new local security appliance which configuration must an ISPP engineer apply to router R2 to redirect the ICMP traffic?

A)

Question # 79

B)

Question # 79

C)

Question # 79

D)

Question # 79

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 80

Refer to the exhibit:

Question # 80

You are configuring an administrative domain implement so that devices can dynamically learn the RP?

Options:

A.

SSM

B.

BID1R-PIM

C.

BSR

D.

Auto-RP

Question 81

Refer to the exhibit.

Question # 81

Router 1 and router 2 are running OSPF Area 0. The router logs on both routers show that the LDP link has flapped. Which configuration must the engineer apply to the two routers to implement session protection on the link?

Question # 81

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 82

Refer to the exhibit.

Question # 82

An engineer is trying to implement BGP configuration on a router Which configuration error prevents the ASBR from establishing a BGP neighborship to a directly connected BGP speaker?

Options:

A.

The routing policy is absent for this Cisco IOS XR eBGP instance.

B.

The IPv4 address family configuration under neighbor configuration-mode must be removed.

C.

The VPNv4 address family interferes with the 8GP IPv4 address family negotiations.

D.

The TCP session parameters are not specified.

Question 83

What is a feature of mVPN?

Options:

A.

It requires-uncast to be disabled on the multicast domain

B.

It establishes multiple static MDTs for each multicast domain.

C.

It provides the ability to support multicast over a Layer 3 VPN.

D.

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Question 84

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

Question # 84

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Options:

Question 85

Question # 85

Refer to the exhibit. A network engineer received a complaint about these problems in OSPF stub area 100:

  • The Ethernet link is down between routers RX and RY because the fiber was cut.
  • CE site A traffic to the hub site is being dropped.

Which action resolves these issues?

Options:

A.

Set the OSPF authentication type to MD5 between RX and RY DUMPS

B.

Change the OSPF area 100 type to stub on RZ.

C.

Change the OSPF priority to 100 on the interfaces that connect RX and RY.

D.

DUMPS Set the OSPF MTU to 1500 on the link between RX and RZ.

Question 86

What is the purpose of RSVP tear messages?

Options:

A.

to notify the tail-end router of resource unavailability on the transit router

B.

to inform the headend router of LSP issues

C.

to reuse router resources for other reservation requests

D.

to confirm successful end-to-end resource allocation

Question 87

In an EVPN operation, how does the PE determine and advertise Ethernet segment reachability?

Options:

A.

The PE discovers the remote PEs in the EVI and builds a flood list linked with the EVI.

B.

The PE discovers and shared routing information for the B-MAC addresses associated with local Ethernet segments.

C.

The PE discovers other PEs in the same Ethernet segment and elects a DF.

D.

The PE discovers remote ESIs and determines their redundancy mode.

Question 88

Refer to the exhibit:

Question # 88

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

Options:

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Question 89

Refer to the exhibit.

Question # 89

A network engineer Is implementing OSPF multiarea. Which command on interface G0/1 resolves adjacency Issues in the new area?

Options:

A.

Ip ospf network broadcast

B.

Ip ospf network non-broadcast

C.

Ip ospf network polnt-to-multlpoint

D.

Ip ospf network point-to-point

Question 90

How does Cisco DNA Center enhance network automation?

Options:

A.

It allows network administrators to quickly deploy Cisco Layer 2 devices without requiring STP and broadcast transport.

B.

It allows network administrators to reduce inconsistencies when they deploy and validate network configurations.

C.

It allows network administrators to reduce the number of VRFs in a multi customer environment by automatically implementing a single VLAN per customer.

D.

It allows network administrators to combine voice and data networks into a single topology without manual configuration.

Question 91

The network team is planning to implement IPv6 on the company’s existing IPv4 network infrastructure. The network currently uses IS-IS to share routes between peers. Which task must the team perform so that IS-IS will run in multitopology mode on the updated IPv6 network?

Options:

A.

Configure the links between the network routers as point-to-point.

B.

Configure the network routers to use metric-style wide.

C.

Configure the network routers as Level 2 routers.

D.

Configure the IS-IS IPv6 metric on the dual-stack links.

Question 92

Refer to the exhibit.

Question # 92

A network administrator implemented MPLS LDP changes on PE-A LSR device. The engineer must ensure there are no LDP peer are fully operational. Which LDP feature must the engineer apply to the existing configuration to eliminate the problem?

Options:

A.

Configure MPLS LDP IGP synchronization on the network.

B.

Configure MPLS LDP NSR for all LDP sessions.

C.

Enable LDP session protection under the routing protocol.

D.

Disable IP CEF on routers running LDP and enable LDP.

Question 93

Refer to the exhibit.

Question # 93

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Options:

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Question 94

What are two characteristics of MPLS TE turrets? (Choose two)

Options:

A.

They require EIGRP to be running in the core.

B.

They use RSVP to provide bandwidth for the tunnel.

C.

They are run over Ethernet cores only.

D.

The headend and tailend routes of the tunnel must have a BGP relationship

E.

They are unidirectional

Question 95

ASN 65001 is peering with ASN 65002 to exchange IPv6 BGP routes. All routes that originate in ASN 65001 have a standard community value of 65001:100, and ASN 65002 is allowed to advertise only 2001 :db8:aaaa::/48. An engineer needs to update the ASN 65001 route-filtering configuration to meet these conditions:

* Looped routes into ASN 65001 and routes that have traversed 10 or more ASNs must be denied.

* Routes accepted into ASN 65001 must be assigned a community value of 65001:200.

Which configuration must the engineer apply to the ASN 65001 border router?

Question # 95

Question # 95

Question # 95

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 96

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

Options:

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Question 97

Refer to the exhibit.

Question # 97

Router R1 is reporting that its BGP neighbor adjacency to router R2 is down, but its state is Active as shown. Which configuration must be applied to routers R1 and R2 to fix the problem?

A)

Question # 97

B)

Question # 97

C)

Question # 97

D)

Question # 97

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 98

Refer to the exhibit.

Question # 98

An engineer is configuring an administrative domain in the given multi-vendor environment with PIM-SM. Which feature must the engineer implement so that devices will dynamically learn the RP?

Options:

A.

Auto-RP

B.

BIDIR-PIM

C.

SSM

D.

BSR

Question 99

Which two features describe TI-LFA? (Choose two.)

Options:

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Question 100

Refer to the exhibit.

Question # 100

Which configuration must be applied to each of the four routers on the network to reduce LDP LIB size and advertise label bindings for the /32 loopback IP space only?

Question # 100

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 101

A network engineer must collect traffic statistics for an internal LAN toward the internet The sample must include the source and destination IP addresses, the destination ports, the total number of bytes from each flow using a 64-bit counter, and all transport flag information. Because of CPU limits, the flow collector processes samples that are a maximum of 20 seconds long. Which two configurations must the network engineer apply to the router? (Choose two.)

Question # 101

Question # 101

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 102

What does DWDM use to combine multiple optical signals?

Options:

A.

frequency

B.

IP protocols

C.

time slots

D.

wavelength

Question 103

Refer to the exhibit.

Question # 103

What does the number 2 mean in the configuration?

Options:

A.

It dictates the number of sessions that will be open with the SNMP manager

B.

It represents the version of SNMP running.

C.

It indicates two SNMP managers are able to read and write with the agent using community string ciscotest.

D.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent.

Question 104

After a series of unexpected device failures on the network. a Cisco engineer is deploying NSF on the network devices so that packets continue to be forwarded during switchovers The network devices reside in the same holding, but they are physically separated into two different data centers Which task must the engineer perform as part of the deployment?

Options:

A.

implement OSPF to maintain the link-state database during failover.

B.

implement VRFs and specify the forwarding instances that must remain active during failover.

C.

implement an L2VPN with the failover peer to share state Information between the active and standby devices.

D.

implement Cisco Express Forwarding to provide forwarding during failover

Question 105

A remote operation center is deploying a set of l-BGP and E-BGP connections for multiple IOS-XR platforms using the same template. The l-BGP sessions exchange prefixes with no apparent issues, but the E-BGP sessions do not exchange routes. What causes this issue?

Options:

A.

A PASS ALL policy has no! been implemented for the l-BGP neighbors.

B.

The next-hop-self command is not implemented on both E-BGP neighbors.

C.

The E-BGP neighbors are not allowed to exchange information doe to the customer platforms default policy.

D.

The l-BGP neighbors are mistyped and HELLO packets cannot be exchanged successfully between routers.

Question 106

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

Options:

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Question 107

Which core component of MDT describes the data that an MDT-capable device streams to a collector?

Options:

A.

subscription

B.

encoder

C.

sensor path

D.

transport protocol

Question 108

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

Options:

A.

The traffic uses the default MDT transmit the data Only if it is a (S, G) multicast route entry.

B.

A data MDT is created if is a Multicast route entries

C.

A data and default MDT are created to flood the multicast stream of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmit through the core for multicast route entries.

Question 109

Question # 109

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

  • Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.
  • Other SNMP managers must not have access to objects.
  • SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

Question # 109

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 110

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

Options:

A.

bandwidth

B.

affinity

C.

explicit path

D.

SLRG

Question 111

After troubleshooting multiple outages on the network due to repeated configuration errors, the network architect asked an engineer to enable NETCONF to facilitate future configurations. The configuration must enable syslog messaging to record NETCONF notifications from each of the numerous devices on the network. Which configuration must the engineer apply?

Options:

A.

username cisco test taker privilege 15 password 0 cisco test

aaa new-model

aaa authorization exec default local

snmp-server community cisco test RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history warnings

B.

username cisco test taker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco

logging history critical

C.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history debugging

D.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history informational

Question 112

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

Options:

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Question 113

Refer to the exhibit.

Question # 113

The network engineer is performing end-to-end MPLS path testing with these conditions:

• Users must perform MPLS OAM for all available same-cost paths from R1 to R4.

• Traceroute operations must return all of the next-hop IP details.

Which configuration meets these requirements?

Options:

A.

traceroute mpls ipv4 10.10.10.4 255.255.255.255 verbose

B.

traceroute mpls multipath ipv4 10.10.10.4 255.255.255.255

C.

traceroute mpls multipath ipv4 10.10.10.4 255.255.255.255 verbose

D.

traceroute mpls ipv4 10.10.10.4 255.255.255.255 source 10.10.10.1

Question 114

A network team has failed to implement IS-IS multitopology. What is the reason for it?

Options:

A.

The router did not support VRFs.

B.

The routing process did not support extended metrics.

C.

The router did not have Cisco Discovery Protocol and Cisco Express Forwarding disabled.

D.

The routing process supported Level 1 only.

Question 115

Question # 115

Refer to the exhibit. A network engineer must deny access from spoofed addresses to the LAN. The edge router currently has two active BGP sessions established with Tier 1 ISP_A. Due to asymmetric routing, no ACL is configured on either interface. Which two configurations must the engineer perform on the edge router to complete the task? (Choose two.)

Options:

A.

ip verify unicast source reachable-via tx under FA0/0

B.

ip verify unicast source reachable-via under FA0/1

C.

ip verify unicast source reachable-via any under FA0/1

D.

ip verify unicast source reachable-via both under FA0/0

E.

ip verify unicast source reachable-via any under FA0/0

Question 116

Refer to the exhibit:

Question # 116

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to create a subscription to specify the streaming interval

B.

It is used to identify traps for SNMP polling

C.

It is used to identify MIB entries and has a list of YANG models

D.

It is used to create a sensor-group and has a list of YANG models for streaming

Question 117

Refer to the exhibit.

Question # 117

A network engineer must meet these requirements to provide a connects, solution:

  • The customer connected to Area 2 needs to access the application in Area 1 on the 10.10.10.0/24 subnet
  • The Customer must not have access to the 20.10 30.0/24 subnet.
  • The service provider must make sure that the Area 2 routing database limits the number of IP addresses in the routing table

Which two configurations must be implemented to meet the requirements? (Choose two)

Options:

A.

Set a tag value of 200 to match the summary address 10.0.0/16 on R2.

B.

Set a tag value of 200 to match the summary address 10.0.0.0/16 on R3.

C.

Apply the route map for tag 200 and leak Level 2 routes into Level 1 Area 2 on R3

D.

Apply the route map for tag 200 and teak Level 2 routes into Level 1 Area 2 on R4.

E.

Set a tag value of 200 to match the summary address 10.0.0./16 on R1.

Question 118

Refer to the exhibit.

Question # 118

Question # 118

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

Options:

A.

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Question 119

Question # 119

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

Options:

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Question 120

Simulation 7

Question # 120

Question # 120

Options:

Question 121

A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?

Question # 121

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 122

How does model-driven telemetry use YANG?

Options:

A.

to reset network devices that malfunction

B.

to set informs and traps on clients to report back to a centralized server

C.

to subscribe to data that is streamed from a device

D.

to poll network devices on a 30-minute interval

Question 123

Refer to the exhibit:

Question # 123

P3 and PE4 are at the edge of the service provider core and serve as ABR routers Aggregation areas are on either side of the core.

Which statement about the architecture is true?

Options:

A.

If each area is running its own IGP. the ABR routers must redistribute the IGP routing table into BGP

B.

To support seamless MPLS. TDP must be used as the label protocol

C.

If each area is running its own IGP. BGP must provide an end-to-end MPLS LSP

D.

To support seamless MPLS, the BGP route reflector feature must be disabled

Question 124

A network administrator is planning a new network with a segment-routing architecture using a distributed control plane. How is routing information distributed on such a network?

Options:

A.

Each segment is signalled by an SR controller, but each segment makes Its own steering decisions based on SR policy.

B.

Each segment is signalled by MPLS, and each segment makes steering decisions based on the routing policy pushed by BGP.

C.

Each segment is signalled by an SR controller that makes the steering decisions for each node.

D.

Each segment is signalled by a compatible routing protocol and each segment makes its own steering decisions based on SR policy.

Question 125

Refer to the exhibit.

Question # 125

An administrator working for large ISP must connect its two POP sites to provide internet connectivity to its customers. Which configuration must the administrator perform to establish an iBGP session between routers PE1 on POP site 1 and PE2 on POP site 2?

Options:

A.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#no neighbor 172.18.10.1 shutdown

PE2(config-router)#end

B.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#no neighbor 172.19.10.10 shutdown

PE1(config-router)#end

C.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#address-family ipv4 unicast

PE1(config-router-af)#neighbor 172.19.10.10 activate

PE1(config-router-af)#end

D.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#address-family ipv4 unicast

PE2(config-router-af)#neighbor 172.18.10.1 activate

PE2(config-router-af)#end

Question 126

Question # 126

Refer to the exhibit. In the service provider network, routers PE1, PE2, and PE4 have access to the internet and provide access to customer networks. Router PE3 is used for access to other customer systems. In accordance with a new SLA, an engineer is updating settings on this network so that router CE1 accesses the internet via PE1 instead of PE2. Which two tasks must the engineer perform to complete the process? (Choose two.)

Options:

A.

On PE1, configure the internet VRF with import route target 102:102.

B.

On PE1 and PE4, configure the internet VRF with import route targets 102:102 and 104:104.

C.

On PE2, configure the internet VRF with import route target 102:102.

D.

On PE2 and PE3, configure the internet VRF with import route target 101:101.

E.

On PE2, configure the CE1 VRF with import route target 101:101.

Question 127

What is a constraint of Cisco MPLS TE tunnel configurations?

Options:

A.

Tunnels cannot span multiple OSPF areas.

B.

With ISIS as an IGP. only older-style metrics are used.

C.

Tunnels cannot be configured over IP unnumbered links.

D.

QoS-aware tunneling is not supported.

Question 128

What is a characteristics of the Pipe model for MPLS QoS?

Options:

A.

The same QoS policy is applied to all customer traffic on the egress PE.

B.

If the outer EXP is changed, it is copied to the DSCP value.

C.

The MPLS EXP bits are set by the CE.

D.

The DSCP value determines how the packet is forwarded

Question 129

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.

After you issue this command, which BGP packets does the PE accept?

Options:

A.

from 2.2.2.2, with a TTL ol 253 Of more

B.

from 2.2.2.2, with a TTL of less than 2

C.

to 2.2.2.2, with a TTL of less than 253

D.

to 2.2.2.2, with a TTL of 2 or more

Question 130

Refer to the exhibit:

Question # 130

Which statement about the status of the neighbor relationship between R1 and R2 is true?

Options:

A.

The neighbor relationship is down because the two routers are configured with different area types

B.

The neighbor relationship is down because the two routers are in the same subnet.

C.

The neighbor relationship is up because R2 is level 1 and level 2 router.

D.

The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different area

Question 131

Refer to the exhibit:

Question # 131

R1 is connected to two service providers and is under a DDoS attack Which statement about this design is true if uRPF in strict mode is configured on both interfaces'?

Options:

A.

R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses

B.

R1 permits asymmetric routing as long as the AS-RATH attribute entry matches the connected AS

C.

R1 drops destination addresses that are routed to a null interface on the router

D.

R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface

Question 132

Refer to the exhibit:

Question # 132

Which two statements about the ISIS topology are true? (Choose two.)

Options:

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

All four routers are operating as Level 1-2 routers.

D.

R1 and R2 are Level 2 neighbors.

E.

R1 and R4 are Level 2 neighbors

Question 133

Refer to the exhibit.

Question # 133

Which type of DDoS attack will be mitigated by this configuration?

Options:

A.

SYN flood

B.

smurf attack

C.

SIP INVITE flood attacks

D.

teardrop attack

Question 134

BGP has been implemented on a IOS XR router. Which configuration sends BGP IPv4 labels to build inter-domain LSPs?

Options:

A.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community extended

B.

router bgp 65515 no bgp default ipv4-unicast

C.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community

D.

router bgp 65515 neighbor 172.16.70.23 address-family ipv4 labeled-unicast

Question 135

Which function does RSVP perform in a Cisco MPLS TE environment?

Options:

A.

It establishes targeted LDP sessions between neighbors that are directly connected.

B.

It signals to LDP protocol along the path that a Cisco MPLS TE will be configured.

C.

It reserves bandwidth for LDP sessions between routers participating in a Cisco MPLS TE.

D.

It reserves the bandwidth along the path between the head-end and tail-end router.

Page: 1 / 45
Total 452 questions