ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











A network engineer is configuring Flexible NetFlow and enters these commands

What are two results of implementing this feature instead of traditional NetFlow? (Choose two.)

A.

CPU and memory utilization are reduced.

A.

CPU and memory utilization are reduced.

Answers
B.

Only the flows of top 100 talkers are exported.

B.

Only the flows of top 100 talkers are exported.

Answers
C.

The data export flow is more secure

C.

The data export flow is more secure

Answers
D.

The number of packets to be analyzed are reduced.

D.

The number of packets to be analyzed are reduced.

Answers
E.

The accuracy of the data to be analyzed is improved.

E.

The accuracy of the data to be analyzed is improved.

Answers
Suggested answer: A, D

Refer to the exhibit.

Which the link aggregation configuration router is running on Cisco IOS XR software, which LACP interface configuration is needed to add the interface to the bundle?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Which type of attack is a Protocol attack?

A.

HTTP flood

A.

HTTP flood

Answers
B.

TFTP flood

B.

TFTP flood

Answers
C.

SYN flood

C.

SYN flood

Answers
D.

Slowlorls

D.

Slowlorls

Answers
Suggested answer: C

Explanation:

Protocol Attacks

Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources,

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone?

(Choose two.)

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

Answers
B.

Internet routing through global routing on a PE router.

B.

Internet routing through global routing on a PE router.

Answers
C.

Internet access routing as another VPN in the ISP network.

C.

Internet access routing as another VPN in the ISP network.

Answers
D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

Answers
E.

Internet access for global routing via a separate interface in a VRF

E.

Internet access for global routing via a separate interface in a VRF

Answers
Suggested answer: C, E

Explanation:

http://etutorials.org/Networking/MPLS+VPN+security/Part+II+Advanced+MPLS+VPN+Security+Issue s/Chapter+4.+Secure+MPLS+VPN+Designs/Internet+Access/

Refer to the exhibit.

To protect in-band management access to CPE-R7, an engineer wants to allow only SSH management and provisioning traffic from management network 192.168.0.0/16. Which infrastructure ACL change must be applied to router PE-R9 to complete this task?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

An engineer implemented LDP protocol on the ISP network. The engineer must ensure that there are no packet loss issues when IGP and LDP protocols are not synchronized. Which configuring must the engineer implement so that the IGP routing protocol will wait until LDP convergence is completed?

A.

Disable IP CEF routers running LDP and enable LDP protocol.

A.

Disable IP CEF routers running LDP and enable LDP protocol.

Answers
B.

Configure MPLS LDP IGP synchronization on the network.

B.

Configure MPLS LDP IGP synchronization on the network.

Answers
C.

Configure LDP sessions protection on the network.

C.

Configure LDP sessions protection on the network.

Answers
D.

Disable MPLS LDP IGP synchronization on the network.

D.

Disable MPLS LDP IGP synchronization on the network.

Answers
Suggested answer: B

What is the function of the FEC field within the OTN signal structure?

A.

It allows the sending devices to apply QoS within the OTN forwarding structure.

A.

It allows the sending devices to apply QoS within the OTN forwarding structure.

Answers
B.

It allows source nodes to discard payload errors before transmitting data on the network.

B.

It allows source nodes to discard payload errors before transmitting data on the network.

Answers
C.

It allows receivers to correct errors upon data arrival.

C.

It allows receivers to correct errors upon data arrival.

Answers
D.

It allows deep inspection of data payload fields.

D.

It allows deep inspection of data payload fields.

Answers
Suggested answer: C

Which two routing protocols support Cisco MPLS TE tunnels? (Choose two.)

A.

IS-IS

A.

IS-IS

Answers
B.

RIP

B.

RIP

Answers
C.

BGP

C.

BGP

Answers
D.

OSPF

D.

OSPF

Answers
E.

EIGRP

E.

EIGRP

Answers
Suggested answer: A, D

Which protocol is used for communication between the PCE and PCC?

A.

ICMP

A.

ICMP

Answers
B.

PCEP

B.

PCEP

Answers
C.

CEF

C.

CEF

Answers
D.

POP

D.

POP

Answers
Suggested answer: B

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
E.

Option A

E.

Option A

Answers
F.

Option B

F.

Option B

Answers
G.

Option C

G.

Option C

Answers
H.

Option D

H.

Option D

Answers
Suggested answer: A
Total 448 questions
Go to page: of 45