ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

Answers
B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

Answers
C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

Answers
D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service provider core network with these requirements:

R1 must establish LDP peering with the loopback IP address as its Router-ID.

Session protection must be enabled on R2.

How must the team update the network configuration to successfully enable LDP peering between R1 and R2?

A.

Change the LDP password on R2 to Cisco.

A.

Change the LDP password on R2 to Cisco.

Answers
B.

Configure mpls ldp router-id loopback0 on R1 and R2.

B.

Configure mpls ldp router-id loopback0 on R1 and R2.

Answers
C.

Configure LDP session protection on R1.

C.

Configure LDP session protection on R1.

Answers
D.

Change the discover hello hold time and interval to their default values.

D.

Change the discover hello hold time and interval to their default values.

Answers
Suggested answer: B

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Answers
B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

Answers
C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

Answers
D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Answers
Suggested answer: D

What is the role of NSO?

A.

Provides public cloud services for customers that need Internet access.

A.

Provides public cloud services for customers that need Internet access.

Answers
B.

Controls the turn-up of a device.

B.

Controls the turn-up of a device.

Answers
C.

Provides network monitoring services for Layer 3 devices.

C.

Provides network monitoring services for Layer 3 devices.

Answers
D.

Maintains data storage.

D.

Maintains data storage.

Answers
Suggested answer: B

An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?

A.

vrf upgrade-cli

A.

vrf upgrade-cli

Answers
B.

bgp upgrade-cli

B.

bgp upgrade-cli

Answers
C.

address-family ipv4

C.

address-family ipv4

Answers
D.

ip bgp-community new-format

D.

ip bgp-community new-format

Answers
Suggested answer: B

What is the role of NFVI?

A.

domain name service

A.

domain name service

Answers
B.

intrusion detection

B.

intrusion detection

Answers
C.

monitor

C.

monitor

Answers
D.

network address translation

D.

network address translation

Answers
Suggested answer: C

A network engineer is implementing NetFlow to observe traffic patterns on the network. The engineer is planning to review the patterns to help plan future strategies for monitoring and preventing congestion as the network grows. If the captures must include BGP next-hop flows, which configuration must the engineer apply to the router?

A.

ip cef

ip flow-export version 5 bgp-nexthop

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow egress

A.

ip cef

ip flow-export version 5 bgp-nexthop

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow egress

Answers
B.

ip cef

ip flow-export version 9 bgp-nexthop

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

B.

ip cef

ip flow-export version 9 bgp-nexthop

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

Answers
C.

ip cef

ip flow-export version 5

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow ingress

cdp enable

C.

ip cef

ip flow-export version 5

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow ingress

cdp enable

Answers
D.

no ip cef

ip flow-export version 9

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

ip flow egress

D.

no ip cef

ip flow-export version 9

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

ip flow egress

Answers
Suggested answer: B

Refer to the exhibit.

Refer to the exhibit. Users in AS 65010 are connected with the application server in AS 65050 with these requirements:

AS 65010 users are experiencing latency and congestion to connect with application server 172.16.50.10.

AS 65030 must be restricted to become Transient Autonomous System for traffic flow.

Links connected to AS 65020 and AS 65040 are underutilized and must be used efficiently for traffic.

Which two configurations must be implemented to meet these requirements? (Choose two.)

A.

Apply the AS-Path route-map policy for traffic received from R3.

A.

Apply the AS-Path route-map policy for traffic received from R3.

Answers
B.

Configure the route map to prepend the AS-Path attribute for R5-R3 BGP peering.

B.

Configure the route map to prepend the AS-Path attribute for R5-R3 BGP peering.

Answers
C.

Apply the MED route-map policy for traffic received from R4.

C.

Apply the MED route-map policy for traffic received from R4.

Answers
D.

Configure a higher Local preference for R5-R4 BGP peering.

D.

Configure a higher Local preference for R5-R4 BGP peering.

Answers
E.

Configure the route map to set the MED 50 attribute for R5-R4 BGP peering.

E.

Configure the route map to set the MED 50 attribute for R5-R4 BGP peering.

Answers
Suggested answer: A, C

What is a characteristic of MVPN?

A.

It bypasses the use of MPLS in the service provider core and transmits packets using IP only.

A.

It bypasses the use of MPLS in the service provider core and transmits packets using IP only.

Answers
B.

It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP core.

B.

It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP core.

Answers
C.

It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.

C.

It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.

Answers
D.

It creates GRE tunnels to route multicast traffic over a service provider IP core.

D.

It creates GRE tunnels to route multicast traffic over a service provider IP core.

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. What is the purpose of this JSON script?

A.

It changes the existing password.

A.

It changes the existing password.

Answers
B.

It updates a user authentication record.

B.

It updates a user authentication record.

Answers
C.

It deletes a user’s authentication record.

C.

It deletes a user’s authentication record.

Answers
D.

It confirms a user’s login credentials.

D.

It confirms a user’s login credentials.

Answers
Suggested answer: A
Total 448 questions
Go to page: of 45