Cisco 350-501 Practice Test - Questions Answers, Page 29
List of questions
Related questions
Refer to the exhibit.
Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:
Routers R1A and R1B are eBGP neighbors.
iBGP is configured within AS 65515 and AS 65516.
Network 192.168.2.0/24 is shared with AS 65516.
Router R3A has an iBGP relationship with router R2A only.
Router R2A has an iBGP relationship with routers R1A and R3A.
Which additional task must the engineer perform to complete the configuration?
Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.
Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.
Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.
Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.
Refer to the exhibit.
Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service provider core network with these requirements:
R1 must establish LDP peering with the loopback IP address as its Router-ID.
Session protection must be enabled on R2.
How must the team update the network configuration to successfully enable LDP peering between R1 and R2?
Change the LDP password on R2 to Cisco.
Configure mpls ldp router-id loopback0 on R1 and R2.
Configure LDP session protection on R1.
Change the discover hello hold time and interval to their default values.
A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:
NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.
CLI SSH access is permitted from any source.
Which configuration must the engineer apply on R1?
configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 1
access-list 1 permit 172.16.20.0 0.0.0.255
netconf ssh acl 1
line vty 0 4
transport input ssh
end
configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 2
access-list 1 permit 172.16.20.0 0.0.0.255
access-list 1 permit any
netconf ssh
line vty 0 4
access-class 1 in
transport input ssh
end
configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 1
access-list 1 permit 172.16.20.0 0.0.0.255
access-list 2 permit any
netconf ssh
line vty 0 4
access-class 2 in
transport input ssh
end
configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 2
access-list 1 permit 172.16.20.0 0.0.0.255
netconf ssh acl 1
line vty 0 4
transport input ssh
end
What is the role of NSO?
Provides public cloud services for customers that need Internet access.
Controls the turn-up of a device.
Provides network monitoring services for Layer 3 devices.
Maintains data storage.
An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?
vrf upgrade-cli
bgp upgrade-cli
address-family ipv4
ip bgp-community new-format
What is the role of NFVI?
domain name service
intrusion detection
monitor
network address translation
A network engineer is implementing NetFlow to observe traffic patterns on the network. The engineer is planning to review the patterns to help plan future strategies for monitoring and preventing congestion as the network grows. If the captures must include BGP next-hop flows, which configuration must the engineer apply to the router?
ip cef
ip flow-export version 5 bgp-nexthop
ip flow-export destination 192.168.1.1 9995
interface gigabitethernet 1/0/1
ip flow egress
ip cef
ip flow-export version 9 bgp-nexthop
ip flow-export destination 192.168.1.1 9996
interface gigabitethernet 1/0/1
ip flow ingress
ip cef
ip flow-export version 5
ip flow-export destination 192.168.1.1 9995
interface gigabitethernet 1/0/1
ip flow ingress
cdp enable
no ip cef
ip flow-export version 9
ip flow-export destination 192.168.1.1 9996
interface gigabitethernet 1/0/1
ip flow ingress
ip flow egress
Refer to the exhibit.
Refer to the exhibit. Users in AS 65010 are connected with the application server in AS 65050 with these requirements:
AS 65010 users are experiencing latency and congestion to connect with application server 172.16.50.10.
AS 65030 must be restricted to become Transient Autonomous System for traffic flow.
Links connected to AS 65020 and AS 65040 are underutilized and must be used efficiently for traffic.
Which two configurations must be implemented to meet these requirements? (Choose two.)
Apply the AS-Path route-map policy for traffic received from R3.
Configure the route map to prepend the AS-Path attribute for R5-R3 BGP peering.
Apply the MED route-map policy for traffic received from R4.
Configure a higher Local preference for R5-R4 BGP peering.
Configure the route map to set the MED 50 attribute for R5-R4 BGP peering.
What is a characteristic of MVPN?
It bypasses the use of MPLS in the service provider core and transmits packets using IP only.
It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP core.
It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.
It creates GRE tunnels to route multicast traffic over a service provider IP core.
Refer to the exhibit.
Refer to the exhibit. What is the purpose of this JSON script?
It changes the existing password.
It updates a user authentication record.
It deletes a user’s authentication record.
It confirms a user’s login credentials.
Question