ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions











Refer to the exhibit:

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

A.

LDP needs to be enabled on the R2 physical interface

A.

LDP needs to be enabled on the R2 physical interface

Answers
B.

R2 does not see any hellos from R1

B.

R2 does not see any hellos from R1

Answers
C.

LDP needs to be enabled on the R2 loopback interface

C.

LDP needs to be enabled on the R2 loopback interface

Answers
D.

R2 sees the wrong type of hellos from R1

D.

R2 sees the wrong type of hellos from R1

Answers
Suggested answer: A

What are the two uses of the YANG data modeling language? (Choose two.)

A.

It is used to access a device by HTTP.

A.

It is used to access a device by HTTP.

Answers
B.

It Is used to model the configuration used by NETCONF operations.

B.

It Is used to model the configuration used by NETCONF operations.

Answers
C.

It is used to shape state data of network elements.

C.

It is used to shape state data of network elements.

Answers
D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

Answers
E.

It is used to replace the OSI model for troubleshooting.

E.

It is used to replace the OSI model for troubleshooting.

Answers
Suggested answer: B, C

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

Answers
B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

Answers
C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

Answers
D.

Static routes on CE routers allow route leakage from a PE global routing table

D.

Static routes on CE routers allow route leakage from a PE global routing table

Answers
Suggested answer: C

How can a network administrator secure rest APIs?

A.

They can allow read and write privileges to all users

A.

They can allow read and write privileges to all users

Answers
B.

They can ensure that user sessions are authenticated using TACACS+ only

B.

They can ensure that user sessions are authenticated using TACACS+ only

Answers
C.

They can have a general administrator login for multiple users to access that has command entries logged

C.

They can have a general administrator login for multiple users to access that has command entries logged

Answers
D.

They can authenticate user sessions and provide the appropriate privilege level

D.

They can authenticate user sessions and provide the appropriate privilege level

Answers
Suggested answer: D

Refer to the exhibit.

A network engineer is configuring customer edge routers to finalize a L2VPN over MPLS deployment Assume that the AToM L2VPN service that connects the two CEs is configured correctly on the service provider network Which action causes the solution to fail?

A.

A loopback with a /32 IP address has not been used

A.

A loopback with a /32 IP address has not been used

Answers
B.

OSPF does not work with L2VPN services

B.

OSPF does not work with L2VPN services

Answers
C.

The xconnect statement has not been defined

C.

The xconnect statement has not been defined

Answers
D.

The routing protocol network types are not compatible

D.

The routing protocol network types are not compatible

Answers
Suggested answer: D

Refer to the exhibit:

Which configuration prevents the OSPF neighbor from establishing?

A.

mtu

A.

mtu

Answers
B.

duplex

B.

duplex

Answers
C.

network statement

C.

network statement

Answers
D.

default-metric

D.

default-metric

Answers
Suggested answer: A

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services For which reason do you make this decision?

A.

It enables you to choose whether to separate or centralize each individual service.

A.

It enables you to choose whether to separate or centralize each individual service.

Answers
B.

It is easier to manage a system in which services are mixed

B.

It is easier to manage a system in which services are mixed

Answers
C.

It requires only one edge router

C.

It requires only one edge router

Answers
D.

It enables EGP and IGP to operate independently

D.

It enables EGP and IGP to operate independently

Answers
Suggested answer: A

Which configuration modifies Local Packet Transport Services hardware policies?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Which two IS-IS parameters must match before two Level 2 peers can form an adjacency? (Choose two)

A.

authentication settings

A.

authentication settings

Answers
B.

area ID

B.

area ID

Answers
C.

system ID

C.

system ID

Answers
D.

MTU

D.

MTU

Answers
E.

hello timer setting

E.

hello timer setting

Answers
Suggested answer: A, D

Which three OSPF parameters must match before two devices can establish an OSPF adjacency?

(Choose three.)

A.

IP address

A.

IP address

Answers
B.

interface cost

B.

interface cost

Answers
C.

subnet mask

C.

subnet mask

Answers
D.

process ID

D.

process ID

Answers
E.

hello timer setting

E.

hello timer setting

Answers
F.

area number

F.

area number

Answers
Suggested answer: C, E, F
Total 448 questions
Go to page: of 45