Cisco 350-501 Practice Test - Questions Answers, Page 32
List of questions
Related questions
How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?
The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.
The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.
The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.
The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.
Refer to the exhibit.
Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLANbased to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:
Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.
The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.
The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.
Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)
LSP lifetime maximum
advertise-passive-only
overload bit passive
attached bit on ISIS instance
passive-interface Loopback0
What is a characteristic of data modeling language?
It provides an interface for state data.
It separates configuration and state data.
It ensures devices are individually configured.
It replaces SNMP.
Which function does RSVP perform in a Cisco MPLS TE environment?
It establishes targeted LDP sessions between neighbors that are directly connected.
It signals to LDP protocol along the path that a Cisco MPLS TE will be configured.
It reserves bandwidth for LDP sessions between routers participating in a Cisco MPLS TE.
It reserves the bandwidth along the path between the head-end and tail-end router.
A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?
router(config)# interface gigabitethernet0/1
router(config-if)# ip address 192.168.200.1 255.255.255.0
router(config-if)# ip verify unicast source reachable-via any
router(config-if)# ipv6 address 2001:DB8:1::1/96
router(config-if)# ipv6 verify unicast source reachable-via any
router(config)# interface gigabitethernet0/1
router(config-if)# ip address 192.168.200.1 255.255.255.0
router(config-if)# ip verify unicast source reachable-via rx
router(config-if)# ipv6 address 2001:DB8:1::1/96
router(config-if)# ipv6 verify unicast source reachable-via rx
router(config)# interface gigabitethernet0/1
router(config if)# ip address 192.168.200.1 255.255.255.0
router(config-if)# ip verify unicast source reachable-via rx
router(config-if)# ipv6 address 2001:DB8:1::1/96
router(config-if)# ipv6 verify unicast source reachable-via any
router(config)# interface gigabitethernet0/1
router(config-if)# ip address 192.168.200.1 255.255.255.0
router(config-if)# ip verify unicast source reachable-via any
router(config-if)# ipv6 address 2001:DB8:1::1/96
router(config-if)# ipv6 verify unicast source reachable-via rx
Which type of attack is an application attack?
ping of death
ICMP (ping) flood
HTTP flood
SYN flood
Refer to the exhibit.
Refer to the exhibit. A network engineer observed congestion between routers R1 and R4, which are connected on a point-to-point link. Two servers that reside on networks on R1 and R4 generate heavy traffic between them with most traffic going from R4 to R1. To improve overall performance, the engineer wants to drop inbound packets that exceed a configured threshold, without disrupting traffic that passes from R4 to R3. Which action must the engineer take to resolve the issue?
Implement traffic policing to drop packets that exceed the given threshold.
Implement FIFO to queue excess traffic for transmission when bandwidth is available.
Implement traffic shaping to drop excess packets.
Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.
Refer to the exhibit.
Refer to the exhibit A user is performing QoS marking on internet traffic and sending it with IPv4 and IPv6 headers on the provider edge device PE1. IPv4 traffic is classified with DSCP 4 and IPv6 traffic is classified with DSCP 6. Which action must the engineer take to begin implementing a QoS configuration on PE1 for the IPv6 traffic?
Create an access list that includes any IPv6 traffic and apply it to CM-20.
Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM- 10 and CM-20.
Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.
Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.
Refer to the exhibit.
Refer to the exhibit. EIGRP is running between routers R5 and R1, and OSPF is used in the rest of the network. Users in a network attached to router R3 need to access a server connected to R5. Which task must the engineer perform so that only the users attached to R3 are able to access the server, but no other network is shared to OSPF?
Configure redistribution using route maps to filter the routes that are shared
Configure redistribution using an offset list to filter the routes that are shared.
Configure an OSPF virtual link between R1 and R3 to route traffic between the two areas.
Configure R1 as a stub router for EIGRP and OSPF so that only the default route is shared
While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?
Configure the device to pass only O and E2 routes through it.
Configure the synchronization keyword in the global BGP configuration.
Configure the keyword nssa in the redistribution entry.
Configure the keywords internal and external in the redistribution entry.
Question