ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?

A.

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

A.

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

Answers
B.

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

B.

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

Answers
C.

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

C.

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

Answers
D.

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

D.

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLANbased to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

A.

LSP lifetime maximum

A.

LSP lifetime maximum

Answers
B.

advertise-passive-only

B.

advertise-passive-only

Answers
C.

overload bit passive

C.

overload bit passive

Answers
D.

attached bit on ISIS instance

D.

attached bit on ISIS instance

Answers
E.

passive-interface Loopback0

E.

passive-interface Loopback0

Answers
Suggested answer: A, D

What is a characteristic of data modeling language?

A.

It provides an interface for state data.

A.

It provides an interface for state data.

Answers
B.

It separates configuration and state data.

B.

It separates configuration and state data.

Answers
C.

It ensures devices are individually configured.

C.

It ensures devices are individually configured.

Answers
D.

It replaces SNMP.

D.

It replaces SNMP.

Answers
Suggested answer: B

Which function does RSVP perform in a Cisco MPLS TE environment?

A.

It establishes targeted LDP sessions between neighbors that are directly connected.

A.

It establishes targeted LDP sessions between neighbors that are directly connected.

Answers
B.

It signals to LDP protocol along the path that a Cisco MPLS TE will be configured.

B.

It signals to LDP protocol along the path that a Cisco MPLS TE will be configured.

Answers
C.

It reserves bandwidth for LDP sessions between routers participating in a Cisco MPLS TE.

C.

It reserves bandwidth for LDP sessions between routers participating in a Cisco MPLS TE.

Answers
D.

It reserves the bandwidth along the path between the head-end and tail-end router.

D.

It reserves the bandwidth along the path between the head-end and tail-end router.

Answers
Suggested answer: D

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

Answers
B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Answers
C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

Answers
D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Answers
Suggested answer: A

Which type of attack is an application attack?

A.

ping of death

A.

ping of death

Answers
B.

ICMP (ping) flood

B.

ICMP (ping) flood

Answers
C.

HTTP flood

C.

HTTP flood

Answers
D.

SYN flood

D.

SYN flood

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. A network engineer observed congestion between routers R1 and R4, which are connected on a point-to-point link. Two servers that reside on networks on R1 and R4 generate heavy traffic between them with most traffic going from R4 to R1. To improve overall performance, the engineer wants to drop inbound packets that exceed a configured threshold, without disrupting traffic that passes from R4 to R3. Which action must the engineer take to resolve the issue?

A.

Implement traffic policing to drop packets that exceed the given threshold.

A.

Implement traffic policing to drop packets that exceed the given threshold.

Answers
B.

Implement FIFO to queue excess traffic for transmission when bandwidth is available.

B.

Implement FIFO to queue excess traffic for transmission when bandwidth is available.

Answers
C.

Implement traffic shaping to drop excess packets.

C.

Implement traffic shaping to drop excess packets.

Answers
D.

Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.

D.

Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit A user is performing QoS marking on internet traffic and sending it with IPv4 and IPv6 headers on the provider edge device PE1. IPv4 traffic is classified with DSCP 4 and IPv6 traffic is classified with DSCP 6. Which action must the engineer take to begin implementing a QoS configuration on PE1 for the IPv6 traffic?

A.

Create an access list that includes any IPv6 traffic and apply it to CM-20.

A.

Create an access list that includes any IPv6 traffic and apply it to CM-20.

Answers
B.

Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM- 10 and CM-20.

B.

Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM- 10 and CM-20.

Answers
C.

Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.

C.

Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.

Answers
D.

Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.

D.

Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit. EIGRP is running between routers R5 and R1, and OSPF is used in the rest of the network. Users in a network attached to router R3 need to access a server connected to R5. Which task must the engineer perform so that only the users attached to R3 are able to access the server, but no other network is shared to OSPF?

A.

Configure redistribution using route maps to filter the routes that are shared

A.

Configure redistribution using route maps to filter the routes that are shared

Answers
B.

Configure redistribution using an offset list to filter the routes that are shared.

B.

Configure redistribution using an offset list to filter the routes that are shared.

Answers
C.

Configure an OSPF virtual link between R1 and R3 to route traffic between the two areas.

C.

Configure an OSPF virtual link between R1 and R3 to route traffic between the two areas.

Answers
D.

Configure R1 as a stub router for EIGRP and OSPF so that only the default route is shared

D.

Configure R1 as a stub router for EIGRP and OSPF so that only the default route is shared

Answers
Suggested answer: A

While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?

A.

Configure the device to pass only O and E2 routes through it.

A.

Configure the device to pass only O and E2 routes through it.

Answers
B.

Configure the synchronization keyword in the global BGP configuration.

B.

Configure the synchronization keyword in the global BGP configuration.

Answers
C.

Configure the keyword nssa in the redistribution entry.

C.

Configure the keyword nssa in the redistribution entry.

Answers
D.

Configure the keywords internal and external in the redistribution entry.

D.

Configure the keywords internal and external in the redistribution entry.

Answers
Suggested answer: D
Total 448 questions
Go to page: of 45