ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











A company is expanding its existing office space to a new floor of the building, and the networking team is installing a new set of switches. The new switches are running IGMPv2, and the engineers configured them for VLAN10 only. The rest of the existing network includes numerous Layer 2 switches in multiple other VLANs, all running IGMPv3. Which additional task must the team perform when deploying the new switches so that traffic is switched correctly through the entire network?

A.

Configure the new switches to use IGMPv3 on all VLANs on the network.

A.

Configure the new switches to use IGMPv3 on all VLANs on the network.

Answers
B.

Configure all switches on the network to support IGMPv2 and IGMPv3 on all VLANs on the network.

B.

Configure all switches on the network to support IGMPv2 and IGMPv3 on all VLANs on the network.

Answers
C.

Configure the new switches to use IGMPv3 on VLAN10 only.

C.

Configure the new switches to use IGMPv3 on VLAN10 only.

Answers
D.

Configure all switches on the network to support IGMPv2 and IGMPv3 on VLAN10 only.

D.

Configure all switches on the network to support IGMPv2 and IGMPv3 on VLAN10 only.

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. LDP peering between routers R1 and R2 is dropped when the link between R1 and R2 is taken offline. However, LDP peering between R2 and R3 stays up when the link between R2 and R3 is taken offline. Which action allows MPLS traffic forwarding to continue normally if the link between R1 and R2 goes down?

A.

Enable IGP and LDP Synchronization on R1.

A.

Enable IGP and LDP Synchronization on R1.

Answers
B.

Implement LDP Session Protection on R1.

B.

Implement LDP Session Protection on R1.

Answers
C.

Enable IGP and LDP Synchronization on R2.

C.

Enable IGP and LDP Synchronization on R2.

Answers
D.

Implement LDP Session Protection on R2.

D.

Implement LDP Session Protection on R2.

Answers
Suggested answer: B

Refer to the exhibit.

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

A.

Disable the MPLS LDP IGP sync holddown.

A.

Disable the MPLS LDP IGP sync holddown.

Answers
B.

Configure OSPF or IS-IS as the routing protocol.

B.

Configure OSPF or IS-IS as the routing protocol.

Answers
C.

Configure EIGRP as the routing protocol using stub areas only.

C.

Configure EIGRP as the routing protocol using stub areas only.

Answers
D.

Enable MPLS LDP sync delay timers.

D.

Enable MPLS LDP sync delay timers.

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit. Tier 2 ISP A on AS 653 is connected to two Tier 1 ISPs on AS 321 and AS 51 respectively. The network architect at ISP A is planning traffic flow inside the network to provide predictable network services. Cisco Express

Forwarding is disabled on the edge router. How should the architect implement BGP to direct all traffic via the Tier 1 ISP with next-hop 7.4.5.2?

A.

Implement the BGP routing protocol and run the bgp deterministic-med command.

A.

Implement the BGP routing protocol and run the bgp deterministic-med command.

Answers
B.

Implement MP-BGP with a 4-byte AS number with the bgp best path compare-routerid command.

B.

Implement MP-BGP with a 4-byte AS number with the bgp best path compare-routerid command.

Answers
C.

Implement the BGP routing protocol and the maximum-paths 2 configuration.

C.

Implement the BGP routing protocol and the maximum-paths 2 configuration.

Answers
D.

Implement BGP route-reflector functionality with the bgp always-compare-med configuration.

D.

Implement BGP route-reflector functionality with the bgp always-compare-med configuration.

Answers
Suggested answer: A

Which two features describe TI-LFA? (Choose two.)

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

Answers
B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

Answers
C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

Answers
D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

Answers
E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Answers
Suggested answer: D, E

How does SR policy operate in Segment Routing Traffic Engineering?

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

Answers
B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the

router drops all traffic that is steered into the SR policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the

router drops all traffic that is steered into the SR policy.

Answers
C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMPbased according to the qualified cost of each SID-list.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMPbased according to the qualified cost of each SID-list.

Answers
D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Answers
Suggested answer: D

Refer to the exhibit.

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

A.

Change the helper-address value to 192.168.10.2 on RC.

A.

Change the helper-address value to 192.168.10.2 on RC.

Answers
B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

Answers
C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

Answers
D.

Enable ip pim passive on RB interface Ge0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Answers
Suggested answer: D

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

A.

It remarks all values to a CoS of 0.

A.

It remarks all values to a CoS of 0.

Answers
B.

It forwards only traffic with a DSCP value of 48.

B.

It forwards only traffic with a DSCP value of 48.

Answers
C.

It translates the IP precedence value to the corresponding DSCP value.

C.

It translates the IP precedence value to the corresponding DSCP value.

Answers
D.

It drops all traffic ingressing the network.

D.

It drops all traffic ingressing the network.

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

A.

Configure the FLOW-MONITOR-20 command.

A.

Configure the FLOW-MONITOR-20 command.

Answers
B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

Answers
C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

Answers
D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Answers
Suggested answer: C

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

Answers
B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

Answers
C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

Answers
D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Answers
Suggested answer: B
Total 448 questions
Go to page: of 45