ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

Answers
B.

Router 1 is the trigger router in a RTBH implementation.

B.

Router 1 is the trigger router in a RTBH implementation.

Answers
C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

Answers
D.

Router 2 is the router receiving the DDoS attack

D.

Router 2 is the router receiving the DDoS attack

Answers
Suggested answer: B

Refer to the exhibits:

R1 and R2 are directly connected and IS-IS routing has been enabled between R1 and R2 R1 message periodically Based on this output, which statement is true?

A.

IS-IS neighbor authentication is failing for Level 2 first and then for Level 1 PDUs

A.

IS-IS neighbor authentication is failing for Level 2 first and then for Level 1 PDUs

Answers
B.

1S-1S neighbor authentication is failing for Level 1 and Level 2 PDUs .

B.

1S-1S neighbor authentication is failing for Level 1 and Level 2 PDUs .

Answers
C.

IS-IS neighbor authentication is failing for Level 1 PDUs only

C.

IS-IS neighbor authentication is failing for Level 1 PDUs only

Answers
D.

IS-IS neighbor authentication is failing for Level 2 PDUs only.

D.

IS-IS neighbor authentication is failing for Level 2 PDUs only.

Answers
Suggested answer: C

Which BGP attribute is used first when determining the best path?

A.

origin

A.

origin

Answers
B.

AS path

B.

AS path

Answers
C.

local preference

C.

local preference

Answers
D.

weight

D.

weight

Answers
Suggested answer: D

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.

After you issue this command, which BGP packets does the PE accept?

A.

from 2.2.2.2, with a TTL ol 253 Of more

A.

from 2.2.2.2, with a TTL ol 253 Of more

Answers
B.

from 2.2.2.2, with a TTL of less than 2

B.

from 2.2.2.2, with a TTL of less than 2

Answers
C.

to 2.2.2.2, with a TTL of less than 253

C.

to 2.2.2.2, with a TTL of less than 253

Answers
D.

to 2.2.2.2, with a TTL of 2 or more

D.

to 2.2.2.2, with a TTL of 2 or more

Answers
Suggested answer: A

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

A.

It is used to set up configuration to poll network data

A.

It is used to set up configuration to poll network data

Answers
B.

It is used to enable gRPC

B.

It is used to enable gRPC

Answers
C.

It is used to create a streaming subscription with a 60-second interval

C.

It is used to create a streaming subscription with a 60-second interval

Answers
D.

It is used to create a streaming subscription with a 600-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Answers
Suggested answer: C

What do Ansible and Salt Stack have in common?

A.

They both use DSL configuration language

A.

They both use DSL configuration language

Answers
B.

They both use YAML configuration language

B.

They both use YAML configuration language

Answers
C.

They both have agents running on the client machine

C.

They both have agents running on the client machine

Answers
D.

They both can be designed with more than one master server

D.

They both can be designed with more than one master server

Answers
Suggested answer: D

Refer to the exhibit:

What is the effect of this configuration?

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

Answers
B.

The two routers successfully form a neighbor relationship

B.

The two routers successfully form a neighbor relationship

Answers
C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

Answers
D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Answers
Suggested answer: D

Refer to the exhibit:

What does this value mean when it is received in XML?

A.

It shows the ending of the script

A.

It shows the ending of the script

Answers
B.

It indicates a break in a sequence

B.

It indicates a break in a sequence

Answers
C.

It indicates a value assigned by a network administrator to tag a route

C.

It indicates a value assigned by a network administrator to tag a route

Answers
D.

It means a data field is blank

D.

It means a data field is blank

Answers
Suggested answer: D

Refer to the exhibit:

Which effect of this configuration is true?

A.

it creates a pseudowire class named Cisco

A.

it creates a pseudowire class named Cisco

Answers
B.

It enables tagging for VLAN 12 on the interface

B.

It enables tagging for VLAN 12 on the interface

Answers
C.

It enables MPLS on the interface

C.

It enables MPLS on the interface

Answers
D.

It enables AToM on interface gigabitethemet1/0

D.

It enables AToM on interface gigabitethemet1/0

Answers
Suggested answer: D

Refer to the exhibit:

Which command is used to complete this configuration for QoS class-based marking?

A.

PE-A(config-pmap-c)#set dscp ef

A.

PE-A(config-pmap-c)#set dscp ef

Answers
B.

PE-A(config-pmap-c)#fair-queue

B.

PE-A(config-pmap-c)#fair-queue

Answers
C.

PE-A(config-pmap-c)#random-detect

C.

PE-A(config-pmap-c)#random-detect

Answers
D.

PE-A(config -pmap-c)#priority

D.

PE-A(config -pmap-c)#priority

Answers
Suggested answer: A
Total 448 questions
Go to page: of 45