ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Related questions











Which action occurs during the traceback phase of the six-phase approach to service provider security?

A.

Trace action occur flows from the stacked sections of the network toward the network edges

A.

Trace action occur flows from the stacked sections of the network toward the network edges

Answers
B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

Answers
C.

Review the whole attack-handling process

C.

Review the whole attack-handling process

Answers
D.

Mitigate the attack that flows using various mechanisms.

D.

Mitigate the attack that flows using various mechanisms.

Answers
Suggested answer: A

A network architect must implement CSC VPN services for a new backbone carrier. Which two benefits does the architecture provide? (Choose two.)

A.

It maintains.a single backbone, which simplifies the VPN implementation to customers.

A.

It maintains.a single backbone, which simplifies the VPN implementation to customers.

Answers
B.

It eliminates the need to maintain a centralized network-maintenance and operations strategy.

B.

It eliminates the need to maintain a centralized network-maintenance and operations strategy.

Answers
C.

It leverages IPsec to establish connections within the backbone. which eliminates the need for BGP to distribute routes.

C.

It leverages IPsec to establish connections within the backbone. which eliminates the need for BGP to distribute routes.

Answers
D.

It supports a scalable growth strategy that services multiple customers efficiently

D.

It supports a scalable growth strategy that services multiple customers efficiently

Answers
E.

It relies on IP communications, which simplifies the network design.

E.

It relies on IP communications, which simplifies the network design.

Answers
Suggested answer: A, D

A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

A network engineer must collect traffic statistics for an internal LAN toward the internet The sample must include the source and destination IP addresses, the destination ports, the total number of bytes from each flow using a 64-bit counter, and all transport flag information. Because of CPU limits, the flow collector processes samples that are a maximum of 20 seconds long. Which two configurations must the network engineer apply to the router? (Choose two.)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
E.

Option E

E.

Option E

Answers
Suggested answer: B, E

A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

Answers
B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

Answers
C.

Chef is written in Python, and SaltStack is written in Ruby.

C.

Chef is written in Python, and SaltStack is written in Ruby.

Answers
D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

Answers
Suggested answer: A

Which role does the Adjacency-SID sub-TLV extension perform in the IS-IS routing protocol?

A.

It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.

A.

It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.

Answers
B.

It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.

B.

It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.

Answers
C.

It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.

C.

It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.

Answers
D.

It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one

D.

It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. A network engineer is implementing BGP in AS 65101 and AS 65201. R3 sends data traffic to 192.168.1.1 /32 via the path R3-R2-R1. The traffic must travel via alternate path R6-R5 for prefix 192.168.1.1/32. Which action must be taken to meet the requirement?

A.

Apply route-map HIGH-MED out on R2 for neighbor R3.

A.

Apply route-map HIGH-MED out on R2 for neighbor R3.

Answers
B.

Apply route-map HIGH-LP in on R3 for neighbor R6

B.

Apply route-map HIGH-LP in on R3 for neighbor R6

Answers
C.

Apply route-map LOW-LP out on R2 for neighbor R3.

C.

Apply route-map LOW-LP out on R2 for neighbor R3.

Answers
D.

Apply route-map LOW-MED in on R5 for neighbor R2

D.

Apply route-map LOW-MED in on R5 for neighbor R2

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

A.

The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

A.

The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

Answers
B.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

Answers
C.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

Answers
D.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

Answers
E.

Configure the redistribute static and redistribute connected commands on R1.

E.

Configure the redistribute static and redistribute connected commands on R1.

Answers
Suggested answer: D

Refer to the exhibit.

Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

Answers
B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

Answers
C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

Answers
D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

Answers
Suggested answer: D
Total 448 questions
Go to page: of 45