Cisco 350-501 Practice Test - Questions Answers, Page 41
List of questions
Related questions
Which action occurs during the traceback phase of the six-phase approach to service provider security?
Trace action occur flows from the stacked sections of the network toward the network edges
Detect unusual activity or behavior and activate appropriate measures after an alert is raised.
Review the whole attack-handling process
Mitigate the attack that flows using various mechanisms.
A network architect must implement CSC VPN services for a new backbone carrier. Which two benefits does the architecture provide? (Choose two.)
It maintains.a single backbone, which simplifies the VPN implementation to customers.
It eliminates the need to maintain a centralized network-maintenance and operations strategy.
It leverages IPsec to establish connections within the backbone. which eliminates the need for BGP to distribute routes.
It supports a scalable growth strategy that services multiple customers efficiently
It relies on IP communications, which simplifies the network design.
A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?
Option A
Option B
Option C
Option D
A network engineer must collect traffic statistics for an internal LAN toward the internet The sample must include the source and destination IP addresses, the destination ports, the total number of bytes from each flow using a 64-bit counter, and all transport flag information. Because of CPU limits, the flow collector processes samples that are a maximum of 20 seconds long. Which two configurations must the network engineer apply to the router? (Choose two.)
Option A
Option B
Option C
Option D
Option E
A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?
Option A
Option B
Option C
Option D
Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?
Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.
Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.
Chef is written in Python, and SaltStack is written in Ruby.
Chef uses a message-based system, and SaltStack uses an agent to deliver messages
Which role does the Adjacency-SID sub-TLV extension perform in the IS-IS routing protocol?
It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.
It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.
It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.
It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one
Refer to the exhibit.
Refer to the exhibit. A network engineer is implementing BGP in AS 65101 and AS 65201. R3 sends data traffic to 192.168.1.1 /32 via the path R3-R2-R1. The traffic must travel via alternate path R6-R5 for prefix 192.168.1.1/32. Which action must be taken to meet the requirement?
Apply route-map HIGH-MED out on R2 for neighbor R3.
Apply route-map HIGH-LP in on R3 for neighbor R6
Apply route-map LOW-LP out on R2 for neighbor R3.
Apply route-map LOW-MED in on R5 for neighbor R2
Refer to the exhibit.
Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?
The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?
Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.
Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.
Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.
Configure the redistribute static and redistribute connected commands on R1.
Refer to the exhibit.
Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?
Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.
Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.
Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.
Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5
Question