ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











Refer to the exhibit:

Which statement describes the effect of this configuration?

A.

It applies a service policy to all interfaces remarking HTTP traffic

A.

It applies a service policy to all interfaces remarking HTTP traffic

Answers
B.

It creates an ACL named WEB that filters HTTP traffic.

B.

It creates an ACL named WEB that filters HTTP traffic.

Answers
C.

It matches HTTP traffic for use in a policy map

C.

It matches HTTP traffic for use in a policy map

Answers
D.

It modifies the default policy map to allow all HTTP traffic through the router

D.

It modifies the default policy map to allow all HTTP traffic through the router

Answers
Suggested answer: C

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

A.

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

A.

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

Answers
B.

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

B.

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

Answers
C.

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

C.

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

Answers
D.

The link state database provides segmentation by area, which improves the path-selection process

D.

The link state database provides segmentation by area, which improves the path-selection process

Answers
Suggested answer: C

Which additional feature does MPLS DiffServ tunneling support?

A.

matching EXP and DSCP values

A.

matching EXP and DSCP values

Answers
B.

interaction between MPLS and IGP

B.

interaction between MPLS and IGP

Answers
C.

using GRE tunnels to hide markings

C.

using GRE tunnels to hide markings

Answers
D.

PHB layer management

D.

PHB layer management

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_te_diffserv/configuration/15-mt/mp-tediffserv-15-mt-book/mp-diffserv-tun-mode.html

You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.

If you apply this code to BGP filters, which effect does the code have on your router?

A.

denies routes from AS 7070

A.

denies routes from AS 7070

Answers
B.

allows routes from AS 7077

B.

allows routes from AS 7077

Answers
C.

denies routes from AS 7007

C.

denies routes from AS 7007

Answers
D.

allows routes from AS 770

D.

allows routes from AS 770

Answers
Suggested answer: B

Refer to the exhibit:

Which statement supports QPPB implementation?

A.

QoS policies are identified in the MPLS forwarding table

A.

QoS policies are identified in the MPLS forwarding table

Answers
B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

Answers
C.

QoS policies use BGP to gain full coverage on the network.

C.

QoS policies use BGP to gain full coverage on the network.

Answers
D.

QPPB policies affect only egress traffic

D.

QPPB policies affect only egress traffic

Answers
Suggested answer: B

Refer to the exhibit:

What does the REST API command do?

A.

It retrieves the information requested by Descriptions xml

A.

It retrieves the information requested by Descriptions xml

Answers
B.

It removes the information identified by Descriptions xml

B.

It removes the information identified by Descriptions xml

Answers
C.

It executes the commands specified in Descriptions xml

C.

It executes the commands specified in Descriptions xml

Answers
D.

It displays the information identified by Descriptions xml

D.

It displays the information identified by Descriptions xml

Answers
Suggested answer: C

Why do packet loops occur during the configuration of BlDlR-PIM?

A.

The network does not support BIDIR-PIM

A.

The network does not support BIDIR-PIM

Answers
B.

The network is partially upgraded to support BIDlR-PIM

B.

The network is partially upgraded to support BIDlR-PIM

Answers
C.

No interface for carrying traffic for multicast groups has been configured

C.

No interface for carrying traffic for multicast groups has been configured

Answers
D.

The router has not been configured to advertise itself

D.

The router has not been configured to advertise itself

Answers
Suggested answer: B

Refer to the exhibit:

This output is included at the end of an output that was provided by a device using NETCONF.

What does the code show?

A.

It shows the hostname of the device as rpc-reply

A.

It shows the hostname of the device as rpc-reply

Answers
B.

It shows that the running configuration is blank

B.

It shows that the running configuration is blank

Answers
C.

It shows NETCONF uses remote procedure calls.

C.

It shows NETCONF uses remote procedure calls.

Answers
D.

It shows that the full configuration is being modeled by VANG

D.

It shows that the full configuration is being modeled by VANG

Answers
Suggested answer: C

Refer to the exhibit:

What is the URL used for with REST API?

A.

It is used to contact a URL filter to determine the efficacy of a web address

A.

It is used to contact a URL filter to determine the efficacy of a web address

Answers
B.

It is used to send a TACACS+ authentication request to a server

B.

It is used to send a TACACS+ authentication request to a server

Answers
C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

Answers
D.

It is used to initiate an FTP session to save a running configuration of a device.

D.

It is used to initiate an FTP session to save a running configuration of a device.

Answers
Suggested answer: C

You are configuring MPLS traffic-engineering tunnels in the core.

Which two ways exist for the tunnel path across the core? (Choose two )

A.

Tunnel links inherit IGP metrics by default unless overridden

A.

Tunnel links inherit IGP metrics by default unless overridden

Answers
B.

Tunnels can be configured with dynamic path or explicitly defined path

B.

Tunnels can be configured with dynamic path or explicitly defined path

Answers
C.

A zero bandwidth tunnel is not a valid option

C.

A zero bandwidth tunnel is not a valid option

Answers
D.

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

D.

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

Answers
Suggested answer: A, B
Total 448 questions
Go to page: of 45