ExamGecko
Home Home / Cisco / 350-501

Cisco 350-501 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











Refer to the exhibit:

A network administrator wants to enhance the security for SNMP for this configuration.

Which action can the network administrator implement?

A.

Re-configure to use SNMPv2 with MD5 authentication

A.

Re-configure to use SNMPv2 with MD5 authentication

Answers
B.

Add a community string to the existing entry

B.

Add a community string to the existing entry

Answers
C.

Re-configure to use SNMPv3.

C.

Re-configure to use SNMPv3.

Answers
D.

Maintain the configuration but switch to an encrypted password for device access through SSH

D.

Maintain the configuration but switch to an encrypted password for device access through SSH

Answers
Suggested answer: C

Refer to the exhibit:

Which effect of this configuration is true?

A.

R1 can support a peer that is configured for LDP SSO/NSF as the peer recovers from an outage

A.

R1 can support a peer that is configured for LDP SSO/NSF as the peer recovers from an outage

Answers
B.

R1 can failover only to a peer that is configured for LDP SSO/NSF

B.

R1 can failover only to a peer that is configured for LDP SSO/NSF

Answers
C.

R1 can failover to any peer

C.

R1 can failover to any peer

Answers
D.

R1 can support a graceful restart operation on the peer, even if graceful restart is disabled on the peer

D.

R1 can support a graceful restart operation on the peer, even if graceful restart is disabled on the peer

Answers
Suggested answer: A

A customer of an ISP requests support to setup a BGP routing policy. Which BGP attribute should be configured to choose specific BGP speakers as preferred exit points for the customer AS?

A.

highest local preference outbound

A.

highest local preference outbound

Answers
B.

lowest local preference inbound

B.

lowest local preference inbound

Answers
C.

highest local preference inbound

C.

highest local preference inbound

Answers
D.

lowest multi-exit discriminator

D.

lowest multi-exit discriminator

Answers
Suggested answer: B

Refer to the exhibit:

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

Answers
B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

Answers
C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

Answers
D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Answers
Suggested answer: D

Refer to the exhibit:

What is significant about the number 2 in the configuration?

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

Answers
B.

It dictates the number of sessions that can be open with the SNMP manager

B.

It dictates the number of sessions that can be open with the SNMP manager

Answers
C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

Answers
D.

It represents the version of SNMP running

D.

It represents the version of SNMP running

Answers
Suggested answer: A

A regional MPLS VPN provider operates m two regions and wants to provide MPLS L 3VPN service for a customer with two sites in these separate locations. The VPN provider approaches another organization to provide backbone carrier services so that the provider can connect to these two locations.

Which statement about this scenario is true?

A.

When edge routers at different regional sites are connected over the global carrier backbone, MPeBGP must run between the routers to exchange the customer VPNv4 routes

A.

When edge routers at different regional sites are connected over the global carrier backbone, MPeBGP must run between the routers to exchange the customer VPNv4 routes

Answers
B.

When eBGP is used for label exchange using the send label option, MPLS-BGP forwarding is configured under the global ABC CSC PE-to CE interface

B.

When eBGP is used for label exchange using the send label option, MPLS-BGP forwarding is configured under the global ABC CSC PE-to CE interface

Answers
C.

When IGP is used for route exchange and LDP for label exchange, MPLS is enabled only on the VRF interface on the backbone-earner PE side.

C.

When IGP is used for route exchange and LDP for label exchange, MPLS is enabled only on the VRF interface on the backbone-earner PE side.

Answers
D.

When BGP is used for both route and label exchange, the neighbor a.b.c.d send-lable command is used under the address family VPNv4 command mode.

D.

When BGP is used for both route and label exchange, the neighbor a.b.c.d send-lable command is used under the address family VPNv4 command mode.

Answers
Suggested answer: B

What is the difference between SNMP and model-driven telemetry?

A.

Telemetry allows for modeled network data to be pushed to the network administrator on an asneeded basis

A.

Telemetry allows for modeled network data to be pushed to the network administrator on an asneeded basis

Answers
B.

Telemetry uses traps and inform messages to deliver data to a network administrator on a polling basis

B.

Telemetry uses traps and inform messages to deliver data to a network administrator on a polling basis

Answers
C.

SNMP uses the YANG data modeling language

C.

SNMP uses the YANG data modeling language

Answers
D.

SNMP pushes network data to the network administrator whenever it is queried

D.

SNMP pushes network data to the network administrator whenever it is queried

Answers
Suggested answer: A

Refer To the exhibit:

On R1, which output does the show isis neighbors command generate?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Which configuration enables BGP FlowSpec client function and installation of policies on all local interfaces?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 1 drops all traffic with a local-preference set to 150

A.

Router 1 drops all traffic with a local-preference set to 150

Answers
B.

All traffic is dropped

B.

All traffic is dropped

Answers
C.

All traffic to 192.168.1.0/24 is dropped

C.

All traffic to 192.168.1.0/24 is dropped

Answers
D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Answers
Suggested answer: C
Total 448 questions
Go to page: of 45