Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) Question and Answers

Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)

Last Update Apr 15, 2024
Total Questions : 452

We are offering FREE 350-501 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 350-501 free exam questions and then go for complete pool of Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) test questions that will help you more.

350-501 pdf

350-501 PDF

$44  $109.99
350-501 Engine

350-501 Testing Engine

$52  $129.99
350-501 PDF + Engine

350-501 PDF + Testing Engine

$68  $169.99
Questions 1

Refer to the exhibit. A network engineer is implementing multicast services on CPE-1 and CPE-2. CPE-1 must be configured as the preferred IGMP querier for the LAN segment. PIM-SM must be implemented on the LAN interfaces with an IGMP version that supports (*, G) joins only. Which configurations must the engineer implement on CPE-1 and CPE-2?

Options:

A.  

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

B.  

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255. 128

ip pim sparse-mode

ip igmp version 3

C.  

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

D.  

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

Discussion 0
Questions 2

A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 3

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

Options:

A.  

bandwidth

B.  

affinity

C.  

explicit path

D.  

SLRG

Discussion 0
Questions 4

Refer the exhibit.

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

Options:

A.  

first-in, first-out

B.  

traffic shaping

C.  

class-based weighted fair queueing

D.  

traffic policing

Discussion 0
Questions 5

router(config)# route-map blackhole-trigger

router(config-route-map)# match tag 777

router(config-route-map)# set ip next-hop 10.0.1.1

router(config-route-map)# set origin igp

router{config-route-map)# set community no-export

Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and each router maintains iBGP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which is used as a black hole route as shown. Which configuration should the operator implement to the management router to create a route map that will redistribute tagged static routes into BGP and create a static route to blackhole traffic with tag 777 that is destined to the server at 192.168.10.100?

Options:

A.  

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

B.  

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

C.  

router(config)# router bgp 55100

router(config-router)# redistribute connected

router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

D.  

router(config)# router bgp 55100

router(config-router)# redistribute connected route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

Discussion 0
Questions 6

Refer to the exhibit. All BGP peering in AS 65101 and 65201 is enabled. The operations team is told that traffic destined to 192.168.1.1/32 from R4 does not use the path R3-R2-R1 as expected. An engineer debugs the issue and determines that 192.168.1.1/32 is advertised in the BGP routing table on R1. Which action resolves the issue?

Options:

A.  

Enable no synchronization on R2 m AS65101.

B.  

Apply route-map High-LP out for prefix 192.168.1.1/32 on R1 with R2 BGP peering.

C.  

Apply redistribute ospf 10 on R1 in BGP AS 65101.

D.  

Configure network 192.168.1.1 mask 255.255.255.255 in BGP AS 65101 on R2

Discussion 0
Questions 7

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 8

Why is the keyword none needed when implementing management plane security using TACACS?

Options:

A.  

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.  

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.  

It allows authentication to succeed when the TACACS+ server is unreachable.

D.  

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Discussion 0
Questions 9

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

Options:

A.  

It returns an AAA users with the last name CiscoTest.

B.  

It creates a class map named aaauser with traffic tagged from AAA.

C.  

It queries the local database to find a user named aaaUser.Json

D.  

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Discussion 0
Questions 10

How does model-driven telemetry use YANG?

Options:

A.  

to reset network devices that malfunction

B.  

to set informs and traps on clients to report back to a centralized server

C.  

to subscribe to data that is streamed from a device

D.  

to poll network devices on a 30-minute interval

Discussion 0
Questions 11

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

Options:

A.  

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.  

Internet routing through global routing on a PE router.

C.  

Internet access routing as another VPN in the ISP network.

D.  

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.  

Internet access for global routing via a separate interface in a VRF

Discussion 0
Questions 12

An engineer is configuring IEEE 802.1 ad on the access port on a new Cisco router. The access port handles traffic from multiple customer VLANs, and it is expected to mark all customer traffic to the same VLAN without dropping any traffic. Which configuration must the engineer apply?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 13

Refer to the exhibit.

A network engineer is implementing OSPF multiarea. Which command on interface GO/1 resolves adjacency issues in the new area?

Options:

A.  

ip ospf network broadcast

B.  

ip ospf network point-to-point

C.  

ip ospf network non-broadcast

D.  

ip ospf network point-to-multipoint

Discussion 0
Questions 14

Refer to the exhibit. An engineer started to configure a router for OSPF. Which configuration must the engineer perform on the router without changing any interface configuration so that the router establishes an OSPF neighbor relationship with its peer?

Options:

A.  

router(config)# router ospf 11router(config-if)# no passive-interface ethernet 1/1

B.  

router(config)# interface ethernet 1/1router(config-if)# no shutdown

C.  

router(config)# interface ethernet 1/1router(config-if)# ip ospf hello-interval

D.  

router(config)# interface ethernet 1/1router(config-if)# ip ospf priority 0

Discussion 0
Questions 15

Refer to the exhibit.

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

Options:

A.  

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.  

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.  

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.  

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Discussion 0
Questions 16

After troubleshooting multiple outages on the network due to repeated configuration errors, the network architect asked an engineer to enable NETCONF to facilitate future configurations. The configuration must enable syslog messaging to record NETCONF notifications from each of the numerous devices on the network. Which configuration must the engineer apply?

Options:

A.  

username cisco test taker privilege 15 password 0 cisco test

aaa new-model

aaa authorization exec default local

snmp-server community cisco test RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history warnings

B.  

username cisco test taker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco

logging history critical

C.  

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history debugging

D.  

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history informational

Discussion 0
Questions 17

Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?

Options:

A.  

routing and tunneling when doing symmetric IRB

B.  

routing when doing asymmetric IRB

C.  

routing and bridging when doing asymmetric IRB

D.  

bridging when doing symmetric IRB

Discussion 0
Questions 18

An engineer needs to implement QOS mechanism on customer's network as some applications going over the internet are slower than others are. Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task? (Choose two)

Options:

A.  

Configure a queue with sufficient memory to buffer excess packets.

B.  

Configure the token values in bytes.

C.  

Implement packet remarking for excess traffic.

D.  

Implement a scheduling function to handle delayed packets.

E.  

Configure a threshold over which excess packets are discarded.

Discussion 0
Questions 19

Refer to the exhibit.

An administrator working for large ISP must connect its two POP sites to provide internet connectivity to its customers. Which configuration must the administrator perform to establish an iBGP session between routers PE1 on POP site 1 and PE2 on POP site 2?

Options:

A.  

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#no neighbor 172.18.10.1 shutdown

PE2(config-router)#end

B.  

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#no neighbor 172.19.10.10 shutdown

PE1(config-router)#end

C.  

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#address-family ipv4 unicast

PE1(config-router-af)#neighbor 172.19.10.10 activate

PE1(config-router-af)#end

D.  

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#address-family ipv4 unicast

PE2(config-router-af)#neighbor 172.18.10.1 activate

PE2(config-router-af)#end

Discussion 0
Questions 20

Refer to the exhibit:

Based on the show/ command output, which result m true after BGP session is established?

Options:

A.  

The IOS XR router advertises all routes to the neighbor 192.168.2.2, but it does not accept any routes from 192.168.2.2

B.  

The IOS XR router advertises and accepts all routes to and from eBGP neighbor 192.168.2.2 C. No routes are accepted from the neighbor 192.168.2.2, nor are any routes advertised to it

C.  

The IOS XR router does not advertise any routes to the neighbor 192.168.2.2,but it accepts all routes from 192.168.2.2.

Discussion 0
Questions 21

Refer to the exhibit.

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 22

How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?

Options:

A.  

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

B.  

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

C.  

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

D.  

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

Discussion 0
Questions 23

Refer to the exhibit.

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

Options:

A.  

Text Description automatically generated

B.  

Text Description automatically generated

C.  

Text Description automatically generated

D.  

Text, letter Description automatically generated

Discussion 0
Questions 24

Which OS uses a distributed subsystem architecture?

Options:

A.  

IOS XE

B.  

IOS

C.  

IOS XR

D.  

CatOS

Discussion 0
Questions 25

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

Options:

A.  

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.  

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.  

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.  

snmp-server enable traps

snmp-server host 192.168.1.2 public

Discussion 0
Questions 26

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

Options:

A.  

global configuration mode

B.  

routing configuration mode

C.  

BGP neighbor configuration

D.  

mode BGP address-family configuration mode

Discussion 0
Questions 27

Which technology enables the addition of new wavelengths in a fiber-optic network?

Options:

A.  

IPoDWDM

B.  

CWDM

C.  

DWDM

D.  

ROADM

Discussion 0
Questions 28

Which OoS model allows hosts to report their QoS needs to the network?

Options:

A.  

DiffServ

B.  

CB-WFQ

C.  

IntServ

D.  

MQC

Discussion 0
Questions 29

A network engineer is configuring a router to send multicast traffic for the 239.10.10.10 group. Which configuration must an .... forward the traffic?

Options:

A.  

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp max-groups action replace

B.  

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp filter

C.  

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp access-group 239.10.10.10

D.  

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp join-group 239.10.10.10

Discussion 0
Questions 30

Refer to the exhibit.

A network engineer with an employee id: 3812:12:993 has started to configure router R1 for IS-IS as shown. Which additional configuration must be applied to configure the IS-IS instance to advertise only network prefixes associated to passive interfaces?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 31

Which three OSPF parameters must match before two devices can establish an OSPF adjacency? (Choose three.)

Options:

A.  

IP address

B.  

interface cost

C.  

subnet mask

D.  

process ID

E.  

hello timer setting

F.  

area number

Discussion 0
Questions 32

Refer to the exhibit.

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

Options:

A.  

neighbor ebgp-multihop

B.  

ebgp-multihop

C.  

ttl-security

D.  

neighbor-ttl-security

Discussion 0
Questions 33

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service provider core network with these requirements:

R1 must establish LDP peering with the loopback IP address as its Router-ID.

Session protection must be enabled on R2.

How must the team update the network configuration to successfully enable LDP peering between R1 and R2?

Options:

A.  

Change the LDP password on R2 to Cisco.

B.  

Configure mpls ldp router-id loopback0 on R1 and R2.

C.  

Configure LDP session protection on R1.

D.  

Change the discover hello hold time and interval to their default values.

Discussion 0
Questions 34

According to RFC5305 on IS-IS extensions for traffic engineering, what is the 4-octet sub-TLV type 10 of extended IS-IS reachability TLV type 22?

Options:

A.  

TE default metric

B.  

maximum reservable link bandwidth

C.  

administrative group (color)

D.  

IPv4 neighbor address

Discussion 0
Questions 35

Refer to the exhibit:

You are configuring an administrative domain implement so that devices can dynamically learn the RP?

Options:

A.  

SSM

B.  

BID1R-PIM

C.  

BSR

D.  

Auto-RP

Discussion 0
Questions 36

Refer to the exhibit.

An engineer wants to determine which paths are best, second best, third best, and fourth best. Drag and drop the peer addresses on the left to the corresponding BGP best-path selection order on the right.

Options:

Discussion 0
Questions 37

Refer to the exhibit.

If RC is a stub router, which entry must be injected so that it will send traffic outside the OSPF domain?

Options:

A.  

virtual link between RB and RC

B.  

sham link

C.  

more specific route

D.  

default route

Discussion 0
Questions 38

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

Options:

A.  

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

B.  

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

C.  

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

D.  

The link state database provides segmentation by area, which improves the path-selection process

Discussion 0
Questions 39

While implementing TTL security, an engineer issues the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command. After issuing this command, which BGP packets does the PE accept?

Options:

A.  

from 2.2.2.2, with a TTL of less than 2

B.  

to 2.2.2.2, with a TTL of less than 253

C.  

from 2.2.2.2, with a TTL of 253 or more

D.  

to 2.2.2.2, with a TTL of 2 or more

Discussion 0
Questions 40

Which statement about segment routing prefix segments is true?

Options:

A.  

It is linked to a prefix SID that is globally unique within segment routing domain.

B.  

It is the longest path to a node.

C.  

It is linked to an adjacency SID that is globally unique within the router.

D.  

It requires using EIGRP to operate.

Discussion 0
Questions 41

Refer to the exhibit:

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

Options:

A.  

LDP needs to be enabled on the R2 physical interface

B.  

R2 does not see any hellos from R1

C.  

LDP needs to be enabled on the R2 loopback interface

D.  

R2 sees the wrong type of hellos from R1

Discussion 0
Questions 42

Refer to the exhibit. Which part of the diagram will host OpenStack components?

Options:

A.  

Aggregation

B.  

UCS Series

C.  

Access

D.  

Core

Discussion 0
Questions 43

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 44

Refer to the exhibit:

Export statistics received do not include the BGP next hop.

Which statement about the NetFlow export statistics is true?

Options:

A.  

Only the origin AS of the source router will be included in the export statistics.

B.  

Loopback 0 must be participating in BGP for it to be included in the export statistics.

C.  

The origin AS and the peer-as will be included in the export statistics.

D.  

To include the BGP next hop in the export statistics, those keywords must be included with the version 9 entry.

Discussion 0
Questions 45

Refer to the exhibit.

Which two topology changes happen to the IS-IS routers? (Choose two.)

Options:

A.  

All four routers are operating as Level 1 routers only.

B.  

All four routers are operating as Level 2 routers only.

C.  

R1 and R4 are Level 2 neighbours.

D.  

R1 and R2 are Level 2 neighbours.

E.  

All four routers are operating as Level 1-2 routers.

Discussion 0
Questions 46

What is a role of NSO?

Options:

A.  

It automates the deployment of access points with its built-in wireless LAN controller.

B.  

It manages WAN infrastructure using a virtual switch.

C.  

It provides full lifecycle management of a device.

D.  

It resides on a hypervisor that runs the Windows OS.

Discussion 0
Questions 47

Which core component of MDT describes the data that an MDT-capable device streams to a collector?

Options:

A.  

subscription

B.  

encoder

C.  

sensor path

D.  

transport protocol

Discussion 0
Questions 48

After a series of unexpected device failures on the network. a Cisco engineer is deploying NSF on the network devices so that packets continue to be forwarded during switchovers The network devices reside in the same holding, but they are physically separated into two different data centers Which task must the engineer perform as part of the deployment?

Options:

A.  

implement OSPF to maintain the link-state database during failover.

B.  

implement VRFs and specify the forwarding instances that must remain active during failover.

C.  

implement an L2VPN with the failover peer to share state Information between the active and standby devices.

D.  

implement Cisco Express Forwarding to provide forwarding during failover

Discussion 0
Questions 49

Refer to the exhibit:

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

Options:

A.  

R1 establishes UDP connections that are authenticated with an MD5 password

B.  

R1 establishes TCP connections that are authenticated with a clear-text password

C.  

R1 establishes UDP connections that are authenticated with a clear-text password

D.  

R1 establishes TCP connections that are authenticated with an MD5 password

Discussion 0
Questions 50

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

Options:

A.  

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.  

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.  

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.  

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Discussion 0
Questions 51

Refer to the exhibit. A network engineer must configure XR-PE1 for uninterruptible failover from active RP to the standby RP Neither peer devices CGW1 nor the network of ASN 64512 support restart extensions Which configuration must the engineer apply to XR PEI to complete tasks?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 52

Refer to the exhibit.

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

Options:

A.  

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.  

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.  

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.  

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Discussion 0
Questions 53

Refer to the exhibit:

Which purpose of implementing NSF with this configuration is true?

Options:

A.  

The router uses NSF to load balance traffic between two links, with the primary link alternating every 90 seconds

B.  

The router uses NSF to reduce neighbor-relationship downtime during RP switchover

C.  

The router uses NSF to load balance traffic on a routed EtherChannel

D.  

The router uses NSF to handle RP switchover while allowing neighbor relationships to remain up

Discussion 0
Questions 54

Simulation 8

Options:

Discussion 0
Questions 55

Refer to the exhibit.

A network engineer notices that router R2 is failing to install network 172.16.33.1/32 in the routing table. Which configuration must the engineer apply to R2 to fix the problem?

Options:

A.  

R2(config)# access-Iist 1 permit 172.16.33.0 255.0.0.0

B.  

R2(config)# access-list 1 permit 172,16,33.0 255,255,255,0

C.  

R2(config)# access-list 1 permit 172.16.33.0 0.0.0.255

D.  

R2(config)# access-list 1 permit 172,16,33.0 255.255,0,0

Discussion 0
Questions 56

How is a telemetry session established for data analytics?

Options:

A.  

A router initiates a session using the dial-out to a destination.

B.  

A destination initiate a session to a router.

C.  

The destination initiate a session using the dial-out more to the router.

D.  

A router requests the data using Teinet.

Discussion 0
Questions 57

Refer to the exhibit:

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.  

ip ospf network non-broadcast

B.  

ip ospf network point-to- multipoint non-broadcast

C.  

ip ospf network point-to-point

D.  

ip ospf network broadcast

Discussion 0
Questions 58

Refer to the exhibit.

Router 1 is missing the route for the router 2 loopback 0. What should the engineer change to fix the problem?

Options:

A.  

the area numbers on Router 1 and Router 2 to be similar

B.  

the wildcard mask network statement in OSPF of Router 2

C.  

Router 1 to be an ABR

D.  

the hello timers on Router 1 and Router 2 to be different

Discussion 0
Questions 59

What is an enhancement that Cisco IOS XE Software has over Cisco IOS Software?

Options:

A.  

It support symmetric multiprocessing

B.  

It allows all processes to use the same pool of memory.

C.  

It runs on a 32-bit operating system.

D.  

It is built on a GNX Neutrino Microkernel.

Discussion 0
Questions 60

Drag and drop the OSPF and IS-IS Cisco MPLS TE extensions from the left to their functional descriptions on the right.

Options:

Discussion 0
Questions 61

Which protocol is used for communication between the PCE and PCC?

Options:

A.  

ICMP

B.  

PCEP

C.  

CEF

D.  

POP

Discussion 0
Questions 62

Refer to the exhibit:

BGPsec is implemented on R1. R2. R3. and R4 BGP peering is established between neighboring autonomous systems Which statement about implementation is true?

Options:

A.  

BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator

B.  

BGP updates from the iBGP peers are appended with a community of local-as

C.  

BGP updates from the all BGP peers are appended with a community of no export

D.  

BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature

Discussion 0
Questions 63

Which two routing protocols support Cisco MPLS TE tunnels? (Choose two.)

Options:

A.  

IS-IS

B.  

RIP

C.  

BGP

D.  

OSPF

E.  

EIGRP

Discussion 0
Questions 64

Refer to the exhibit A network engineer is in the process of implementing IS-IS Area 1 and Area 2 on this network to segregate traffic between different segments of the network The hosts in the two new areas must maintain the ability to communicate with one another In both directions. Which additional change must be applied?

Options:

A.  

Reconfigure either R3 or R4 as a Level 1/Level 2 router.

B.  

Reconfigure routers R1, R2 R5. and R6 as Level 1/Level 2 routers.

C.  

Reconfigure routers R2 and R5 as Level 1/Level 2 routers.

D.  

Reconfigure routers R4, R5 and R6 as Level 1 routers

Discussion 0
Questions 65

The engineering team at a large ISP has been alerted a customer network is experiencing high traffic congestion. After a discussion between the ISP and technical personnel at the customer site, the team agrees that traffic to the customer network that exceeds a specific threshold will be dropped. Which task must the engineer perform on the network to implement traffic policing changes?

Options:

A.  

Configure RSVP to reserve bandwidth on all interfaces when a path is congested.

B.  

Enable Cisco Discovery Protocol on the interface sending the packets.

C.  

Enable Cisco Express Forwarding on the interfaces sending and receiving the packets.

D.  

Set IP precedence values to take effect when traffic exceeds a given threshold.

Discussion 0
Questions 66

A network operator needs to implement PIM-SSM multicast configuration on customer's network so that users in different domains are able to access and stream live traffic. Which two actions must the engineer perform on the network

to make the streaming work? (Choose two.)

Options:

A.  

Configure at least one MSDP peer on the network

B.  

Enable IGMP version 2 at the interface lever.

C.  

Enable PIM sparse mode on the device.

D.  

Enable IGMP version 3 at the interface level.

E.  

Enable PM dense mode on the device.

Discussion 0
Questions 67

Refer to the exhibit A user is performing QoS marking on internet traffic and sending it with IPv4 and IPv6 headers on the provider edge device PE1. IPv4 traffic is classified with DSCP 4 and IPv6 traffic is classified with DSCP 6. Which action must the engineer take to begin implementing a QoS configuration on PE1 for the IPv6 traffic?

Options:

A.  

Create an access list that includes any IPv6 traffic and apply it to CM-20.

B.  

Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM-10 and CM-20.

C.  

Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.

D.  

Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.

Discussion 0
Questions 68

Which BGP attribute is used first when determining the best path?

Options:

A.  

origin

B.  

AS path

C.  

local preference

D.  

weight

Discussion 0
Questions 69

Which condition must be met for TI-LFA to protect LDP traffic?

Options:

A.  

For single-segment protection, the PQ node must be LDP and SR-capable.

B.  

The protected destination must have an associated LDP label and prefix-SID.

C.  

The point of local repair must be LDP-capable.

D.  

For double-segment protection, the P and Q nodes must be SR-capable.

Discussion 0
Questions 70

Why do packet loops occur during the configuration of BlDlR-PIM?

Options:

A.  

The network does not support BIDIR-PIM

B.  

The network is partially upgraded to support BIDlR-PIM

C.  

No interface for carrying traffic for multicast groups has been configured

D.  

The router has not been configured to advertise itself

Discussion 0
Questions 71

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

Options:

A.  

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.  

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.  

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.  

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Discussion 0
Questions 72

Which fact must a network engineer consider when planning to deploy RSVP-TE FRR?

Options:

A.  

The FRR backup tunnel reserves the total bandwidth of all protected tunnels

B.  

FRR protects MPLS LDP and RSVP-TE LSPs.

C.  

PLR prefers FRR NHOP backup tunnels over NNHOP tunnels.

D.  

PLR prefers FRR NNHOP backup tunnels over NHOP tunnels.

Discussion 0
Questions 73

Refer to the exhibit. A service provider engineer Is configuring the connection between CE1 and CE2. AS 200 of the service provider and AS 100 of enterprise ABC should connect using BGP. The engineer already completed the configuration of VRF RT 100:10 of enterprise ABC. Which configuration must the engineer apply on PE1 to meet the requirement?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 74

Refer to the exhibit.

An engineer is implementing BGP selective prefix suppression. The router must advertise only 10.16.4.0/24,10.16.5.0/24. and summarized route 10.16.0.0/21. and suppress 10.16.6.0/24. Which configuration must the engineer apply to the router?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 75

Refer to the exhibit.

The network engineer who manages ASN 65010 is provisioning a customer VRF named CUSTOMER-ABC on PE-2. The PE-CE routing protocol is OSPF Internet reachability is available via the OSPF 0 0 0.0/0 route advertised by CE-1 to PE-1 In the customer VRF Which configuration must the network engineer Implement on PE-2 so that CE-2 has connectivity to the Internet?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 76

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

Options:

A.  

It remarks all values to a CoS of 0.

B.  

It forwards only traffic with a DSCP value of 48.

C.  

It translates the IP precedence value to the corresponding DSCP value.

D.  

It drops all traffic ingressing the network.

Discussion 0
Questions 77

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

Options:

A.  

Reconnect Timeout field

B.  

Learn from Neighbor (N) flag, set to 1

C.  

Graceful restart capability in OPEN message

D.  

Recovery Time field

E.  

Learn from Network (L.) flage, set to 1

F.  

Type-9 LSA

Discussion 0
Questions 78

Refer to the exhibit. The application server in the data center hosts voice, video, and data applications over the internet. The data applications run more slowly than the voice and video applications. To ensure that all applications run smoothly, the service provider decided to implement a QoS policy on router PER 2 to apply traffic shaping. Which two actions must an engineer take to implement the task? (Choose two.)

Options:

A.  

Configure the scheduling function to handle delayed packets.

B.  

Enable packet remarking for priority traffic.

C.  

Configure a queue to buffer excess traffic.

D.  

Set the token value for secondary traffic.

E.  

Set a threshold to discard excess traffic.

Discussion 0
Questions 79

Drag and drop the technologies from the left onto the correct definitions on the right.

Options:

Discussion 0
Questions 80

Refer to the exhibit. The network operations team reported that the access site that is connected to R3 is not connecting to the application server in the data center and that all packets that are sent from the application server to the access site are dropped. The team verified that OSPF and BGP peerings are up in BGP AS 65101 and BGP AS 65201. R4 is expected to receive traffic from the application server route via OSPF. Which action resolves this issue?

Options:

A.  

Remove the route-map on R4 when advertising 172.16.20.1 in BGP to R3.

B.  

Advertise application server 172.16.20.1 in the OSPF routing table on R6.

C.  

Allow 172.16.20.1 in the BGP advertisement on R3 in the route-map.

D.  

Add the next-hop-self command on R6 to enable R3 iBGP peering.

Discussion 0
Questions 81

Refer to the exhibit:

Which configuration prevents the OSPF neighbor from establishing?

Options:

A.  

mtu

B.  

duplex

C.  

network statement

D.  

default-metric

Discussion 0
Questions 82

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Options:

Discussion 0
Questions 83

An engineer is trying to implement BGP in a multihomed architecture. What must the engineer configure to influence inbound path selection?

Options:

A.  

A route map with WEIGHT attribute to control the inbound traffic.

B.  

An offset list to set the metric for routes received from neighboring autonomous systems.

C.  

An access list to identify traffic and enable it on both of the provider-facing interfaces.

D.  

A route map with AS_PATH attribute to control the inbound traffic.

Discussion 0
Questions 84

What is a characteristic of prefix segment identifier?

Options:

A.  

It contains a router to a neighbor

B.  

It contains the interface address of the device per each link

C.  

It is globally unique.

D.  

It is locally unique.

Discussion 0
Questions 85

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

Options:

A.  

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.  

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.  

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.  

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Discussion 0
Questions 86

Which type of attack is a Protocol attack?

Options:

A.  

HTTP flood

B.  

TFTP flood

C.  

SYN flood

D.  

Slowlorls

Discussion 0
Questions 87

Refer to the exhibit. Router P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering P4 is the primary Internet gateway router, and P5 is its Backup. P5 is already advertising a default route into OSPF domain. Which configuration must Be applied to P4 so that advertises a default route Into OSPF and Becomes me primary internet gateway for the network?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 88

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 89

Exhibit:

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

Options:

A.  

Configure the device to choose the best MED from the same AS.

B.  

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.  

Enable MED comparison between routes from neighbors in different AS.

D.  

Implement deterministic MED to choose the best route from the different AS.

Discussion 0
Questions 90

While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?

Options:

A.  

Configure the device to pass only O and E2 routes through it.

B.  

Configure the synchronization keyword in the global BGP configuration.

C.  

Configure the keyword nssa in the redistribution entry.

D.  

Configure the keywords internal and external in the redistribution entry.

Discussion 0
Questions 91

An engineer is implementing a router redistribution within BGP. The route map must be configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 92

Refer to the exhibit. A network engineer is configuring router RB to secure BGP advertisements against route hijacking activity. RB must validate all prefixes that it receives from origin AS 200 before installing them in the BGP route table. Which configuration meets the requirement?

Options:

A.  

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

RB(config-router-af)# bgp bestpath origin-as use validity

B.  

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation signal ibgp

RB(config-bgp)# bgp bestpath origin-as allow invalid

C.  

RB(config-bgp)# router bgp 100

RB(config-bgp)# bgp origin-as validation time off

D.  

RB(config)# router bgp 100

RB(config-router)# address-family ipv4 unicast

PB(config-router-af)# bgp origin-as validation enable

Discussion 0
Questions 93

A network engineer is configuring RIP as the routing protocol between multiple PEs and CEs. The engineer must avoid advertising the same routes back to their sources. Which action should be performed on the routers to accomplish this task?

Options:

A.  

Configure a different route distinguisher for each prefix.

B.  

Define the site of origin on each interface.

C.  

Define VRFs on each device to separate the traffic.

D.  

Enable bidirectional forwarding detection on each device.

Discussion 0
Questions 94

The administrator of a small company network notices that intermittent network issues occasionally cause inbound notifications to its SNMP servers to be lost. Which configuration must the administrator apply so that the SNMP servers acknowledge the notifications that they receive?

Options:

A.  

snmp-server community ciscotest rw 10

B.  

snmp-server host tests.cisco.com public

snmp-server community ciscotest rw 10

C.  

snmp-server enable traps bgp

snmp-server host 192.169.2.1 Informs

D.  

snmp-server enable traps snmp

Discussion 0
Questions 95

A network operator working for a telecommunication company with an employee Id: 4065 96080 it trying to implement BFD configuration on an existing network of Cisco devices Which task must the engineer perform to enable BFD on the interfaces?

Options:

A.  

Disable Cisco Express Forwarding on the interfaces

B.  

Disable SSO on the interfaces

C.  

Remove any static routes that point to the interfaces

D.  

Remove the log option from any ACLs on the interfaces.

Discussion 0
Questions 96

What is a feature of mVPN?

Options:

A.  

It requires-uncast to be disabled on the multicast domain

B.  

It establishes multiple static MDTs for each multicast domain.

C.  

It provides the ability to support multicast over a Layer 3 VPN.

D.  

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Discussion 0
Questions 97

What do Ansible and Salt Stack have in common?

Options:

A.  

They both use DSL configuration language

B.  

They both use YAML configuration language

C.  

They both have agents running on the client machine

D.  

They both can be designed with more than one master server

Discussion 0
Questions 98

Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is Mbps. The company XYZ security team asked the ISP to redirect ICMP requests which are currently going to the web server to a new local security appliance which configuration must an ISPP engineer apply to router R2 to redirect the ICMP traffic?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 99

An engineer implemented LDP protocol on the ISP network. The engineer must ensure that there are no packet loss issues when IGP and LDP protocols are not synchronized. Which configuring must the engineer implement so that the IGP routing protocol will wait until LDP convergence is completed?

Options:

A.  

Disable IP CEF routers running LDP and enable LDP protocol.

B.  

Configure MPLS LDP IGP synchronization on the network.

C.  

Configure LDP sessions protection on the network.

D.  

Disable MPLS LDP IGP synchronization on the network.

Discussion 0
Questions 100

Simulation 6

Options:

Discussion 0
Questions 101

Refer to the exhibit. After a networking team configured this MPLS topology, the supervisor wants to view MPLS labels to verify the path that packets take from router R1 to router R7 The team already Issued an ICMP ping to verify connectivity between the devices. Which task must the team perform to allow the supervisor to view the label switch path?

Options:

A.  

Configure MPLS TE to display the labels in the stack between the head and tail-end routers

B.  

Implement MPLS LDP to assign labels to all the routes in the transit path.

C.  

Configure MPLS LDP Sync to sync labels from the routing table to the MPLS forwarding table.

D.  

Implement MPLS OAM to display the labels for each hop along the path

Discussion 0
Questions 102

l

Refer to the exhibit. A network engineer working for a telecommunication company with an employee ID: 4602:62:646 is configuring security controls for the IPv6 multicast group, which is used for video TV. The solution from the engineer should reduce network usage and minimize the leave latency for the user that is connected to VLAN 76. Which two configurations meet this goal? (Choose two.)

A)

B)

C)

D)

E)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E.  

Option E

Discussion 0
Questions 103

Refer to the exhibit.

Which configuration must be applied to each of the four routers on the network to reduce LDP LIB size and advertise label bindings for the /32 loopback IP space only?

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 104

A network architect must implement CSC VPN services for a new backbone carrier. Which two benefits does the architecture provide? (Choose two.)

Options:

A.  

It maintains.a single backbone, which simplifies the VPN implementation to customers.

B.  

It eliminates the need to maintain a centralized network-maintenance and operations strategy.

C.  

It leverages IPsec to establish connections within the backbone. which eliminates the need for BGP to distribute routes.

D.  

It supports a scalable growth strategy that services multiple customers efficiently

E.  

It relies on IP communications, which simplifies the network design.

Discussion 0
Questions 105

Refer to the exhibit. ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to CE-1?

Options:

A.  

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-export additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

B.  

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community local-as additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

C.  

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefixlist AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop local-address

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

D.  

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

Discussion 0
Questions 106

A network engineer must collect traffic statistics for an internal LAN toward the internet The sample must include the source and destination IP addresses, the destination ports, the total number of bytes from each flow using a 64-bit counter, and all transport flag information. Because of CPU limits, the flow collector processes samples that are a maximum of 20 seconds long. Which two configurations must the network engineer apply to the router? (Choose two.)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

E.  

Option E

Discussion 0
Questions 107

Refer to me exhibit.

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

Options:

A.  

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.  

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.  

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.  

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Discussion 0
Questions 108

Which configuration mode do you use to apply the mpls Idp graceful-restart command in IOS XE Software? MPLS

Options:

A.  

MPLS

B.  

LDP neighbor

C.  

global

D.  

interface

Discussion 0
Questions 109

In an MPLS network, which protocol can be used to distribute a Segment Prefix?

Options:

A.  

OSPF

B.  

LDP

C.  

RSVP-TE

D.  

EIGRP

Discussion 0
Questions 110

Which characteristic describes prefix segment identifier?

Options:

A.  

It contains the interface address of the device per each link.

B.  

It Is globally unique.

C.  

It is locally unique.

D.  

It contains a router to a neighbor.

Discussion 0
Questions 111

Refer to the exhibit.

AN engineer is configuring segment routing on an ISP to simplify traffic engineering and management across network domains. What should the engineer do to complete the implementation of segment routing?

Options:

A.  

OSPF must be configured with wide area metrics to support routing.

B.  

The segment will run without any further configuration.

C.  

Area authentication must be enable before segment routing will run.

D.  

Area Authentication must be enable before segment routing will run.

Discussion 0
Questions 112

Refer to the exhibit.

Which type of DDoS attack will be mitigated by this configuration?

Options:

A.  

SYN flood

B.  

smurf attack

C.  

SIP INVITE flood attacks

D.  

teardrop attack

Discussion 0
Questions 113

Which two IS-IS parameters must match before two Level 2 peers can form an adjacency? (Choose two)

Options:

A.  

authentication settings

B.  

area ID

C.  

system ID

D.  

MTU

E.  

hello timer setting

Discussion 0
Questions 114

Refer to the exhibit:

What is the URL used for with REST API?

Options:

A.  

It is used to contact a URL filter to determine the efficacy of a web address

B.  

It is used to send a TACACS+ authentication request to a server

C.  

It is used to send a message to the APIC to perform an operation on a managed object or class operator

D.  

It is used to initiate an FTP session to save a running configuration of a device.

Discussion 0
Questions 115

Refer to the exhibit:

Which statement about the status of the neighbor relationship between R1 and R2 is true?

Options:

A.  

The neighbor relationship is down because the two routers are configured with different area types

B.  

The neighbor relationship is down because the two routers are in the same subnet.

C.  

The neighbor relationship is up because R2 is level 1 and level 2 router.

D.  

The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different area

Discussion 0
Questions 116

You are configuring MPLS traffic-engineering tunnels in the core.

Which two ways exist for the tunnel path across the core? (Choose two )

Options:

A.  

Tunnel links inherit IGP metrics by default unless overridden

B.  

Tunnels can be configured with dynamic path or explicitly defined path

C.  

A zero bandwidth tunnel is not a valid option

D.  

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

Discussion 0
Questions 117

Refer to the exhibit.

A network operator working for a telecommunication company with an employee ID: 4350:47:853 must implement an IGP solution based on these requirements:

• Subnet 10.50.10.0 traffic must exit through the R1 router to connect with the Syslog server.

• Subnet 10.50.20.0 traffic must exit through the R2 router to connect with the NTP server.

• In case of link failure between R2 and R4, traffic must be routed via R1 and R3.

Which two configurations must be implemented on R5 to meet these requirements? (Choose two.)

Options:

A.  

Apply a route policy to redistribute 10.50.0.0 prefixes in OSPF to ISIS and ISIS to OSPF.

B.  

Apply a route policy to redistribute 10.50.20.0 from ISIS-L2 to OSPF Area 0 at a higher cost.

C.  

Enable a route policy to advertise 10.50.20.0 in ISIS-L2 at a higher cost.

D.  

Apply a route policy to redistribute 10.50.10.0 from OSPF Area 0 to ISIS-L2 at a lower cost.

E.  

Enable a route policy to advertise 10.50.10.0 In OSPF Area 0 at a low cost.

Discussion 0
Questions 118

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

Options:

A.  

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.  

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.  

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.  

Configure the redistribute static and redistribute connected commands on R1.

Discussion 0
Questions 119

What are two characteristics of MPLS TE turrets? (Choose two)

Options:

A.  

They require EIGRP to be running in the core.

B.  

They use RSVP to provide bandwidth for the tunnel.

C.  

They are run over Ethernet cores only.

D.  

The headend and tailend routes of the tunnel must have a BGP relationship

E.  

They are unidirectional

Discussion 0
Questions 120

Refer to the exhibit:

Which statement about this configuration is true"?

Options:

A.  

It requires an explicit Cisco MPLS TE path to be configured for the tunnel to run

B.  

It requires OSPF to also be running to have optimized Cisco MPLS TE tunnels

C.  

It requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run

D.  

It is the configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing

Discussion 0
Questions 121

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-

R1 and R2 are having issues forming an eBGP neighbor relationship. Troubleshoot and resolve the issue to achieve these goals:

1. Configure R1 and R2 to form a BGP neighborship using their Loopback interfaces.

2. Form the neighbor relationship using a BGP multihop mechanism. Use minimal values to solve the issue.

Options:

Discussion 0
Questions 122

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 123

Refer to the exhibit.

A network engineer Is implementing OSPF multiarea. Which command on interface G0/1 resolves adjacency Issues in the new area?

Options:

A.  

Ip ospf network broadcast

B.  

Ip ospf network non-broadcast

C.  

Ip ospf network polnt-to-multlpoint

D.  

Ip ospf network point-to-point

Discussion 0
Questions 124

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.  

Router 1 drops all traffic with a local-preference set to 150

B.  

All traffic is dropped

C.  

All traffic to 192.168.1.0/24 is dropped

D.  

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Discussion 0
Questions 125

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

Options:

A.  

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.  

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.  

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.  

Static routes on CE routers allow route leakage from a PE global routing table

Discussion 0
Questions 126

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements:

Session protection is provided for core loopback IP addresses only.

The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails.

Which configuration must the team implement on PE-XR1?

Options:

A.  

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

B.  

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

C.  

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

D.  

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

Discussion 0
Questions 127

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services For which reason do you make this decision?

Options:

A.  

It enables you to choose whether to separate or centralize each individual service.

B.  

It is easier to manage a system in which services are mixed

C.  

It requires only one edge router

D.  

It enables EGP and IGP to operate independently

Discussion 0
Questions 128

A network engineer has configured TE tunnels in the MPLS provider core. Which two steps ensure traffic traverse? (Choose two.)

Options:

A.  

Static routes is the only option for directing traffic into a tunnel.

B.  

ECMP between tunnels allows RSVP to function correctly.

C.  

Forwarding adjacency features allows a tunnel to be Installed in the IGP table as a link.

D.  

The IGP metric of a tunnel is configured to prefer a certain path

E.  

A tunnel weight is configured in SPF database the same way as a native link.

Discussion 0
Questions 129

Refer to the exhibit:

An engineer wants to authenticate the OSPF neighbor between PEA and PE-B using MD5.

Which command on PE-B successfully completes the configuration?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 130

Refer to the exhibit:

A network engineer is implementing a BGP routing policy.

Which effect of this configuration is true?

Options:

A.  

All traffic that matches acl10 is allowed without any change to its local-preference

B.  

All traffic that matches acl10 is dropped without any change to its local-preference

C.  

If traffic matches acl10, it is allowed and its local-preference is set to 300

D.  

All traffic is assigned a local-preference of 30O regardless of its destination

Discussion 0
Questions 131

SIMULATION 4

Options:

Discussion 0
Questions 132

What are two factors to consider when implementing NSR High Availability on an MPLS PE router? (Choose two.)

Options:

A.  

It consumes more memory and CPU resources than NSF

B.  

It operates normally without NSR support on the PE peers.

C.  

It requires all PE-CE sessions to support NSR

D.  

It requires routing protocol extensions

E.  

It cannot sync state information across redundant RPs

Discussion 0
Questions 133

Refer to the exhibit. An engineer is configuring IS-IS on ISP network. Which IS-IS configuration must an engineer implement on router AGG1 so that it establishes connectivity to router AGG6 via the BB3 core router?

Options:

A.  

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-2

B.  

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-2

C.  

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-1

D.  

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-1

Discussion 0
Questions 134

The service provider is serving hosts with two different multicast streams from source X and source Y. Source X is multicast group 224.0.0.0/8, and source Y is multicast group 226.0.0.0/8. Multicast source X should send its stream through bidirectional RP address 10.20.1.1, and multicast source Y should send its stream through RP address 10.20.2.1. Which configuration meets these requirements?

Options:

A.  

Enable ip pim ssm default on RA and RB.

B.  

Add ip pim bidir-enable in global mode on R

B.  

C.  

Permit the source X and source Y IP addresses in the access list on RB.

D.  

Set PIM sparse mode with a static RP address of 10.20.2.1 on RA and RC.

Discussion 0