350-501: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) Part 1
Question #: 1
Topic #: 1
DRAG DROP –
Drag and drop the OSs from the left onto the correct descriptions on the right.
Select and Place:
Suggestion Answer:
Question #: 2
Topic #: 1
Refer to the exhibit. P3 and PE4 are at the edge of the service provider core and serve as ABR routers. Aggregation areas are on either side of the core.
Which statement about the architecture is true?
A. To support seamless MPLS, the BGP route reflector feature must be disabled.
B. If each area is running its own IGP, BGP must provide an end-to-end MPLS LSP.
C. If each area is running its own IGP, the ABR routers must redistribute the IGP routing table into BGP.
D. To support seamless MPLS, TDP must be used as the label protocol.
Selected Answer: B
Question #: 3
Topic #: 1
Which component is similar to an EVPN instance?
A. router distinguisher
B. MPLS label
C. IGP router ID
D. VRF
Selected Answer: D
Question #: 4
Topic #: 1
Why do Cisco MPLS TE tunnels require a link-state routing protocol?
A. The link-state database provides segmentation by area, which improves the path-selection process.
B. The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID.
C. Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel.
D. The tunnel endpoints use the link-state database to evaluate the entire topology and determine the best path.
Selected Answer: C
Question #: 5
Topic #: 1
Refer to the exhibit. BGPsec is implemented on R1, R2, R3, and R4. BGP peering is established between neighboring autonomous systems.
Which statement about implementation is true?
A. BGP updates from the iBGP peers are appended with a community of local-as.
B. BGP updates from the all BGP peers are appended with a community of no-export.
C. BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator.
D. BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature.
Selected Answer: D
Question #: 6
Topic #: 1
You are configuring MPLS traffic-engineering tunnels in the core. Which two ways exist for the tunnel path across the core? (Choose two.)
A. The dynamic path option is supported only with IS-IS.
B. Tunnels can be configured with dynamic path or explicitly defined path.
C. A zero bandwidth tunnel is not a valid option.
D. The bandwidth statement creates a ג€hardג€ reservation on the link.
E. Tunnel links inherit IGP metrics by default unless overridden.
Selected Answer: BE
Question #: 7
Topic #: 1
Which configuration mode do you use to apply the mpls ldp graceful-restart command in IOS XE Software?
A. MPLS LDP neighbor
B. interface
C. MPLS
D. global
Selected Answer: D
Question #: 8
Topic #: 1
After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services.
For which reason do you make this decision?
A. It enables EGP and IGP to operate independently.
B. It enables you to choose whether to separate or centralize each individual service.
C. It is easier to manage a system in which services are mixed.
D. It requires only one edge router.
Selected Answer: A
Question #: 9
Topic #: 1
Which statement about the Cisco MPLS TE forwarding adjacency feature is true?
A. It enables the MPLS core to use EIGRP as the routing protocol.
B. It enables the Cisco MPLS TE tunnel to be advertised into the running IGP.
C. It enables the tailend router to advertise routes to the headend router over the tunnel.
D. It enables the headend and tailend routers to establish a bidirectional tunnel.
Selected Answer: B
Question #: 10
Topic #: 1
While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.
After you issue this command, which BGP packets does the PE accept?
A. to 2.2.2.2, with a TTL of 2 or more
B. from 2.2.2.2, with a TTL of less than 2
C. to 2.2.2.2, with a TTL of less than 253
D. from 2.2.2.2, with a TTL of 253 or more
Selected Answer: D
Question #: 11
Topic #: 1
Refer to the exhibits. Which information is provided for traceback analysis when this configuration is applied?
A. source interface
B. packet size distribution
C. IP sub flow cache
D. BGP version
Selected Answer: A
Question #: 12
Topic #: 1
Refer to the exhibit. R1 is connected to two service providers and is under a DDoS attack.
Which statement about this design is true if URPF in strict mode is configured on both interfaces?
A. R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface.
B. R1 drops destination addresses that are routed to a null interface on the router.
C. R1 permits asymmetric routing as long as the AS-PATH attribute entry matches the connected AS.
D. R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Selected Answer: A
Question #: 13
Topic #: 1
Refer to the exhibit. Router 1 was experiencing a DDoS attack that was traced to interface gigabitethernet0/1.
Which statement about this configuration is true?
A. Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1.
B. Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface.
C. Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface.
D. Router 1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Selected Answer: C
Question #: 14
Topic #: 1
Refer to the exhibit. An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?
A. Router 2 is the router receiving the DDoS attack.
B. Router 1 must be configured with uRPF for the RTBH implementation to be effective.
C. Router 1 is the trigger router in a RTBH implementation.
D. Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Selected Answer: C
Question #: 15
Topic #: 1
Which additional feature does MPLS DiffServ tunneling support?
A. matching EXP and DSCP values
B. PHB layer management
C. using GRE tunnels to hide markings
D. interaction between MPLS and IGP
Selected Answer: B
Question #: 16
Topic #: 1
You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tailend router?
A. path
B. tear
C. error
D. reservation
Selected Answer: A
Question #: 17
Topic #: 1
Which statement describes the advantage of a Multi-Layer control plane?
A. It provides multivendor configuration capabilities for Layer 3 to Layer 1.
B. It automatically provisions, monitors, and manages traffic across Layer 0 to Layer 3.
C. It supports dynamic wavelength restoration in Layer 0.
D. It minimizes human error configuring converged networks.
Selected Answer: B
Question #: 18
Topic #: 1
DRAG DROP –
Drag and drop the technologies from the left onto the correct definitions on the right.
Select and Place:
Suggestion Answer:
Question #: 19
Topic #: 1
Refer to the exhibit. An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?
A. Router 1 and Router 2 advertise the route to 192.0.2.0 to all BGP peers.
B. All traffic to 192.168.1.0/24 is dropped.
C. All traffic is dropped.
D. Router 1 drops all traffic with a local-preference set to 150.
Selected Answer: B
Question #: 20
Topic #: 1
Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?
A. The Internet gateway router is connected as a PE router to the MPLS backbone.
B. The CE router supports VRF-Lite and the full BGP routing table.
C. The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN.
D. The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway.
Selected Answer: D
Question #: 21
Topic #: 1
Which configuration enables BGP FlowSpec client function and installation of policies on all local interfaces?
A. flowspec address-family ipv4 local-install interface-all
B. flowspec address-family ipv4 install interface-all local
C. flowspec address-family ipv4 install interface-all
D. flowspec address-family ipv4 local-install all-interface
Selected Answer: A
Question #: 22
Topic #: 1
Refer to the exhibit. A network engineer is configuring customer edge routers to finalize a L2VPN over MPLS deployment. Assume that the AToM L2VPN service that connects the two CEs is configured correctly on the service provider network.
Which action causes the solution to fail?
A. OSPF does not work with L2VPN services.
B. The routing protocol network types are not compatible.
C. A loopback with a /32 IP address has not been used.
D. The xconnect statement has not been defined.
Selected Answer: B
Question #: 23
Topic #: 1
An engineer working for telecommunication company needs to secure the LAN network using a prefix list.
Which best practice should the engineer follow when he implements a prefix list?
A. An engineer must identify the prefix list with a number only.
B. The final entry in a prefix list must be /32.
C. An engineer must include only the prefixes for which he needs to log activity.
D. An engineer must use nonsequential sequence numbers in the prefix list so that he can insert additional entries later.
Selected Answer: D
Question #: 24
Topic #: 1
Refer to the exhibit. Which effect of this configuration is true?
A. It enables MPLS on the interface.
B. It creates a pseudowire class named cisco.
C. It enables AToM on interface gigabitethernet1/0.
D. It enables tagging for VLAN 12 on the interface.
Selected Answer: C
Question #: 25
Topic #: 1
Refer to the exhibit. Which three outcomes occur if the prefix list is added to the neighbor? (Choose three.)
A. 192.168.0.0/16 is denied.
B. 192.168.0.0/16 is permitted.
C. 192.168.0.0/19 is permitted
D. 192.168.0.0/19 is denied.
E. 192.168.0.0/17 is permitted
F. 192.168.0.0/17 is denied.
Selected Answer: ACE
Question #: 26
Topic #: 1
DRAG DROP –
Drag and drop the descriptions from the left onto the corresponding OS types on the right.
Select and Place:
Suggestion Answer:
Question #: 27
Topic #: 1
What does DWDM use to combine multiple optical signals?
A. IP protocols
B. wavelength
C. time slots
D. frequency
Selected Answer: B
Question #: 28
Topic #: 1
Refer to the exhibit. A network operator recently configured BGP FlowSpec for the internal IT network. What will be inferred from the configuration deployed on the network?
A. The policy is configured locally on CSR1 and drops all traffic for TCP ports 80 and 443
B. The policy is configured locally on CSR1 and currently has no active traffic
C. The policy is learned via BGP FlowSpec and drops all traffic for TCP ports 80 and 443
D. The policy is learned via BGP FlowSpec and has active traffic
Selected Answer: D
Question #: 29
Topic #: 1
Refer to the exhibit. Which type of DDoS attack will be mitigated by this configuration?
A. teardrop attack
B. smurf attack
C. SYN flood
D. SIP INVITE flood attacks
Selected Answer: D
Question #: 30
Topic #: 1
Refer to the exhibit. While troubleshooting the network, a network operator with an employee id: 1234:55:678 is trying to ping XR1. Which result should the operator expect when trying to ping to an XR1 local address?
A. AII ICMP traffic is dropped
B. AII ICMP traffic responds successfully
C. ICMP traffic works at a policed rate of 19 bytes per second every 100 ms
D. ICMP traffic works at a policed rate of 19 packets every 100 ms
Selected Answer: A
Question #: 31
Topic #: 1
Refer to the exhibit. Which show command should be implemented to display per-interface statistics about uRPF drops and suppressed drops?
A. show cef interface
B. show ip traffic
C. show ip interface
D. show ip interface brief
Selected Answer: C
Question #: 32
Topic #: 1
Refer to the exhibit. What is the result of this configuration?
A. Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization
B. Router 1 and the TACACS+ server maintain one open connection between them only when network administrator is accessing the router with password ciscotest
C. Router 1 and the TACACS+ server maintain one open connection between them
D. Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authentication
Selected Answer: C
Question #: 33
Topic #: 1
Which QoS model allows hosts to report their QoS needs to the network?
A. IntServ
B. CB-WFQ
C. DiffServ
D. MQC
Selected Answer: A
Question #: 34
Topic #: 1
Refer to the exhibit. Which show command shows statistics for the control plane policy and is used to troubleshoot?
A. show control-plane CoPP
B. show policy control-plane
C. show control-plane
D. show policy-map control-plane
Selected Answer: D
Question #: 35
Topic #: 1
Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)
A. Configure an IP domain name.
B. Configure ACL 100 to permit access to port 22.
C. Configure a password under the vty lines.
D. Configure crypto keys.
E. Configure service password encryption.
Selected Answer: AD
Question #: 36
Topic #: 1
Refer to the exhibit. To protect in-band management access to CPE-R7, an engineer wants to allow only SSH management and provisioning traffic from management network 192.168.0.0/16. Which infrastructure ACL change must be applied to router PE-R9 to complete this task?
A. ip access-list extended INFRA-ACL 15 permit tcp 192.168.0.0 0.0.255.255 range 49152 65535 100.64.0.0 0.31.255.255 eq 443
B. ip access-list extended INFRA-ACL no 10 15 permit tcp 192.168.0.0 0.0.255.255 range 49152 65535 100.64.0.0 0.31.255.255 eq 22
C. ip access-list extended INFRA-ACL 15 permit tcp 192.168.0.0 0.0.255.255 range 49152 65535 100.64.0.0 0.31.255.255 eq 22
D. ip access-list extended INFRA-ACL no 10 15 permit tcp 192.168.0.0 0.0.255.255 eq 22 100.64.0.0 0.31.255.255 eq 22
Selected Answer: B
Question #: 37
Topic #: 1
Refer to the exhibit. A network engineer notices that router R2 is failing to install network 172.16.33.1/32 in the routing table. Which configuration must the engineer apply to R2 to fix the problem?
A. R2(config)# access-list 1 permit 172.16.33.0 0.0.0.255
B. R2(config)# access-list 1 permit 172.16.33.0 255.255.0.0
C. R2(config)# access-list 1 permit 172.16.33.0 255.255.255.0
D. R2(config)# access-list 1 permit 172.16.33.0 255.0.0.0
Selected Answer: C
Question #: 38
Topic #: 1
Which two PHY modes are available to implement an IOS XR 10 Gigabit Ethernet interface? (Choose two.)
A. LAN
B. SONET
C. MAN
D. WAN
E. WDWM
Selected Answer: AD
Question #: 39
Topic #: 1
Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR Software?
A. routing configuration mode
B. BGP neighbor configuration mode
C. global configuration mode
D. BGP address-family configuration mode
Selected Answer: C
Question #: 40
Topic #: 1
A remote operation center is deploying a set of I-BGP and E-BGP connections for multiple IOS-XR platforms using the same template. The I-BGP sessions exchange prefixes with no apparent issues, but the E-BGP sessions do not exchange routes. What causes this issue?
A. The I-BGP neighbors are mistyped and HELLO packets cannot be exchanged successfully between routers.
B. The E-BGP neighbors are not allowed to exchange Information due to the customer platform’s default policy.
C. A PASS ALL policy has not been implemented for the I-BGP neighbors.
D. The next-hop-self command is not implemented on both E-BGP neighbors.
Selected Answer: B
Question #: 41
Topic #: 1
Refer to the exhibit. An engineer is securing a customer’s network. Which command must the engineer use to complete this configuration to prevent a DoS attack?
A. neighbor ttl-security
B. ebgp-multihop
C. neighbor ebgp-multihop
D. ttl-security
Selected Answer: D
Question #: 42
Topic #: 1
What is the function of the FEC field within the OTN signal structure?
A. It allows the sending devices to apply QoS within the OTN forwarding structure.
B. It allows deep inspection of data payload fields.
C. It allows receivers to correct errors upon data arrival
D. It allows source nodes to discard payload errors before transmitting data on the network.
Selected Answer: A
Question #: 43
Topic #: 1
A customer of an ISP requests support to setup a BGP routing policy. Which BGP attribute should be configured to choose specific BGP speakers as preferred points for the customer AS?
A. lowest multi-exit discriminator
B. highest local preference outbound
C. lowest local preference inbound
D. highest local preference inbound
Selected Answer: D
Question #: 44
Topic #: 1
Which three OSPF parameters must match before two devices can establish an OSPF adjacency? (Choose three.)
A. IP address
B. subnet mask
C. interface cost
D. process ID
E. area number
F. hello timer setting
Selected Answer: BEF
Question #: 45
Topic #: 1
Refer to the exhibit. Which condition must be met by the OSPF peer of router R1 before the two devices can establish communication?
A. The OSPF peer must use clear-text authentication.
B. The OSPF peer must be configured as an OSPF stub router.
C. The interface on the OSPF peer may have a different key ID, but it must use the same key value as the configured interface.
D. The interface on the OSPF peer must use the same key ID and key value as the configured interface.
Selected Answer: D
Question #: 46
Topic #: 1
DRAG DROP –
Drag and drop the OSPF area types from the left onto the correct statements on the right.
Select and Place:
Suggestion Answer:
Question #: 47
Topic #: 1
Refer to the exhibit. Which statement about the neighbor statements for 192.168.1.1 is true?
A. The router sends BGP labels for its prefixes to this peer.
B. The router must have TDP configured for the send-label command to operate.
C. The neighbor router receives at least four labels from this router.
D. The router sends only a label for the prefix for Loopback0.
Selected Answer: A
Question #: 48
Topic #: 1
Refer to the exhibit. Which statement about the status of the neighbor relationship between R1 and R2 is true?
A. The neighbor relationship is down because the two routers are configured with different area types.
B. The neighbor relationship is down because the two routers are in the same subnet.
C. The neighbor relationship is up because R2 is level 1 and Ievel 2 router.
D. The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different areas.
Selected Answer: D
Question #: 49
Topic #: 1
Refer to the exhibit. Which configuration prevents the OSPF neighbor from establishing?
A. default-metric
B. duplex
C. network statement
D. mtu
Selected Answer: D
Question #: 50
Topic #: 1
Refer to the exhibit. R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed.
When the debug ip ospf hello command is issued on R1, these log messages are seen:
Which command can be configured on routers R1 and R2 on f0/0 interfaces to form OSPF adjacency?
A. ip ospf network point-to-multipoint non-broadcast
B. ip ospf network non-broadcast
C. ip ospf network broadcast
D. ip ospf network point-to-point
Selected Answer: C
Question #: 51
Topic #: 1
Which two tasks must you perform when you implement LDP NSF on your network? (Choose two.)
A. Enable NSF for BGP.
B. Implement direct connections for LDP peers.
C. Enable NSF for EIGRP.
D. Disable Cisco Express Forwarding.
E. Enable NSF for the link-state routing protocol that is in use on the network.
Selected Answer: AE
Question #: 52
Topic #: 1
Refer to the exhibit. Assume all other configurations are correct and the network is otherwise operating normally.
Which conclusion can you draw about the neighbor relationship between routers R1 and R2?
A. The neighbor relationship is up.
B. The neighbor relationship will be up only if the two devices have activated the correct neighbor relationships under the IPv4 address family.
C. The neighbor is down because the local-as value for R2 is missing in the R1 neighbor statement.
D. The neighbor relationship is down because R1 believes R2 is in AS 65012.
Selected Answer: D
Question #: 53
Topic #: 1
Refer to the exhibit Router R1 and its peer R2 reside on the same subnet in the network. If an engineer implements this configuration to R1, how does it make connections to R2?
A. R1 establishes TCP connections that are authenticated with a clear-text password.
B. R1 establishes UDP connections that are authenticated with an MD5 password.
C. R1 establishes UDP connections that are authenticated with a clear-text password.
D. R1 establishes TCP connections that are authenticated with an MD5 password.
Selected Answer: C
Question #: 54
Topic #: 1
Refer to the exhibit. Which two statements about the IS-IS topology are true? (Choose two.)
A. R1 and R4 are Level 2 neighbors.
B. All four routers are operating as Level 1-2 routers.
C. All four routers are operating as Level 2 routers only.
D. All four routers are operating as Level 1 routers only.
E. R1 and R2 are Level 2 neighbors.
Selected Answer: BE
Question #: 55
Topic #: 1
Refer to the exhibits. R1 and R2 are directly connected and IS-IS routing has been enabled between R1 and R2. R1 generates the above log message periodically.
Based on this output, which statement is true?
A. IS-IS neighbor authentication is failing for Level 2 PDUs only.
B. IS-IS neighbor authentication is failing for Level 2 first and then for Level 1 PDUs.
C. IS-IS neighbor authentication is failing for Level 1 and Level 2 PDUs.
D. IS-IS neighbor authentication is failing for Level 1 PDUs only.
Selected Answer: A
Question #: 56
Topic #: 1
Which BGP attribute is used first when determining the best path?
A. origin
B. AS path
C. local preference
D. weight
Selected Answer: C
Question #: 57
Topic #: 1
Refer to the exhibit. An engineer wants to authenticate the OSPF neighbor between PE-A and PE-B using MD5.
Which command on PE-B successfully completes the configuration?
A. PE-B(config-if)#ip ospf message-digest-key 1 md5 44578611 PE-B(config-if)#ip ospf authentication null
B. PE-B(config-if)#ip ospf message-digest-key 1 md5 44578611 PE-B(config-if)#ip ospf authentication key-chain 44578611
C. PE-B(config-if)#ip ospf message-digest-key 1 md5 44568611 PE-B(config-if)#ip ospf authentication null
D. PE-B(config-if)#ip ospf message-digest-key 1 md5 44578611 PE-B(config-if)#ip ospf authentication message-digest
Selected Answer: D
Question #: 58
Topic #: 1
DRAG DROP –
Drag and drop each NAT64 description from the left onto the correct NAT64 type on the right.
Select and Place:
Suggestion Answer:
Question #: 59
Topic #: 1
DRAG DROP –
Drag and drop the functionalities from the left onto the correct target fields on the right.
Select and Place:
Suggestion Answer:
Question #: 60
Topic #: 1
How much must the MTU be increased when configuring the 802.1q VLAN tag?
A. 2 bytes
B. 4 bytes
C. 8 bytes
D. 12 bytes
Selected Answer: B