Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Exam Practice Test

Page: 1 / 55
Total 547 questions

Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 2

How do PE routers operate with the MDT in a multicast VPN?

Options:

A.

When the sending PE router recognizes that multicast data has exceeded the bandwidth threshold, it creates a data MDT and sends a UDP message to all routers using the default MDT.

B.

After the default MDT and BGP VPNv4 neighbor is configured, a different PE neighbor in the IPv6 MDT address family is configured automatically for migrating to MDT SAFI.

C.

When the source PE router establishes adjacency using PIM SM mode in the default MDT, the receiving PE requests information about the source PE for BGP advertisement.

D.

The default MDT uses PIM sparse mode and PIM establishes adjacency over the shortest path tree toward the destination PE router.

Question 3

What is the primary purpose of Secure ZTP?

Options:

A.

to securely and seamlessly encrypt traffic across the entire network

B.

to provide real-time threat detection and mitigation for devices in the network

C.

to automate the secure provisioning of network devices during initial deployment

D.

to provide secure remote access to network devices for management and troubleshooting

Question 4

Refer to the exhibit.

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Options:

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Question 5

A company is expanding its existing office space to a new floor of the building, and the networking team is installing a new set of switches. The new switches are running IGMPv2, and the engineers configured them for VLAN10 only. The rest of the existing network includes numerous Layer 2 switches in multiple other VLANs, all running IGMPv3. Which additional task must the team perform when deploying the new switches so that traffic is switched correctly through the entire network?

Options:

A.

Configure the new switches to use IGMPv3 on all VLANs on the network.

B.

Configure all switches on the network to support IGMPv2 and IGMPv3 on all VLANs on the network.

C.

Configure the new switches to use IGMPv3 on VLAN10 only.

D.

Configure all switches on the network to support IGMPv2 and IGMPv3 on VLAN10 only.

Question 6

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

Options:

Question 7

Refer to the exhibit.

An engineer is configuring two routers to support MPLS LDP sessions between them. The R1 configuration is complete, and work has started on R2 as shown. Which additional configuration must the engineer apply to R2 to complete the task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 8

You are testing the capabilities of MPLS OAM ping.

Which statement is true?

Options:

A.

MPLS OAM ping works solely with Cisco MPLS TE

B.

MPLS OAM ping works solely with P2P LSPs

C.

An LSP breakage results in the ingress MPLS router never receiving any reply

D.

An LSP is not required for the reply to reach the ingress MPLS router

Question 9

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 10

How is a telemetry session established for data analytics?

Options:

A.

A router initiates a session using the dial-out to a destination.

B.

A destination initiate a session to a router.

C.

The destination initiate a session using the dial-out more to the router.

D.

A router requests the data using Teinet.

Question 11

Which service is a VNF role?

Options:

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Question 12

A network team has failed to implement IS-IS multitopology. What is the reason for it?

Options:

A.

The router did not support VRFs.

B.

The routing process did not support extended metrics.

C.

The router did not have Cisco Discovery Protocol and Cisco Express Forwarding disabled.

D.

The routing process supported Level 1 only.

Question 13

Refer to the exhibit.

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

What is the difference between SNMP and model-driven telemetry?

Options:

A.

Telemetry allows for modeled network data to be pushed to the network administrator on an as-needed basis

B.

Telemetry uses traps and inform messages to deliver data to a network administrator on a polling basis

C.

SNMP uses the YANG data modeling language

D.

SNMP pushes network data to the network administrator whenever it is queried

Question 15

Refer for the exhibit. To optimize network operations, the senior architect created this Python 3.9 script for network automation tasks and to leverage Ansible 4.0 playbooks. Devices In the network support only RFC 2617-based authentication What does the script do?

Options:

A.

The script logs in via SSH and configures interface GigabitEthernetO/1 with IP address 10.1.131.112/30.

B.

The script leverages REST API calls and configures Interface GlgabilEthemet0/1 with IP address 10.1.131.112/30.

C.

The script performs a configuration sanity check on the device with IP address 172.168.211.65 via HTTP and returns an alert If the payload field falls to match.

D.

The script parses the JSON response from the router at IP address 172 168.211.65 and checks If the interface GigaWtEthernet0/1 with IP address 10.1.131.112 exists on the router.

Question 16

Refer to the exhibit.

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

Options:

A.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Question 17

Refer to the exhibit:

What is significant about the number 2 in the configuration?

Options:

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Question 18

Refer to the exhibit. The four PE routers in the network are connected and running OSPF to share routes. MPLS is enabled on the four routers. The routers are connected and configured to use /30 networks. A network engineer must implement Layer 3 VPN support for traffic between customer sites.

Which task must the engineer perform?

Options:

A.

Deploy IGP in the network to exchange intranet data between the PEs.

B.

Configure the devices to establish LDP neighbor relationships to share label information.

C.

Implement MPLS TE tunnels between each router to provide dedicated bandwidth for Layer 3 VPN traffic.

D.

Update the subnet between each router to a /24 prefix.

Question 19

Refer to the exhibit. Users in AS 65010 are connected with the application server in AS 65050 with these requirements:

AS 65010 users are experiencing latency and congestion to connect with application server 172.16.50.10.

AS 65030 must be restricted to become Transient Autonomous System for traffic flow.

Links connected to AS 65020 and AS 65040 are underutilized and must be used efficiently for traffic.

Which two configurations must be implemented to meet these requirements? (Choose two.)

Options:

A.

Apply the AS-Path route-map policy for traffic received from R3.

B.

Configure the route map to prepend the AS-Path attribute for R5-R3 BGP peering.

C.

Apply the MED route-map policy for traffic received from R4.

D.

Configure a higher Local preference for R5-R4 BGP peering.

E.

Configure the route map to set the MED 50 attribute for R5-R4 BGP peering.

Question 20

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

Options:

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Question 21

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

Options:

A.

bandwidth

B.

affinity

C.

explicit path

D.

SLRG

Question 22

Refer to the exhibit. The network operations team reported that the access site that is connected to R3 is not connecting to the application server in the data center and that all packets that are sent from the application server to the access site are dropped. The team verified that OSPF and BGP peerings are up in BGP AS 65101 and BGP AS 65201. R4 is expected to receive traffic from the application server route via OSPF. Which action resolves this issue?

Options:

A.

Remove the route-map on R4 when advertising 172.16.20.1 in BGP to R3.

B.

Advertise application server 172.16.20.1 in the OSPF routing table on R6.

C.

Allow 172.16.20.1 in the BGP advertisement on R3 in the route-map.

D.

Add the next-hop-self command on R6 to enable R3 iBGP peering.

Question 23

Refer to the exhibit.

The network engineer who manages ASN 65001 must configure a BGP routing policy on GW-XR1 with these requirements:

• Advertise locally-originated routes and /24 prefixes assigned within the 198.18.0.0/15 range. All other prefixes must be dropped.

• Reachability to 198.18.100.0/24 must be preferred via the EDGE-1 connection.

• Reachability to 198.19.100.0/24 must be preferred via the EDGE-2 connection.

Which configuration must the network engineer implement on GW-XR1?

Options:

A.

B.

C.

D.

Question 24

Refer to the exhibit.

An engineer implemented OSPF neighbor relationship on an IOS device. Which configuration must be applied to get the OR/BOR election removed from interfaces running OSPF?

Options:

A.

ip ospf network broadcast on interfaces running OSPF

B.

ip ospf network point-to-point on interfaces running OSPF

C.

ip ospf network multipoint-point on interfaces running OSPF

D.

ip ospf network non-broadcast on n:erfaces running OSPF

Question 25

Refer to the exhibit:

Which statement describes the effect of this configuration?

Options:

A.

It applies a service policy to all interfaces remarking HTTP traffic

B.

It creates an ACL named WEB that filters HTTP traffic.

C.

It matches HTTP traffic for use in a policy map

D.

It modifies the default policy map to allow all HTTP traffic through the router

Question 26

Refer to the exhibit. Customers report occasional forwarding issues from hosts connected to R6 to hosts connected to R1. A network engineer has just updated the MPLS configuration on the network, and a targeted LDP session has been established between R1 and R5. Which additional task must the engineer perform so that the team can identify the path from R6 to R1 in case the forwarding issues continue?

Options:

A.

Configure an MPLS TE from R4 to R1 that routes through R5.

B.

Implement MPLS OAM within the network.

C.

Implement MPLS VPLS within the network.

D.

Configure MPLS LDP Sync on each router.

Question 27

Company A must increase throughput between two non-IEEE 802.3ad switches located in the access and distribution layers. A network engineer must create a link group with the same speed and duplex. The STP protocol must not block any of the group ports. Which action completes the implementation?

Options:

A.

Group Ethernet interfaces with mode desirable under the physical interfaces.

B.

Enable Port Aggregation Protocol with mode auto under the logical group interface.

C.

Configure a group logical interface with mode active enabled.

D.

Bundle the physical interfaces with mode lacp configured on each of them.

Question 28

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

Options:

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Question 29

Which statement about Network Services Orchestrator (NSO) is true?

Options:

A.

It is used only in service provider environments

B.

It can be used only with XML coding

C.

It uses YANG modeling language to automate devices

D.

It must use SDN as an overlay for addressing

Question 30

Refer to the exhibit. A network engineer with an employee ID 4379:43:595 is setting up an IS-IS network with these requirements:

    Routes with a tag of 80 and IP prefixes other than 192.168.10.20/24 must be redistributed from Level 1 into Level 2.

    Route leaking must be configured from Level 2 into the Level 1 domain for routes that are tagged with only 50 or 40.

Which configuration must be implemented on RB to meet the requirements?

Options:

A.

Add match tag 80 in route-map Ieak2-1

B.

DUMPS Add match ip address 152 in route-map redist1-2

C.

Remove match tag 40 from route-map Ieak2-1

D.

Change match tag 80 to match tag 50 in route-map redist1-2.

Question 31

Refer to the exhibit.

What is the effect of this configuration?

Options:

A.

R1 supports a graceful restart operation on the peer, even if graceful restart is disabled on the peer.

B.

R1 supports a peer that is configured for LDP SSO/NSF as the peer recovers from an outage.

C.

R1 failovers only to a peer that is configured for LDP SSO/NSF.

D.

R1 failovers to any peer.

Question 32

Refer to the exhibit.

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 33

Refer to the exhibit. ISP_A is about to launch a new internet service. ISP_A is already providing MPLS VPN Layer 3 services to Customer_A and Customer_B, which are connected to ISP_A via OSPF. A network engineer completed the BGP and VRF configurations on R2 to support the new internet service. Which additional action completed the launch?

Options:

A.

Implement the BGP routing protocol in the customer VRFs on R1 and R2

B.

Import route-target 62:101 into the customer VRFs on R1 and R3.

C.

Enable the route-replicate command under the customer VRFs on R1 and R2

D.

Activate NAT CE in the customer VRFs on R1. R2. and R3.

Question 34

Refer to the exhibit. Tier 1 ISP A purchased several Tier 2 ISPs to increase their customer base and provide more regional coverage. ISP A plans to implement MPLS services in the access layer, with scalability up to 100.000 devices In one packet network and service recovery up to 50 ms. The network architect decided to use different independent IGP and LDP domains and interconnect LSPs that are based on RFC 3107. Which two actions must the network engineer perform to meet the requirements? (Choose two.)

Options:

A.

Implement BGP PIC core functionality on routers R2 and R3.

B.

Configure three OSPF areas, with Area 0 In the core domain, and Areas 2 and 3 in the aggregation domain.

C.

Implement BGP connectivity between routers R1 and R4 with VPNv4 address family enabled.

D.

Implement BGP inline RR functionality with next-hop-self capabilities on routers R2 and R3.

E.

Implement the IS-IS routing protocol on the access domain.

Question 35

Which module refers to the network automation using Ansible?

Options:

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Question 36

Refer to the exhibit.

Which two topology changes happen to the IS-IS routers? (Choose two.)

Options:

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

R1 and R4 are Level 2 neighbours.

D.

R1 and R2 are Level 2 neighbours.

E.

All four routers are operating as Level 1-2 routers.

Question 37

What is a primary benefit of IPoATM or MPLS over ATM backbone service provider networks?

Options:

A.

dedicated circuits

B.

variable-length packets

C.

isochronous system

D.

fixed-length cells

Question 38

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

Options:

A.

Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel

B.

The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID

C.

The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path

D.

The link state database provides segmentation by area, which improves the path-selection process

Question 39

Refer to the exhibit. An engineer is configuring IS-IS on ISP network. Which IS-IS configuration must an engineer implement on router AGG1 so that it establishes connectivity to router AGG6 via the BB3 core router?

Options:

A.

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-2

B.

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-2

C.

router isis 100

metric-style narrow

interface GigabitEthernet 3

isis metric 10 level-1

D.

router isis 100

metric-style wide

interface GigabitEthernet 3

isis metric 1500 level-1

Question 40

Refer to the exhibit.

A network operator working for a telecommunication company with an employee ID: 4350:47:853 must implement an IGP solution based on these requirements:

• Subnet 10.50.10.0 traffic must exit through the R1 router to connect with the Syslog server.

• Subnet 10.50.20.0 traffic must exit through the R2 router to connect with the NTP server.

• In case of link failure between R2 and R4, traffic must be routed via R1 and R3.

Which two configurations must be implemented on R5 to meet these requirements? (Choose two.)

Options:

A.

Apply a route policy to redistribute 10.50.0.0 prefixes in OSPF to ISIS and ISIS to OSPF.

B.

Apply a route policy to redistribute 10.50.20.0 from ISIS-L2 to OSPF Area 0 at a higher cost.

C.

Enable a route policy to advertise 10.50.20.0 in ISIS-L2 at a higher cost.

D.

Apply a route policy to redistribute 10.50.10.0 from OSPF Area 0 to ISIS-L2 at a lower cost.

E.

Enable a route policy to advertise 10.50.10.0 In OSPF Area 0 at a low cost.

Question 41

Refer to the exhibit.

An engineer with an employee 10:4350:47:853 is implementing IS-IS as the new routing protocol in the network. All routers in the network operate as Level 2 routers in the same private autonomous system, and the three branches are connected via dark fibre. The engineer has already implemented IS-IS on router R1 with NET address 49.0133.532b.ca14.6915.21311.F40F.1B3a.ba10.00. Which IS-IS NET address configuration must be implemented on R3 to establish IS-IS connectivity?

Options:

A.

49.0133.532b.ca14.6915.21311.f40f.1b4a.bb87.00

B.

49.0135.332b.ca14.6975.28371.1721.1b3b.ca11.10

C.

48.0133.532b.ca14.6915.21311.f40f.1626.bb98.00

D.

49.0133.532b.ca14.6915.21311.1721.1b4a.0013.01

Question 42

Refer to the exhibit:

Which statement supports QPPB implementation?

Options:

A.

QoS policies are identified in the MPLS forwarding table

B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

C.

QoS policies use BGP to gain full coverage on the network.

D.

QPPB policies affect only egress traffic

Question 43

What do Ansible and Salt Stack have in common?

Options:

A.

They both use DSL configuration language

B.

They both use YAML configuration language

C.

They both have agents running on the client machine

D.

They both can be designed with more than one master server

Question 44

Refer to the exhibit.

An engineer is implementing Auto-RP and reviewing the configuration of the PE-A. Which configuration permits Auto-RP messages to be forwarded over this interface?

Options:

A.

PE-A(config-if)#ip pim sparse-mode

B.

PE-A(config-if)#no ip pim bsr-border

C.

PE-A(config-if)#ip igmp version 3

D.

PE-A(config-if)#ip pim sparse-dense-mode

Question 45

Refer to the exhibit.

A network operator has two IPv4 and IPv6 dual-stacked network on each side of the IPv4 core network. The operator must be able to provide connectivity between them while using specific assigned IPv6 space provided from the company IP administrator team. Which technology should the network operator use to accomplish this goal?

Options:

A.

6rd

B.

NAT46

C.

DS-Lite

D.

NAT44

Question 46

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

Options:

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Question 47

Refer to the exhibit.

A network engineer is implementing OSPF multiarea. Which command on interface GO/1 resolves adjacency issues in the new area?

Options:

A.

ip ospf network broadcast

B.

ip ospf network point-to-point

C.

ip ospf network non-broadcast

D.

ip ospf network point-to-multipoint

Question 48

What are the two uses of the YANG data modeling language? (Choose two.)

Options:

A.

It is used to access a device by HTTP.

B.

It Is used to model the configuration used by NETCONF operations.

C.

It is used to shape state data of network elements.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

E.

It is used to replace the OSI model for troubleshooting.

Question 49

Refer to the exhibit:

Which statement describes this configuration?

Options:

A.

Router 1 has its running configuration locked so changes can be made only when the administrator issues a kill session

B.

Router 1 can be remotely managed by the CLI using Telnet

C.

Router 1 has a new data store to collect SNMP information, but configuration must still be done at the CLI only

D.

Router 1 has a temporary data store where a copy of the running configuration can be manipulated and verified before committing the configuration

Question 50

Refer to the exhibit.

An engineer has started to configure a router for OSPF, as shown Which configuration must an engineer apply on the network so that area 15 traffic from R5 to R1 will prefer the route through R4?

Options:

A.

Place the link between R3 and R5 in a stub area to force traffic to use the route through R4.

B.

Increase the cost on the link between R2 and R4, to influence the path over R3 and R4.

C.

Implement a multiarea adjacency on the link between R2 and R4, with the cost manipulated to make the path through R4 preferred.

D.

Implement a sham link on the between R3 and R2 to extend area 0 area 15.

Question 51

What are two characteristics of MPLS TE turrets? (Choose two)

Options:

A.

They require EIGRP to be running in the core.

B.

They use RSVP to provide bandwidth for the tunnel.

C.

They are run over Ethernet cores only.

D.

The headend and tailend routes of the tunnel must have a BGP relationship

E.

They are unidirectional

Question 52

After recent network outages and customer complaints, a large Tier 1 service provider has asked a network engineer to implement MPLS OAM policy on all Provider Edge devices in the MPLS network. To improve network performance and reliability, the policy must be able to detect 2% packet drops and a delay of 0.05 seconds. The solution must be based on RFC 6374 and RFC 4379 standards for MPLS OAM. The CCM to detect connectivity issues has already been configured with interval 1000. Which two actions must the engineer take to achieve the goal? (Choose two.)

Options:

A.

Set loopback delay-frequency 50 and drop-threshold 0.2 on the PE routers.

B.

Implement mpls ldp tracing on the PE and P routers.

C.

Implement mpls oam policy oam on the PE routers.

D.

Implement mpls ip oam map-policy on the PE routers.

E.

Set loss-threshold 2 and delay-threshold 50 on the P routers.

Question 53

Refer to the exhibit:

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Question 54

Refer to the exhibit.

Which show command should be implemented to display per-interface statistics about uRPF drops and suppressed drops?

Options:

A.

show ip traffic

B.

showip interface

C.

show cef interface

D.

show ip interface brief

Question 55

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

Options:

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Question 56

Simulation 5

Options:

Question 57

Refer to the exhibit A user is performing QoS marking on internet traffic and sending it with IPv4 and IPv6 headers on the provider edge device PE1. IPv4 traffic is classified with DSCP 4 and IPv6 traffic is classified with DSCP 6. Which action must the engineer take to begin implementing a QoS configuration on PE1 for the IPv6 traffic?

Options:

A.

Create an access list that includes any IPv6 traffic and apply it to CM-20.

B.

Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM-10 and CM-20.

C.

Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.

D.

Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.

Question 58

How does SR policy operate in Segment Routing Traffic Engineering?

Options:

A.

An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid candidate path for the policy.

B.

When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router drops all traffic that is steered into the SR policy.

C.

When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based according to the qualified cost of each SID-list.

D.

An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match the entry to the SR policy SID-list.

Question 59

A network operator working for a telecommunication company with an employee Id: 4065 96080 it trying to implement BFD configuration on an existing network of Cisco devices Which task must the engineer perform to enable BFD on the interfaces?

Options:

A.

Disable Cisco Express Forwarding on the interfaces

B.

Disable SSO on the interfaces

C.

Remove any static routes that point to the interfaces

D.

Remove the log option from any ACLs on the interfaces.

Question 60

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

Options:

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.

Static routes on CE routers allow route leakage from a PE global routing table

Question 61

A network engineer must enable multicast on the network to support a new series of webcasts. The PIM protocol has been enabled on the LAN side, with PIM and MSDP capabilities on edge router R1. The multicast source has been configured with IP address FF3A:121, and IP protocol 58 has been enabled and successfully tested in the network. Due to the limitations of some devices on the network, the data flow should take the most efficient path.

Which task must the engineer perform to achieve the goal?

Options:

A.

Enable PIM BSR on R1.

B.

Implement Anycast RP on R1.

C.

Implement PIM-SM in the LAN.

D.

Enable PIM-SSM across the network.

Question 62

Which function does orchestrated fulfillment perform under the Cisco Network Services Orchestrator model?

Options:

A.

It maintains the service topology in an inventory system to enable accurate assessment of service impact and support root-cause analysis.

B.

It translates the networking service high-level intent into device configurations, and pushes the configurations to physical and virtual devices.

C.

It leverages open-source NFV components such as OpenStack virtual infrastructure manager and Open vSwitch to create necessary service chains among VNFs.

D.

It instantiates virtual test probes to perform activation testing and provide ongoing measurement of service KPIs against defined SLAs.

Question 63

In an EVPN operation, how does the PE determine and advertise Ethernet segment reachability?

Options:

A.

The PE discovers the remote PEs in the EVI and builds a flood list linked with the EVI.

B.

The PE discovers and shared routing information for the B-MAC addresses associated with local Ethernet segments.

C.

The PE discovers other PEs in the same Ethernet segment and elects a DF.

D.

The PE discovers remote ESIs and determines their redundancy mode.

Question 64

Refer to the exhibit.

What is the result of this configuration?

Options:

A.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization.

B.

Router 1 and the TACACS+ server maintain one open connection between them only when network administrator is accessing the router with password ciscotest.

C.

Router 1 and the TACACS+ server maintain one open connection between them.

D.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authentication.

Question 65

An engineer is trying to implement BGP in a multihomed architecture. What must the engineer configure to influence inbound path selection?

Options:

A.

A route map with WEIGHT attribute to control the inbound traffic.

B.

An offset list to set the metric for routes received from neighboring autonomous systems.

C.

An access list to identify traffic and enable it on both of the provider-facing interfaces.

D.

A route map with AS_PATH attribute to control the inbound traffic.

Question 66

An engineer working for telecommunication company with an employee id: 3715 15 021 needs to secure the LAN network using a prefix list Which best practice should the engineer follow when he implements a prefix list?

Options:

A.

An engineer must use non sequential sequence numbers in the prefix list so that he can insert additional entries later.

B.

The final entry in a prefix list must be /32

C.

An engineer must identity the prefix list with a number only

D.

An engineer must include only the prefixes for which he needs to log activity.

Question 67

Refer to the exhibit.

Refer to the exhibit. An ISP provides shared VoIP Extranet services to a customer in VRF-100 with these settings:

The VoIP services are hosted in the 198.19.100.0/24 space.

The customer has been assigned the 198.18.1.0/29 IP address block.

VRF-100 is assigned import and export route target 65010:100.

Which configuration must the engineer apply to PE-1 to provision VRF-100 and provide access to the shared services?

Options:

A.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

import map VRF-100-IMPORT

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65010:100

!

route-map VRF-100-I

B.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:2999

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:1999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65

C.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:1999

exit address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity r 650

D.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

route-target export 65010:100

route-target export 65010:1999

route-target import 65010:100

route-target import 65010:2999

exit-address-family

Question 68

Refer to the exhibit. A junior engineer must update a group of scripts to use on a newly deployed subnet. However, one of the scripts is not documented or commented. What are the two effects of this script? (Choose two.)

Options:

A.

The script configures a loopback interface.

B.

The script stores output with leading or trailing spaces.

C.

The script calls a Telnet process to connect to a network device.

D.

The script stores output in the cli.txt file.

Question 69

Refer to the exhibit. An engineer started to configure a router for OSPF. Which configuration must the engineer perform on the router without changing any interface configuration so that the router establishes an OSPF neighbor relationship with its peer?

Options:

A.

router(config)# router ospf 11router(config-if)# no passive-interface ethernet 1/1

B.

router(config)# interface ethernet 1/1router(config-if)# no shutdown

C.

router(config)# interface ethernet 1/1router(config-if)# ip ospf hello-interval

D.

router(config)# interface ethernet 1/1router(config-if)# ip ospf priority 0

Question 70

When implementing a REST API, how does an engineer mitigate security risks?

Options:

A.

by configuring the system to authenticate the client's identity and avoid broken authentication

B.

by configuring object properties to protect data

C.

by configuring separate authorization schemes to securely compartmentalize different areas of the business

D.

by configuring rate limiting to reduce the risk of DOS and DDOS attacks against the system

Question 71

Refer to the exhibit.

Which the link aggregation configuration router is running on Cisco IOS XR software, which LACP interface configuration is needed to add the interface to the bundle?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 72

Refer to the exhibit. Routers R1 and R2 are connected over the internet, with the connection passing over four different autonomous systems. The company must mitigate potential DDoS attacks and protect the CPUs of the routers. A network engineer must secure all external connections on edge router R1 based on RFC 5082. R2 has already been secured. Which task should the engineer perform on R1 to achieve the goal?

Options:

A.

Configure ip neighbor 182.12.91.5 bgp multihop-ttl 4 under the global configuration.

B.

Configure ip neighbor 182.12.91.5 ttl 4 under the global configuration.

C.

Configure neighbor 182.12.91.5 ttl-security hops 4 under the BGP configuration.

D.

Configure neighbor 182.12.91.5 bgp-ttl 4 under the BGP configuration.

Question 73

Simulation 8

Options:

Question 74

A network engineer is implementing NetFlow to observe traffic patterns on the network. The engineer is planning to review the patterns to help plan future strategies for monitoring and preventing congestion as the network grows. If the captures must include BGP next-hop flows, which configuration must the engineer apply to the router?

Options:

A.

ip cef

ip flow-export version 5 bgp-nexthop

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow egress

B.

ip cef

ip flow-export version 9 bgp-nexthop

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

C.

ip cef

ip flow-export version 5

ip flow-export destination 192.168.1.1 9995

interface gigabitethernet 1/0/1

ip flow ingress

cdp enable

D.

no ip cef

ip flow-export version 9

ip flow-export destination 192.168.1.1 9996

interface gigabitethernet 1/0/1

ip flow ingress

ip flow egress

Question 75

Refer to the exhibit. A network engineer observed congestion between routers R1 and R4, which are connected on a point-to-point link. Two servers that reside on networks on R1 and R4 generate heavy traffic between them with most traffic going from R4 to R1. To improve overall performance, the engineer wants to drop inbound packets that exceed a configured threshold, without disrupting traffic that passes from R4 to R3. Which action must the engineer take to resolve the issue?

Options:

A.

Implement traffic policing to drop packets that exceed the given threshold.

B.

Implement FIFO to queue excess traffic for transmission when bandwidth is available.

C.

Implement traffic shaping to drop excess packets.

D.

Implement a service policy in the outbound direction on each interface on the link to tag traffic exiting each router.

Question 76

An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone that encapsulates Layer 2 and Layer 3 data Which action must the engineer perform on the routers to accomplish this task?

Options:

A.

Configure a EtherChannel for E-LAN.

B.

Configure a pseudowire for E-LINE.

C.

Configure Cisco MPLS TE for use with E-TREE.

D.

Configure QoS for MPLS and E-ACCESS

Question 77

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-

R1 and R2 are having issues forming an eBGP neighbor relationship. Troubleshoot and resolve the issue to achieve these goals:

1. Configure R1 and R2 to form a BGP neighborship using their Loopback interfaces.

2. Form the neighbor relationship using a BGP multihop mechanism. Use minimal values to solve the issue.

Options:

Question 78

Refer to the exhibit.

What does this REST API script configure?

Options:

A.

application profile

B.

VRF

C.

public community string for SNMP

D.

interface with IP address 192.168.0.1

Question 79

Refer to the exhibit.

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

Options:

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Question 80

How do intent APIs make it easier for network engineers to deploy and manage networks?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 81

Refer to the exhibit. ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to CE-1?

Options:

A.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-export additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

B.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community local-as additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

C.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefixlist AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop local-address

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

D.

route-map RTBH-CUSTOMER-IN permit 10

description AS65001

match ip address prefix-list AS65001-PREFIXES

match community 99

set local-preference 200

set community no-advertise additive

set ip next-hop 192.168.255.255

route-map RTBH-CUSTOMER-IN deny 65535

description DEFAULT DENY

Question 82

Drag and drop the functionalities from the left onto the correct target fields on the right.

Options:

Question 83

Refer To the exhibit.

Which BGP attribute should be manipulated to have CE1 use PE1 as the primary path to the Internet?

Options:

A.

The weight attribute should be manipulated on PE1 on outbound routes advertised to CE1.

B.

The MED should be manipulated on CE1 on inbound routes from PE1.

C.

The local preference attribute should be manipulated on PE2 on inbound routes advertised to CE1.

D.

The origin of all routes should be modified on each router on inbound and outbound routes advertised to CE1.

Question 84

Refer to the exhibit.

CE1 and CE2 require connectivity to the internet through the ISP connected to PE3 What should an engineer configure to complete this task?

Options:

A.

PE2 must be configured to serve as a route reflector for PE3 routes learned from the internet. PE2 then shares the routes with CE1 and CE2.

B.

CE1 and CE2 must be configured with a route distinguisher in the PE1 VRF that dynamically imports the route from the internet.

C.

CE1 and CE2 must be configured to use a static default route with a next-hop of PE3 to reach internet routes.

D.

PE1 must be configured with an import route target in the CE1 VRF that matches the export route target for the internet VRF on PE3.

Question 85

Refer to the exhibit. PE1 is a router connected to a major ISP that provides connectivity for multiple enterprises in several different geographic locations. The ISP networking team uses REST APIs to configure the network devices. A senior engineer retrieved the given script from the library and provided it to a junior engineer to deploy. What effect does the script produce when deployed?

Options:

A.

It configures an interface on PE1.

B.

It configures an interface on Switch 1.

C.

It limits PE1 to exactly one configured interface.

D.

It sets the router name, location, and interface on PE1 and Switch-1.

Question 86

Refer to the exhibit:

Which statement about the status of the neighbor relationship between R1 and R2 is true?

Options:

A.

The neighbor relationship is down because the two routers are configured with different area types

B.

The neighbor relationship is down because the two routers are in the same subnet.

C.

The neighbor relationship is up because R2 is level 1 and level 2 router.

D.

The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different area

Question 87

What is a role of NSO?

Options:

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Question 88

Refer to the exhibit.

A network engineer at a large ISP Is configuring telemetry streams to monitor the health status of PE routers on the network using gRPC dial-out. The PE routers are located at several data centers in different physical locations, and they are using IS-IS and BGP for routing. Which additional configuration must the engineer implement on the PE routers to meet the goal?

Options:

A.

B.

C.

D.

Question 89

Why do packet loops occur during the configuration of BlDlR-PIM?

Options:

A.

The network does not support BIDIR-PIM

B.

The network is partially upgraded to support BIDlR-PIM

C.

No interface for carrying traffic for multicast groups has been configured

D.

The router has not been configured to advertise itself

Question 90

Refer to the exhibit.

An engineer configured BGP summarization on a customer's network. Which route is advertised to BGP peers?

Options:

A.

192.0.0.0/16

B.

192168.0.0/16

C.

192.168.1.0/24

D.

192168.0.5/30

Question 91

Which benefit is provided by FRR?

Options:

A.

It provides fast forwarding path failure detection times for all media.

B.

It provides rapid failure detection between forwarding engines.

C.

It provides performance data for the service provider network.

D.

It protects Cisco MPLS TE LSPs from link and node failures.

Question 92

Refer to me exhibit.

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

Options:

A.

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Question 93

Refer to the exhibit.

A network administrator implemented MPLS LDP changes on PE-A LSR device. The engineer must ensure there are no LDP peer are fully operational. Which LDP feature must the engineer apply to the existing configuration to eliminate the problem?

Options:

A.

Configure MPLS LDP IGP synchronization on the network.

B.

Configure MPLS LDP NSR for all LDP sessions.

C.

Enable LDP session protection under the routing protocol.

D.

Disable IP CEF on routers running LDP and enable LDP.

Question 94

Refer to the exhibit.

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 95

Refer to the exhibit. MPLS is running in the network with OSPF as the IGP. Full routes are shared between the routers, and each connected link has an MPLS neighbor relationship. A network engineer must update the network configuration so that it will maintain LDP neighbor relationships if a directly connected link goes down. Which action must the engineer take as part of the process?

Options:

A.

Implement Unified MPLS to unify the OSPF areas.

B.

Implement MPLS OAM with BFD on the links.

C.

Implement LDP sync on links with a greater risk of faults.

D.

Implement LDP session protection on the network.

Question 96

What is the characteristic of the Tl-LFA?

Options:

A.

It guarantees a loop-free path for all interfaces in the OSPf- super backbone .

B.

It applies on each area and instance and makes all the interfaces inherit the configuration

C.

It guarantees a loop-free path for all areas configured m OSPF

D.

It applies only on the instance and makes at the interfaces inherit the configuration

Question 97

Exhibit:

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

Options:

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Question 98

What is a characteristic of data modeling language?

Options:

A.

It provides an interface for state data.

B.

It separates configuration and state data.

C.

It ensures devices are individually configured.

D.

It replaces SNMP.

Question 99

Refer to the exhibit:

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

Options:

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Question 100

An engineer is configuring IEEE 802.1 ad on the access port on a new Cisco router. The access port handles traffic from multiple customer VLANs, and it is expected to mark all customer traffic to the same VLAN without dropping any traffic. Which configuration must the engineer apply?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 101

A network engineer is deploying VPLS configuration between multiple PE routers so that customer's remote offices have end-to-end LAN connectivity. Which additional configuration should the engineer perform on the PE routers to enable the virtual switch instance?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 102

Refer to the exhibit. A network engineer installed router R1 as the new core router and must secure the control plane. The configuration has been applied, and now the engineer is creating ACL 120. Only hosts 192.168.1.1 and 192.168.2.2 should be allowed to access the router using Telnet. All other hosts should be rate-limited, with excess traffic dropped. Which configuration accomplishes this goal?

Options:

A.

access-list 120 deny tcp any any eq telnet

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.1.2 any eq telnet

B.

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

access-list 120 permit tcp any any eq telnet

C.

access-list 120 permit tcp host 192.168.1.1 any eq telnet

access-list 120 permit tcp host 192.168.2.2 any eq telnet

access-list 120 deny tcp any any eq telnet

D.

access-list 120 permit tcp any any eq telnet

access-list 120 deny tcp host 192.168.1.1 any eq telnet

access-list 120 deny tcp host 192.168.1.2 any eq telnet

Question 103

Refer to the exhibit:

Which statement about this configuration is true"?

Options:

A.

It requires an explicit Cisco MPLS TE path to be configured for the tunnel to run

B.

It requires OSPF to also be running to have optimized Cisco MPLS TE tunnels

C.

It requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run

D.

It is the configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing

Question 104

While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?

Options:

A.

Configure the device to pass only O and E2 routes through it.

B.

Configure the synchronization keyword in the global BGP configuration.

C.

Configure the keyword nssa in the redistribution entry.

D.

Configure the keywords internal and external in the redistribution entry.

Question 105

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service provider core network with these requirements:

R1 must establish LDP peering with the loopback IP address as its Router-ID.

Session protection must be enabled on R2.

How must the team update the network configuration to successfully enable LDP peering between R1 and R2?

Options:

A.

Change the LDP password on R2 to Cisco.

B.

Configure mpls ldp router-id loopback0 on R1 and R2.

C.

Configure LDP session protection on R1.

D.

Change the discover hello hold time and interval to their default values.

Question 106

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

Options:

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.

Question 107

Refer to the exhibit.

Router 4 is added to the network and must be in the same area as router 1. Which NET should the engineer assign?

Options:

A.

49.0001.0000.0000.0004.00

B.

49.0111.0000.0000.0001.00

C.

49.0011.0000.0000.0003.00

D.

49.0011.0000.0000.0002.00

Question 108

Refer to the exhibit.

A network engineer must meet these requirements to provide a connects, solution:

    The customer connected to Area 2 needs to access the application in Area 1 on the 10.10.10.0/24 subnet

    The Customer must not have access to the 20.10 30.0/24 subnet.

    The service provider must make sure that the Area 2 routing database limits the number of IP addresses in the routing table

Which two configurations must be implemented to meet the requirements? (Choose two)

Options:

A.

Set a tag value of 200 to match the summary address 10.0.0/16 on R2.

B.

Set a tag value of 200 to match the summary address 10.0.0.0/16 on R3.

C.

Apply the route map for tag 200 and leak Level 2 routes into Level 1 Area 2 on R3

D.

Apply the route map for tag 200 and teak Level 2 routes into Level 1 Area 2 on R4.

E.

Set a tag value of 200 to match the summary address 10.0.0./16 on R1.

Question 109

An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?

Options:

A.

vrf upgrade-cli

B.

bgp upgrade-cli

C.

address-family ipv4

D.

ip bgp-community new-format

Question 110

What happens when a segment-routing TE tunnel loses the link and there is no secondary path in place?

Options:

A.

The headend router generates a new path to the tail-end router using bandwidth to determine the best path.

B.

The tail-end router sends an alert to the syslog server that the tunnel and the secondary route are inaccessible.

C.

The headend router starts the invalidation timer to bring the tunnel down.

D.

The headend and tail-end routers revalidate SID hops to determine the proper label stack to reroute the traffic.

Question 111

A regional MPLS VPN provider operates m two regions and wants to provide MPLS L 3VPN service for a customer with two sites in these separate locations. The VPN provider approaches another organization to provide backbone carrier services so that the provider can connect to these two locations.

Which statement about this scenario is true?

Options:

A.

When edge routers at different regional sites are connected over the global carrier backbone, MP-eBGP must run between the routers to exchange the customer VPNv4 routes

B.

When eBGP is used for label exchange using the send label option, MPLS-BGP forwarding is configured under the global ABC CSC PE-to CE interface

C.

When IGP is used for route exchange and LDP for label exchange, MPLS is enabled only on the VRF interface on the backbone-earner PE side.

D.

When BGP is used for both route and label exchange, the neighbor a.b.c.d send-lable command is used under the address family VPNv4 command mode.

Question 112

The NOC engineer in a service provider network must configure an SNMP community on switch SW with these security attributes:

* Event messages must be authenticated with the MD5 algorithm and encrypted.

* The remote user name for the SNMP server at 172.16.10.1 is AuthNocUser.

Which configuration must the engineer apply to the switch?

Options:

A.

SW(config)# snmp-server group group2 v3 auth

SW(config)# snmp-server user AuthNocUser group2 remote 172.16.10.1 v3 auth md5 password1

B.

SW(config)# snmp-server group group3 v3 priv

SW(config)# snmp-server user AuthNocUser group3 remote 172.16.10.1 v3 auth md5 Cisco@123 priv des 56

C.

SW(config)# snmp-server group group1 v3 noauth

SW(config)# snmp-server user AuthNocUser group1 remote 172.16.10.1

SW(config)# snmp-server host 172.16.10.1 informs version 3 noauth remoteuser config

D.

SW(config)# snmp-server community comaccess ro 4

SW(config)# snmp-server enable traps snmp authentication

SW(config)# snmp-server host cisco.com version 2c public

Question 113

SIMULATION 4

Options:

Question 114

Refer to the exhibit. Company A is running OSPF within its network, comprised of routers R2, R3, R4, and R5 and consisting of two areas. Company A just acquired Company B, which uses EIGRP on its own R1. R1 has several routes in its routing table. The network engineering team at Company A needs access to the Company B network to manage network devices there, but each company will otherwise operate independently. R2 will serve as the ASBR between the two networks. Which action must the team take to reduce the number of EIGRP routes received on R2 and include only the necessary routes in the routing table?

Options:

A.

Apply an outbound distribute list on R3 and R4 to filter unnecessary intra-area routes from reaching the rest of the OSPF domain.

B.

Apply an inbound distribute list on R2 with a route map that permits only the necessary networks.

C.

Implement an offset list on R1 for the necessary networks.

D.

Attach an access list to the R2 interface connected to R1 that denies all traffic except for the necessary engineering team traffic.

Question 115

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Question 116

A network operator needs to implement PIM-SSM multicast configuration on customer's network so that users in different domains are able to access and stream live traffic. Which two actions must the engineer perform on the network

to make the streaming work? (Choose two.)

Options:

A.

Configure at least one MSDP peer on the network

B.

Enable IGMP version 2 at the interface lever.

C.

Enable PIM sparse mode on the device.

D.

Enable IGMP version 3 at the interface level.

E.

Enable PM dense mode on the device.

Question 117

What is one of the main functions of 6RD?

Options:

A.

It provides stateful session translation with the 2002::/16 prefix.

B.

It translates RFC 1918 IP addresses into public IP addresses.

C.

It provides native reachability between IPv4-only hosts and 6RD-enabled IPv6 hosts.

D.

It allows customers IPv6 traffic to be tunneled over IPv4 network infrastructure.

Question 118

Refer to the exhibit.

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 119

An organization with big data requirements is implementing NETCONF as part of its migration to a new cloud-based environment. The organization has multiple offices across widespread geography. A network engineer is configuring NETCONF on one of the border routers. Which configuration must the engineer apply to save the running configuration?

Options:

A.

B.

C.

snmp-server community public RW

snmp-server trap link left

snmp-server enable traps snmp authentication linkdown linkup

snmp-server enable traps syslog

snmp-server manager

D.

logging history debugging

logging snmp-trap emergencies

logging snmp-trap alerts

logging snmp-trap critical

logging snmp-trap errors

logging snmp-trap warnings

logging snmp-trap notifications

logging snmp-trap information

logging snmp-trap debugging

Question 120

Refer to the exhibit. An engineer configured several network devices to run REST APIs. After testing, the organization plans to use REST APIs throughout the network to manage the network more efficiently. What is the effect if this script?

Options:

A.

It returns an AAA users with the last name CiscoTest.

B.

It creates a class map named aaauser with traffic tagged from AAA.

C.

It queries the local database to find a user named aaaUser.Json

D.

It adds the user CiscoTest to the AAA database located at 192.168.201.10.

Question 121

Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?

Options:

A.

OTCP

B.

OMP

C.

UDP

D.

BGP

Question 122

Drag and drop the functions from the left onto the correct Path Computation Element Protocol roles on the right

Options:

Question 123

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

Options:

A.

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Question 124

Refer to the exhibit.

An engineer is configuring path selection on router R1 for two ASNs as shown. Which additional task must the engineer perform on Router 1 so that all outbound traffic utilizes the link between R1 and R3 to reach ASN 4567?

Options:

A.

Configure a low weigh! on the peer to ASN 4567.

B.

Configure a high weight on the peer to ASN 4567.

C.

Configure an AS path prepend on the peer to ASN 4567.

D.

Configure a high med on the peer to ASN 4567.

Question 125

Refer to the exhibit. A network engineer is configuring Ethernet Layer 2 service to connect CE2 and CE3 for video and data application sharing with these requirements:

    A point-to-point cross-connect service must be established between 10.10.10.10 and 20.20.20.20.

    PE1 and PE2 must learn neighbors dynamically in PW 10.

Which configuration must be implemented on PE1 to meet the requirements?

Options:

A.

xconnect group XCON1

 p2p XCON1_PE1PE2

 interface GigE 0/0

 pw-class Path1

 backup neighbor 20.20.20.20 pw-id 10

B.

12vpn

 xconnect group XCON1

 interface GigE 0/0

 interface GigE 0/1

C.

12vpn

 xconnect group XCON1

 p2p XCON1_PE1PE2

 interface GigE 0/0

 neighbor 20.20.20.20 pw-id 10

 mpls static label local 699 remote 890

D.

12vpn

 p2p XCON1_PE1PE2

 interface GigE 0/1

 neighbor 20.20.20.20 pw-id 10

Question 126

Refer to the exhibit.

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

Options:

A.

neighbor ebgp-multihop

B.

ebgp-multihop

C.

ttl-security

D.

neighbor-ttl-security

Question 127

Refer to the exhibit.

The engineering team wants to limit control traffic on router RX with the following IP address assignments:

• Accepted traffic for router: 10.0.0.0/24

• NOC users IP allocation: 192.168.10.0/24

Which additional configuration must be applied to RX to apply the policy for MSDP?

Options:

A.

RX(config)#access-list 151 permit tcp any gt 1024 10.10.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit tcp any eq 639 10.10.0.0 0.0.0.255 gt 1024 established

B.

RX(config)#access-list 150 permit tcp any gt 1024 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit tcp any eq 639 10.0.0.0 0.0.0.255 gt 1024 established

C.

RX(config)#access-list 151 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit udp any 10.0.0.0 0.0.0.255 eq 639

D.

RX(config)#access-list 150 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit udp any 10.0.0.0 0.0.0.255 eq 639

Question 128

What is the primary purpose of Terraform in the network?

Options:

A.

to manage the Cisco network infrastructure as code to ensure consistent configuration and scalability

B.

to facilitate the integration of Cisco networking solutions with cloud platforms to improve scalability

C.

to schedule and manage maintenance tasks on Cisco network devices to minimize errors and downtime

D.

to enable the seamless migration of Cisco network configurations between diverse network environments

Question 129

Refer to the exhibit.

Router 1 is missing the route for the router 2 loopback 0. What should the engineer change to fix the problem?

Options:

A.

the area numbers on Router 1 and Router 2 to be similar

B.

the wildcard mask network statement in OSPF of Router 2

C.

Router 1 to be an ABR

D.

the hello timers on Router 1 and Router 2 to be different

Question 130

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 131

Refer to the exhibit:

A network engineer is implementing QoS services. Which two statements about the QoS-group keyword on Cisco IOS XR 3re true? (Choose two )

Options:

A.

The QoS group numbering corresponds to priority level

B.

QoS group marking occurs on the ingress

C.

It marks packets for end to end QoS pokey enforcement across the network

D.

QoS group can be used in fabric QoS policy as a match criteria

E.

It cannot be used with priority traffic class

Question 132

R1 serves as a route reflector on a BGP-enabled network and has dual RPs installed. To ensure that all routes have been processed when an RP fails over, R1 must send the router request to all peers configured with NSR to refresh the route database. Which action completes the implementation?

Options:

A.

Implement bgp fast-external-failover under the BGP IPv4 address-family configuration.

B.

Enable bgp jett rp route-update in the global router configuration.

C.

Enable bgp sso route-refresh-enable in the global BGP configuration.

D.

Implement bgp consistency-checker auto-repair under the Cisco Express Forwarding configuration.

Question 133

Refer to the exhibit.

Which type of DDoS attack will be mitigated by this configuration?

Options:

A.

SYN flood

B.

smurf attack

C.

SIP INVITE flood attacks

D.

teardrop attack

Question 134

Refer to the exhibit.

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs to the interface states of Gi0/0/0/0 and Gi0/0/0/1?

Options:

A.

Gi0/0/0/1 and Gi0/0/0/0 become active

B.

Gi0/0/0/1 and Gi0//0/0 remains standby

C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby

D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby

Question 135

Company A is implementing VoIP services across the company. The network architect designed a QoS policy to allow only specific IP subnets and mark the signaling flow with DSCP 36. The solution should be as secure as possible. Phones receive their IP addresses from the 172.184.12.0/24 pool and are assigned by the RADIUS server to VLAN 1021. Skinny Client Control Protocol is used as a signaling protocol in the network. For security reasons, switchport port-security maximum 1 vlan voice has been preconfigured on the switch side. Which two tasks must an engineer perform on SW_1 to achieve this goal? (Choose two.)

Options:

A.

Implement a class map with the set dscp af42 command.

B.

Implement a class map with the set dscp af43 command.

C.

Implement an ACL with the set dscp af41 command.

D.

Implement an ACL with the permit udp 172.184.12.0 0.0.0.255 any range 2000 2002 command.

E.

Implement an ACL with the permit tcp 10.124.121.0 0.0.0.255 range 16384 32767 command.

Question 136

A mid-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company's two sites across the service provider core. To meet service requirements, the service provider must extend the Layer 2 domain between the company's two locations.

Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

Options:

A.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

B.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag push dot1q 21 symmetric

C.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag pop 13

D.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag translate 1-to-1 dot1q 2

Question 137

Refer to the exhibit:

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

Options:

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Question 138

Refer to the exhibit.

Which configuration must be implemented on router R8 so that it will establish OSPF adjacency with R5?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 139

Drag and drop the functions from the path computation element protocol roles on the right.

Options:

Question 140

You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.

If you apply this code to BGP filters, which effect does the code have on your router?

Options:

A.

denies routes from AS 7070

B.

allows routes from AS 7077

C.

denies routes from AS 7007

D.

allows routes from AS 770

Question 141

Refer to the exhibit. A client wants to filter routes to a BGP peer to limit access to restricted areas within the network. The engineer configures the route map ciscotest to filter routes from the BGP neighbor. The engineer also sets a tag that will be used for QoS in the future. Which task must be performed to complete the Implementation?

Options:

A.

Attach the new route map to the BGP neighbor statement in the inbound direction.

B.

Create a policy map named ciscotest and apply It to inbound traffic on the link that is directly connected to the BGP neighbor.

C.

Create a route map, configure BGP with an IPv4 address family, and activate the neighbor.

D.

Add a route map statement with sequence 40 that links a BGP community to the routing protocol

Question 142

After a possible security breach, the network administrator of an ISP must verify the times that several different users logged into the network. Which command must the administrator enter to display the login time of each user that activated a session?

Options:

A.

show netconf-yang sessions detail

B.

show netconf-yang datastores

C.

show platform software yang-management process

D.

show netconf-yang sessions

Question 143

Refer to the exhibit. A junior network engineer has been configuring OSPF on two directly connected routers, R1 and R2, to establish a neighbor adjacency. The engineer also configured ip route 10.1.1.0 255.255.255.0 GigabitEthernet 0/1 10.10.10.1 on R1 to allow inbound management. After the initial configuration, the adjacency failed to form. The engineer changed the cost and area type under the OSPF configuration on R1, but the problem persists. Which action must the engineer take to resolve the issue?

Options:

A.

Change the network type on R2 to point-to-multipoint.

B.

Remove the static route on R1 and enable OSPF under the Gi0/1 interface.

C.

Set the OSPF process ID on R1 to match the OSPF process ID on R2.

D.

Decrease the OSPF cost on R1 to match the cost on R2.

Question 144

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 145

Which feature describes the weight parameter for BGP path selection?

Options:

A.

Its value is local to the router

B.

Its value is set either locally or globally.

C.

Its default value is 0.

D.

Its value is global to the router.

Question 146

Refer to the exhibit. A large organization is merging the network assets of a recently acquired competitor with one of its own satellite offices in the same geographic area. The newly acquired network is running different routing protocol than the company's primary network. As part of the merger a network engineer implemented this route map Which task must the engineer perform to complete the Implementation?

Options:

A.

Attach the route map to an IS-IS network statement to advertise the routes learned on this interface to IS-IS

B.

Enable metric style wide to allow the use of extended metrics from the protocols

C.

Attach the route map to the redistribution command to manipulate the routes as they are shared

D.

Configure an additional route map sequence to override the implicit deny at the end of the route map

Question 147

Refer to the exhibit:

Based on the show/ command output, which result m true after BGP session is established?

Options:

A.

The IOS XR router advertises all routes to the neighbor 192.168.2.2, but it does not accept any routes from 192.168.2.2

B.

The IOS XR router advertises and accepts all routes to and from eBGP neighbor 192.168.2.2 C. No routes are accepted from the neighbor 192.168.2.2, nor are any routes advertised to it

C.

The IOS XR router does not advertise any routes to the neighbor 192.168.2.2,but it accepts all routes from 192.168.2.2.

Question 148

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

Options:

A.

The traffic uses the default MDT transmit the data Only if it is a (S, G) multicast route entry.

B.

A data MDT is created if is a Multicast route entries

C.

A data and default MDT are created to flood the multicast stream of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmit through the core for multicast route entries.

Question 149

What are two purposes of a data-modeling language such as YANG? (Choose two.)

Options:

A.

defining a hierarchical data scheme

B.

modeling notifications, data configuration, and data status

C.

defining a relational-model data scheme

D.

defining a semi-structured data scheme

E.

defining API calls, JSON format, and XML structure

Question 150

Refer to the exhibit:

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Question 151

Refer to the exhibit. OSPF is running in the core, with MPLS configured on all links. A Cisco MPLS TE tunnel is configured with R1 as the headend and R4 as the tail-end router. As traffic on the network increases, the network engineering team is concerned about identifying failures between the tunnel endpoints.

Which action should the engineering team take that will allow them to identify and locate any faults in the path?

Options:

A.

Implement NetFlow to determine whether traffic is traversing the egress interfaces as expected.

B.

Implement an ICMP ping utility to send periodic test packets and identify the failure location.

C.

Implement RSVP to determine whether bandwidth is properly allocated along the path.

D.

Implement MPLS OAM with traceroute to follow the path and determine where packets are failing.

Question 152

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

Options:

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Question 153

In an MPLS network, which protocol can be used to distribute a Segment Prefix?

Options:

A.

OSPF

B.

LDP

C.

RSVP-TE

D.

EIGRP

Question 154

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Question 155

Refer to the exhibit:

What does this value mean when it is received in XML?

Options:

A.

It shows the ending of the script

B.

It indicates a break in a sequence

C.

It indicates a value assigned by a network administrator to tag a route

D.

It means a data field is blank

Question 156

What must a network engineer consider when designing a Cisco MPLS TE solution with OSPF?

Options:

A.

The OSPF extensions and RSVP-TE must be enabled on all routers in the network.

B.

OSPF extensions for RSVP-TE are supported in Area 1.

C.

The OSPF extensions and RSVP-TE must be enabled on the egress routers.

D.

OSPF extensions for RSVP-TE are implemented in Type 6, 7, and 8 LSAs.

Question 157

Refer to the exhibit.

Routers R2 and R3 are Level 1/Level 2 IS-IS routers that redistribute 198 18.x.x/24 prefixes to routers R5 and R6 In the Level 1 area R2 Is to be the preferred router for all redistributed prefixes in the Level 1 area. Which configuration sets this preference?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 158

The network-engineering team of a service provider is integrating several recently acquired networks into a more scalable common Unified MPLS architecture. The new network architecture will support end-to-end VPNv4 and VPNv6 services with these requirements:

• The IGP of the core layer is IS-IS In Area 0.

• The IGP of the aggregation layers is OSPF in Area 0.

• The LDP protocol Is used to distribute label bindings within each IGP domain.

Which task must the network engineer perform when implementing this new architecture?

Options:

A.

Configure BGP-LU between ABR routers of each IGP domain to carry MPLS label information in NLRI.

B.

Configure a BGP session between the ABR routers of each IGP domain to exchange VPNv4 or VPNv6 prefixes

C.

Configure the ABR in each IGP domain to preserve next-hop information on all VPNv4 and VPNv6 prefixes advertised by the PE.

D.

Configure mutual redistribution of each IGP domain's loopback prefix to provide end-to-end LDP LSP

Question 159

Refer to the exhibit. A network engineer is implementing BGP in AS 65101 and AS 65201. R3 sends data traffic to 192.168.1.1 /32 via the path R3-R2-R1. The traffic must travel via alternate path R6-R5 for prefix 192.168.1.1/32. Which action must be taken to meet the requirement?

Options:

A.

Apply route-map HIGH-MED out on R2 for neighbor R3.

B.

Apply route-map HIGH-LP in on R3 for neighbor R6

C.

Apply route-map LOW-LP out on R2 for neighbor R3.

D.

Apply route-map LOW-MED in on R5 for neighbor R2

Question 160

Which task must be performed first to Implement BFD in an IS-IS environment?

Options:

A.

Disable Cisco Express Forward.ng on all interfaces running routing protocols other than IS-IS

B.

Configure BFD under the IS-IS process

C.

Configure all ISIS routers as Level 2 devices

D.

Configure BFD in an interface configuration mode

Question 161

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

Options:

A.

Change the helper-address value to 192.168.10.2 on RC.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Question 162

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

Options:

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Question 163

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

Options:

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Question 164

Refer to the exhibit:

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

Options:

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Page: 1 / 55
Total 547 questions