New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-501 Exam Dumps - Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)

Searching for workable clues to ace the Cisco 350-501 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 350-501 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 81

Which OS uses a distributed subsystem architecture?

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Full Access
Question # 82

Refer to the exhibit.

A network engineer is implementing an LDP-based MPLS solution to enable packet flow between the two bank sites The engineer was given two requirements

·LDP peering must stay up when there is a link failure between R3 and R6

·LDP peering must not flap when there is a link failure between R5 and R6

Which action meets these requirements?

A.

Enable Link LDP on R4 and R6

B.

Reset the LDP session between R4 and R6

C.

Configure LDP Session Protection on R4

D.

Implement an LDP targeted session with R4 on R6

Full Access
Question # 83

Refer to the exhibit:

This output is included at the end of an output that was provided by a device using NETCONF.

What does the code show?

A.

It shows the hostname of the device as rpc-reply

B.

It shows that the running configuration is blank

C.

It shows NETCONF uses remote procedure calls.

D.

It shows that the full configuration is being modeled by VANG

Full Access
Question # 84

Refer to the exhibit.

Which two topology changes happen to the IS-IS routers? (Choose two.)

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

R1 and R4 are Level 2 neighbours.

D.

R1 and R2 are Level 2 neighbours.

E.

All four routers are operating as Level 1-2 routers.

Full Access
Question # 85

Which service is a VNF role?

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Full Access
Question # 86

A regional company is planning to bolster the security of their LAN infrastructure by implementing advanced encryption techniques between their core switch and their distribution switch. The solution must leverage hardware-accelerated encryption capabilities to transparently encrypt all traffic between the two switches at the data-link layer to safeguard against unauthorized access. However, it is important for the solution to have minimal impact on network performance and latency.

Which action must the engineer take to meet the requirements?

A.

Deploy an IPsec tunnel with MD5 hashing between the two switches.

B.

Enable SSL VPN with SHA-256 encryption on all interfaces on both switches.

C.

Enable L2TP with RSA encryption on both switches.

D.

Implement MACsec with AES-256 encryption on both switches.

Full Access
Question # 87

A network engineer is configuring a BGP route policy for the SUBNET prefix set. Matching traffic must be dropped, and other traffic must have its MED value set to 400 and community 4:400 added to the route. Which configuration must an engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 88

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements:

Session protection is provided for core loopback IP addresses only.

The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails.

Which configuration must the team implement on PE-XR1?

A.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

B.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

C.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

D.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

Full Access
Go to page: