March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-501 Exam Dumps - Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)

Question # 4

Refer to the exhibit.

A network engineer at a large ISP Is configuring telemetry streams to monitor the health status of PE routers on the network using gRPC dial-out. The PE routers are located at several data centers in different physical locations, and they are using IS-IS and BGP for routing. Which additional configuration must the engineer implement on the PE routers to meet the goal?

A.

Text, letter Description automatically generated

B.

Text Description automatically generated

C.

Graphical user interface, text Description automatically generated

D.

Text, letter Description automatically generated

Full Access
Question # 5

What are two features of stateful NAT64? (Choose two.)

A.

It uses address overloading.

B.

It provides 1:N translations, so it supports an unlimited number of endpoints.

C.

It requires IPv4-translatable IPv6 address assignments.

D.

It requires the IPv6 hosts to use either DHCPv6-based address assignments or manual address assignments.

E.

It provides 1:1 translation, so it supports a limited number of endpoints.

Full Access
Question # 6

Which regular expression query modifier function indicates the start of a string?

A.

^

B.

[^]

C.

+

D.

$

Full Access
Question # 7

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Full Access
Question # 8

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

Full Access
Question # 9

Refer to the exhibit:

What is significant about the number 2 in the configuration?

A.

It is the numeric name of the ACL that contains the list of SNMP managers with access to the agent

B.

It dictates the number of sessions that can be open with the SNMP manager

C.

It indicates two SNMP managers can read and write with the agent using community string cisco test

D.

It represents the version of SNMP running

Full Access
Question # 10

Refer to the exhibit.

Which two topology changes happen to the IS-IS routers? (Choose two.)

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

R1 and R4 are Level 2 neighbours.

D.

R1 and R2 are Level 2 neighbours.

E.

All four routers are operating as Level 1-2 routers.

Full Access
Question # 11

Why is the keyword none needed when implementing management plane security using TACACS?

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Full Access
Question # 12

Which two actions describe ISP delegation to PCE servers? (Choose two)

A.

adding a new PCE server with lower precedence than the primary PCE

B.

changing the precedence of any of the PCE servers

C.

removing TE re-optimization timer timeouts

D.

entering the mpls traffic-eng reoptimize command

E.

adding a new PCE server with higher precedence than the primary PCE

Full Access
Question # 13

Which statement about the Cisco MPLS TE forwarding adjacency feature is true?

A.

It enables the headend and tailend routers to establish a bidirectional tunnel

B.

It enables the tailend router to advertise routes to the headend router over the tunnel

C.

It enables the MPLS core to use EIGRP as the routing protocol

D.

It enables the Cisco MPLS TE tunnel to be advertised into the running IGP.

Full Access
Question # 14

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.

Static routes on CE routers allow route leakage from a PE global routing table

Full Access
Question # 15

Refer the exhibit.

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

A.

first-in, first-out

B.

traffic shaping

C.

class-based weighted fair queueing

D.

traffic policing

Full Access
Question # 16

l

Refer to the exhibit. A network engineer working for a telecommunication company with an employee ID: 4602:62:646 is configuring security controls for the IPv6 multicast group, which is used for video TV. The solution from the engineer should reduce network usage and minimize the leave latency for the user that is connected to VLAN 76. Which two configurations meet this goal? (Choose two.)

A)

B)

C)

D)

E)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 17

Refer to the exhibit:

Which command is used to complete this configuration for QoS class-based marking?

A.

PE-A(config-pmap-c)#set dscp ef

B.

PE-A(config-pmap-c)#fair-queue

C.

PE-A(config-pmap-c)#random-detect

D.

PE-A(config -pmap-c)#priority

Full Access
Question # 18

Refer to the exhibit.

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

Refer to the exhibit. A network engineer is configuring a new router for iBGP to improve the capacity of a growing network. The router must establish an iBGP peer relationship with its neighbor. The underlay network is already configured with the correct IP addresses. Which step should the engineer apply to complete this task?

A.

Implement multicast routing on the router to support BGP hellos.

B.

Configure the AS number for the router to share with its iBGP peers.

C.

Configure the new router as an iBGP route reflector to support multiple iBGP peers.

D.

Activate the BGP peers under the correct address family on the router.

Full Access
Question # 20

How does model-driven telemetry use YANG?

A.

to reset network devices that malfunction

B.

to set informs and traps on clients to report back to a centralized server

C.

to subscribe to data that is streamed from a device

D.

to poll network devices on a 30-minute interval

Full Access
Question # 21

Refer To the exhibit.

Which BGP attribute should be manipulated to have CE1 use PE1 as the primary path to the Internet?

A.

The weight attribute should be manipulated on PE1 on outbound routes advertised to CE1.

B.

The MED should be manipulated on CE1 on inbound routes from PE1.

C.

The local preference attribute should be manipulated on PE2 on inbound routes advertised to CE1.

D.

The origin of all routes should be modified on each router on inbound and outbound routes advertised to CE1.

Full Access
Question # 22

Refer to the exhibit. The ISP is implementing a new hosting-as-a-service solution for its business customers. Service accessibility must be unique and separate for each customer. The network architect must ensure that multiple paths toward the hosting-as-a-service solution are always available. Basic protection against traffic black-holing on the MPLS network is required in case of link failure. Which two actions must the engineering team perform to meet the requirements? (Choose two.)

A.

Create the hosting-as-a-service VRF on router R4 and configure It with the route target both 65123:88 command.

B.

Configure the fast-reroute per-prefix command for the IS-IS protocol in the MPLS network and enable the BGP route-reflector feature on R2.

C.

Enable the VRF-Lite feature on router R4 and enable BGP address-family VPNv4.

D.

Configure the mpls Idp sync command in the MPLS network with the BGP additional-paths receive and additional-paths send options.

E.

Configure the fast-hello command under the IS-IS routing protocol with the BGP multipath 2 option enabled.

Full Access
Question # 23

ASN 65001 is peering with ASN 65002 to exchange IPv6 BGP routes. All routes that originate in ASN 65001 have a standard community value of 65001:100, and ASN 65002 is allowed to advertise only 2001 :db8:aaaa::/48. An engineer needs to update the ASN 65001 route-filtering configuration to meet these conditions:

* Looped routes into ASN 65001 and routes that have traversed 10 or more ASNs must be denied.

* Routes accepted into ASN 65001 must be assigned a community value of 65001:200.

Which configuration must the engineer apply to the ASN 65001 border router?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 24

Refer to the exhibit:

Which statement about this configuration is true"?

A.

It requires an explicit Cisco MPLS TE path to be configured for the tunnel to run

B.

It requires OSPF to also be running to have optimized Cisco MPLS TE tunnels

C.

It requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run

D.

It is the configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing

Full Access
Question # 25

Refer to the exhibit. A network engineer must configure XR-PE1 for uninterruptible failover from active RP to the standby RP Neither peer devices CGW1 nor the network of ASN 64512 support restart extensions Which configuration must the engineer apply to XR PEI to complete tasks?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 26

An engineer is implementing a router redistribution within BGP. The route map must be configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

Which service is a VNF role?

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Full Access
Question # 28

Refer to the exhibit:

A network administrator wants to enhance the security for SNMP for this configuration.

Which action can the network administrator implement?

A.

Re-configure to use SNMPv2 with MD5 authentication

B.

Add a community string to the existing entry

C.

Re-configure to use SNMPv3.

D.

Maintain the configuration but switch to an encrypted password for device access through SSH

Full Access
Question # 29

An network engineer is deploying VRF on ASBR router R1. The interface must have connectivity over an MPLS VPN inter-AS Option AB network. Which configuration must the engineer apply on the router to accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 30

Refer to the exhibit. Router P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering P4 is the primary Internet gateway router, and P5 is its Backup. P5 is already advertising a default route into OSPF domain. Which configuration must Be applied to P4 so that advertises a default route Into OSPF and Becomes me primary internet gateway for the network?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

Refer to the exhibit.

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

A.

Text Description automatically generated

B.

Text Description automatically generated

C.

Text Description automatically generated

D.

Text, letter Description automatically generated

Full Access
Question # 32

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

A.

Disable the MPLS LDP IGP sync holddown.

B.

Configure OSPF or IS-IS as the routing protocol.

C.

Configure EIGRP as the routing protocol using stub areas only.

D.

Enable MPLS LDP sync delay timers.

Full Access
Question # 33

Refer to the exhibit:

What is the effect of this configuration?

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Full Access
Question # 34

When configuring traffic engineering tunnels in Cisco MPLS core network, you see the traffic is not taking the expected path in the core.

Which command do you use to quickly check path of a TE tunnel?

A.

Traceroute mpls ipv4 -tunnel destination

B.

Ping

C.

show mpls traffic-engineering tunnels

D.

traceroute

Full Access
Question # 35

Which protocol is used for communication between the PCE and PCC?

A.

ICMP

B.

PCEP

C.

CEF

D.

POP

Full Access
Question # 36

A network operator needs to implement PIM-SSM multicast configuration on customer's network so that users in different domains are able to access and stream live traffic. Which two actions must the engineer perform on the network

to make the streaming work? (Choose two.)

A.

Configure at least one MSDP peer on the network

B.

Enable IGMP version 2 at the interface lever.

C.

Enable PIM sparse mode on the device.

D.

Enable IGMP version 3 at the interface level.

E.

Enable PM dense mode on the device.

Full Access
Question # 37

While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?

A.

Configure the device to pass only O and E2 routes through it.

B.

Configure the synchronization keyword in the global BGP configuration.

C.

Configure the keyword nssa in the redistribution entry.

D.

Configure the keywords internal and external in the redistribution entry.

Full Access
Question # 38

What is a constraint of Cisco MPLS TE tunnel configurations?

A.

Tunnels cannot span multiple OSPF areas.

B.

With ISIS as an IGP. only older-style metrics are used.

C.

Tunnels cannot be configured over IP unnumbered links.

D.

QoS-aware tunneling is not supported.

Full Access
Question # 39

A new PE router is configured to run OSPF as an IGP with LDP on all interfaces. The engineer is trying to prevent black holes after convergence when the PERSON device loses an LDP session with other PE routers. Which action must the engineer take to implement LDP session protection on a new PE router?

A.

Configure the mpls ldp session protection and mpls label protocol ldp commands on the interfaces on the new PE router that connect to the CENTER routers.

B.

Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands on the interfaces on the new PE router that connect to the CE routers.

C.

Configure the new PE router with the mpls ldp session protection command and on neighboring routers that connect to this new PE router.

D.

Configure the new PE router with the mpls ldp session protection command on interfaces with directly connected neighbors.

Full Access
Question # 40

What Is one of the differences between Ansible and Chef?

A.

Ansible uses YAML and Chef uses Ruby.

B.

Chef requires the use of Windows in the environment and Ansible requires Linux.

C.

Chef is highly scalable and Ansible is highly secure.

D.

Ansible uses Ruby and Chef uses Python.

Full Access
Question # 41

Simulation 6

Full Access
Question # 42

Which protocol does a Cisco MPLS TE tunnel use to maintain paths within the core?

A.

RSVP

B.

VTP

C.

STP

D.

RPF

Full Access
Question # 43

Drag and drop the functionalities from the left onto the target fields on the right.

Full Access
Question # 44

Refer to the exhibit. A client wants to filter routes to a BGP peer to limit access to restricted areas within the network. The engineer configures the route map ciscotest to filter routes from the BGP neighbor. The engineer also sets a tag that will be used for QoS in the future. Which task must be performed to complete the Implementation?

A.

Attach the new route map to the BGP neighbor statement in the inbound direction.

B.

Create a policy map named ciscotest and apply It to inbound traffic on the link that is directly connected to the BGP neighbor.

C.

Create a route map, configure BGP with an IPv4 address family, and activate the neighbor.

D.

Add a route map statement with sequence 40 that links a BGP community to the routing protocol

Full Access
Question # 45

Refer to the exhibit.

Router R1 is reporting that its BGP neighbor adjacency to router R2 is down, but its state is Active as shown. Which configuration must be applied to routers R1 and R2 to fix the problem?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 46

You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.

If you apply this code to BGP filters, which effect does the code have on your router?

A.

denies routes from AS 7070

B.

allows routes from AS 7077

C.

denies routes from AS 7007

D.

allows routes from AS 770

Full Access
Question # 47

Refer to the exhibit. LDP peering between routers R1 and R2 is dropped when the link between R1 and R2 is taken offline. However, LDP peering between R2 and R3 stays up when the link between R2 and R3 is taken offline. Which action allows MPLS traffic forwarding to continue normally if the link between R1 and R2 goes down?

A.

Enable IGP and LDP Synchronization on R1.

B.

Implement LDP Session Protection on R1.

C.

Enable IGP and LDP Synchronization on R2.

D.

Implement LDP Session Protection on R2.

Full Access
Question # 48

Refer to the exhibit.

An engineer is configuring two routers to support MPLS LDP sessions between them. The R1 configuration is complete, and work has started on R2 as shown. Which additional configuration must the engineer apply to R2 to complete the task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 49

FRR is configured on a network. What occurs when the headend router on the path is alerted to a link failure over IGP?

A.

LSP attempts fast switching on the backup path until the primary path returns to the active state.

B.

The headend router uses a presignaled LSP to bypass the failure point.

C.

A new backup tunnel is established past the PLR to pass through the protected nodes

D.

Backup tunnel is established and intersects with the primary tunnel at the headend.

Full Access
Question # 50

Refer to the exhibit.

What does this REST API script configure?

A.

application profile

B.

VRF

C.

public community string for SNMP

D.

interface with IP address 192.168.0.1

Full Access
Question # 51

Refer to the exhibit.

A network engineer with an employee id: 3812:12:993 has started to configure router R1 for IS-IS as shown. Which additional configuration must be applied to configure the IS-IS instance to advertise only network prefixes associated to passive interfaces?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 52

Refer to the exhibit.

The engineering team wants to limit control traffic on router RX with the following IP address assignments:

• Accepted traffic for router: 10.0.0.0/24

• NOC users IP allocation: 192.168.10.0/24

Which additional configuration must be applied to RX to apply the policy for MSDP?

A.

RX(config)#access-list 151 permit tcp any gt 1024 10.10.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit tcp any eq 639 10.10.0.0 0.0.0.255 gt 1024 established

B.

RX(config)#access-list 150 permit tcp any gt 1024 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit tcp any eq 639 10.0.0.0 0.0.0.255 gt 1024 established

C.

RX(config)#access-list 151 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 151 permit udp any 10.0.0.0 0.0.0.255 eq 639

D.

RX(config)#access-list 150 permit tcp any 10.0.0.0 0.0.0.255 eq 639

RX(config)#access-list 150 permit udp any 10.0.0.0 0.0.0.255 eq 639

Full Access
Question # 53

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Full Access
Question # 54

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Full Access
Question # 55

Refer to the exhibit. A large organization is merging the network assets of a recently acquired competitor with one of its own satellite offices in the same geographic area. The newly acquired network is running different routing protocol than the company's primary network. As part of the merger a network engineer implemented this route map Which task must the engineer perform to complete the Implementation?

A.

Attach the route map to an IS-IS network statement to advertise the routes learned on this interface to IS-IS

B.

Enable metric style wide to allow the use of extended metrics from the protocols

C.

Attach the route map to the redistribution command to manipulate the routes as they are shared

D.

Configure an additional route map sequence to override the implicit deny at the end of the route map

Full Access
Question # 56

After a series of unexpected device failures on the network. a Cisco engineer is deploying NSF on the network devices so that packets continue to be forwarded during switchovers The network devices reside in the same holding, but they are physically separated into two different data centers Which task must the engineer perform as part of the deployment?

A.

implement OSPF to maintain the link-state database during failover.

B.

implement VRFs and specify the forwarding instances that must remain active during failover.

C.

implement an L2VPN with the failover peer to share state Information between the active and standby devices.

D.

implement Cisco Express Forwarding to provide forwarding during failover

Full Access
Question # 57

Refer to the exhibit.

A network engineer is deploying SNMP configuration on client's routers. Encrypted authentication must be included on router 1 to provide security and protect message confidentially. Which action should the engineer perform on the routers to accomplish this task?

A.

snmp-server host 192.168.0.254 informs version 3 auth testuser config.

B.

snmp-server user testuser group 1 remote 192.168.0.254 v3 auth md5 testpassword

C.

snmp-server group group 1 v3 auth.

D.

snmp-server community public

Full Access
Question # 58

Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interface are misconfigured on these routers?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 59

What is the function of Cisco NFV infrastructure platform?

A.

It does not have a security audit feature.

B.

It does not offer high availability.

C.

It offers consistent performance.

D.

It offers decentralized logging.

Full Access
Question # 60

After troubleshooting multiple outages on the network due to repeated configuration errors, the network architect asked an engineer to enable NETCONF to facilitate future configurations. The configuration must enable syslog messaging to record NETCONF notifications from each of the numerous devices on the network. Which configuration must the engineer apply?

A.

username cisco test taker privilege 15 password 0 cisco test

aaa new-model

aaa authorization exec default local

snmp-server community cisco test RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history warnings

B.

username cisco test taker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco

logging history critical

C.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history debugging

D.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history informational

Full Access
Question # 61

Refer to the exhibit.

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Full Access
Question # 62

How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?

A.

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

B.

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

C.

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

D.

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

Full Access
Question # 63

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.

Full Access
Question # 64

Simulation2

TOPOLOGY

Full Access
Question # 65

What is a feature of model-driven telemetry?

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

Full Access
Question # 66

Refer to the exhibit. An engineer configured R6 as the headend LSR of an RSVP-TE LSP to router XR2, with the dynamic path signaled as R6-R2-R5-XR2. and set the OSPF cost of all links to 1. MPLS autotunnel backup Is enabled on all routers to protect the LSP. Which two NNHOP backup tunnels should the engineer use to complete the implementation? (Choose two.)

A.

The R6 backup tunnel path R6-R1-R4-R5.

B.

The R2 backup tunnel path R2-R5 across the alternate link.

C.

The R2 backup tunnel path R2-R1-R4-XR1-XR2.

D.

The R6 backup tunnel path R6-R2-R5

E.

The R6 backup tunnel path R6-R1-R2.

Full Access
Question # 67

An engineer a cisco MPLS tunnel to improve the streaming experience for the clients of a video -on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 68

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Full Access
Question # 69

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.

After you issue this command, which BGP packets does the PE accept?

A.

from 2.2.2.2, with a TTL ol 253 Of more

B.

from 2.2.2.2, with a TTL of less than 2

C.

to 2.2.2.2, with a TTL of less than 253

D.

to 2.2.2.2, with a TTL of 2 or more

Full Access
Question # 70

What are two features of 6RD IPv6 transition mechanism? (Choose two.)

A.

It inserts IPv4 bits into an IPv6 delegated prefix.

B.

It uses a native IPv6-routed network between CE routers and the BR router.

C.

It allows dynamic 1:N translation of IPv6 address.

D.

It uses stateful automatic 6to4 tunnels between CE routers and the BR router.

E.

It uses stateless automatic 6to4 tunnels between CE routers and the BR router.

Full Access
Question # 71

Refer to the exhibit. Router 1 and Router 2 were installed in the data center. Router 1 is the core router in the network, but it fails to establish an OSPF peering with Router 2. and customer traffic is unable to pass. Router 1 also reports an increase in CPU and memory usage. However, the CPU for R2 is stable. Which action resolves this issue?

A.

Disable Cisco Express Forwarding on Router 2.

B.

Change the transport mode to WAN on Router 1.

C.

Change the MTU to 1524 on Router 1.

D.

Enable MPLS on Router 2.

Full Access
Question # 72

What are the two uses of the YANG data modeling language? (Choose two.)

A.

It is used to access a device by HTTP.

B.

It Is used to model the configuration used by NETCONF operations.

C.

It is used to shape state data of network elements.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

E.

It is used to replace the OSI model for troubleshooting.

Full Access
Question # 73

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

A.

Remove route filtering to speed repopulation of the link-state database

B.

Copy the router s existing state information and share the file with its peers to enable BGP soft resets

C.

Implement MPLS to forward packets while the RIB updates after a faliover.

D.

Implement Graceful Restart to mitigate the delay in MPLS LDP synchronization when the IGP starts up.

Full Access
Question # 74

What are two characteristics of MPLS TE turrets? (Choose two)

A.

They require EIGRP to be running in the core.

B.

They use RSVP to provide bandwidth for the tunnel.

C.

They are run over Ethernet cores only.

D.

The headend and tailend routes of the tunnel must have a BGP relationship

E.

They are unidirectional

Full Access
Question # 75

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services For which reason do you make this decision?

A.

It enables you to choose whether to separate or centralize each individual service.

B.

It is easier to manage a system in which services are mixed

C.

It requires only one edge router

D.

It enables EGP and IGP to operate independently

Full Access
Question # 76

Refer to the exhibit:

It the NetFlow configuration is updated to version 9, which additional piece of information can be reported"?

A.

IPv6 flow information

B.

flow sequence numbers

C.

BGP AS information

D.

IPv4 flow information

Full Access
Question # 77

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Full Access
Question # 78

Which action occurs during the traceback phase of the six-phase approach to service provider security?

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Full Access
Question # 79

Refer to the exhibit. Routers R1 through R5 are being deployed within the core of a service provider running BGP The core supports distribution of VPNv4 routes using MPLS. R3 currently has multiple paths to reach R4. A network engineer must implement BGP attributes so that R3 can reach R4 via R1. Which action must the engineer take to meet the requirement?

A.

Configure R3 so the route to R4 through R1 will have a higher weight than the route from R2 or R5.

B.

Configure R2 to send the route from R4 to R1 using a higher metric than what is advertised to R3.

C.

Configure R5 to send the route from R4 to R1 using a longer AS path than the AS path that it receives from R1 or R2.

D.

Configure R3 so the route to R4 through R1 will have a lower local preference than the route from R2 or R5

Full Access
Question # 80

Drag and drop the OSs from the left onto the correct deceptions on the right.

Full Access
Question # 81

The service provider is serving hosts with two different multicast streams from source X and source Y. Source X is multicast group 224.0.0.0/8, and source Y is multicast group 226.0.0.0/8. Multicast source X should send its stream through bidirectional RP address 10.20.1.1, and multicast source Y should send its stream through RP address 10.20.2.1. Which configuration meets these requirements?

A.

Enable ip pim ssm default on RA and RB.

B.

Add ip pim bidir-enable in global mode on RB.

C.

Permit the source X and source Y IP addresses in the access list on RB.

D.

Set PIM sparse mode with a static RP address of 10.20.2.1 on RA and RC.

Full Access
Question # 82

While implementing TTL security, an engineer issues the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command. After issuing this command, which BGP packets does the PE accept?

A.

from 2.2.2.2, with a TTL of less than 2

B.

to 2.2.2.2, with a TTL of less than 253

C.

from 2.2.2.2, with a TTL of 253 or more

D.

to 2.2.2.2, with a TTL of 2 or more

Full Access
Question # 83

Refer to the exhibit.

Router 1 and router 2 are running IBGP. and router 2 and router 3 are running OSPF Area 0. Router 1 is advertising loopback interlaces Lo0 and Lo2 and router 2 is redistributing BGP into OSPF Area 0. Which configuration must an administrator apply so that router 2 uses a route map to redistribute only the internal route from Lo 2?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 84

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

  • Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.
  • Other SNMP managers must not have access to objects.
  • SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 85

Refer to the exhibit. What is the purpose of this JSON script?

A.

It changes the existing password.

B.

It updates a user authentication record.

C.

It deletes a user’s authentication record.

D.

It confirms a user’s login credentials.

Full Access
Question # 86

Refer to the exhibit.

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Full Access
Question # 87

Refer to the exhibit.

An engineer is configuring path selection on router R1 for two ASNs as shown. Which additional task must the engineer perform on Router 1 so that all outbound traffic utilizes the link between R1 and R3 to reach ASN 4567?

A.

Configure a low weigh! on the peer to ASN 4567.

B.

Configure a high weight on the peer to ASN 4567.

C.

Configure an AS path prepend on the peer to ASN 4567.

D.

Configure a high med on the peer to ASN 4567.

Full Access
Question # 88

How do intent APIs make it easier for network engineers to deploy and manage networks?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 89

Egress PE NAT is being used via a single centralized router to provide Internet access to L3VPN customers.

Which description of the NAT operation is true?

A.

Users m different VRFs cannot share the same outside global IP address

B.

The NAT table contains a field to identify the inside VRF of a translation

C.

Multiple address pools are needed for the same L3VPN because each site has a separate NAT

D.

The different L3VPNs using the Internet access must not have IP overlaps internally

Full Access
Question # 90

Which two features describe TI-LFA? (Choose two.)

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Full Access
Question # 91

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Full Access
Question # 92

Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

A.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

B.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1q 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

C.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150 dot1q 10

rewrite ingress tag pop 2 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

D.

On PE-1:

interface GigabitEthernet2

service instance 100 ethernet

encapsulation dot1ad 150

rewrite ingress tag pop 1 symmetric

On PE-2:

interface GigabitEthernet2

service instance 2 ethernet

encapsulation dot1q 10

rewrite ingress tag pop 1 symmetric

Full Access
Question # 93

Refer to the exhibit.

An engineer must configure router R2 as the new P router in the network. Which configuration must be applied to R2 to enable LDP-IGP Sync on its L2 IS-IS adjacencies?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 94

Refer to the exhibit.

The CE router is peering with both PE routers and advertising a public prefix to the internet. Routing to and from this prefix will be asymmetric under certain network conditions, but packets must not be discarded. Which configuration must an engineer apply to the two PE routers so that they validate reverse packet forwarding for packets entering their Gi2 interfaces and drop traffic from the RFC1918 space?

A.

ip verify unicast source reachable-via rx allow-default

B.

interface GigabitEthernet 2

ip verify unicast source reachable-via rx

C.

ip verify unicast source reachable-via any allow-default

interface GigabitEthernet 2

D.

ip verify unicast source reachable-via any

Full Access
Question # 95

Drag and drop the LDP features from the left onto their usages on the right.

Full Access
Question # 96

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?

A.

Configure transport connection-mod© passive on R2.

B.

Configure neighbor 172.16.172.1 authentication on R1

C.

Configure neighbor update-source lo0 on R2

D.

Configure remote-as 16213 on R1.

Full Access
Question # 97

Refer to the exhibit. Over the last few months. ISP A has doubled Its user base. The IT Director asked the engineering team to monitor memory consumption and buffer statistics on all P and PE devices In the MPLS core. Most devices have CPU usage of 70% or more, so the solution must be targeted and secure. Which two commands must the engineering team implement on P and PE devices to meet these requirements? (Choose two.)

A.

snmp-server host 192.168.101.1 version 3 auth community1 memory

B.

snmp-server enable traps memory bufferpeak

C.

snmp-server host 192.168.101.1 version 2c community1 memory

D.

snmp-server host 192.168.101.1 version 1 community1 auth memory

E.

snmp-server enable snmp-traps community1 bufferpeak

Full Access
Question # 98

Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is Mbps. The company XYZ security team asked the ISP to redirect ICMP requests which are currently going to the web server to a new local security appliance which configuration must an ISPP engineer apply to router R2 to redirect the ICMP traffic?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 99

Refer to the exhibit.

A network operator has two IPv4 and IPv6 dual-stacked network on each side of the IPv4 core network. The operator must be able to provide connectivity between them while using specific assigned IPv6 space provided from the company IP administrator team. Which technology should the network operator use to accomplish this goal?

A.

6rd

B.

NAT46

C.

DS-Lite

D.

NAT44

Full Access
Question # 100

Refer to me exhibit.

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

A.

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Full Access
Question # 101

Refer to the exhibit. A network support engineer for ASN 65502 receives a technical support ticket from a customer in ASN 65503 who reports that an eBGP session is down. The engineer determines that the peering failed after a recent change to the device at 192.168.26.2. EDGE-GW-1 must establish an eBGP session with the peering router 192.168.26.2. Which configuration establishes this session?

A.

configure terminal

no router bgp 65502

router bgp 65503

neighbor 192.168.26.2 remote-as 65503

address-family ipv4

neighbor 192.168.26.2 activate

end

B.

configure terminal

router bgp 65502

address-family ipv4

neighbor 192.168.26.2 activate

end

C.

configure terminal

no router bgp 65502

router bgp 65503

neighbor 192.168.26.2 remote-as 65123

address-family ipv4

neighbor 192.168.26.2 activate

end

D.

configure terminal

router bgp 65502

no neighbor 192.168.26.2 remote-as 65503

neighbor 192.168.26.2 remote-as 65123

address-family ipv4

neighbor 192.168.26.2 activate

end

Full Access
Question # 102

Refer to the exhibit.

An engineer working for private Service Provider with employee id: 3948:11:613 is configuring the BGPsec framework. Which two conditions must the engineer take into account? (Choose two.)

A.

BGPsec uses IPsec tunnel for security.

B.

The BGPsec framework secures the AS path.

C.

In BGPsec. all route advertisements are given an expiry time by the originator of the route.

D.

Private keys are part of the router key pair used to sign route updates.

E.

In BGPsec. route advertisements are not given an expiration time by the originator of the route.

Full Access
Question # 103

Refer to the exhibit.

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs to the interface states of Gi0/0/0/0 and Gi0/0/0/1?

A.

Gi0/0/0/1 and Gi0/0/0/0 become active

B.

Gi0/0/0/1 and Gi0//0/0 remains standby

C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby

D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby

Full Access
Question # 104

What is a role of NSO?

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Full Access
Question # 105

A network architect plans to implement MPLS OAM to provide additional troubleshooting functionality for the NOC team. After analyzing the configuration on the MPLS P/PE nodes, the architect decides to revise the CoPP policies. Which two actions ensure that the new solution is secure? (Choose two.)

A.

Allow port 3505 in the outbound direction only.

B.

Allow the ICMP protocol only.

C.

Allow the TCP and UDP protocols.

D.

Allow the UDP protocol only.

E.

Allow port 3503 in the inbound direction only.

Full Access
Question # 106

Refer to the exhibit.

A network operator working for a telecommunication company with an employee ID: 4350:47:853 must implement an IGP solution based on these requirements:

• Subnet 10.50.10.0 traffic must exit through the R1 router to connect with the Syslog server.

• Subnet 10.50.20.0 traffic must exit through the R2 router to connect with the NTP server.

• In case of link failure between R2 and R4, traffic must be routed via R1 and R3.

Which two configurations must be implemented on R5 to meet these requirements? (Choose two.)

A.

Apply a route policy to redistribute 10.50.0.0 prefixes in OSPF to ISIS and ISIS to OSPF.

B.

Apply a route policy to redistribute 10.50.20.0 from ISIS-L2 to OSPF Area 0 at a higher cost.

C.

Enable a route policy to advertise 10.50.20.0 in ISIS-L2 at a higher cost.

D.

Apply a route policy to redistribute 10.50.10.0 from OSPF Area 0 to ISIS-L2 at a lower cost.

E.

Enable a route policy to advertise 10.50.10.0 In OSPF Area 0 at a low cost.

Full Access
Question # 107

Refer to the exhibit:

Which statement describes the effect of this configuration?

A.

It applies a service policy to all interfaces remarking HTTP traffic

B.

It creates an ACL named WEB that filters HTTP traffic.

C.

It matches HTTP traffic for use in a policy map

D.

It modifies the default policy map to allow all HTTP traffic through the router

Full Access
Question # 108

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

Full Access
Question # 109

An engineer working for a telecommunication company with an employee ID: 4460:35:466 must configure an OSPF router in a multivendor network so that it performs NSF in the event of a route processor switchover. Which configuration must the engineer apply?

A.

router ospf 1 nsf Cisco

B.

router ospf 1 nsf ietf

C.

router ospf 1 nsf ietf helper

D.

router ospf 1 nsf Cisco helper

Full Access
Question # 110

Drag and drop the methods of Cisco MPLS TE tunnel traffic assignment from the left onto their characteristics on the right.

Full Access
Question # 111

A network administrator is planning a new network with a segment-routing architecture using a distributed control plane. How is routing information distributed on such a network?

A.

Each segment is signaled by a compatible routing protocol, and each segment makes its own steering decisions based on SR policy.

B.

Each segment is signaled by MPLS, and each segment makes steering decisions based on the routing policy pushed by BGP.

C.

Each segment is signaled by an SR controller, but each segment makes its own steering decisions based on SR policy.

D.

Each segment is signaled by an SR controller that makes the steering decisions for each node.

Full Access
Question # 112

Refer to the exhibit. Routers P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering. P4 is the primary Internet gateway router, and P5 is its backup. P5 is already advertising a default route into the OSPF domain. Which configuration must be applied to P4 so that it advertises a default route into OSPF and becomes the primary Internet gateway for the network?

A.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate metric 40 metric-type 2

end

B.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate metric 40 metric-type 1

end

C.

configure terminal

router ospfv3 100

address-family ipv4 unicast

redistribute bgp 65500 metric 40 metric-type 1

end

D.

configure terminal

router ospfv3 100

address-family ipv4 unicast

default-information originate always metric 40 metric-type 1

end

Full Access
Question # 113

A network engineer must implement SNMPv2 with these parameters

  • Enable SNMP community string C1sc0 with read-only permissions.
  • Enable interface index persistence.
  • Restrict the SNMP community to only the monitoring server with IP address 198.18 19 100/32.
  • Provide view-only access to ospflfEntry and ospfNbrEntry.

Which configuration must the engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 114

Refer to the exhibit.

An administrator working for large ISP must connect its two POP sites to provide internet connectivity to its customers. Which configuration must the administrator perform to establish an iBGP session between routers PE1 on POP site 1 and PE2 on POP site 2?

A.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#no neighbor 172.18.10.1 shutdown

PE2(config-router)#end

B.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#no neighbor 172.19.10.10 shutdown

PE1(config-router)#end

C.

PE1#configure terminal

PE1(config)#router bgp 65111

PE1(config-router)#address-family ipv4 unicast

PE1(config-router-af)#neighbor 172.19.10.10 activate

PE1(config-router-af)#end

D.

PE2#configure terminal

PE2(config)#router bgp 65111

PE2(config-router)#address-family ipv4 unicast

PE2(config-router-af)#neighbor 172.18.10.1 activate

PE2(config-router-af)#end

Full Access
Question # 115

Which OoS model allows hosts to report their QoS needs to the network?

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Full Access
Question # 116

Refer to the exhibit.

A network engineer notices that router R2 is failing to install network 172.16.33.1/32 in the routing table. Which configuration must the engineer apply to R2 to fix the problem?

A.

R2(config)# access-Iist 1 permit 172.16.33.0 255.0.0.0

B.

R2(config)# access-list 1 permit 172,16,33.0 255,255,255,0

C.

R2(config)# access-list 1 permit 172.16.33.0 0.0.0.255

D.

R2(config)# access-list 1 permit 172,16,33.0 255.255,0,0

Full Access
Question # 117

What is a feature of mVPN?

A.

It requires-uncast to be disabled on the multicast domain

B.

It establishes multiple static MDTs for each multicast domain.

C.

It provides the ability to support multicast over a Layer 3 VPN.

D.

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Full Access
Question # 118

Refer to the exhibit. A network engineer with an employee ID 4379:43:595 is setting up an IS-IS network with these requirements:

  • Routes with a tag of 80 and IP prefixes other than 192.168.10.20/24 must be redistributed from Level 1 into Level 2.
  • Route leaking must be configured from Level 2 into the Level 1 domain for routes that are tagged with only 50 or 40.

Which configuration must be implemented on RB to meet the requirements?

A.

Add match tag 80 in route-map Ieak2-1

B.

DUMPS Add match ip address 152 in route-map redist1-2

C.

Remove match tag 40 from route-map Ieak2-1

D.

Change match tag 80 to match tag 50 in route-map redist1-2.

Full Access
Question # 119

An engineer must extend Layer 2 Between two campus sites connected through an MPLS backbone that encapsulates Layer 2 and Layer 3 data Which action must the engineer perform on the routers to accomplish this task?

A.

Configure a EtherChannel for E-LAN.

B.

Configure a pseudowire for E-LINE.

C.

Configure Cisco MPLS TE for use with E-TREE.

D.

Configure QoS for MPLS and E-ACCESS

Full Access
Question # 120

How is a telemetry session established for data analytics?

A.

A router initiates a session using the dial-out to a destination.

B.

A destination initiate a session to a router.

C.

The destination initiate a session using the dial-out more to the router.

D.

A router requests the data using Teinet.

Full Access
Question # 121

Refer to the exhibit. All BGP peering in AS 65101 and 65201 is enabled. The operations team is told that traffic destined to 192.168.1.1/32 from R4 does not use the path R3-R2-R1 as expected. An engineer debugs the issue and determines that 192.168.1.1/32 is advertised in the BGP routing table on R1. Which action resolves the issue?

A.

Enable no synchronization on R2 m AS65101.

B.

Apply route-map High-LP out for prefix 192.168.1.1/32 on R1 with R2 BGP peering.

C.

Apply redistribute ospf 10 on R1 in BGP AS 65101.

D.

Configure network 192.168.1.1 mask 255.255.255.255 in BGP AS 65101 on R2

Full Access
Question # 122

Refer to the exhibit. The network operations team reported that the access site that is connected to R3 is not connecting to the application server in the data center and that all packets that are sent from the application server to the access site are dropped. The team verified that OSPF and BGP peerings are up in BGP AS 65101 and BGP AS 65201. R4 is expected to receive traffic from the application server route via OSPF. Which action resolves this issue?

A.

Remove the route-map on R4 when advertising 172.16.20.1 in BGP to R3.

B.

Advertise application server 172.16.20.1 in the OSPF routing table on R6.

C.

Allow 172.16.20.1 in the BGP advertisement on R3 in the route-map.

D.

Add the next-hop-self command on R6 to enable R3 iBGP peering.

Full Access
Question # 123

Refer to the exhibit.

Which the link aggregation configuration router is running on Cisco IOS XR software, which LACP interface configuration is needed to add the interface to the bundle?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 124

Refer to the exhibit.

An engineer began to configure LDP between R1 and R2, but R1 and R2 cannot yet establish an LDP TCP connection. Which additional task must be completed to finish the implementation?

A.

Configure the mpls Idp neighbor 172.16.0.1 password command on R1

B.

Configure the mpls Idp neighbor 10.0.12.1 password command on R1

C.

Configure the no mpls Idp password option 1 command on R2

D.

Configure the no mpls Idp password option 1 command on R1

Full Access
Question # 125

Refer to the exhibit:

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Full Access
Question # 126

How does Cisco MPLS TE use OSPF extensions to allow for optimized transit between a headend router and a destination router?

A.

Router LSAs share router link advertisements to each router within the MPLS environment so that tunnels can be built bidirectionally.

B.

ASBR Summary LSAs share OSPF domain information so that the two routers know how to reach each other during tunnel setup.

C.

Network LSAs share RSVP information to build the tunnel between the two routers.

D.

Opaque LSAs calculate and establish unidirectional tunnels that are set according to the network constraint.

Full Access
Question # 127

Refer to the exhibit.

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Full Access
Question # 128

Refer to the exhibit. Tier 1 ISP A purchased several Tier 2 ISPs to increase their customer base and provide more regional coverage. ISP A plans to implement MPLS services in the access layer, with scalability up to 100.000 devices In one packet network and service recovery up to 50 ms. The network architect decided to use different independent IGP and LDP domains and interconnect LSPs that are based on RFC 3107. Which two actions must the network engineer perform to meet the requirements? (Choose two.)

A.

Implement BGP PIC core functionality on routers R2 and R3.

B.

Configure three OSPF areas, with Area 0 In the core domain, and Areas 2 and 3 in the aggregation domain.

C.

Implement BGP connectivity between routers R1 and R4 with VPNv4 address family enabled.

D.

Implement BGP inline RR functionality with next-hop-self capabilities on routers R2 and R3.

E.

Implement the IS-IS routing protocol on the access domain.

Full Access
Question # 129

Refer to the exhibit.

What does the script configure?

A.

a VLAN namespace

B.

selectors for the in-band management

C.

a physical domain

D.

a static VLAN

Full Access
Question # 130

Refer to the exhibit.

A network engineer is implementing OSPF multiarea. Which command on interface GO/1 resolves adjacency issues in the new area?

A.

ip ospf network broadcast

B.

ip ospf network point-to-point

C.

ip ospf network non-broadcast

D.

ip ospf network point-to-multipoint

Full Access
Question # 131

What is the characteristic of the Tl-LFA?

A.

It guarantees a loop-free path for all interfaces in the OSPf- super backbone .

B.

It applies on each area and instance and makes all the interfaces inherit the configuration

C.

It guarantees a loop-free path for all areas configured m OSPF

D.

It applies only on the instance and makes at the interfaces inherit the configuration

Full Access
Question # 132

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

Full Access
Question # 133

Refer to the exhibit.

Router 1 is missing the route for the router 2 loopback 0. What should the engineer change to fix the problem?

A.

the area numbers on Router 1 and Router 2 to be similar

B.

the wildcard mask network statement in OSPF of Router 2

C.

Router 1 to be an ABR

D.

the hello timers on Router 1 and Router 2 to be different

Full Access