Download Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR).350-501.TestKing.2020-03-06.61q.vcex

Vendor: Cisco
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Date: Mar 06, 2020
File Size: 4 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
  
Refer to the exhibit. P3 and PE4 are at the edge of the service provider core and serve as ABR routers. Aggregation areas are on either side of the core. 
Which statement about the architecture is true?
  1. To support seamless MPLS, the BGP route reflector feature must be disabled.
  2. If each area is running its own IGP, BGP must provide an end-to-end MPLS LSP.
  3. If each area is running its own IGP, the ABR routers must redistribute the IGP routing table into BGP.
  4. To support seamless MPLS, TDP must be used as the label protocol.
Correct answer: B
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9600/software/release/16-12/configuration_guide/mpls/b_1612_mpls_9600_cg/configuring_seamless_mpls.html
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9600/software/release/16-12/configuration_guide/mpls/b_1612_mpls_9600_cg/configuring_seamless_mpls.html
Question 2
Why do Cisco MPLS TE tunnels require a link-state routing protocol?
  1. The link-state database provides segmentation by area, which improves the path-selection process.
  2. The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID.
  3. Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel.
  4. The tunnel endpoints use the link-state database to evaluate the entire topology and determine the best path.
Correct answer: D
Question 3
  
Refer to the exhibit. BGPsec is implemented on R1, R2, R3, and R4. BGP peering is established between neighboring autonomous systems. 
Which statement about implementation is true?
  1. BGP updates from the iBGP peers are appended with a community of local-as.
  2. BGP updates from the all BGP peers are appended with a community of no-export.
  3. BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator.
  4. BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature.
Correct answer: D
Question 4
You are configuring MPLS traffic-engineering tunnels in the core. Which two ways exist for the tunnel path across the core? (Choose two.)
  1. The dynamic path option is supported only with IS-IS.
  2. Tunnels can be configured with dynamic path or explicitly defined path.
  3. A zero bandwidth tunnel is not a valid option.
  4. The bandwidth statement creates a “hard” reservation on the link.
  5. Tunnel links inherit IGP metrics by default unless overridden.
Correct answer: BE
Question 5
Which configuration mode do you use to apply the mpls ldp graceful-restart command in IOS XE Software?
  1. MPLS LDP neighbor
  2. interface
  3. MPLS
  4. global
Correct answer: D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_ha/configuration/xe-3s/mp-ha-xe-3s-book/mp-ldp-grace-rstrt.html
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_ha/configuration/xe-3s/mp-ha-xe-3s-book/mp-ldp-grace-rstrt.html
Question 6
  
Refer to the exhibit. R1 is connected to two service providers and is under a DDoS attack. 
Which statement about this design is true if URPF in strict mode is configured on both interfaces?
  1. R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface.
  2. R1 drops destination addresses that are routed to a null interface on the router.
  3. R1 permits asymmetric routing as long as the AS-PATH attribute entry matches the connected AS.
  4. R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Correct answer: A
Question 7
  
Refer to the exhibit. Router 1 was experiencing a DDoS attack that was traced to interface gigabitethernet0/1. 
Which statement about this configuration is true?
  1. Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1.
  2. Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface.
  3. Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface.
  4. Router 1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Correct answer: C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/security/configuration/guide/sec_nx-os-cfg/sec_urpf.html
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/security/configuration/guide/sec_nx-os-cfg/sec_urpf.html
Question 8
  
Refer to the exhibit. An engineer is preparing to implement data plane security configuration. 
Which statement about this configuration is true?
  1. Router 2 is the router receiving the DDoS attack.
  2. Router 1 must be configured with uRPF for the RTBH implementation to be effective.
  3. Router 1 is the trigger router in a RTBH implementation.
  4. Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Correct answer: A
Question 9
Which configuration modifies Local Packet Transport Services hardware policies?
  1.   
  2.   
  3.   
  4.   
Correct answer: C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-1/addr_serv/command/reference/b_ipaddr_cr41crs/b_ipaddr_cr41crs_chapter_0111.html#wp1754734006
Reference: https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-1/addr_serv/command/reference/b_ipaddr_cr41crs/b_ipaddr_cr41crs_chapter_0111.html#wp1754734006
Question 10
You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tailend router?
  1. path
  2. tear
  3. error
  4. reservation
Correct answer: A
Explanation:
Reference: https://packetpushers.net/rsvp-te-protocol-deep-dive/
Reference: https://packetpushers.net/rsvp-te-protocol-deep-dive/
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!