Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Cisco 350-501 Actual Questions

Page: 7 / 41
Total 547 questions

Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Question 25

Refer to the exhibit.

The CE router is peering with both PE routers and advertising a public prefix to the internet. Routing to and from this prefix will be asymmetric under certain network conditions, but packets must not be discarded. Which configuration must an engineer apply to the two PE routers so that they validate reverse packet forwarding for packets entering their Gi2 interfaces and drop traffic from the RFC1918 space?

Options:

A.

ip verify unicast source reachable-via rx allow-default

B.

interface GigabitEthernet 2

ip verify unicast source reachable-via rx

C.

ip verify unicast source reachable-via any allow-default

interface GigabitEthernet 2

D.

ip verify unicast source reachable-via any

Question 26

Refer to the exhibit. R1 and R3 have a pseudowire connection between them, which allows R2 and R4 to communicate via Layer 2. R2 uses VLAN 10. R4 also uses VLAN 10, but with a different subnet associated.

Which configuration should the engineer apply to R3 to rewrite the VLAN on traffic from R2 to VLAN 15?

Options:

A.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag translate 1-to-2 dot1q 15 second-dot1q 20

B.

interface TenGigE0/0/0/0.2 I2transport

 encapsulation dot1q 15

C.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag pop 1

D.

interface TenGigE0/0/0/0.2 12transport

 encapsulation dot1q 10

 rewrite ingress tag push dot1q 15 symmetric

Question 27

Refer to the exhibit. Routers R1 and R2 are connected over the internet, with the connection passing over four different autonomous systems. The company must mitigate potential DDoS attacks and protect the CPUs of the routers. A network engineer must secure all external connections on edge router R1 based on RFC 5082. R2 has already been secured. Which task should the engineer perform on R1 to achieve the goal?

Options:

A.

Configure ip neighbor 182.12.91.5 bgp multihop-ttl 4 under the global configuration.

B.

Configure ip neighbor 182.12.91.5 ttl 4 under the global configuration.

C.

Configure neighbor 182.12.91.5 ttl-security hops 4 under the BGP configuration.

D.

Configure neighbor 182.12.91.5 bgp-ttl 4 under the BGP configuration.

Question 28

Under which circumstance does BGP ignore the best-path algorithm after receiving multiple routes to a destination?

Options:

A.

when the routes are synchronized

B.

when the route's first hop has a different AS number

C.

when the routes have local-preference values less than 100

D.

when the route's next hop is unreachable

Page: 7 / 41
Total 547 questions