Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Cisco CCNP Service Provider 350-501 Questions and answers with Dumpstech

Exam 350-501 Premium Access

View all detail and faqs for the 350-501 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions
Questions # 91:

Question # 91

Refer to the exhibit. A regional company is implementing a network-health monitoring solution on their Cisco ISR routers to monitor network performance metrics and gather real-time data. The router R1 Ethernet interface, GigabitEthernet0/0, is assigned IP address 192.168.1.1/24, and basic IP addressing and connectivity to the data-collection server have already been configured. A network engineer must update R1 to ensure secure and reliable data transmission to the monitoring server, which is located at IP address 192.168.50.50 on port 50051. To achieve secure communication, the configuration must comply with RFC 5246, and to ensure reliable data transmission, it must follow RFC 793. Which command must the engineer execute to configure data collection?

Options:

A.

telemetry ietf subscription 1 receiver ip address 192.168.50.50 50051 protocol grpc-tcp

B.

gnmi dialout address 192.168.50.50 port 50051

C.

telemetry ietf subscription 1 source-address 10.1.1.1 50051 protocol grpc-ucmp

Questions # 92:

Which protocol is used for communication between the PCE and PCC?

Options:

A.

ICMP

B.

PCEP

C.

CEF

D.

POP

Questions # 93:

Question # 93

Refer to the exhibit. Customer C-101 in ASN 65123 requested that the ISP blackholes a host route 198.19.44.195, to which the customer is receiving a significant amount of malicious traffic. Which configuration must the network engineer implement on the trigger router TR-1 to fulfill the request without affecting other IP destinations in the customer's block?

Options:

A.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

B.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.195/32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

C.

configure terminal

ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

D.

Configure terminal

Questions # 94:

Question # 94

Refer to the exhibit. A growing company with an increasing international presence requires a secure and scalable solution for inter-office data transfer across their geographically dispersed locations. To ensure departmental privacy, the network must enforce granular access control. BGP is running in the network, and two VRF instances with unique route distinguishers and route targets have been configured to segregate critical financial data from regular network traffic. A network engineer with an employee ID: 5086:72:617 must find a solution that allows for future network expansion while maintaining robust security and data privacy between departments. The solution must comply with the RFC 4364 standard. Which action must the engineer take to meet the requirements?

Options:

A.

Configure a GRE tunnel in AH mode between the two routers.

B.

Configure MPLS in L3VPN mode between the two routers.

C.

Configure a DMVPN connection between the two routers with Phase 2 mode enabled.

D.

Configure an IPsec VPN connection between the two routers with ESP protocol enabled.

Questions # 95:

What are the four primary components of an API?

Options:

A.

methods, actions, objects, and formats

B.

GET, PUT, DELETE, and SET

C.

Modularity, Abstraction, Stability, and Resources

D.

running config, startup config, VLAN database, and routing database

Questions # 96:

Drag and drop the LDP features from the left onto their usages on the right.

Question # 96

Options:

Questions # 97:

Refer to the exhibit.

Question # 97

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

Options:

A.

B.

C.

D.

Questions # 98:

What are two characteristics of MPLS TE turrets? (Choose two)

Options:

A.

They require EIGRP to be running in the core.

B.

They use RSVP to provide bandwidth for the tunnel.

C.

They are run over Ethernet cores only.

D.

The headend and tailend routes of the tunnel must have a BGP relationship

E.

They are unidirectional

Questions # 99:

Refer to the exhibit.

Question # 99

Router R1 is reporting that its BGP neighbor adjacency to router R2 is down, but its state is Active as shown. Which configuration must be applied to routers R1 and R2 to fix the problem?

A)

Question # 99

B)

Question # 99

C)

Question # 99

D)

Question # 99

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions # 100:

A company uses PIM-SM multicast with IGMPv2 to stream training videos from a server in one network to hosts in a different network. As the company has grown, the networking team decided to implement SSM to improve efficiency for multicast within Layer 2. Which action must the team take to begin the process?

Options:

A.

Configure an IGMP querier and implement Cisco Express Forwarding across the network.

B.

Implement PIM-DM to enable the routers on the LAN to identify SSM-capable multicast hosts.

C.

Implement IGMPv3 and deprecate IGMPv2.

D.

Implement IGMPv3 simultaneously with IGMPv2 on the individual links that must support SSM and PIM-DM.

Questions # 101:

A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?

Question # 101

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions # 102:

Refer to the exhibit.

Question # 102

R101 is peering with R102 and R103, and R201 is peering with R202 and R203 using iBGP Labeled Unicast address families. The OSPF area 0 border routers are in a full iBGP Labeled Unicast mesh, and VPNv4 routes are exchanged directly between PE routers R101 and R201 through iBGP Which address family-level configuration must be applied on ABR R102 on ABR R102 to support a Unified MPLS routing architecture with partitioned IGP domains?

A)

Question # 102

B)

Question # 102

C)

Question # 102

D)

Question # 102

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions # 103:

A network operator working for a private outsourcing company with an employee id: 4261:72:778 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

Options:

A.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

B.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

C.

router(config)# interface gigabitethernet0/1

router(config if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via rx

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via any

D.

router(config)# interface gigabitethernet0/1

router(config-if)# ip address 192.168.200.1 255.255.255.0

router(config-if)# ip verify unicast source reachable-via any

router(config-if)# ipv6 address 2001:DB8:1::1/96

router(config-if)# ipv6 verify unicast source reachable-via rx

Questions # 104:

Refer to the exhibit:

Question # 104

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Questions # 105:

How is a telemetry session established for data analytics?

Options:

A.

A router initiates a session using the dial-out to a destination.

B.

A destination initiate a session to a router.

C.

The destination initiate a session using the dial-out more to the router.

D.

A router requests the data using Teinet.

Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions