New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Cisco 350-501 Dumps

Page: 1 / 55
Total 547 questions

Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Questions and Answers

Question 1

Refer to the exhibit.

as

What is the effect of this configuration?

Options:

A.

R1 supports a graceful restart operation on the peer, even if graceful restart is disabled on the peer.

B.

R1 supports a peer that is configured for LDP SSO/NSF as the peer recovers from an outage.

C.

R1 failovers only to a peer that is configured for LDP SSO/NSF.

D.

R1 failovers to any peer.

Question 2

What is the role of NFVI?

Options:

A.

domain name service

B.

intrusion detection

C.

monitor

D.

network address translation

Question 3

Why do packet loops occur during the configuration of BlDlR-PIM?

Options:

A.

The network does not support BIDIR-PIM

B.

The network is partially upgraded to support BIDlR-PIM

C.

No interface for carrying traffic for multicast groups has been configured

D.

The router has not been configured to advertise itself

Question 4

What are two factors to consider when implementing NSR High Availability on an MPLS PE router? (Choose two.)

Options:

A.

It consumes more memory and CPU resources than NSF

B.

It operates normally without NSR support on the PE peers.

C.

It requires all PE-CE sessions to support NSR

D.

It requires routing protocol extensions

E.

It cannot sync state information across redundant RPs

Question 5

as

Refer to the exhibit. OSPF is running in the network, which is segmented into three areas. MPLS is enabled on all routers to support Layer 3 VPN. The network architect is concerned about potential packet loss when new OSPF adjacencies form. Which two tasks should the architect perform to implement MPLS LDP synchronization? (Choose two.)

Options:

A.

Enable MPLS functionality on all interfaces that are involved in MPLS.

B.

Configure OSPF to use the same router ID for each router that is involved in MPLS.

C.

Enable LDP sync under the OSPF process.

D.

Establish MPLS targeted sessions for connected LDP neighbors only.

E.

Establish a virtual link between the areas to support LDP sync between segments.

Question 6

What is the purpose of RSVP tear messages?

Options:

A.

to notify the tail-end router of resource unavailability on the transit router

B.

to inform the headend router of LSP issues

C.

to reuse router resources for other reservation requests

D.

to confirm successful end-to-end resource allocation

Question 7

Refer to the exhibit:

as

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Question 8

While implementing TTL security, an engineer issues the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command. After issuing this command, which BGP packets does the PE accept?

Options:

A.

from 2.2.2.2, with a TTL of less than 2

B.

to 2.2.2.2, with a TTL of less than 253

C.

from 2.2.2.2, with a TTL of 253 or more

D.

to 2.2.2.2, with a TTL of 2 or more

Question 9

as

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

Options:

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Question 10

Refer to the exhibit.

as

Which type of DDoS attack will be mitigated by this configuration?

Options:

A.

SYN flood

B.

smurf attack

C.

SIP INVITE flood attacks

D.

teardrop attack

Question 11

as

Refer to the exhibit. Company A's network architect is implementing the capabilities that are described in RFC 4379 to provide new options for troubleshooting the company's MPLS network. MPLS LSPs are signaled via the BGP routing protocol with IPv4 unicast prefix FECs. Due to company security policies, access is controlled on the control plane and management plane. Which two tasks must the architect perform to achieve the goal? (Choose two.)

Options:

A.

Open UDP port 3503.

B.

Open MCP port 3505.

C.

Implement OAM on all MPLS-enabled routers.

D.

Implement LSP Ping on PE routers only.

E.

Implement VCCV on core routers only.

Question 12

Which configuration mode do you use to apply the mpls Idp graceful-restart command in IOS XE Software? MPLS

Options:

A.

MPLS

B.

LDP neighbor

C.

global

D.

interface

Question 13

as

Refer to the exhibit. A network engineer must configure XR-PE1 for uninterruptible failover from active RP to the standby RP Neither peer devices CGW1 nor the network of ASN 64512 support restart extensions Which configuration must the engineer apply to XR PEI to complete tasks?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 14

Refer to the exhibit:

as

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

Options:

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Question 15

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

Options:

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

Question 16

Refer to the exhibit.

as

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 17

What is a characteristic of the YANG model?

Options:

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Question 18

Which additional configuration is required for NetFlow to provide traceback information?

Options:

A.

Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported.

B.

A classification ACL must be configured to identify which type of traffic will be analyzed.

C.

The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5.

D.

LLDP must be configured or the device will be unable to locate a NetFlow analyzer.

Question 19

as

Refer to the exhibit. CE1 and CE2 reside in AS 65516 and access the internet through PE1, which resides in AS 65517. The PE-CE routing protocol is BGP, and CE1 and CE2 have an established iBGP peering. A network engineer must implement a route map on CE1 so that it becomes the preferred entry point for traffic from PE1.

Which action must the engineer take to meet the requirement?

Options:

A.

Apply a route map on CE1 in the outbound direction to PE1 that sets the MED to a lower value than the MED on the link from PE1 to CE2.

B.

Apply a route map on CE1 in the inbound direction from PE1 that sets the local preference to a value less than 100.

C.

Apply a route map on CE1 in the inbound direction from PE1 that sets the weight to a value greater than 32768.

D.

Apply a route map on CE1 in the outbound direction to PE1 that prepends AS 65516 twice to the AS path.

Question 20

Refer to the exhibit.

as

An engineer at a new ISP must configure many Cisco devices in the data center. To make the process more efficient, the engineer decides to automate the task with a REST API. Which action does this JSON script automate?

Options:

A.

Configure the IP address for the existing loopback interface.

B.

Configure a physical interface on the router with an IP address and then create a loopback interface.

C.

Configure a physical interface on the router with an IP address.

D.

Delete the existing loopback Interface and replace it with a new loopback interface.

Question 21

as

Refer to the exhibit. A network engineer received a complaint about these problems in OSPF stub area 100:

    The Ethernet link is down between routers RX and RY because the fiber was cut.

    CE site A traffic to the hub site is being dropped.

Which action resolves these issues?

Options:

A.

Set the OSPF authentication type to MD5 between RX and RY DUMPS

B.

Change the OSPF area 100 type to stub on RZ.

C.

Change the OSPF priority to 100 on the interfaces that connect RX and RY.

D.

DUMPS Set the OSPF MTU to 1500 on the link between RX and RZ.

Question 22

Which BGP attribute is used first when determining the best path?

Options:

A.

origin

B.

AS path

C.

local preference

D.

weight

Question 23

A network engineer is deploying VRF on ASBR router R1. The interface must have connectivity over an MPLS VPN inter-AS Option AB network. Which configuration must the engineer apply on the router to accomplish this task?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 24

How does Cisco MPLS TE use OSPF extensions to allow for optimized transit between a headend router and a destination router?

Options:

A.

Router LSAs share router link advertisements to each router within the MPLS environment so that tunnels can be built bidirectionally.

B.

ASBR Summary LSAs share OSPF domain information so that the two routers know how to reach each other during tunnel setup.

C.

Network LSAs share RSVP information to build the tunnel between the two routers.

D.

Opaque LSAs calculate and establish unidirectional tunnels that are set according to the network constraint.

Question 25

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

Options:

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Question 26

Refer to the exhibit:

as

What does this value mean when it is received in XML?

Options:

A.

It shows the ending of the script

B.

It indicates a break in a sequence

C.

It indicates a value assigned by a network administrator to tag a route

D.

It means a data field is blank

Question 27

How do PE routers operate with the MDT in a multicast VPN?

Options:

A.

When the sending PE router recognizes that multicast data has exceeded the bandwidth threshold, it creates a data MDT and sends a UDP message to all routers using the default MDT.

B.

After the default MDT and BGP VPNv4 neighbor is configured, a different PE neighbor in the IPv6 MDT address family is configured automatically for migrating to MDT SAFI.

C.

When the source PE router establishes adjacency using PIM SM mode in the default MDT, the receiving PE requests information about the source PE for BGP advertisement.

D.

The default MDT uses PIM sparse mode and PIM establishes adjacency over the shortest path tree toward the destination PE router.

Question 28

Company A must increase throughput between two non-IEEE 802.3ad switches located in the access and distribution layers. A network engineer must create a link group with the same speed and duplex. The STP protocol must not block any of the group ports. Which action completes the implementation?

Options:

A.

Group Ethernet interfaces with mode desirable under the physical interfaces.

B.

Enable Port Aggregation Protocol with mode auto under the logical group interface.

C.

Configure a group logical interface with mode active enabled.

D.

Bundle the physical interfaces with mode lacp configured on each of them.

Question 29

What is the primary role of a BR router in a 6rd environment?

Options:

A.

It provides connectivity between end devices and the IPv4 network.

B.

It embeds the IPv4 address in the 2002::/16 prefix.

C.

It connects the CE routers with the IPv6 network.

D.

It provides IPv4-in-IPv6 encapsulation

Question 30

Refer to the exhibit.

as

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs to the interface states of Gi0/0/0/0 and Gi0/0/0/1?

Options:

A.

Gi0/0/0/1 and Gi0/0/0/0 become active

B.

Gi0/0/0/1 and Gi0//0/0 remains standby

C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby

D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby

Question 31

Refer to the exhibit:

as

Based on the show/ command output, which result m true after BGP session is established?

Options:

A.

The IOS XR router advertises all routes to the neighbor 192.168.2.2, but it does not accept any routes from 192.168.2.2

B.

The IOS XR router advertises and accepts all routes to and from eBGP neighbor 192.168.2.2 C. No routes are accepted from the neighbor 192.168.2.2, nor are any routes advertised to it

C.

The IOS XR router does not advertise any routes to the neighbor 192.168.2.2,but it accepts all routes from 192.168.2.2.

Question 32

Refer to the exhibit.

as

AN engineer is configuring segment routing on an ISP to simplify traffic engineering and management across network domains. What should the engineer do to complete the implementation of segment routing?

Options:

A.

OSPF must be configured with wide area metrics to support routing.

B.

The segment will run without any further configuration.

C.

Area authentication must be enable before segment routing will run.

D.

Area Authentication must be enable before segment routing will run.

Question 33

Refer to the exhibit.

as

A network administrator is implementing IGMP to enable multicast feed transmission to the receiver. Which configuration must the administrator deploy on GW1 to permit IGMP Joins only to the assigned (S, G) feed?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 34

Refer to me exhibit.

as

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

Options:

A.

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Question 35

as

Refer to the exhibit. A network engineer with an employee ID: 5086:72:817 is configuring a connection to manage CE1 from the OAM server on VLAN 100. PE1 must push S-VLAN tag 10 toward PE2 while forwarding traffic from CE1 to the OAM server. PE1 must push S-VLAN tag 20 toward PE2 while forwarding traffic from CE2 to the data traffic gateway. Which configuration must the engineer implement on PE2?

Options:

A.

interface GigE0/1

encapsulation dot1q 100

rewrite ingress tag pop 10

rewrite ingress tag push 20

B.

interface Ge0/0

encapsulation dot1q 100

rewrite ingress tag push dot1q 10 symmetric

interface Ge0/1

encapsulation dot1q 200

rewrite ingress tag push dot1q 20 symmetric

C.

interface GigE0/1

encapsulation dot1q 10

rewrite ingress tag push dot1q 10 symmetric

Interface Ge0/0

encapsulation dot1q 20

rewrite ingress tag push dot1q 20 symmetric

D.

Interface Ge0/1

encapsulation dot1q 100

Question 36

What do Chef and Puppet have in common?

Options:

A.

use Ruby

B.

use a master server

C.

require modules to be created from scratch

D.

manage agents referred to as minions

Question 37

Refer to the exhibit. Which additional configuration must an engineer to the adge router to inject a default router into the MP-BGP address family for the internet_Shared_Services dedicated VRF?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 38

Company A is implementing VoIP services across the company. The network architect designed a QoS policy to allow only specific IP subnets and mark the signaling flow with DSCP 36. The solution should be as secure as possible. Phones receive their IP addresses from the 172.184.12.0/24 pool and are assigned by the RADIUS server to VLAN 1021. Skinny Client Control Protocol is used as a signaling protocol in the network. For security reasons, switchport port-security maximum 1 vlan voice has been preconfigured on the switch side. Which two tasks must an engineer perform on SW_1 to achieve this goal? (Choose two.)

Options:

A.

Implement a class map with the set dscp af42 command.

B.

Implement a class map with the set dscp af43 command.

C.

Implement an ACL with the set dscp af41 command.

D.

Implement an ACL with the permit udp 172.184.12.0 0.0.0.255 any range 2000 2002 command.

E.

Implement an ACL with the permit tcp 10.124.121.0 0.0.0.255 range 16384 32767 command.

Question 39

While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?

Options:

A.

Configure the device to pass only O and E2 routes through it.

B.

Configure the synchronization keyword in the global BGP configuration.

C.

Configure the keyword nssa in the redistribution entry.

D.

Configure the keywords internal and external in the redistribution entry.

Question 40

Refer to the exhibit.

as

What is the result of this configuration?

Options:

A.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization.

B.

Router 1 and the TACACS+ server maintain one open connection between them only when network administrator is accessing the router with password ciscotest.

C.

Router 1 and the TACACS+ server maintain one open connection between them.

D.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authentication.

Question 41

Refer to the exhibit.

as

An engineer is implementing Auto-RP and reviewing the configuration of the PE-A. Which configuration permits Auto-RP messages to be forwarded over this interface?

Options:

A.

PE-A(config-if)#ip pim sparse-mode

B.

PE-A(config-if)#no ip pim bsr-border

C.

PE-A(config-if)#ip igmp version 3

D.

PE-A(config-if)#ip pim sparse-dense-mode

Question 42

Which type of attack is an application attack?

Options:

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Question 43

BGP has been implemented on a IOS XR router. Which configuration sends BGP IPv4 labels to build inter-domain LSPs?

Options:

A.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community extended

B.

router bgp 65515 no bgp default ipv4-unicast

C.

router bgp 65515 address-family ipv4 unicast neighbor 172.16.70.23 send-community

D.

router bgp 65515 neighbor 172.16.70.23 address-family ipv4 labeled-unicast

Question 44

as

Refer to the exhibit. An engineer must update the configuration of the network with these requirements:

    PE routers must define labels for IS-IS learned routes in AS100.

    P routers must not receive LDP bindings for the external network in the IPv6 address family.

Which configuration must the engineer implement to meet these requirements?

Options:

A.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global host-routes

B.

CE1(config)# mpls Idp label

 CE1(config-Idp-Ibl)# allocate global host-routes

C.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global prefix-list SPLDP

D.

PE1(config)# mpls Idp label

 PE1(config-Idp-Ibl)# no allocate global prefix-list Ipv6_All

Question 45

A network administrator is planning a new network with a segment-routing architecture using a distributed control plane. How is routing information distributed on such a network?

Options:

A.

Each segment is signalled by an SR controller, but each segment makes Its own steering decisions based on SR policy.

B.

Each segment is signalled by MPLS, and each segment makes steering decisions based on the routing policy pushed by BGP.

C.

Each segment is signalled by an SR controller that makes the steering decisions for each node.

D.

Each segment is signalled by a compatible routing protocol and each segment makes its own steering decisions based on SR policy.

Question 46

Refer to the exhibit:

as

Which effect of this configuration is true?

Options:

A.

it creates a pseudowire class named Cisco

B.

It enables tagging for VLAN 12 on the interface

C.

It enables MPLS on the interface

D.

It enables AToM on interface gigabitethemet1/0

Question 47

Refer to the exhibit.

as

An engineer is configuring router R1 for OSPFv3 as shown. Which additional configuration must be performed so that the three active interfaces on the router will advertise routes and participate in OSPF IPv6 processes?

A)

as

B)

as

C)

as

Options:

A.

Option A

B.

Option B

C.

Option C

Question 48

After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLS L3VPN services For which reason do you make this decision?

Options:

A.

It enables you to choose whether to separate or centralize each individual service.

B.

It is easier to manage a system in which services are mixed

C.

It requires only one edge router

D.

It enables EGP and IGP to operate independently

Question 49

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

Options:

A.

Enable communication over TCP port 646 for T-LDP hello messages.

B.

Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers.

C.

Enable LDP session protection on either one of the routers, which allows them to autonegotiate.

D.

Set the LDP session protection timer on each router to the same value.

Question 50

An organization with big data requirements is implementing NETCONF as part of its migration to a new cloud-based environment. The organization has multiple offices across widespread geography. A network engineer is configuring NETCONF on one of the border routers. Which configuration must the engineer apply to save the running configuration?

Options:

A.

B.

http://cisco.com/yang/cisco-ia "/>

C.

snmp-server community public RW

snmp-server trap link left

snmp-server enable traps snmp authentication linkdown linkup

snmp-server enable traps syslog

snmp-server manager

D.

logging history debugging

logging snmp-trap emergencies

logging snmp-trap alerts

logging snmp-trap critical

logging snmp-trap errors

logging snmp-trap warnings

logging snmp-trap notifications

logging snmp-trap information

logging snmp-trap debugging

Question 51

as

Refer to the exhibit. A service provider engineer Is configuring the connection between CE1 and CE2. AS 200 of the service provider and AS 100 of enterprise ABC should connect using BGP. The engineer already completed the configuration of VRF RT 100:10 of enterprise ABC. Which configuration must the engineer apply on PE1 to meet the requirement?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 52

Which function does RSVP perform in a Cisco MPLS TE environment?

Options:

A.

It establishes targeted LDP sessions between neighbors that are directly connected.

B.

It signals to LDP protocol along the path that a Cisco MPLS TE will be configured.

C.

It reserves bandwidth for LDP sessions between routers participating in a Cisco MPLS TE.

D.

It reserves the bandwidth along the path between the head-end and tail-end router.

Question 53

Refer to the exhibit:

as

Which statement describes this configuration?

Options:

A.

Router 1 has its running configuration locked so changes can be made only when the administrator issues a kill session

B.

Router 1 can be remotely managed by the CLI using Telnet

C.

Router 1 has a new data store to collect SNMP information, but configuration must still be done at the CLI only

D.

Router 1 has a temporary data store where a copy of the running configuration can be manipulated and verified before committing the configuration

Question 54

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

as

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Options:

Question 55

Refer to the exhibit.

as

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

Options:

A.

neighbor ebgp-multihop

B.

ebgp-multihop

C.

ttl-security

D.

neighbor-ttl-security

Question 56

as

Refer to the exhibit. A network engineer is implementing BGP in AS 65101 and AS 65201. R3 sends data traffic to 192.168.1.1 /32 via the path R3-R2-R1. The traffic must travel via alternate path R6-R5 for prefix 192.168.1.1/32. Which action must be taken to meet the requirement?

Options:

A.

Apply route-map HIGH-MED out on R2 for neighbor R3.

B.

Apply route-map HIGH-LP in on R3 for neighbor R6

C.

Apply route-map LOW-LP out on R2 for neighbor R3.

D.

Apply route-map LOW-MED in on R5 for neighbor R2

Question 57

Drag and drop the characteristics from the left onto the corresponding radio splitting approaches on the right

as

Options:

Question 58

as

Refer to the exhibit. A large enterprise streams training videos from a server connected to R4 to hosts connected to R5. PIM-SM is configured in the network using IGMPv2, with R2 serving as the RP. OSPF is configured in the network to support IGP routing, and the network uses BGP to access the internet through R3. The network engineering team must migrate the network to SSM.

Which action must the team take to begin the migration?

Options:

A.

Enable the MDT address family in BGP.

B.

Change the PIM version from PIM-SM to PIM-DM.

C.

Upgrade IGMPv2 to IGMPv3.

D.

Update the device configurations so that R5 will serve as the RP.

Question 59

as

Refer to the exhibit an engineer working for a private telecommunication company with an employee Id: 4065:96:080 upgrades the WAN link between routers ASBR-101 and ASBR-201 to 1Gb by Installing a new physical connection between the Gi3 Interfaces. Which BGP attribute must the engineer configure on ASBR-201 so that the existing WAN link on Gi2 Is maintained as a backup?

as

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 60

In MPLS traffic engineering, which FRR operation swaps the label and pushes the backup label?

Options:

A.

Merge Point

B.

Point of Local Repair

C.

Branch Point

D.

Mid-Point

Question 61

What is the purpose of DS-Lite technology?

Options:

A.

It enables networks to pass encapsulated IPv4-in-IPv6 traffic over the ISP backbone.

B.

It allows network administrators to implement shared IPv4 addresses between the ISP and its customers.

C.

It allows an ISP to service IPv6 networks over an IPv4-enabled ISP backbone.

D.

It allows network administrators to transition a network to IPv6 while maintaining IPv4 support.

Question 62

as

Refer to the exhibit. All edge routers are fully meshed via the IBGP and IS-IS routing protocols, and LDP is used for label distribution. The network engineer must protect the TE tunnels and MPLS network from interface flaps and retain label information in the LIB cache for 10 minutes. Which action completes the implementation?

Options:

A.

Enable the MPLS TTL signaling expiration timer with the timeout set to 10 minutes.

B.

Implement MPLS label protection with a duration of 10 minutes.

C.

Enable signaling synchronization for MPLS traffic engineering with the timeout set to 600 seconds.

D.

Implement LDP session protection with a duration of 600 seconds.

Question 63

When configuring traffic engineering tunnels in Cisco MPLS core network, you see the traffic is not taking the expected path in the core.

Which command do you use to quickly check path of a TE tunnel?

Options:

A.

Traceroute mpls ipv4 -tunnel destination

B.

Ping

C.

show mpls traffic-engineering tunnels

D.

traceroute

Question 64

as

Refer to the exhibit. A large enterprise is migrating its network to use MPLS VPNs between different business divisions. Within the core, routes are shared between the routers using OSPF, and each connected link maintains an MPLS neighbor relationship.

Which action must the migration team take so that LDP neighbor relationships are maintained if a directly-connected link goes down?

Options:

A.

Implement targeted LDP sessions between directly connected routers and between routers that are one hop away.

B.

Implement LDP session protection between each directly connected LDP neighbor.

C.

Implement LDP sync between routers that are directly connected to each business division.

D.

Implement targeted LDP sessions between routers that are directly connected to each business division.

Question 65

Refer to the exhibit:

as

Which statement about the status of the neighbor relationship between R1 and R2 is true?

Options:

A.

The neighbor relationship is down because the two routers are configured with different area types

B.

The neighbor relationship is down because the two routers are in the same subnet.

C.

The neighbor relationship is up because R2 is level 1 and level 2 router.

D.

The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different area

Question 66

Egress PE NAT is being used via a single centralized router to provide Internet access to L3VPN customers.

Which description of the NAT operation is true?

Options:

A.

Users m different VRFs cannot share the same outside global IP address

B.

The NAT table contains a field to identify the inside VRF of a translation

C.

Multiple address pools are needed for the same L3VPN because each site has a separate NAT

D.

The different L3VPNs using the Internet access must not have IP overlaps internally

Question 67

Refer to the exhibit.

as

An engineer configured multicast routing on client's network. What is the effect of this multicast implementation?

Options:

A.

R2 floods information about R1 throughout the multicast domain.

B.

R2 is unable to share information because the ip pirn autorp listener command is missing.

C.

R1 floods information about R2 throughout the multicast domain.

D.

R2 is elected as the RP for this domain.

Question 68

Which service is a VNF role?

Options:

A.

Compute

B.

Network

C.

Firewall

D.

Storage

Question 69

Refer to the exhibit.

as

What does this REST API script configure?

Options:

A.

application profile

B.

VRF

C.

public community string for SNMP

D.

interface with IP address 192.168.0.1

Question 70

Refer to the exhibit:

as

A network engineer is implementing an OSPF configuration Based on the output, which statement is true?

Options:

A.

In the ospfv3 1 area 1 ipv4 command, area 0 must be configured instead of area 1.

B.

OSPFv3 does not run for IPv4 on FastEthemet0/0 until IPv6 routing is enabled on the router and IPv6 is enabled on interface Fastfc.thernet0/0

C.

OSPFv3 cannot be configured for IPv4; OSPFv3 works only for IPv6.

D.

IPv6 routing not enabled" is just an informational message and OSPFv3 runs for IPv4 on interface FastEthernet0/0 anyway

Question 71

as

Refer to the exhibit. ISP_A is a Tier-1 ISP that provides private Layer 2 and Layer 3 VPN services across the globe using an MPLS-enabled backbone network. Routers R1, R2, R13, and R14 are PE devices. ASRs R3 and R4 and ASBRs R11 and R12 are acting as route reflectors with preconfigured next-hop-self for all BGP neighbors. After the network experienced IGP RIB overflow with multiple routes, a network engineer is working on a more scalable network design to minimize the impact on local RIBs. The solution should be based on RFC 3107 and maintain existing QoS capabilities.

Which task must the engineer perform to achieve the goal?

Options:

A.

Implement Seamless Segment Routing on the ABR routers.

B.

Implement MPLS Traffic Engineering on PE routes only.

C.

Implement Hierarchical MPLS VPLS across all LDP-enabled routers.

D.

Implement Unified MPLS on all MPLS-enabled routers.

Question 72

What is a characteristics of the Pipe model for MPLS QoS?

Options:

A.

The same QoS policy is applied to all customer traffic on the egress PE.

B.

If the outer EXP is changed, it is copied to the DSCP value.

C.

The MPLS EXP bits are set by the CE.

D.

The DSCP value determines how the packet is forwarded

Question 73

Refer to the exhibit.

as

While troubleshooting the network, a network operator with an employee id: 3812:12:993 is trying to ping XR1. Which result should the operator expect when trying to ping to an XR1 local address?

Options:

A.

ICMP traffic works at a policed rate of 19 bytes per second every 100 ms

B.

All ICMP traffic responds successfully.

C.

All ICMP traffic is dropped.

D.

ICMP traffic works at a policed rate of 19 packets every 100 ms.

Question 74

Refer to the exhibit.

as

CE1 and CE2 require connectivity to the internet through the ISP connected to PE3 What should an engineer configure to complete this task?

Options:

A.

PE2 must be configured to serve as a route reflector for PE3 routes learned from the internet. PE2 then shares the routes with CE1 and CE2.

B.

CE1 and CE2 must be configured with a route distinguisher in the PE1 VRF that dynamically imports the route from the internet.

C.

CE1 and CE2 must be configured to use a static default route with a next-hop of PE3 to reach internet routes.

D.

PE1 must be configured with an import route target in the CE1 VRF that matches the export route target for the internet VRF on PE3.

Question 75

Refer to the exhibit.

as

An engineer with an employee 10:4350:47:853 is implementing IS-IS as the new routing protocol in the network. All routers in the network operate as Level 2 routers in the same private autonomous system, and the three branches are connected via dark fibre. The engineer has already implemented IS-IS on router R1 with NET address 49.0133.532b.ca14.6915.21311.F40F.1B3a.ba10.00. Which IS-IS NET address configuration must be implemented on R3 to establish IS-IS connectivity?

Options:

A.

49.0133.532b.ca14.6915.21311.f40f.1b4a.bb87.00

B.

49.0135.332b.ca14.6975.28371.1721.1b3b.ca11.10

C.

48.0133.532b.ca14.6915.21311.f40f.1626.bb98.00

D.

49.0133.532b.ca14.6915.21311.1721.1b4a.0013.01

Question 76

as

Refer to the exhibit. A network operations team is implementing eBGP on the service provider network. Data traffic between routers R1 and R4 must use the R2-R3 link, which connects AS 65101 and AS65201. iBGP sessions with adjacent routers are up on 10.10.10.1 and 10.10.10.4. The team is now updating the configuration for eBGP peers on routers R2 and R3. Which action must be taken to meet the requirements?

Options:

A.

Add the soft-reconfiguration command.

B.

Add the ebgp-multihop command.

C.

Remove the update-source command.

D.

Remove the next-hop-self command.

Question 77

A company uses PIM-SM multicast with IGMPv2 to stream training videos from a server in one network to hosts in a different network. As the company has grown, the networking team decided to implement SSM to improve efficiency for multicast within Layer 2. Which action must the team take to begin the process?

Options:

A.

Configure an IGMP querier and implement Cisco Express Forwarding across the network.

B.

Implement PIM-DM to enable the routers on the LAN to identify SSM-capable multicast hosts.

C.

Implement IGMPv3 and deprecate IGMPv2.

D.

Implement IGMPv3 simultaneously with IGMPv2 on the individual links that must support SSM and PIM-DM.

Question 78

Refer to the exhibit.

as

Refer to the exhibit. An ISP provides shared VoIP Extranet services to a customer in VRF-100 with these settings:

The VoIP services are hosted in the 198.19.100.0/24 space.

The customer has been assigned the 198.18.1.0/29 IP address block.

VRF-100 is assigned import and export route target 65010:100.

Which configuration must the engineer apply to PE-1 to provision VRF-100 and provide access to the shared services?

Options:

A.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

import map VRF-100-IMPORT

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65010:100

!

route-map VRF-100-I

B.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:2999

exit-address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:1999

route-map VRF-100-EXPORT permit 20

set extcommunity rt 65

C.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

export map VRF-100-EXPORT

route-target import 65010:100

route-target import 65010:1999

exit address-family

!

route-map VRF-100-EXPORT permit 10

match ip address prefix-list VRF-100-ALLOWED-EXPORT

set extcommunity rt 65010:100 65010:2999

route-map VRF-100-EXPORT permit 20

set extcommunity r 650

D.

vrf definition VRF-100

rd 172.17.255.1:100

!

address-family ipv4

route-target export 65010:100

route-target export 65010:1999

route-target import 65010:100

route-target import 65010:2999

exit-address-family

Question 79

In an MPLS network, which protocol can be used to distribute a Segment Prefix?

Options:

A.

OSPF

B.

LDP

C.

RSVP-TE

D.

EIGRP

Question 80

Which capability does RSVP provide in an MPLS network?

Options:

A.

signaling a primary path for LSP tunnels

B.

reserving up to 75% of interface bandwidth by default

C.

reserving bandwidth for multicast flows

D.

supporting interoperability between IntServ and DiffServ architecture models

Question 81

Drag and drop the LDP features from the left onto the correct usages on the right.

as

Options:

Question 82

Refer to the exhibit:

as

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

as

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

Options:

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Question 83

In an EVPN operation, how does the PE determine and advertise Ethernet segment reachability?

Options:

A.

The PE discovers the remote PEs in the EVI and builds a flood list linked with the EVI.

B.

The PE discovers and shared routing information for the B-MAC addresses associated with local Ethernet segments.

C.

The PE discovers other PEs in the same Ethernet segment and elects a DF.

D.

The PE discovers remote ESIs and determines their redundancy mode.

Question 84

A regional company is planning to bolster the security of their LAN infrastructure by implementing advanced encryption techniques between their core switch and their distribution switch. The solution must leverage hardware-accelerated encryption capabilities to transparently encrypt all traffic between the two switches at the data-link layer to safeguard against unauthorized access. However, it is important for the solution to have minimal impact on network performance and latency.

Which action must the engineer take to meet the requirements?

Options:

A.

Deploy an IPsec tunnel with MD5 hashing between the two switches.

B.

Enable SSL VPN with SHA-256 encryption on all interfaces on both switches.

C.

Enable L2TP with RSA encryption on both switches.

D.

Implement MACsec with AES-256 encryption on both switches.

Question 85

What is the primary purpose of routed optical networks?

Options:

A.

to simplify network management by collapsing multiple layers into a single architecture

B.

to provide redundancy for failed network connections by automatically switching to backup paths

C.

to convert analog signals to digital signals for transmission over fiber-optic cables

D.

to encrypt and secure data traveling across the network

Question 86

as

Refer to the exhibit. AS 65517 is running OSPF within the core. BGP is running between all four autonomous systems, interconnecting several ISPs that provide intranet and extranet services. All of the PE routers are connected, and eBGP peering relationships have been established. A network engineer also configured an iBGP peering between PE3 and P1, and the peering is up. However, P1 cannot reach routes outside of AS 65517. Which action must the engineer take so that P1 reaches external routes?)

Options:

A.

Synchronize BGP and OSPF with AS 65517.

B.

Add the next-hop-self attribute under the BGP neighbor configuration for P1 on PE3.

C.

Install route targets on all PE routers under the VRF configuration for intranet services.

Question 87

as

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements:

Session protection is provided for core loopback IP addresses only.

The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails.

Which configuration must the team implement on PE-XR1?

Options:

A.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

B.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

C.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

D.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

Question 88

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

Options:

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Question 89

Refer to the exhibit.

as

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol.Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Options:

A.

Configure an IP domain name.

B.

Configure service password encryption.

C.

Configure crypto keys

D.

Configure ACL 100 to permit access to port 22.

E.

Configure a password under the vty lines.

Question 90

as

Refer to the exhibit. The operations team for a service provider network is implementing a route map policy. OSPF area 0 should originate the default route with a type 2 metric of 2 when the application server on the connected interface (192.168.1.1) is up. Routers RL and RM have set up OSPF peering with other adjacent routers. Which action meets this requirement?

Options:

A.

Apply default-information originate route-map ospf-default-route on router RL.

B.

Configure distribute-list route-map ospf-default-route out on router RM.

C.

Configure distribute-list route-map ospf-default-route out on router RL.

D.

Apply default-information originate route-map ospf-default-route on router RM.

Question 91

What causes multicast traffic to permanently stay on the shared tree and not switch to the source tree?

Options:

A.

The SPT threshold is set to infinity.

B.

The RP IP address is configured incorrectly.

C.

The RP announcements are being filtered.

D.

SSM range is being used.

Question 92

An engineer working for a private service provider with employee id: 3994 37 650 is configuring a Cisco device to redistribute OSPF into BGP. Which task enables the device to filter routes?

Options:

A.

Configure a distribute list and associate it to the BGP peer interface

B.

Configure a prefix list and associate it to the BGP peer interface

C.

Configure a route map and reference it with the redistribute command

D.

Configure an access list and reference it with the redistribute command

Question 93

A customer of an ISP requests support to setup a BGP routing policy. Which BGP attribute should be configured to choose specific BGP speakers as preferred exit

points for the customer AS?

Options:

A.

highest local preference outbound

B.

lowest local preference inbound

C.

highest local preference inbound

D.

lowest multi-exit discriminator

Question 94

How does TI-LFA reduce packet loss in Segment routing?

Options:

A.

It determines which link to use when load balancing to prevent packet fragmentation loss.

B.

It establishes multiple labels per path using more than one IGP.

C.

It calculates loop-free backup paths that are rapidly implemented in case of a link failure.

D.

It enables path selection in SR-TE to support MPLS label allocation.

Question 95

as

Refer to the exhibit. R1 has two upstream Tier 1 service providers. BGP is in use as the exterior routing protocol, and ISP_A and ISP_B are sending the full BGP table. A network engineer must assign local-preference 70 to all routes with multiple exit discriminator 30. Which configuration must the network engineer apply?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 96

Simulation 5

as

as

Options:

Question 97

Which protocol is used for communication between the PCE and PCC?

Options:

A.

ICMP

B.

PCEP

C.

CEF

D.

POP

Question 98

What is the primary purpose of containers in a service-provider virtualization environment?

Options:

A.

to simplify the integration of various hardware components

B.

to enable secure communication between individual network devices

C.

to provide an isolated environment for applications and services

D.

to improve the redundancy of network components

Question 99

Which two features will be used when defining SR-TE explicit path hops if the devices are using IP unnumbered interfaces? (Choose two.)

Options:

A.

router ID

B.

labels

C.

node address

D.

next hop address

E.

output interface

Question 100

A network engineer must implement an ACL-based solution to mitigate availability issues on a web service that is hosted on a server at IP address 172.16.15.18/23. Access to the web server should be allowed over HTTP from RFC 1918 addresses only. The network architect has already enabled PMTUD in the network. Which ACL configuration must the engineer implement to complete the task?

Options:

A.

access-list 198 deny ip any host 172.16.15.18 fragments

access-list 198 permit 6 10.0.0.0 0.255.255.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 permit 6 172.16.0.0 0.0.255.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 permit 6 192.168.0.0 0.0.0.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 deny ip any any

B.

access-list 198 deny ip any host 172.16.15.18 ip-fragments

access-list 198 permit 18 10.10.0.0 0.0.255.0 172.16.15.18 255.255.254.0

access-list 198 permit 18 172.16.0.0 255.255.0 172.16.15.18 255.255.254.0

access-list 198 permit 18 192.168.0.0 255.255.0 172.16.15.18 255.255.254.0

access-list 198 deny tcp any any

C.

access-list 199 deny ip any host 172.16.15.18 tcp-fragments

access-list 199 permit tcp 10.0.0.0 0.0.255.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 permit tcp 172.16.0.0 0.0.0.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 permit tcp 192.168.0.0 0.0.0.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 deny ip any any

D.

access-list 199 deny tcp any host 172.16.15.18 http-fragments

access-list 199 permit 16 10.10.0.0 0.255.255.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 permit 16 172.16.0.0 0.0.255.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 permit 16 192.168.0.0 0.0.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 deny tcp any any

Question 101

as

Refer to the exhibit. Users in AS 65010 are connected with the application server in AS 65050 with these requirements:

AS 65010 users are experiencing latency and congestion to connect with application server 172.16.50.10.

AS 65030 must be restricted to become Transient Autonomous System for traffic flow.

Links connected to AS 65020 and AS 65040 are underutilized and must be used efficiently for traffic.

Which two configurations must be implemented to meet these requirements? (Choose two.)

Options:

A.

Apply the AS-Path route-map policy for traffic received from R3.

B.

Configure the route map to prepend the AS-Path attribute for R5-R3 BGP peering.

C.

Apply the MED route-map policy for traffic received from R4.

D.

Configure a higher Local preference for R5-R4 BGP peering.

E.

Configure the route map to set the MED 50 attribute for R5-R4 BGP peering.

Question 102

Refer to the exhibit.

as

A network engineer Is implementing OSPF multiarea. Which command on interface G0/1 resolves adjacency Issues in the new area?

Options:

A.

Ip ospf network broadcast

B.

Ip ospf network non-broadcast

C.

Ip ospf network polnt-to-multlpoint

D.

Ip ospf network point-to-point

Question 103

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

Options:

A.

global configuration mode

B.

routing configuration mode

C.

BGP neighbor configuration

D.

mode BGP address-family configuration mode

Question 104

Refer to the exhibit:

as

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

Options:

A.

LDP needs to be enabled on the R2 physical interface

B.

R2 does not see any hellos from R1

C.

LDP needs to be enabled on the R2 loopback interface

D.

R2 sees the wrong type of hellos from R1

Question 105

What is the role of NSO?

Options:

A.

Provides public cloud services for customers that need Internet access.

B.

Controls the turn-up of a device.

C.

Provides network monitoring services for Layer 3 devices.

D.

Maintains data storage.

Question 106

as

Refer to the exhibit. A network engineer is configuring a new router for iBGP to improve the capacity of a growing network. The router must establish an iBGP peer relationship with its neighbor. The underlay network is already configured with the correct IP addresses. Which step should the engineer apply to complete this task?

Options:

A.

Implement multicast routing on the router to support BGP hellos.

B.

Configure the AS number for the router to share with its iBGP peers.

C.

Configure the new router as an iBGP route reflector to support multiple iBGP peers.

D.

Activate the BGP peers under the correct address family on the router.

Question 107

as

Refer to the exhibit. A network engineer just upgraded the Cisco IOS XE Software to the newest version on OSPF routers R1 and R2, added the point-to-point network type under Gi0/0 on R2, and configured ip route 192.168.10.0 255.255.255.0 192.168.1.2 on R1. After the engineer restarted the routers, R1 entered the Exstart state with its neighbor, but the adjacency has not been established. Which action must the engineer take to resolve the issue?

Options:

A.

Set the network type of the R2 OSPF interface to broadcast.

B.

Add a static route toward 192.168.20.0 on R2.

C.

Change the R2 OSPF router ID to 10.1.1.1.

D.

Decrease the OSPF cost of the network on R2 to 10.

Question 108

A network engineer must enable the helper router to terminate the OSPF graceful restart process if it detects any changes in the LSA. Which command enables this feature?

Options:

A.

nsf ietf helper disable

B.

nsf cisco enforce global

C.

nsf ietf helper strict-lsa-checking

D.

nsf Cisco helper disable

Question 109

Which programmable API allows the service provider to plan and optimize the automation of network operations and achieve closed-loop operations?

Options:

A.

Network Services Orchestrator

B.

WAN Automation Engine

C.

Evolved Programmable Network Manager

D.

Crosswork Network Automation

Question 110

Exhibit:

as

A network engineer must update the routing toward the web server with IP address 35.22.13.1. The primary path must be configured via the neighbor router with ID 1.1.1.1. However, local-preference configuration is not permitted on R1. Which task must the engineer perform on R1 to complete the implementation?

Options:

A.

Configure the device to choose the best MED from the same AS.

B.

Set the device to ignore the conditional MED if the route originated in a different autonomous system.

C.

Enable MED comparison between routes from neighbors in different AS.

D.

Implement deterministic MED to choose the best route from the different AS.

Question 111

as

Refer to the exhibit. In the service provider network, routers PE1, PE2, and PE4 have access to the internet and provide access to customer networks. Router PE3 is used for access to other customer systems. In accordance with a new SLA, an engineer is updating settings on this network so that router CE1 accesses the internet via PE1 instead of PE2. Which two tasks must the engineer perform to complete the process? (Choose two.)

Options:

A.

On PE1, configure the internet VRF with import route target 102:102.

B.

On PE1 and PE4, configure the internet VRF with import route targets 102:102 and 104:104.

C.

On PE2, configure the internet VRF with import route target 102:102.

D.

On PE2 and PE3, configure the internet VRF with import route target 101:101.

E.

On PE2, configure the CE1 VRF with import route target 101:101.

Question 112

What is the function of the FEC field within the OTN signal structure?

Options:

A.

It allows the sending devices to apply QoS within the OTN forwarding structure.

B.

It allows source nodes to discard payload errors before transmitting data on the network.

C.

It allows receivers to correct errors upon data arrival.

D.

It allows deep inspection of data payload fields.

Question 113

as

Refer to the exhibit. The network is configured with OSPF. A networking team just connected a streaming multicast server to router R7, and they now must enable access for users throughout the network to stream video from the server.

Which action must the team take so that users can stream video without overloading the network?

Options:

A.

Implement PIM-DM on the link between the server and R7.

B.

Implement PIM-SM on the LAN network connecting R5, R6, R3, and R4.

C.

Implement PIM-SM on all routers and connected links.

D.

Implement PIM-DM on all interfaces in the network except the LAN connection between R5, R6, R3, and R4.

Question 114

After a possible security breach, the network administrator of an ISP must verify the times that several different users logged into the network. Which command must the administrator enter to display the login time of each user that activated a session?

Options:

A.

show netconf-yang sessions detail

B.

show netconf-yang datastores

C.

show platform software yang-management process

D.

show netconf-yang sessions

Question 115

A mid-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company's two sites across the service provider core. To meet service requirements, the service provider must extend the Layer 2 domain between the company's two locations.

Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

Options:

A.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

B.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag push dot1q 21 symmetric

C.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag pop 13

D.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag translate 1-to-1 dot1q 2

Question 116

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?

as

as

as

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 117

Which function does orchestrated fulfillment perform under the Cisco Network Services Orchestrator model?

Options:

A.

It maintains the service topology in an inventory system to enable accurate assessment of service impact and support root-cause analysis.

B.

It translates the networking service high-level intent into device configurations, and pushes the configurations to physical and virtual devices.

C.

It leverages open-source NFV components such as OpenStack virtual infrastructure manager and Open vSwitch to create necessary service chains among VNFs.

D.

It instantiates virtual test probes to perform activation testing and provide ongoing measurement of service KPIs against defined SLAs.

Question 118

Refer to the exhibit.

as

Routers R2 and R3 are Level 1/Level 2 IS-IS routers that redistribute 198 18.x.x/24 prefixes to routers R5 and R6 In the Level 1 area R2 Is to be the preferred router for all redistributed prefixes in the Level 1 area. Which configuration sets this preference?

as

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 119

An engineer Is implementing NSR with OSPF on a large campus that requires high availability. Which task must an engineer perform to complete the process with minimal disruption to traffic?

Options:

A.

Reset OSPF neighbor sessions to maintain state Information during router switchover

B.

Configure the device to repopulate state information using routing updates received from the BDR

C.

increase the keepalive interval on the OSPF neighbors so that traffic continues to pass during the switchover.

D.

Ensure that the dual RP has synchronized their state information before performing the switchover operation.

Question 120

as

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

Options:

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Question 121

Refer to the exhibit.

as

A network engineer with an employee id: 3812:12:993 has started to configure router R1 for IS-IS as shown. Which additional configuration must be applied to configure the IS-IS instance to advertise only network prefixes associated to passive interfaces?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 122

Refer to the exhibit.

as

An engineer ran this show telemetry command to view subscription SUB11 on RouterX. The engineer then decided that RouterY should provide the same output lor sensor group SGroup13 as RouterX. The engineer cannot access RouterX to copy its configuration No access lists on the router block user access Which configuration must the engineer apply on RouterY to provide the same output from the show telemetry command?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 123

as

Refer to the exhibit. Router R13 is operating in Level 1 / Level 2 mode. A network engineer with an employee ID: 5209:82:636 must change the IS-IS cost of the route IP address 10.212.124.1 to 90. The metric update must be carried over in TLV 128. Which configuration must be implemented to complete the task?

Options:

A.

metric-style isis wide 90 under interface loopback1 on R13

B.

metric cost 90 under interface Gi1/1/1 on R12

C.

isis metric 80 under interface loopback1 on R13

D.

Isis metric 90 under interface Gi1/1/1 on R12

Question 124

as

Refer to the exhibit. An engineer is scripting ACLs to handle traffic on the given network. The engineer must block users on the network between R1 and R2 from leaving the network through R5. but these users must still be able to access all resources within the administrative domain. How must the engineer implement the ACL configuration?

Options:

A.

Configure an ACL that permits traffic to any internal address, and apply it to the R5 interfaces to R3 and R4 in the egress direction

B.

Configure a permit any ACL on the R1 interface to R2 in the egress direction, and a deny any ACL on the interface in the ingress direction

C.

Configure an ACL that permits traffic to all internal networks and denies traffic to any external address, and apply it to the R2 interface to R1 in the ingress direction.

D.

Configure an ACL that denies traffic to any internal address and denies traffic to any external address, and apply it to the R5 interfaces to R3 and R4 in the ingress direction

Question 125

You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.

as

If you apply this code to BGP filters, which effect does the code have on your router?

Options:

A.

denies routes from AS 7070

B.

allows routes from AS 7077

C.

denies routes from AS 7007

D.

allows routes from AS 770

Question 126

Refer to the exhibit:

as

An engineer wants to authenticate the OSPF neighbor between PEA and PE-B using MD5.

Which command on PE-B successfully completes the configuration?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 127

Refer to the exhibit.

as

What does the script configure?

Options:

A.

a VLAN namespace

B.

selectors for the in-band management

C.

a physical domain

D.

a static VLAN

Question 128

Which module refers to the network automation using Ansible?

Options:

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Question 129

Refer To the exhibit:

as

On R1, which output does the show isis neighbors command generate?

A)

as

B)

as

C)

as

D)

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 130

Which feature describes the weight parameter for BGP path selection?

Options:

A.

Its value is local to the router

B.

Its value is set either locally or globally.

C.

Its default value is 0.

D.

Its value is global to the router.

Question 131

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

as

Options:

Question 132

What is a characteristic of MVPN?

Options:

A.

It bypasses the use of MPLS in the service provider core and transmits packets using IP only.

B.

It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP core.

C.

It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.

D.

It creates GRE tunnels to route multicast traffic over a service provider IP core.

Question 133

A network engineer is configuring a BGP route policy for the SUBNET prefix set. Matching traffic must be dropped, and other traffic must have its MED value set to 400 and community 4:400 added to the route. Which configuration must an engineer apply?

as

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 134

as

Refer to the exhibit. Router P4 and P5 receive the 0.0.0.0/0 route from the ISP via eBGP peering P4 is the primary Internet gateway router, and P5 is its Backup. P5 is already advertising a default route into OSPF domain. Which configuration must Be applied to P4 so that advertises a default route Into OSPF and Becomes me primary internet gateway for the network?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 135

Refer to the exhibit.

as

An engineer must configure router R2 as the new P router in the network. Which configuration must be applied to R2 to enable LDP-IGP Sync on its L2 IS-IS adjacencies?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 136

Which characteristic describes prefix segment identifier?

Options:

A.

It contains the interface address of the device per each link.

B.

It Is globally unique.

C.

It is locally unique.

D.

It contains a router to a neighbor.

Question 137

A network engineer is configuring a router to send multicast traffic for the 239.10.10.10 group. Which configuration must an .... forward the traffic?

Options:

A.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp max-groups action replace

B.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp filter

C.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp access-group 239.10.10.10

D.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp join-group 239.10.10.10

Question 138

as

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

    Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.

    Other SNMP managers must not have access to objects.

    SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 139

An engineer working for telecommunication company with an employee id: 3715 15 021 needs to secure the LAN network using a prefix list Which best practice should the engineer follow when he implements a prefix list?

Options:

A.

An engineer must use non sequential sequence numbers in the prefix list so that he can insert additional entries later.

B.

The final entry in a prefix list must be /32

C.

An engineer must identity the prefix list with a number only

D.

An engineer must include only the prefixes for which he needs to log activity.

Question 140

Refer to the exhibit.

as

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

Options:

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Question 141

as

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

Options:

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Question 142

How is RSVP used with MPLS traffic engineering tunnels?

Options:

A.

It assigns a tag to a packet as it travels through the tunnel.

B.

It removes and reassigns an MPLS label when the packet enters the tunnel.

C.

It reduces the CPU burden when a packet travels through the tunnel.

D.

It reserves bandwidth along the path of the tunnel.

Question 143

Network devices in the core layer use different IGPs, and the network is split into several areas. The engineer must use a NETCONF operation to load a full interface configuration on multiple Cisco devices to ensure that they meet company standards. The devices must work over SSH from the Linux jump server. Which action meets the configuration requirements?

Options:

A.

Use the NETCONF operation to load the configuration and verify that TCP port 830 is open from the Linux server to the routers.

B.

Use the NETCONF operation to load the configuration and verify that TCP port 630 is open from the Linux server to the routers.

C.

Use the NETCONF operation to load the configuration and verify that TCP port 22 is open from the Linux server to the routers.

D.

Use the NETCONF operation to load the configuration and verify that TCP port 22 is open from the Linux server to the routers.

Question 144

A network team has failed to implement IS-IS multitopology. What is the reason for it?

Options:

A.

The router did not support VRFs.

B.

The routing process did not support extended metrics.

C.

The router did not have Cisco Discovery Protocol and Cisco Express Forwarding disabled.

D.

The routing process supported Level 1 only.

Question 145

What are the four primary components of an API?

Options:

A.

methods, actions, objects, and formats

B.

GET, PUT, DELETE, and SET

C.

Modularity, Abstraction, Stability, and Resources

D.

running config, startup config, VLAN database, and routing database

Question 146

The network team is planning to implement IPv6 on the company’s existing IPv4 network infrastructure. The network currently uses IS-IS to share routes between peers. Which task must the team perform so that IS-IS will run in multitopology mode on the updated IPv6 network?

Options:

A.

Configure the links between the network routers as point-to-point.

B.

Configure the network routers to use metric-style wide.

C.

Configure the network routers as Level 2 routers.

D.

Configure the IS-IS IPv6 metric on the dual-stack links.

Question 147

A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?

as

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 148

Refer to the exhibit:

as

If router A is the RP, which PIM mode can you configure so that devices will send multicast traffic toward the RP?

Options:

A.

PIM-SM

B.

PI MM-DM

C.

BIDIR-PIM

D.

PIM-SSM

Question 149

as

Refer to the exhibit. A growing company wants to ensure high availability and redundancy for its critical web servers, which are located in an offsite data center. The network architect decided to implement BGP so that the network can use redundant paths for outbound traffic toward the destination subnet 10.2.2.0/24. A network engineer already configured basic BGP settings on edge router R1, which is a Cisco ASR-1001X router. The engineer also confirmed loopback reachability to routers R2 and R3, and the AS path length toward the destination is the same via R2 and R3. Which action must the engineer take on R1 to complete the implementation?

Options:

A.

Implement as-path multipath under the BGP neighbor configuration.

B.

Implement maximum-paths ibgp 2 under the BGP neighbor configuration.

C.

Implement maximum-paths 2 under the BGP global configuration.

D.

Implement bestpath as-path multipath-relax under the BGP global configuration.

Question 150

as

Refer to the exhibit. A client wants to filter routes to a BGP peer to limit access to restricted areas within the network. The engineer configures the route map ciscotest to filter routes from the BGP neighbor. The engineer also sets a tag that will be used for QoS in the future. Which task must be performed to complete the Implementation?

Options:

A.

Attach the new route map to the BGP neighbor statement in the inbound direction.

B.

Create a policy map named ciscotest and apply It to inbound traffic on the link that is directly connected to the BGP neighbor.

C.

Create a route map, configure BGP with an IPv4 address family, and activate the neighbor.

D.

Add a route map statement with sequence 40 that links a BGP community to the routing protocol

Question 151

Refer to the exhibit.

as

A network engineer must configure an LDP neighborship between two newly installed routers that are located in two different offices. Router 1 is the core router in the network and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer apply to the two devices to meet the requirement?

Options:

A.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ip

B.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router1(config-if)#mpls ldp discovery transport-address interface

Router2(config)#int fa0/0 -

Router2(config-if)#mpls ip -

Router2(config-if)#mpls ldp discovery transport-address interface

C.

Route1(config)#int fa0/0 -

Router1(config-if)#mpls ldp autoconfig

Router1(config-if)#mpls ldp discovery interface

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Router2(config-if)#mpls ldp discovery interface

D.

Router1(config)#int fa0/0 -

Router1(config-if)#mpls ip -

Router2(config)#router ospf 1 -

Router2(config-router)#mpls ldp autoconfig

Question 152

What Is the primary role of Ansible In a network?

Options:

A.

It is used as a debugging tool for connectivity issues between the DMZ and an enterprise intranet.

B.

It Is used to diagnose Layer 11ssues In data centers that span more than one city block.

C.

It is used to deploy IPv6 configuration is networks That are dual slack.

D.

It is used as a network automation provisioning and configuration tool.

Question 153

Refer to the exhibit:

as

What does the REST API command do?

Options:

A.

It retrieves the information requested by Descriptions xml

B.

It removes the information identified by Descriptions xml

C.

It executes the commands specified in Descriptions xml

D.

It displays the information identified by Descriptions xml

Question 154

Which type of attack is a Protocol attack?

Options:

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Question 155

as

Refer to the exhibit. A network engineer configures CPE-1 for QoS with these requirements:

IPv4 and IPv6 traffic originated by the CPE-1 WAN IP address must be marked with DSCP CS3.

IPv4 LAN traffic must be marked with DSCP CS1.

IPv6 LAN traffic must be marked with DSCP default.

Which configuration must the engineer implement on CPE-1?

Options:

A.

class-map match-any SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

B.

class-map match-all SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

C.

class-map match-all SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

D.

class-map match-any SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

Question 156

Refer to the exhibit:

as

What is the URL used for with REST API?

Options:

A.

It is used to contact a URL filter to determine the efficacy of a web address

B.

It is used to send a TACACS+ authentication request to a server

C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

D.

It is used to initiate an FTP session to save a running configuration of a device.

Question 157

What is the purpose of microsegments in the SRv6 architecture?

Options:

A.

They ensure that routers in the path sufficiently examine the indexed mapping tables.

B.

They support a scalable control plane.

C.

They reduce fragmentation as packets traverse the network.

D.

They allow for configuration changes in the SRv6 data plane without requiring the device to reboot.

Question 158

What is the difference between SNMP and model-driven telemetry?

Options:

A.

Telemetry allows for modeled network data to be pushed to the network administrator on an as-needed basis

B.

Telemetry uses traps and inform messages to deliver data to a network administrator on a polling basis

C.

SNMP uses the YANG data modeling language

D.

SNMP pushes network data to the network administrator whenever it is queried

Question 159

Why is the keyword none needed when implementing management plane security using TACACS?

Options:

A.

It aItovSWMB6ter to query a RADIUS server when the TACACS+ server is unreachable.

B.

It allows the local database to authenticate when the TACACS^ server is unreachable.

C.

It allows authentication to succeed when the TACACS+ server is unreachable.

D.

It prevents all users from accessing router 1 unless the TACACS+ server is reachable,

Question 160

Refer to the exhibit:

as

Which effect of this configuration is true?

Options:

A.

R1 can support a peer that is configured for LDP SSO/NSF as the peer recovers from an outage

B.

R1 can failover only to a peer that is configured for LDP SSO/NSF

C.

R1 can failover to any peer

D.

R1 can support a graceful restart operation on the peer, even if graceful restart is disabled on the peer

Question 161

What is the primary purpose of the flexible algorithm in a segment-routing environment?

Options:

A.

to distribute designated-path information for certain traffic classes to maintain routing information in accordance with current network-performance indicators

B.

to integrate with legacy routing protocols to ensure backward compatibility and a smooth transition in mixed network environments

C.

to determine and assign labels for specific types of traffic, ensuring that routes maintain a valid backup path as network conditions change

D.

to support adaptive path selection, optimizing network performance based on real-time network metrics

Question 162

as

Refer to the exhibit. MPLS is running in the network with OSPF as the IGP. Full routes are shared between the routers, and each connected link has an MPLS neighbor relationship. A network engineer must update the network configuration so that it will maintain LDP neighbor relationships if a directly connected link goes down. Which action must the engineer take as part of the process?

Options:

A.

Implement Unified MPLS to unify the OSPF areas.

B.

Implement MPLS OAM with BFD on the links.

C.

Implement LDP sync on links with a greater risk of faults.

D.

Implement LDP session protection on the network.

Question 163

Which two tasks must an engineer perform when implementing LDP NSF on the network? (Choose two.)

Options:

A.

Disable Cisco Express Forwarding.

B.

Enable NSF for EIGRP.

C.

Enable NSF for the link-state routing protocol that is in use on the network.

D.

Implement direct connections for LDP peers.

E.

Enable NSF for BGP.

Question 164

as

Refer to the exhibit. An engineer must Implement a traceroute operation to verity the R1 point-to-multipoint LSP connections. The traceroute operation must return all labels and hop-by-hop IP addresses for destinations 10.20.0.1. 10.30.0.1, and 10.40.0.1. and the maximum number of hops is 4. Which command must be executed to meet the requirements?

Options:

A.

traceroute mpls traffic-eng tunnel-mte 10 ttl 4

B.

traceroute mpls traffic-eng tunnel-mte 10 responder-id 10.40.0.1

C.

traceroute mpls ipv4 10.30.0.1/32 fee-type generic

D.

traceroute mpls ipv4 10.20.0.1/32 ttl 4

Page: 1 / 55
Total 547 questions