Exams > Cisco > 350-501: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
350-501: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Page 12 out of 34 pages Questions 111-120 out of 332 questions
Question#111


Refer to the exhibits. Which information is provided for traceback analysis when this configuration is applied?

  • A. source interface
  • B. packet size distribution
  • C. IP sub flow cache
  • D. BGP version
Discover Answer Hide Answer

C

Question#112


Refer to the exhibit. R1 is connected to two service providers and is under a DDoS attack.
Which statement about this design is true if URPF in strict mode is configured on both interfaces?

  • A. R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface.
  • B. R1 drops destination addresses that are routed to a null interface on the router.
  • C. R1 permits asymmetric routing as long as the AS-PATH attribute entry matches the connected AS.
  • D. R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Discover Answer Hide Answer

A

Question#113


Refer to the exhibit. Router 1 was experiencing a DDoS attack that was traced to interface gigabitethernet0/1.
Which statement about this configuration is true?

  • A. Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1.
  • B. Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface.
  • C. Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface.
  • D. Router 1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Discover Answer Hide Answer

C
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nx-os/security/configuration/guide/sec_nx-os-cfg/sec_urpf.html

Question#114


Refer to the exhibit. An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?

  • A. Router 2 is the router receiving the DDoS attack.
  • B. Router 1 must be configured with uRPF for the RTBH implementation to be effective.
  • C. Router 1 is the trigger router in a RTBH implementation.
  • D. Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Discover Answer Hide Answer

C

Question#115

Which configuration modifies Local Packet Transport Services hardware policies?
A.

B.

C.

D.

Discover Answer Hide Answer

C
Reference:
https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r4-1/addr_serv/command/reference/b_ipaddr_cr41crs/ b_ipaddr_cr41crs_chapter_0111.html#wp1754734006

Question#116

Which additional feature does MPLS DiffServ tunneling support?

  • A. matching EXP and DSCP values
  • B. PHB layer management
  • C. using GRE tunnels to hide markings
  • D. interaction between MPLS and IGP
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/mp_te_diffserv/configuration/15-mt/mp-te-diffserv-15-mt-book/mp-diffserv-tun-mode.html

Question#117

You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tailend router?

  • A. path
  • B. tear
  • C. error
  • D. reservation
Discover Answer Hide Answer

A
Reference:
https://packetpushers.net/rsvp-te-protocol-deep-dive/

Question#118

Which statement describes the advantage of a Multi-Layer control plane?

  • A. It provides multivendor configuration capabilities for Layer 3 to Layer 1.
  • B. It automatically provisions, monitors, and manages traffic across Layer 0 to Layer 3.
  • C. It supports dynamic wavelength restoration in Layer 0.
  • D. It minimizes human error configuring converged networks.
Discover Answer Hide Answer

A

Question#119

DRAG DROP -
Drag and drop the technologies from the left onto the correct definitions on the right.
Select and Place:

Discover Answer Hide Answer


Question#120

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate.
Which configuration accomplishes these objectives?
A.

B.

C.

D.

Discover Answer Hide Answer

A

chevron rightPrevious Nextchevron right