Exams > Cisco > 350-501: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
350-501: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
Page 15 out of 34 pages Questions 141-150 out of 332 questions
Question#141

What is a role of NSO?

  • A. It resides on a hypervisor that runs the Windows OS
  • B. It automates the deployment of access points with its built-in wireless LAN controller
  • C. It manages WAN infrastructure using a virtual switch
  • D. It provides full lifecycle management of a device
Discover Answer Hide Answer

D

Question#142

After a possible security breach, the network administrator of an ISP must verify the times that several different users logged into the network. Which command must the administrator enter to display the login time of each user that activated a session?

  • A. show netconf-yang sessions detail
  • B. show netconf-yang sessions
  • C. show netconf-yang datastores
  • D. show platform software yang-management process
Discover Answer Hide Answer

A

Question#143

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices.
Which configuration must the engineer apply on the network?

  • A. telemetry model-driven destination-group ciscotest address-family ipv4 192.168.1.0 port 57500 encoding self-describing-gpb protocol grpc tls-hostname ciscotest.com commit
  • B. telemetry model-driven destination-group DGroup1 address-family ipv4 172.0.0.0 port 5432 encoding self-describing-gpb protocol tcp commit
  • C. telemetry model-driven destination-group ciscotest address-family ipv4 192.168.1.0 port 57500 encoding self-describing-gpb protocol grpc no-tls commit
  • D. telemetry model-driven destination-group ciscotest address-family ipv4 192.168.1.0 port 57500 encoding self-describing-gpb protocol grpc commit
Discover Answer Hide Answer

C

Question#144

Which additional configuration is required for NetFlow to provide traceback information?

  • A. A classification ACL must be configured to identity which type of traffic will be analyzed.
  • B. The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow Version 5.
  • C. Cisco Express Forwarding must be configured for traffic that is egressing from the router to be property reported.
  • D. LLDP must be configured or the device will be unable to locate a NetFlow analyzer.
Discover Answer Hide Answer

A

Question#145

What is the role of NSO in network automation?

  • A. It is a tool used to bridge automation to the physical network infrastructure.
  • B. It is a GUI used to manage wireless devices in a campus infrastructure.
  • C. It is a type of REST API used to configure an APIC.
  • D. It is a tool that uses CLI only to configure virtual network devices.
Discover Answer Hide Answer

A

Question#146

DRAG DROP -
Drag and drop the message types from the left onto the target field of the message originator on the right.
Select and Place:

Discover Answer Hide Answer


Question#147

What do Chef and Puppet have in common?

  • A. use Ruby
  • B. require modules to be created from scratch
  • C. use a master server
  • D. manage agents referred to as minions
Discover Answer Hide Answer

C

Question#148

How do intent APIs make it easier for network engineers to deploy and manage networks?

  • A. They pull stored SNMP data from a single network location to multiple monitoring tools.
  • B. They allow the engineer to use a single interface as the entry point for control access to the entire device.
  • C. They streamline repetitive workflows and support more efficient implementation.
  • D. They extend the Layer 2 infrastructure and reduce the necessary number of virtual connections to Layer 3 devices.
Discover Answer Hide Answer

B

Question#149


Refer to the exhibit. What does this REST API script configure?

  • A. VRF
  • B. interface with IP address 192.168.0.1
  • C. application profile
  • D. public community string for SNMP
Discover Answer Hide Answer

B

Question#150


Refer to the exhibit. An Ethernet access provider is configuring routers PE-1 and PE-2 to provide E-Access EVPL service between UNI and ENNI. ENNI service multiplexing is based on 802.1ad tag 150, and service-multiplexed UNI is based on 802.1q tag 10. Which EFP configurations must the provider implement on PE-1 and PE-2 to establish end-to-end connectivity between CE-1 and CE-2?

  • A. On PE-1: interface GigabitEthernet2 service instance 100 ethernet encapsulation dot1ad 150 rewrite ingress tag pop 1 symmetric On PE-2: interface GigabitEthernet2 service instance 2 ethernet encapsulation dot1q 10
  • B. On PE-1: interface GigabitEthernet2 service instance 100 ethernet encapsulation dot1q 150 rewrite ingress tag pop 1 symmetric On PE-2: interface GigabitEthernet2 service instance 2 ethernet encapsulation dot1q 10
  • C. On PE-1: interface GigabitEthernet2 service instance 100 ethernet encapsulation dot1ad 150 dot1q 10 rewrite ingress tag pop 2 symmetric On PE-2: interface GigabitEthernet2 service instance 2 ethernet encapsulation dot1q 10
  • D. On PE-1: interface GigabitEthernet2 service instance 100 ethernet encapsulation dot1ad 150 rewrite ingress tag pop 1 symmetric On PE-2: interface GigabitEthernet2 service instance 2 ethernet encapsulation dot1q 10 rewrite ingress tag pop 1 symmetric
Discover Answer Hide Answer

C

chevron rightPrevious Nextchevron right