New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Service Provider > 350-501

350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Question and Answers

Question # 4

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Full Access
Question # 5

A customer has requested that the service provider use a Cisco MPLS TE tunnel to force the E-line service to take a specific route What is used to send the traffic over the tunnel?

A.

static route

B.

preferred path

C.

forwarding adjacency

D.

autoroute destination

Full Access
Question # 6

Refer to the exhibit. A large service provider is migrating device management from Layer 2 VLAN-based to Layer 3 IP-based solution. An engineer must configure the ISIS solution with these requirements:

Network management server IP 172.16.10.1 must be advertised from the core MPLS network to the regional domain.

The external network 202.10.0.0/24 must not establish ISIS peering with the R5 router.

The regional network must prevent sending unnecessary hello packets and flooding the routing tables of the R5 router.

Which two ISIS parameters must be implemented to meet these requirements? (Choose two.)

A.

LSP lifetime maximum

B.

advertise-passive-only

C.

overload bit passive

D.

attached bit on ISIS instance

E.

passive-interface Loopback0

Full Access
Question # 7

Which component is similar to an EVPN instance?

A.

MPLS label

B.

IGP router ID

C.

VRF

D.

router distinguisher

Full Access
Question # 8

An engineer working for telecommunication company with an employee id: 3715 15 021 needs to secure the LAN network using a prefix list Which best practice should the engineer follow when he implements a prefix list?

A.

An engineer must use non sequential sequence numbers in the prefix list so that he can insert additional entries later.

B.

The final entry in a prefix list must be /32

C.

An engineer must identity the prefix list with a number only

D.

An engineer must include only the prefixes for which he needs to log activity.

Full Access
Question # 9

After recent network outages and customer complaints, a large Tier 1 service provider has asked a network engineer to implement MPLS OAM policy on all Provider Edge devices in the MPLS network. To improve network performance and reliability, the policy must be able to detect 2% packet drops and a delay of 0.05 seconds. The solution must be based on RFC 6374 and RFC 4379 standards for MPLS OAM. The CCM to detect connectivity issues has already been configured with interval 1000. Which two actions must the engineer take to achieve the goal? (Choose two.)

A.

Set loopback delay-frequency 50 and drop-threshold 0.2 on the PE routers.

B.

Implement mpls ldp tracing on the PE and P routers.

C.

Implement mpls oam policy oam on the PE routers.

D.

Implement mpls ip oam map-policy on the PE routers.

E.

Set loss-threshold 2 and delay-threshold 50 on the P routers.

Full Access
Question # 10

Refer to the exhibit.

A network engineer notices that router R2 is failing to install network 172.16.33.1/32 in the routing table. Which configuration must the engineer apply to R2 to fix the problem?

A.

R2(config)# access-Iist 1 permit 172.16.33.0 255.0.0.0

B.

R2(config)# access-list 1 permit 172,16,33.0 255,255,255,0

C.

R2(config)# access-list 1 permit 172.16.33.0 0.0.0.255

D.

R2(config)# access-list 1 permit 172,16,33.0 255.255,0,0

Full Access
Question # 11

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 12

Refer to the exhibit. MPLS is configured within the network. The routers use OSPF to exchange routing information. Hosts that are connected to routers R1 and R3 use routers R2 and R4 to access servers that run a variety of intranet applications. A network engineer must ensure that R1 and R3 maintain an LDP session between them to support the flow of traffic between hosts and servers in case of failure on the path between R1 and R3. Which task should the engineer perform to provide LDP bindings in case of failure on the path between R1 and R3?

A.

Implement session protection to send targeted hellos between R1 and R3.

B.

Implement multicast in the network to share data between hosts and servers without targeted routing.

C.

Implement LDP sync on the four devices to give MPLS and OSPF the ability to maintain continuous uptime.

D.

Implement BFD to monitor and detect link failures between R1 and R3.

Full Access
Question # 13

What is the purpose of OSPF-TE extensions to MPLS traffic engineering functionality?

A.

carrying OSPF routing information for TE tunnels

B.

advertising the TE tunnel routes to the OSPF domain

C.

calculating and establishing TE tunnels in accordance with network constraints

D.

calculating fast reroute to provide a backup path for TE tunnels

Full Access
Question # 14

Drag and drop the characteristics from the left onto the corresponding radio splitting approaches on the right

Full Access
Question # 15

Refer to the exhibit. Customer C-101 in ASN 65123 requested that the ISP blackholes a host route 198.19.44.195, to which the customer is receiving a significant amount of malicious traffic. Which configuration must the network engineer implement on the trigger router TR-1 to fulfill the request without affecting other IP destinations in the customer's block?

A.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

B.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.195/32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

C.

configure terminal

ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

D.

Configure terminal

Full Access
Question # 16

The NOC team must update the BGP forwarding configuration on the network with these requirements:

BGP peers must establish a neighborship with NSF capability and restart the session for the capability to be exchanged after 120 seconds.

BGP peers must delete routes after 360 seconds of inactivity.

Which action meets these requirements?

A.

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

B.

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

C.

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

D.

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.

Full Access
Question # 17

You are configuring MPLS traffic-engineering tunnels in the core.

Which two ways exist for the tunnel path across the core? (Choose two )

A.

Tunnel links inherit IGP metrics by default unless overridden

B.

Tunnels can be configured with dynamic path or explicitly defined path

C.

A zero bandwidth tunnel is not a valid option

D.

The bandwidth statement creates a "hard" reservation on the link-The dynamic path option is supported only with IS-IS

Full Access
Question # 18

Refer to the exhibit.

An engineer configured BGP summarization on a customer's network. Which route is advertised to BGP peers?

A.

192.0.0.0/16

B.

192168.0.0/16

C.

192.168.1.0/24

D.

192168.0.5/30

Full Access
Question # 19

Refer to the exhibit. An engineer must update the configuration of the network with these requirements:

    PE routers must define labels for IS-IS learned routes in AS100.

    P routers must not receive LDP bindings for the external network in the IPv6 address family.

Which configuration must the engineer implement to meet these requirements?

A.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global host-routes

B.

CE1(config)# mpls Idp label

 CE1(config-Idp-Ibl)# allocate global host-routes

C.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global prefix-list SPLDP

D.

PE1(config)# mpls Idp label

 PE1(config-Idp-Ibl)# no allocate global prefix-list Ipv6_All

Full Access
Question # 20

Refer to the exhibit:

Router 1 was experiencing a DDoS attack that was traced to interface gjgabitethernet0/1.

Which statement about this configuration is true?

A.

Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface

B.

Router 1 accepts source addresses on interface gigabitethemet0/1 that are private addresses

C.

Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1

D.

Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface

Full Access
Question # 21

Refer to the exhibit:

P3 and PE4 are at the edge of the service provider core and serve as ABR routers Aggregation areas are on either side of the core.

Which statement about the architecture is true?

A.

If each area is running its own IGP. the ABR routers must redistribute the IGP routing table into BGP

B.

To support seamless MPLS. TDP must be used as the label protocol

C.

If each area is running its own IGP. BGP must provide an end-to-end MPLS LSP

D.

To support seamless MPLS, the BGP route reflector feature must be disabled

Full Access
Question # 22

Refer to the exhibit. Which additional configuration must an engineer to the adge router to inject a default router into the MP-BGP address family for the internet_Shared_Services dedicated VRF?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

The engineering team at a large ISP has been alerted a customer network is experiencing high traffic congestion. After a discussion between the ISP and technical personnel at the customer site, the team agrees that traffic to the customer network that exceeds a specific threshold will be dropped. Which task must the engineer perform on the network to implement traffic policing changes?

A.

Configure RSVP to reserve bandwidth on all interfaces when a path is congested.

B.

Enable Cisco Discovery Protocol on the interface sending the packets.

C.

Enable Cisco Express Forwarding on the interfaces sending and receiving the packets.

D.

Set IP precedence values to take effect when traffic exceeds a given threshold.

Full Access
Question # 24

Refer to the exhibit. A service provider is running MPLS in the core to support Layer 3 VPN. OSPF is configured to support dynamic routing, and BGP is enabled throughout the network. A network engineer is adding a new P router to the infrastructure and is connecting it to P1 and P3.

Which task must the engineer perform on the new router to allow it to participate in the Layer 3 VPN?

A.

Enable LDP sync under the OSPF routing process.

B.

Establish an LDP neighbor relationship with P1 and P3.

C.

Configure OSPF and BGP to support MPLS.

D.

Enable LDP and establish an OSPF adjacency in a new area.

Full Access
Question # 25

A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?

A.

snmp-server enable traps entity

snmp-server host 192.168.1.2 public

B.

snmp-server enable traps bgp

snmp-server host 192.168.1.2 public

C.

snmp-server enable traps isdn

snmp-server host 192.168.1.2 public

D.

snmp-server enable traps

snmp-server host 192.168.1.2 public

Full Access
Question # 26

Refer to the exhibit:

When implementing an LDP protocol, an engineer experienced an issue between two directly connected routers and noticed that no LDP neighbor exists for 1.1.1.1.

Which factor should be the reason for this situation?

A.

LDP needs to be enabled on the R2 physical interface

B.

R2 does not see any hellos from R1

C.

LDP needs to be enabled on the R2 loopback interface

D.

R2 sees the wrong type of hellos from R1

Full Access
Question # 27

What is the primary purpose of the flexible algorithm in a segment-routing environment?

A.

to distribute designated-path information for certain traffic classes to maintain routing information in accordance with current network-performance indicators

B.

to integrate with legacy routing protocols to ensure backward compatibility and a smooth transition in mixed network environments

C.

to determine and assign labels for specific types of traffic, ensuring that routes maintain a valid backup path as network conditions change

D.

to support adaptive path selection, optimizing network performance based on real-time network metrics

Full Access
Question # 28

Refer to the exhibit.

An engineer at a new ISP must configure many Cisco devices in the data center. To make the process more efficient, the engineer decides to automate the task with a REST API. Which action does this JSON script automate?

A.

Configure the IP address for the existing loopback interface.

B.

Configure a physical interface on the router with an IP address and then create a loopback interface.

C.

Configure a physical interface on the router with an IP address.

D.

Delete the existing loopback Interface and replace it with a new loopback interface.

Full Access
Question # 29

Refer to the exhibit:

Based on the show/ command output, which result m true after BGP session is established?

A.

The IOS XR router advertises all routes to the neighbor 192.168.2.2, but it does not accept any routes from 192.168.2.2

B.

The IOS XR router advertises and accepts all routes to and from eBGP neighbor 192.168.2.2 C. No routes are accepted from the neighbor 192.168.2.2, nor are any routes advertised to it

C.

The IOS XR router does not advertise any routes to the neighbor 192.168.2.2,but it accepts all routes from 192.168.2.2.

Full Access
Question # 30

Refer to the exhibit. ISP_A is about to launch a new internet service. ISP_A is already providing MPLS VPN Layer 3 services to Customer_A and Customer_B, which are connected to ISP_A via OSPF. A network engineer completed the BGP and VRF configurations on R2 to support the new internet service. Which additional action completed the launch?

A.

Implement the BGP routing protocol in the customer VRFs on R1 and R2

B.

Import route-target 62:101 into the customer VRFs on R1 and R3.

C.

Enable the route-replicate command under the customer VRFs on R1 and R2

D.

Activate NAT CE in the customer VRFs on R1. R2. and R3.

Full Access
Question # 31

Which control plane protocol is used between Cisco SD-WAN routers and vSmart controllers?

A.

OTCP

B.

OMP

C.

UDP

D.

BGP

Full Access
Question # 32

What are two features of stateful NAT64? (Choose two.)

A.

It uses address overloading.

B.

It provides 1:N translations, so it supports an unlimited number of endpoints.

C.

It requires IPv4-translatable IPv6 address assignments.

D.

It requires the IPv6 hosts to use either DHCPv6-based address assignments or manual address assignments.

E.

It provides 1:1 translation, so it supports a limited number of endpoints.

Full Access
Question # 33

Which two IS-IS parameters must match before two Level 2 peers can form an adjacency? (Choose two)

A.

authentication settings

B.

area ID

C.

system ID

D.

MTU

E.

hello timer setting

Full Access
Question # 34

Refer to the exhibit:

Which three outcomes occur if the prefix list is added to the neighbor? (Choose three)

A.

192.168 0.0/19 is denied.

B.

192.168 0.0/17 is denied.

C.

192.168 0.0/17 is permitted

D.

192.168.0.0/16 is denied

E.

192.168 0.0/16 is permitted

F.

192.168 0.0/19 is permitted

Full Access
Question # 35

Refer to the exhibit:

Which statement supports QPPB implementation?

A.

QoS policies are identified in the MPLS forwarding table

B.

QoS policies rely exclusively on BGP attributes to manipulate traffic

C.

QoS policies use BGP to gain full coverage on the network.

D.

QPPB policies affect only egress traffic

Full Access
Question # 36

Which additional configuration is required for NetFlow to provide traceback information?

A.

Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported.

B.

A classification ACL must be configured to identify which type of traffic will be analyzed.

C.

The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5.

D.

LLDP must be configured or the device will be unable to locate a NetFlow analyzer.

Full Access
Question # 37

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Full Access
Question # 38

A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:

NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.

CLI SSH access is permitted from any source.

Which configuration must the engineer apply on R1?

A.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

B.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 1 permit any

netconf ssh

line vty 0 4

access-class 1 in

transport input ssh

end

C.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 1

access-list 1 permit 172.16.20.0 0.0.0.255

access-list 2 permit any

netconf ssh

line vty 0 4

access-class 2 in

transport input ssh

end

D.

configure terminal

hostname R1

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

access-list 1 permit 172.16.20.0 0.0.0.255

netconf ssh acl 1

line vty 0 4

transport input ssh

end

Full Access
Question # 39

ASN 65001 is peering with ASN 65002 to exchange IPv6 BGP routes. All routes that originate in ASN 65001 have a standard community value of 65001:100, and ASN 65002 is allowed to advertise only 2001 :db8:aaaa::/48. An engineer needs to update the ASN 65001 route-filtering configuration to meet these conditions:

* Looped routes into ASN 65001 and routes that have traversed 10 or more ASNs must be denied.

* Routes accepted into ASN 65001 must be assigned a community value of 65001:200.

Which configuration must the engineer apply to the ASN 65001 border router?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 40

Which two features describe TI-LFA? (Choose two.)

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Full Access
Question # 41

Refer to the exhibit. The network is running OSPF, and access to the internet is provided through router RB. Router RA connects to several servers that provide services to users connected to RC and RF. User traffic is growing, and the engineering team wants to mitigate the future potential for congestion when the servers are experiencing heavy use.

Which action must the team take to maintain better network performance?

A.

Implement MPLS and install a Cisco MPLS TE tunnel to route high-priority traffic via a preferred path.

B.

Implement ACLs to manage traffic flowing over individual links.

C.

Implement class maps to categorize traffic and apply them to policies to manage traffic flow.

D.

Implement OSPF point-to-point links to eliminate the need for DR election and the associated traffic.

Full Access
Question # 42

Refer to the exhibit. A network engineer wants to monitor traffic from the application server and send the output to the external monitoring device at 172.16.20.5. Application server traffic should pass through the R1 Eth2/1 interface for further analysis after it is monitored. Which configuration must be applied on the R1 router?

A.

Configure the FLOW-MONITOR-20 command.

B.

Configure the flow exporter EXPORTER-10 destination 192.168.20.4 command.

C.

Configure the ip flow monitor FLOW-MONITOR-10 input command on the Ethernet1/0 interface.

D.

Configure the ip flow monitor FLOW-MONITOR-10 output command on the Ethernet 2/1 interface.

Full Access
Question # 43

What Is the primary role of Ansible In a network?

A.

It is used as a debugging tool for connectivity issues between the DMZ and an enterprise intranet.

B.

It Is used to diagnose Layer 11ssues In data centers that span more than one city block.

C.

It is used to deploy IPv6 configuration is networks That are dual slack.

D.

It is used as a network automation provisioning and configuration tool.

Full Access
Question # 44

An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?

A.

Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.

B.

Configure the ABR routers as route reflectors that redistribute IGP into BGP.

C.

Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.

D.

Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to other routers to create end-to-end LSPs.

Full Access
Question # 45

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Full Access
Question # 46

Refer to the exhibit. All BGP peering in AS 65101 and 65201 is enabled. The operations team is told that traffic destined to 192.168.1.1/32 from R4 does not use the path R3-R2-R1 as expected. An engineer debugs the issue and determines that 192.168.1.1/32 is advertised in the BGP routing table on R1. Which action resolves the issue?

A.

Enable no synchronization on R2 m AS65101.

B.

Apply route-map High-LP out for prefix 192.168.1.1/32 on R1 with R2 BGP peering.

C.

Apply redistribute ospf 10 on R1 in BGP AS 65101.

D.

Configure network 192.168.1.1 mask 255.255.255.255 in BGP AS 65101 on R2

Full Access
Question # 47

Refer to the exhibit.

Router 1 is missing the route for the router 2 loopback 0. What should the engineer change to fix the problem?

A.

the area numbers on Router 1 and Router 2 to be similar

B.

the wildcard mask network statement in OSPF of Router 2

C.

Router 1 to be an ABR

D.

the hello timers on Router 1 and Router 2 to be different

Full Access
Question # 48

Which capability does RSVP provide in an MPLS network?

A.

signaling a primary path for LSP tunnels

B.

reserving up to 75% of interface bandwidth by default

C.

reserving bandwidth for multicast flows

D.

supporting interoperability between IntServ and DiffServ architecture models

Full Access
Question # 49

Refer to the exhibit.

An engineer wants to determine which paths are best, second best, third best, and fourth best. Drag and drop the peer addresses on the left to the corresponding BGP best-path selection order on the right.

Full Access
Question # 50

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?

A.

Configure transport connection-mod© passive on R2.

B.

Configure neighbor 172.16.172.1 authentication on R1

C.

Configure neighbor update-source lo0 on R2

D.

Configure remote-as 16213 on R1.

Full Access
Question # 51

Refer to the exhibit.

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the routers, which are in a different data center in the same exchange as other routers. The engineer must also verify the associated MIB view family name, storage type, and status. Which set of actions meets these requirements?

A.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

B.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp mib to verify the configuration.

C.

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and use show snmp engineid to verify the configuration.

D.

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1 priv aes 128 PrivPass2 and use show snmp view to verify the configuration.

Full Access
Question # 52

Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is Mbps. The company XYZ security team asked the ISP to redirect ICMP requests which are currently going to the web server to a new local security appliance which configuration must an ISPP engineer apply to router R2 to redirect the ICMP traffic?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 53

After a possible security breach, the network administrator of an ISP must verify the times that several different users logged into the network. Which command must the administrator enter to display the login time of each user that activated a session?

A.

show netconf-yang sessions detail

B.

show netconf-yang datastores

C.

show platform software yang-management process

D.

show netconf-yang sessions

Full Access
Question # 54

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Full Access
Question # 55

Drag and drop the descriptions from the left onto the corresponding OS types on the right.

Full Access
Question # 56

Drag and drop the functions from the left onto the Path Computation Element Protocol roles on the right.

Full Access
Question # 57

Refer to the exhibit. Which part of the diagram will host OpenStack components?

A.

Aggregation

B.

UCS Series

C.

Access

D.

Core

Full Access
Question # 58

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

A.

bandwidth

B.

affinity

C.

explicit path

D.

SLRG

Full Access
Question # 59

An engineer a cisco MPLS tunnel to improve the streaming experience for the clients of a video -on-demand server. Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 60

An engineer needs to implement QOS mechanism on customer's network as some applications going over the internet are slower than others are. Which two actions must the engineer perform when implementing traffic shaping on the network in order to accomplish this task? (Choose two)

A.

Configure a queue with sufficient memory to buffer excess packets.

B.

Configure the token values in bytes.

C.

Implement packet remarking for excess traffic.

D.

Implement a scheduling function to handle delayed packets.

E.

Configure a threshold over which excess packets are discarded.

Full Access
Question # 61

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Full Access
Question # 62

Refer to the exhibit:

In which way does router R1 operate differently than router R2?

A.

R1 sends LSA type 2 only, while R2 sends type 1 and type 7 LSAs

B.

R1 sends LSA types 1 and 2, while R2 sends type 1. 2. and 7 LSAs

C.

R1 sends LSA type 2 only and R2 sends LSA type 1 only

D.

R1 sends LSA types 5 and 7, while R2 sends type 1, 2, and 7 LSAs

Full Access
Question # 63

Refer to the exhibit:

Which effect of this configuration is true?

A.

R1 can support a peer that is configured for LDP SSO/NSF as the peer recovers from an outage

B.

R1 can failover only to a peer that is configured for LDP SSO/NSF

C.

R1 can failover to any peer

D.

R1 can support a graceful restart operation on the peer, even if graceful restart is disabled on the peer

Full Access
Question # 64

A service provider requires continuous real-time network monitoring to provide reliable SLAs to its customers. To satisfy this requirement, a network administrator is implementing gRPC dial out on an ASR with TLS. Receiver 192.168.10.2 will be assigned one of the subscriptions, and it will manage the ASR. Which configuration must the engineer apply to the router as part of the configuration process?

A.

snmp-server community public

snmp-server enable traps

snmp-server host 192.168.10.2 version 2c public.

B.

telemetry model-driven

destination-group DGroup1

address family ipv4 192.168.10.2 1 port 10

encoding self-describing-gpb

C.

snmp-server community public

snmp-server enable traps

snmp-server enable traps snmp authentication

snmp-server manager

snmp-server manager session-timeout 1000

D.

telemetry model-driven

destination-group ciscotest

address family ipv4 192.168.10.2 port 10

encoding self-describing-gpb

protocol grpc tis-hostname ciscotest.com

Full Access
Question # 65

Refer to the exhibit An engineer at ISP C is configuring a new interconnection with ISPs A and B using the BGP protocol After the initial configuration the engineer noticed high memory usage and an abnormally large LIB table on router R2 Which two actions must the engineer take on R2 to minimize memory usage? (Choose two.)

A.

Configure Extended ACL 101 with accepted prefixes.

B.

Confiure the mpls idp neighbor 11.11.11.11 labels accept1 command.

C.

Configure Standard ACL 1 with accepted prefixes.

D.

Configure the mpls idp neighbor 1.1.1.1 labels accept 101 command.

E.

Configure the mpls idp neighbor 21.21.21.21 labels accept 101 command.

Full Access
Question # 66

Refer to the exhibit. Customers report occasional forwarding issues from hosts connected to R6 to hosts connected to R1. A network engineer has just updated the MPLS configuration on the network, and a targeted LDP session has been established between R1 and R5. Which additional task must the engineer perform so that the team can identify the path from R6 to R1 in case the forwarding issues continue?

A.

Configure an MPLS TE from R4 to R1 that routes through R5.

B.

Implement MPLS OAM within the network.

C.

Implement MPLS VPLS within the network.

D.

Configure MPLS LDP Sync on each router.

Full Access
Question # 67

Refer to the exhibit.

Which task completes the configuration?

A.

Specify the maximum number of prefixes that R1 receives from neighbor 192.168.1.2.

B.

Specify the source interface in the neighbor statement.

C.

Specify the activate neighbor 192.168.1.2 under the IPv4 address family.

D.

Specify the local-as value in the neighbor statement.

Full Access
Question # 68

The service provider is serving hosts with two different multicast streams from source X and source Y. Source X is multicast group 224.0.0.0/8, and source Y is multicast group 226.0.0.0/8. Multicast source X should send its stream through bidirectional RP address 10.20.1.1, and multicast source Y should send its stream through RP address 10.20.2.1. Which configuration meets these requirements?

A.

Enable ip pim ssm default on RA and RB.

B.

Add ip pim bidir-enable in global mode on RB.

C.

Permit the source X and source Y IP addresses in the access list on RB.

D.

Set PIM sparse mode with a static RP address of 10.20.2.1 on RA and RC.

Full Access
Question # 69

Refer to the exhibit:

R1 and R2 are directly connected with Fast Ethernet interfaces and have the above configuration applied OSPF adjacency is not formed. When the debug ip ospf hello command is issued on R1. these log messages are seen.

Which command can be configured on routers R1 and R2 on fO/O interfaces to form OSPF adjacency?

A.

ip ospf network non-broadcast

B.

ip ospf network point-to- multipoint non-broadcast

C.

ip ospf network point-to-point

D.

ip ospf network broadcast

Full Access
Question # 70

What does DWDM use to combine multiple optical signals?

A.

frequency

B.

IP protocols

C.

time slots

D.

wavelength

Full Access
Question # 71

What is the role of NFVI?

A.

domain name service

B.

intrusion detection

C.

monitor

D.

network address translation

Full Access
Question # 72

Refer to the exhibit. Company A's network architect is implementing the capabilities that are described in RFC 4379 to provide new options for troubleshooting the company's MPLS network. MPLS LSPs are signaled via the BGP routing protocol with IPv4 unicast prefix FECs. Due to company security policies, access is controlled on the control plane and management plane. Which two tasks must the architect perform to achieve the goal? (Choose two.)

A.

Open UDP port 3503.

B.

Open MCP port 3505.

C.

Implement OAM on all MPLS-enabled routers.

D.

Implement LSP Ping on PE routers only.

E.

Implement VCCV on core routers only.

Full Access
Question # 73

Refer to the exhibit A user is performing QoS marking on internet traffic and sending it with IPv4 and IPv6 headers on the provider edge device PE1. IPv4 traffic is classified with DSCP 4 and IPv6 traffic is classified with DSCP 6. Which action must the engineer take to begin implementing a QoS configuration on PE1 for the IPv6 traffic?

A.

Create an access list that includes any IPv6 traffic and apply it to CM-20.

B.

Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM-10 and CM-20.

C.

Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.

D.

Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.

Full Access
Question # 74

A network engineer must implement SNMPv2 with these parameters

    Enable SNMP community string C1sc0 with read-only permissions.

    Enable interface index persistence.

    Restrict the SNMP community to only the monitoring server with IP address 198.18 19 100/32.

    Provide view-only access to ospflfEntry and ospfNbrEntry.

Which configuration must the engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 75

Drag and drop the functionalities from the left onto the correct target fields on the right.

Full Access
Question # 76

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Tasks

-

Configure and verify the OSPF neighbor adjacency between R1 and R2 in OSPF area 0 according to the topology to achieve these goals:

1. Establish R1 and R2 OSPF adjacency. All interfaces must be advertised in OSPF by using the OSPF interface command method. Use Loopback0 as the OSPF ID.

2. There must be no DR/BDR elections in OSPF Area 0 when establishing the neighbor relationship between R1 and R2. OSPF must not generate the host entries /32 for the adjacent interfaces.

3. Enable OSPF MD5 Authentication between both routers at the interface level with password C1sc0!.

Full Access
Question # 77

Refer to the exhibit.

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

A.

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Full Access
Question # 78

While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?

A.

Configure the device to pass only O and E2 routes through it.

B.

Configure the synchronization keyword in the global BGP configuration.

C.

Configure the keyword nssa in the redistribution entry.

D.

Configure the keywords internal and external in the redistribution entry.

Full Access
Question # 79

Refer to the exhibit. A large enterprise has multiple branch offices that span several geographic regions. The enterprise runs MPLS within the core to propagate VPNv4 routes using BGP. After a recent series of DDoS attacks disrupted the network, a network engineer has been asked to reconfigure BGP to help mitigate future attacks. Which configuration must the engineer apply?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 80

Refer to the exhibit:

BGPsec is implemented on R1. R2. R3. and R4 BGP peering is established between neighboring autonomous systems Which statement about implementation is true?

A.

BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator

B.

BGP updates from the iBGP peers are appended with a community of local-as

C.

BGP updates from the all BGP peers are appended with a community of no export

D.

BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature

Full Access
Question # 81

An engineer Is implementing NSR with OSPF on a large campus that requires high availability. Which task must an engineer perform to complete the process with minimal disruption to traffic?

A.

Reset OSPF neighbor sessions to maintain state Information during router switchover

B.

Configure the device to repopulate state information using routing updates received from the BDR

C.

increase the keepalive interval on the OSPF neighbors so that traffic continues to pass during the switchover.

D.

Ensure that the dual RP has synchronized their state information before performing the switchover operation.

Full Access
Question # 82

What are the four primary components of an API?

A.

methods, actions, objects, and formats

B.

GET, PUT, DELETE, and SET

C.

Modularity, Abstraction, Stability, and Resources

D.

running config, startup config, VLAN database, and routing database

Full Access
Question # 83

Refer to the exhibit. A client wants to filter routes to a BGP peer to limit access to restricted areas within the network. The engineer configures the route map ciscotest to filter routes from the BGP neighbor. The engineer also sets a tag that will be used for QoS in the future. Which task must be performed to complete the Implementation?

A.

Attach the new route map to the BGP neighbor statement in the inbound direction.

B.

Create a policy map named ciscotest and apply It to inbound traffic on the link that is directly connected to the BGP neighbor.

C.

Create a route map, configure BGP with an IPv4 address family, and activate the neighbor.

D.

Add a route map statement with sequence 40 that links a BGP community to the routing protocol

Full Access
Question # 84

Which two tasks must you perform when you implement LDP NSF on your network? (Choose two.)

A.

Enable NSF for EIGRP

B.

Enable NSF for the link-state routing protocol that is in use on the network.

C.

Disable Cisco Express Forwarding

D.

Implement direct connections for LDP peers

E.

Enable NSF for BGP

Full Access
Question # 85

R1 serves as a route reflector on a BGP-enabled network and has dual RPs installed. To ensure that all routes have been processed when an RP fails over, R1 must send the router request to all peers configured with NSR to refresh the route database. Which action completes the implementation?

A.

Implement bgp fast-external-failover under the BGP IPv4 address-family configuration.

B.

Enable bgp jett rp route-update in the global router configuration.

C.

Enable bgp sso route-refresh-enable in the global BGP configuration.

D.

Implement bgp consistency-checker auto-repair under the Cisco Express Forwarding configuration.

Full Access
Question # 86

Drag and drop the LDP features from the left onto their usages on the right.

Full Access
Question # 87

Refer to the exhibit:

This output is included at the end of an output that was provided by a device using NETCONF.

What does the code show?

A.

It shows the hostname of the device as rpc-reply

B.

It shows that the running configuration is blank

C.

It shows NETCONF uses remote procedure calls.

D.

It shows that the full configuration is being modeled by VANG

Full Access
Question # 88

Refer the exhibit.

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

A.

first-in, first-out

B.

traffic shaping

C.

class-based weighted fair queueing

D.

traffic policing

Full Access
Question # 89

Which utility must be used to locate MPLS faults?

A.

QoS

B.

MPLS LSP ping

C.

MPLStraceroute

D.

EEM

Full Access
Question # 90

A new PE router is configured to run OSPF as an IGP with LDP on all interfaces. The engineer is trying to prevent black holes after convergence when the PERSON device loses an LDP session with other PE routers. Which action must the engineer take to implement LDP session protection on a new PE router?

A.

Configure the mpls ldp session protection and mpls label protocol ldp commands on the interfaces on the new PE router that connect to the CENTER routers.

B.

Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands on the interfaces on the new PE router that connect to the CE routers.

C.

Configure the new PE router with the mpls ldp session protection command and on neighboring routers that connect to this new PE router.

D.

Configure the new PE router with the mpls ldp session protection command on interfaces with directly connected neighbors.

Full Access
Question # 91

Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?

A.

routing and tunneling when doing symmetric IRB

B.

routing when doing asymmetric IRB

C.

routing and bridging when doing asymmetric IRB

D.

bridging when doing symmetric IRB

Full Access
Question # 92

Refer to the exhibit.

A network operator has two IPv4 and IPv6 dual-stacked network on each side of the IPv4 core network. The operator must be able to provide connectivity between them while using specific assigned IPv6 space provided from the company IP administrator team. Which technology should the network operator use to accomplish this goal?

A.

6rd

B.

NAT46

C.

DS-Lite

D.

NAT44

Full Access
Question # 93

What is the function of Cisco NFV infrastructure platform?

A.

It does not have a security audit feature.

B.

It does not offer high availability.

C.

It offers consistent performance.

D.

It offers decentralized logging.

Full Access
Question # 94

Refer to the exhibit:

Which statement describes this configuration?

A.

Router 1 has its running configuration locked so changes can be made only when the administrator issues a kill session

B.

Router 1 can be remotely managed by the CLI using Telnet

C.

Router 1 has a new data store to collect SNMP information, but configuration must still be done at the CLI only

D.

Router 1 has a temporary data store where a copy of the running configuration can be manipulated and verified before committing the configuration

Full Access
Question # 95

What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

A.

The traffic uses the default MDT transmit the data Only if it is a (S, G) multicast route entry.

B.

A data MDT is created if is a Multicast route entries

C.

A data and default MDT are created to flood the multicast stream of all PIM-SM neighbors.

D.

A data MDT is created to allow for the best transmit through the core for multicast route entries.

Full Access
Question # 96

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

A.

Change the helper-address value to 192.168.10.2 on RC.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Full Access
Question # 97

Which feature describes the adjacency SID?

A.

It applies only to point-to-point links.

B.

It applies only to multipoint links

C.

It is locally unique

D.

It is globally unique.

Full Access
Question # 98

A network engineer is deploying VRF on ASBR router R1. The interface must have connectivity over an MPLS VPN inter-AS Option AB network. Which configuration must the engineer apply on the router to accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 99

Refer to the exhibit. A network engineer is configuring an SNMP community on router RB with these requirements:

    Allow read-only access for all objects to members of Access-List 10 that use the comaccess community string.

    Other SNMP managers must not have access to objects.

    SNMP authentication failure traps must be sent to SNMPv2c and then to the host using SNMPv2c with the public community string.

Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

Drag and drop the OSs from the left onto the correct deceptions on the right.

Full Access
Question # 101

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Full Access
Question # 102

A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 103

What is a primary benefit of IPoATM or MPLS over ATM backbone service provider networks?

A.

dedicated circuits

B.

variable-length packets

C.

isochronous system

D.

fixed-length cells

Full Access
Question # 104

Refer to the exhibit. What is the effect of this REST API script?

A.

It creates the interface in an enabled state.

B.

It disables the interface until a configurable timer expires and then enables it.

C.

It enables the interface immediately when executed.

D.

It shuts down the interface until the interface is manually turned up.

Full Access
Question # 105

Refer to the exhibit.

An engineer is configuring router R1 for OSPFv3 as shown. Which additional configuration must be performed so that the three active interfaces on the router will advertise routes and participate in OSPF IPv6 processes?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 106

Refer to the exhibit an engineer working for a private telecommunication company with an employee Id: 4065:96:080 upgrades the WAN link between routers ASBR-101 and ASBR-201 to 1Gb by Installing a new physical connection between the Gi3 Interfaces. Which BGP attribute must the engineer configure on ASBR-201 so that the existing WAN link on Gi2 Is maintained as a backup?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 107

Drag and drop the characteristics from the left onto the automation tool on the right.

Full Access
Question # 108

Refer to the exhibit. Router 1 and Router 2 were installed in the data center. Router 1 is the core router in the network, but it fails to establish an OSPF peering with Router 2. and customer traffic is unable to pass. Router 1 also reports an increase in CPU and memory usage. However, the CPU for R2 is stable. Which action resolves this issue?

A.

Disable Cisco Express Forwarding on Router 2.

B.

Change the transport mode to WAN on Router 1.

C.

Change the MTU to 1524 on Router 1.

D.

Enable MPLS on Router 2.

Full Access
Question # 109

Which OoS model allows hosts to report their QoS needs to the network?

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Full Access
Question # 110

A mod-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company’s two sites across the service provider core. To meet service requirements, the service provider must extend the layer 2 domain between the company’s two locations. Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 111

Refer to the exhibit.

An engineer is configuring multitiopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to complete the task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 112

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Full Access
Question # 113

Refer to the exhibit. AS 65517 is running OSPF within the core. BGP is running between all four autonomous systems, interconnecting several ISPs that provide intranet and extranet services. All of the PE routers are connected, and eBGP peering relationships have been established. A network engineer also configured an iBGP peering between PE3 and P1, and the peering is up. However, P1 cannot reach routes outside of AS 65517. Which action must the engineer take so that P1 reaches external routes?)

A.

Synchronize BGP and OSPF with AS 65517.

B.

Add the next-hop-self attribute under the BGP neighbor configuration for P1 on PE3.

C.

Install route targets on all PE routers under the VRF configuration for intranet services.

Full Access
Question # 114

A network engineer is configuring a router to send multicast traffic for the 239.10.10.10 group. Which configuration must an .... forward the traffic?

A.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp max-groups action replace

B.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp filter

C.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp access-group 239.10.10.10

D.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp join-group 239.10.10.10

Full Access
Question # 115

Refer to the exhibit. An operations team recently located an archive of scripts for deploying routine network changes with an error-free approach. A junior network engineer, who is working to modify the scripts to support RESTCONF, has been asked to document the purpose of each updated script. Which two actions does the given script take? (Choose two.)

A.

Send a patch request to the API endpoint.

B.

Print a fail message when the response code is 204.

C.

Pass an XML data-format request in the API header.

D.

Print a success message when the device receives a full-content response code.

E.

Ignore SSL certificate verification.

Full Access
Question # 116

Refer to the exhibit. A network engineer is configuring a new router for iBGP to improve the capacity of a growing network. The router must establish an iBGP peer relationship with its neighbor. The underlay network is already configured with the correct IP addresses. Which step should the engineer apply to complete this task?

A.

Implement multicast routing on the router to support BGP hellos.

B.

Configure the AS number for the router to share with its iBGP peers.

C.

Configure the new router as an iBGP route reflector to support multiple iBGP peers.

D.

Activate the BGP peers under the correct address family on the router.

Full Access
Question # 117

Which configuration enables BGP FlowSpec client function and installation of policies on all local interfaces?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 118

Refer to the exhibit. A network engineer is implementing iBGP and eBGP between AS 600 and AS 500 with these requirements:

    R2 must establish eBGP peering on 192.168.3.0/30 with R5 for sending unicast and multicast traffic

    R2 must wait for 30 seconds before sending BGP updates to R5 for multicast traffic.

Which action must be taken on R2 to meet the requirements?

A.

Configure advertisement-interval 30 In address-family ipv4 unicast

B.

Configure advertisement-Interval 30 in address-family Ipv4 multicast

C.

Apply timers bgp 30 in address-family ipv4 unicast

D.

Apply timers bgp 30 in address-family ipv4 multicast.

Full Access
Question # 119

Refer to the exhibit. The network is configured with OSPF. A networking team just connected a streaming multicast server to router R7, and they now must enable access for users throughout the network to stream video from the server.

Which action must the team take so that users can stream video without overloading the network?

A.

Implement PIM-DM on the link between the server and R7.

B.

Implement PIM-SM on the LAN network connecting R5, R6, R3, and R4.

C.

Implement PIM-SM on all routers and connected links.

D.

Implement PIM-DM on all interfaces in the network except the LAN connection between R5, R6, R3, and R4.

Full Access
Question # 120

Which statement about segment routing prefix segments is true?

A.

It is linked to a prefix SID that is globally unique within segment routing domain.

B.

It is the longest path to a node.

C.

It is linked to an adjacency SID that is globally unique within the router.

D.

It requires using EIGRP to operate.

Full Access
Question # 121

What is the main purpose of EVPN?

A.

to provide simplified and flexible underlay connectivity for private VPN services

B.

to provide scalable, interoperable multitenancy in data center and cloud networks

C.

to provide advanced security features for IoT devices

D.

to provide application-aware networking capabilities in a cloud environment

Full Access
Question # 122

Refer to the exhibit. A growing company wants to ensure high availability and redundancy for its critical web servers, which are located in an offsite data center. The network architect decided to implement BGP so that the network can use redundant paths for outbound traffic toward the destination subnet 10.2.2.0/24. A network engineer already configured basic BGP settings on edge router R1, which is a Cisco ASR-1001X router. The engineer also confirmed loopback reachability to routers R2 and R3, and the AS path length toward the destination is the same via R2 and R3. Which action must the engineer take on R1 to complete the implementation?

A.

Implement as-path multipath under the BGP neighbor configuration.

B.

Implement maximum-paths ibgp 2 under the BGP neighbor configuration.

C.

Implement maximum-paths 2 under the BGP global configuration.

D.

Implement bestpath as-path multipath-relax under the BGP global configuration.

Full Access
Question # 123

Which module refers to the network automation using Ansible?

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Full Access
Question # 124

An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 125

Which type of attack is a Protocol attack?

A.

HTTP flood

B.

TFTP flood

C.

SYN flood

D.

Slowlorls

Full Access
Question # 126

Refer to the exhibit:

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Full Access
Question # 127

Refer to the exhibit. A regional company is implementing a network-health monitoring solution on their Cisco ISR routers to monitor network performance metrics and gather real-time data. The router R1 Ethernet interface, GigabitEthernet0/0, is assigned IP address 192.168.1.1/24, and basic IP addressing and connectivity to the data-collection server have already been configured. A network engineer must update R1 to ensure secure and reliable data transmission to the monitoring server, which is located at IP address 192.168.50.50 on port 50051. To achieve secure communication, the configuration must comply with RFC 5246, and to ensure reliable data transmission, it must follow RFC 793. Which command must the engineer execute to configure data collection?

A.

telemetry ietf subscription 1 receiver ip address 192.168.50.50 50051 protocol grpc-tcp

B.

gnmi dialout address 192.168.50.50 port 50051

C.

telemetry ietf subscription 1 source-address 10.1.1.1 50051 protocol grpc-ucmp

Full Access
Question # 128

Refer to the exhibit:

Which purpose of implementing NSF with this configuration is true?

A.

The router uses NSF to load balance traffic between two links, with the primary link alternating every 90 seconds

B.

The router uses NSF to reduce neighbor-relationship downtime during RP switchover

C.

The router uses NSF to load balance traffic on a routed EtherChannel

D.

The router uses NSF to handle RP switchover while allowing neighbor relationships to remain up

Full Access
Question # 129

What is one of the main functions of 6RD?

A.

It provides stateful session translation with the 2002::/16 prefix.

B.

It translates RFC 1918 IP addresses into public IP addresses.

C.

It provides native reachability between IPv4-only hosts and 6RD-enabled IPv6 hosts.

D.

It allows customers IPv6 traffic to be tunneled over IPv4 network infrastructure.

Full Access
Question # 130

Refer to the exhibit.

A network engineer Is implementing OSPF multiarea. Which command on interface G0/1 resolves adjacency Issues in the new area?

A.

Ip ospf network broadcast

B.

Ip ospf network non-broadcast

C.

Ip ospf network polnt-to-multlpoint

D.

Ip ospf network point-to-point

Full Access
Question # 131

Which role does the Adjacency-SID sub-TLV extension perform in the IS-IS routing protocol?

A.

It is advertised within a TLV-24 (IS-IS Neighbor Adjacency Attribute) to label a specific adjacency between Level1 routers within one IS-IS area.

B.

It is advertised within TLV-136 (Extended IP Reachability) to label a specific node n the network.

C.

It is advertised within TLV-22 (Extended IS Reachability) to label a specific link in a segment routing domain.

D.

It is advertised within TLV-145 (IS-IS Prefix Reachability Information) to label host prefixes on loopback interfaces on Level 2 routers within one

Full Access
Question # 132

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service provider core network with these requirements:

R1 must establish LDP peering with the loopback IP address as its Router-ID.

Session protection must be enabled on R2.

How must the team update the network configuration to successfully enable LDP peering between R1 and R2?

A.

Change the LDP password on R2 to Cisco.

B.

Configure mpls ldp router-id loopback0 on R1 and R2.

C.

Configure LDP session protection on R1.

D.

Change the discover hello hold time and interval to their default values.

Full Access
Question # 133

Refer to the exhibit. The company is running IS-IS in its core. A network engineer must segment the network into two areas to isolate departments. However, some networks must be shared from area 2 to area 1, so the engineer has decided to implement route filtering between devices.

Which action must the engineer take so that the correct networks are shared between IS-IS areas?

A.

Apply an ACL on RE to deny unnecessary routes from exiting the interface toward RD.

B.

Implement a route map and attach it to a distribute list on RD to filter inbound routes from RE.

C.

Set a unique area ID on each router to fully segment the network.

D.

Implement route-tagging on RB and RD to identify and allow only the routes that should be shared from area 2.

Full Access
Question # 134

Refer to the exhibit. A network engineer just upgraded the Cisco IOS XE Software to the newest version on OSPF routers R1 and R2, added the point-to-point network type under Gi0/0 on R2, and configured ip route 192.168.10.0 255.255.255.0 192.168.1.2 on R1. After the engineer restarted the routers, R1 entered the Exstart state with its neighbor, but the adjacency has not been established. Which action must the engineer take to resolve the issue?

A.

Set the network type of the R2 OSPF interface to broadcast.

B.

Add a static route toward 192.168.20.0 on R2.

C.

Change the R2 OSPF router ID to 10.1.1.1.

D.

Decrease the OSPF cost of the network on R2 to 10.

Full Access
Question # 135

A network operator working for a telecommunication company with an employee Id: 4065 96080 it trying to implement BFD configuration on an existing network of Cisco devices Which task must the engineer perform to enable BFD on the interfaces?

A.

Disable Cisco Express Forwarding on the interfaces

B.

Disable SSO on the interfaces

C.

Remove any static routes that point to the interfaces

D.

Remove the log option from any ACLs on the interfaces.

Full Access
Question # 136

Refer to the exhibit. A network engineer received a complaint about these problems in OSPF stub area 100:

    The Ethernet link is down between routers RX and RY because the fiber was cut.

    CE site A traffic to the hub site is being dropped.

Which action resolves these issues?

A.

Set the OSPF authentication type to MD5 between RX and RY DUMPS

B.

Change the OSPF area 100 type to stub on RZ.

C.

Change the OSPF priority to 100 on the interfaces that connect RX and RY.

D.

DUMPS Set the OSPF MTU to 1500 on the link between RX and RZ.

Full Access
Question # 137

A mid-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company's two sites across the service provider core. To meet service requirements, the service provider must extend the Layer 2 domain between the company's two locations.

Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

A.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

B.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag push dot1q 21 symmetric

C.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag pop 13

D.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag translate 1-to-1 dot1q 2

Full Access
Question # 138

Refer to the exhibit.

ASN 64501 currently reaches the networks under the 10.0.0.0/8 prefix via the North_B router, which is a slow backup link. The administrator of ASN 64502 wants traffic from ASN 64501 to 10.0.0.0/8 to travel via the primary link North_A. Which change to the network configuration accomplishes this task?

A.

Set a higher local preference between North_A and South_A

B.

Advertise the 10.0.0.0/8 prefix through North_B and specific subnets through North_A

C.

Set a Lower Weight value for incoming traffic on North_A

D.

Set a lower MED between North_B and South_B

Full Access
Question # 139

Refer to the exhibit:

A network engineer is implementing a BGP protocol. Which effect of the local-as keyword in this configuration is true?

A.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 and the VPNv4 address family

B.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65012 without additional configuration

C.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 and the VPNv4 address family

D.

It enables peer 192.168.1.2 to establish a BGP relationship with R1 using AS 65112 without additional configuration.

Full Access
Question # 140

router(config)# route-map blackhole-trigger

router(config-route-map)# match tag 777

router(config-route-map)# set ip next-hop 10.0.1.1

router(config-route-map)# set origin igp

router{config-route-map)# set community no-export

Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and each router maintains iBGP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which is used as a black hole route as shown. Which configuration should the operator implement to the management router to create a route map that will redistribute tagged static routes into BGP and create a static route to blackhole traffic with tag 777 that is destined to the server at 192.168.10.100?

A.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

B.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

C.

router(config)# router bgp 55100

router(config-router)# redistribute connected

router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

D.

router(config)# router bgp 55100

router(config-router)# redistribute connected route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

Full Access
Question # 141

Drag and drop the SG KAN architecture types from the bottom next to the corresponding topologies on the right.

Full Access
Question # 142

A regional company is planning to bolster the security of their LAN infrastructure by implementing advanced encryption techniques between their core switch and their distribution switch. The solution must leverage hardware-accelerated encryption capabilities to transparently encrypt all traffic between the two switches at the data-link layer to safeguard against unauthorized access. However, it is important for the solution to have minimal impact on network performance and latency.

Which action must the engineer take to meet the requirements?

A.

Deploy an IPsec tunnel with MD5 hashing between the two switches.

B.

Enable SSL VPN with SHA-256 encryption on all interfaces on both switches.

C.

Enable L2TP with RSA encryption on both switches.

D.

Implement MACsec with AES-256 encryption on both switches.

Full Access
Question # 143

Refer to the exhibit. A multinational corporation with a Cisco-based network wants to leverage Cisco security features to enhance the security of their LAN and protect against eavesdropping and man-in-the-middle attacks. The solution must comply with the IEEE 802.1AE standard. A network engineer must implement the new security configurations on a pair of interconnected Cisco switches. The engineer already completed the configuration to enable AAA new-model and set up a basic AAA configuration for user authentication. Management VLAN 10 is in place for network administration. Which action must the engineer take to meet the requirements?

A.

Implement CTS for role-based access control on both switches.

B.

Implement MACsec on both switches with encryption mode GCM and a shared key.

C.

Implement open authentication via the management VLAN on both switches.

D.

Implement IPsec on both switches to secure data transmissions.

Full Access
Question # 144

A company uses PIM-SM multicast with IGMPv2 to stream training videos from a server in one network to hosts in a different network. As the company has grown, the networking team decided to implement SSM to improve efficiency for multicast within Layer 2. Which action must the team take to begin the process?

A.

Configure an IGMP querier and implement Cisco Express Forwarding across the network.

B.

Implement PIM-DM to enable the routers on the LAN to identify SSM-capable multicast hosts.

C.

Implement IGMPv3 and deprecate IGMPv2.

D.

Implement IGMPv3 simultaneously with IGMPv2 on the individual links that must support SSM and PIM-DM.

Full Access
Question # 145

Refer to the exhibit:

An engineer wants to authenticate the OSPF neighbor between PEA and PE-B using MD5.

Which command on PE-B successfully completes the configuration?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 146

Refer to me exhibit.

Refer to the exhibit. A network engineer notices PE-21 convergence degradation due to the growing LSDB size of Level 2 areas in the network. The engineer decides to migrate router PE-21 from an inter-area design to an intra-area implementation. Inter-area routing must be accomplished via an ATT-bit set by the Level 1/Level 2 router. Which configuration must the engineer implement on PE-21 to complete the migration?

A.

configure terminal

router isis 1

no net 49.0200

net 49.5000

is-type level-1-2

end

B.

configure terminal

router isis 1

net 49.5000.0100.1202.0021.00

is-type level-1-2

end

C.

configure terminal

router isis 1

net 49.5000.0100.1222.0022.00

is-type level-1

end

D.

configure terminal

router isis 1

no net 49.0200.0100.1202.0021.00

net 49.5000.0100.1202.0021.00

is-type level-1

end

Full Access
Question # 147

Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

C.

Chef is written in Python, and SaltStack is written in Ruby.

D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

Full Access
Question # 148

Refer to me exhibit.

A network operator recently configured BGP FlowSpec for me internal IT network What will be inferred from the configuration deployed on me network?

A.

The policy is configured locally on CSRl and drops all traffic for TCP ports 80 and 443

B.

The policy is learned via BGP FlowSpec and drops all traffic for TCP ports 80 and 443

C.

The policy is warned via BC FlowSpec aid has active traffic

D.

The policy is configured locally on CSR1 and currently has no active traffic

Full Access
Question # 149

When implementing a REST API, how does an engineer mitigate security risks?

A.

by configuring the system to authenticate the client's identity and avoid broken authentication

B.

by configuring object properties to protect data

C.

by configuring separate authorization schemes to securely compartmentalize different areas of the business

D.

by configuring rate limiting to reduce the risk of DOS and DDOS attacks against the system

Full Access
Question # 150

Refer to the exhibit.

An engineer is configuring two routers to support MPLS LDP sessions between them. The R1 configuration is complete, and work has started on R2 as shown. Which additional configuration must the engineer apply to R2 to complete the task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 151

Refer to the exhibit.

What is the effect of this configuration?

A.

R1 supports a graceful restart operation on the peer, even if graceful restart is disabled on the peer.

B.

R1 supports a peer that is configured for LDP SSO/NSF as the peer recovers from an outage.

C.

R1 failovers only to a peer that is configured for LDP SSO/NSF.

D.

R1 failovers to any peer.

Full Access
Question # 152

Refer to the exhibit.

An engineer is updating this network to meet these conditions:

• Area 10 will receive inter-area routes and support mutual redistribution of external routes with the extranet.

• The ::/0 route is prohibited in Area 10.

• Area 11 will receive only the ::/0 route from the ABR.

• External route redistribution is not supported in Area 11.

• The ABR in Area 11 will advertise no interarea routes.

Which two configurations must be performed to meet the requirements? (Choose two.)

A.

Configure area 11 as nssa no-summary on R7 and as nssa on XR31.

B.

Configure area 10 as stub on R9 and XR32.

C.

Configure area 11 as stub no-summary on R7 and as stub on XR31.

D.

Configure area 11 as nssa default-information-originate on R7 and as nssa on XR31.

E.

Configure area 10 as nssa on R9 and XR32.

Full Access
Question # 153

Which benefit is provided by FRR?

A.

It provides fast forwarding path failure detection times for all media.

B.

It provides rapid failure detection between forwarding engines.

C.

It provides performance data for the service provider network.

D.

It protects Cisco MPLS TE LSPs from link and node failures.

Full Access
Question # 154

How does an untrusted interface at the boundary of an administrative domain handle incoming packets?

A.

It remarks all values to a CoS of 0.

B.

It forwards only traffic with a DSCP value of 48.

C.

It translates the IP precedence value to the corresponding DSCP value.

D.

It drops all traffic ingressing the network.

Full Access
Question # 155

Drag and drop the functions from the path computation element protocol roles on the right.

Full Access
Question # 156

Refer to the exhibit. After a networking team configured this MPLS topology, the supervisor wants to view MPLS labels to verify the path that packets take from router R1 to router R7 The team already Issued an ICMP ping to verify connectivity between the devices. Which task must the team perform to allow the supervisor to view the label switch path?

A.

Configure MPLS TE to display the labels in the stack between the head and tail-end routers

B.

Implement MPLS LDP to assign labels to all the routes in the transit path.

C.

Configure MPLS LDP Sync to sync labels from the routing table to the MPLS forwarding table.

D.

Implement MPLS OAM to display the labels for each hop along the path

Full Access
Question # 157

An ISP Is Implementing end-to-end fault monitoring for a customer based on the IEEE 802.3ah standard. The solution must detect when 15 or more corrupted Ethernet packets arrive within 10 ms and stop propagating traffic through the ISP backbone network or to the customer side. Which configuration must the ISP engineer apply?

A.

ethernet oam link-monitoring enable

ethernet oam link-monitor crc-errors ingress time-window 10

ethernet oam link-monitor crc-errors ingress threshold high 15 ethernet oam link-monitor crc-errors egress time-window 10 ethernet oam link-monitor crc-errors egress threshold high 15 ethernet oam link-monitor high-threshold action shutdown-interface

B.

ethernet oam link-monitoring

ethernet oam link-monitor receive-crc window 15

ethernet oam link-monitor receive-crc threshold high 10

ethernet oam link-monitor high-threshold action disable-interface

C.

ethernet oam

ethernet oam link-monitor receive-crc window 10

ethernet oam link-monitor receive-crc threshold high 15

ethernet oam link-monitor transmit-crc window 10

ethernet oam link-monitor transmit-crc threshold high 15

ethernet oam link-monitor high-threshold action errordisable-interface

D.

ethernet oam link-monitoring global enable

ethernet oam link-monitor receive crc-errors period 15

ethernet oam link-monitor receive crc-errors limit 15

ethernet oam link-monitor transmit crc-errors period 10

ethernet oam link-monitor transmit crc-errors limit 15

ethernet oam link-monitor limit action error-disable interface

Full Access
Question # 158

Refer to the exhibit.

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 159

Refer to Exhibit.

A network engineer is trying to retrieve SNMP MIBs with RESTCONF on the Cisco switch but fails. End-to-end routing is in place. Which configuration must the engineer implement on the switch to complete?

A.

netconf-yang cisco-ia snamp-community -string Public

B.

snmp-server community cisco RW

C.

snmp-server community public RO

D.

netconf-yang cisco-Ia snmp-community-string Private

Full Access
Question # 160

Refer to the exhibit.

While troubleshooting the OSPF adjacency between routers R1 and R2 an engineer noticed that both routers are stuck in the EXCHANGE/EXSTART state. What should the engineer fix to solve the ongoing issue?

A.

match IPv4 addresses

B.

match OSPF areas

C.

match OSPF network types

D.

match MTU values

Full Access
Question # 161

While implementing TTL security, an engineer issues the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command. After issuing this command, which BGP packets does the PE accept?

A.

from 2.2.2.2, with a TTL of less than 2

B.

to 2.2.2.2, with a TTL of less than 253

C.

from 2.2.2.2, with a TTL of 253 or more

D.

to 2.2.2.2, with a TTL of 2 or more

Full Access
Question # 162

Refer to the exhibit.

An engineer working for private Service Provider with employee id: 3948:11:613 is configuring the BGPsec framework. Which two conditions must the engineer take into account? (Choose two.)

A.

BGPsec uses IPsec tunnel for security.

B.

The BGPsec framework secures the AS path.

C.

In BGPsec. all route advertisements are given an expiry time by the originator of the route.

D.

Private keys are part of the router key pair used to sign route updates.

E.

In BGPsec. route advertisements are not given an expiration time by the originator of the route.

Full Access
Question # 163

Refer to the exhibit. An engineering team must update the network configuration so that data traffic from router A to router D continues in case of a network outage between routers B and C. During a recent outage on the B-C link, the IGP traffic path was switched to the alternate path via routers E and F. but label forwarding did not occur on the new path. Which action ensures that traffic on the end-to-end path continues?

A.

Configure the same hello timer values for IGP and LDP

B.

Bind the BFD protocol with IGP on all routers

C.

Enable LDP Session Protection on routers A and D.

D.

Enable MPLS LDP IGP Synchronization on all routers

Full Access
Question # 164

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 1 drops all traffic with a local-preference set to 150

B.

All traffic is dropped

C.

All traffic to 192.168.1.0/24 is dropped

D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.

Full Access