Practice Free 350-501 Exam Online Questions
Refer to the exhibit. The ISP is implementing a new hosting-as-a-service solution for its business customers. Service accessibility must be unique and separate for each customer. The network architect must ensure that multiple paths toward the hosting-as-a-service solution are always available. Basic protection against traffic black-holing on the MPLS network is required in case of link failure.
Which two actions must the engineering team perform to meet the requirements? (Choose two.)
- A . Con gure the fast-hello command under the IS-IS routing protocol with the BGP multipath 2 option enabled.
- B . Enable the VRF-Lite feature on router R4 and enable BGP address-family VPNv4.
- C . Create the hosting-as-a-service VRF on router R4 and configure it with the route target both 65123:88 command.
- D . Con gure the fast-reroute per-pre x command for the IS-IS protocol in the MPLS network and enable the BGP route-re ector feature on R2.
- E . Con gure the mpls ldp sync command in the MPLS network with the BGP additional-paths receive and additional-paths send options.
Refer to the exhibit. Customers report occasional forwarding issues from hosts connected to R6 to hosts connected to R1. A network engineer has just updated the MPLS configuration on the network, and a targeted LDP session has been established between R1 and R5.
Which additional task must the engineer perform so that the team can identify the path from R6 to R1 in case the forwarding issues continue?
- A . Con gure an MPLS TE from R4 to R1 that routes through R5.
- B . Implement MPLS OAM within the network.
- C . Implement MPLS VPLS within the network.
- D . Con gure MPLS LDP Sync on each router.
Refer to the exhibit. BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider’s existing customer at CE1 is opening a new o ce in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2.
Which action must the engineer take?
- A . Con gure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer
- B . Con gure CE1 and CE2 with a pseudowire that will run over the service provider core
- C . Con gure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGP
- D . Con gure CE1 and CE2 to establish a BGP relationship with PE1 and PE2
Refer to the exhibit. An engineer is configuring path selection on router R1 for two ASNs as shown.
Which additional task must the engineer perform on Router 1 so that all outbound traffic utilizes the link between R1 and R3 to reach ASN 4567?
- A . Con gure a low weight on the peer to ASN 4567.
- B . Con gure a high weight on the peer to ASN 4567.
- C . Con gure an AS path prepend on the peer to ASN 4567.
- D . Con gure a high med on the peer to ASN 4567.
How does an untrusted interface at the boundary of an administrative domain handle incoming packets?
- A . It remarks all values to a CoS of 0.
- B . It forwards only traffic with a DSCP value of 48.
- C . It translates the IP precedence value to the corresponding DSCP value.
- D . It drops all traffic ingressing the network.
Refer to the exhibit.
An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?
- A . Router 2 is the router receiving the DDoS attack.
- B . Router 1 must be configured with uRPF for the RTBH implementation to be effective.
- C . Router 1 is the trigger router in a RTBH implementation.
- D . Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Refer to the exhibit.
An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?
- A . Router 2 is the router receiving the DDoS attack.
- B . Router 1 must be configured with uRPF for the RTBH implementation to be effective.
- C . Router 1 is the trigger router in a RTBH implementation.
- D . Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Refer to the exhibit. An engineer started to configure a router for OSPF.
Which configuration must the engineer perform on the router without changing any interface configuration so that the router establishes an OSPF neighbor relationship with its peer?
- A . router(config)# router ospf 11router(config-if)# no passive-interface ethernet 1/1
- B . router(config)# interface ethernet 1/1router(config-if)# no shutdown
- C . router(config)# interface ethernet 1/1router(config-if)# ip ospf hello-interval
- D . router(config)# interface ethernet 1/1router(config-if)# ip ospf priority 0
Which two uses of the YANG data modeling language are true? (Choose two.)
- A . It can be used to model the configuration used by NETCONF operations.
- B . It can be used to access a device by HTTP.
- C . It can be used to replace the OSI model for troubleshooting.
- D . It can be used to shape state data of network elements.
- E . It can be used to replace RESTCONF as a mechanism to install and manipulate configuration.
AD
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/1611/b_1611_programmability_cg/configuring_yang_datamodel.pdf
Refer to the exhibit.
R1 is connected to two service providers and is under a DDoS attack.
Which statement about this design is true if URPF in strict mode is configured on both interfaces?
- A . R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface.
- B . R1 drops destination addresses that are routed to a null interface on the router.
- C . R1 permits asymmetric routing as long as the AS-PATH attribute entry matches the connected AS.
- D . R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.