Practice Free 350-501 Exam Online Questions
How does model-driven telemetry use YANG?
- A . to poll network devices on a 30-minute interval
- B . to set informs and traps on clients to report back to a centralized server
- C . to subscribe to data that is streamed from a device
- D . to reset network devices that malfunction
Refer to the exhibit.
What is the URL used for with REST API?
- A . It is used to initiate an FTP session to save a running configuration of a device.
- B . It is used to send a message to the APIC to perform an operation on a managed object or class operator.
- C . It is used to contact a URL lter to determine the e cacy of a web address.
- D . It is used to send a TACACS + authentication request to a server.
Refer to the exhibit. ISP A provides VPLS services and DDoS protection to Company XYZ to connect their branches across the North America and Europe regions. The uplink from the data center to the ISP is 100 Mbps. The Company XYZ security team asked the ISP to redirect ICMP echo requests, which are currently going to the web server, to a new local security appliance.
Which configuration must an ISP engineer apply to router R2 to redirect the ICMP tra c?
- A . class-map type tra
c match-all B_210.10.65.1 match destination-address ipv4 210.10.65.1 match protocol 7 match ipv4 icmp-type 3
- B . class-map type tra
c match-all B_210.10.65.1 match destination-address ipv4 210.10.65.1 match protocol 1 match ipv4 icmp-type 8
- C . class-map type tra
c match-all B_210.10.65.1 match destination-address ipv4 210.10.65.1 match protocol 3 match ipv4 icmp-type 5
- D . class-map type tra
c match-all B_210.10.65.1 match destination-address ipv4 210.10.65.1 match protocol 6 match ipv4 icmp-type 9
Refer to the exhibit. An engineer working for a service provider with an employee ID: 1234:56:789 notices that malicious traffic with a source IP in the RFC1918 range is arriving on the WAN connection to the internet and impacting customer resources on the LAN.
Which ACL configuration must the engineer implement on M-CPE-1 to block the malicious tra c?
- A .
- B .
- C .
Refer to the exhibit. An engineer is trying to implement BGP configuration on a router.
Which configuration error prevents the ASBR from establishing a BGP neighborship to a directly connected BGP speaker?
- A . The routing policy is absent for this Cisco IOS XR eBGP instance.
- B . The TCP session parameters are not speci ed.
- C . The VPNv4 address family interferes with the BGP IPv4 address family negotiations.
- D . The IPv4 address family configuration under neighbor configuration-mode must be removed.
An ISP Is Implementing end-to-end fault monitoring for a customer based on the IEEE 802.3ah standard. The solution must detect when 15 or more corrupted Ethernet packets arrive within 10 ms and stop propagating traffic through the ISP backbone network or to the customer side.
Which configuration must the ISP engineer apply?
- A . ethernet oam link-monitoring enable
ethernet oam link-monitor crc-errors ingress time-window 10
ethernet oam link-monitor crc-errors ingress threshold high 15 ethernet oam link-monitor crc-errors egress time-window 10 ethernet oam link-monitor crc-errors egress threshold high 15 ethernet oam link-monitor high-threshold action shutdown-interface - B . ethernet oam link-monitoring
ethernet oam link-monitor receive-crc window 15
ethernet oam link-monitor receive-crc threshold high 10
ethernet oam link-monitor high-threshold action disable-interface - C . ethernet oam
ethernet oam link-monitor receive-crc window 10
ethernet oam link-monitor receive-crc threshold high 15
ethernet oam link-monitor transmit-crc window 10
ethernet oam link-monitor transmit-crc threshold high 15
ethernet oam link-monitor high-threshold action errordisable-interface - D . ethernet oam link-monitoring global enable
ethernet oam link-monitor receive crc-errors period 15
ethernet oam link-monitor receive crc-errors limit 15
ethernet oam link-monitor transmit crc-errors period 10
ethernet oam link-monitor transmit crc-errors limit 15
ethernet oam link-monitor limit action error-disable interface
Refer to the exhibit. EIGRP is running between routers R5 and R1, and OSPF is used in the rest of the network. Users in a network attached to router R3 need to access a server connected to R5.
Which task must the engineer perform so that only the users attached to R3 are able to access the server, but no other network is shared to OSPF?
Refer to the exhibit. An engineer began to configure LDP between R1 and R2, but R1 and R2 cannot yet establish an LDP TCP connection.
Which additional task must be completed to nish the implementation?
- A . Con gure the mpls ldp neighbor 10.0.12.1 password command on R1
- B . Con gure the mpls ldp neighbor 172.16.0.1 password command on R1
- C . Con gure the no mpls ldp password option 1 command on R1
- D . Con gure the no mpls ldp password option 1 command on R2
DRAG DROP –
Drag and drop the characteristics from the left onto the corresponding radio splitting approaches on the right.

Refer to the exhibit. A network engineer is configuring router RB to secure BGP advertisements against route hijacking activity. RB must validate all pre xes that it receives from origin AS 200 before installing them in the BGP route table.
Which configuration meets the requirement?
- A . RB(config)# router bgp 100 RB(config-router)# address-family ipv4 unicast RB(config-router-af)# bgp bestpath origin-as use validity
- B . RB(config-bgp)# router bgp 100 RB(config-bgp)# bgp origin-as validation signal ibgp RB(config-bgp)# bgp bestpath origin-as allow invalid
- C . RB(config-bgp)# router bgp 100 RB(config-bgp)# bgp origin-as validation time off
- D . RB(config)# router bgp 100 RB(config-router)# address-family ipv4 unicast PB(config-router-af)# bgp origin-as validation enable