New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

350-501 Questions and Answers

Question # 6

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Full Access
Question # 7

In an EVPN operation, how does the PE determine and advertise Ethernet segment reachability?

A.

The PE discovers the remote PEs in the EVI and builds a flood list linked with the EVI.

B.

The PE discovers and shared routing information for the B-MAC addresses associated with local Ethernet segments.

C.

The PE discovers other PEs in the same Ethernet segment and elects a DF.

D.

The PE discovers remote ESIs and determines their redundancy mode.

Full Access
Question # 8

Refer to the exhibit.

Which task completes the configuration?

A.

Specify the maximum number of prefixes that R1 receives from neighbor 192.168.1.2.

B.

Specify the source interface in the neighbor statement.

C.

Specify the activate neighbor 192.168.1.2 under the IPv4 address family.

D.

Specify the local-as value in the neighbor statement.

Full Access
Question # 9

In MPLS traffic engineering, which FRR operation swaps the label and pushes the backup label?

A.

Merge Point

B.

Point of Local Repair

C.

Branch Point

D.

Mid-Point

Full Access
Question # 10

Refer to the exhibit. Users on a LAN that is connected to RD communicate to multiple servers on the corporate network. Initially, the servers were located on the same LAN. However, after congestion was reported, the engineering team decided to relocate the servers to two different networks.

Which task should the team perform to improve performance on the overall network while still allowing traffic to flow between the different hosts?

A.

Identify the traffic to each server in a prefix list and apply a traffic policing policy.

B.

Identify the traffic to each server with an ACL and apply the ACL to a threshold policy that drops excessive traffic.

C.

Identify the traffic to each server in a distribute list and implement FIFO to the interfaces in the egress direction.

D.

Identify the traffic to each server with a class map and apply it to a traffic-shaping policy.

Full Access
Question # 11

Refer to the exhbit. ISP A has a BGP peering with ISP C with the maximum-prefix 150 configuration on R1. After a recent security breach on the ISP A network, a network engineer has been asked to enable a lightweight security mechanism to protect the R1 CPU and BGP membership from spoofing attacks. Which solution must ISP A implement?

A.

Configure bgp maxas-limit 1 in the IPv4 address family urateUhe global BGP configuration.

B.

Configure neighbor 10.163.83.54 enable-connected-check under the BGP IPv4 address family.

C.

Configure neighbor 10.163.83.55 password Cisco under the global BGP IPv4 address family.

D.

Configure neighbor 10.163.83.55 ttl-stcurity hops 2 under the global BGP configuration.

Full Access
Question # 12

Company A is implementing VoIP services across the company. The network architect designed a QoS policy to allow only specific IP subnets and mark the signaling flow with DSCP 36. The solution should be as secure as possible. Phones receive their IP addresses from the 172.184.12.0/24 pool and are assigned by the RADIUS server to VLAN 1021. Skinny Client Control Protocol is used as a signaling protocol in the network. For security reasons, switchport port-security maximum 1 vlan voice has been preconfigured on the switch side. Which two tasks must an engineer perform on SW_1 to achieve this goal? (Choose two.)

A.

Implement a class map with the set dscp af42 command.

B.

Implement a class map with the set dscp af43 command.

C.

Implement an ACL with the set dscp af41 command.

D.

Implement an ACL with the permit udp 172.184.12.0 0.0.0.255 any range 2000 2002 command.

E.

Implement an ACL with the permit tcp 10.124.121.0 0.0.0.255 range 16384 32767 command.

Full Access
Question # 13

A company uses PIM-SM multicast with IGMPv2 to stream training videos from a server in one network to hosts in a different network. As the company has grown, the networking team decided to implement SSM to improve efficiency for multicast within Layer 2. Which action must the team take to begin the process?

A.

Configure an IGMP querier and implement Cisco Express Forwarding across the network.

B.

Implement PIM-DM to enable the routers on the LAN to identify SSM-capable multicast hosts.

C.

Implement IGMPv3 and deprecate IGMPv2.

D.

Implement IGMPv3 simultaneously with IGMPv2 on the individual links that must support SSM and PIM-DM.

Full Access
Question # 14

Which three OSPF parameters must match before two devices can establish an OSPF adjacency? (Choose three.)

A.

IP address

B.

interface cost

C.

subnet mask

D.

process ID

E.

hello timer setting

F.

area number

Full Access
Question # 15

Which module refers to the network automation using Ansible?

A.

the iosxr_system module to collect facts from remote devices

B.

the iosxr_user module to manage banners for users in the local database

C.

the losxr_logging module to run debugging for seventy levels 2 to 5

D.

the iosxr_command module to issue run commands on remote devices

Full Access
Question # 16

What is a characteristic of prefix segment identifier?

A.

It contains a router to a neighbor

B.

It contains the interface address of the device per each link

C.

It is globally unique.

D.

It is locally unique.

Full Access
Question # 17

Refer to the exhibit. After a networking team configured this MPLS topology, the supervisor wants to view MPLS labels to verify the path that packets take from router R1 to router R7 The team already Issued an ICMP ping to verify connectivity between the devices. Which task must the team perform to allow the supervisor to view the label switch path?

A.

Configure MPLS TE to display the labels in the stack between the head and tail-end routers

B.

Implement MPLS LDP to assign labels to all the routes in the transit path.

C.

Configure MPLS LDP Sync to sync labels from the routing table to the MPLS forwarding table.

D.

Implement MPLS OAM to display the labels for each hop along the path

Full Access
Question # 18

Which OS uses a distributed subsystem architecture?

A.

IOS XE

B.

IOS

C.

IOS XR

D.

CatOS

Full Access
Question # 19

After implement MPLS protocol for multiple VRFs on a single Cisco device, the engineer notices all VRFs on the router still do to not LDP session protection feature enabled. Which configuration must the engineer apply to enable the LDP session protection feature FOR LDP neighbors within each VRF?

A.

Configure LDP session protection globally on the device only.

B.

Configure LDP session protection globally on the device and on each neighbor that requires session protection.

C.

Configure LDP session authentication on the device to enable LDP session protection on each VRF automatically.

D.

Configure LDP session protection within the individual VRFs.

Full Access
Question # 20

Refer to the exhibit. An engineer must Implement a traceroute operation to verity the R1 point-to-multipoint LSP connections. The traceroute operation must return all labels and hop-by-hop IP addresses for destinations 10.20.0.1. 10.30.0.1, and 10.40.0.1. and the maximum number of hops is 4. Which command must be executed to meet the requirements?

A.

traceroute mpls traffic-eng tunnel-mte 10 ttl 4

B.

traceroute mpls traffic-eng tunnel-mte 10 responder-id 10.40.0.1

C.

traceroute mpls ipv4 10.30.0.1/32 fee-type generic

D.

traceroute mpls ipv4 10.20.0.1/32 ttl 4

Full Access
Question # 21

What Is the primary role of Ansible In a network?

A.

It is used as a debugging tool for connectivity issues between the DMZ and an enterprise intranet.

B.

It Is used to diagnose Layer 11ssues In data centers that span more than one city block.

C.

It is used to deploy IPv6 configuration is networks That are dual slack.

D.

It is used as a network automation provisioning and configuration tool.

Full Access
Question # 22

Which two features will be used when defining SR-TE explicit path hops if the devices are using IP unnumbered interfaces? (Choose two.)

A.

router ID

B.

labels

C.

node address

D.

next hop address

E.

output interface

Full Access
Question # 23

A router is advertising multiple networks to its BGP neighbor in AS 5200 with peer IP address 1.1.1.1. Which configuration must be applied so that the router permits updates only for networks with a prefix mask length less than or equal to 21?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 24

Refer to the exhibit.

While troubleshooting a connectivity issue on router R2, a network engineer with an employee id:3876.13.497 notices that although it detects three OSPF links from R1, the OSPF prefixes are missing from the routing table. What is the reason for the problem?

A.

The serial interfaces have different MTUs

B.

Both loopback interfaces on R1 are configured as stub

C.

The R2 Serial 1/0 interface is configured with an IP address, but the R1 Serial R1 Serial 1/0 interface in unnumbered.

D.

The subnet masks on the serial interfaces are mismatched.

Full Access
Question # 25

Refer to the exhibit.

The CE router is peering with both PE routers and advertising a public prefix to the internet. Routing to and from this prefix will be asymmetric under certain network conditions, but packets must not be discarded. Which configuration must an engineer apply to the two PE routers so that they validate reverse packet forwarding for packets entering their Gi2 interfaces and drop traffic from the RFC1918 space?

A.

ip verify unicast source reachable-via rx allow-default

B.

interface GigabitEthernet 2

ip verify unicast source reachable-via rx

C.

ip verify unicast source reachable-via any allow-default

interface GigabitEthernet 2

D.

ip verify unicast source reachable-via any

Full Access
Question # 26

Which configuration modifies Local Packet Transport Services hardware policies?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

Refer to the exhibit. A junior network engineer has been configuring OSPF on two directly connected routers, R1 and R2, to establish a neighbor adjacency. The engineer also configured ip route 10.1.1.0 255.255.255.0 GigabitEthernet 0/1 10.10.10.1 on R1 to allow inbound management. After the initial configuration, the adjacency failed to form. The engineer changed the cost and area type under the OSPF configuration on R1, but the problem persists. Which action must the engineer take to resolve the issue?

A.

Change the network type on R2 to point-to-multipoint.

B.

Remove the static route on R1 and enable OSPF under the Gi0/1 interface.

C.

Set the OSPF process ID on R1 to match the OSPF process ID on R2.

D.

Decrease the OSPF cost on R1 to match the cost on R2.

Full Access
Question # 28

While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.

After you issue this command, which BGP packets does the PE accept?

A.

from 2.2.2.2, with a TTL ol 253 Of more

B.

from 2.2.2.2, with a TTL of less than 2

C.

to 2.2.2.2, with a TTL of less than 253

D.

to 2.2.2.2, with a TTL of 2 or more

Full Access
Question # 29

Refer to the exhibit:

Which effect of this configuration is true?

A.

R1 can support a peer that is configured for LDP SSO/NSF as the peer recovers from an outage

B.

R1 can failover only to a peer that is configured for LDP SSO/NSF

C.

R1 can failover to any peer

D.

R1 can support a graceful restart operation on the peer, even if graceful restart is disabled on the peer

Full Access
Question # 30

Refer to the exhibit.

An engineer is configuring two routers to support MPLS LDP sessions between them. The R1 configuration is complete, and work has started on R2 as shown. Which additional configuration must the engineer apply to R2 to complete the task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 31

What is the role of NFVI?

A.

domain name service

B.

intrusion detection

C.

monitor

D.

network address translation

Full Access
Question # 32

Refer to the exhibit. Tier 2 ISP A on AS 653 is connected to two Tier 1 ISPs on AS 321 and AS 51 respectively. The network architect at ISP A is planning traffic flow inside the network to provide predictable network services. Cisco Express Forwarding is disabled on the edge router. How should the architect implement BGP to direct all traffic via the Tier 1 ISP with next-hop 7.4.5.2?

A.

Implement the BGP routing protocol and run the bgp deterministic-med command.

B.

Implement MP-BGP with a 4-byte AS number with the bgp best path compare-routerid command.

C.

Implement the BGP routing protocol and the maximum-paths 2 configuration.

D.

Implement BGP route-reflector functionality with the bgp always-compare-med configuration.

Full Access
Question # 33

Refer to the exhibit. The network operations team reported that the access site that is connected to R3 is not connecting to the application server in the data center and that all packets that are sent from the application server to the access site are dropped. The team verified that OSPF and BGP peerings are up in BGP AS 65101 and BGP AS 65201. R4 is expected to receive traffic from the application server route via OSPF. Which action resolves this issue?

A.

Remove the route-map on R4 when advertising 172.16.20.1 in BGP to R3.

B.

Advertise application server 172.16.20.1 in the OSPF routing table on R6.

C.

Allow 172.16.20.1 in the BGP advertisement on R3 in the route-map.

D.

Add the next-hop-self command on R6 to enable R3 iBGP peering.

Full Access
Question # 34

Refer to the exhibit. Customer_A asked ISP_A to connect two offices via an MPLS L3 VPN. Customer_A is currently using only the default route toward ISP_A. The engineer at ISP_A already configured the ip route vrf Customer_A 172.16.10.0 255.255.255.0 10.10.10.1 command on R1. Which action completes the configuration?

A.

Configure the network 172.16.10.0 and redistribute-internal static commands under the BGP address family for Customer_A in the global BGP configuration on R1.

B.

Enable the bgp default route-target filter and default-Information originate commands under the global BGP configuration on R2.

C.

Configure the route-target both 200:1 and route-replicate vrf Customer_A commands under the lp vrf configuration on R2.

D.

Configure the redistribute static and redistribute connected commands on R1.

Full Access
Question # 35

Which benefit is provided by FRR?

A.

It provides fast forwarding path failure detection times for all media.

B.

It provides rapid failure detection between forwarding engines.

C.

It provides performance data for the service provider network.

D.

It protects Cisco MPLS TE LSPs from link and node failures.

Full Access
Question # 36

Refer to the exhibit. An ISP is providing online registration services for a new social program. OSPF is being used as an interior routing protocol with TE capabilities. A network engineer with an employee ID: 5209:82:636 must provide faster MPLS-enabled convergence in case of failure. The ip cef distributed command has already been configured on all MPLS-enabled routers, and connectivity between the core routers has been verified following IETF RFC 4379. Which additional task must the engineer perform to complete the implementation?

A.

Implement LDP session protection on all PE routers.

B.

Implement MPLS TE fast reroute node protection on all MPLS-enabled routers.

C.

Implement MPLS TE fast reroute link protection on routers R2 and R3.

D.

Implement OSPF loop-free alternate fast reroute on core routers only.

Full Access
Question # 37

Which utility can you use to locate MPLS faults?

A.

MPLS traceroute

B.

EEM

C.

MPLS LSP ping

D.

QoS

Full Access
Question # 38

Drag and drop the functionalities from the left onto the target fields on the right.

Full Access
Question # 39

Which is the benefit of implementing model-driven telemetry in a service provider environment?

A.

It reduces the number of network monitoring tools that are necessary to verify device statistics.

B.

It increases the efficiency of SNMP by pulling system data to requesting servers.

C.

It reduces or eliminates the need to monitor Layer 2 traffic between switches.

D.

It uses reliable transport to push Information to network monitoring tools

Full Access
Question # 40

Why do packet loops occur during the configuration of BlDlR-PIM?

A.

The network does not support BIDIR-PIM

B.

The network is partially upgraded to support BIDlR-PIM

C.

No interface for carrying traffic for multicast groups has been configured

D.

The router has not been configured to advertise itself

Full Access
Question # 41

Which two tasks must you perform when you implement LDP NSF on your network? (Choose two.)

A.

Enable NSF for EIGRP

B.

Enable NSF for the link-state routing protocol that is in use on the network.

C.

Disable Cisco Express Forwarding

D.

Implement direct connections for LDP peers

E.

Enable NSF for BGP

Full Access
Question # 42

Refer to the exhibit. MPLS is running in the network with OSPF as the IGP. Full routes are shared between the routers, and each connected link has an MPLS neighbor relationship. A network engineer must update the network configuration so that it will maintain LDP neighbor relationships if a directly connected link goes down. Which action must the engineer take as part of the process?

A.

Implement Unified MPLS to unify the OSPF areas.

B.

Implement MPLS OAM with BFD on the links.

C.

Implement LDP sync on links with a greater risk of faults.

D.

Implement LDP session protection on the network.

Full Access
Question # 43

How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?

A.

The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to provide end-to-end reach.

B.

The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.

C.

The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP session.

D.

The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using one another's label.

Full Access
Question # 44

Refer to the exhibit. The enterprise is running BGP between sites to provide connectivity to users across the company's geographic regions. A network engineer must update the configuration so that the operations team can confirm that BGP prefixes that are received on each router originated from the correct autonomous system.

Which configuration must the engineer apply?

A.

bgp bestpath prefix-validate disable

B.

bgp rpki server tcp 192.168.1.2 port 1029 refresh 500

C.

bgp bestpath prefix-validate allow-invalid

D.

bgp synchronization

Full Access
Question # 45

Which additional feature does MPLS DiffServ tunneling support?

A.

matching EXP and DSCP values

B.

interaction between MPLS and IGP

C.

using GRE tunnels to hide markings

D.

PHB layer management

Full Access
Question # 46

A network engineer is configuring a router to send multicast traffic for the 239.10.10.10 group. Which configuration must an .... forward the traffic?

A.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp max-groups action replace

B.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp filter

C.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp access-group 239.10.10.10

D.

Cisco(config)# interface ethernet 1/0 Cisco(config-if)# ip igmp join-group 239.10.10.10

Full Access
Question # 47

What is a role of NSO?

A.

It automates the deployment of access points with its built-in wireless LAN controller.

B.

It manages WAN infrastructure using a virtual switch.

C.

It provides full lifecycle management of a device.

D.

It resides on a hypervisor that runs the Windows OS.

Full Access
Question # 48

What happens when a segment-routing TE tunnel loses the link and there is no secondary path in place?

A.

The headend router generates a new path to the tail-end router using bandwidth to determine the best path.

B.

The tail-end router sends an alert to the syslog server that the tunnel and the secondary route are inaccessible.

C.

The headend router starts the invalidation timer to bring the tunnel down.

D.

The headend and tail-end routers revalidate SID hops to determine the proper label stack to reroute the traffic.

Full Access
Question # 49

Refer to the exhibit.

An engineer has started to configure a router for OSPF, as shown Which configuration must an engineer apply on the network so that area 15 traffic from R5 to R1 will prefer the route through R4?

A.

Place the link between R3 and R5 in a stub area to force traffic to use the route through R4.

B.

Increase the cost on the link between R2 and R4, to influence the path over R3 and R4.

C.

Implement a multiarea adjacency on the link between R2 and R4, with the cost manipulated to make the path through R4 preferred.

D.

Implement a sham link on the between R3 and R2 to extend area 0 area 15.

Full Access
Question # 50

Which capability does the MPLS TE FRR facility backup protection method provide?

A.

defining the set of characteristics for the backup TE LSP

B.

leveraging label stacking to protect selected TE LSPs using a single backup TE LSP

C.

creating a bypass LSP for each protected LSP at each point of local repair

D.

assigning a backup TE LSP tunnel to the protected node at the headend of the protected TE LSP

Full Access
Question # 51

Refer to the exhibit. An organization s network recently experienced several significant outages due to device failures. The network administrator just moved the network devices to a new central data center, and packets are switched using labels. The administrator Is now implementing NSF on the network to reduce potential risk factors in the event of another outage. Which task must the administrator perform on each router as part of the process?

A.

Remove route filtering to speed repopulation of the link-state database

B.

Copy the router s existing state information and share the file with its peers to enable BGP soft resets

C.

Implement MPLS to forward packets while the RIB updates after a faliover.

D.

Implement Graceful Restart to mitigate the delay in MPLS LDP synchronization when the IGP starts up.

Full Access
Question # 52

An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?

A.

vrf upgrade-cli

B.

bgp upgrade-cli

C.

address-family ipv4

D.

ip bgp-community new-format

Full Access
Question # 53

A network operator with an employee ID 4531 26:504 must implement a PIM-SSM multicast configuration on the customer's network so that users in different domains are able to access and stream live traffic. The IGMP version must be enabled to support the SSM implementation. Which action must the engineer perform on R1 to complete the SSM implementation?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

Refer to the exhibit. The radio network and packet core are using the route RX-RZ-RB to establish communication. The LDP session between 10.10.10.5 and 10.10.10.1 is experiencing link flapping at random intervals for 30-45 seconds each time. A network engineer must protect the LDP session and improve MPLS traffic convergence. Which action meets these requirements?

A.

Enable IGP_LDP sysnc on RZ and RX

B.

Add session protection duration 60 for peer_acl_1 under the MPLS LDP instance on RZ.

C.

Attach peer_acl_1 in for session protection duration 1 on RX.

D.

Configure Peer_acl_2 on RX and allow IP address 10.10.10.6 in LDP

Full Access
Question # 55

Refer to the exhibit. A network engineer just upgraded the Cisco IOS XE Software to the newest version on OSPF routers R1 and R2, added the point-to-point network type under Gi0/0 on R2, and configured ip route 192.168.10.0 255.255.255.0 192.168.1.2 on R1. After the engineer restarted the routers, R1 entered the Exstart state with its neighbor, but the adjacency has not been established. Which action must the engineer take to resolve the issue?

A.

Set the network type of the R2 OSPF interface to broadcast.

B.

Add a static route toward 192.168.20.0 on R2.

C.

Change the R2 OSPF router ID to 10.1.1.1.

D.

Decrease the OSPF cost of the network on R2 to 10.

Full Access
Question # 56

Refer to the exhibit.

An engineer is securing a customer's network. Which command completes this configuration and the engineer must use to prevent a DoS attack?

A.

neighbor ebgp-multihop

B.

ebgp-multihop

C.

ttl-security

D.

neighbor-ttl-security

Full Access
Question # 57

Refer to the exhibit. Router 1 and Router 2 were installed in the data center. Router 1 is the core router in the network, but it fails to establish an OSPF peering with Router 2. and customer traffic is unable to pass. Router 1 also reports an increase in CPU and memory usage. However, the CPU for R2 is stable. Which action resolves this issue?

A.

Disable Cisco Express Forwarding on Router 2.

B.

Change the transport mode to WAN on Router 1.

C.

Change the MTU to 1524 on Router 1.

D.

Enable MPLS on Router 2.

Full Access
Question # 58

Which function does orchestrated fulfillment perform under the Cisco Network Services Orchestrator model?

A.

It maintains the service topology in an inventory system to enable accurate assessment of service impact and support root-cause analysis.

B.

It translates the networking service high-level intent into device configurations, and pushes the configurations to physical and virtual devices.

C.

It leverages open-source NFV components such as OpenStack virtual infrastructure manager and Open vSwitch to create necessary service chains among VNFs.

D.

It instantiates virtual test probes to perform activation testing and provide ongoing measurement of service KPIs against defined SLAs.

Full Access
Question # 59

Which action occurs during the traceback phase of the six-phase approach to service provider security?

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Full Access
Question # 60

What is an enhancement that Cisco IOS XE Software has over Cisco IOS Software?

A.

It support symmetric multiprocessing

B.

It allows all processes to use the same pool of memory.

C.

It runs on a 32-bit operating system.

D.

It is built on a GNX Neutrino Microkernel.

Full Access
Question # 61

A company is expanding its existing office space to a new floor of the building, and the networking team is installing a new set of switches. The new switches are running IGMPv2, and the engineers configured them for VLAN10 only. The rest of the existing network includes numerous Layer 2 switches in multiple other VLANs, all running IGMPv3. Which additional task must the team perform when deploying the new switches so that traffic is switched correctly through the entire network?

A.

Configure the new switches to use IGMPv3 on all VLANs on the network.

B.

Configure all switches on the network to support IGMPv2 and IGMPv3 on all VLANs on the network.

C.

Configure the new switches to use IGMPv3 on VLAN10 only.

D.

Configure all switches on the network to support IGMPv2 and IGMPv3 on VLAN10 only.

Full Access
Question # 62

Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.

Which statement about this configuration is true?

A.

Router 2 must configure a route to null 0 for network 192 168.1 0/24 for the RTBH implementation to be complete.

B.

Router 1 is the trigger router in a RTBH implementation.

C.

Router 1 must be configured with uRPF for the RTBH implementation to be effective.

D.

Router 2 is the router receiving the DDoS attack

Full Access
Question # 63

Refer to the exhibit:

Which statement about the neighbor statements for 192.168.1.1 is true?

A.

The router must have TDP configured for the send-label command to operate

B.

The neighbor router receives at least four labels from this router

C.

The router sends BGP labels for its prefixes to this peer

D.

The router sends only a label for the prefix for LoopbackO.

Full Access
Question # 64

Refer to the exhibit. An engineer must update the configuration of the network with these requirements:

    PE routers must define labels for IS-IS learned routes in AS100.

    P routers must not receive LDP bindings for the external network in the IPv6 address family.

Which configuration must the engineer implement to meet these requirements?

A.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global host-routes

B.

CE1(config)# mpls Idp label

 CE1(config-Idp-Ibl)# allocate global host-routes

C.

PE2(config)# mpls Idp label

 PE2(config-Idp-Ibl)# allocate global prefix-list SPLDP

D.

PE1(config)# mpls Idp label

 PE1(config-Idp-Ibl)# no allocate global prefix-list Ipv6_All

Full Access
Question # 65

Which CLI mode must be used to configure the BGP keychain in Cisco IOS XR software?

A.

global configuration mode

B.

routing configuration mode

C.

BGP neighbor configuration

D.

mode BGP address-family configuration mode

Full Access
Question # 66

Refer to the exhibit.

A network engineer Is implementing OSPF multiarea. Which command on interface G0/1 resolves adjacency Issues in the new area?

A.

Ip ospf network broadcast

B.

Ip ospf network non-broadcast

C.

Ip ospf network polnt-to-multlpoint

D.

Ip ospf network point-to-point

Full Access
Question # 67

Refer to the exhibit. Router BRDR-1 is configured to receive the 0.0.0.0/0 and 172.17.1.0/24 network via BGP and advertise then into OSPF area 0. An engineer has noticed that the OSPF domain is receiving only the 172.17.1.0/24 route and default router 0.0.0.0/0 is still missing. Which configuration must an engineer apply to resolve this problem?

      Option A

      Option B

      Option C

A.

Option D

Full Access
Question # 68

What is the purpose of OSPF-TE extensions to MPLS traffic engineering functionality?

A.

carrying OSPF routing information for TE tunnels

B.

advertising the TE tunnel routes to the OSPF domain

C.

calculating and establishing TE tunnels in accordance with network constraints

D.

calculating fast reroute to provide a backup path for TE tunnels

Full Access
Question # 69

Refer to the exhibit. An engineer working for a private telecommunication company with an employee id: 3414:81:713 is implementing this network, in which:

Routers R1A and R1B are eBGP neighbors.

iBGP is configured within AS 65515 and AS 65516.

Network 192.168.2.0/24 is shared with AS 65516.

Router R3A has an iBGP relationship with router R2A only.

Router R2A has an iBGP relationship with routers R1A and R3A.

Which additional task must the engineer perform to complete the configuration?

A.

Configure router R2A to use the next-hop-self attribute when advertising the learned route to router R1A.

B.

Configure router R3A to redistribute route 192.168.2.0/24 into the configured IGP to advertise the prefix to router R1A.

C.

Configure router R2A as a route reflector to advertise the iBGP learned prefix from router R3A to R1A.

D.

Configure router R1A with a static route to 192.168.2.0/24 that is redistributed into BGP.

Full Access
Question # 70

Refer to the exhibit.

Which show command should be implemented to display per-interface statistics about uRPF drops and suppressed drops?

A.

show ip traffic

B.

showip interface

C.

show cef interface

D.

show ip interface brief

Full Access
Question # 71

Refer to the exhibit.

Which the link aggregation configuration router is running on Cisco IOS XR software, which LACP interface configuration is needed to add the interface to the bundle?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 72

How does TI-LFA reduce packet loss in Segment routing?

A.

It determines which link to use when load balancing to prevent packet fragmentation loss.

B.

It establishes multiple labels per path using more than one IGP.

C.

It calculates loop-free backup paths that are rapidly implemented in case of a link failure.

D.

It enables path selection in SR-TE to support MPLS label allocation.

Full Access
Question # 73

Refer to the exhibit. An engineer configured R6 as the headend LSR of an RSVP-TE LSP to router XR2, with the dynamic path signaled as R6-R2-R5-XR2. and set the OSPF cost of all links to 1. MPLS autotunnel backup Is enabled on all routers to protect the LSP. Which two NNHOP backup tunnels should the engineer use to complete the implementation? (Choose two.)

A.

The R6 backup tunnel path R6-R1-R4-R5.

B.

The R2 backup tunnel path R2-R5 across the alternate link.

C.

The R2 backup tunnel path R2-R1-R4-XR1-XR2.

D.

The R6 backup tunnel path R6-R2-R5

E.

The R6 backup tunnel path R6-R1-R2.

Full Access
Question # 74

Refer to the exhibit.

What does this REST API script configure?

A.

application profile

B.

VRF

C.

public community string for SNMP

D.

interface with IP address 192.168.0.1

Full Access
Question # 75

Refer to the exhibit. A service provider engineer Is configuring the connection between CE1 and CE2. AS 200 of the service provider and AS 100 of enterprise ABC should connect using BGP. The engineer already completed the configuration of VRF RT 100:10 of enterprise ABC. Which configuration must the engineer apply on PE1 to meet the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 76

Which type of attack is an application attack?

A.

ping of death

B.

ICMP (ping) flood

C.

HTTP flood

D.

SYN flood

Full Access
Question # 77

An engineer working for a private telecommunication company with an employe id:3948:613 needs to limit the malicious traffic on their network. Which configuration must the engineer use to implement URPF loose mode on the GigabitEthernet0/1 interface?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 78

Drag and drop the message types from the left onto the target field of the message originator on the right.

Full Access
Question # 79

Refer to the exhibit.

An engineer needs to implement this QoS policy on customer's network due to ongoing slow network issues. What will be the effect on the network when the engineer implements this configuration?

A.

Traffic that is identified in the ciscotest class map will be remarked from IP precedence 1 to DSCP AF11 when it enters the pos0/2/0/0 interface.

B.

Traffic that is identified in the ciscopolicy class map will be marked with IP precedence 1 when it enters the pos0/2/0/0 interface.

C.

Traffic that is identified in the ciscopolicy class map will be remarked from IP precedence 1 to DSCP AF11 when it exits the pos0/2/0/0 interface.

D.

Traffic that is identified in the ciscotest class map will be marked with IP precedence 1 when it exits the poso/2/0/0 interface.

Full Access
Question # 80

Refer to the exhibit:

Which condition must be met by the OSPF peer of router R1 before the two devices can establish communication?

A.

The interface on the OSPF peer must use the same key ID and key value as the configured interface

B.

The interface on the OSPF peer may have a different key ID, but it must use the same key value as the configured interface

C.

The OSPF peer must be configured as an OSPF stub router

D.

The OSPF peer must use clear-text authentication

Full Access
Question # 81

What is a characteristic of the YANG model?

A.

Associate types are optional for each leaf.

B.

It uses containers to categorize related nodes.

C.

It is a distributed model of nodes.

D.

Spines are used to represent individual attributes of nodes.

Full Access
Question # 82

Refer to the exhibit.

A network operator must configure CSR1 interlaces GigabitEihernet2 and GigabitEthemet to rewrite VLAN tags 12 and 21 for traffic between R1 and R2 respectively. Which configurator accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 83

Refer to the exhibit. A network engineer is implementing BGP in AS 65101 and AS 65201. R3 sends data traffic to 192.168.1.1 /32 via the path R3-R2-R1. The traffic must travel via alternate path R6-R5 for prefix 192.168.1.1/32. Which action must be taken to meet the requirement?

A.

Apply route-map HIGH-MED out on R2 for neighbor R3.

B.

Apply route-map HIGH-LP in on R3 for neighbor R6

C.

Apply route-map LOW-LP out on R2 for neighbor R3.

D.

Apply route-map LOW-MED in on R5 for neighbor R2

Full Access
Question # 84

Refer to the exhibit.

A network engineer with an employee id: 3812:12:993 has started to configure router R1 for IS-IS as shown. Which additional configuration must be applied to configure the IS-IS instance to advertise only network prefixes associated to passive interfaces?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 85

Refer to the exhibit:

Which statement describes the effect of this configuration?

A.

It applies a service policy to all interfaces remarking HTTP traffic

B.

It creates an ACL named WEB that filters HTTP traffic.

C.

It matches HTTP traffic for use in a policy map

D.

It modifies the default policy map to allow all HTTP traffic through the router

Full Access
Question # 86

Refer to the exhibit. A network engineer is configuring Ethernet Layer 2 service to connect CE2 and CE3 for video and data application sharing with these requirements:

    A point-to-point cross-connect service must be established between 10.10.10.10 and 20.20.20.20.

    PE1 and PE2 must learn neighbors dynamically in PW 10.

Which configuration must be implemented on PE1 to meet the requirements?

A.

xconnect group XCON1

 p2p XCON1_PE1PE2

 interface GigE 0/0

 pw-class Path1

 backup neighbor 20.20.20.20 pw-id 10

B.

12vpn

 xconnect group XCON1

 interface GigE 0/0

 interface GigE 0/1

C.

12vpn

 xconnect group XCON1

 p2p XCON1_PE1PE2

 interface GigE 0/0

 neighbor 20.20.20.20 pw-id 10

 mpls static label local 699 remote 890

D.

12vpn

 p2p XCON1_PE1PE2

 interface GigE 0/1

 neighbor 20.20.20.20 pw-id 10

Full Access
Question # 87

What is the main purpose of EVPN?

A.

to provide simplified and flexible underlay connectivity for private VPN services

B.

to provide scalable, interoperable multitenancy in data center and cloud networks

C.

to provide advanced security features for IoT devices

D.

to provide application-aware networking capabilities in a cloud environment

Full Access
Question # 88

Refer to the exhibit.

An engineer must configure router R2 as the new P router in the network. Which configuration must be applied to R2 to enable LDP-IGP Sync on its L2 IS-IS adjacencies?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 89

Refer to the exhibit:

What is the URL used for with REST API?

A.

It is used to contact a URL filter to determine the efficacy of a web address

B.

It is used to send a TACACS+ authentication request to a server

C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

D.

It is used to initiate an FTP session to save a running configuration of a device.

Full Access
Question # 90

Refer to the exhibit. A client wants to filter routes to a BGP peer to limit access to restricted areas within the network. The engineer configures the route map ciscotest to filter routes from the BGP neighbor. The engineer also sets a tag that will be used for QoS in the future. Which task must be performed to complete the Implementation?

A.

Attach the new route map to the BGP neighbor statement in the inbound direction.

B.

Create a policy map named ciscotest and apply It to inbound traffic on the link that is directly connected to the BGP neighbor.

C.

Create a route map, configure BGP with an IPv4 address family, and activate the neighbor.

D.

Add a route map statement with sequence 40 that links a BGP community to the routing protocol

Full Access
Question # 91

Which feature describes the adjacency SID?

A.

It applies only to point-to-point links.

B.

It applies only to multipoint links

C.

It is locally unique

D.

It is globally unique.

Full Access
Question # 92

SIMULATION 4

Full Access
Question # 93

Refer to the exhibit:

Which effect of this configuration is true?

A.

it creates a pseudowire class named Cisco

B.

It enables tagging for VLAN 12 on the interface

C.

It enables MPLS on the interface

D.

It enables AToM on interface gigabitethemet1/0

Full Access
Question # 94

Which statement describes the advantage of a Multi-Layer control plane?

A.

It automatically provisions monitors, and manages traffic across Layer 0 to Layer 3

B.

It minimizes human error configuring converged networks

C.

It supports dynamic wavelength restoration in Layer 0

D.

It provides multivendor configuration capabilities for Layer 3 to Layer 1

Full Access
Question # 95

Refer to the exhibit A user is performing QoS marking on internet traffic and sending it with IPv4 and IPv6 headers on the provider edge device PE1. IPv4 traffic is classified with DSCP 4 and IPv6 traffic is classified with DSCP 6. Which action must the engineer take to begin implementing a QoS configuration on PE1 for the IPv6 traffic?

A.

Create an access list that includes any IPv6 traffic and apply it to CM-20.

B.

Create access list IPv6-match and configure match ip dscp 4 and match ip dscp 6 in class maps CM-10 and CM-20.

C.

Configure match ip dscp 4 in class map CM-10 and match ip dscp 6 in class map CM-20.

D.

Create access list IPv6-filter and remove DSCP value 4 and 6 in class maps CM-10 and CM-20.

Full Access
Question # 96

A network engineer is adding 10Gbps link to an existing 2X1Gbps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be take out of service if one of its member links does down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.

Full Access
Question # 97

Refer to the exhibit.

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs to the interface states of Gi0/0/0/0 and Gi0/0/0/1?

A.

Gi0/0/0/1 and Gi0/0/0/0 become active

B.

Gi0/0/0/1 and Gi0//0/0 remains standby

C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby

D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby

Full Access
Question # 98

Which two features describe TI-LFA? (Choose two.)

A.

TI-LFA uses PQ or P and Q nodes on the post-convergence path to compute the backup path.

B.

Post-convergence, TI-LFA considers the next-hop neighbor to calculate the backup repair path.

C.

TI-LFA works with point of local repair when the PQ node supports only LDP capability.

D.

Unlike RLFA, TI-LFA works without the PQ node and provides double segment failure protection.

E.

TI-LFA leverages the post-convergence path that carries data traffic after a failure.

Full Access
Question # 99

Which OoS model allows hosts to report their QoS needs to the network?

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Full Access
Question # 100

What is a primary benefit of IPoATM or MPLS over ATM backbone service provider networks?

A.

dedicated circuits

B.

variable-length packets

C.

isochronous system

D.

fixed-length cells

Full Access
Question # 101

Guidelines -

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology:

Tasks -

Configure the BGP routing protocol for R1 and R2 according to the topology to achieve these goals:

1. Configure EBGP neighbor adjacency for the IPv4 and IPv6 address family between R1 and R2 using Loopback0 IPv4 and IPv6 addresses. All BGP updates must come from the Loopback0 interface as the source. Do not use IGP routing protocols to complete this task.

2. Configure MD5 Authentication for the EBGP adjacency between R1 and R2. The password is clear text C1sc0!.

Full Access
Question # 102

Refer to the exhibit:

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Full Access
Question # 103

Refer to the exhibit. EIGRP a running across the core lo exchange Internal routes, and each router maintains 6GP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1. which is used as a black hole route as shown. Which configuration should the operator Implement to me management rouler to create a route map that will redistribute lagged static routes into BGP and create a static route to blackhole traffic with tag 777 that Is destined to server at 192.168.10.100?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 104

Refer to the exhibit. A network engineer is implementing multicast services on CPE-1 and CPE-2. CPE-1 must be configured as the preferred IGMP querier for the LAN segment. PIM-SM must be implemented on the LAN interfaces with an IGMP version that supports (*, G) joins only. Which configurations must the engineer implement on CPE-1 and CPE-2?

A.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

B.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255. 128

ip pim sparse-mode

ip igmp version 3

C.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 2

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 2

D.

On CPE-1:

interface GigabitEthernet0/1

ip address 10.0.12.129 255.255.255.128

ip pim sparse-mode

ip igmp version 3

On CPE-2:

interface GigabitEthernet0/1

ip address 10.0.12.130 255.255.255.128

ip pim sparse-mode

ip igmp version 3

Full Access
Question # 105

What is the primary purpose of Secure ZTP?

A.

to securely and seamlessly encrypt traffic across the entire network

B.

to provide real-time threat detection and mitigation for devices in the network

C.

to automate the secure provisioning of network devices during initial deployment

D.

to provide secure remote access to network devices for management and troubleshooting

Full Access
Question # 106

What is a feature of mVPN?

A.

It requires-uncast to be disabled on the multicast domain

B.

It establishes multiple static MDTs for each multicast domain.

C.

It provides the ability to support multicast over a Layer 3 VPN.

D.

It requires the no ip mroute-cache command to be configured on the loopback interface of each BGP peer

Full Access
Question # 107

Refer to the exhibit:

A network engineer is implementing an OSPF configuration Based on the output, which statement is true?

A.

In the ospfv3 1 area 1 ipv4 command, area 0 must be configured instead of area 1.

B.

OSPFv3 does not run for IPv4 on FastEthemet0/0 until IPv6 routing is enabled on the router and IPv6 is enabled on interface Fastfc.thernet0/0

C.

OSPFv3 cannot be configured for IPv4; OSPFv3 works only for IPv6.

D.

IPv6 routing not enabled" is just an informational message and OSPFv3 runs for IPv4 on interface FastEthernet0/0 anyway

Full Access
Question # 108

ASN 65001 is peering with ASN 65002 to exchange IPv6 BGP routes. All routes that originate in ASN 65001 have a standard community value of 65001:100, and ASN 65002 is allowed to advertise only 2001 :db8:aaaa::/48. An engineer needs to update the ASN 65001 route-filtering configuration to meet these conditions:

* Looped routes into ASN 65001 and routes that have traversed 10 or more ASNs must be denied.

* Routes accepted into ASN 65001 must be assigned a community value of 65001:200.

Which configuration must the engineer apply to the ASN 65001 border router?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 109

Refer to the exhibit. The operations team is implementing an LDP-based configuration in the service-provider core network with these requirements:

    RC must establish LDP peering with the loopback IP address as its Router ID

    RA must establish LDP peering with RB. RC, and RY.

How must the team update the network configuration to successfully enable LDP peering between RA and RC?

A.

Enable the mpls ip command on RC interface Gi2/0. DUMPS

B.

Configure the mpls Idp router-Id loopback0 command on RA and RC.

C.

Implement LDP session protection on RA.

D.

DUMPS Reset the discover hello hold time and interval to their default values.

Full Access
Question # 110

Drag and drop the multicast concepts from the left onto the correct descriptions on the right.

Full Access
Question # 111

An engineer working for a private service provider with employee id: 3994 37 650 is configuring a Cisco device to redistribute OSPF into BGP. Which task enables the device to filter routes?

A.

Configure a distribute list and associate it to the BGP peer interface

B.

Configure a prefix list and associate it to the BGP peer interface

C.

Configure a route map and reference it with the redistribute command

D.

Configure an access list and reference it with the redistribute command

Full Access
Question # 112

Refer to the exhibit.

A Cisco engineer is implementing gRPC dial-out on an ASR. Receiver 192.168 1.1 will be assigned one of the subscriptions, and it will manage the ASR. Which command is needed to complete the router configuration?

A.

protocol grpc

B.

protocol all

C.

protocol tcp

D.

protocol any

Full Access
Question # 113

Refer to the exhibit:

This output is included at the end of an output that was provided by a device using NETCONF.

What does the code show?

A.

It shows the hostname of the device as rpc-reply

B.

It shows that the running configuration is blank

C.

It shows NETCONF uses remote procedure calls.

D.

It shows that the full configuration is being modeled by VANG

Full Access
Question # 114

A service provider requires continuous real-time network monitoring to provide reliable SLAs to its customers. To satisfy this requirement, a network administrator is implementing gRPC dial out on an ASR with TLS. Receiver 192.168.10.2 will be assigned one of the subscriptions, and it will manage the ASR. Which configuration must the engineer apply to the router as part of the configuration process?

A.

snmp-server community public

snmp-server enable traps

snmp-server host 192.168.10.2 version 2c public.

B.

telemetry model-driven

destination-group DGroup1

address family ipv4 192.168.10.2 1 port 10

encoding self-describing-gpb

C.

snmp-server community public

snmp-server enable traps

snmp-server enable traps snmp authentication

snmp-server manager

snmp-server manager session-timeout 1000

D.

telemetry model-driven

destination-group ciscotest

address family ipv4 192.168.10.2 port 10

encoding self-describing-gpb

protocol grpc tis-hostname ciscotest.com

Full Access
Question # 115

What Is one of the differences between Ansible and Chef?

A.

Ansible uses YAML and Chef uses Ruby.

B.

Chef requires the use of Windows in the environment and Ansible requires Linux.

C.

Chef is highly scalable and Ansible is highly secure.

D.

Ansible uses Ruby and Chef uses Python.

Full Access
Question # 116

Refer to the exhibit. ISP_A is about to launch a new internet service. ISP_A is already providing MPLS VPN Layer 3 services to Customer_A and Customer_B, which are connected to ISP_A via OSPF. A network engineer completed the BGP and VRF configurations on R2 to support the new internet service. Which additional action completed the launch?

A.

Implement the BGP routing protocol in the customer VRFs on R1 and R2

B.

Import route-target 62:101 into the customer VRFs on R1 and R3.

C.

Enable the route-replicate command under the customer VRFs on R1 and R2

D.

Activate NAT CE in the customer VRFs on R1. R2. and R3.

Full Access
Question # 117

Refer to the exhibit. A multinational corporation with a Cisco-based network wants to leverage Cisco security features to enhance the security of their LAN and protect against eavesdropping and man-in-the-middle attacks. The solution must comply with the IEEE 802.1AE standard. A network engineer must implement the new security configurations on a pair of interconnected Cisco switches. The engineer already completed the configuration to enable AAA new-model and set up a basic AAA configuration for user authentication. Management VLAN 10 is in place for network administration. Which action must the engineer take to meet the requirements?

A.

Implement CTS for role-based access control on both switches.

B.

Implement MACsec on both switches with encryption mode GCM and a shared key.

C.

Implement open authentication via the management VLAN on both switches.

D.

Implement IPsec on both switches to secure data transmissions.

Full Access
Question # 118

Refer to the exhibit. A network engineer must configure XR-PE1 for uninterruptible failover from active RP to the standby RP Neither peer devices CGW1 nor the network of ASN 64512 support restart extensions Which configuration must the engineer apply to XR PEI to complete tasks?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 119

A mid-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company's two sites across the service provider core. To meet service requirements, the service provider must extend the Layer 2 domain between the company's two locations.

Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?

A.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

B.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag push dot1q 21 symmetric

C.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag pop 13

D.

interface TenGigE0/0/0/1.0 12transport

 encapsulation dot1q 12

 rewrite ingress tag translate 1-to-1 dot1q 2

Full Access
Question # 120

Refer to the exhibit. A host connected to R3 must connect with a server on R1 that provides critical, time-sensitive data. Traffic between the host and server must always be given bandwidth to traverse the links when they are congested, with other traffic being dropped. How must the network engineer implement a QoS strategy with classification to ensure that the traffic is given the appropriate bandwidth?

A.

Implement FIFO to guarantee that the server traffic is sent first while other traffic is queued.

B.

Implement policing to rate-limit noncritical traffic that exceeds designated thresholds.

C.

Implement traffic shaping to delay noncritical traffic when the link is congested.

D.

Implement strict priority to guarantee bandwidth for the server traffic.

Full Access
Question # 121

What are the two uses of the YANG data modeling language? (Choose two.)

A.

It is used to access a device by HTTP.

B.

It Is used to model the configuration used by NETCONF operations.

C.

It is used to shape state data of network elements.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

E.

It is used to replace the OSI model for troubleshooting.

Full Access
Question # 122

When Cisco lOS XE REST API uses HTTP request methods what is the purpose of a PUT request?

A.

retrieves the specified resource or representation

B.

submits data to be processed to the specified resource

C.

updates the specified resource with new information

D.

creates a new resource

Full Access
Question # 123

When configuring traffic engineering tunnels in Cisco MPLS core network, you see the traffic is not taking the expected path in the core.

Which command do you use to quickly check path of a TE tunnel?

A.

Traceroute mpls ipv4 -tunnel destination

B.

Ping

C.

show mpls traffic-engineering tunnels

D.

traceroute

Full Access
Question # 124

Refer To the exhibit.

Which BGP attribute should be manipulated to have CE1 use PE1 as the primary path to the Internet?

A.

The weight attribute should be manipulated on PE1 on outbound routes advertised to CE1.

B.

The MED should be manipulated on CE1 on inbound routes from PE1.

C.

The local preference attribute should be manipulated on PE2 on inbound routes advertised to CE1.

D.

The origin of all routes should be modified on each router on inbound and outbound routes advertised to CE1.

Full Access
Question # 125

What causes multicast traffic to permanently stay on the shared tree and not switch to the source tree?

A.

The SPT threshold is set to infinity.

B.

The RP IP address is configured incorrectly.

C.

The RP announcements are being filtered.

D.

SSM range is being used.

Full Access
Question # 126

Refer to the exhibit.

CE1 and CE2 require connectivity to the internet through the ISP connected to PE3 What should an engineer configure to complete this task?

A.

PE2 must be configured to serve as a route reflector for PE3 routes learned from the internet. PE2 then shares the routes with CE1 and CE2.

B.

CE1 and CE2 must be configured with a route distinguisher in the PE1 VRF that dynamically imports the route from the internet.

C.

CE1 and CE2 must be configured to use a static default route with a next-hop of PE3 to reach internet routes.

D.

PE1 must be configured with an import route target in the CE1 VRF that matches the export route target for the internet VRF on PE3.

Full Access
Question # 127

What are two features of 6RD IPv6 transition mechanism? (Choose two.)

A.

It inserts IPv4 bits into an IPv6 delegated prefix.

B.

It uses a native IPv6-routed network between CE routers and the BR router.

C.

It allows dynamic 1:N translation of IPv6 address.

D.

It uses stateful automatic 6to4 tunnels between CE routers and the BR router.

E.

It uses stateless automatic 6to4 tunnels between CE routers and the BR router.

Full Access
Question # 128

Refer to the exhibit.

An engineer is configuring multitopology IS-IS for IPv6 on router R1. Which additional configuration must be applied to the router to complete the task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 129

Which two PHY modes are available to implement an IOS XR Gigabit Ethernet interface interface? (Choose two.)

A.

SONET

B.

MAN

C.

WDWM

D.

LAN

E.

WAN

Full Access
Question # 130

Refer to the exhibit.

A network operator has two IPv4 and IPv6 dual-stacked network on each side of the IPv4 core network. The operator must be able to provide connectivity between them while using specific assigned IPv6 space provided from the company IP administrator team. Which technology should the network operator use to accomplish this goal?

A.

6rd

B.

NAT46

C.

DS-Lite

D.

NAT44

Full Access
Question # 131

What is the purpose of DS-Lite technology?

A.

It enables networks to pass encapsulated IPv4-in-IPv6 traffic over the ISP backbone.

B.

It allows network administrators to implement shared IPv4 addresses between the ISP and its customers.

C.

It allows an ISP to service IPv6 networks over an IPv4-enabled ISP backbone.

D.

It allows network administrators to transition a network to IPv6 while maintaining IPv4 support.

Full Access
Question # 132

A network engineer must implement SNMPv2 with these parameters

    Enable SNMP community string C1sc0 with read-only permissions.

    Enable interface index persistence.

    Restrict the SNMP community to only the monitoring server with IP address 198.18 19 100/32.

    Provide view-only access to ospflfEntry and ospfNbrEntry.

Which configuration must the engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 133

Refer to the exhibit. A company recently deployed a new network using OSPF in the core to share routes. The network administrator selected OSPF as the routing protocol because of its ability to maintain a route database. When the new network was started up, all routers booted normally, but the link between routers R1 and R2 failed to come up. The two routers are located in the same rack at the data center. Which task should an engineer perform to correct the problem?

A.

Synchronize the dead timers.

B.

Change one of the OSPF router IDs so that the router IDs are in different subnets

C.

Change the OSPF process ID on one of the devices so that the two IDs match

D.

Configure the MTUs on the interface to match.

Full Access
Question # 134

An engineer working for telecommunication company with an employee id: 3715 15 021 needs to secure the LAN network using a prefix list Which best practice should the engineer follow when he implements a prefix list?

A.

An engineer must use non sequential sequence numbers in the prefix list so that he can insert additional entries later.

B.

The final entry in a prefix list must be /32

C.

An engineer must identity the prefix list with a number only

D.

An engineer must include only the prefixes for which he needs to log activity.

Full Access
Question # 135

Refer to the exhibit. A network engineer configures CPE-1 for QoS with these requirements:

IPv4 and IPv6 traffic originated by the CPE-1 WAN IP address must be marked with DSCP CS3.

IPv4 LAN traffic must be marked with DSCP CS1.

IPv6 LAN traffic must be marked with DSCP default.

Which configuration must the engineer implement on CPE-1?

A.

class-map match-any SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

B.

class-map match-all SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

C.

class-map match-all SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

D.

class-map match-any SELF_TRAFFIC

match access-group name SELF_V4

match access-group name SELF_V6

class-map match-all V4_ TRAFFIC

match protocol ip

class-map match-all V6_TRAFFIC

match protocol ipv6

class-map match-all QG_4

match qos-group 4

class-map match-all QG_6

match qos-group 6

!

policy-map LAN-INPUT

class V4_TRAFFIC

set qos-group 4

class V

Full Access
Question # 136

A customer has requested that the service provider use a Cisco MPLS TE tunnel to force the E-line service to take a specific route What is used to send the traffic over the tunnel?

A.

static route

B.

preferred path

C.

forwarding adjacency

D.

autoroute destination

Full Access
Question # 137

Refer to the exhibit. A network engineer is implementing multicast Source-A to send a multicast stream for Receiver-A, and multicast Source-B to send a multicast stream for Receiver-B. Router RC forwards the IGMP host a report and leaves messages to IP address 192.168.10.1. How must the multicast features be implemented to prevent RB from receiving multicast flooding from Source-A?

A.

Change the helper-address value to 192.168.10.2 on RC.

B.

Enable ip pim neighbor-filter on RC interface Ge0/0.

C.

Configure PIM-SSM on RB and RC interface Ge 0/0.

D.

Enable ip pim passive on RB interface Ge0/0.

Full Access
Question # 138

Refer to the exhibit:

Assume all other configurations are correct and the network is otherwise operating normally. Which conclusion can you draw about the neighbor relationship between routers R1 and R2?

A.

The neighbor relationship will be up only if the two devices have activated the correct neighbor relationships under the IPv4 address family

B.

The neighbor relationship is down because R1 believes R2 is in AS 65012.

C.

The neighbor relationship is up

D.

The neighbor relationship is down because the loco I-as value for R2 is missing in the R1 neighbor statement

Full Access
Question # 139

Refer to the exhibit:

R1 is connected to two service providers and is under a DDoS attack Which statement about this design is true if uRPF in strict mode is configured on both interfaces'?

A.

R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses

B.

R1 permits asymmetric routing as long as the AS-RATH attribute entry matches the connected AS

C.

R1 drops destination addresses that are routed to a null interface on the router

D.

R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface

Full Access
Question # 140

What is the primary purpose of the flexible algorithm in a segment-routing environment?

A.

to distribute designated-path information for certain traffic classes to maintain routing information in accordance with current network-performance indicators

B.

to integrate with legacy routing protocols to ensure backward compatibility and a smooth transition in mixed network environments

C.

to determine and assign labels for specific types of traffic, ensuring that routes maintain a valid backup path as network conditions change

D.

to support adaptive path selection, optimizing network performance based on real-time network metrics

Full Access
Question # 141

Refer to the exhibit:

Which statement about the status of the neighbor relationship between R1 and R2 is true?

A.

The neighbor relationship is down because the two routers are configured with different area types

B.

The neighbor relationship is down because the two routers are in the same subnet.

C.

The neighbor relationship is up because R2 is level 1 and level 2 router.

D.

The neighbor relationship is down because R2 is operating as a Level 1 router and the two routers are in different area

Full Access
Question # 142

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

A.

Disable the MPLS LDP IGP sync holddown.

B.

Configure OSPF or IS-IS as the routing protocol.

C.

Configure EIGRP as the routing protocol using stub areas only.

D.

Enable MPLS LDP sync delay timers.

Full Access
Question # 143

Refer to the exhibit. LDP peering between routers R1 and R2 is dropped when the link between R1 and R2 is taken offline. However, LDP peering between R2 and R3 stays up when the link between R2 and R3 is taken offline. Which action allows MPLS traffic forwarding to continue normally if the link between R1 and R2 goes down?

A.

Enable IGP and LDP Synchronization on R1.

B.

Implement LDP Session Protection on R1.

C.

Enable IGP and LDP Synchronization on R2.

D.

Implement LDP Session Protection on R2.

Full Access
Question # 144

A company needs to improve the use of the network resources that is used to deploy internet access service to customers on separate backbone and internet access network. Which two major design models should be used to configure MPLS L3VPNs and internet service in the same MPLS backbone? (Choose two.)

A.

Carriage of full internet routes in a VPN, in the case of internet access VPNS

B.

Internet routing through global routing on a PE router.

C.

Internet access routing as another VPN in the ISP network.

D.

Internet access through leaking of internet routed from the global table into the L3VPN VRF

E.

Internet access for global routing via a separate interface in a VRF

Full Access
Question # 145

Refer to the exhibit:

Which statement about this configuration is true"?

A.

It requires an explicit Cisco MPLS TE path to be configured for the tunnel to run

B.

It requires OSPF to also be running to have optimized Cisco MPLS TE tunnels

C.

It requires a dynamic Cisco MPLS TE path to be configured for the tunnel to run

D.

It is the configuration for the head-end router of a Cisco MPLS TE tunnel with segment routing

Full Access
Question # 146

Refer to the exhibit.

An engineer is configuring router R1 for OSPFv3 as shown. Which additional configuration must be performed so that the three active interfaces on the router will advertise routes and participate in OSPF IPv6 processes?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 147

What are two factors to consider when implementing NSR High Availability on an MPLS PE router? (Choose two.)

A.

It consumes more memory and CPU resources than NSF

B.

It operates normally without NSR support on the PE peers.

C.

It requires all PE-CE sessions to support NSR

D.

It requires routing protocol extensions

E.

It cannot sync state information across redundant RPs

Full Access
Question # 148

An engineer is implementing MPLS to monitor within the MPLS domain. Which must the engineer perform to prevent packets from being forwarded beyond the service provider domain when the LSP is down?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 149

Refer to the exhibit. A network operator working for a private telecommunication company with an employee id: 7138: 13:414 just added new users to the network, which resides in VLANs connected to routers R1 and R4. The engineer now must configure the network so that routers R1 and R4 share routes to the VLANs, but routers R2 and R3 are prevented from including the routes in their routing tables. Which configuration must the engineer apply to R4 to begin implementing the request?

A.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

connect neighbor 192.168.1.1 101 pw-class cisco

B.

pseudowire -class ciscotest

encapsulation mpls

interface gigabitethernet 1/0/1

xconnect 192.168.1.1 101 pw-class ciscotest

C.

pseudowire-class ciscotest

encapsulation mpls

service-policy output ciscotest

D.

interface serial 2/0/0

frame-relay encapsulation

ip address 192.168.1.4 255.255.255.0

service-policy output ciscotest

Full Access
Question # 150

An engineer must apply an 802.1ad-compliant configuration to a new switchport with these requirements:

The switchport must tag all traffic when it enters the port.

The switchport is expected to provide the same level of service to traffic from any customer VLAN.

Which configuration must the engineer use?

A.

interface GigabitEthernet1/0/1

switchport mode trunk

switchport trunk encapsulation dot1q

encapsulation ISL

bridge-domain 12

B.

interface GigabitEthernet1/0/1

ethernet dot1ad uni c-port

service instance 12

encapsulation dot1q

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

C.

interface GigabitEthernet1/0/1

ethernet dot1ad uni s-port

service instance 12

encapsulation default

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

D.

interface GigabitEthernet1/0/1

ethernet dot1ad nni

service instance 12

encapsulation dot1ad

bridge-domain 12

Full Access
Question # 151

Which configuration mode do you use to apply the mpls Idp graceful-restart command in IOS XE Software? MPLS

A.

MPLS

B.

LDP neighbor

C.

global

D.

interface

Full Access
Question # 152

Refer to the exhibit. R1 has two upstream Tier 1 service providers. BGP is in use as the exterior routing protocol, and ISP_A and ISP_B are sending the full BGP table. A network engineer must assign local-preference 70 to all routes with multiple exit discriminator 30. Which configuration must the network engineer apply?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 153

An engineer is implementing a router redistribution within BGP. The route map must be configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 154

A network engineer must collect traffic statistics for an internal LAN toward the internet The sample must include the source and destination IP addresses, the destination ports, the total number of bytes from each flow using a 64-bit counter, and all transport flag information. Because of CPU limits, the flow collector processes samples that are a maximum of 20 seconds long. Which two configurations must the network engineer apply to the router? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 155

Refer to the exhibit. A global company plans to implement BGP at its newest location to provide connectivity to other offices. The global infrastructure of the company is a multivendor environment. An engineer must review the BGP core configurations at headquarters to determine if they can be repurposed at the new location. The engineer copied this JSON script for review. What is the effect of the script?

A.

It configures BGP with neighbor 192.168.1.2 residing in AS 65514.

B.

It sets the BGP router-ID to 192.168.1.2 and sets the AS of the router to 65514.

C.

It configures BGP on the device and inserts 192.168.1.0/24 into the BGP table using the origin AS 65514.

D.

It configures a VRF named cisconode1 and a BGP instance using the VPNv4 address family.

Full Access
Question # 156

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements:

Session protection is provided for core loopback IP addresses only.

The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails.

Which configuration must the team implement on PE-XR1?

A.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

B.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

C.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

D.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

Full Access
Question # 157

Refer to the exhibit.

An engineer with an employee 10:4350:47:853 is implementing IS-IS as the new routing protocol in the network. All routers in the network operate as Level 2 routers in the same private autonomous system, and the three branches are connected via dark fibre. The engineer has already implemented IS-IS on router R1 with NET address 49.0133.532b.ca14.6915.21311.F40F.1B3a.ba10.00. Which IS-IS NET address configuration must be implemented on R3 to establish IS-IS connectivity?

A.

49.0133.532b.ca14.6915.21311.f40f.1b4a.bb87.00

B.

49.0135.332b.ca14.6975.28371.1721.1b3b.ca11.10

C.

48.0133.532b.ca14.6915.21311.f40f.1626.bb98.00

D.

49.0133.532b.ca14.6915.21311.1721.1b4a.0013.01

Full Access
Question # 158

What is a feature of model-driven telemetry?

A.

It occasionally streams to multiple servers in the network.

B.

It is less secure because it uses community strings.

C.

It uses the pull model to send requested data to a client when polled.

D.

It uses the push model to stream data to desired destinations.

Full Access
Question # 159

Refer to the exhibit.

A network engineer is configuring MPLS LDP synchronization on router R1. Which additional configuration must an engineer apply to R1 so that it will synchronize to OSPF process 1?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 160

A router is configured to perform MPLS LDP graceful restart.

Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)

A.

Reconnect Timeout field

B.

Learn from Neighbor (N) flag, set to 1

C.

Graceful restart capability in OPEN message

D.

Recovery Time field

E.

Learn from Network (L.) flage, set to 1

F.

Type-9 LSA

Full Access
Question # 161

Refer to the exhibit.

Which two topology changes happen to the IS-IS routers? (Choose two.)

A.

All four routers are operating as Level 1 routers only.

B.

All four routers are operating as Level 2 routers only.

C.

R1 and R4 are Level 2 neighbours.

D.

R1 and R2 are Level 2 neighbours.

E.

All four routers are operating as Level 1-2 routers.

Full Access
Question # 162

Which set of facts must the network architect consider when deciding whether to implement SaltStack or Chef?

A.

Chef is an agent-based on Ruby, and SaltStack is a module tool based on Python.

B.

Chef refers to its automation instructions as manifests, and SaltStack refers to its instructions as a playbook.

C.

Chef is written in Python, and SaltStack is written in Ruby.

D.

Chef uses a message-based system, and SaltStack uses an agent to deliver messages

Full Access
Question # 163

Refer to the exhibit:

In which way does router R1 operate differently than router R2?

A.

R1 sends LSA type 2 only, while R2 sends type 1 and type 7 LSAs

B.

R1 sends LSA types 1 and 2, while R2 sends type 1. 2. and 7 LSAs

C.

R1 sends LSA type 2 only and R2 sends LSA type 1 only

D.

R1 sends LSA types 5 and 7, while R2 sends type 1, 2, and 7 LSAs

Full Access
Question # 164

What are two purposes of a data-modeling language such as YANG? (Choose two.)

A.

defining a hierarchical data scheme

B.

modeling notifications, data configuration, and data status

C.

defining a relational-model data scheme

D.

defining a semi-structured data scheme

E.

defining API calls, JSON format, and XML structure

Full Access