350-501 Practice Test Questions

371 Questions


Refer to the exhibit.

A network operator needs to shut down interface Gi0/0/0/2 for maintenance. What occurs
to the interface states of Gi0/0/0/0 and Gi0/0/0/1?


A.

Gi0/0/0/1 and Gi0/0/0/0 become active


B.

Gi0/0/0/1 and Gi0//0/0 remains standby


C.

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby


D.

Gi0/0/0/1 becomes active Gi0/0/0/0 remains standby





C.
  

Gi0/0/0/0 becomes active. Gi0/00/1 remains standby



Refer to the exhibit:

Which two statements about the ISIS topology are true? (Choose two.)


A.

All four routers are operating as Level 1 routers only.


B.

All four routers are operating as Level 2 routers only.


C.

All four routers are operating as Level 1-2 routers.


D.

R1 and R2 are Level 2 neighbors.


E.

R1 and R4 are Level 2 neigh





C.
  

All four routers are operating as Level 1-2 routers.



D.
  

R1 and R2 are Level 2 neighbors.



Refer to the exhibit.

What is the result of this configuration?


A.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization.


B.

Router 1 and the TACACS+ server maintain one open connection between them only
when network administrator is accessing the router with password ciscotest.


C.

Router 1 and the TACACS+ server maintain one open connection between them.


D.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user
requires authentication





B.
  

Router 1 and the TACACS+ server maintain one open connection between them only
when network administrator is accessing the router with password ciscotest.



Which component is similar to an EVPN instance?


A.

MPLS label


B.

IGP router ID


C.

VRF


D.

router distinguisher





C.
  

VRF



While implementing TTL security, an engineer issues the PE(config-router-af)#neighbor
2.2.2.2 ttl-security hops 2 command. After issuing this command, which BGP packets does
the PE accept?


A.

from 2.2.2.2, with a TTL of less than 2


B.

to 2.2.2.2, with a TTL of less than 253


C.

from 2.2.2.2, with a TTL of 253 or more


D.

to 2.2.2.2, with a TTL of 2 or more





C.
  

from 2.2.2.2, with a TTL of 253 or more



Refer to the exhibit

A network administrator wants to enhance the security for SNMP for this configuration.
Which action can the network administrator implement?


A.

Re-configure to use SNMPv2 with MD5 authentication


B.

Add a community string to the existing entry


C.

Re-configure to use SNMPv3.


D.

Maintain the configuration but switch to an encrypted password for device access
through SSH





C.
  

Re-configure to use SNMPv3.



Refer to the exhibit

Which effect of this configuration is true?


A.

The two routers fail to form a neighbor relationship because their system IDs are
different.


B.

The two routers successfully form a neighbor relationship


C.

The two routers fail to form a neighbor relationship because the authentication
configuration is missing


D.

The two routers fail to form a neighbor relationship because they have different ISI





B.
  

The two routers successfully form a neighbor relationship



Refer to the exhibit.



A.

Option A


B.

Option B


C.

Option C


D.

Option D





A.
  

Option A



Refer to the exhibit:

A network operator working for service provider with an employee id 3715 15:021 applied
this configuration to a router.
Which additional step should the engineer use to enable LDP?


A.

Disable Cisco Express Forwarding globally


B.

Delete the static router ID


C.

Enable MPLS LDP on the interface


D.

Configure the both keyword to enable LDP globally





C.
  

Enable MPLS LDP on the interface



Refer to the exhibit.

Which task completes the configuration?


A.

Specify the maximum number of prefixes that R1 receives from neighbor 192.168.1.2.


B.

Specify the source interface in the neighbor statement.


C.

Specify the activate neighbor 192.168.1.2 under the IPv4 address family.


D.

Specify the local-as value in the neighbor statement





C.
  

Specify the activate neighbor 192.168.1.2 under the IPv4 address family.



Refer to the exhibit:

An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?


A.

Router 1 drops all traffic with a local-preference set to 150


B.

All traffic is dropped


C.

All traffic to 192.168.1.0/24 is dropped


D.

Router 1 and Router 2 advertise the route to 192.0.2.0/24 to all BGFD peers.





C.
  

All traffic to 192.168.1.0/24 is dropped



An engineer needs to implement QOS mechanism on customer's network as some
applications going over the internet are slower than others. Which two actions must the
engineer perform when implementing traffic shaping on the network in order to accomplish
this task? (Choose two)


A.

Configure a queue with sufficient memory to buffer excess packets.


B.

Configure the token values in bytes.


C.

Implement packet remarking for excess traf


D.

Implement a scheduling function to handle delayed packets.


E.

Configure a threshold over which excess packets are discarded





A.
  

Configure a queue with sufficient memory to buffer excess packets.



D.
  

Implement a scheduling function to handle delayed packets.




Page 6 out of 31 Pages
Previous