New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Service Provider 350-501 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which utility must be used to locate MPLS faults?

Options:

A.

QoS


B.

MPLS LSP ping


C.

MPLStraceroute


D.

EEM


Expert Solution
Questions # 32:

Refer to the exhibit.

Question # 32

What does the script configure?

Options:

A.

a VLAN namespace


B.

selectors for the in-band management


C.

a physical domain


D.

a static VLAN


Expert Solution
Questions # 33:

A network engineer must implement an ACL-based solution to mitigate availability issues on a web service that is hosted on a server at IP address 172.16.15.18/23. Access to the web server should be allowed over HTTP from RFC 1918 addresses only. The network architect has already enabled PMTUD in the network. Which ACL configuration must the engineer implement to complete the task?

Options:

A.

access-list 198 deny ip any host 172.16.15.18 fragments

access-list 198 permit 6 10.0.0.0 0.255.255.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 permit 6 172.16.0.0 0.0.255.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 permit 6 192.168.0.0 0.0.0.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 deny ip any any


B.

access-list 198 deny ip any host 172.16.15.18 ip-fragments

access-list 198 permit 18 10.10.0.0 0.0.255.0 172.16.15.18 255.255.254.0

access-list 198 permit 18 172.16.0.0 255.255.0 172.16.15.18 255.255.254.0

access-list 198 permit 18 192.168.0.0 255.255.0 172.16.15.18 255.255.254.0

access-list 198 deny tcp any any


C.

access-list 199 deny ip any host 172.16.15.18 tcp-fragments

access-list 199 permit tcp 10.0.0.0 0.0.255.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 permit tcp 172.16.0.0 0.0.0.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 permit tcp 192.168.0.0 0.0.0.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 deny ip any any


D.

access-list 199 deny tcp any host 172.16.15.18 http-fragments

access-list 199 permit 16 10.10.0.0 0.255.255.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 permit 16 172.16.0.0 0.0.255.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 permit 16 192.168.0.0 0.0.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 deny tcp any any


Expert Solution
Questions # 34:

Refer to the exhibit:

Question # 34

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

Options:

A.

R1 establishes UDP connections that are authenticated with an MD5 password


B.

R1 establishes TCP connections that are authenticated with a clear-text password


C.

R1 establishes UDP connections that are authenticated with a clear-text password


D.

R1 establishes TCP connections that are authenticated with an MD5 password


Expert Solution
Questions # 35:

A regional company is planning to bolster the security of their LAN infrastructure by implementing advanced encryption techniques between their core switch and their distribution switch. The solution must leverage hardware-accelerated encryption capabilities to transparently encrypt all traffic between the two switches at the data-link layer to safeguard against unauthorized access. However, it is important for the solution to have minimal impact on network performance and latency.

Which action must the engineer take to meet the requirements?

Options:

A.

Deploy an IPsec tunnel with MD5 hashing between the two switches.


B.

Enable SSL VPN with SHA-256 encryption on all interfaces on both switches.


C.

Enable L2TP with RSA encryption on both switches.


D.

Implement MACsec with AES-256 encryption on both switches.


Expert Solution
Questions # 36:

Question # 36

Refer to the exhibit. A network administrator implemented MPLS routing between routers R1, R2, R3, and R4. AToM is configured between R1 and R4 to allow Layer 2 traffic from hosts on RA1 and RA2. A targeted MPLS session is established between R1 and R4. Which additional action must the administrator take on all routers so that LDP synchronization occurs between connected LDP sessions?

Options:

A.

Disable the MPLS LDP IGP sync holddown.


B.

Configure OSPF or IS-IS as the routing protocol.


C.

Configure EIGRP as the routing protocol using stub areas only.


D.

Enable MPLS LDP sync delay timers.


Expert Solution
Questions # 37:

Under which circumstance does BGP ignore the best-path algorithm after receiving multiple routes to a destination?

Options:

A.

when the routes are synchronized


B.

when the route's first hop has a different AS number


C.

when the routes have local-preference values less than 100


D.

when the route's next hop is unreachable


Expert Solution
Questions # 38:

Refer to the exhibit:

Question # 38

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

Options:

A.

192.168.0.1


B.

192.168.0.3


C.

192.168.0.4


D.

192.168.0.5


Expert Solution
Questions # 39:

Question # 39

Guidelines

-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Topology

Question # 39

Tasks

-

Configure and verify the OSPF neighbor adjacency between R1 and R2 in OSPF area 0 according to the topology to achieve these goals:

1. Establish R1 and R2 OSPF adjacency. All interfaces must be advertised in OSPF by using the OSPF interface command method. Use Loopback0 as the OSPF ID.

2. There must be no DR/BDR elections in OSPF Area 0 when establishing the neighbor relationship between R1 and R2. OSPF must not generate the host entries /32 for the adjacent interfaces.

3. Enable OSPF MD5 Authentication between both routers at the interface level with password C1sc0!.


Expert Solution
Questions # 40:

Which type of attack is an application attack?

Options:

A.

ping of death


B.

ICMP (ping) flood


C.

HTTP flood


D.

SYN flood


Expert Solution
Questions # 41:

Question # 41

Refer to the exhibit. R1 and R3 have a pseudowire connection between them, which allows R2 and R4 to communicate via Layer 2. R2 uses VLAN 10. R4 also uses VLAN 10, but with a different subnet associated.

Which configuration should the engineer apply to R3 to rewrite the VLAN on traffic from R2 to VLAN 15?

Options:

A.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag translate 1-to-2 dot1q 15 second-dot1q 20


B.

interface TenGigE0/0/0/0.2 I2transport

 encapsulation dot1q 15


C.

interface TenGigE0/0/0/0.1 I2transport

 encapsulation dot1q 10

 rewrite ingress tag pop 1


D.

interface TenGigE0/0/0/0.2 12transport

 encapsulation dot1q 10

 rewrite ingress tag push dot1q 15 symmetric


Expert Solution
Questions # 42:

Question # 42

Refer to the exhibit. An ISP is providing online registration services for a new social program. OSPF is being used as an interior routing protocol with TE capabilities. A network engineer with an employee ID: 5209:82:636 must provide faster MPLS-enabled convergence in case of failure. The ip cef distributed command has already been configured on all MPLS-enabled routers, and connectivity between the core routers has been verified following IETF RFC 4379. Which additional task must the engineer perform to complete the implementation?

Options:

A.

Implement LDP session protection on all PE routers.


B.

Implement MPLS TE fast reroute node protection on all MPLS-enabled routers.


C.

Implement MPLS TE fast reroute link protection on routers R2 and R3.


D.

Implement OSPF loop-free alternate fast reroute on core routers only.


Expert Solution
Questions # 43:

What is the main purpose of EVPN?

Options:

A.

to provide simplified and flexible underlay connectivity for private VPN services


B.

to provide scalable, interoperable multitenancy in data center and cloud networks


C.

to provide advanced security features for IoT devices


D.

to provide application-aware networking capabilities in a cloud environment


Expert Solution
Questions # 44:

Question # 44

Refer to the exhibit. The network is configured with OSPF. A networking team just connected a streaming multicast server to router R7, and they now must enable access for users throughout the network to stream video from the server.

Which action must the team take so that users can stream video without overloading the network?

Options:

A.

Implement PIM-DM on the link between the server and R7.


B.

Implement PIM-SM on the LAN network connecting R5, R6, R3, and R4.


C.

Implement PIM-SM on all routers and connected links.


D.

Implement PIM-DM on all interfaces in the network except the LAN connection between R5, R6, R3, and R4.


Expert Solution
Questions # 45:

How is a telemetry session established for data analytics?

Options:

A.

A router initiates a session using the dial-out to a destination.


B.

A destination initiate a session to a router.


C.

The destination initiate a session using the dial-out more to the router.


D.

A router requests the data using Teinet.


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions