Customers Passed Cisco 350-501 Exam
Average Score In Real 350-501 Exam
Questions came from our 350-501 dumps.
Welcome to PassExamHub's comprehensive study guide for the Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) exam. Our 350-501 dumps is designed to equip you with the knowledge and resources you need to confidently prepare for and succeed in the 350-501 certification exam.
PassExamHub's 350-501 dumps PDF is carefully crafted to provide you with a comprehensive and effective learning experience. Our study material includes:
In-depth Content: Our study guide covers all the key concepts, topics, and skills you need to master for the 350-501 exam. Each topic is explained in a clear and concise manner, making it easy to understand even the most complex concepts.
Online Test Engine: Test your knowledge and build your confidence with a wide range of practice questions that simulate the actual exam format. Our test engine cover every exam objective and provide detailed explanations for both correct and incorrect answers.
Exam Strategies: Get valuable insights into exam-taking strategies, time management, and how to approach different types of questions.
Real-world Scenarios: Gain practical insights into applying your knowledge in real-world scenarios, ensuring you're well-prepared to tackle challenges in your professional career.
Expertise: Our 350-501 exam questions answers are developed by experienced Cisco certified professionals who have a deep understanding of the exam objectives and industry best practices.
Comprehensive Coverage: We leave no stone unturned in covering every topic and skill that could appear on the 350-501 exam, ensuring you're fully prepared.
Engaging Learning: Our content is presented in a user-friendly and engaging format, making your study sessions enjoyable and effective.
Proven Success: Countless students have used our study materials to achieve their 350-501 certifications and advance their careers.
Start Your Journey Today!
Embark on your journey to Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) success with PassExamHub. Our study material is your trusted companion in preparing for the 350-501 exam and unlocking exciting career opportunities.
FRR is configured on a network. What occurs when the headend router on the path is alerted to a link failure over IGP?
A. LSP attempts fast switching on the backup path until the primary path returns to the active state.
B. The headend router uses a presignaled LSP to bypass the failure point.
C. A new backup tunnel is established past the PLR to pass through the protected nodes
D. Backup tunnel is established and intersects with the primary tunnel at the headend.
The service provider is serving hosts with two different multicast streams from source X and source Y. SourceX is multicast group 224.0.0.0/8, and source Y is multicast group 226.0.0.0/8. Multicast source X should sendits stream through bidirectional RP address 10.20.1.1, and multicast source Y should send its stream through RP address 10.20.2.1. Which configuration meets these requirements?
A. Enable ip pim ssm default on RA and RB.
B. Add ip pim bidir-enable in global mode on RB.
C. Permit the source X and source Y IP addresses in the access list on RB.
D. Set PIM sparse mode with a static RP address of 10.20.2.1 on RA and RC.
What Is one of the differences between Ansible and Chef?
A. Ansible uses YAML and Chef uses Ruby.
B. Chef requires the use of Windows in the environment and Ansible requires Linux.
C. Chef is highly scalable and Ansible is highly secure.
D. Ansible uses Ruby and Chef uses Python.
An engineer is moving all of an organization’s Cisco IOS XE BGP routers to the address-family identifier format. Which command should be used to perform this upgrade quickly with the minimum service disruption?
A. vrf upgrade-cli
B. bgp upgrade-cli
C. address-family ipv4
D. ip bgp-community new-format
Which condition must be met for TI-LFA to protect LDP traffic?
A. For single-segment protection, the PQ node must be LDP and SR-capable.
B. The protected destination must have an associated LDP label and prefix-SID.
C. The point of local repair must be LDP-capable.
D. For double-segment protection, the P and Q nodes must be SR-capable.
What is a characteristic of data modeling language?
A. It provides an interface for state data
B. It separates configuration and state data.
C. It ensures devices are individually configured.
D. It replaces SNMP.
What are two features of stateful NAT64? (Choose two.)
A. It uses address overloading.
B. It provides 1:N translations, so it supports an unlimited number of endpoints.
C. It requires IPv4-translatable IPv6 address assignments.
D. It requires the IPv6 hosts to use either DHCPv6-based address assignments or manual address assignments.
E. It provides 1:1 translation, so it supports a limited number of endpoints.
Which technology enables the addition of new wavelengths in a fiber-optic network?
A. IPoDWDM
B. CWDM
C.DWDM
D. ROADM
While an engineer deploys a new Cisco device to redistribute routes from OSPF to BGP, they notice that not all OSPF routes are getting advertised into BGP. Which action must the engineer perform so that the device allows O, OIA, OE1, and OE2 OSPF routes into other protocols?
A. Configure the device to pass only O and E2 routes through it.
B. Configure the synchronization keyword in the global BGP configuration.
C. Configure the keyword nssa in the redistribution entry.
D. Configure the keywords internal and external in the redistribution entry.
A network engineer is implementing NetFlow to observe traffic patterns on the network. The engineer is planning to review the patterns to help plan future strategies for monitoring and preventing congestion as the network grows. If the captures must include BGP next-hop flows, which configuration must the engineer apply to the router?
A. ip cefip flow-export version 5 bgp-nexthopip flow-export destination 192.168.1.1 9995interface gigabitethernet 1/0/1ip flow egress
B. ip cefip flow-export version 9 bgp-nexthopip flow-export destination 192.168.1.1 9996interface gigabitethernet 1/0/1ip flow ingress
C. ip cefip flow-export version 5ip flow-export destination 192.168.1.1 9995interface gigabitethernet 1/0/1ip flow ingresscdp enable
D. no ip cefip flow-export version 9ip flow-export destination 192.168.1.1 9996interface gigabitethernet 1/0/1ip flow ingressip flow egress
What is a characteristic of MVPN?
A. It bypasses the use of MPLS in the service provider core and transmits packets using IP only.
B. It uses pseudowires to route unicast and broadcast traffic over either a service provider MPLS or IP
core.
C. It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.
D. It creates GRE tunnels to route multicast traffic over a service provider IP core.
A company is expanding its existing office space to a new floor of the building, and the networking team is installing a new set of switches. The new switches are running IGMPv2, and the engineers configured them for VLAN10 only. The rest of the existing network includes numerous Layer 2 switches in multiple other VLANs, all running IGMPv3. Which additional task must the team perform when deploying the new switches so that traffic is switched correctly through the entire network?
A. Configure the new switches to use IGMPv3 on all VLANs on the network.
B. Configure all switches on the network to support IGMPv2 and IGMPv3 on all VLANs on the network.
C. Configure the new switches to use IGMPv3 on VLAN10 only.
D. Configure all switches on the network to support IGMPv2 and IGMPv3 on VLAN10 only.
How does Cisco DNA Center enhance network automation?
A. It allows network administrators to quickly deploy Cisco Layer 2 devices without requiring STP and broadcast transport.
B. It allows network administrators to reduce inconsistencies when they deploy and validate network
configurations.
C. It allows network administrators to reduce the number of VRFs in a multi customer environment by
automatically implementing a single VLAN per customer.
D. It allows network administrators to combine voice and data networks into a single topology without
manual configuration.
A new PE router is configured to run OSPF as an IGP with LDP on all interfaces. The engineer is trying toprevent black holes after convergence when the PERSON device loses an LDP session with other PE routers.Which action must the engineer take to implement LDP session protection on a new PE router?
A. Configure the mpls ldp session protection and mpls label protocol ldp commands on the interfaces onthe new PE router that connect to the CENTER routers.
B. Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands onthe interfaces on the new PE router that connect to the CE routers.
C. Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands onthe interfaces on the new PE router that connect to the CE routers.
D. Configure the new PE router with the mpls ldp session protection command on interfaces with directlyconnected neighbors.
How does Inter-AS Option-A function when two PE routers in different autonomous systems are directly connected?
A. The two routers share all Inter-AS VPNv4 routes and redistribute routes within an IBGP session to
provide end-to-end reach.
B. The two routers establish an MP-EBGP session to share their customers' respective VPNv4 routes.
C. The two routers treat one another as CE routers and advertise unlabeled IPv4 routes through an EBGP
session.
D. The two routers share VPNv4 routes over a multihop EBGP session and set up an Inter-AS tunnel using
one another's label.
An engineering team must implement Unified MPLS to scale an MPLS network. Devices in the core layer use different IGPs, so the team decided to split the network into different areas. The team plans to keep the MPLS services as they are and introduce greater scalability. Which additional action must the engineers take to implement the Unified MPLS?
A. Redistribute the IGP prefixes from one IGP into the other routers to ensure end-to-end LSPs.
B. Configure the ABR routers as route reflectors that redistribute IGP into BGP.
C. Redistribute the IGP prefixes into another IGP to ensure end-to-end LSPs.
D. Move the IGP prefixes into IS-IS as the loopback prefixes of the PE routers to distribute the prefixes to
other routers to create end-to-end LSPs.
How does SR policy operate in Segment Routing Traffic Engineering?
A. An SR policy for color and endpoint is deactivated at the headend as soon as the headend learns a valid
candidate path for the policy.
B. When "invalidation drop" behavior occurs, the SR policy forwarding entry is removed and the router
drops all traffic that is steered into the SR policy.
C. When a set of SID lists is associated with the SR policy designated path, traffic steering is ECMP-based
according to the qualified cost of each SID-list.
D. An active SR policy installs a BSID-keyed entry in the forwarding table to steer the packets that match
the entry to the SR policy SID-list.
What is a characteristic of the YANG model?
A. Associate types are optional for each leaf.
B. It uses containers to categorize related nodes.
C. It is a distributed model of nodes.
D. Spines are used to represent individual attributes of nodes.
What is the function of Cisco NFV infrastructure platform?
A. It does not have a security audit feature.
B. It does not offer high availability.
C. It offers consistent performance.
D. It offers decentralized logging.
A customer has requested that the service provider use a Cisco MPLS TE tunnel to force the E-line service to take a specific route What is used to send the traffic over the tunnel?
A. static route
B. preferred path
C. forwarding adjacency
D. autoroute destination
Which statement about TLS is accurate when using RESTCONF to write configurations on network devices'?
A. It requires certificates for authentication.
B. It is provided using NGINX acting as a proxy web server
C. It is used for HTTP and HTTPS requests.
D. It is not supported on Cisco devices
What is the role of NFVI?
A. domain name service
B. intrusion detection
C. monitor
D. network address translation
How does Cisco MPLS TE use OSPF extensions to allow for optimized transit between a headend router and a destination router?
A. Router LSAs share router link advertisements to each router within the MPLS environment so that
tunnels can be built bidirectionally.
B. ASBR Summary LSAs share OSPF domain information so that the two routers know how to reach each
other during tunnel setup.
C. Network LSAs share RSVP information to build the tunnel between the two routers.
D. Opaque LSAs calculate and establish unidirectional tunnels that are set according to the network
constraint.
What are two features of 6RD IPv6 transition mechanism? (Choose two.)
A. It inserts IPv4 bits into an IPv6 delegated prefix.
B. It uses a native IPv6-routed network between CE routers and the BR router.
C. It allows dynamic 1:N translation of IPv6 address.
D. It uses stateful automatic 6to4 tunnels between CE routers and the BR router.
E. It uses stateless automatic 6to4 tunnels between CE routers and the BR router.
Which OS uses a distributed subsystem architecture?
A. IOS XE
B. IOS
C. IOS XR
D. CatOS
How does an untrusted interface at the boundary of an administrative domain handle incoming packets?
A. It remarks all values to a CoS of 0.
B. It forwards only traffic with a DSCP value of 48.
C. It translates the IP precedence value to the corresponding DSCP value.
D. It drops all traffic ingressing the network.
An engineer Is implementing NSR with OSPF on a large campus that requires high availability. Which task must an engineer perform to complete the process with minimal disruption to traffic?
A. Reset OSPF neighbor sessions to maintain state Information during router switchover
B. Configure the device to repopulate state information using routing updates received from the BDR
C. increase the keepalive interval on the OSPF neighbors so that traffic continues to pass during the
switchover
D. Ensure that the dual RP has synchronized their state information before performing the switchover
operation
An ISP Is Implementing end-to-end fault monitoring for a customer based on the IEEE 802.3ah standard. The solution must detect when 15 or more corrupted Ethernet packets arrive within 10 ms and stop propagating traffic through the ISP backbone network or to the customer side. Which configuration must the ISP engineer apply?
A. ethernet oam link-monitoring enableethernet oam link-monitor crc-errors ingress time-window 10ethernet oam link-monitor crc-errors ingress threshold high 15 ethernet oam link-monitor crc-errorsegress time-window 10 ethernet oam link-monitor crc-errors egress threshold high 15 ethernet oamlink-monitor high-threshold action shutdown-interface
B. ethernet oam link-monitoringethernet oam link-monitor receive-crc window 15ethernet oam link-monitor receive-crc threshold high 10ethernet oam link-monitor high-threshold action disable-interface
C. ethernet oamethernet oam link-monitor receive-crc window 10ethernet oam link-monitor receive-crc threshold high 15ethernet oam link-monitor transmit-crc window 10ethernet oam link-monitor transmit-crc threshold high 15ethernet oam link-monitor high-threshold action errordisable-interface
D. ethernet oam link-monitoring global enableethernet oam link-monitor receive crc-errors period 15ethernet oam link-monitor receive crc-errors limit 15ethernet oam link-monitor transmit crc-errors period 10ethernet oam link-monitor transmit crc-errors limit 15ethernet oam link-monitor limit action error-disable interface
The network team is planning to implement IPv6 on the company’s existing IPv4 network infrastructure. The network currently uses IS-IS to share routes between peers. Which task must the team perform so that IS-IS will run in multitopology mode on the updated IPv6 network?
A. Configure the links between the network routers as point-to-point.
B. Configure the network routers to use metric-style wide.
C. Configure the network routers as Level 2 routers.
D. Configure the IS-IS IPv6 metric on the dual-stack links.
A network engineer is testing an automation platform that interacts with Cisco networking devices via NETCONF over SSH. In accordance with internal security requirements:NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.CLI SSH access is permitted from any source.Which configuration must the engineer apply on R1?
A. configure terminalhostname R1ip domain-name mydomain.comcrypto key generate rsaip ssh version 1access-list 1 permit 172.16.20.0 0.0.0.255netconf ssh acl 1line vty 0 4transport input sshend
B. configure terminalhostname R1ip domain-name mydomain.comcrypto key generate rsaip ssh version 2access-list 1 permit 172.16.20.0 0.0.0.255access-list 1 permit anynetconf sshline vty 0 4access-class 1 intransport input sshend
C. configure terminalhostname R1ip domain-name mydomain.comcrypto key generate rsaip ssh version 1access-list 1 permit 172.16.20.0 0.0.0.255access-list 2 permit anynetconf sshline vty 0 4access-class 2 intransport input sshend
D. configure terminalhostname R1ip domain-name mydomain.comcrypto key generate rsaip ssh version 2access-list 1 permit 172.16.20.0 0.0.0.255netconf ssh acl 1line vty 0 4transport input sshend
A network administrator must monitor network usage to provide optimal performance to the network end users when the network is under heavy load. The administrator asked the engineer to install a new server to receive SNMP traps at destination 192.168.1.2. Which configuration must the engineer apply so that all traps are sent to the new server?
A. snmp-server enable traps entitysnmp-server host 192.168.1.2 public
B. snmp-server enable traps bgpsnmp-server host 192.168.1.2 public
C. snmp-server enable traps isdnsnmp-server host 192.168.1.2 public
D. snmp-server enable trapssnmp-server host 192.168.1.2 public
A service provider requires continuous real-time network monitoring to provide reliable SLAs to its customers. To satisfy this requirement, a network administrator is implementing gRPC dial out on an ASR with TLS. Receiver 192.168.10.2 will be assigned one of the subscriptions, and it will manage the ASR. Which configuration must the engineer apply to the router as part of the configuration process?
A. snmp-server community public
snmp-server enable traps
snmp-server host 192.168.10.2 version 2c public.
B. telemetry model-driven
destination-group DGroup1
address family ipv4 192.168.10.2 1 port 10
encoding self-describing-gpb
C. snmp-server community public
snmp-server enable traps
snmp-server enable traps snmp authentication
snmp-server manager
snmp-server manager session-timeout 1000
D. telemetry model-driven
destination-group ciscotest
address family ipv4 192.168.10.2 port 10
encoding self-describing-gpb
protocol grpc tis-hostname ciscotest.com
What is a feature of model-driven telemetry?
A. It occasionally streams to multiple servers in the network.
B. It is less secure because it uses community strings.
C. It uses the pull model to send requested data to a client when polled.
D. It uses the push model to stream data to desired destinations.
Which Cisco software OS uses monolithic architecture?
A. NX-OS
B. IOS XE
C. IOS XR
D. IOS
Which two routing protocols support Cisco MPLS TE tunnels? (Choose two.)
A. IS-IS
B. RIP
C. BGP
D. OSPF
E. EIGRP
The engineering team at a large ISP has been alerted a customer network is experiencinghigh traffic congestion. After a discussion between the ISP and technical personnel at thecustomer site, the team agrees that traffic to the customer network that exceeds a specificthreshold will be dropped. Which task must the engineer perform on the network toimplement traffic policing changes?
A. Configure RSVP to reserve bandwidth on all interfaces when a path is congested.
B. Enable Cisco Discovery Protocol on the interface sending the packets.
C. Enable Cisco Express Forwarding on the interfaces sending and receiving the packets.
D. Set IP precedence values to take effect when traffic exceeds a given threshold.
What are the two uses of the YANG data modeling language? (Choose two.)
A. It is used to access a device by HTTP.
B. It Is used to model the configuration used by NETCONF operations.
C. It is used to shape state data of network elements.
D. It Is used to replace RESTCONF as a mechanism to install and manipulateconfiguration.
E. It is used to replace the OSI model for troubleshooting.
A network architect décides to expand the scope of the multicast deployment within thecompany network the network is already using PlM-SM with a static RP that supports ahigh-bandwidth. video-based training application that s heavily used by the employees, butexcessive bandwidth usage is a concern How must the engineer update the network toprovide a more efficient multicast implementation'?
A. Configure IGMP to manage the multicast hosts on each LAN
B. implement BSR to support dynamic RP notification.
C. Deploy ICMP to Improve multicast reachability across the network using static RP.
D. Implement STP to improve switching performance for multicast data.
Which action does the ingress VTEP perform on traffic between EVPN VXLAN overlays?
A. routing and tunneling when doing symmetric IRB
B. routing when doing asymmetric IRB
C. routing and bridging when doing asymmetric IRB
D. bridging when doing symmetric IRB
A network operator working for a telecommunication company with an employee Id: 406596080 it trying to implement BFD configuration on an existing network of Cisco devicesWhich task must the engineer perform to enable BFD on the interfaces?
A. Disable Cisco Express Forwarding on the interfaces
B. Disable SSO on the interfaces
C. Remove any static routes that point to the interfaces
D. Remove the log option from any ACLs on the interfaces.
After a series of unexpected device failures on the network. a Cisco engineer is deployingNSF on the network devices so that packets continue to be forwarded during switchoversThe network devices reside in the same holding, but they are physically separated into twodifferent data centers Which task must the engineer perform as part of the deployment?
A. implement OSPF to maintain the link-state database during failover.
B. implement VRFs ana specify the forwarding instances that must remain active duringfailover.
C. implement an L2VPN with the failover peer to share state Information between theactive and standby devices.
D. implement Cisco Express Forwarding to provide forwarding during failover
A network administrator is planning a new network with a segment-routing architectureusing a distributed control plane. How is routing information distributed on such a network?
A. Each segment is signalled by an SR controller, but each segment makes Its ownsteering decisions based on SR policy.
B. Each segment is signalled by MPLS, and each segment makes steering decisionsbased on the routing policy pushed by BGP.
C. Each segment is signalled by an SR controller that makes the steering decisions foreach node.
D. Each segment is signalled by a compatible routing protocol and each segment makes itsown steering decisions based on SR policy.
Which feature describes the adjacency SID?
A. It applies only to point-to-point links.
B. It applies only to multipoint links
C. It is locally unique
D. It is globally unique.
An engineer is implementing IGMP with SSM on a multicampus network that supports video streaming. Which task must the engineer perform as part of the process?
A. Configure the network to use IGMPv3.
B. Configure the network to use bidirectional PIM.
C. Configure an RP that uses static assignments only.
D. Configure the network to use the PIM bsr-candidate
The network-engineering team of a service provider is integrating several recently acquired networks into a more scalable common Unified MPLS architecture. The new networkarchitecture will support end-to-end VPNv4 and VPNv6 services with these requirements: • The IGP of the core layer is IS-IS In Area 0.• The IGP of the aggregation layers is OSPF in Area 0.• The LDP protocol Is used to distribute label bindings within each IGP domain.Which task must the network engineer perform when implementing this new architecture?
A. Configure BGP-LU between ABR routers of each IGP domain to carry MPLS label information in NLRI.
B. Configure a BGP session between the ABR routers of each IGP domain to exchange VPNv4 or VPNv6 prefixes
C. Configure the ABR in each IGP domain to preserve next-hop information on all VPNv4 and VPNv6 prefixes advertised by the PE.
D. Configure mutual redistribution of each IGP domain's loopback prefix to provide end-toend LDP LSP