Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

300-540 Cisco Designing and Implementing Cisco Service Provider Cloud Network Infrastructure (SPCNI v1.0) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-540 Designing and Implementing Cisco Service Provider Cloud Network Infrastructure (SPCNI v1.0) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 61 questions

Refer to the exhibit. An engineer must deploy a standalone Cisco NFVIS. These configurations were performed already:

Deployed the virtual machine

Configured the hostname and IP address

Configured dual WAN support

When the engineer attempts to access the NFVIS portal, the API returns a 401 Unauthorized error. What is the cause of the issue?

A.

The default admin password must be reset.

B.

Portal access must be enabled via SSH.

C.

The Tomcat service must be restarted.

D.

The browser certificate must be renewed.

Refer to the exhibit. An engineer is troubleshooting an issue with switch LEAF-SW-11. The engineer observes that several main servers on the VXLAN BGP EVPN Multi-Site network experience 50–60% packet loss inbound and outbound, and all the DCI tracking interfaces are down. Which two actions must be taken to resolve the issue? (Choose two.)

A.

On the Nexus switch, run the inner ipv4 dst_ip 172.16.2.200 command against module-1.

B.

On LEAF-SW-11, run the inner ipv4 src_ip 172.16.2.200 command against module-1.

C.

On LEAF-SW-11, run the evpn multisite dci-tracking command against interface Eth1/1.

D.

On LEAF-SW-11, enable the multisite ingress-replication command for the L2VNI of VLAN 11.

E.

On the Nexus switch, run the ip access-list permit ip address 172.16.2.200 command.

How does log management assist in meeting the requirements of cloud security regulatory compliance?

A.

by supporting documentation and reporting processes

B.

by streamlining resource allocation across cloud environments

C.

by providing enhanced interoperability between cloud platforms

D.

by boosting the security of cloud-based applications

What is a valid connection method between carrier-neutral facilities within the same metro area?

A.

OSPF backbone area adjacency

B.

private wireless connection

C.

DWDM ring

D.

CAT6e connection

Refer to the exhibit. An engineer must configure iBGP multipath load sharing across three paths. Which two commands must be run on router R2? (Choose two.)

A.

router bgp 100

B.

ip load-sharing ibgp 3

C.

maximum-paths ibgp 3

D.

router bgp 101

E.

ip load-sharing per-destination

What is a valid connection method between carrier-neutral facilities that are more than 20 miles away from each other?

A.

Carrier access Ethernet ring

B.

Private wireless connection

C.

CAT6e connection

D.

Multimode fiber connection

What should be used to protect against lateral movements during a Cisco NFVI security breach?

A.

Wi-Fi Protected Access

B.

Web application firewall

C.

Network segmentation

D.

Data encryption

An engineer must implement a solution on a Cisco ASR 1000 Series router to protect against DDoS attacks. DDoS traffic must be dropped by transmitting Flowspec attributes to edge routers, instructing them to generate an ACL via class-maps and policy-maps. The engineer already configured BGP neighbors. Which action must be taken next?

A.

Configure Flowspec for the BGP address-family

B.

Set the BGP routing process

C.

Activate the BGP neighbors

D.

Configure the route reflector

Which two tools should be used to manage container orchestration? (Choose two.)

A.

Docker

B.

VMware vCenter

C.

Cisco vManage

D.

Kubernetes

E.

Cisco vSmart

Which command must be run on a Cisco IOS device to configure six parallel iBGP and eBGP routes that can be installed into a routing table?

A.

maximum paths bgp 6

B.

multipath eibgp 6

C.

maximum paths bgp routers 6

D.

maximum-paths eibgp 6

Refer to the exhibit. An engineer must configure multihoming between router R1 and service providers SP-1 and SP-2. Locally generated routes must be advertised to the service providers, and should prevent the risk that the local autonomous system becomes a transit AS for Internet traffic. Which two commands must be run on R1 to complete the configuration? (Choose two.)

A.

neighbor 172.16.1.1 filter-list 300 out

B.

neighbor 172.16.2.1 filter-list 400 out

C.

neighbor 172.16.1.1 filter-list 1 out

D.

neighbor 172.16.2.1 filter-list 1 out

E.

neighbor 172.16.1.1 filter-list 200

What does Cisco Always-On Cloud DDoS use to protect against DDoS attacks?

A.

Load balancing

B.

Botnet zombies

C.

Traffic mirroring

D.

Scrubbing centers

Which two network segments are needed to support Cisco VIM? (Choose two.)

A.

Provisioning

B.

Data plane

C.

Heartbeat

D.

Host

E.

Storage

What is a benefit of using VXLANs in a cloud-scale environment?

A.

extends Layer 2 segments across the underlying Layer 3 infrastructure

B.

extends Layer 3 segments across the underlying Layer 2 infrastructure

C.

reduces spanning-tree complexity across the Layer 2 infrastructure

D.

eliminates the need for a Layer 3 underlay in the service provider infrastructure

An engineer must create a new VPC and deploy several Amazon EC2 instances in AWS. Only SSH connections originating from IP address 20.20.20.20 must be allowed to reach the EC2 instances. What must be configured?

A.

Access control list

B.

Security group

C.

Web application firewall

D.

Resource group

Which format is used by Cisco Container Platform for configuration files?

A.

HTML

B.

YAML

C.

XHTML

D.

XML

Which command must be run on a Cisco IOS device to configure six parallel iBGP and eBGP routes that can be installed into a routing table?

A.

maximum paths bgp 6

B.

multipath eibgp 6

C.

maximum paths bgp routers 6

D.

maximum-paths eibgp 6

A large company's legacy network is set up with equipment from multiple vendors. The company engaged a network architect to optimize the network for virtualization. The architect must ensure robust and efficient operation, considering the company's immediate needs but also anticipating future network complexities and scalability requirements. The chosen strategy must be capable of integrating seamlessly with existing systems, while providing a pathway for innovation and growth. The solution must facilitate end-to-end service automation throughout the entire lifecycle, and the implementation must ensure the validation, execution, and abstraction of network configurations and services. Which action must be taken to meet the requirements?

A.

Implement a service life-cycle approach with simplified monitoring that plans for post-deployment adjustments to be incorporated into the automation CI/CD pipeline.

B.

Implement a configuration-management approach that allows for configuring each network device individually to optimize its performance.

C.

Implement a flexible service-modeling approach that leverages automation for ongoing management and refinement as demands on the network evolve.

D.

Implement a service-modeling approach with a static YANG one-size-fits-all model that includes the unique requirements of each different network element.

Page: 1 / 1
Total 61 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved