New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

350-501 Cisco Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 6
Total 547 questions

Which feature describes the weight parameter for BGP path selection?

A.

Its value is local to the router

B.

Its value is set either locally or globally.

C.

Its default value is 0.

D.

Its value is global to the router.

Refer to the exhibit:

What is the URL used for with REST API?

A.

It is used to contact a URL filter to determine the efficacy of a web address

B.

It is used to send a TACACS+ authentication request to a server

C.

It is used to send a message to the APIC to perform an operation on a managed object or class operator

D.

It is used to initiate an FTP session to save a running configuration of a device.

What is the role of NSO?

A.

Provides public cloud services for customers that need Internet access.

B.

Controls the turn-up of a device.

C.

Provides network monitoring services for Layer 3 devices.

D.

Maintains data storage.

Refer to the exhibit. A network engineer with an employee ID: 5086:72:817 is configuring a connection to manage CE1 from the OAM server on VLAN 100. PE1 must push S-VLAN tag 10 toward PE2 while forwarding traffic from CE1 to the OAM server. PE1 must push S-VLAN tag 20 toward PE2 while forwarding traffic from CE2 to the data traffic gateway. Which configuration must the engineer implement on PE2?

A.

interface GigE0/1

encapsulation dot1q 100

rewrite ingress tag pop 10

rewrite ingress tag push 20

B.

interface Ge0/0

encapsulation dot1q 100

rewrite ingress tag push dot1q 10 symmetric

interface Ge0/1

encapsulation dot1q 200

rewrite ingress tag push dot1q 20 symmetric

C.

interface GigE0/1

encapsulation dot1q 10

rewrite ingress tag push dot1q 10 symmetric

Interface Ge0/0

encapsulation dot1q 20

rewrite ingress tag push dot1q 20 symmetric

D.

Interface Ge0/1

encapsulation dot1q 100

A network architect at ISP must implement a loop-avoidance mechanism in the organization's ring network topology. The architect decided to implement ITU-T G.8032. Intermittent link flaps within two seconds should be ignored. Which two configurations must the architect apply? (Choose two.)

A.

ring-protection g8032 profile vlan port-channel none

B.

link-protection group management vlan 1

C.

timer hold-off 2

D.

continuity-check direction down 2

E.

ethernet ring g8032 profile ethernet

Refer to the exhibit:

Router R1 and its peer R2 reside on the same subnet in the network, If does it make connections to R27

A.

R1 establishes UDP connections that are authenticated with an MD5 password

B.

R1 establishes TCP connections that are authenticated with a clear-text password

C.

R1 establishes UDP connections that are authenticated with a clear-text password

D.

R1 establishes TCP connections that are authenticated with an MD5 password

Refer to the exhibit. Tier 1 ISP A purchased several Tier 2 ISPs to increase their customer base and provide more regional coverage. ISP A plans to implement MPLS services in the access layer, with scalability up to 100.000 devices In one packet network and service recovery up to 50 ms. The network architect decided to use different independent IGP and LDP domains and interconnect LSPs that are based on RFC 3107. Which two actions must the network engineer perform to meet the requirements? (Choose two.)

A.

Implement BGP PIC core functionality on routers R2 and R3.

B.

Configure three OSPF areas, with Area 0 In the core domain, and Areas 2 and 3 in the aggregation domain.

C.

Implement BGP connectivity between routers R1 and R4 with VPNv4 address family enabled.

D.

Implement BGP inline RR functionality with next-hop-self capabilities on routers R2 and R3.

E.

Implement the IS-IS routing protocol on the access domain.

Refer to the exhibit:

What does this value mean when it is received in XML?

A.

It shows the ending of the script

B.

It indicates a break in a sequence

C.

It indicates a value assigned by a network administrator to tag a route

D.

It means a data field is blank

A regional MPLS VPN provider operates m two regions and wants to provide MPLS L 3VPN service for a customer with two sites in these separate locations. The VPN provider approaches another organization to provide backbone carrier services so that the provider can connect to these two locations.

Which statement about this scenario is true?

A.

When edge routers at different regional sites are connected over the global carrier backbone, MP-eBGP must run between the routers to exchange the customer VPNv4 routes

B.

When eBGP is used for label exchange using the send label option, MPLS-BGP forwarding is configured under the global ABC CSC PE-to CE interface

C.

When IGP is used for route exchange and LDP for label exchange, MPLS is enabled only on the VRF interface on the backbone-earner PE side.

D.

When BGP is used for both route and label exchange, the neighbor a.b.c.d send-lable command is used under the address family VPNv4 command mode.

Refer to the exhibit.

The customer that owns the CE-1, CE-2, and CE-3 routers purchased point-to-point E-Line services from the Carrier Ethernet provider. The service provider is delivering multiplexed UNI at the customer HQ location on PE-1 and untagged UNIs at the PE-2 and PE-3 locations. Additionally, the customer provided these VLAN to EVC mapping requirements:

• EVC 1 between CE-1 and CE-2 must be provisioned with C-VLAN 12 at the HQ location.

• EVC 2 between CE-1 and CE-3 must be provisioned with C-VLAN 13 at the HQ location.

Which configuration must the network engineer implement on the PE routers to provide end-to-end Carrier Ethernet service to the customer?

A.

B.

C.

D.

After troubleshooting multiple outages on the network due to repeated configuration errors, the network architect asked an engineer to enable NETCONF to facilitate future configurations. The configuration must enable syslog messaging to record NETCONF notifications from each of the numerous devices on the network. Which configuration must the engineer apply?

A.

username cisco test taker privilege 15 password 0 cisco test

aaa new-model

aaa authorization exec default local

snmp-server community cisco test RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history warnings

B.

username cisco test taker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco

logging history critical

C.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

aaa new-model

aaa authorization exec default local

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history debugging

D.

netconf-yang

username ciscotesttaker privilege 15 password 0 ciscotest

snmp-server community ciscotest RW

netconf-yang cisco-ia snmp-community-string ciscotest

logging history informational

Refer to the exhibit. Company A's network architect is implementing the capabilities that are described in RFC 4379 to provide new options for troubleshooting the company's MPLS network. MPLS LSPs are signaled via the BGP routing protocol with IPv4 unicast prefix FECs. Due to company security policies, access is controlled on the control plane and management plane. Which two tasks must the architect perform to achieve the goal? (Choose two.)

A.

Open UDP port 3503.

B.

Open MCP port 3505.

C.

Implement OAM on all MPLS-enabled routers.

D.

Implement LSP Ping on PE routers only.

E.

Implement VCCV on core routers only.

A service provider is in the process of implementing Unified MPLS on an enterprise network with many nodes. After the migration, several new customers will be added to the environment. RFC 3107 is used to build BGP LSPs across the domains. Which action must the networking team take to reduce the full-mesh requirement for IBGP?

A.

Implement route reflectors on all ABRs.

B.

Implement a confederation with the network segmented according to business units.

C.

Implement route reflectors on all P routers.

D.

Implement a confederation with each ABR serving as a gateway between secondary AS numbers.

Refer to the exhibit. Tier 1 ISP A is connected to small Tier 3 ISP B. The EBGP routing protocol is used for route exchange. The networking team at ISP A noticed the flapping of BGP sessions with ISP B. The team decides to Improve stability on the network by suppressing the subnet for 30 minutes when a session begins to flap. Which action must the team perform to meet this goal?

A.

Implement a BGP route-penalty timer on ISP A router R1 with the bgp penalty-timer 30 250 750 15 command.

B.

Implement BGP route dampening on ISP A router R1 with the bgp dampening 15 700 1500 30 command.

C.

Implement BGP route suppression on ISP A router R2 with the bgp suppression 30 600 1200 30 command.

D.

Implement a BGP route withdraw-delay timer on ISP B router R3 with the bgp withdraw-delay 30 15 90 30 command.

Which MPLS design attribute can you use to provide Internet access to a major customer through a separate dedicated VPN?

A.

The customer that needs the Internet access service is assigned to the same RTs as the Internet gateway

B.

The Internet gateway inserts the full Internet BGP routing table into the Internet access VPN

C.

The Internet gateway router is connected as a PE router to the MPLS backbone.

D.

The CE router supports VRF-Ute and the full BGP routing table.

A new PE router is configured to run OSPF as an IGP with LDP on all interfaces. The engineer is trying to prevent black holes after convergence when the PERSON device loses an LDP session with other PE routers. Which action must the engineer take to implement LDP session protection on a new PE router?

A.

Configure the mpls ldp session protection and mpls label protocol ldp commands on the interfaces on the new PE router that connect to the CENTER routers.

B.

Configure the mpls ldp discovery targeted-hello accept and mpls ldp session protection commands on the interfaces on the new PE router that connect to the CE routers.

C.

Configure the new PE router with the mpls ldp session protection command and on neighboring routers that connect to this new PE router.

D.

Configure the new PE router with the mpls ldp session protection command on interfaces with directly connected neighbors.

Which OoS model allows hosts to report their QoS needs to the network?

A.

DiffServ

B.

CB-WFQ

C.

IntServ

D.

MQC

Which feature will an operator use while implementing MPLS TE on customer's network, to prevent an LSP from using any overseas inks?

A.

bandwidth

B.

affinity

C.

explicit path

D.

SLRG

Which action occurs during the traceback phase of the six-phase approach to service provider security?

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Drag and drop the LDP features from the left onto the correct usages on the right.

An engineer must apply an 802.1ad-compliant configuration to a new switchport with these requirements:

The switchport must tag all traffic when it enters the port.

The switchport is expected to provide the same level of service to traffic from any customer VLAN.

Which configuration must the engineer use?

A.

interface GigabitEthernet1/0/1

switchport mode trunk

switchport trunk encapsulation dot1q

encapsulation ISL

bridge-domain 12

B.

interface GigabitEthernet1/0/1

ethernet dot1ad uni c-port

service instance 12

encapsulation dot1q

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

C.

interface GigabitEthernet1/0/1

ethernet dot1ad uni s-port

service instance 12

encapsulation default

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

D.

interface GigabitEthernet1/0/1

ethernet dot1ad nni

service instance 12

encapsulation dot1ad

bridge-domain 12

Refer to the exhibit:

Which statement describes this configuration?

A.

Router 1 has its running configuration locked so changes can be made only when the administrator issues a kill session

B.

Router 1 can be remotely managed by the CLI using Telnet

C.

Router 1 has a new data store to collect SNMP information, but configuration must still be done at the CLI only

D.

Router 1 has a temporary data store where a copy of the running configuration can be manipulated and verified before committing the configuration

Refer to the exhibit. An engineer configured R6 as the headend LSR of an RSVP-TE LSP to router XR2, with the dynamic path signaled as R6-R2-R5-XR2. and set the OSPF cost of all links to 1. MPLS autotunnel backup Is enabled on all routers to protect the LSP. Which two NNHOP backup tunnels should the engineer use to complete the implementation? (Choose two.)

A.

The R6 backup tunnel path R6-R1-R4-R5.

B.

The R2 backup tunnel path R2-R5 across the alternate link.

C.

The R2 backup tunnel path R2-R1-R4-XR1-XR2.

D.

The R6 backup tunnel path R6-R2-R5

E.

The R6 backup tunnel path R6-R1-R2.

Refer to the exhibit:

With which router does IOSXRV-1 have LDP session protection capability enabled but session hold up is not active?

A.

192.168.0.1

B.

192.168.0.3

C.

192.168.0.4

D.

192.168.0.5

Refer to the exhibit. The four PE routers in the network are connected and running OSPF to share routes. MPLS is enabled on the four routers. The routers are connected and configured to use /30 networks. A network engineer must implement Layer 3 VPN support for traffic between customer sites.

Which task must the engineer perform?

A.

Deploy IGP in the network to exchange intranet data between the PEs.

B.

Configure the devices to establish LDP neighbor relationships to share label information.

C.

Implement MPLS TE tunnels between each router to provide dedicated bandwidth for Layer 3 VPN traffic.

D.

Update the subnet between each router to a /24 prefix.

router(config)# route-map blackhole-trigger

router(config-route-map)# match tag 777

router(config-route-map)# set ip next-hop 10.0.1.1

router(config-route-map)# set origin igp

router{config-route-map)# set community no-export

Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and each router maintains iBGP adjacency with the other routers on the network. An operator has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which is used as a black hole route as shown. Which configuration should the operator implement to the management router to create a route map that will redistribute tagged static routes into BGP and create a static route to blackhole traffic with tag 777 that is destined to the server at 192.168.10.100?

A.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

B.

router(config)# router bgp 55100

router(config-router)# redistribute static route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

C.

router(config)# router bgp 55100

router(config-router)# redistribute connected

router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

D.

router(config)# router bgp 55100

router(config-router)# redistribute connected route-map blackhole-trigger

router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

Refer to the exhibit.

What does the script configure?

A.

a VLAN namespace

B.

selectors for the in-band management

C.

a physical domain

D.

a static VLAN

Refer to the exhibit. A multinational corporation with a Cisco-based network wants to leverage Cisco security features to enhance the security of their LAN and protect against eavesdropping and man-in-the-middle attacks. The solution must comply with the IEEE 802.1AE standard. A network engineer must implement the new security configurations on a pair of interconnected Cisco switches. The engineer already completed the configuration to enable AAA new-model and set up a basic AAA configuration for user authentication. Management VLAN 10 is in place for network administration. Which action must the engineer take to meet the requirements?

A.

Implement CTS for role-based access control on both switches.

B.

Implement MACsec on both switches with encryption mode GCM and a shared key.

C.

Implement open authentication via the management VLAN on both switches.

D.

Implement IPsec on both switches to secure data transmissions.

What is the purpose of OSPF-TE extensions to MPLS traffic engineering functionality?

A.

carrying OSPF routing information for TE tunnels

B.

advertising the TE tunnel routes to the OSPF domain

C.

calculating and establishing TE tunnels in accordance with network constraints

D.

calculating fast reroute to provide a backup path for TE tunnels

An organization with big data requirements is implementing NETCONF as part of its migration to a new cloud-based environment. The organization has multiple offices across widespread geography. A network engineer is configuring NETCONF on one of the border routers. Which configuration must the engineer apply to save the running configuration?

A.

B.

C.

snmp-server community public RW

snmp-server trap link left

snmp-server enable traps snmp authentication linkdown linkup

snmp-server enable traps syslog

snmp-server manager

D.

logging history debugging

logging snmp-trap emergencies

logging snmp-trap alerts

logging snmp-trap critical

logging snmp-trap errors

logging snmp-trap warnings

logging snmp-trap notifications

logging snmp-trap information

logging snmp-trap debugging

Page: 3 / 6
Total 547 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved