Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

350-501 Cisco Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 350-501 Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 7 / 7
Total 452 questions

Which two routing protocols support Cisco MPLS TE tunnels? (Choose two.)

A.

IS-IS

B.

RIP

C.

BGP

D.

OSPF

E.

EIGRP

Refer to the exhibit BGP is running in the core of the service provider to exchange routes for its customers, and OSPF serves as the PE-CE routing protocol. The service provider s existing customer at CE1 is opening a new office in a different geographical location connected via CE2. A network engineer must update the BGP implementation so that PE1 and PE2 will share routes and provide communication between CE1 and CE2 Which action must the engineer take?

A.

Configured CE2 to establish a BGP relationship with PE1 and PE2

B.

Configure CE1 and CE2 with a pseudowire that will run over the service provider core.

C.

Configure PE1 and PE2 to mutually redistribute BGP and OSPF in the VRF for the customer.

D.

Configure PE1 and PE2 to redistribute OSPF from the VRF for the customer into BGPPUM

Which action occurs during the traceback phase of the six-phase approach to service provider security?

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Refer to the exhibit.

An engineer is implementing Auto-RP and reviewing the configuration of the PE-A. Which configuration permits Auto-RP messages to be forwarded over this interface?

A.

PE-A(config-if)#ip pim sparse-mode

B.

PE-A(config-if)#no ip pim bsr-border

C.

PE-A(config-if)#ip igmp version 3

D.

PE-A(config-if)#ip pim sparse-dense-mode

Refer to the exhibit:

What is the effect of this configuration?

A.

The two routers fail to form a neighbor relationship because their system IDs are different.

B.

The two routers successfully form a neighbor relationship

C.

The two routers fail to form a neighbor relationship because the authentication configuration is missing

D.

The two routers fail to form a neighbor relationship because they have different ISIS area types.

Refer to the exhibit.

What is the result of this configuration?

A.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authorization.

B.

Router 1 and the TACACS+ server maintain one open connection between them only when network administrator is accessing the router with password ciscotest.

C.

Router 1 and the TACACS+ server maintain one open connection between them.

D.

Router 1 opens and closes a TCP connection to the TACACS+ server every time a user requires authentication.

What are the two uses of the YANG data modeling language? (Choose two.)

A.

It is used to access a device by HTTP.

B.

It Is used to model the configuration used by NETCONF operations.

C.

It is used to shape state data of network elements.

D.

It Is used to replace RESTCONF as a mechanism to install and manipulate configuration.

E.

It is used to replace the OSI model for troubleshooting.

An engineer is developing a configuration script to enable dial-out telemetry streams using gRPC on several new devices. TLS must be disabled on the devices. Which configuration must the engineer apply on the network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit:

Which three outcomes occur if the prefix list is added to the neighbor? (Choose three)

A.

192.168 0.0/19 is denied.

B.

192.168 0.0/17 is denied.

C.

192.168 0.0/17 is permitted

D.

192.168.0.0/16 is denied

E.

192.168 0.0/16 is permitted

F.

192.168 0.0/19 is permitted

How can shared services in an MPLS Layer 3 VPN provide Internet access to the customers of a central service provider?

A.

The CE router can establish a BGP peering to a PE router and use the PE device to reach the Internet

B.

Route distinguishes are used to identify the routes that CEs can use to reach the Internet

C.

The customer VRF uses route targets to import and export routes to and from a shared services VRF

D.

Static routes on CE routers allow route leakage from a PE global routing table

Refer to the exhibit:

A network operator working for service provider with an employee id 3715 15:021 applied this configuration to a router.

Which additional step should the engineer use to enable LDP?

A.

Disable Cisco Express Forwarding globally

B.

Delete the static router ID

C.

Enable MPLS LDP on the interface

D.

Configure the both keyword to enable LDP globally

Refer to the exhibit. The network team must implement MPLS LDP session protection with two requirements:

Session protection is provided for core loopback IP addresses only.

The LDP session must remain operational for one hour when the WAN link on PE-XR1 fails.

Which configuration must the team implement on PE-XR1?

A.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

B.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

C.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 60

end

D.

configure terminal

ipv4 access-list LDP-SESSION-PROTECTION

permit ipv4 172.31.255.0 0.0.0.255 any

permit ipv4 10.0.0.0 0.0.255.255 any

!

mpls ldp

session protection for LDP-SESSION-PROTECTION duration 3600

end

Refer to the exhibit.

A network engineer at a large ISP Is configuring telemetry streams to monitor the health status of PE routers on the network using gRPC dial-out. The PE routers are located at several data centers in different physical locations, and they are using IS-IS and BGP for routing. Which additional configuration must the engineer implement on the PE routers to meet the goal?

A.

Text, letter Description automatically generated

B.

Text Description automatically generated

C.

Graphical user interface, text Description automatically generated

D.

Text, letter Description automatically generated

Refer to the exhibit. The link between Office A and Office B is running at 90% load, and occasionally the CPU on router R1 is overloaded. The company implemented QoS for business-critical applications at both offices as a temporary solution. A network engineer must update the R1 configuration to 600 ms to reduce CPU load and limit downtime after connection failure to avoid data loss. Which action meets this requirement?

A.

Configure the fast-hello feature for OSPF with the command ip ospf dead-interval minimal hello-multiplier 3.

B.

Configure BFD demand mode with the command bfd-demand timer 150 interval 250 retransmit 5.

C.

Configure BFD non-echo mode with the command echo interval 250 minimal 300 echo-multiplier 2.

D.

Configure BFD echo mode with the command bfd interval 150 min_rx 200 multiplier 3.

Page: 7 / 7
Total 452 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved