Cisco 350-501 Practice Exam Questions

  • 370 Questions With Valid Answers
  • Updation Date : 8-Dec-2023
  • 97% Pass Rate
Looking for reliable study material for the Cisco 350-501 exam? DumpsBox offers top-notch study material for the Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) exam. Our comprehensive 350-501 practice test questions, provided in PDF format, are designed to reinforce your understanding of 350-501 Dumps.

With our detailed Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) question-answer approach, you'll be fully equipped to tackle the complexities of the 350-501 exam and achieve success. You can rely on our authentic Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) braindumps to strengthen your knowledge and excel in CCIE Service Provider.
Online Learning

Premium Price Packages

PDF File

$35.99 3 Month Free Updates

recommended

PDF + Online Test Engine

$49.99 3 Month Free Updates

Only Test Engine

$40.99 3 Month Free Updates

Online Learning
Online Learning

What You will Learn

Preparing for the Cisco 350-501 exam can be a challenging task, but with the help of Dumpsbox, you can achieve a brilliant success in your certification journey. Dumpsbox offers a reliable and comprehensive solution to assist you in your Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) preparation, ensuring you are fully equipped to pass the CCIE Service Provider exam with flying colors. Dumpsbox provides an extensive range of exam materials that cover all the topics and concepts included in the 350-501 exam. Their study materials are designed by experts in the field, ensuring accuracy and relevance to the CCIE Service Provider exam syllabus. With Dumpsbox, you can be confident that you have access to the most up-to-date and comprehensive resources for your Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) exam preparation.
Online Learning

Course Details

  • Printable PDF
  • Online Test Engine
  • Valid Answers
  • Regular Updates
Online Learning

Course Features

  • 3 Month Free Updates
  • Latest Questions
  • 24/7 Customer Support
  • 97% Pass Rate



Related Exams

350-501 Test Sample Questions:



Refer to the exhibit. A network engineer observed congestion between routers R1 and R4,
which are connected on a point-to-point link. Two servers that reside on networks on R1
and R4 generate heavy traffic between them with most traffic going from R4 to R1. To
improve overall performance, the engineer wants to drop inbound packets that exceed a
configured threshold, without disrupting traffic that passes from R4 to R3. Which action
must the engineer take to resolve the issue?

   

Implement traffic policing to drop packets that exceed the given threshold

   

Implement FIFO to queue excess traffic for transmission when bandwidth is available

   

Implement traffic shaping to drop excess packets

   

Implement a service policy in the outbound direction on each interface on the link to tag
traffic exiting each router.


Implement traffic policing to drop packets that exceed the given threshold






router(config)# route-map blackhole-trigger
router(config-route-map)# match tag 777
router(config-route-map)# set ip next-hop 10.0.1.1
router(config-route-map)# set origin igp
router{config-route-map)# set community no-export
Refer to the exhibit. EIGRP is running across the core to exchange internal routes, and
each router maintains iBGP adjacency with the other routers on the network. An operator
has configured static routes on the edge routers R1 and R2 for IP address 10.0.1.1, which
is used as a black hole route as shown. Which configuration should the operator implement
to the management router to create a route map that will redistribute tagged static routes
into BGP and create a static route to blackhole traffic with tag 777 that is destined to the
server at 192.168.10.100?

   

router(config)# router bgp 55100
router(config-router)# redistribute static route-map blackhole-trigger
router(config)# ip route 10.0.1.1 255.255.255.255 Null0 tag 777

   

router(config)# router bgp 55100
router(config-router)# redistribute static route-map blackhole-trigger
router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777

   

router(config)# router bgp 55100
router(config-router)# redistribute connected
router(config)# ip route 192.168.10.100 255.255.255.255 tag 777

   

router(config)# router bgp 55100
router(config-router)# redistribute connected route-map blackhole-trigger
router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777


router(config)# router bgp 55100
router(config-router)# redistribute static route-map blackhole-trigger
router(config)# ip route 192.168.10.100 255.255.255.255 Null0 tag 777






Refer to the exhibit.

A network engineer must configure an LDP neighborship between two newly installed
routers that are located in two different offices. Router 1 is the core router in the network
and it has already established OSPF adjacency with router 2. On router 1 and router 2. interface fa0/0 is configured for BFD. Which additional configuration must the engineer
apply to the two devices to meet the requirement?

   

Router1(config)#int fa0/0 -
Router1(config-if)#mpls ldp autoconfig
Router2(config)#router ospf 1 -
Router2(config-router)#mpls ip

   

Router1(config)#int fa0/0 -
Router1(config-if)#mpls ip -
Router1(config-if)#mpls ldp discovery transport-address interface
Router2(config)#int fa0/0 -
Router2(config-if)#mpls ip -
Router2(config-if)#mpls ldp discovery transport-address interface

   

Route1(config)#int fa0/0 -
Router1(config-if)#mpls ldp autoconfig
Router1(config-if)#mpls ldp discovery interface
Router2(config)#router ospf 1 -
Router2(config-router)#mpls ldp autoconfig
Router2(config-if)#mpls ldp discovery interface

   

Router1(config)#int fa0/0 -
Router1(config-if)#mpls ip -
Router2(config)#router ospf 1 -
Router2(config-router)#mpls ldp autoconfig


Router1(config)#int fa0/0 -
Router1(config-if)#mpls ip -
Router2(config)#router ospf 1 -
Router2(config-router)#mpls ldp autoconfig






What is the function of Cisco NFV infrastructure platform?

   

It does not have a security audit feature.

   

It does not offer high availability.

   

It offers consistent performance.

   

It offers decentralized logging.


It offers consistent performance.






Refer to the exhibit.

A network engineer must implement SNMPv3 on a Cisco IOS XR router running BGP. The
engineer configures SNMPv3 to use SHA for authentication and AES for privacy on the
routers, which are in a different data center in the same exchange as other routers. The
engineer must also verify the associated MIB view family name, storage type, and status.
Which set of actions meets these requirements?

   

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1
priv 3des 128 PrivPass2 and use show snmp interface to verify the configuration.

   

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and
use show snmp mib to verify the configuration.

   

Add configuration snmp-server user AuthUser group2 remote 10.1.1.1 v3 auth sha and
use show snmp engineid to verify the configuration.

   

Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1
priv aes 128 PrivPass2 and use show snmp view to verify the configuration.


Add configuration snmp-server user UserJustMe GrpMonitoring v3 auth sha AuthPass1
priv aes 128 PrivPass2 and use show snmp view to verify the configuration.






An engineer must implement QoS to prioritize traffic that requires better service throughout
the network. The engineer started by configuring a class map to identify the high-priority
traffic. Which additional tasks must the engineer perform to implement the new QoS policy?

   

Attach the class map to a policy map that sets the minimum bandwidth allocated to the
classified traffic and designates the action to be taken on the traffic.

   

Attach the class map to a policy map that designates the action to be taken on the
classified traffic and then attach the policy map to an interface using a service policy.

   

Attach the class map to a policy map within a VRF to segregate the high-priority traffic
and then attach the policy map to an interface in another VRF.

   

Create a route map to manipulate the routes that are entered into the routing table and
then attach the route map to an interface using a service policy.


Attach the class map to a policy map that designates the action to be taken on the
classified traffic and then attach the policy map to an interface using a service policy.






How does an untrusted interface at the boundary of an administrative domain handle
incoming packets?

   

It remarks all values to a CoS of 0.

   

It forwards only traffic with a DSCP value of 48.

   

It translates the IP precedence value to the corresponding DSCP value.

   

It drops all traffic ingressing the network.


It remarks all values to a CoS of 0.






A network engineer is testing an automation platform that interacts with Cisco networking
devices via NETCONF over SSH. In accordance with internal security requirements:
NETCONF sessions are permitted only from trusted sources in the 172.16.20.0/24 subnet.
CLI SSH access is permitted from any source.
Which configuration must the engineer apply on R1?

   

configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 1
access-list 1 permit 172.16.20.0 0.0.0.255
netconf ssh acl 1
line vty 0 4
transport input ssh
end

   

configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 2
access-list 1 permit 172.16.20.0 0.0.0.255
access-list 1 permit any
netconf ssh
line vty 0 4
access-class 1 in
transport input ssh
end

   

configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 1
access-list 1 permit 172.16.20.0 0.0.0.255
access-list 2 permit any
netconf ssh
line vty 0 4
access-class 2 in
transport input ssh
end

   

configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 2
access-list 1 permit 172.16.20.0 0.0.0.255
netconf ssh acl 1
line vty 0 4
transport input ssh
end


configure terminal
hostname R1
ip domain-name mydomain.com
crypto key generate rsa
ip ssh version 2
access-list 1 permit 172.16.20.0 0.0.0.255
netconf ssh acl 1
line vty 0 4
transport input ssh
end






Refer to the exhibit. The application server in the data center hosts voice, video, and data
applications over the internet. The data applications run more slowly than the voice and
video applications. To ensure that all applications run smoothly, the service provider
decided to implement a QoS policy on router PER 2 to apply traffic shaping. Which two
actions must an engineer take to implement the task? (Choose two.)

   

Configure the scheduling function to handle delayed packets.

   

Enable packet remarking for priority traffic.

   

Configure a queue to buffer excess traffic.

   

Set the token value for secondary traffic.

   

Set a threshold to discard excess traffic.


Configure the scheduling function to handle delayed packets.






The NOC team must update the BGP forwarding configuration on the network with these
requirements:
BGP peers must establish a neighborship with NSF capability and restart the session for
the capability to be exchanged after 120 seconds.
BGP peers must delete routes after 360 seconds of inactivity.
Which action meets these requirements?

   

Set the BGP restart-time to 120 seconds and the BGP ha-mode sso to 360 seconds.

   

Set the stalepath-time to 120 seconds and the BGP restart-time to 360 seconds.

   

Set the BGP ha-mode sso to 120 seconds and the BGP restart-time to 360 seconds.

   

Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.


Set the BGP restart-time to 120 seconds and the stalepath-time to 360 seconds.






An engineer is developing a configuration script to enable dial-out telemetry streams using
gRPC on several new devices. TLS must be disabled on the devices. Which configuration
must the engineer apply on the network?

 

   

Option A

   

Option B

   

Option C

   

Option D


Option A






Refer to the exhibit. Tier 2 ISP A on AS 653 is connected to two Tier 1 ISPs on AS 321 and
AS 51 respectively. The network architect at ISP A is planning traffic flow inside the
network to provide predictable network services. Cisco Express Forwarding is disabled on
the edge router. How should the architect implement BGP to direct all traffic via the Tier 1
ISP with next-hop 7.4.5.2?

   

Implement the BGP routing protocol and run the bgp deterministic-med command.

   

Implement MP-BGP with a 4-byte AS number with the bgp best path compare-routerid
command.

   

Implement the BGP routing protocol and the maximum-paths 2 configuration.

   

Implement BGP route-reflector functionality with the bgp always-compare-med
configuration.


Implement the BGP routing protocol and run the bgp deterministic-med command.






Refer to the exhibit. The network team must implement MPLS LDP session protection with
two requirements:
Session protection is provided for core loopback IP addresses only.
The LDP session must remain operational for one hour when the WAN link on PE-XR1
fails.
Which configuration must the team implement on PE-XR1?

   

configure terminal
ipv4 access-list LDP-SESSION-PROTECTION
permit ipv4 172.31.255.0 0.0.0.255 any
!
mpls ldp
session protection for LDP-SESSION-PROTECTION duration 60
end

   

configure terminal
ipv4 access-list LDP-SESSION-PROTECTION
permit ipv4 172.31.255.0 0.0.0.255 any
!
mpls ldp
session protection for LDP-SESSION-PROTECTION duration 3600
end

   

configure terminal
ipv4 access-list LDP-SESSION-PROTECTION
permit ipv4 172.31.255.0 0.0.0.255 any
permit ipv4 10.0.0.0 0.0.255.255 any
!
mpls ldp
session protection for LDP-SESSION-PROTECTION duration 60
end

   

configure terminal
ipv4 access-list LDP-SESSION-PROTECTION
permit ipv4 172.31.255.0 0.0.0.255 any
permit ipv4 10.0.0.0 0.0.255.255 any
!
mpls ldp
session protection for LDP-SESSION-PROTECTION duration 3600
end


configure terminal
ipv4 access-list LDP-SESSION-PROTECTION
permit ipv4 172.31.255.0 0.0.0.255 any
permit ipv4 10.0.0.0 0.0.255.255 any
!
mpls ldp
session protection for LDP-SESSION-PROTECTION duration 3600
end






What are two features of 6RD IPv6 transition mechanism? (Choose two.)

   

It inserts IPv4 bits into an IPv6 delegated prefix.

   

It uses a native IPv6-routed network between CE routers and the BR router.

   

It allows dynamic 1:N translation of IPv6 address.

   

It uses stateful automatic 6to4 tunnels between CE routers and the BR router.

   

It uses stateless automatic 6to4 tunnels between CE routers and the BR router.


It inserts IPv4 bits into an IPv6 delegated prefix.


It uses stateless automatic 6to4 tunnels between CE routers and the BR router.






What is a characteristic of MVPN?

   

It bypasses the use of MPLS in the service provider core and transmits packets using IP
only.

   

It uses pseudowires to route unicast and broadcast traffic over either a service provider
MPLS or IP core.

   

It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.

   

It creates GRE tunnels to route multicast traffic over a service provider IP core.


It allows VRF traffic to use the service provider MPLS VPN to route multicast traffic.





Online Learning

Why You Need Dumps?

Dumpsbox provides detailed explanations and insights for each question and answer in their Cisco 350-501 study materials. This allows you to understand the underlying concepts and reasoning behind the correct answers. By gaining a deeper understanding of the subject matter, you will be better prepared to tackle the diverse range of questions that may appear on the CCIE Service Provider exam.

Real Exam Scenario Simulation:

One of the key features of Dumpsbox is the practice tests that simulate the real exam scenario. These Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) braindumps are designed to mirror the format, difficulty level, and time constraints of the actual 350-501 exam. By practicing with these simulation tests, you can familiarize yourself with the exam environment, build confidence, and improve your time management skills.

65 +

Persons Passed in Last 3 Months

70 +

Copies Sold

8 +

Experts Reviewed File