Cisco (350-501-SPCOR) Exam Questions And Answers page 4
Refer to the exhibit. A network engineer is implementing QoS services. Which two statements about the qos-group keyword on Cisco IOS XR are true? (Choose two.)
QoS group marking occurs on the ingress.
The QoS group numbering corresponds to priority level.
QoS group can be used in fabric QoS policy as match criteria.
It cannot be used with priority traffic class.
Routing Technologies
Services
Refer to the exhibit. An engineer is implementing BGP selective prefix suppression. The router must advertise only 10.16.4.0/24, 10.16.5.0/24, and summarized route 10.16.0.0/21, and suppress 10.16.6.0/24. Which configuration must the engineer apply to the router?
Router (config)# router bgp 300
Router(config-router)# aggregate-address 10.16.6.0 255.255.252.0 as-set suppress-map SuppressMap
Router(config-router)# aggregate-address 10.16.6.0 255.255.252.0 as-set suppress-map SuppressMap
Router (config)# router bgp 300
Router(config-router)# aggregate-address 10.16.0.0 255.255.255.0 as-set suppress-map unSuppressMap
Router(config-router)# aggregate-address 10.16.0.0 255.255.255.0 as-set suppress-map unSuppressMap
Router (config)# router bgp 300
Router(config-router)# aggregate-address 10.16.0.0 255.255.248.0 as-set suppress-map SuppressMap
Router(config-router)# aggregate-address 10.16.0.0 255.255.248.0 as-set suppress-map SuppressMap
Router (config)# router bgp 300
Router(config-router)# aggregate-address 10.16.6.0 255.255.255.0 as-set suppress-map SuppressMap
Router(config-router)# aggregate-address 10.16.6.0 255.255.255.0 as-set suppress-map SuppressMap
Transport Technologies
Routing Technologies
Refer to the exhibit. Router 1 was experiencing a DDoS attack that was traced to interface gigabitethernet0/1.
Which statement about this configuration is true?
Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1.
Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface.
Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface.
Router 1 accepts source addresses on interface gigabitethernet0/1 that are private addresses.
Architecture
Services
Refer to the exhibit. A network engineer is deploying SNMP configuration on client s routers. Encrypted authentication must be included on router 1 to provide security and protect message confidentiality. Which action should the engineer perform on the routers to accomplish this task?
snmp-server community public
snmp-server group group1 v3 auth
snmp-server host 192.168.0.254 informs version 3 auth testuser config
snmp-server user testuser group1 remote 192.168.0.254 v3 auth md5 testpassword
Architecture
Services
Refer to the exhibit. On R1, which output does the show isis neighbors command generate?
Architecture
Routing Technologies
Refer to the exhibits. Which information is provided for traceback analysis when this configuration is applied?
source interface
packet size distribution
IP sub flow cache
BGP version
Routing Technologies
Services
Refer to the exhibit. What reestablishes the OSPF neighbor relationship between Router 1 and Router 2?
OSPF process IDs match
authentication is added to the configuration
correct wildcard mask is used on Router 2
hello intervals match
Routing Technologies
Services
Refer to the exhibit. BGPsec is implemented on R1, R2, R3, and R4. BGP peering is established between neighboring autonomous systems.
Which statement about implementation is true?
BGP updates from the iBGP peers are appended with a community of local-as.
BGP updates from the all BGP peers are appended with a community of no-export.
BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator.
BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature.
Architecture
Services
Refer to the exhibit. Which condition must be met by the OSPF peer of router R1 before the two devices can establish communication?
The OSPF peer must use clear-text authentication.
The OSPF peer must be configured as an OSPF stub router.
The interface on the OSPF peer may have a different key ID, but it must use the same key value as the configured interface.
The interface on the OSPF peer must use the same key ID and key value as the configured interface.
Routing Technologies
Services
Refer to the exhibit Router R1 and its peer R2 reside on the same subnet in the network. If an engineer implements this configuration to R1, how does it make connections to R2?
R1 establishes TCP connections that are authenticated with a clear-text password.
R1 establishes UDP connections that are authenticated with an MD5 password.
R1 establishes UDP connections that are authenticated with a clear-text password.
R1 establishes TCP connections that are authenticated with an MD5 password.
Architecture
Transport Technologies
Comments