Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)

Here you have the best Cisco 350-501 practice exam questions

  • You have 347 total questions to study from
  • Each page has 5 questions, making a total of 70 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 15, 2024
Question 1 of 347

DRAG DROP -

Drag and drop the OSs from the left onto the correct descriptions on the right.

Select and Place:

    Correct Answer:

    Reference:

    https://specialties.bayt.com/en/specialties/q/276369/what-is-the-key-difference-between-ios-ios-xe-and-ios-xr-for-cisco-devices/

Question 2 of 347

Refer to the exhibit. P3 and PE4 are at the edge of the service provider core and serve as ABR routers. Aggregation areas are on either side of the core.

Which statement about the architecture is true?

    Correct Answer: B

    If each area in a network architecture is running its own Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP) must be utilized to provide an end-to-end Multiprotocol Label Switching (MPLS) Label Switched Path (LSP). BGP is necessary to interconnect different areas and ensure continuous MPLS forwarding across them, as each IGP domain would not inherently understand the MPLS labels from other areas. Thus, BGP plays a crucial role in facilitating seamless MPLS by providing the necessary LSPs that span different IGP areas.

Question 3 of 347

Which component is similar to an EVPN instance?

    Correct Answer: D

    An EVPN instance (EVI) is conceptually similar to a Virtual Routing and Forwarding (VRF) instance. Both are used to segment networks in a similar way. An EVI represents a specific VPN instance on a Provider Edge (PE) router, serving the same role as a VRF, which is also used to create isolated routing instances in a network.

Question 4 of 347

Why do Cisco MPLS TE tunnels require a link-state routing protocol?

    Correct Answer: D

    Cisco MPLS TE tunnels require a link-state routing protocol because the tunnel endpoints use the link-state database to evaluate the entire topology and determine the best path. Link-state protocols provide comprehensive information about the network's topology, which is essential for determining optimal routing paths for traffic engineering. This capability is crucial for the efficient implementation of MPLS TE tunnels, as it allows for better path calculation and network resource management.

Question 5 of 347

Refer to the exhibit. BGPsec is implemented on R1, R2, R3, and R4. BGP peering is established between neighboring autonomous systems.

Which statement about implementation is true?

    Correct Answer: D

    BGPsec is designed to provide security for BGP updates by ensuring the authenticity and integrity of the AS path information. When BGPsec is implemented, BGP updates from eBGP peers include a BGPsec attribute sequence. This sequence contains a digital signature and a public key hash, which verifies the legitimacy of the origin and sequence of the AS path. This ensures that each hop in the path is validated using cryptographic methods, preventing route hijacking and other malicious activities.