Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

350-501 Exam Dumps - Cisco CCNP Service Provider Questions and Answers

Question # 124

Drag and drop the methods of Cisco MPLS TE tunnel traffic assignment from the left onto their characteristics on the right.

Options:

Buy Now
Question # 125

Drag and drop the functions from the left onto the Path Computation Element Protocol roles on the right.

Options:

Buy Now
Question # 126

An engineer working for telecommunication company with an employee id: 3715 15 021 needs to secure the LAN network using a prefix list Which best practice should the engineer follow when he implements a prefix list?

Options:

A.

An engineer must use non sequential sequence numbers in the prefix list so that he can insert additional entries later.

B.

The final entry in a prefix list must be /32

C.

An engineer must identity the prefix list with a number only

D.

An engineer must include only the prefixes for which he needs to log activity.

Buy Now
Question # 127

Refer to the exhibit.

A NOC engineer is configuring label-based forwarding from CSR to the EPC gateway. Cell-site operation and maintenance for IPv4 traffic between 10.20.10.1 and 192.168.10.10 is already up. CR1 and CR2 are configured as route reflectors for AG1 and AG2. Which action completes the configuration?

Options:

A.

Remove address-family labeled-unicast from the BGP session-group infra on AG1 for neighbor-group core.

B.

Apply the BGP_Egress_Filter route policy to the BGP neighbor-group packet core on AG1.

C.

Configure AG1 to allocate a label to the BGP routes that are received in the BGP session group transport.

D.

Configure AG1 to allow the 300:100 and 200:100 communities in the BGP_Egress_Filter route policy.

Buy Now
Question # 128

Refer to the exhibit. The network is running OSPF, and access to the internet is provided through router RB. Router RA connects to several servers that provide services to users connected to RC and RF. User traffic is growing, and the engineering team wants to mitigate the future potential for congestion when the servers are experiencing heavy use.

Which action must the team take to maintain better network performance?

Options:

A.

Implement MPLS and install a Cisco MPLS TE tunnel to route high-priority traffic via a preferred path.

B.

Implement ACLs to manage traffic flowing over individual links.

C.

Implement class maps to categorize traffic and apply them to policies to manage traffic flow.

D.

Implement OSPF point-to-point links to eliminate the need for DR election and the associated traffic.

Buy Now
Question # 129

Refer to the exhibit:

P3 and PE4 are at the edge of the service provider core and serve as ABR routers Aggregation areas are on either side of the core.

Which statement about the architecture is true?

Options:

A.

If each area is running its own IGP. the ABR routers must redistribute the IGP routing table into BGP

B.

To support seamless MPLS. TDP must be used as the label protocol

C.

If each area is running its own IGP. BGP must provide an end-to-end MPLS LSP

D.

To support seamless MPLS, the BGP route reflector feature must be disabled

Buy Now
Question # 130

Refer to the exhibit. Customer C-101 in ASN 65123 requested that the ISP blackholes a host route 198.19.44.195, to which the customer is receiving a significant amount of malicious traffic. Which configuration must the network engineer implement on the trigger router TR-1 to fulfill the request without affecting other IP destinations in the customer's block?

Options:

A.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

B.

configure terminal

ip prefix-list BLACKHOLE-PERMIT seq 5 permit 198.19.44.195/32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

C.

configure terminal

ip prefix-list BLACKHOLE-PERMIT permit 198.19.44.0/24 le 32

ip route 198.19.44.195 255.255.255.255 Null0 tag 9090

end

D.

Configure terminal

Buy Now
Question # 131

What are the four primary components of an API?

Options:

A.

methods, actions, objects, and formats

B.

GET, PUT, DELETE, and SET

C.

Modularity, Abstraction, Stability, and Resources

D.

running config, startup config, VLAN database, and routing database

Buy Now
Question # 132

Refer to the exhibit.

While troubleshooting the OSPF adjacency between routers R1 and R2 an engineer noticed that both routers are stuck in the EXCHANGE/EXSTART state. What should the engineer fix to solve the ongoing issue?

Options:

A.

match IPv4 addresses

B.

match OSPF areas

C.

match OSPF network types

D.

match MTU values

Buy Now
Question # 133

Refer to the exhibit:

This configuration is being applied on an IOS XR router.

Which statement about this configuration is true?

Options:

A.

It is used to set up configuration to poll network data

B.

It is used to enable gRPC

C.

It is used to create a streaming subscription with a 60-second interval

D.

It is used to create a streaming subscription with a 600-second interval

Buy Now
Question # 134

An engineer must apply an 802.1ad-compliant configuration to a new switchport with these requirements:

The switchport must tag all traffic when it enters the port.

The switchport is expected to provide the same level of service to traffic from any customer VLAN.

Which configuration must the engineer use?

Options:

A.

interface GigabitEthernet1/0/1

switchport mode trunk

switchport trunk encapsulation dot1q

encapsulation ISL

bridge-domain 12

B.

interface GigabitEthernet1/0/1

ethernet dot1ad uni c-port

service instance 12

encapsulation dot1q

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

C.

interface GigabitEthernet1/0/1

ethernet dot1ad uni s-port

service instance 12

encapsulation default

rewrite ingress tag push dot1ad 21 symmetric

bridge-domain 12

D.

interface GigabitEthernet1/0/1

ethernet dot1ad nni

service instance 12

encapsulation dot1ad

bridge-domain 12

Buy Now
Question # 135

A network engineer must implement an ACL-based solution to mitigate availability issues on a web service that is hosted on a server at IP address 172.16.15.18/23. Access to the web server should be allowed over HTTP from RFC 1918 addresses only. The network architect has already enabled PMTUD in the network. Which ACL configuration must the engineer implement to complete the task?

Options:

A.

access-list 198 deny ip any host 172.16.15.18 fragments

access-list 198 permit 6 10.0.0.0 0.255.255.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 permit 6 172.16.0.0 0.0.255.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 permit 6 192.168.0.0 0.0.0.255 172.16.15.18 0.0.1.255 eq 80

access-list 198 deny ip any any

B.

access-list 198 deny ip any host 172.16.15.18 ip-fragments

access-list 198 permit 18 10.10.0.0 0.0.255.0 172.16.15.18 255.255.254.0

access-list 198 permit 18 172.16.0.0 255.255.0 172.16.15.18 255.255.254.0

access-list 198 permit 18 192.168.0.0 255.255.0 172.16.15.18 255.255.254.0

access-list 198 deny tcp any any

C.

access-list 199 deny ip any host 172.16.15.18 tcp-fragments

access-list 199 permit tcp 10.0.0.0 0.0.255.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 permit tcp 172.16.0.0 0.0.0.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 permit tcp 192.168.0.0 0.0.0.255 172.16.15.18 0.0.254.255 eq 80

access-list 199 deny ip any any

D.

access-list 199 deny tcp any host 172.16.15.18 http-fragments

access-list 199 permit 16 10.10.0.0 0.255.255.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 permit 16 172.16.0.0 0.0.255.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 permit 16 192.168.0.0 0.0.255 172.16.15.18 0.0.2.253 eq 80

access-list 199 deny tcp any any

Buy Now
Question # 136

Which BGP attribute is used first when determining the best path?

Options:

A.

origin

B.

AS path

C.

local preference

D.

weight

Buy Now
Question # 137

Refer to the exhibit.

What reestablishes the OSPF neighbor relationship between Router 1 and Router 2?

Options:

A.

authentication is added to the configuration

B.

correct wildcard mask is used on Router 2

C.

OSPF process IDs match

D.

hello intervals match

Buy Now
Question # 138

Which action occurs during the traceback phase of the six-phase approach to service provider security?

Options:

A.

Trace action occur flows from the stacked sections of the network toward the network edges

B.

Detect unusual activity or behavior and activate appropriate measures after an alert is raised.

C.

Review the whole attack-handling process

D.

Mitigate the attack that flows using various mechanisms.

Buy Now
Exam Code: 350-501
Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies (350-501 SPCOR)
Last Update: Jan 29, 2026
Questions: 547
350-501 pdf

350-501 PDF

$28.5  $94.99
350-501 Engine

350-501 Testing Engine

$33  $109.99
350-501 PDF + Engine

350-501 PDF + Testing Engine

$43.5  $144.99