Curious about Actual Cisco CCIE (350-501) Exam Questions?

Here are sample Cisco Implementing and Operating Cisco Service Provider Network Core Technologies (350-501) Exam questions from real exam. You can get more Cisco CCIE (350-501) Exam premium practice questions at TestInsights.

Page: 1 /
Total 452 questions
Question 1

A mod-size service provider uses L2VPN as its standard for connectivity between offices. A small company wants the service provider to connect the company's two sites across the service provider core. To meet service requirements, the service provider must extend the layer 2 domain between the company's two locations. Which configuration must the engineer apply to implement an attachment circuit between the two sites using a VLAN tag of 12?


Correct : C

The correct configuration for extending the layer 2 domain between the company's two locations involves setting up the interface with L2 transport, specifying the encapsulation method as dot1q with the VLAN tag of 12, and applying the appropriate rewrite ingress tag rules. This setup ensures that the VLAN tag is preserved across the service provider's core, maintaining the layer 2 domain continuity.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

According to RFC5305 on IS-IS extensions for traffic engineering, what is the 4-octet sub-TLV type 10 of extended IS-IS reachability TLV type 22?


Correct : B

RFC 5305 extends the IS-IS protocol for traffic engineering by specifying new information that an Intermediate System (router) can place in Link State Protocol Data Units (LSPs). Sub-TLV type 10 of the extended IS-IS reachability TLV type 22 is used to specify the maximum reservable link bandwidth.This is an important parameter for traffic engineering as it defines the amount of bandwidth that can be reserved by traffic engineering algorithms for use in constrained-path computations for MPLS traffic engineering Label Switched Paths (LSPs).Reference: RFC 53051.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Refer to the exihibit.

Refer to the exhibit. ISP_A and ISP_B use AS numbers 38321 and 16213 respectively. After a network engineer reloaded router R1, the BGP session with R2 failed to establish. The engineer confirmed BGP next-hop availability with a connectivity test between the router loopback addresses 10.121.123.2 and 10.121.123.1, as well as between interfaces Gi1/1 and Gi1/2. EBGP multihop has been configured on both routers. Which action must the engineer take to resolve the issue?


Correct : C

After a router reload, BGP sessions may fail to re-establish due to incorrect source interface configurations for BGP sessions. Since EBGP multihop has been configured, it's essential that the BGP session uses the correct source interface for establishing the connection. By configuring the neighbor update-source command with the loopback interface on R2, the BGP session will use the stable loopback address rather than the physical interface, which can change state.This ensures that the BGP session remains stable and is not affected by interface states.Reference: BGP Troubleshooting Cheat Sheet With Examples - Catchpoint2, BGP session stuck in Idle state after NSRP failover - Juniper Networks3, BGP Session is Disconnected - Network Playbook


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

Refer to the exihibit.

Refer to the exhibit. ISP_A is about to launch a new internet service. ISP_A is already providing MPLS VPN Layer 3 services to Customer_A and Customer_B, which are connected to ISP_A via OSPF. A network engineer completed the BGP and VRF configurations on R2 to support the new internet service. Which additional action completed the launch?


Correct : B

To complete the launch of the new internet service, ISP_A needs to ensure that routes are shared between different VRFs for Customer_A and Customer_B. Importing route-target 62:101 into the customer VRFs on R1 and R3 allows for the exchange of routes between these VRFs, facilitating the necessary connectivity for the new service.Reference:=Cisco SPCOR


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

Simulation 7


Correct : A

R1

key chain AUTH_ISIS

key 2

key-string C1sco!

exit

int range et0/0 , et1/0

isis authen key-chain AUTH_ISIS

ip isis

isis metric 15

Copy run start

R2

key chain AUTH_ISIS

key 2

key-string C1sco!

exit

int range et0/0 , et1/0

isis authen key-chain AUTH_ISIS

ip isis

isis metric 20

Copy run start

R3

key chain AUTH_ISIS

key 2

key-string C1sco!

exit

int range et0/0 , et1/0

isis authen key-chain AUTH_ISIS

ip isis

isis metric 25

Copy run start


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 91   
Total 452 questions