DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CCNP 350-501 Certification Pracatice Questions & Mock Tests, Cisco Service Provider SPCOR exam | SPOTO

Prepare effectively for the Cisco Service Provider SPCOR exam (CCNP 350-501) with our comprehensive certification practice questions and mock tests. This 120-minute exam is integral to obtaining CCNP and CCIE Service Provider Certifications, assessing candidates' abilities in implementing essential service provider network technologies. Our practice tests cover key areas such as core architecture, services, networking, automation, quality of services, security, and network assurance, providing targeted preparation for success. With a focus on exam practice, sample questions, and mock exams, our materials simulate the exam environment, enhancing understanding and readiness. Access our exam dumps, exam questions and answers, and exam simulator to optimize your exam preparation and achieve certification success.
Take other online exams

Question #1
While implementing TTL security, you issue the PE(config-router-af)#neighbor 2.2.2.2 ttl-security hops 2 command.After you issue this command, which BGP packets does the PE accept?
A. to 2
B. from 2
C. to 2
D. from 2
View answer
Correct Answer: D
Question #2
Refer to the exhibits. Which information is provided for traceback analysis when this configuration is applied?
A. source interface
B. packet size distribution
C. IP sub flow cache
D. BGP version
View answer
Correct Answer: C
Question #3
A network operator working for a telecommunication company with an employee Id: 4065 96080 it trying to implement BFD configuration on an existing network of Cisco devices Which task must the engineer perform to enable BFD on the interfaces?
A. Disable Cisco Express Forwarding on the interfaces
B. Disable SSO on the interfaces
C. Remove any static routes that point to the interfaces
D. Remove the log option from any ACLs on the interfaces
View answer
Correct Answer: C
Question #4
Refer to the exhibit. Router 1 was experiencing a DDoS attack that was traced to interface gigabitethernet0/1.Which statement about this configuration is true?
A. Router 1 accepts all traffic that ingresses and egresses interface gigabitethernet0/1
B. Router 1 drops all traffic that ingresses interface gigabitethernet0/1 that has a FIB entry that exits a different interface
C. Router 1 accepts source addresses that have a match in the FIB that indicates it is reachable through a real interface
D. Router 1 accepts source addresses on interface gigabitethernet0/1 that are private addresses
View answer
Correct Answer: C
Question #5
Refer to the exhibit. BGPsec is implemented on R1, R2, R3, and R4. BGP peering is established between neighboringautonomous systems.Which statement about implementation is true?
A. BGP updates from the iBGP peers are appended with a community of local-as
B. BGP updates from the all BGP peers are appended with a community of no-export
C. BGP updates from the eBGP peers are appended with an additional AS path value that is statically set by the domain administrator
D. BGP updates from the eBGP peers are appended with a BGPsec attribute sequence that includes a public key hash and digital signature
View answer
Correct Answer: D
Question #6
You are configuring MPLS traffic-engineering tunnels in the core. Which two ways exist for the tunnel path across the core?(Choose two.)
A. The dynamic path option is supported only with IS-IS
B. Tunnels can be configured with dynamic path or explicitly defined path
C. A zero bandwidth tunnel is not a valid option
D. The bandwidth statement creates a “hard” reservation on the link
E. Tunnel links inherit IGP metrics by default unless overridden
View answer
Correct Answer: BE
Question #7
Why do Cisco MPLS TE tunnels require a link-state routing protocol?
A. The link-state database provides segmentation by area, which improves the path-selection process
B. The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID
C. Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel
D. The tunnel endpoints use the link-state database to evaluate the entire topology and determine the best path
View answer
Correct Answer: D
Question #8
Which statement about the Cisco MPLS TE forwarding adjacency feature is true?
A. It enables the MPLS core to use EIGRP as the routing protocol
B. It enables the Cisco MPLS TE tunnel to be advertised into the running IGP
C. It enables the tailend router to advertise routes to the headend router over the tunnel
D. It enables the headend and tailend routers to establish a bidirectional tunnel
View answer
Correct Answer: B
Question #9
Simulation 6 Refer to the exhibit. R1 router bgp 100 address-family ipv4 nei 172.16.0.2 route-map R1-TO-R2 in network 10.1.1.1 mask 255.255.255.255 copy run start R2 router bgp 200 address-family ipv4 network 10.2.2.2 mask 255.255.255.255 nei 172.16.0.1 route-map R2-TO-R1 in copy run start
A. ee the solution below
View answer
Correct Answer: A
Question #10
Which component is similar to an EVPN instance?
A. router distinguisher
B. MPLS label
C. IGP router ID
D. VRF
View answer
Correct Answer: D
Question #11
Refer to the exhibit. An engineer is preparing to implement data plane security configuration.Which statement about this configuration is true?
A. Router 2 is the router receiving the DDoS attack
B. Router 1 must be configured with uRPF for the RTBH implementation to be effective
C. Router 1 is the trigger router in a RTBH implementation
D. Router 2 must configure a route to null 0 for network 192
View answer
Correct Answer: A
Question #12
Which configuration mode do you use to apply the mpls ldp graceful-restart command in IOS XE Software?
A. MPLS LDP neighbor
B. interface
C. MPLS
D. global
View answer
Correct Answer: D
Question #13
Simulation 7 Refer to the exhibit. R1 key chain AUTH_ISIS key 2 key-string C1sco! exit int range et0/0 , et1/0 isis authen key-chain AUTH_ISIS ip isis isis metric 15 Copy run start R2 key chain AUTH_ISIS key 2 key-string C1sco! exit int range et0/0 , et1/0 isis authen key-chain AUTH_ISIS ip isis isis metric 20 Copy run start R3 key chain AUTH_ISIS key 2 key-string C1sco! exit int range et0/0 , et1/0 isis authen key-chain AUTH_ISIS ip isis isis metric 25 Copy run start
A. ee the solution below
View answer
Correct Answer: A
Question #14
Drag and drop the functionalities from the left onto the target fields on the right.
A. Mastered
B. Not Mastered
View answer
Correct Answer: C
Question #15
Which configuration modifies Local Packet Transport Services hardware policies?
A. Option A
B. Option B
C. Option C
D. Option D
View answer
Correct Answer: C
Question #16
Refer to the exhibit. P3 and PE4 are at the edge of the service provider core and serve as ABR routers. Aggregation areasare on either side of the core.Which statement about the architecture is true?
A. To support seamless MPLS, the BGP route reflector feature must be disabled
B. If each area is running its own IGP, BGP must provide an end-to-end MPLS LSP
C. If each area is running its own IGP, the ABR routers must redistribute the IGP routing table into BGP
D. To support seamless MPLS, TDP must be used as the label protocol
View answer
Correct Answer: B
Question #17
After you analyze your network environment, you decide to implement a full separation model for Internet access and MPLSL3VPN services.For which reason do you make this decision?
A. It enables EGP and IGP to operate independently
B. It enables you to choose whether to separate or centralize each individual service
C. It is easier to manage a system in which services are mixed
D. It requires only one edge router
View answer
Correct Answer: A
Question #18
Which statement about TLS is accurate when using RESTCONF to write configurations on network devices'?
A. It requires certificates for authentication
B. It is provided using NGINX acting as a proxy web server
C. It is used for HTTP and HTTPS requests
D. It is not supported on Cisco devices
View answer
Correct Answer: BE
Question #19
Refer to the exhibit. R1 is connected to two service providers and is under a DDoS attack.Which statement about this design is true if URPF in strict mode is configured on both interfaces?
A. R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface
B. R1 drops destination addresses that are routed to a null interface on the router
C. R1 permits asymmetric routing as long as the AS-PATH attribute entry matches the connected AS
D. R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses
View answer
Correct Answer: A
Question #20
What is the effect of this configuration?
A. R1 supports a graceful restart operation on the peer, even if graceful restart is disabled on the peer
B. R1 supports a peer that is configured for LDP SSO/NSF as the peer recovers from an outage
C. R1 failovers only to a peer that is configured for LDP SSO/NSF
D. R1 failovers to any peer
View answer
Correct Answer: C
Question #21
Which Cisco software OS uses monolithic architecture?
A. NX-OS
B. IOS XE
C. IOS XR
D. IOS
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: