Cisco 350-501 Implementing and Operating Cisco Service Provider Network Core Technologies Online Training
Cisco 350-501 Online Training
The questions for 350-501 were last updated at Sep 15,2025.
- Exam Code: 350-501
- Exam Name: Implementing and Operating Cisco Service Provider Network Core Technologies
- Certification Provider: Cisco
- Latest update: Sep 15,2025
Refer to the exhibit:
Assume all other configurations are correct and the network is otherwise operating normally.
Which conclusion can you draw about the neighbor relationship between routers R1 and R2?
- A . The neighbor relationship will be up only if the two devices have activated the correct neighbor relationships under the IPv4 address family
- B . The neighbor relationship is down because R1 believes R2 is in AS 65012.
- C . The neighbor relationship is up
- D . The neighbor relationship is down because the loco I-as value for R2 is missing in the R1 neighbor statement
Which statement about the Cisco MPLS TE forwarding adjacency feature is true?
- A . It enables the headend and tailend routers to establish a bidirectional tunnel
- B . It enables the tailend router to advertise routes to the headend router over the tunnel
- C . It enables the MPLS core to use EIGRP as the routing protocol
- D . It enables the Cisco MPLS TE tunnel to be advertised into the running IGP.
Refer to the exhibit:
R1 is connected to two service providers and is under a DDoS attack.
Which statement about this design is true if uRPF in strict mode is configured on both interfaces?
- A . R1 accepts source addresses on interface gigabitethernet0/1 that are private addresses
- B . R1 permits asymmetric routing as long as the AS-RATH attribute entry matches the connected AS
- C . R1 drops destination addresses that are routed to a null interface on the router
- D . R1 drops all traffic that ingresses either interface that has a FIB entry that exits a different interface
A router is configured to perform MPLS LDP graceful restart.
Which three steps are included when the RP sends an LDP initialization to a neighbor to establish an LDP session? (Choose three)
- A . Reconnect Timeout field
- B . Learn from Neighbor (N) flag, set to 1
- C . Graceful restart capability in OPEN message
- D . Recovery Time field
- E . Learn from Network (L.) flage, set to 1
- F . Type-9 LSA
Refer to the exhibit:
Which information is provided for traceback analysis when this configuration is applied?
- A . BGP version
- B . packet size distribution
- C . source interface
- D . IP sub flow cache
Refer to the exhibit:
Which statement describes the effect of this configuration?
- A . It applies a service policy to all interfaces remarking HTTP traffic
- B . It creates an ACL named WEB that filters HTTP traffic.
- C . It matches HTTP traffic for use in a policy map
- D . It modifies the default policy map to allow all HTTP traffic through the router
Why do Cisco MPLS TE tunnels require a link-state routing protocol?
- A . Link-state routing protocols use SPF calculations that the tunnel endpoints leverage to implement the tunnel
- B . The link-state database provides a data repository from which the tunnel endpoints can dynamically select a source ID
- C . The tunnel endpoints can use the link-state database to evaluate the entire topology and determine the best path
- D . The link state database provides segmentation by area, which improves the path-selection process
Which additional feature does MPLS DiffServ tunneling support?
- A . matching EXP and DSCP values
- B . interaction between MPLS and IGP
- C . using GRE tunnels to hide markings
- D . PHB layer management
You are writing an RPL script to accept routes only from certain autonomous systems Consider this code.
If you apply this code to BGP filters, which effect does the code have on your router?
- A . denies routes from AS 7070
- B . allows routes from AS 7077
- C . denies routes from AS 7007
- D . allows routes from AS 770
Refer to the exhibit:
Which statement supports QPPB implementation?
- A . QoS policies are identified in the MPLS forwarding table
- B . QoS policies rely exclusively on BGP attributes to manipulate traffic
- C . QoS policies use BGP to gain full coverage on the network.
- D . QPPB policies affect only egress traffic