exam questions

Exam 350-501 All Questions

View all questions & answers for the 350-501 exam

Exam 350-501 topic 1 question 14 discussion

Actual exam question from Cisco's 350-501
Question #: 14
Topic #: 1
[All 350-501 Questions]


Refer to the exhibit. An engineer is preparing to implement data plane security configuration.
Which statement about this configuration is true?

  • A. Router 2 is the router receiving the DDoS attack.
  • B. Router 1 must be configured with uRPF for the RTBH implementation to be effective.
  • C. Router 1 is the trigger router in a RTBH implementation.
  • D. Router 2 must configure a route to null 0 for network 192.168.1.0/24 for the RTBH implementation to be complete.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
wilmo
Highly Voted 3 years, 5 months ago
Correct answer i C.
upvoted 15 times
...
ciccioriccio
Highly Voted 3 years, 4 months ago
agreed, C is the correct answer!
upvoted 9 times
...
kirrim
Most Recent 4 days, 16 hours ago
Selected Answer: C
In the example given, Router1 has the trigger config on it, which redistributes any static routes with tag 1 to its iBGP neighbors. HOWEVER, this configuration is missing a critical part of the RTBH config, which is that the route-map should also set the next-hop to 192.0.2.1 or whatever prefix is configured on the PE routers to point to Null0. Router2 is the PE router, which receives the incoming prefix and routes it to 192.0.2.1, which it already has a route to Null0 in place for. It's also configured with uRPF, which is a requirement for RTBH. HOWEVER, the configuration is missing the "reachable-via any" to enable loose-mode uRPF. Bottom line, the example config shown in the question is broken on both routers, and would never work. But it's clear what the intent is. C is clearly correct, R1 is the trigger router. A is sneaky as R2 could be the one receiving the attack, BUT it doesn't have to be... in RTBH, all edge routers in the ASN would be set up to receive and obey the black hole trigger route, regardless of which edge router is actually receiving the incoming attack that the SOC is responding to.
upvoted 1 times
...
thejag
10 months, 1 week ago
Selected Answer: C
C is the closest IMO. The trigger router is Router 1, that is where we have the route-map configured. It is missing the set ip next-hop. The static route on Router 2 is also missing a static route but it would NOT be a static route for 192.168.1.0/24 because that is a NETWORK, it should be a static route to a host IP, the same host IP used for the "set ip next-hop". That is the blackhole route.
upvoted 2 times
...
damanloox
1 year, 6 months ago
Router 1 does not do RTBH - the whole point of RTBH is to drop traffic at the edge. And for that to happen R1 would have to set a next hop to some value that would in turn be configured on all edges to null0... So whatever that config is - it's not RTBH.
upvoted 1 times
...
spyroskanel89
1 year, 8 months ago
Correct answer is D. (static route to Null0 interface is missing) The trigger (Router 1 in our case) must have an iBGP peering relationship with all the edge routers or, if using route reflectors, must have an iBGP peer relationship with all the route reflectors in every cluster. The trigger must also be configured to redistribute static routes to its iBGP peers. The PEs (Router 2 in our case) must have a static route for an unused IP address space (for example, 192.0.2.1/32) set to Null0. Loose URPF must be configured on all external facing interfaces at the edges (PEs). https://www.cisco.com/c/dam/en_us/about/security/intelligence/blackhole.pdf
upvoted 1 times
NetworkYoda72
1 year, 3 months ago
I disagree with this. The static route needs to be set to null0 for the bogus nhop the trigger router's route-map should set when redistributing the tagged route (the attackers network). Ironically enough the route-map is not setting a bogus nhop in this example (missing config). Answer D would set the route-map unconditionally to the attackers network and not the bogus nhop for the prefix learned from the trigger router via BGP.
upvoted 3 times
...
...
sirup12
1 year, 10 months ago
Selected Answer: C
agree with you C is correct
upvoted 2 times
...
craterman
1 year, 11 months ago
Selected Answer: C
Correct answer is C https://www.cisco.com/c/dam/en_us/about/security/intelligence/blackhole.pdf
upvoted 2 times
...
Cprest
2 years, 1 month ago
C is the correct answer!
upvoted 1 times
...
beenardino
2 years, 6 months ago
Answer is C. Router one is acting like a black hole: "RTBH filtering provides a method for quickly dropping undesirable traffic at the edge of the network, based on either source addresses or destination addresses by forwarding it to a null0 interface. Null0 is a pseudointerface that is always up and can never forward or receive traffic. Forwarding packets to null0 is a common way to filter packets to a specific destination."
upvoted 4 times
...
Jjsa1994
3 years ago
correct answer is A
upvoted 1 times
...
EdgardoAC
3 years, 2 months ago
I agree that C is correct, the link provides additional information.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago