Ucertify 352-001 Questions are updated and all 352-001 answers are verified by experts. Once you have completely prepared with our 352-001 exam prep kits you will be ready for the real 352-001 exam without a problem. We have Most up-to-date Cisco 352-001 dumps study guide. PASSED 352-001 First attempt! Here What I Did.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 352-001 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/352-001-exam-dumps.html

Q131. You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network: 

A pool of servers is accessed by numerous data centers and remote sites. 

The servers are accessed via a cluster of firewalls. 

The firewalls are configured properly and are not dropping traffic. 

The firewalls occasionally cause asymmetric routing of traffic within the server data center. 

Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers? 

A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster 

B. Poison certain subnets by adding static routes to Null0 on the server farm core switches. 

C. Unicast Reverse Path Forwarding in strict mode 

D. Unicast Reverse Path Forwarding in loose mode 

Answer:


Q132. Voice traffic between two campus enterprise networks is growing. The network designers decide to add a second 10-Mb Metro Ethernet service parallel to their original 10-Mb service in order to provide more bandwidth and diversity. The QoS profile will be the same on the new 10-Mb service due to the voice stability on the first Metro Ethernet link. When the second link is added to the OSPF domain, which traffic design consideration would have the most impact on the voice traffic when both links are active? 

A. per-destination IP address basis 

B. per-flow basis 

C. per-packet basis 

D. per-source IP address basis 

Answer:


Q133. Refer to the exhibit. 

An enterprise is migrating its single-area OSPF network from a Frame Relay WAN service to an MPLS L3VPN service. Frame Relay will remain in only a few sites that require increased resiliency via two different WAN connections. 

Which feature could be used in the ?MPLS VPN service provider network to support the design requirement by ensuring that during normal operation, intersite traffic will only use the MPLS VPN service and not the old Frame Relay service? 

A. virtual links 

B. sham links 

C. multiple stub areas 

D. super backbone 

Answer:


Q134. Refer to the exhibit. 

Four customer sites are connected through an EoMPLS-based VPLS over an MPLS provider. You are migrating from OSPF to multi-level IS-IS as the routing protocol to run on the four CE routers, and connectivity between all four sites is required. You want to control which CE or CEs will be elected as the Designated Intermediate System. Which two key aspects should be taken into account? (Choose two.) 

A. The DIS role for Level1 and Level2 can be performed by different routers. 

B. The CE with the second highest priority will be elected as the backup DIS on the LAN segment. 

C. One of the CE routers will be elected as the DIS based on interface priority then highest MAC address. 

D. It is recommended to use point-to-point link type on the CEs. 

E. If a new CE router is added to the VPLS cloud with a lower interface priority it will become the DIS. 

Answer: AC 


Q135. You are designing a Group Encrypted Transport virtual private network solution for an existing branch network. The existing network has the following characteristics: 

. 50 remote sites (with an additional 30 remote sites expected over the next 3 years) . Connectivity between all sites is via Multiprotocol Label Switching Layer 3 virtual private network service from a single provider . Open Shortest Path First is the routing protocol used between provider edge and customer edge routers . The customer edge routers will become group members performing the encryption between sites 

Which additional routing protocol would you use for the overlay routing between the group members? 

A. Open Shortest Path First (with a different process ID) 

B. Enhanced Interior Gateway Routing Protocol 

C. No additional protocol is necessary. 

D. External Border Gateway Protocol 

E. Routing Information Protocol Version 2 

F. Next Hop Resolution Protocol 

Answer:


Q136. If a network design must support rapid convergence on half-duplex interfaces, which IEEE 802.1w capability should be used? 

A. root guard 

B. proposal-agreement handshake 

C. loop guard 

D. UplinkFast 

Answer:


Q137. A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365? 

A. 224.0.0.60 

B. 232.192.0.60 

C. 239.128.0.60 

D. 239.193.0.60 

Answer:


Q138. As part of the security protocol for your network design, you have designated that option 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request? 

A. switch MAC address and VLAN, module, and port 

B. remote ID and circuit ID 

C. switch IP address and VLAN, module, and port 

D. switch MAC address and switch IP address 

Answer:


Q139. Which design concern should be accounted for in all Layer 3 virtualization technologies? 

A. Layer 3 redundancy 

B. packet sizing 

C. application usage 

D. Layer 3 stability 

Answer:


Q140. Which three methods allow storage access across an IP network? (Choose three.) 

A. FCIP 

B. Fiber Channel over GRE 

C. Fiber Channel over L2TPv3 

D. iSCSI 

E. NFS 

Answer: ADE