Exam Code: 352-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCDE Written Exam
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 352-001 Exam.
♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 352-001 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q31. You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.)
Q32. Which two factors can significantly affect the OSPF network convergence time? (Choose two.)
A. the tuning of OSPF LSA timers
B. the number of OSPF routes
C. the diameter of the OSPF network
D. different processor capabilities of devices
Q33. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?
A. IP packets with broadcast IP source addresses
B. IP packets with identical source and destination IP addresses
C. fragmented packets with the do-not-fragment bit set
D. IP packets with the multicast IP source address
E. IP packets with the multicast IP destination address
F. IP packets with the destination IP address 0.0.0.0
Q34. A network designer is redesigning an enterprise campus network to ensure that Ethernet switches proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in the fiber pair, leading to looping. Which feature could be implemented in the design to allow the Spanning Tree Protocol on the switches to be protected?
A. loop guard
B. UniDirectional Link Detection
C. UniDirectional Link Detection aggressive mode
D. root guard
Q35. What are three key design principles when using a classic hierarchical network model? (Choose three.)
A. The core layer controls access to resources for security.
B. The core layer should be configured with minimal complexity.
C. The core layer is designed first, followed by the distribution layer and then the access layer.
D. A hierarchical network design model aids fault isolation.
E. The core layer provides server access in a small campus.
F. A hierarchical network design facilitates changes.
Q36. Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.)
Q37. When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two.)
A. Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.
B. Serialization delay depends not only on the line rate of the interface but also on the size of the packet.
C. Serialization delays are invariable because they depend only on the line rate of the interface.
D. Serialization delays are variable because they depend only on the size of the packet being serialized.
E. Serialization delay is the time required to transmit the packet on the physical media.
Q38. You are designing an optical network. Your goal is to ensure that your design contains the highest degree of resiliency. In which two ways will you leverage a wavelength-switched optical network solution in your network design? (Choose two.)
A. a wavelength-switched optical network assigns routing and wavelength information
B. a wavelength-switched optical network takes linear and nonlinear optical impairment calculation into account
C. a wavelength-switched optical network guarantees restoration based strictly on the shortest path available
D. a wavelength-switched optical network eliminates the need for dispersion compensating units in a network
Q39. What is a key role for the access layer in a hierarchical network design?
A. The access layer provides a security, QoS, and policy trust boundary.
B. The access layer provides an aggregation point for services and applications.
C. The access layer serves as a distribution point for services and applications.
D. The access layer can be used to aggregate remote users.
Q40. Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which one of these addresses would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?
A. inside local
B. outside local
C. inside global
D. outside global