Practical of 352-001 test preparation materials and samples for Cisco certification for candidates, Real Success Guaranteed with Updated 352-001 pdf dumps vce Materials. 100% PASS CCDE Written Exam exam Today!
♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 352-001 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Q11. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?
A. IP packets with broadcast IP source addresses
B. IP packets with identical source and destination IP addresses
C. fragmented packets with the do-not-fragment bit set
D. IP packets with the multicast IP source address
E. IP packets with the multicast IP destination address
F. IP packets with the destination IP address 0.0.0.0
Q12. Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data?
Q13. You need to redesign your NMS system so that it can collect information without causing adverse effects in the network, such as high CPU utilization on network devices and network instability. Which two options will minimize the impact of the trusted NMS polling your network in this situation? (Choose two.)
A. Implement SNMP community restrictions that are associated with an ACL.
B. Unload unused MIBs from the network devices.
C. Prevent polling of large tables through the use of SNMP OID restrictions.
D. Disable unused OIDs and MIBs on the NMS systems.
Q14. You are working on a network design plan for a company with approximately 2000 sites. The sites will be connected using the public Internet. You plan to use private IP addressing in the network design, which will be routed without NAT through an encrypted WAN network. Some sites will be connected to the Internet with dynamic public IP addresses, and these addresses may change occasionally. Which VPN solution will support these design requirements?
A. GET VPN must be used, because DMVPN does not scale to 2000 sites.
B. DMVPN must be used, because GET VPN does not scale to 2000 sites.
C. GET VPN must be used, because private IP addresses cannot be transferred with DMVPN through the public Internet.
D. DMVPN must be used, because private IP addresses cannot be transferred with GET VPN through the public Internet.
E. GET VPN must be used, because DMVPN does not support dynamic IP addresses for some sites.
F. DMVPN must be used, because GET VPN does not support dynamic IP addresses for some sites.
Q15. Which mechanism should be added to a network design to identify unidirectional Spanning Tree Protocol failures through BPDU loss?
B. loop guard
C. BPDU guard?
D. root guard
Q16. You are the lead IP network designer for a new service provider called XYZ, and you are working closely with the CTO to finalize design requirements. The CTO informs you that they want to transport IPv6 prefixes of customers through the XYZ network at this time; however, they need your advice on whether to deploy dual stack or MPLS 6PE/6VPE. Which two options do you recommend? (Choose two.)
A. Build a dual-stack network. Enable BGP in the core. Redistribute EBGP routes into IGP.
B. Use MPLS 6PE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
C. Use MPLS 6VPE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
D. Prepare the dual-stack infrastructure from the beginning, even if BGP prefixes would have to be announced via IPv4 in case you decide to maintain the BGP-free core.
Q17. When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two.)
A. Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.
B. Serialization delay depends not only on the line rate of the interface but also on the size of the packet.
C. Serialization delays are invariable because they depend only on the line rate of the interface.
D. Serialization delays are variable because they depend only on the size of the packet being serialized.
E. Serialization delay is the time required to transmit the packet on the physical media.
Q18. You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network:
A pool of servers is accessed by numerous data centers and remote sites.
The servers are accessed via a cluster of firewalls.
The firewalls are configured properly and are not dropping traffic.
The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?
A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster
B. Poison certain subnets by adding static routes to Null0 on the server farm core switches.
C. Unicast Reverse Path Forwarding in strict mode
D. Unicast Reverse Path Forwarding in loose mode
Q19. Tesla Radio GmbH is going to build a new research lab network based on a set of switches that would connect to their existing enterprise network. They are considering a design that would guarantee loop-free behavior within the set of switches. The design would also allow the group of switches to seem like a single switch to the enterprise network, because it is owned by a separate administrative group. Which Spanning Tree Protocol should be used to support the design requirements?
A. IEEE 802.1w
B. IEEE 802.1D
C. IEEE 802.1s
D. IEEE 802.1p
Q20. You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)
C. Multichassis EtherChannel over Pseudowire