Cisco 352-001 ExamCCDE Written Exam

Total Question: 249 Last Updated: Jun 13,2019
  • Updated 352-001 Dumps
  • Based on Real 352-001 Exams Scenarios
  • Free 352-001 pdf Demo Available
  • Check out our 352-001 Dumps in a new PDF format
  • Instant 352-001 download
  • Guarantee 352-001 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

[Verified] 352-001 Cisco free practice test 1-15 (Apr 2016)

Certified of 352-001 actual exam materials and cram for Cisco certification for client, Real Success Guaranteed with Updated 352-001 pdf dumps vce Materials. 100% PASS CCDE Written Exam exam Today!

2016 Apr 352-001 Study Guide Questions:

Q1. As a service provider you must support a Layer 2 virtualization protocol that does not include the use of label switching. Which option can meet this design requirement? 

A. VPLS 

B. VRF-Lite 

C. QinQ 

D. 802.3ad 

Answer: C 


Q2. Refer to the exhibit. 


When designing an MPLS-based LAN extension between DC-1 and DC-2, what are three advantages of deploying VSS? (Choose three.) 

A. Layers 2, 3, and 4 flow-based load balancing 

B. native VSS and MEC failover without using scripts 

C. sub-second failover 

D. required to configure VPLS 

E. failover time depends on Cisco IOS EEM and STP convergence 

F. limited VLAN-based VPLS traffic hashing 

Answer: A,B,C 


Q3. You are deploying a nationwide intranet solution for a company with 4 data centers and 400 remote branches connected via a provider-based solution. As part of the network design, you must ensure efficient content distribution of training material to remote sites. Which two VPN technologies leverage replication in the network core and provide for efficient bandwidth optimization? (Choose two.) 

A. VPLS 

B. EoMPLS 

C. MPLS Layer 3 VPN 

D. GRE 

E. GET VPN 

Answer: CE


Q4. Refer to the exhibit. 


In the DWDM network, a ring topology carries multiple services between two sites. Which option describes the employed protection design? 

A. Y-cable protection 

B. Splitter protection 

C. Client protection 

D. UDLD 

E. FEC protection 

Answer: C 


Q5. An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A, providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds, which are sourced at the central site and consist of 20 groups at 5 Mb/s each. Which service provider recommendation is the most scalable? 

A. EoMPLS-based VPLS already carries multicast traffic in a scalable manner. 

B. Replicate the multicast traffic on the P routers. 

C. Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites. 

D. Use GRE tunnels to carry the streams between sites. 

Answer: C 


352-001 exam cost

Renew 352-001 testing engine:

Q6. You are designing a large Frame Relay WAN for a customer. The routing protocol is OSPF. What is the effect on the routing table if the WAN interfaces are configured as point-to-multipoint? 

A. Only a route for the DR will be present in the routing table. 

B. Configuring point-to-multipoint has no effect on the routing table. The route that is configured with the area command will be seen in the routing table. 

C. Multipoint interfaces dynamically add the network of the connected interface. 

D. Multipoint interfaces dynamically add a /32 route for each neighbor in the WAN. 

Answer: D 


Q7. A company has these requirements for access to their wireless and wired corporate LANs using 802.1x: 

. Client devices that are corporate assets and have been joined to the Active 

Directory domain are allowed access. 

. Personal devices must not be allowed access. 

. Clients and access servers must be mutually authenticated. 

Which solution meets these requirements? 

A. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with user authentication 

B. Extensible Authentication Protocol-Transport Layer Security with machine authentication 

C. Extensible Authentication Protocol-Transport Layer Security with user authentication 

D. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with machine authentication 

Answer: B 


Q8. During a network design review, it is recommended that the network with a single large area should be broken up into a backbone and multiple nonbackbone areas. There are differing opinions on how many ABRs are needed for each area for redundancy. What would be the impact of having additional ABRs per area? 

A. There is no impact to increasing the number of ABRs. 

B. The SPF calculations are more complex. 

C. The number of externals and network summaries are increased. 

D. The size of the FIB is increased. 

Answer: C 


Q9. After the recent implementation of a new design that incorporated GRE tunnels into the network, the network operations staff is seeing the following syslog message in multiple routers on the network - %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing. 

From a design perspective, what was not taken into account prior to implementing the solution? 

A. The neighboring routers cannot respond within the specified hold time. 

B. The interface on the router that is the source of the tunnel is down. 

C. The interface on the neighboring router that is the source of the tunnel is down. 

D. The router is learning the route to the tunnel destination address using the tunnel interface. 

E. The tunnel interface on the router is not receiving any keepalives within the specified hold time. 

Answer: D 


Q10. You have designed a network to support two offices connected by a T1. Your router serial interfaces will be configured with encapsulation PPP. What will happen to your EIGRP neighbors if there is an LCP failure once your network is implemented? 

A. Your neighbors will drop after the EIGRP timers expire. 

B. Your neighbors will stay up because the link has not gone down. 

C. Your neighbors will drop immediately. 

D. Your neighbors will drop and EIGRP will begin the query process. 

Answer: D 


352-001 download

Accurate 352-001 bible:

Q11. You are designing a Group Encrypted Transport virtual private network solution for an existing branch network. The existing network has the following characteristics: 

. 50 remote sites (with an additional 30 remote sites expected over the next 3 years) . Connectivity between all sites is via Multiprotocol Label Switching Layer 3 virtual private network service from a single provider . Open Shortest Path First is the routing protocol used between provider edge and customer edge routers . The customer edge routers will become group members performing the encryption between sites 

Which additional routing protocol would you use for the overlay routing between the group members? 

A. Open Shortest Path First (with a different process ID) 

B. Enhanced Interior Gateway Routing Protocol 

C. No additional protocol is necessary. 

D. External Border Gateway Protocol 

E. Routing Information Protocol Version 2 

F. Next Hop Resolution Protocol 

Answer: C 


Q12. During a corporate merger, a network designer is asked for a solution that will provide connectivity between the two enterprise networks. The solution must have the ability to support video sessions so that the CEO can message merger activities to the employees. The designer decides to consider multicast as a transport with MSDP to provide redundancy. Which transport feature does the network designer need to apply to the interconnecting firewall to ensure that Source-Active messages between the MSDP peers can be sent in both enterprise networks? 

A. unicast over a UDP connection 

B. multicast over a UDP connection 

C. unicast over a TCP connection 

D. multicast over a TCP connection 

Answer: C 


Q13. Refer to the exhibit. 


Which single design aspect should be configured on the ABRs to reduce the impact of WAN upgrades for spoke routers on the core of the network? 

A. route summarization 

B. stub area 

C. route filtering 

D. not-so-stubby area 

Answer: A 


Q14. A green data center is being deployed and a design requirement is to be able to readily scale server virtualization. Which IETF standard technology can provide this requirement? 

A. Transparent Interconnection of Lots of Links 

B. fabric path 

C. data center bridging 

D. unified fabric 

Answer: A 


Q15. Refer to the exhibit. 


Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.) 

A. PVRSTP on all switches 

B. REP on all switches 

C. MST on all switches 

D. BPDU guard on Switch A and Switch D 

E. 8032 on ring A-B-C-D 

Answer: BE 


Related 352-001 Articles