Cisco 352-001 ExamCCDE Written Exam

Total Question: 249 Last Updated: Jun 13,2019
  • Updated 352-001 Dumps
  • Based on Real 352-001 Exams Scenarios
  • Free 352-001 pdf Demo Available
  • Check out our 352-001 Dumps in a new PDF format
  • Instant 352-001 download
  • Guarantee 352-001 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

May 2017 updated: Actualtests Cisco 352-001 practice exam 31-40

Your success in Cisco 352-001 is our sole target and we develop all our 352-001 braindumps in a way that facilitates the attainment of this target. Not only is our 352-001 study material the best you can find, it is also the most detailed and the most updated. 352-001 Practice Exams for Cisco CCDE 352-001 are written to the highest standards of technical accuracy.

Q31. The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.) 

A. It is not recommended on BGP route reflectors. 

B. It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable. 

C. It can be set on a router during the startup process for a fixed period of time. 

D. It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node. 

E. It can be set on a router until other interacting protocols have signaled convergence. 

Answer: BCE 


Q32. You are working on a network design for Customer A. This design should consider fast convergence features, and it was agreed that BFD should be used for faster link-transition detection. Which three options apply to the use of the echo function in BFD? (Choose three.) 

A. It can be used with asynchronous mode. 

B. BFD control packets are not required. 

C. It can be enabled individually in each direction. 

D. It has the advantage of testing the forwarding path on the remote system. 

E. The rate of periodic transmission of BFD control packets should be increased. 

Answer: ACD 


Q33. In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence time? (Choose three.) 

A. BFD 

B. Ethernet port debounce timers 

C. link-state tracking 

D. object tracking 

E. fast IGP hello 

Answer: ADE 


Q34. You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops. vPC removes Layer 2 loops while providing redundancy through which mechanism? 

A. dual-active detection 

B. address synchronization 

C. strict forwarding rules 

D. Bridge Assurance 

Answer:


Q35. You have been hired by Acme Corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks. When evaluating the network, which switch security option should you investigate to ensure that authorized ARP responses take place according to known IP-to-MAC address mapping? 

A. ARP rate limiting 

B. DHCP snooping 

C. Dynamic ARP Inspections 

D. IP Source Guard 

Answer:


Q36. When designing a large full mesh network running OSPF, how would you reduce LSA repetition? 

A. Elect a DR and BDR. 

B. Use access control lists to control outbound advertisements. 

C. Choose one or two routers to re-flood LSA information. 

D. Put each of the point-to-point links in your full mesh networking into a separate area. 

Answer:


Q37. A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection? 

A. IP addresses of the GRE tunnel endpoints 

B. IPsec configuration 

C. MTU size on the GRE tunnel 

D. encapsulation of the GRE tunnel 

Answer:


Q38. Refer to the exhibit. 

Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.) 

A. PVRSTP on all switches 

B. REP on all switches 

C. MST on all switches 

D. BPDU guard on Switch A and Switch D 

E. 8032 on ring A-B-C-D 

Answer: BE 


Q39. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances? 

A. IP packets with broadcast IP source addresses 

B. IP packets with identical source and destination IP addresses 

C. fragmented packets with the do-not-fragment bit set 

D. IP packets with the multicast IP source address 

E. IP packets with the multicast IP destination address 

F. IP packets with the destination IP address 0.0.0.0 

Answer:


Q40. When creating a network design, which one of these options provides for basic Layer 2 client isolation to prevent broadcast traffic exposure? 

A. SVI 

B. VLAN 

C. routed port 

D. edge port 

Answer:


Related 352-001 Articles