Cisco 352-001 ExamCCDE Written Exam

Total Question: 501 Last Updated: Oct 11,2018
  • Updated 352-001 Dumps
  • Based on Real 352-001 Exams Scenarios
  • Free 352-001 pdf Demo Available
  • Check out our 352-001 Dumps in a new PDF format
  • Instant 352-001 download
  • Guarantee 352-001 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

What Renew 352-001 Is?

We provide real 352-001 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 352-001 Exam quickly & easily. The 352-001 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 352-001 dumps pdf and vce product and material, you can easily pass the 352-001 exam.

Q61. A company has these requirements for access to their wireless and wired corporate LANs using 802.1x: 

. Client devices that are corporate assets and have been joined to the Active 

Directory domain are allowed access. 

. Personal devices must not be allowed access. 

. Clients and access servers must be mutually authenticated. 

Which solution meets these requirements? 

A. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with user authentication 

B. Extensible Authentication Protocol-Transport Layer Security with machine authentication 

C. Extensible Authentication Protocol-Transport Layer Security with user authentication 

D. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with machine authentication 

Answer:


Q62. Refer to the exhibit. 

Assume that no multicast optimization is done on LAN switches A and B. Which feature can be used to optimize multicast traffic forwarding in this situation? 

A. Enable IGMP snooping querier on both switches. 

B. Configure a static MAC entry for the multicast server. 

C. Disable IGMP snooping on both switches. 

D. Disable the IGMP query election process. 

E. Enable PIM Snooping on both switches. 

Answer:


Q63. In a large enterprise network with multiple data centers and thousands of access devices, OSPF is becoming unstable due to link flapping. The current design has the access devices multihomed to large aggregation routers at each of the data centers. How would you redesign the network to improve stability? 

A. Add a layer of regional Layer 3 aggregation devices, but leave the ABR function on the data center aggregation routers. 

B. Add a layer of regional Layer 2 aggregation devices, but leave the ABR function on the data center aggregation routers. 

C. Add a layer of regional Layer 3 aggregation devices and move the ABR function to the regional aggregation device. 

D. Add a layer of regional Layer 2 aggregation devices and move the ABR function to the regional aggregation device. 

Answer:


Q64. When designing a network, which two security features should be added to the design to protect hosts from potential IPv6 neighbor discovery denial of service attacks at the access layer? (Choose two.) 

A. SEND 

B. RA Guard 

C. IKEv2 

D. IPsec 

E. DMVPNv6 

Answer: AB 


Q65. Refer to the exhibit. 

You are asked to design this OSPF network to converge within 60 ms for unicast packets after a topology change due to a single link failure. Which technology can be enabled while conforming to the design requirements? 

A. Loop-Free Alternates 

B. BFD 

C. IGP neighbor timer tuning 

D. IGP SPF timer tuning 

E. RSVP-TE Fast Reroute 

Answer:


Q66. Your company requires two diverse multihop External Border Gateway Protocol peerings to a partner network. Which two methods would you use to improve lost peer detection? (Choose two.) 

A. Use Bidirectional Forwarding Detection for the peers. 

B. Use Selective Address Tracking and match the peers. 

C. Use subsecond keepalives for the peers. 

D. Use subsecond hold timers for the peers. 

E. Use Fast Peering Session Deactivation for the peers. 

F. Use subsecond minimum route advertisement Interval timers for the peers. 

Answer: BE 


Q67. Refer to the exhibit. 

A customer runs OSPF with Area 5 between its aggregation router and an internal router. When a network change occurs in the backbone, Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5. You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area. How can you accomplish this task? 

A. Set Area 5 to stubby at the ABR anyway. 

B. Increase the bandwidth on the connection between Router A and Router B. 

C. Turn on LSA throttling on all devices in Area 5. 

D. Implement LSA filtering on the ABR, allowing summary routes and preventing more specific routes into Area 5. 

E. Create a virtual link to Area 0 from Router B to the ABR. 

Answer:


Q68. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances? 

A. IP packets with broadcast IP source addresses 

B. IP packets with identical source and destination IP addresses 

C. fragmented packets with the do-not-fragment bit set 

D. IP packets with the multicast IP source address 

E. IP packets with the multicast IP destination address 

F. IP packets with the destination IP address 0.0.0.0 

Answer:


Q69. When creating a network design that routes an IGP over L2VPNs, with which device does the remote CE router form an IGP adjacency? 

A. the hub site PE router 

B. the hub site CE router 

C. the directly connected PE router 

D. The IGP will not establish adjacency over the MPLS network. 

Answer:


Q70. A network designer is redesigning an enterprise campus network to ensure that Ethernet switches proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in the fiber pair, leading to looping. Which feature could be implemented in the design to allow the Spanning Tree Protocol on the switches to be protected? 

A. loop guard 

B. UniDirectional Link Detection 

C. UniDirectional Link Detection aggressive mode 

D. root guard 

Answer:


Related 352-001 Articles