Cisco 352-001 ExamCCDE Written Exam

Total Question: 249 Last Updated: Jul 13,2019
  • Updated 352-001 Dumps
  • Based on Real 352-001 Exams Scenarios
  • Free 352-001 pdf Demo Available
  • Check out our 352-001 Dumps in a new PDF format
  • Instant 352-001 download
  • Guarantee 352-001 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $39.99

Buy Now Free Trial

[Download] 352-001 Cisco free practice exam 21-30 (Mar 2018)

Certified of 352-001 free practice test materials and pack for Cisco certification for candidates, Real Success Guaranteed with Updated 352-001 pdf dumps vce Materials. 100% PASS CCDE Written Exam exam Today!

Q21. Refer to the exhibit. 

You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.) 

A. When router B fragments packets after the encryption, router C must reassemble these fragmented packets. 

B. When router B fragments packets before the encryption, router C must reassemble these fragmented packets. 

C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets. 

D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets. 

E. When router A fragments packets, router C must reassemble these fragmented packets. 

F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets. 

Answer: ADF 

Q22. What are two benefits of following a structured hierarchical and modular design? (Choose two.) 

A. Each component can be designed independently for its role. 

B. Each component can be managed independently based on its role. 

C. Each component can be funded by different organizations based on its role. 

D. Each component can support multiple roles based on the requirements. 

E. Each component can provide redundancy for applications and services. 

Answer: AB 

Q23. A network design shows two routers directly connected to an Ethernet switch using optical connections. There is an OSPF adjacency between the routers. In this design, which solution will ensure that interface down detection is reported as quickly as possible to the IGP? 

A. optimized OSPF SPF timers 

B. Bidirectional Forwarding Detection 

C. automatic protection switching 

D. optimized OSPF LSA timers 

E. Ethernet OAM CFM monitoring 


Q24. You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network: 

A pool of servers is accessed by numerous data centers and remote sites. 

The servers are accessed via a cluster of firewalls. 

The firewalls are configured properly and are not dropping traffic. 

The firewalls occasionally cause asymmetric routing of traffic within the server data center. 

Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers? 

A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster 

B. Poison certain subnets by adding static routes to Null0 on the server farm core switches. 

C. Unicast Reverse Path Forwarding in strict mode 

D. Unicast Reverse Path Forwarding in loose mode 


Q25. Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.) 

A. Solution should be resistant to sensor failure. 

B. Solution should allow for stream normalization. 

C. Solution should not impact jitter and latency for voice traffic. 

D. Solution should allow for signature-based pattern matching. 

E. Solution should allow to deny packets inline. 

Answer: ACD 

Q26. When creating a design plan for IPv6 integration, you decide to use stateless encapsulation of IPv6 packets into IPv4 tunnels between subscriber CPEs and a border relay. Which deployment technique allows for this functionality? 

A. 6rd 

B. Dual-Stack Lite 

C. 4rd 



Q27. A junior engineer is implementing one of your optical designs and asks about CWDM (Coarse Wavelength Division Multiplexing). Which two features describe CWDM? (Choose two.) 

A. typically used over long distances, but requires optical amplification 

B. allows up to 32 optical carriers to be multiplexed onto a single fiber 

C. shares the same transmission window as DWDM 

D. uses the 850-nm band 

E. Passive CWDM devices require no electrical power. 

Answer: CE 

Q28. A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365? 






Q29. Which two design aspects should a metro service provider consider when planning to deploy REP for his backbone? (Choose two.) 

A. Two REP segments can be connected redundantly at two points, one connection will be blocked as per the STP defined in IEEE 802.1d. 

B. UDLD can be enabled on REP interfaces to detect unidirectional failures. 

C. The guaranteed convergence recovery time is less than 50 ms for the local segment. 

D. A REP segment is limited to a maximum of seven devices. 

E. VLAN load balancing for optimal bandwidth usage is supported in any REP segment. 

Answer: BE 

Q30. In which two ways is IPv4 and IPv6 traffic handled in a network design that uses QoS deployment options? (Choose two.) 

A. IPv6 and IPv4 traffic is treated in the same way by using a single QoS policy that classifies and matches on both protocols. 

B. IPv6 traffic is treated differently than IPv4 by using the flow-label field, which is built into the IPv6 packet header. 

C. IPv6 traffic does not require QoS because it uses to the flow-label field, which classifies and matches on the IPv6 protocol. 

D. IPv6 traffic is treated differently than IPv4 by using two different QoS policies. 

E. IPv6 traffic is treated differently than IPv4 because it uses only the DSCP value and not the IP precedence. 

Answer: AD 

Related 352-001 Articles