Most recent 352-001: Pass4sure real samples from 1 to 15
Exam Code: 352-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCDE Written Exam
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 352-001 Exam.
2021 Apr 352-001 Study Guide Questions:
Q1. In order to meet your service level agreement, your network designer created a design solution that includes interface dampening. In which two ways will interface dampening benefit your overall network design? (Choose two.)
A. Interface dampening uses an exponential backoff algorithm to suppress event reporting to the upper-level protocols.
B. When the interface is dampened, further link events are not reported to the upper protocol modules.
C. When the interface is dampened, further link events are reported to the upper protocol module.
D. Periodic interface flapping that affects the routing system as a whole should have a period shorter than the system convergence time.
Q2. You have been asked to design a high-density wireless network for a university campus. Which three principles would you apply in order to maximize the wireless network capacity? (Choose three.)
A. Increase the number of SSIDs to load-balance the client traffic.
B. Choose a high minimum data rate to reduce the duty cycle.
C. Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.
D. Enable 802.11ag channel bonding on both 2.4 GHz and 5 GHz to increase the maximum aggregated cell throughput.
E. Use directional antennas to achieve better sector separation channel reuse.
F. Implement a four-channel design on 2.4 GHz to increase the number of available channels.
Q3. Company A has grown nationwide in the U.S., and each new remote branch has a Metro Ethernet circuit provisioned back to the data center at the headquarters on the West Coast. The operations team says that it cannot manage hundreds of circuits as the company continues to grow. You review the topology and notice that many of the branches are close to each other in geographical zones. How can you redesign this network to improve manageability and increase scalability?
A. Add an aggregation layer router in each geographical zone.
B. Add a redundant data center on the East Coast to serve some of the traffic there.
C. Add a default route in each branch toward the data center on the West Coast.
D. Use Optimized Edge Routing at the data center.
E. Build an overlay MPLS network with Layer 3 VPN.
Q4. You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)
C. Multichassis EtherChannel over Pseudowire
Q5. A new video multicast application is deployed in the network. The application team wants to use the 22.214.171.124 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?
A. Because 126.96.36.199 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.
B. Because 188.8.131.52 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.
C. The multicast application sends too many packets into the network and the network infrastructure drops packets.
D. The 184.108.40.206 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.
Up to date 352-001 download:
Q6. Refer to the exhibit.
You are designing a network using the Multiple Spanning Tree Protocol for loop avoidance. VLAN trunking is not allowed due to security requirements. Which option describes how you can design this Layer 2 network while using untagged interfaces between both switches?
A. Assign VLAN 100 and VLAN 200 to the IST instance.
B. Assign VLAN 100 and VLAN 200 to instance 1.
C. Assign VLAN 100 to instance 1 and VLAN 200 to instance 2.
D. Assign VLAN 100 to the IST instance and VLAN 200 to instance 1.
Q7. Network designers plan to interconnect two geographically separated data centers using an Ethernet-over-MPLS pseudowire. Within that design, the link between the sites is stable, there are no apparent loops in the topology, and the root bridges for the respective VLANs are stable and unchanging. What additional aspect of the design should be adjusted to mitigate the chance of connectivity issues to the peer data center when the connection takes place?
A. Enable 802.1d on one data center, and 802.1w on the other.
B. Ensure that the spanning tree diameter for one or more VLANs is not too large.
C. Enable UDLD on the link between the data centers.
D. Enable root guard on the link between the data centers.
Q8. You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.)
Q9. Which restriction prevents a designer from using a GDOI-based VPN to secure traffic that traverses the Internet?
A. Enterprise host IP addresses are typically not routable.
B. GDOI is less secure than traditional IPsec.
C. Network address translation functions interfere with tunnel header preservation.
D. The use of public addresses is not supported with GDOI.
Q10. Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)
A. The firewall acts like a router hop in the network.
B. OSPF adjacencies can be established through the firewall.
C. Changes in the existing IP addressing and subnets are required.
D. Multicast traffic can traverse the firewall.
E. The firewall can participate actively on spanning tree.
Download 352-001 brain dumps:
Q11. You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?
A. map DSCP bits into the Exp field
B. map IP precedence bits into the DSCP field
C. map flow-label bits into the Exp field
D. map IP CoS bits into the IP Precedence field
E. map IP ToS bits into the Exp field
Q12. You are redesigning an OSPF v2 network and must migrate some links. You are concerned that there are different subnet masks. Which two link types will still form an OSPF adjacency even if there are subnet mask mismatches? (Choose two.)
Q13. Company X will be integrating an IPv6 application into their network and wants to develop a test environment to evaluate application performance across the network. This application will require both unicast and multicast communications. The company can do this implementation only in certain areas of its existing IPv4-only network, but wants all areas to communicate with each other. When developing the design to provide connectivity between these testing locations, what tunneling technology would work in this scenario?
Q14. You have created a network design that has two point-to-point Metro Ethernet circuits extending a single production VLAN between two data centers. Under normal circumstances, one circuit will carry traffic and spanning tree will block the other. If the company wants you to make use of both circuits to carry production traffic, which two technologies and features will you investigate to integrate into your network design? (Choose two.)
C. Multichassis EtherChannel
Q15. A company has these requirements for access to their wireless and wired corporate LANs using 802.1x:
. Client devices that are corporate assets and have been joined to the Active
Directory domain are allowed access.
. Personal devices must not be allowed access.
. Clients and access servers must be mutually authenticated.
Which solution meets these requirements?
A. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with user authentication
B. Extensible Authentication Protocol-Transport Layer Security with machine authentication
C. Extensible Authentication Protocol-Transport Layer Security with user authentication
D. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with machine authentication