Up to the minute 352-001 free draindumps Guide
Master the 352-001 CCDE Written Exam content and be ready for exam day success quickly with this Actualtests 352-001 test. We guarantee it!We make it a reality and give you real 352-001 questions in our Cisco 352-001 braindumps.Latest 100% VALID Cisco 352-001 Exam Questions Dumps at below page. You can use our Cisco 352-001 braindumps and pass your exam.
Q101. Refer to the exhibit.
Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.)
A. PVRSTP on all switches
B. REP on all switches
C. MST on all switches
D. BPDU guard on Switch A and Switch D
E. 8032 on ring A-B-C-D
Q102. The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.)
A. It is not recommended on BGP route reflectors.
B. It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable.
C. It can be set on a router during the startup process for a fixed period of time.
D. It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.
E. It can be set on a router until other interacting protocols have signaled convergence.
Q103. A new video multicast application is deployed in the network. The application team wants to use the 184.108.40.206 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?
A. Because 220.127.116.11 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.
B. Because 18.104.22.168 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.
C. The multicast application sends too many packets into the network and the network infrastructure drops packets.
D. The 22.214.171.124 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.
Q104. Refer to the exhibit.
How would you redesign the network to improve availability of the routers 1A and 1B at the core site?
A. Enable Graceful Restart Helper for OSPF
B. Use link bundles over multiple slots
C. Use APS Ethernet circuits and redundant interfaces
D. Create a multichassis system with the two routers
Q105. Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.)
A. Solution should be resistant to sensor failure.
B. Solution should allow for stream normalization.
C. Solution should not impact jitter and latency for voice traffic.
D. Solution should allow for signature-based pattern matching.
E. Solution should allow to deny packets inline.
Q106. When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.)
A. CPU capabilities
B. bandwidth capabilities
C. packets per second capabilities
D. maximum tunnel termination capabilities
Q107. Your design client has requested that you ensure that the client devices are not dynamically configured with incorrect DNS information. When finalizing the network design, which security option must be configured on the switches?
A. IGMP snooping
B. DHCP snooping
C. root guard
D. DNS snooping
Q108. Refer to the exhibit.
A customer runs OSPF with Area 5 between its aggregation router and an internal router. When a network change occurs in the backbone, Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5. You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area. How can you accomplish this task?
A. Set Area 5 to stubby at the ABR anyway.
B. Increase the bandwidth on the connection between Router A and Router B.
C. Turn on LSA throttling on all devices in Area 5.
D. Implement LSA filtering on the ABR, allowing summary routes and preventing more specific routes into Area 5.
E. Create a virtual link to Area 0 from Router B to the ABR.
Q109. Which of the following design options meet the requirement to provide IPv6 interdomain multicast?
B. PIM SSM
D. PIM dense mode
Q110. What should be taken into consideration when designing IPsec networks using Authentication Header (AH)?
B. transform set
C. crypto maps