Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

352-001 Questions and Answers

Note! Following 352-001 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 400-007

352-001 Questions and Answers

Question # 6

You have been hired to create a Layer 2 network design solution to allow a company to transition their Spanning tree Protocol to Multiple Spanning Tree The company is currently tunning a network core with a vPC switch pair and Rapid PVST+ If the company must avoid downtime in the network core, which step will be included in the design solution?

A.

It is not possible to change the Spanning Tree Protocol at a vPC switch pair without a downtime

B.

The Spanning tree Protocol must be disabled first at both vPC switches before enabling MST, to prevent any downtime

C.

Both vPC switches must be configured at the same time

D.

When Bridge Assurance is disabled, the order of the vPC switch that is configured! first does not matter

E.

The vPC switch with role "primary" must be configured first

F.

The vPC switch with role "secondary" must be configured first

Full Access
Question # 7

Which function is performed at the access layer of the three-layer hierarchical network design mode?

A.

fast transport

B.

reliability

C.

redundancy and load balancing

D.

QoS classification and marking boundary

E.

fault isolation

Full Access
Question # 8

VPLS is implemented in a Layer 2 network with 2000 VLANs What is the primary concern to ensure successful deployment of VPLS?

A.

Flooding is necessary to propagate MAC address reachability information

B.

PE scalability

C.

The underlying transport mechanism

D.

VLAN scalability

Full Access
Question # 9

In a VPLS design solution, why would you use BGP instead of LDP for signaling?

A.

BGP supports VPLS interworking

B.

There are no full-mesh pseudowires due to the route reflection feature of BG

C.

MAC address learning scales better through BGP

D.

Pseudowire configuration overhead is reduced

Full Access
Question # 10

You are designing an 802.1x solution for a customer where the network supports a large number of IP phones and printers. You plan to configure MAC address bypass for the phones and printers. What is your primary concern related to authentication?

A.

additional AAA traffic on the network

B.

placement of the AAA server

C.

potential of MAC address spoofing

D.

scaling of the database that stores the MAC addresses

Full Access
Question # 11

Which description of the RPF check in the multicast forwarding traffic is true?

A.

The source address of the multicast packet is checked in the unicast routing table. If the multicast packet arrived from the interface that matches with the interface to reach the source address, this packet passes the RPF check.

B.

The destination address of the multicast packet is checked in the BGP database. If the multicast packet arrived from the interface that mate with the interface to reach BGP peer that advertised the mutlicast prefix, this packet fails the RPF check.

C.

The source address of the multicast packet is checked in the unicast routing table. If the multicast packet arrived from the interface that matches with the interface to reach the source address, this packet fails the RPF check

D.

The unicast address of the multicast packet is checked in the BGP database. If the multicast packet arrived from the interface that matches with the interface to reach BGP peer that advertised the multicast prefix, this packet passes the RPF check

Full Access
Question # 12

Refer to the exhibit. A new high availability DB sever cluster is installed in the network . these two servers require high bandwidth and low latency Layer 2 connectivity for database replication. Which solution supports these requirements?

A.

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.

Add secondary links to REP segments 1 and 2

C.

Add two new links between SW1 and SW2 configured as REP segment 3

D.

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Full Access
Question # 13

Refer to the exhibit Assume that no multicast optimization is done on LAN switches A and B Which two solutions can be used to optimize multicast traffic forwarding in this situation? (Choose two )

A.

Disable the IGMP query election process

B.

Configure a static MAC entry for the multicast server

C.

Enable IGMP snooping querier on both switches

D.

Disable IGMP snooping on both switches

E.

Enable PIM snooping on both switches

Full Access
Question # 14

OSPF is implemented over a pseudowire Layer2 VPN Which statement about this design implementation is true?

A.

The IP MTU must tie the same on the CE and PE devices

B.

The IP MTU must be the same on both CE devices

C.

The physical interface MTU must be the same between the CE and PE devices

D.

The IP MTU must tie the same on both PE devices

Full Access
Question # 15

Which two fast reroute technologies provide the highest level of protected path converge in a ring topology? (Choose two)

A.

Remote LFA

B.

Per-link LFA

C.

Automatic protection switching

D.

MPLS TE FRR

E.

Per-prefix LFA

Full Access
Question # 16

Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)

A.

Loop Guard

B.

PortFast

C.

DTF

D.

Root Guard

E.

BPDU Guard

Full Access
Question # 17

A retail company has 250 branches connected to the core via MPLS Layer 3 VPN The company is migrating from traditional telephony services to a VoIP solution Which two primary concerns when implementing a VoIP solution are true? (Choose two)

A.

call routing design

B.

MTU

C.

SRST

D.

jitter

E.

available bandwidth

Full Access
Question # 18

You want to add 900 VLANs to the existing 90 VLANs on a data center. Which two spanning-tree concerns must you consider? (Choose two)

A.

To add 990 VLANs to the switching hardware reserved VLANs requires you to use extended VLAN

B.

STP is increased by a factor of 10 convergence time.

C.

BPDU does not support 990 VLANs.

D.

The diameter of the STP topology is increased.

E.

The PVST+ increases CPU utilization

Full Access
Question # 19

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

A.

inside global

B.

outside global

C.

inside local

D.

outside local

Full Access
Question # 20

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

A.

Build neighbor adjacencies in a triangulated fashion

B.

Limit the query domain by use of distribute lists.

C.

Build neighbor adjacencies in a squared fashion

D.

Limit the query domain by use of summarization

E.

Limit the query domain by use of default routes

Full Access
Question # 21

Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network? (Choose two)

A.

BFD

B.

Ti-LFA

C.

minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Full Access
Question # 22

Refer to the exhibit.

There are multiple trees in the Cisco FabricPath All switches in the Layer 2 fabric share the same view of each tree. Which two concepts describe how the multicast traffic is load-balanced across this topology? (Choose two )

A.

A specific (S.G) traffic is not load-balanced

B.

All trees are utilized at the same level of the traffic rate

C.

Every leaf node assigns the specific (S.G) to the same tree.

D.

A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.

E.

The multicast traffic is generally load-balanced across all trees

Full Access
Question # 23

Refer to the exhibit. This OSPF network has just been deployed with four areas, but the hub and spoke area frequently flaps you must fix this design failure which two reasons describe why the implementation of link-state summarization will minimize the effect of the instability in this network? (Choose two)

A.

It runs a partial SPF on the campus area when any link of the hub-and-spoke flaps.

B.

It allows for a more scalable network.

C.

It separates the data center area from the hub-and-spoke areas.

D.

It minimizes the number of prefixes that are advertised to other areas.

E.

It lowers CPU utilization on ABR routers.

Full Access
Question # 24

Drag and drop the natures of the network events from the left onto the OSPF-SPF calculation types on the right.

Full Access
Question # 25

As part of a new network design documentation, you are required to explain the reason for choosing cisco FabricPath for Layer 2 loop avoidance. Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network? (Choose two)

A.

MAC tunneling

B.

IS-IS multipath

C.

RPF check

D.

TTL header

Full Access
Question # 26

Which description correctly describes Git?

A.

Git is a command line utility for creating archives of files

B.

Git is a web-based responsibility for sharing files

C.

Git is a configuration management tool that automates provisioning

D.

Git is a version control system for tracking changes in files

Full Access
Question # 27

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization Which IETF standard technology can provide this requirement?

A.

data center bridging

B.

unified fabric

C.

Transparent Interconnection of Lots of Links

D.

fabric path

Full Access
Question # 28

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used

Full Access
Question # 29

Your organization is working on a design solution for a new Internet-based remote access virtual private network that has 1000 remote sites A network administrator recommends GETVPN as the model because the network of today uses DMVPN, which results in a lot of background NHRP control traffic What is a potential problem with using GETVPN for this design solution?

A.

GETVPN would require a high level of background traffic to maintain its IPsec SAs

B.

GETVPN requires an overlay routing control plane

C.

GETVPN key servers would be on public, hacker-reachable space and need higher security

D.

GETVPN is not scalable to a large number of remote sites

Full Access
Question # 30

What must you consider when designing IPsec networks using Authentication Header?

A.

Crypto maps

B.

ISAKMP

C.

NAT

D.

Transform set

Full Access
Question # 31

Which design solution reduces the amount of IGMP state in the network?

A.

IGMPv3 with PIM-SSM

B.

IGMP filtering

C.

multiple multicast domains

D.

one multicast group address through network regardless of IGMP version

Full Access
Question # 32

Which three terms describe an OS-level virtualization method for deploying and running distributed applications? (Choose three)

A.

shared kernel

B.

virtualized networking

C.

container-based virtualization

D.

container stack

E.

application containerization

F.

containerization

G.

container networking

Full Access
Question # 33

You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Full Access
Question # 34

Which effect of designing a Layer 2 network using the PortFast feature with PVST+ is true?

A.

It accelerates the network convergence on the trunk uplinks

B.

It shuts down the port when receiving the superior BPDU

C.

In combination with BPDU filtering, it causes the switch port to stay in the forwarding state

D.

It moves the switch port directly to the forwarding state

Full Access
Question # 35

Which MPLS TE design consideration is true?

A.

MPLS TE replaces LDP and the dependency of the IGP to identify the best path.

B.

MPLS TE provides link and node protection

C.

MPLS TE optimizes the routing of IP traffic, given the constraints imposed by backbone capacity and application requirements.

D.

MPLS TE requires Layer 3 VPN full-mesh topology deployment

Full Access
Question # 36

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password that they are already using to access existing applications . A user may not always use the same device to access the VPN. Which two options combined meet the requirements? (Choose two)

A.

Use local usernames and passwords on the VPN device

B.

Deploy a central authentication directory that users can be authenticated and authorized against

C.

Deploy certificates that are unique to each user

D.

Deploy an IPsec VPN solution

E.

Deploy certificates that are unique to each device

F.

Deploy a SSL VPN solution

Full Access
Question # 37

Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribute OSPFv2 and EIRGP boundaries?

A.

matching EIGRP process ID

B.

AD manipulation

C.

route filtering

D.

matching OSPF external routes

E.

route tagging

Full Access
Question # 38

An IPsec VPN WAN network has a new requirement for passing multicast traffic between sites. Which two technologies must be added to the design to pass the multicast traffic? (Choose two)

A.

IGMP

B.

GRE

C.

PIM dense mode

D.

VTI

E.

Fast Switching

Full Access
Question # 39

Which two effects of using ingress filtering to prevent spoofed address on a network design are true? (Choose two)

A.

It protects the network infrastructure against spoofed DDoS attacks

B.

It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger

C.

It makes DoS attacks more traceable

D.

It classifies bogon traffic and remarks it with DSCP bulk

E.

It filters RFC 1918 IP addresses

Full Access
Question # 40

You are designing a GET VPN solution consisting of 30 group members. Which measure helps product encrypted user traffic from replay attacks?

A.

RSA-encrypted nonce

B.

nonce payload

C.

time-based anti-replay

D.

counter based anti-replay

E.

digital certificates

Full Access