Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

352-011 Questions and Answers

Question # 6

VPLS is implemented in a Layer 2 network with 2000 VLANs. Which must be the primary concern to ensure successful deployment of VPLS?

A.

The underlying transport mechanism

B.

PE scalability

C.

Flooding is necessary to propagate MAC address reachability information

D.

VLAN scalability

Full Access
Question # 7

Which two options are reasons for designing a large OSPF network with multiple areas connected to the backbone? (Choose two)

A.

Reduce the number of routes within an area

B.

Route tagging capability

C.

Simplify logical topology

D.

Enhance failure detection

E.

Reduce SPF algorithm runs

Full Access
Question # 8

When is it required to leak routes into an IS-IS Level 1 area?

A.

when equal cost load balancing is required between the backbone and non-backbone areas

B.

when unequal cost load balancing is required between the backbone and non-backbone areas

C.

when MPLS L3VPN PE devices are configured in the Level 1 areas

D.

when a multicast RP is configured in the non-backbone area

Full Access
Question # 9

Which design benefit of Bridge Assurance is true?

A.

It prevents switched traffic from traversing suboptimal paths on the network.

B.

It prevents switched loops caused by unidirectional point-to-point, link condition on Rapid PVST+ and MST

C.

It allows small unmanaged switches to be plugged into ports of access scenes without the risk of switch loops.

D.

It suppresses a spanning-tree topology change upon connecting and disconnecting a station on a port.

Full Access
Question # 10

What is a design aspect regarding multicast transport for MPLS Layer 3 VPNs using the Rosen Draft implementation?

A.

LDP is the multicast control plane protocol.

B.

Multicast traffic is forwarded over GRE tunnels.

C.

Multicast traffic is forwarded over LDP or RSVP signaled LSPs.

D.

Using the MDT SAFI in BGP ensures that PIM can be disabled in the core.

Full Access
Question # 11

Which three network management requirements are common practices in network design? (Choose three)

A.

Collect RMON poll information for future regression analysis

B.

Ensure that all network devices have their clocks synchronized

C.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.

D.

Collect SNMP poll information for future regression analysis

E.

Validate data plane health, application and services availability with synthetic traffic

F.

Capture both ingress and egress flow-based packets. While avoiding duplications of flows

Full Access
Question # 12

Drag the fast Reroute mechanism on the left and drop it onto the corresponding routing protocol on the right

Full Access
Question # 13

You are presented with requirements to design a development, testing and production environments. These environment should communicate with each other, yet they should be kept as separate failure domains. Which routing protocol should be configured on the links between the networks to support the design requirements?

A.

OSPF

B.

EIGRP

C.

IS-IS

D.

BGP

Full Access
Question # 14

Your customer asked you to redesign there is-IS network to reduce to a minimum the number of adjacencies because the network has several routers running L1/L2 mode on the sme Ethernet segment. Which action do you recommend?

A.

Define only one router on the segment to be DIS

B.

Make the interface priority on the backup DIS lower than the primary DIS

C.

Change half the routers to L1 routers and half to L2 routers

D.

Change all routers to a single-level area

Full Access
Question # 15

What two options are significant drivers for 5G in IoT networks? (Choose two)

A.

Energy Efficiency

B.

Lower Latency

C.

Mass Connectivity

D.

Programmability

E.

Higher data rates

Full Access
Question # 16

You must make IGP redesign recommendations for a client that has old equipment, with low CPU power and memory, that they do not have budget replace. They are very concerned about CPU load on routers. They are using IS-IS as the IGP in a single l1 area and all routers are connected to each other with point-to-point links. Which method do you recommend to reduce or limit CPU overhead caused by IS-IS?

A.

Use mesh groups to limit flooding of LSAs

B.

Implement wide style metrics for IS-IS on all routers

C.

Select a router to act as a pseudowire to limit topology synchronization

D.

Divide the router into multiple areas and implement address summarization

Full Access
Question # 17

A healthcare customer requested that health statistics from their infrastructure devices are to be sent over their service provider MPLS network. Which protocol must be enabled?

A.

SNMPv3

B.

Syslog TLS

C.

syslog

D.

SNMPv2

E.

SSH

Full Access
Question # 18

Which three processes are part of the ITILv3 Service Operation? (Choose three)

A.

Release and deployment management

B.

Problem management

C.

Incident management

D.

Event management

E.

Service-level management

F.

Change management

Full Access
Question # 19

The service provider that you work for wants to offer IPv6 internet service to its customers without upgrading all of its access equipment to support IPv6, which transition technology do you recommend?

A.

NAT64

B.

CGN

C.

Dual-stack CPE

D.

6RD

Full Access
Question # 20

Which OSPF design consideration, with regards to simplicity and address preservation, must be considered when connecting two Layer 3 switches directly using 10 GBASE-T cabling and formatting an OSPF neighbor adjacency?

A.

Mesh groups must be included in the design

B.

The OSPF Hello and Dead timers must be tuned to detect failures as quickly as possible

C.

The OSPF network type must be set to point-to-multipoint

D.

An OSPF neighbor adjacency formed over loopback interfaces must be placed in Area 0

E.

The OSPF network type must be set to point-to-point

Full Access
Question # 21

A DMVPN network is being deployed for 10 branch sites to connect to the central headquarters over the Internet. Each branch site connects to the internet via a 1.5 Mb/s ADSL line, and the headquarters connects to the Internet over a 100Mb/s circuit limited to 20 Mb/s by the service provider. Which QoS mechanism if any, do you recommend at the headquarters location?

A.

Rate-limiting the 100 Mb/s circuit to 20 Mb/s

B.

Applying hierarchical QoS with parent policy for the overall circuit and child policy for the spokes

C.

Traffic shaping the 100 Mb/s circuit to 20 Mb/s

D.

QoS is not required in this instance due to maximum traffic being received by the branches being 15 Mb/s

Full Access
Question # 22

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

A.

PortFast

B.

UDLD

C.

Root guard

D.

BPDU guard

Full Access
Question # 23

Which aspect is a significant disadvantage of containers?

A.

Security

B.

Time to deploy

C.

Inefficiency

D.

Reduced operational overhead

E.

Resource consumption

Full Access
Question # 24

Which two design aspects should a metro service provider consider when planning to deploy REP for his backbone? (Choose two.)

A.

Two REP segments can be connected redundantly at two points, one connection will be blocked as per the STP defined in IEEE 802.1d.

B.

UDLD can be enabled on REP interfaces to detect unidirectional failures.

C.

The guaranteed convergence recovery time is less than 50 ms for the local segment.

D.

A REP segment is limited to a maximum of seven devices.

E.

VLAN load balancing for optimal bandwidth usage is supported in any REP segment.

Full Access
Question # 25

In an Ethernet link containing five routers with OSPF network interface type configured as broadcast, how many OSPF adjacencies are established on this Ethernet link?

A.

7

B.

5

C.

10

D.

20

E.

6

Full Access
Question # 26

A very large enterprise customer is migrating from EIGRP to IS-IS .What is your main concern in regards to change in the path packets take after the migration is complete?

A.

The areas sizes.

B.

The number of prefixes

C.

The redistribution points.

D.

The bandwidth and metrics of the links.

Full Access
Question # 27

A Company has these requirements for access to their wireless and wired corporate LANs using 802.1x

 Clients devices that corporate assets and have joined the active directory domain are allowed access

 Personal devices must be not allowed access

 Clients and access servers must be mutually authenticated.

Which solution meets these requirements?

A.

Protected EAP/Microsoft CHAP v2 with user authentication

B.

EAP-TLS with machine authentication

C.

EAP-TLS with user authentication

D.

Protected EAP/Microsoft CHAP v2 with Machine authentication

Full Access
Question # 28

A network design engineer is designing a new storage area network that combines multiple separate legacy SAN environments within a data center. Which technology isolates events within one of the SAN environment from the others?

A.

FCIP tunnels

B.

N-port ID Virtualization

C.

N-Port Virtualization

D.

Virtual SANs

Full Access
Question # 29

Refer to the exhibit.

A new IPv4 multicast-based video-streaming service is being provisioned. During the design-validation tests, you realize that the link between the two buildings is carrying multicast traffic even when there are no receivers connected to the switch in Building B and despite IGMP snooping being enabled on both Layer 2 switches and IGMPv2 runs on the hosts. Which design change will prevent the multicast traffic from being unnecessarily flooded throughout the campus network?

A.

Enable PIM snooping on both Layer 2 switches.

B.

Enable multicast storm control on the link between Switch 1 and Switch 2.

C.

Use static Layer 2 MAC forwarding entries on Switch 1.

D.

Change the IPv4 multicast group address such that it excludes the usage of link-local MAC addresses.

E.

Ensure that Switch 1 is an IGMP querier.

Full Access
Question # 30

You are designing a solution to connect a primary data center to a disaster recovery site, The hosted applications will be web and email servers that are provided through a virtualized environment. Which connectivity technology should you consider for this design?

A.

L2TPV3.

B.

VPWS.

C.

Point-To-Point GRE tunnels.

D.

VPLS.

Full Access
Question # 31

An enterprise customer has a national WAN network based on DMVPN over the Internet, with sites located throughout the country. The customer has recently deployed VoIP throughout the entire network , and users report that it takes up to 2 seconds to establish a telephone call to an IP telephone at another office network. Drag and drop the root cause and the corresponding design solution from the left onto the correct targets on the right Not all options are used

Full Access
Question # 32

As part of network design, two geographically separated data centers must be interconnected using Ethernet-over-MPLS pseudowire. The link between the sites is stable, the topology has no apparent loops, and the root bridges for the respective VLANs are stable and unchanging. Which aspect must be the part of the design to mitigate the risk of connectivity issues between the data centers?

A.

Enable 802.1d on one data center, and 802.1w on the other.

B.

Ensure that the spanning tree diameter for one or more VLANs is not too large.

C.

Enable UDLD on the link between the data centers.

D.

Enable root guard on the link between the data centers.

Full Access
Question # 33

Refer to the exhibit.

Company ACME is adding a Cisco TelePresence system for real-time collaboration and wants to ensure the highest user experience. Drag and drop the necessary QoS mechanisms from the left to the right in any order. Not all options will be used.

Full Access
Question # 34

A large ISP is analysing which IGP meets these following requirements

 Network must be resilient against unstable MTU in one side of newly released transmission pieces of equipment

 Network must support MPLS traffic engineering solution for future use

Which IGP must be selected and why?

A.

ISIS : in case MTU changes your TE tunnels keep the LSP stable

B.

OSPF: adjacency remains up even if MTU changes

C.

OSPF: in case MTU changes your TE tunnels keep the LSP stable

D.

ISIS: adjacency remains up even if MTU changes

Full Access
Question # 35

You are reviewing a new data center design for a customer. They chose to leverage a tunnel-based overlay technology for quick deployment and multitenant security. Which design concern can affect the availability across the data center?

A.

Nonoverlapping IP address space between the overlay networks

B.

MTU size on the underlay links

C.

Review of comman paths on the underlay links

D.

Paper placement of STP root bridge in overlay networks

Full Access
Question # 36

.which two options are benefits of using Topology Independent Loop-Free Alternate in WAN design? (Choose two)

A.

It provides backup convergence for all topologies by avoiding the post-convergence path

B.

It maximizes the network utilization by load-sharing across low bandwidth and edge links while IGP convergence is in progress

C.

No additional protocols are required in the MPLS network because it uses LDP labels to signal the backup path

D.

Although it requires enabling segment routing, SR does not have to be activated as the preferred forwarding method

E.

It can provide backup paths for IPv4, IPv6 and LDP traffic

Full Access
Question # 37

A network has several routers running IS-IS L1L2 mode on the same Ethernet segment. Which action reduces to a minimum the number of IS-IS adjacencies in this segment?

A.

Define only the router on the segment to be DIS

B.

Change all routers connected to this segment to a single-level area

C.

Make the interface priority on the backup DIS lower than the primary DIS

D.

Change half the routers to be L1-only and other half to be L2-only on this segment

Full Access