PdfPrep.com

New Updated 352-001 CCDE Exam Prep Questions

Cisco 352-001 CCDE exam prep questions have been updated, which are valuable for you to pass Cisco CCDE certification 352-001 exam easily. Cisco CCDE 352-001 Written Exam tests your combined knowledge of routing protocols, internetworking theory and design principles. To pass the Cisco CCDE certification 352-001 exam easily, you can study the following Cisco 352-001 exam free prep questions below.

Page 1 of 8

Loading... Loading...
1. In a VPLS design solution, which situation indicates that BGP must be used instead of LDP in the control plane?

Loading... Loading...
2. What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?

Loading... Loading...
3. Which description correctly describes Git?

Loading... Loading...
4. You want to split an Ethernet domain in two.

Which parameter must be unique in this design to keep the two domains separated?

Loading... Loading...
5. When network summaries are created for access networks in a network design, how does it change the behavior of the shortest Path First (spf) running in a backbone area?

Loading... Loading...
6. Which fast convergence mechanism involves tunneling to a non-neighbor router?

Loading... Loading...
7. A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50MSEC).

In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?

Loading... Loading...
8. A network engineer confirms that STP is enabled on all switches in the network. An edge switch is not sending or receiving configuration BPDUs, although it appears that everything is functioning correctly in the network.

Which design explanation is true?

Loading... Loading...
9. Refer to the exhibit





ACME Mining has four data centres in Santiago, Cape town, Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN.

They want to deploy a new mission-critical application with these requirements

• cluster heartbeat 2 Mb/s continuous (250 KB/s)

• cluster heartbeat one-way maximum latency 100 ms

These are the current ping tests results between the four data centers:





Which hosting data center pair can host the new application?

Loading... Loading...
10. Refer to the exhibit.





This customer uses Gigabit Ethernet on all router interfaces and gets point-to-point Layer 2 VPN connections from their telco provider This network runs IS-IS with default parameters.

Which action manipulates traffic flow so that router A traffic takes

the high-speed links as the preferred path when routing to router H?

Page 2 of 8

Loading... Loading...
11. Refer to the exhibit





A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2.

Which two ways to design this solution are true? (Choose two)

Loading... Loading...
12. You are designing the routing design for two merging companies that have overlapping IP address space.

Which of these must you consider when developing the routing and NAT design?

Loading... Loading...
13. When designing fast convergence on a network using loop-free alternate, on which two basis can the next-hop routes be precomputed? (Choose two)

Loading... Loading...
14. Which statement correctly describes Ansible operations and play books?

Loading... Loading...
15. Which two QoS models should be part of a network redesign to ensure that IP QoS is deployed to support data, voice and videos application? (Choose two)

Loading... Loading...
16. DRAG DROP

Drag and drop on the left with the corresponding RIB or FIB function on the right



Loading... Loading...
17. Video traffic is being distributed across a large WAN network. The video source originates from different parts of the multicast domain at different times.

Which multicast technology provides optimal path selection between the receiver and the source for this multicast traffic?

Loading... Loading...
18. You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time.

Which two combined actions do you recommend? (Choose two)

Loading... Loading...
19. Which two benefits of using BFD for failure detection are true? (Choose two)

Loading... Loading...
20. Which three IS-IS design considerations must be considered when connecting two Layer 3 switches directly using a 10 GBASE C T cabling and forming IS-IS neighbor adjacency? (Choose three)

Page 3 of 8

Loading... Loading...
21. An IPsec VPN WAN network has a new requirement for passing multicast traffic between sites.

Which two technologies must be added to the design to pass the multicast traffic? (Choose two)

Loading... Loading...
22. Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)

Loading... Loading...
23. You are deploying a nationwide intranet solution for a company with 4 data centers and 400 remote branches connected via a provider-based solution. As part of the network design, you must ensure efficient content distribution of training material to remote sites.

Which VPN technology leverages replication in the network core and provides for efficient bandwidth optimization?

Loading... Loading...
24. An enterprise company is attaching to a new Gigabit Ethernet based link from the local service provider. This connection must have a 150 Mbps committed information rate. For the design of this new service.

Which QoS mechanism must be used to ensure low packet loss within the service provider network?

Loading... Loading...
25. You are designing a traffic monitoring and analysis system for a customer.

Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure?

Loading... Loading...
26. Which encoding format does cisco ios XE software support for NETCONF?

Loading... Loading...
27. How must the queue sizes be designed to ensure that an application functions correctly?

Loading... Loading...
28. As network designer what will be your main concern with regards to virtualizing multiple network zones into a single hardware device?

Loading... Loading...
29. Which three network management requirements are common practices in network design? (Choose three)

Loading... Loading...
30. DRAG DROP

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used



Page 4 of 8

Loading... Loading...
31. VARIATION 1

Refer to the exhibit.





Service provider ACME Internet just added a 100 GB/s peering in Paris that it wants to use by default for outbound traffic to Big ISP.

Which routing policy achieves the desired outcomes?

A. Use traffic engineering by injecting a preferred LOCAL_PREF attribute to routes advertised from Very Big ISP in Paris

B. Apply an import policy in New York that adds a Weight attribute to routes learned from Very Big ISP via Paris

C. Apply an export policy in Paris by applying a MED or community attribute with a preference that very Big ISP act upon

D. Apply an import policy hat filters longer prefixes than /24 in Brussels and zurich

Loading... Loading...
32. 15.4 to support an IoT project.

Which two protocols does the engineer need to utilize for this design? (Choose two)

Loading... Loading...
33. In a multicast switched LAN with IGMP snooping enabled. Users report that they often receive all multicast groups for brief periods of time (traffic a flooded everywhere). You must improve the design of the network and address the issue.

Which feature do you consider to stop this frequent multicast flooding from occurring?

Loading... Loading...
34. The CTO of XYZ is having some high-level discussions about IPv6 implementation and is considering whether XYZ should consider the MPLS IPv6 Provider Edge approach.

Which two drawbacks of the MPLS IPv6 Provider Edge approach are true? (Choose two)

Loading... Loading...
35. Refer to the exhibit.





In which two ways is this network impacted if link instability exists between R1 and R2? (Choose two)

Loading... Loading...
36. Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

Loading... Loading...
37. OSPF is implemented over a pseudowire Layer2 VPN.

Which statement about this design implementation is true?

Loading... Loading...
38. You have been hired to create a Layer 2 network design solution to allow a company to transition their Spanning tree Protocol to Multiple Spanning Tree The company is currently tunning a network core with a vPC switch pair and Rapid PVST+ If the company must avoid downtime in the network core, which step will be included in the design solution?

Loading... Loading...
39. Which two pain points are the most common for container technology adoption? (Choose two)

Loading... Loading...
40. You are the network designer for a large Service Provider that offers Voip dideo and internet services to residential customers. You have been asked to narrow your performance monitoring to three areas that will result in the best return on the investment.

Which three areas should be monitored and reported upon based on the services currently offered by the Service Provider? (Choose three).

Page 5 of 8

Loading... Loading...
41. Your company utilizes many types of network transports, and you want to increase the efficiency of the network.

Which solution can be used to improve network efficiency over PPPoE, IPsec and GRE networks?

Loading... Loading...
42. You are hired to design a solution to improve network availability for users on a campus network with routed access.

Which two recommendations should you make in your design proposal? (Choose two)

Loading... Loading...
43. Which action reduces jitter in a VoIP network?

Loading... Loading...
44. You want to add 900 VLANs to the existing 90 VLANs on a data center.

Which two spanning-tree concerns must you consider? (Choose two)

Loading... Loading...
45. Company A has a hub-and spoke topology over an SP-managed infrastructure. To measure traffic performance metrics. IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router.

What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

Loading... Loading...
46. VPLS is implemented in a Layer 2 network with 2000 VLANs.

What is the primary concern to ensure successful deployment of VPLS?

Loading... Loading...
47. You are a network designer and you must ensure that the network you design is secure.

How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source address?

Loading... Loading...
48. Which function is performed at the access layer of the three-layer hierarchical network design mode?

Loading... Loading...
49. Which effect of designing a Layer 2 network using the PortFast feature with PVST+ is true?

Loading... Loading...
50. Which markup language is used to format Ansible playbook?

Page 6 of 8

Loading... Loading...
51. Refer to the exhibit.





You are planning a migration to a dual-stack IPv4/IPv6 campus environment while providing a flexible and scalable design with fault isolation. The design must allow IPv6 devices to tunnel over portions of the campus that are not yet natively IPv6-enabled, including wireless and voice endpoints. You plan requires an interim approach that allows for a faster information of new services without requiring a network wide hot cutover.

Which two services block functions meet these requirements? (Choose two)

Loading... Loading...
52. Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two)

Loading... Loading...
53. Which statement about the SDN framework environment is true?

Loading... Loading...
54. Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network? (Choose two)

Loading... Loading...
55. Which two functions of an NSSA an OSPF network design are true? (Choose two)

Loading... Loading...
56. Refer to the exhibit.





A retail company has around 500 branches across the U.S. The company is connected to the DC and DR routers through a Frame Relay cloud. All the communication happens only between BR routers to DC or DR routers, and there is no BR router to BR rotter communication. The service provider has decided to discontinue the Frame Relay service and replace it with Metro Ethernet. The retail company currently uses OSPF NBMA mode as IGP, which is the only scenario that the IT team is familiar with. The retail company decides to optimize the data center computing resources with server virtualisation. They have many serve, segments that need Layer 2 connectivity between the DC router and me DR router tor VM failover.

Which Metro Ethernet technology uses a minimum of resources from the service provider network?

Loading... Loading...
57. An enterprise campus is adopting a network virtualization design solution with these requirements

✑ It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

✑ It must maintain end-to-end logical path transport separation across the network

✑ resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

Loading... Loading...
58. Which description of the RPF check in the multicast forwarding traffic is true?

Loading... Loading...
59. You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops, vPC removes Layer 2 loops while providing redundancy through which mechanism?

Loading... Loading...
60. Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

Page 7 of 8

Loading... Loading...
61. Which two descriptions of the transport protocols used by RESTCONF and NETCONF are true? (Choose two)

Loading... Loading...
62. You are designing an MPLS Layer 3 VPN network where the data path must be the same in both directions. Sites are connected to two PE routers.

Which two design considerations allow this symmetric routing to be achieved? (Choose two.)

Loading... Loading...
63. ACME corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain conditions in the network.

Which feature should be used to meet this design requirement?

Loading... Loading...
64. An existing wireless network was designed to support data traffic only. You must now install context Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)

Loading... Loading...
65. You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password that they are already using to access existing applications. A user may not always use the same device to access the VPN.

Which two options combined meet the requirements? (Choose two)

Loading... Loading...
66. The network designer needs to use GLOP IP address in order make them unique within their ASN, which multicast address range will be considered?

Loading... Loading...
67. You have been hired by ACME corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks.

When evaluating the network, which switch option should you investigate to ensure that authorized ARP responses take according to known IP-MAC address mapping?

Loading... Loading...
68. A mobile network operator is planning to create a NGN backhaul by migrating the existing backhaul network from a legacy SONET-based transport to a packet-based transport. The NGN backhaul network must achieve similar failover and failback times as the legacy network (50ms).

Which method allows for similar failover and failback times within a packet-based network?

Loading... Loading...
69. Refer Io the exhibit.





The company must connect five new remote sites to the network core of its corporate headquarters with path reliability These remote sites run voce and data traffic Two data centers are in the core.

Which two virtualized network solutions can achieve the required goal? (Choose two)

Loading... Loading...
70. A service provider hires you to design its new managed CE offering to meet these requirements:





Which tunnelling technology do you recommend?

Page 8 of 8

Loading... Loading...
71. DRAG DROP

Drag and drop the EIGRP design considerations from the left onto the corresponding hierarchical layer characteristics on the right



Loading... Loading...
72. Which is design considerations of policy-based routing is true?

Loading... Loading...

 

Exit mobile version