[Downloadable] 352-001 Cisco free practice questions 31-40 (Aug 2021)

Your success in Cisco 352-001 is our sole target and we develop all our 352-001 braindumps in a way that facilitates the attainment of this target. Not only is our 352-001 study material the best you can find, it is also the most detailed and the most updated. 352-001 Practice Exams for Cisco CCDE 352-001 are written to the highest standards of technical accuracy.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 352-001 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/352-001-exam-dumps.html

Q31. You are designing an IPv4 any source multicast redundancy solution. Which technology ensures the quickest RP convergence? 

A. Auto-RP 

B. Embedded RP 

C. bootstrap router 

D. MSDP anycast RP 

Answer:


Q32. You are redesigning an OSPF v2 network and must migrate some links. You are concerned that there are different subnet masks. Which two link types will still form an OSPF adjacency even if there are subnet mask mismatches? (Choose two.) 

A. virtual 

B. broadcast 

C. point-to-multipoint 

D. non-broadcast 

E. point-to-point 

Answer: AE 


Q33. You need to redesign your NMS system so that it can collect information without causing adverse effects in the network, such as high CPU utilization on network devices and network instability. Which two options will minimize the impact of the trusted NMS polling your network in this situation? (Choose two.) 

A. Implement SNMP community restrictions that are associated with an ACL. 

B. Unload unused MIBs from the network devices. 

C. Prevent polling of large tables through the use of SNMP OID restrictions. 

D. Disable unused OIDs and MIBs on the NMS systems. 

Answer: CD 


Q34. When designing a network, which two security features should be added to the design to protect hosts from potential IPv6 neighbor discovery denial of service attacks at the access layer? (Choose two.) 

A. SEND 

B. RA Guard 

C. IKEv2 

D. IPsec 

E. DMVPNv6 

Answer: AB 


Q35. You are designing a wireless LAN with the following components: 

High-density indoor access point deployment 

2.4-GHz and 5-GHz radios 

802.11a, 802.11g, and 802.11n mode wireless LAN clients 

Site survey results show negligible foreign WiFi and non-WiFi interference. What is the best method to decrease duty cycle (radio frequency utilization) and increase overall wireless LAN client performance for this design? 

A. Disable all data rates below 12 Mb/s on all access points. 

B. Decrease radio transmit power on all access points that report a high duty cycle. 

C. Increase radio transmit power on all access points that report a high duty cycle. 

D. Disable all data rates above 12 Mb/s on all access points. 

E. Increase radio transmit power on all access points. 

Answer:


Q36. Refer to the exhibit. 

This Layer 2 ring has 10 VLANs with 1000 MAC addresses in each VLAN. Which protocol or mechanism provides the shortest traffic outage if the link marked with "X" fails? 

A. PVRST 

B. REP 

C. MST 

D. G.8031 

E. BFD 

Answer:


Q37. Refer to the exhibit. 

You must ensure that both core A and core B devices have only the minimum information required for reaching the spoke routers yet maintain full reachability during network failures. 

Which of the following design solutions accomplishes these requirements? 

A. Route summarization, with specific route leaking on hubs A and B 

B. Route summarization, with GRE tunnel on hubs A and B 

C. Implement PfR enhancements on hubs A and B. 

D. Implement ODR for hub-to-spoke routing. 

Answer:


Q38. A network design shows two routers directly connected to an Ethernet switch using optical connections. There is an OSPF adjacency between the routers. In this design, which solution will ensure that interface down detection is reported as quickly as possible to the IGP? 

A. optimized OSPF SPF timers 

B. Bidirectional Forwarding Detection 

C. automatic protection switching 

D. optimized OSPF LSA timers 

E. Ethernet OAM CFM monitoring 

Answer:


Q39. You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses? 

A. ACL-based forwarding 

B. ACL filtering by destination 

C. Unicast RPF loose mode 

D. Unicast RPF strict mode 

Answer:


Q40. A data center provider has designed a network using these requirements: 

Two data center sites are connected to the public Internet. 

Both data centers are connected to different Internet providers. 

Both data centers are also directly connected with a private connection for the internal traffic, and public Internet traffic can also be routed at this direct connection. 

The data center provider has only one /19 public IP address block. 

Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connection fails, the complete traffic for both data centers should be routed by using the remaining Internet connection. In which two ways can this routing be achieved? (Choose two.) 

A. The data center provider must have an additional public IP address block for this routing. 

B. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the /20 block from the remote data center is sent out with a higher BGP weight at both sites. 

C. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the /20 block from the remote data center is sent out with path prepending at both sites. 

D. One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining Internet connection. 

E. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference at both sites. 

F. BGP will always load-balance the traffic to both data center sites. 

Answer: CD