Up to the immediate present 352-001 test preparation Guide

We provide real 352-001 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 352-001 Exam quickly & easily. The 352-001 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 352-001 dumps pdf and vce product and material, you can easily pass the 352-001 exam.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 352-001 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/352-001-exam-dumps.html

Q91. Refer to the exhibit. 

Four customer sites are connected through an EoMPLS-based VPLS over an MPLS provider. You are migrating from OSPF to multi-level IS-IS as the routing protocol to run on the four CE routers, and connectivity between all four sites is required. You want to control which CE or CEs will be elected as the Designated Intermediate System. Which two key aspects should be taken into account? (Choose two.) 

A. The DIS role for Level1 and Level2 can be performed by different routers. 

B. The CE with the second highest priority will be elected as the backup DIS on the LAN segment. 

C. One of the CE routers will be elected as the DIS based on interface priority then highest MAC address. 

D. It is recommended to use point-to-point link type on the CEs. 

E. If a new CE router is added to the VPLS cloud with a lower interface priority it will become the DIS. 

Answer: AC 


Q92. In which two ways is IPv4 and IPv6 traffic handled in a network design that uses QoS deployment options? (Choose two.) 

A. IPv6 and IPv4 traffic is treated in the same way by using a single QoS policy that classifies and matches on both protocols. 

B. IPv6 traffic is treated differently than IPv4 by using the flow-label field, which is built into the IPv6 packet header. 

C. IPv6 traffic does not require QoS because it uses to the flow-label field, which classifies and matches on the IPv6 protocol. 

D. IPv6 traffic is treated differently than IPv4 by using two different QoS policies. 

E. IPv6 traffic is treated differently than IPv4 because it uses only the DSCP value and not the IP precedence. 

Answer: AD 


Q93. You are working on a network design plan for a company with approximately 2000 sites. The sites will be connected using the public Internet. You plan to use private IP addressing in the network design, which will be routed without NAT through an encrypted WAN network. Some sites will be connected to the Internet with dynamic public IP addresses, and these addresses may change occasionally. Which VPN solution will support these design requirements? 

A. GET VPN must be used, because DMVPN does not scale to 2000 sites. 

B. DMVPN must be used, because GET VPN does not scale to 2000 sites. 

C. GET VPN must be used, because private IP addresses cannot be transferred with DMVPN through the public Internet. 

D. DMVPN must be used, because private IP addresses cannot be transferred with GET VPN through the public Internet. 

E. GET VPN must be used, because DMVPN does not support dynamic IP addresses for some sites. 

F. DMVPN must be used, because GET VPN does not support dynamic IP addresses for some sites. 

Answer:


Q94. During a network design review, it is recommended that the network with a single large area should be broken up into a backbone and multiple nonbackbone areas. There are differing opinions on how many ABRs are needed for each area for redundancy. What would be the impact of having additional ABRs per area? 

A. There is no impact to increasing the number of ABRs. 

B. The SPF calculations are more complex. 

C. The number of externals and network summaries are increased. 

D. The size of the FIB is increased. 

Answer:


Q95. Which two techniques are used in a network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two.) 

A. Bidirectional Forwarding Detection 

B. IP event dampening 

C. link-state incremental SPF 

D. link-state partial SPF 

E. LSA throttling 

F. SPF throttling 

Answer: BE 


Q96. A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design? 

A. Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network. 

B. Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts. 

C. The multicast application sends too many packets into the network and the network infrastructure drops packets. 

D. The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports. 

Answer:


Q97. Refer to the exhibit. 

In this network design, where should summarization occur to provide the best summarization and optimal paths during a single-failure incident as well as during normal operation? 

A. a single identical summary for all the branch offices placed on routers 1A, 1B, 2A, and 2B 

B. two summaries on 1A and 1B, and two summaries on 2A and 2B 

C. a single identical summary on 3A and 3B 

D. a single summary on each aggregation device for the branches connected to them 

Answer:


Q98. A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device? 

A. Static Routes for Route Leaking 

B. Policy Based Routing 

C. Multi-Protocol BGP 

D. OSPF per VRF Instance 

Answer:


Q99. The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.) 

A. It is not recommended on BGP route reflectors. 

B. It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable. 

C. It can be set on a router during the startup process for a fixed period of time. 

D. It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node. 

E. It can be set on a router until other interacting protocols have signaled convergence. 

Answer: BCE 


Q100. Refer to the exhibit. 

An enterprise is migrating its single-area OSPF network from a Frame Relay WAN service to an MPLS L3VPN service. Frame Relay will remain in only a few sites that require increased resiliency via two different WAN connections. 

Which feature could be used in the ?MPLS VPN service provider network to support the design requirement by ensuring that during normal operation, intersite traffic will only use the MPLS VPN service and not the old Frame Relay service? 

A. virtual links 

B. sham links 

C. multiple stub areas 

D. super backbone 

Answer: