★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/352-001-dumps.html


Ucertify.com supplies you no cost dumps for Cisco Cisco exam. We are the only one website that items with all the Cisco 352-001 exam products. As the same together with the actual Cisco exam, our own Cisco Cisco exam braindumps are in multiple-choice. Free downloadable Cisco 352-001 exam questions with verified answers that reflect the actual real exam.

2021 Sep download 352-001:

Q141. Which two features can be used to extend VRFs across a campus? (Choose two.) 

A. 802.1q trunks 

B. LDP 

C. MPLS TE 

D. GRE 

E. port channels 

Answer: AD 


Q142. A company wants to use SSM as the multicast routing protocol inside its network. Some of its multicast applications do not support IGMPv3. In which two ways can the mapping be done when these applications send IGMPv2 join messages? (Choose two.) 

A. The Layer 2 switches can send a request to a DNS server. 

B. The Layer 3 multicast routers can send a request to a DNS server. 

C. The mapping can be done statically at the Layer 2 switches. 

D. The mapping can be done statically at the Layer 3 multicast routers. 

E. The Layer 2 switches can transform the IGMPv2 join to an IGMPv3lite join. 

F. The Layer 3 multicast routers can transform the IGMPv2 join to an IGMPv3lite join. 

Answer: BD 


Q143. Refer to the exhibit. 


You are asked to design this OSPF network to converge within 60 ms for unicast packets after a topology change due to a single link failure. Which technology can be enabled while conforming to the design requirements? 

A. Loop-Free Alternates 

B. BFD 

C. IGP neighbor timer tuning 

D. IGP SPF timer tuning 

E. RSVP-TE Fast Reroute 

Answer: A 


Q144. The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.) 

A. It is not recommended on BGP route reflectors. 

B. It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable. 

C. It can be set on a router during the startup process for a fixed period of time. 

D. It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node. 

E. It can be set on a router until other interacting protocols have signaled convergence. 

Answer: BCE 


Q145. Refer to the exhibit. 


The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN be seen on the core devices? 

A. via CE A and CE B 

B. via CE A 

C. via CE B 

D. no WAN routes will be accessible 

Answer: C 


352-001 vce

Latest examcollection 352-001:

Q146. You are deploying a nationwide intranet solution for a company with 4 data centers and 400 remote branches connected via a provider-based solution. As part of the network design, you must ensure efficient content distribution of training material to remote sites. Which two VPN technologies leverage replication in the network core and provide for efficient bandwidth optimization? (Choose two.) 

A. VPLS 

B. EoMPLS 

C. MPLS Layer 3 VPN 

D. GRE 

E. GET VPN 

Answer: CE


Q147. Voice traffic between two campus enterprise networks is growing. The network designers decide to add a second 10-Mb Metro Ethernet service parallel to their original 10-Mb service in order to provide more bandwidth and diversity. The QoS profile will be the same on the new 10-Mb service due to the voice stability on the first Metro Ethernet link. When the second link is added to the OSPF domain, which traffic design consideration would have the most impact on the voice traffic when both links are active? 

A. per-destination IP address basis 

B. per-flow basis 

C. per-packet basis 

D. per-source IP address basis 

Answer: C 


Q148. What is the definition of the ITIL framework? 

A. an ISO framework that establishes a model for network management and contains guidelines for managing objects, the management database, and the application entity 

B. a five-volume framework for service management that covers design, transition, and delivery of service, and from which the ISO 20000 was developed 

C. a series of tools for process improvement that uses statistical methods to reduce defects in processes and manufacturing 

D. a framework for enterprise architecture that provides a comprehensive approach for designing, planning, implementing, and governing an enterprise information architecture 

E. a framework for enterprise IP Address Management (IPAM) based on the IANA trusted IP lease allocation scheme 

Answer: B 


Q149. How should multiple OSPF areas be designed when deployed on a classic three-layer (core/distribution/access) network hierarchy? 

A. The OSPF flooding domain boundary should be at the edge of the core layer. 

B. The OSPF flooding domain boundary should be within the distribution layer. 

C. OSPF should generally be deployed in a three-layer domain hierarchy to align with the physical three-layer hierarchy. 

D. OSPF flooding domain boundaries should be placed with route aggregation in mind. 

Answer: D 


Q150. Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which one of these addresses would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic? 

A. inside local 

B. outside local 

C. inside global 

D. outside global 

Answer: A