★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/352-001-dumps.html


Q51. In an OSPF network, users in a particular OSPF non-backbone area are complaining about slow access speeds to a shared corporate resource in another OSPF area. Traceroutes show that theusers are taking a suboptimal default route to the destinations. Which solution will improve access speed? 

A. Make the area totally stubby so that the default can be followed along the best path. 

B. Create a virtual link between the areas so that traffic can shortcut directly between them. 

C. Implement policy routing to channel the traffic in the optimal direction. 

D. Leak specific summaries on the ABRs for the remote subnets in addition to the default. 

Answer:


Q52. What are three key design principles when using a classic hierarchical network model? (Choose three.) 

A. The core layer controls access to resources for security. 

B. The core layer should be configured with minimal complexity. 

C. The core layer is designed first, followed by the distribution layer and then the access layer. 

D. A hierarchical network design model aids fault isolation. 

E. The core layer provides server access in a small campus. 

F. A hierarchical network design facilitates changes. 

Answer: BDF 


Q53. Refer to the exhibit. 

You are designing a spanning-tree network for a small campus. Which two of these options would result in a trouble-free spanning-tree network design? (Choose two.) 

A. Convert all ports to trunk ports, prune off the VLANs that you do not require, and minimize the number of blocking ports. 

B. Introduce Layer 3 VLANs (SVIs) and prune off the VLANs that you do not require. 

C. Convert all the ports to trunk and enable BackboneFast. 

D. Convert all the ports to trunk and enable UplinkFast between all the links. 

Answer: AB 


Q54. A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving. The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer 3 VPN. Which of the following would need to be reviewed to ensure stability in their network? 

A. Assigning unique Route Target ID's 

B. Assigning unique Route Distinguishers 

C. Assigning unique IP address space for the Enterprise NAT/Firewalls 

D. Assigning unique VRF ID's to each Layer 3 VPN 

Answer:


Q55. Which option is a benefit of using N-Port Virtualization? 

A. reduces the amount of domain IDs that are used in the fabric 

B. does not need to create zoning 

C. reduces latency when using local switching on Fibre Channel ports 

D. allows trunking to the upstream switch 

E. does not need to configure the upstream switches 

Answer:


Q56. You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP QoS is implemented properly? (Choose two.) 

A. Differentiated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data 

B. Integrated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data 

C. Integrated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node 

D. Differentiated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node 

E. Integrated Services, where the user, with the assistance of the DSCP signaling protocol, reserves the resources end to end before sending the data 

Answer: BD 


Q57. What is a key design aspect to be considered when designing an IP network that will be carrying real-time VoIP traffic? 

A. Minimizing total bidirectional end-to-end delay to 0-150 ms 

B. Minimizing total unidirectional end-to-end delay to 150-500 ms 

C. Minimizing total bidirectional end-to-end delay to 0-50 ms 

D. Minimizing total unidirectional end-to-end delay to 0-150 ms 

Answer:


Q58. Company A has grown nationwide in the U.S., and each new remote branch has a Metro Ethernet circuit provisioned back to the data center at the headquarters on the West Coast. The operations team says that it cannot manage hundreds of circuits as the company continues to grow. You review the topology and notice that many of the branches are close to each other in geographical zones. How can you redesign this network to improve manageability and increase scalability? 

A. Add an aggregation layer router in each geographical zone. 

B. Add a redundant data center on the East Coast to serve some of the traffic there. 

C. Add a default route in each branch toward the data center on the West Coast. 

D. Use Optimized Edge Routing at the data center. 

E. Build an overlay MPLS network with Layer 3 VPN. 

Answer:


Q59. Refer to the exhibit. 

You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.) 

A. When router B fragments packets after the encryption, router C must reassemble these fragmented packets. 

B. When router B fragments packets before the encryption, router C must reassemble these fragmented packets. 

C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets. 

D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets. 

E. When router A fragments packets, router C must reassemble these fragmented packets. 

F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets. 

Answer: ADF 


Q60. Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.) 

A. biometric 

B. PKI 

C. UKI 

D. password 

Answer: AB