★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/352-001-dumps.html


Realistic of 352-001 test engine materials and braindumps for Cisco certification for IT engineers, Real Success Guaranteed with Updated 352-001 pdf dumps vce Materials. 100% PASS CCDE Written Exam exam Today!

Q91. Refer to the exhibit. 

In the DWDM network, a ring topology carries multiple services between two sites. Which option describes the employed protection design? 

A. Y-cable protection 

B. Splitter protection 

C. Client protection 

D. UDLD 

E. FEC protection 

Answer:


Q92. A network administrator is in charge of multiple IPsec VPN headend devices that service thousands of remote connectivity, point-to-point, IPsec/GRE tunnels. During a recent power outage, in which it was found that a backup power supply in one of those headend devices was faulty, one of the headend routers suffered a complete shutdown event. When the router was successfully recovered, remote users found intermittent connectivity issues that went away after several hours. Network operations staff accessed the headend devices and found that the recently recovered unit was near 100% CPU for a long period of time. How would you redesign the network VPN headend devices to prevent this from happening again in the future? 

A. Move the tunnels more evenly across the headend devices. 

B. Implement Call Admission Control. 

C. Use the scheduler allocate command to curb CPU usage. 

D. Change the tunnels to DMVPN. 

Answer:


Q93. You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design and implementation of the SAN in the new virtualized environment. 

In which two ways can NPIV be used in your proposed design? (Choose two.) 

A. NPIV is used to assign multiple FCIDs to a single N Port. 

B. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN. 

C. You recommend NPIV so that hosts can be members of different zones. 

D. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN. 

Answer: AD 


Q94. When a multiprotocol environment is designed to have several routers redistribute among the routing domains, how can routing loops be avoided? 

A. by using the AS-PATH attribute 

B. by using route tags 

C. by activating split horizon 

D. by implementing spanning tree 

Answer:


Q95. What should be taken into consideration when designing IPsec networks using Authentication Header (AH)? 

A. NAT 

B. transform set 

C. crypto maps 

D. ISAKMP 

Answer:


Q96. Refer to the exhibit. 

A customer runs OSPF with Area 5 between its aggregation router and an internal router. When a network change occurs in the backbone, Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5. You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area. How can you accomplish this task? 

A. Set Area 5 to stubby at the ABR anyway. 

B. Increase the bandwidth on the connection between Router A and Router B. 

C. Turn on LSA throttling on all devices in Area 5. 

D. Implement LSA filtering on the ABR, allowing summary routes and preventing more specific routes into Area 5. 

E. Create a virtual link to Area 0 from Router B to the ABR. 

Answer:


Q97. You are designing an Out of Band Cisco Network Admission Control, Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be trunked back to the Clean Access Server from the access switch? 

A. untrusted VLAN 

B. user VLAN 

C. management VLAN 

D. authentication VLAN 

Answer:


Q98. Which option is a BFD design consideration? 

A. BFD should not be used with RSVP-TE backup tunnels. 

B. BFD echo mode may reduce convergence time. 

C. BFD does not support sessions over MPLS LSPs. 

D. BFD is supported on indirectly connected peers. 

Answer:


Q99. Which two headend router scalability factors should be considered when designing a DMVPN network solution that uses a hub-and-spoke topology? (Choose two.) 

A. the required aggregated packet per second 

B. the amount of bandwidth necessary to terminate all the remote tunnels 

C. the routing protocol chosen for the data plane routing 

D. the maximum number of tunnels supported by the headend router 

E. the CPU and memory of the headend router 

Answer: AD 


Q100. Currently a service provider provides IPv4 traceroute services between MPLS PE routers. The provider wants to implement IPv6 with MPLS 6PE/6VPE and then provide parallel IPv6 traceroute services between MPLS PE routers. Which two design solutions provide this service? (Choose two.) 

A. The P routers must support ICMPv6. 

B. The PE routers must support ICMPv6. 

C. The P routers must support full IPv6. 

D. The PE routers must support full IPv6. 

Answer: BD