Exam Code: 352-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCDE Written Exam
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 352-001 Exam.

Q1. You are evaluating convergence characteristics of various interior gateway protocols for a new network design. Which technology allows link-state routing protocols to calculate paths to destination prefixes that are functionally similar to feasible successors in Enhanced Interior Gateway Routing Protocol? 

A. Incremental Shortest Path First 

B. Cisco Multiprotocol Label Switching Traffic Engineering Fast Reroute 

C. Loop-Free Alternate Fast Reroute 

D. partial route calculation 

E. Fast-Flooding 

Answer:


Q2. Refer to the exhibit. 

When designing an MPLS-based LAN extension between DC-1 and DC-2, what are three advantages of deploying VSS? (Choose three.) 

A. Layers 2, 3, and 4 flow-based load balancing 

B. native VSS and MEC failover without using scripts 

C. sub-second failover 

D. required to configure VPLS 

E. failover time depends on Cisco IOS EEM and STP convergence 

F. limited VLAN-based VPLS traffic hashing 

Answer: A,B,C 


Q3. Refer to the exhibit. 

An enterprise is migrating its single-area OSPF network from a Frame Relay WAN service to an MPLS L3VPN service. Frame Relay will remain in only a few sites that require increased resiliency via two different WAN connections. 

Which feature could be used in the ?MPLS VPN service provider network to support the design requirement by ensuring that during normal operation, intersite traffic will only use the MPLS VPN service and not the old Frame Relay service? 

A. virtual links 

B. sham links 

C. multiple stub areas 

D. super backbone 

Answer:


Q4. You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended? 

A. map DSCP bits into the Exp field 

B. map IP precedence bits into the DSCP field 

C. map flow-label bits into the Exp field 

D. map IP CoS bits into the IP Precedence field 

E. map IP ToS bits into the Exp field 

Answer:


Q5. You are performing a BGP design review for a service provider that offers MPLS-based services to their end customers. The network is comprised of several PE routers that run iBGP with a pair of route reflectors for all BGP address families. Which two options about the use of Constrained Route Distribution for BGP/MPLS VPNs are true? (Choose two.) 

A. This feature must be enabled on all devices in the network at the same time. 

B. The RR must advertise the default route target filter toward the PE routers. 

C. The RRs do not need to advertise any route target filter toward the PE routers. 

D. Both PE and RR routers must support this feature. 

Answer: BD 


Q6. Refer to the exhibit. 

If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.) 

A. Switch A 

B. Switch B 

C. Switch C 

D. Switch D 

Answer: CD 


Q7. The network administrator of a branch office network has decided to deploy Unicast RPF at the access layer. He insists that the design must guarantee that all the packets arriving on the router interfaces are assigned to the same interface subnet. 

Which mode of Unicast RPF would you recommend as the lead network designer? 

A. uRPF strict mode 

B. uRPF loose mode 

C. uRPF VRF mode 

D. RPF feasible mode 

Answer:


Q8. A data center provider has designed a network using these requirements: 

Two data center sites are connected to the public Internet. 

Both data centers are connected to different Internet providers. 

Both data centers are also directly connected with a private connection for the internal traffic, and public Internet traffic can also be routed at this direct connection. 

The data center provider has only one /19 public IP address block. 

Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connection fails, the complete traffic for both data centers should be routed by using the remaining Internet connection. In which two ways can this routing be achieved? (Choose two.) 

A. The data center provider must have an additional public IP address block for this routing. 

B. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the /20 block from the remote data center is sent out with a higher BGP weight at both sites. 

C. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the /20 block from the remote data center is sent out with path prepending at both sites. 

D. One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining Internet connection. 

E. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference at both sites. 

F. BGP will always load-balance the traffic to both data center sites. 

Answer: CD 


Q9. Your company needs to baseline web traffic on a per-session basis for network application reporting. Which two mechanisms, when combined, fulfill the requirement? (Choose two.) 

A. Flexible Netflow 

B. Remote Monitoring 

C. Cisco IOS IP Service Level Agreement 

D. Class-Based Quality of Service Management Information Base 

E. Network-Based Application Recognition 

Answer: AE 


Q10. Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.) 

A. biometric 

B. PKI 

C. UKI 

D. password 

Answer: AB