Exam Code: 352-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCDE Written Exam
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 352-001 Exam.
2021 Jun 352-001 Study Guide Questions:
Q51. You are working on a network design plan for a company with approximately 2000 sites. The sites will be connected using the public Internet. You plan to use private IP addressing in the network design, which will be routed without NAT through an encrypted WAN network. Some sites will be connected to the Internet with dynamic public IP addresses, and these addresses may change occasionally. Which VPN solution will support these design requirements?
A. GET VPN must be used, because DMVPN does not scale to 2000 sites.
B. DMVPN must be used, because GET VPN does not scale to 2000 sites.
C. GET VPN must be used, because private IP addresses cannot be transferred with DMVPN through the public Internet.
D. DMVPN must be used, because private IP addresses cannot be transferred with GET VPN through the public Internet.
E. GET VPN must be used, because DMVPN does not support dynamic IP addresses for some sites.
F. DMVPN must be used, because GET VPN does not support dynamic IP addresses for some sites.
Q52. In which two ways is IPv4 and IPv6 traffic handled in a network design that uses QoS deployment options? (Choose two.)
A. IPv6 and IPv4 traffic is treated in the same way by using a single QoS policy that classifies and matches on both protocols.
B. IPv6 traffic is treated differently than IPv4 by using the flow-label field, which is built into the IPv6 packet header.
C. IPv6 traffic does not require QoS because it uses to the flow-label field, which classifies and matches on the IPv6 protocol.
D. IPv6 traffic is treated differently than IPv4 by using two different QoS policies.
E. IPv6 traffic is treated differently than IPv4 because it uses only the DSCP value and not the IP precedence.
Q53. Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement?
A. Modular QoS CLI
B. committed accessrRate
C. policy-based routing
D. traffic shaping
Rebirth 352-001 vce 2012:
Q54. You are designing a network using multipoint GRE tunnels and need to be able to detect when connectivity between the GRE tunnel endpoints is broken. Which statement is true about configuring keepalives for multipoint GRE tunnels?
A. The keepalive timer values on the routers must have the same value.
B. Both routers must support GRE tunnel keepalives.
C. No configuration is required to detect when connectivity is broken between the GRE tunnel endpoints.
D. GRE tunnel keepalives will not detect when connectivity is broken between the GRE tunnel endpoints.
Q55. You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)
C. Multichassis EtherChannel over Pseudowire
Q56. You are redesigning an OSPF v2 network and must migrate some links. You are concerned that there are different subnet masks. Which two link types will still form an OSPF adjacency even if there are subnet mask mismatches? (Choose two.)
High quality actualtests 352-001:
Q57. A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspects must be considered before the network design is finalized? (Choose two.)
A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D.
B. UniDirectional Link Detection Protocol can be enabled on Resilient Ethernet Protocol interfaces to detect unidirectional failures.
C. The guaranteed convergence recovery time is less than 50 ms for the local segment.
D. A Resilient Ethernet Protocol segment is limited to a maximum of seven devices.
E. VLAN load balancing for optimal bandwidth usage is supported in any Resilient Ethernet Protocol segment.
Q58. You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?
A. ACL-based forwarding
B. ACL filtering by destination
C. Unicast RPF loose mode
D. Unicast RPF strict mode
Q59. A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which three factors should you to consider when you adjust the timer values? (Choose three.)
A. access bandwidth
B. service provider agreement to support tuned timers
C. number of routes on the CE router
D. number of VRFs on the PE router
E. service provider scheduling of changes to the PE
Q60. You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mb/s and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner?
A. Use a WRED random drop policy.
B. Increase the queue to at least 1 GB.
C. Enable the TCP Nagle algorithm on the receiver.
D. Change the protocol to CIFS.