Exam Code: 352-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCDE Written Exam
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 352-001 Exam.

2021 Jun 352-001 Study Guide Questions:

Q81. Refer to the exhibit. 


Which technology could be used in this design to provide link recovery and high traffic capacity? 

A. Rapid PVST 

B. MST 

C. PAgP 

D. Flex Links 

Answer: C 


Q82. Which option is a BFD design consideration? 

A. BFD should not be used with RSVP-TE backup tunnels. 

B. BFD echo mode may reduce convergence time. 

C. BFD does not support sessions over MPLS LSPs. 

D. BFD is supported on indirectly connected peers. 

Answer: B 


Q83. Which two features can be used to extend VRFs across a campus? (Choose two.) 

A. 802.1q trunks 

B. LDP 

C. MPLS TE 

D. GRE 

E. port channels 

Answer: AD 


352-001  exam answers

Far out 352-001:

Q84. Refer to the exhibit. 


If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.) 

A. Switch A 

B. Switch B 

C. Switch C 

D. Switch D 

Answer: CD 


Q85. Refer to the exhibit. 


In this BGP design, what is the next hop for 10.1.1.0/24 on R8 and R7? 

A. The next hop for 10.1.1.0/24 on R7 is R8 and the next hop for R8 is R7. 

B. The next hop for 10.1.1.0/24 on R7 is R5 and the next hop for R8 is R6. 

C. The next hop for 10.1.1.0/24 on R7 is R6 and the next hop for R8 is R5. 

D. The next hop for 10.1.1.0/24 on R7 is R3 and the next hop for R8 is R4. 

Answer: A 


Q86. Refer to the exhibit. 


You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.) 

A. When router B fragments packets after the encryption, router C must reassemble these fragmented packets. 

B. When router B fragments packets before the encryption, router C must reassemble these fragmented packets. 

C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets. 

D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets. 

E. When router A fragments packets, router C must reassemble these fragmented packets. 

F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets. 

Answer: ADF 


2passeasy.com

Tested 352-001 exam collections:

Q87. You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ a link-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2 connectivity within the service provider network? 

A. The routers will immediately lose their adjacencies and converge. 

B. The routing protocol will not converge until the hold timers have expired. 

C. The switch ports connected to the router will go down and the routers will immediately converge. 

D. The VLAN on the switches will go inactive, the ports associated on the switch will go down, and the routers will immediately converge. 

Answer: B 


Q88. Your enterprise customer has asked where they should deploy flow monitoring in their network to monitor traffic between branch offices. What is your design recommendation? 

A. at the edge of the network so that user traffic will be seen 

B. at the central site, because all traffic from the remotes will be seen there. 

C. in the core, because all traffic will be seen there 

D. in the data center, because all user traffic will be seen there 

Answer: B 


Q89. You are tasked with implementing a 1000-phone remote access solution, where phone calls will traverse a WAN edge router. Assuming all of the following features are supported in a hardware-assisted manner, which of the following will have the most negative impact 

on the delay of the packet? 

A. encryption 

B. stateful firewall 

C. MPLS encapsulation 

D. GRE encapsulation 

Answer: A 


Q90. You are designing the QoS features for a large enterprise network that includes DMVPN. When would you need to configure QoS preclassify? 

A. when you are marking packets with the DSCP bits 

B. when you are marking packets with the TOS bits 

C. when your service provider requires the DSCP bits be set 

D. when the QoS policy cannot be based on DSCP ToS bits 

Answer: D