Virtual of 352-001 exam guide materials and braindumps for Cisco certification for client, Real Success Guaranteed with Updated 352-001 pdf dumps vce Materials. 100% PASS CCDE Written Exam exam Today!

2021 Jun 352-001 Study Guide Questions:

Q1. Refer to the exhibit. 

Which two options are two characteristics of the single-tier headend architecture for DMVPN designs? (Choose two.) 

A. The mGRE and crypto functions are on the same router. 

B. Each DMVPN cloud has two different headend routers for high availability purposes. 

C. It is used in dual-cloud topologies for spoke-to-spoke connectivity. 

D. It only supports hub-and-spoke connectivity. 

E. Spokes cannot be used as RP in multicast deployments. 

Answer: AC 

Q2. Which two headend router scalability factors should be considered when designing a DMVPN network solution that uses a hub-and-spoke topology? (Choose two.) 

A. the required aggregated packet per second 

B. the amount of bandwidth necessary to terminate all the remote tunnels 

C. the routing protocol chosen for the data plane routing 

D. the maximum number of tunnels supported by the headend router 

E. the CPU and memory of the headend router 

Answer: AD 

Q3. The network administrator of a branch office network has decided to deploy Unicast RPF at the access layer. He insists that the design must guarantee that all the packets arriving on the router interfaces are assigned to the same interface subnet. 

Which mode of Unicast RPF would you recommend as the lead network designer? 

A. uRPF strict mode 

B. uRPF loose mode 

C. uRPF VRF mode 

D. RPF feasible mode 

Answer: A 

352-001  exam guide

Most up-to-date 352-001 braindump:

Q4. A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that currently traffic is not being classified and marked correctly somewhere in the network. Which tool should the designer recommend to validate quality of service mappings and use? 




D. protocol analyzer 


Answer: B 

Q5. Which two design aspects should a metro service provider consider when planning to deploy REP for his backbone? (Choose two.) 

A. Two REP segments can be connected redundantly at two points, one connection will be blocked as per the STP defined in IEEE 802.1d. 

B. UDLD can be enabled on REP interfaces to detect unidirectional failures. 

C. The guaranteed convergence recovery time is less than 50 ms for the local segment. 

D. A REP segment is limited to a maximum of seven devices. 

E. VLAN load balancing for optimal bandwidth usage is supported in any REP segment. 

Answer: BE 

Q6. What is a key design aspect to be considered when designing an IP network that will be carrying real-time VoIP traffic? 

A. Minimizing total bidirectional end-to-end delay to 0-150 ms 

B. Minimizing total unidirectional end-to-end delay to 150-500 ms 

C. Minimizing total bidirectional end-to-end delay to 0-50 ms 

D. Minimizing total unidirectional end-to-end delay to 0-150 ms 

Answer: D

100% Guarantee in 352-001-as:

Q7. Your company will attach to a new Gigabit Ethernet-based wide area network from the local service provider for remote connectivity. Each connection will have a 150 Mb/s committed information rate. For the design of this new service, which QoS mechanism should be used to ensure low packet loss toward the service provider network? 

A. shaping 

B. policing 



Answer: A 

Q8. Service provider XYZ plans to provide dedicated Internet access and MPLS L3VPN services to business customers. XYZ has these design specifications: 

.  MP-BGP running on the core MPLS P routers with external Internet routes. 

. The core network will include 16 Point of Presence IP POPs throughout the Asia-Pacific region. . An additional nine non-P routers will use EBGP peering with multiple providers for Internet traffic. . An additional 50 PE routers will provide end customers with dedicated Internet access and L3VPN services throughout the Asia-Pacific region. 

In what two ways can the MP-BGP be removed from the MPLS P core routers and still provide dedicated Internet access and MPLS L3VPN services? (Choose two.) 

A. Disable BGP from the MPLS core P routers and have the MPLS core P routers run OSPF and LDP. 

B. Enable separate BGP control plane routers using a route reflector server concept that will be fully meshed with peer route reflector servers and have clients as MPLS PE routers and EBGP peering routers. 

C. Enable all EBGP routers as route reflector servers and MPLS PE routers as their clients. 

D. It is not possible to disable BGP from the MPLS core P routers without impacting the dedicated Internet access and MPLS L3VPN services. 

Answer: BC 

Q9. You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network: 

A pool of servers is accessed by numerous data centers and remote sites. 

The servers are accessed via a cluster of firewalls. 

The firewalls are configured properly and are not dropping traffic. 

The firewalls occasionally cause asymmetric routing of traffic within the server data center. 

Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers? 

A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster 

B. Poison certain subnets by adding static routes to Null0 on the server farm core switches. 

C. Unicast Reverse Path Forwarding in strict mode 

D. Unicast Reverse Path Forwarding in loose mode 

Answer: D 

Q10. Refer to the exhibit. 

Your company designed a network to allow server VLANs in a data center to span all access switches. In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches. In which three ways should the design of the STP domain be optimized for server and application performance? (Choose three.) 

A. Use loop guard on access ports. 

B. Use PortFast on access ports. 

C. Use root guard on access ports. 

D. Align Layer 2 and Layer 3 forwarding paths. 

E. Use BPDU Skew Detection on access ports. 

F. Explicitly determine root and backup root bridges. 

Answer: BDF