Proper study guides for Most up-to-date Cisco CCDE Written Exam certified begins with Cisco 352-001 preparation products which designed to deliver the Realistic 352-001 questions by making you pass the 352-001 test at your first time. Try the free 352-001 demo right now.

Q51. You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.) 

A. EoMPLS 

B. MPLS Layer 3 VPN 

C. DMVPN 

D. OTV 

E. VPLS 

F. GET VPN 

Answer: AE 


Q52. Refer to the exhibit. 

Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged. Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.) 

A. Enable mutual redistribution between OSPF and RIP on one border router. 

B. Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags. 

C. Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router B. 

D. Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database. 

E. Filter external routes on Router A and Router B based on route tags. 

Answer: BCE 


Q53. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances? 

A. IP packets with broadcast IP source addresses 

B. IP packets with identical source and destination IP addresses 

C. fragmented packets with the do-not-fragment bit set 

D. IP packets with the multicast IP source address 

E. IP packets with the multicast IP destination address 

F. IP packets with the destination IP address 0.0.0.0 

Answer:


Q54. Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which one of these addresses would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic? 

A. inside local 

B. outside local 

C. inside global 

D. outside global 

Answer:


Q55. A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design? 

A. Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network. 

B. Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts. 

C. The multicast application sends too many packets into the network and the network infrastructure drops packets. 

D. The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports. 

Answer:


Q56. When designing a large full mesh network running OSPF, how would you reduce LSA repetition? 

A. Elect a DR and BDR. 

B. Use access control lists to control outbound advertisements. 

C. Choose one or two routers to re-flood LSA information. 

D. Put each of the point-to-point links in your full mesh networking into a separate area. 

Answer:


Q57. What is a key benefit of a layered network design? 

A. cost savings 

B. increased security 

C. increased flexibility 

D. decreased broadcast 

Answer:


Q58. If a network design must support rapid convergence on half-duplex interfaces, which IEEE 802.1w capability should be used? 

A. root guard 

B. proposal-agreement handshake 

C. loop guard 

D. UplinkFast 

Answer:


Q59. Refer to the exhibit. 

A customer runs OSPF with Area 5 between its aggregation router and an internal router. When a network change occurs in the backbone, Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5. You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area. How can you accomplish this task? 

A. Set Area 5 to stubby at the ABR anyway. 

B. Increase the bandwidth on the connection between Router A and Router B. 

C. Turn on LSA throttling on all devices in Area 5. 

D. Implement LSA filtering on the ABR, allowing summary routes and preventing more specific routes into Area 5. 

E. Create a virtual link to Area 0 from Router B to the ABR. 

Answer:


Q60. Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data? 

A. IPFIX 

B. NETFLOW 

C. RMON 

D. IPFLOW 

E. NBAR 

Answer: