New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! 352-001 has been withdrawn. The new exam code is 400-007

Practice Free 352-001 Cisco Certified Design Expert Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the Cisco 352-001 Exam the most current and reliable questions . To help people study, we've made some of our Cisco Certified Design Expert exam materials available for free to everyone. You can take the Free 352-001 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Which design benefit of PortF ast is true?

A.

PortFast does not generate a spanning tree topology change hen a station on a port is connected or disconnected

B.

PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

D.

PortFast detects one-way communications on the physical port, which prevents switch loops

E.

PortFast prevents switch loops that are caused by a unidirectional point to point link condition on Rapid PVST+ and MST

F.

PortFast prevents switched traffic from traversing suboptimal paths on the network

Question # 7

352-001 question answer

Refer to the exhibit. Which technology could be used in this design to provides link recovery and high traffic capacity?

A.

PAgP

B.

Flex Links

C.

MST

D.

Rapid PVST

Question # 8

Refer to the exhibit.

352-001 question answer

Which impact of using three or more ABRs between the backbone area and area 1 is true?

A.

In a large-scale network LSA replication by all ABRs can cause serious scalability issues

B.

Prefixes from the non-backbone area are advertised by one ABR to the backbone area.

C.

In a large-scale network multiple ABRs can create microloops

D.

Multiple ABRs reduce the CPU processing on each ABR due to splitting prefix advertisement between areas

Question # 9

ACME corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain conditions in the network. Which feature should be used to meet this design requirement?

A.

Cisco IOS Embedded Event Manager

B.

IP SLA

C.

Reflexive ACLs

D.

SOAP

Question # 10

A engineer has been tasked to design an IPv6 wireless sensor network using IEEE 802.15.4 to support an IoT project. Which two protocols does the engineer need to utilize for this design? (Choose two)

A.

802.11

B.

VPN

C.

6LoWPAN

D.

802.11ax

E.

802.11ac

Question # 11

Which description of the RPF check in the multicast forwarding traffic is true?

A.

The source address of the multicast packet is checked in the unicast routing table. If the multicast packet arrived from the interface that matches with the interface to reach the source address, this packet passes the RPF check.

B.

The destination address of the multicast packet is checked in the BGP database. If the multicast packet arrived from the interface that mate with the interface to reach BGP peer that advertised the mutlicast prefix, this packet fails the RPF check.

C.

The source address of the multicast packet is checked in the unicast routing table. If the multicast packet arrived from the interface that matches with the interface to reach the source address, this packet fails the RPF check

D.

The unicast address of the multicast packet is checked in the BGP database. If the multicast packet arrived from the interface that matches with the interface to reach BGP peer that advertised the multicast prefix, this packet passes the RPF check

Question # 12

An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?

A.

EoMPLS-based VPLS can carry multicast traffic in a scalable manner

B.

Use a mesh of GRE tunnels to carry the streams between sites

C.

Enable snooping mechanisms on the provider PE routers.

D.

Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites

Question # 13

An IPsec VPN WAN network has a new requirement for passing multicast traffic between sites. Which two technologies must be added to the design to pass the multicast traffic? (Choose two)

A.

IGMP

B.

GRE

C.

PIM dense mode

D.

VTI

E.

Fast Switching

Question # 14

Which two QoS models should be part of a network redesign to ensure that IP QoS is deployed to support data, voice and videos application? (Choose two)

A.

Integrated Services by reserving network resources end-to-end before sending data

B.

Differentiated Services by managing network resources to provide QoS to specific user packet flows

C.

Differentiated Services by categorizing application traffic into multiple classes marked directly in the packets

D.

Differentiated Services by reserving network resources end-to-end before sending data

E.

Integrated Services by categorizing application traffic into multiple classes marked directly in the packets

Question # 15

The network designer needs to use GLOP IP addresses in order to make them unique within their ASN Which multicast address range should be used?

A.

232.0.0.0 to 232 255.255.255

B.

H233.0.0 0 to 233.255.255 255

C.

239000 to 239255255.255

D.

224000 to 2240.0 255

Question # 16

Which description correctly describes Git?

A.

Git is a command line utility for creating archives of files

B.

Git is a web-based responsibility for sharing files

C.

Git is a configuration management tool that automates provisioning

D.

Git is a version control system for tracking changes in files

Question # 17

Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops What do you answer?

A.

VXLAN offers native loop avoidance mechanism

B.

Storm Control should be enabled on all ports

C.

VPC+ could prevent L2 loop on access ports

D.

BPDU Guard should be enabled on all VTEP access ports

Question # 18

Which actions minimize the impact of the trusted NMS polling your network such as high CPU utilization on network devices and network instability? (Choose two).

A.

Implement SNMP community restrictions that are associated with an ACL.

B.

Disable unused OIDs and MIBs on the NMS systems

C.

Unload unused MIBs from the network devices

D.

Increase the SNMP process priority

E.

Prevent polling of large tables through the use of SNMP OID restrictions

Question # 19

In a routed access hierarchical campus design, the access-to-distribution Layer 2 uplink trunks are replaced with Layer 3 point-to-point routed links. Why is it recommended that VLANs are confined on a single access switch rather than span across multiple access switches?

A.

to allow for better convergence time

B.

to prevent the occurrence of Layer 2 loops

C.

to allow for fault isolation

D.

to prevent routing black holes

Question # 20

Which two statements describe how including cisco IPoDWDM proactive protection in an optical design would minimize packet loss in the event of a fiber cut? (Choose two.)

A.

It reroutes the optical circuit after an event that impacts service

B.

It uses the FFC field on the OTN frame to trigger protection

C.

It uses a "not to exceed" predefined BER threshold to cause traffic redirection

D.

It is effective both when you have redundant and nonredundant Layer 3 MPLS paths

Question # 21

A network engineering team is designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS Traffic Engineering Fast Reroute solution has the same failover Tailback times as a traditional SONET/SDH network (around 50 msec). Which type of MPLS TE tunnel must be considered for this demonstration to address the link failure and node failure within the lab network?

A.

next-hop tunnel

B.

TE backup tunnel

C.

next-next-hop tunnel

D.

FRR backup tunnel

Question # 22

Two enterprise networks must be connected together Both networks are using the same private IP addresses The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload feature to save IF addresses from the NAT pools Which design addresses this requirement using only one Cisco I OS NAT router for both directions?

A.

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT, with overload in both directions.

B.

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload option in both directions.

C.

The overload feature is the default and does not have to be configured.

D.

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands for the overload feature in both directions.

E.

The Nat Virtual interface must be used to achieve this requirement.

Question # 23

Which optimal use of interface dampening on a fast convergence network design is true?

A.

When numerous adjacent flaps of very shot duration occur

B.

When the router hardware is slower than the carrier delay down detection

C.

When occasional flaps of long duration occur

D.

When the switch hardware is faster than the debounce timer down detection

Question # 24

Your organization is working on a design solution for a new internet-based remote access virtual private network that has 1000 remote sites. A network administrator recommends GETVEP as the model because the network of today uses DMVPN, which results in a lot of background NHRP control traffic. What is a potential problem with using GETVPN for this design solution?

A.

GETVPN would require a high level of background traffic to maintain its IPsec SAs

B.

GETVPN requires an overlay routing control plane

C.

GETVPN key servers would be on public, hacker-reachable space and need higher security

D.

GETVPN is not scalable to a large number of remote sites

Question # 25

For which two reasons do you choose L2TPv3 over other technologies for a VPN solution? (Choose two)

A.

The VPN solution should support Frame Relay to Ethernet pseudowrite connections.

B.

The VPN solution should be industry standard.

C.

The VPN solution does not contain MPLS on the network core.

D.

The VPN solution requires multipoint Ethernet LAN service

E.

The VPN solution should tunnel Layer 2 frames and Layer 3 packets

Question # 26

Your design plan includes mutual redistribution of two OSPF networks at multiple locations, with connectivity to all locations in both networks. How is this accomplished without creating Outing loops?

A.

Use route maps on the ASBRs to allow only internal routes to be redistributed.

B.

Use route maps on the ASBRs to allow internal and external routes to be redistributed.

C.

Use route maps on the ASBRs to set tags for redistributed routes.

D.

Use route maps on the ASBRs to filter routes with tags so they are not redistributed.

Question # 27

Which design solution decreases CAPEX when designing an enterprise campus involving many small Sites?

A.

route summarization on data center distribution routers

B.

route summarization on routed access layers

C.

route summarization on core routers

D.

route summarization on WAN edge routers

Question # 28

You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Question # 29

You are creating a network design that will influence the traffic path across the MPLS core on a virtual private LAN. Which parameter is included in the design to manage the traffic?

A.

Create a MPLS traffic engineering tunnel and modify the path using auto-route announce

B.

Create a MPLS traffic engineering tunnel and modify the path uting a stake route

C.

Deploy MPLS traffic engineering and modify the path using preferred path

D.

Deploy MPLS traffic engineering and modify the path using auto-route, static routing, or PBR

Question # 30

Company XYZ has an audit requirement to encrypt traffic between selected development teams. Those teams are located in multiple sites across the country. They must migrate all locations to a MPLS Layer 3 VPN-Based service. But this implementation must not impact the VoIP solution. The VoIP traffic to and from the call centre sites must be copied to the data centre servers so that it is recorded to meet another audit requirement. Which solution meets these requirements?

A.

Implement a DMVPN-based encrypting all traffic except the VoIP traffic

B.

Implement LISP-based tunnels for the development traffic.

C.

Implement site-to-site GRE tunnels only for development traffic

D.

Implement GETVPN with selective encryption only for the development traffic

Question # 31

352-001 question answer

Refer to the exhibit. You must design this network for IP Fast Reroute by enabling the OSPF Loop-Free Alternates (not Remote LoopFree Alternates). What is a concern about the proposed solution?

A.

Fast Reroute requires Cisco MPLS TE

B.

OSPF Loop Free Alternates on ring topologies are prone to routing loops

C.

OSPF Loop-Free Alternates are transport dependent

D.

Loop-Free Alternates feature

E.

OSPF Loop-Free Alternates are not supported on ring topologies

Question # 32

You must change a network design to include link-state topology summarization. Which two effects of route summarization should you be concerned about? (Choose two)

A.

Packet reordering

B.

Suboptimal routing

C.

Traffic black-holing

D.

Not scalable

E.

Slow convergence

Question # 33

When designing a network that uses IPsec, which technique is suggested to avoid network fragmentation?

A.

Reduce the MTU only in the WAN

B.

Reduce the MTU on the side closest to the client

C.

Reduce the MTU on the side closest to the server

D.

Reduce the MTU on both ends of the TCP connection

Question # 34

Which statement correctly describes Ansible operations and play books?

A.

Ansible is agenless and uses play books formatted in YAML

B.

Ansible is agent based and uses pi ay books formatted in YAML

C.

Ansible is agent based and uses pi ay books formatted in XML

D.

Ansible is agentless and uses pi ay books formatted in XML

Question # 35

Drag and drop the multicast protocols from the left onto the current design situation on the right.

352-001 question answer

Question # 36

Refer to Exhibit.

352-001 question answer

Which three layers must use cisco nonstop forwarding to reduce service impact in case of failure?

A.

Enterprise Edge

B.

Dual-attached Server Layer

C.

Enterprise Non-Routed Access Layer

D.

Enterprise Core

E.

Enterprise Non-Routed Distribution Layer

F.

Service Provider Edge

Question # 37

You are designing an 802.1x solution for a customer where the network supports a large number of IP phones and printers. You plan to configure MAC address bypass for the phones and printers. What is your primary concern related to authentication?

A.

additional AAA traffic on the network

B.

placement of the AAA server

C.

potential of MAC address spoofing

D.

scaling of the database that stores the MAC addresses

Question # 38

Which undesired effect of increasing the jitter compensation buffer is true?

A.

The overall transport utter decreases and quality improves

B.

The overall transport delay decreases and quality improves

C.

The overall transport jitter increases and quality issues can occur

D.

The overall transport delay increases and quality issues can occur

Question # 39

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )

A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Question # 40

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

A.

Build neighbor adjacencies in a triangulated fashion

B.

Limit the query domain by use of distribute lists.

C.

Build neighbor adjacencies in a squared fashion

D.

Limit the query domain by use of summarization

E.

Limit the query domain by use of default routes