Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

352-011 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

352-011 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Cisco Certified Design Expert Practical Exam
  • Last Update: Sep 12, 2025
  • Questions and Answers: 249
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

352-011 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

352-011 Practice Exam Questions with Answers Cisco Certified Design Expert Practical Exam Certification

Question # 6

Drag the fast Reroute mechanism on the left and drop it onto the corresponding routing protocol on the right

352-011 question answer

Full Access
Question # 7

352-011 question answer

Full Access
Question # 8

What is an advantage of placing the IS-IS flooding domain boundary at the core Layer in a three-layer hierarchical network?

A.

The L1 and L2 domains can easily overlap

B.

The L2 domain is contained and more stable

C.

It can be applied to any kind of topology

D.

It reduces the complexity of the L1 domains

Full Access
Question # 9

Your customer recently acquired a company with a national WAN of 750 locations consisting of MPLS VPN-based sales, Internet-based sites and sites with direct links to regional hub sites. The existing network has MPLS VPN-based sites. Which solution ensure security and encryption across all sites to meet an audit requirement?

A.

Implement a hierarchical DMVPN-based hub-and-spoke network with IPsec encryption

B.

Migrate newly acquired sites to the MPLS VPN-based service of the parent company

C.

Implement a GETVPN-based solution across all sites with selective traffic encryption

D.

Implement a GETVPN-based solution across all sites with redundant key servers

Full Access
Question # 10

Which option reduces jitter in a VoIP network?

A.

Deploy WRED

B.

Deploy call Admission Control

C.

Adjust the playout delay buffer at the receiver

D.

Increase the bandwidth of the links

Full Access
Question # 11

Which two general SDN characteristics? (Choose two)

A.

Southbound interfaces are interfaces used between the control plane and the date plane

B.

OpenFlow is considered one of the first Northbound APIs used by SDN controllers

C.

Northbound interfaces are open interfaces used between the control plane and the data plane

D.

The separation of the control plane from the data plane

E.

OVSDB is an application database management protocol

Full Access
Question # 12

When a multiprotocol routing environment is designed to have several routers redistributing among the routing domains, how can routing loops be avoided?

A.

By implementing spanning tree

B.

By activating split horizon

C.

By using the AS-path attribute

D.

By using route tags

Full Access
Question # 13

Refer to the exhibit.

352-011 question answer

This network is running IS-IS as the single routing protocol and the LSP and SPF timers are aggressively configured so the network converges in subsecond. The customer reports that router B had a memory crash and reloaded. Which resulted in some packets from the application being lost. The application servers are behind router G and the end users are behind router H, which design change should be made to prevent this packet-loss problem from reoccurring?

A.

Use asymmetric carrier delay timer

B.

Deploy all links as point-to-point

C.

Redesign the network as a flat level 2

D.

Optimize the LSP/SPF timers to send LSPs immediately after a topology change

E.

Enable the advertisement of the overload bit for a specific amount of time after reload on router B

Full Access
Question # 14

Which two options are reasons for designing a large OSPF network with multiple areas connected to the backbone? (Choose two)

A.

Reduce the number of routes within an area

B.

Route tagging capability

C.

Simplify logical topology

D.

Enhance failure detection

E.

Reduce SPF algorithm runs

Full Access
Question # 15

352-011 question answer

Full Access
Question # 16

You must make IGP redesign recommendations for a client that has old equipment, with low CPU power and memory, that they do not have budget replace. They are very concerned about CPU load on routers. They are using IS-IS as the IGP in a single l1 area and all routers are connected to each other with point-to-point links. Which method do you recommend to reduce or limit CPU overhead caused by IS-IS?

A.

Use mesh groups to limit flooding of LSAs

B.

Implement wide style metrics for IS-IS on all routers

C.

Select a router to act as a pseudowire to limit topology synchronization

D.

Divide the router into multiple areas and implement address summarization

Full Access
Question # 17

For a redesign requirement of the service provider network, summarization was implemented at multiple locations for each summary range. Now some customers of the service provider are complaining of higher latency and performance issues for a server hosted in the summarized area. Which design issues must be considered when creating the summarization?

A.

Summarization adds CPU overhead on the routers sourcing the summarized advertisement.

B.

Summarization prevents the visibility of the metric to the component subnets.

C.

Summarization causes packet loss when RPF is enabled.

D.

Summarization creates routing loops.

Full Access
Question # 18

You are designing dual-homed active/active ISP connections from an enterprise customer for internet services, and you have recommended BGP between the customer and ISP. When three security mechanisms do you enable to secure the connection? (Choose three)

A.

uRPF is strict mode

B.

remote triggered black holes

C.

IDS

D.

GTSM

E.

Routing protocol authentication

F.

uRPF in loose mode

Full Access
Question # 19

Which options do you investigate first when designing fast network convergence?

A.

Routing protocol database size

B.

MTU of the involved interfaces

C.

Link speed between sites

D.

Supported Layer 3 failure detection mechanism

Full Access
Question # 20

Which two foundational aspects of loT are still evolving and being worked on by the industry at large? (Choose two)

A.

Regulatory domains

B.

loT consortia

C.

Standards

D.

Low energy Bluetooth sensors

E.

WiFi protocols

Full Access
Question # 21

Which option is a design consideration when using routers in a distributed hardware architecture?

A.

Routing information is stored in the RIB and the FIB makes forwarding decisions as programmed on the line card hardware

B.

After a link failure occurs in the core, the RIB continues to forward the traffic while FIB convergence is in progress

C.

BGP routes are stored in the RIB and IGP routes are stored in the FIB

D.

IP routes are stored in the RIB and MPLS labels are stored in the FIB

Full Access
Question # 22

Across a large WAN network, there will be new video traffic being distributed from a single source at any given time however, the video source might originate from different parts of the multicast domain at different times . Which multicast technology provides for this multicast traffic to be distributed with optimal path selection to the source?

A.

Any source Multicast.

B.

PIM sparse mode.

C.

Bidirectional PIM.

D.

Source Specific Multicast.

Full Access
Question # 23

Which two SAN designs appropriate to support large-scale SAN environments? (Choose two)

A.

Edge-core-edge design

B.

Fibre Channel forwarder

C.

Split fabric design

D.

Core-edge design

E.

Dual fabric design

Full Access
Question # 24

Which feature or technology that affects the operations of IPsec should be taken into account when designing an IPsec network using Authentication header?

A.

TCP MSS adjustment

B.

Certificate-based authentication

C.

Transform set

D.

NAT

Full Access
Question # 25

Refer to the exhibit.

352-011 question answer

You are a network designer who is given these design requirements:

? Multicast services must be provided for Layer 3 VPN customers

? The same forwarding technology must be used as Layer 3 VPN unicast packets

? Replication of multicast traffic is not allowed on the ingress PE

Which multicast VPN technology conforms to the design requirements?

A.

Multipoint-to-point LDP

B.

MSDP

C.

MLDP VPN

D.

Rosen Draft using LDP

Full Access
Question # 26

In a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries, which two mechanisms avoid suboptimal routing? (Choose two)

A.

Route filtering

B.

AD manipulation

C.

Matching EIGRP process ID

D.

Matching OSPF external routes

E.

Route tagging

Full Access
Question # 27

Which three network management requirements are common practices in network design? (Choose three)

A.

Ensure that all network devices have their clocks synchronized.

B.

Collect SNMP poll information for future regression analysis.

C.

Capture both ingress and egress flow-based packets, while avoiding duplication of flows.

D.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.

E.

Validate data plane health, and application and services availability, with synthetic traffic.

Full Access
Question # 28

Which technology , implemented on aggregation –edge nodes at the aggregation layer, provides per –tenant isolation at Layer 3 , with separate dedicated per-tenant routing and forwarding tables on the inside interfaces of firewall contexts?

A.

VDC

B.

VLAN

C.

VXLAN

D.

VRF-lite

Full Access
Question # 29

Which load balancing option for IP-only traffic is the least efficient in terms of EtherChannel physical links utilization?

A.

On a per source IP address basis

B.

On a per destination MAC address basis

C.

On a per destination IP address basis

D.

On a per port number basis

Full Access
Question # 30

How must queue sizes be designed to ensure that an application functions correctly?

A.

The default queue sizes are good for any deployment

B.

Each individual device queuing delay in chain must be less than or equal to the application required delay

C.

The queuing delay on every device in chain must be exactly the same

D.

The sum of the queuing delay of all devices in chain must be less than or equal to the application required delay

Full Access
Question # 31

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Full Access
Question # 32

VPLS is implemented in a Layer 2 network with 2000 VLANs. Which must be the primary concern to ensure successful deployment of VPLS?

A.

The underlying transport mechanism

B.

PE scalability

C.

Flooding is necessary to propagate MAC address reachability information

D.

VLAN scalability

Full Access
Question # 33

A data center deign requires monitoring of their business critical voice and video services accessed by remote locations. Which two items are applicable? (Choose two)

A.

If multiple applications share the same DSCP or CoS values, NBAR can be utilized

B.

The applications being monitored must be assigned a unique CoS value

C.

If multiple applications share the same the same DSCP or CoS values, IPFIX can be utilized

D.

The applications being monitored must be assigned a unique QoS profile

E.

The applications being monitored must be assigned unique DSCP values

F.

The reporting data must be assigned to a QoS profile to ensure accurate statistics

Full Access
Question # 34

Refer to the Exhibit.

352-011 question answer

In which three Layers should you use nonstop Forwarding to reduce service impact in case of failure? (Choose three)

A.

Enterprise Edge

B.

Enterprise Core

C.

Service provider Edge

D.

Dual-attached sever Layer

E.

Enterprise Non-Routed Access Layer

F.

Enterprise Non-Routed Distribution Layer.

Full Access
Question # 35

The enterprise customer ABC Corp will deploy a centralized unified communications application to provide voice, and instant messaging to their branch offices. Some of the branch offices are located in remote locations and are connected via a 1.5 Mb/s Layer 3 VPN connection. Which two ways are the most cost-effective to ensure that this new application is implemented properly? (Choose two)

A.

Use a low bitrate codec such as G 711

B.

Set voice activity detection to avoid sending packets when the conversations is silent

C.

Enable VRF-Lite on the CE router to create a separate voice VRF

D.

Set LFI on the WAN connections to interleave the small voice packets with the large data packets

E.

Set WAN optimization on the CE router to compress the voice packets for improved bandwidth utilization and performance

F.

Use a low bitrate codec such as G 729

Full Access
Question # 36

Which two IoT use cases require the low latency and high reliability that 5G networks provide?

A.

Smart Home

B.

Automotive

C.

Health and Wellness

D.

Smart Cities

E.

Sports and Fitness

Full Access
Question # 37

An enterprise customer A with provider-independent address space is dual-homed to two ISP. Which two options , when combined, allow for customer A to efficiently achieve out-bond traffic load-balancing? ( Choose two)

A.

Advertise Customer A subnets with a shorter AS path prepend to one of the ISPs than to the other

B.

Advertise Customer A subnets with different MED values to the two ISPs

C.

Accept a default route from both ISPs

D.

Make the CE connected to both ISPs route reflector

E.

Accept the routes originated on both ISPs and their direct peers

Full Access
Question # 38

An network is designed to use OSPF to reach eBGP peers. Which condition should be avoided in the design to potentially prevent the eBGP peers do not flap continuously in case of link failure?

A.

Disable BGP synchronization.

B.

Advertise IP addresses used on eBGP peer statement via a non-backbone OSPF area.

C.

Advertise via eBGP IP addresses used on eBGP peer statements.

D.

Use an ACL to block BGP in one direction.

Full Access
Question # 39

You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the amount of burden on the network infrastructure?

A.

SPAN monitor ports

B.

passive taps

C.

IP NBAR

D.

NetFlow

Full Access
Question # 40

Which two control plane policer design options should you consider to achieve high availability? (Choose two)

A.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence

B.

Control plane policers are really needed only on externally facing devices

C.

Control plane policers can cause the network management systems to create false alarms

D.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform-dependent in terms of classification ability

E.

Control plane policers must be processes before a forwarding decision is made

Full Access
Question # 41

At which two networks points is route summarization supported? (Choose two)

A.

At EIGRP AS boundaries

B.

At EIGRP interface boundaries

C.

At OSPF virtual-link boundaries

D.

At EIGRP are boundaries

E.

At OSPF area boundaries

F.

At EIGRP stub interface boundaries

Full Access
Question # 42

You are designing an optical network. Your goal is to ensure that your design contains the highest degree of resiliency. In which two ways should you leverage a wavelength-switched optical network solution in your network design? (Choose two.)

A.

a wavelength-switched optical network guarantees restoration based strictly on the shortest path available

B.

a wavelength-switched optical network provides fault tolerance for single failures only

C.

a wavelength-switched optical network takes linear and nonlinear optical impairment calculation into account

D.

a wavelength-switched optical network assigns routing and wavelength information

E.

a wavelength-switched optical network eliminates the need for dispersion compensating units in a network

Full Access
Question # 43

You have been asked to design a high -density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels.

B.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

C.

Choose a high minimum data rate to reduce the dory cycle.

D.

Enable 802.11n channel bonding both 2.4 GHz and 5 GHz to increase the aggregated cell throughput.

E.

Increase the number of SSIDs to load-balance the client traffic.

Full Access
Question # 44

A multisite data center network runs OSPF and DWDM point-to-point interfaces for site to-site connectivity. Which method to detect interfaces the fastest?

A.

interface event dampening

B.

LoS/AJS event faults

C.

UDLD

D.

fast-hello> timers

Full Access
Question # 45

Which two OSPF network type combinations can you use in the design that requires spoke-to-spoke direct traffic? (Choose two.)

A.

hub as point-to-multipoint and spokes as non-broadcast

B.

hub as point-to-multipoint and spokes as point-to-point

C.

hub as broadcast and spokes as non-broadcast

D.

hub as point-to-point and spokes as point-to-point

Full Access
Question # 46

Which two statements about AToM are true? (Choose two)

A.

It encapsulates Layer 2 frames at the egress PE

B.

When using AToM, the IP precedence filed is not copied to the MPLS packet

C.

AToM supports connecting different L2 technologies using interworking option

D.

The loopback address of the PE router must be either /24 or /32

E.

It provides support for L2VPN features on ATM interfaces

Full Access
Question # 47

Refer to the exhibit.

352-011 question answer

Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged. Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.)

A.

Enable mutual redistribution between OSPF and RIP on one border router.

B.

Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags.

C.

Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router B.

D.

Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database.

E.

Filter external routes on Router A and Router B based on route tags.

Full Access
Question # 48

Which multicast technology provides a large, many-to-many connectivity for a new application while minimizing load on the existing network infrastructure?

A.

PIM Sparse Mode

B.

Bidirectional PIM

C.

Any-Source Multicast

D.

Source Specific Multicast

Full Access
Question # 49

What is a design aspect regarding multicast transport for MPLS Layer 3 VPNs using the Rosen Draft implementation?

A.

LDP is the multicast control plane protocol.

B.

Multicast traffic is forwarded over GRE tunnels.

C.

Multicast traffic is forwarded over LDP or RSVP signaled LSPs.

D.

Using the MDT SAFI in BGP ensures that PIM can be disabled in the core.

Full Access
Question # 50

You are performing a BGP design review for a service provider that offers MPLS-based services to their end customers. The network is comprised of several PE routers that run iBGP with a pair of route reflectors for all BGP address families. Which two options about the use of Constrained Route Distribution for BGP/MPLS VPNs are true? (Choose two.)

A.

The RRs do not need to advertise any route target filter toward the PE routers

B.

The RR must advertise the default route target filter toward the PE routers

C.

Both PE and RR routers must support this feature

D.

This feature must be enabled on all devices in the network at the same time

E.

Route distinguishers are used to constrain routing updates

Full Access
Question # 51

Which solution suppresses the effect of excessive interface flapping events on routing protocols?

A.

IP Event Dampening

B.

SPF Backoff

C.

Carrier Delay

D.

BFD

Full Access
Question # 52

A very large enterprise customer is migrating from EIGRP to IS-IS .What is your main concern in regards to change in the path packets take after the migration is complete?

A.

The areas sizes.

B.

The number of prefixes

C.

The redistribution points.

D.

The bandwidth and metrics of the links.

Full Access
Question # 53

What is design considerations of policy-based routing?

A.

It decreases failure detection time

B.

It can create microloops during network reconvergence

C.

It routes traffic destined to a set of users through different exit points

D.

It uses RSVP to differentiate traffic flows, so queuing mechanisms can prioritize them

Full Access
Question # 54

You are designing the QoS features for a large enterprise network that includes DMVPN. In which situation should you use the QoS pre-classify feature?

A.

When you are marking packets with the ToS bits

B.

When the QoS policy cannot be based on DSCP bits

C.

When you are marking packets with the DSCP bits

D.

When your service provider requires the DSCP bits be set

Full Access
Question # 55

What are two possible drawbacks of ending Loop-Free Alternate to support fast convergence for most destination IGP prefixes? (Choose two)

A.

The IGP topology might need to be adjust

B.

Loop-free alternate’s convergence in less than 100 milliseconds is not possible

C.

Loop-free alternate’s are supported only for prefixes that are considered external tot the IGP

D.

Loop-free alternates are not supported in global VPN VRF OSPF instances

E.

Additional path computations are needed

Full Access
Question # 56

Why is a redundant PIM stub router topology a bad network design decision?

A.

Multicast convergence takes long

B.

Multicast traffic duplication will occur

C.

It interferes with IGMP snooping

D.

It interfaces with PIM snooping

Full Access
Question # 57

A customer requests that you determine how much of their remote branch traffic into a central data center is related to a call manager that resides in the data center. Which solution do you recommend?

A.

Enable NetFLow on branch routers

B.

Enable netFlow on central data center routers

C.

Perform SNMP polling of central data center routers

D.

Perform SNMP polling of branch routers

E.

Create an ACL on the local call manager switch with logging enabled

F.

Span traffic from the switch port on the call manager to a data analyzer

Full Access
Question # 58

Which two statements regarding to QoS marking are true? (Choose two)

A.

Shaping is one of the ways that packets can be remarked

B.

Class-based marking occurs after packet classification

C.

802.1Q/p CoS bits and IP Precedence are both layer 3 marking fields

D.

QoS marking establishes a trust boundary that scheduling tools depend on

E.

MPLS EXP and DSCP are both layer 2 marking fields

Full Access
Question # 59

A financial trading organization plans to monitor the network latency for multicast data feeds on a hop-by-hop basis. Which technology should be added to their design to support this requirement?

A.

SPAN

B.

NBAR

C.

IPFIX

D.

Precision Time Protocol

Full Access
Question # 60

A network is designed to use OSPF to reach eBGP peers. For eBGP peers to stay stable in case of a link failure, what condition should be avoided?

A.

Advertise IP addresses used on eBGP statements via a normal OSPF area

B.

Use an ACL to block BGP in one direction

C.

Disable BGP synchronization

D.

Advertise IP addresses used on eBGP peer statements via eBGP

Full Access
Question # 61

Which three options are IS-IS design considerations when connecting two Layer 3 switches directly using a 10 GBASE-T cabling and formatting an IS-IS neighbor adjacency?

A.

The default IS-IS network type is point-to-point so a DIS is not elected

B.

A DIS is elected between the IS-IS neighbors and the elected DIS is pre-empted if router with a higher system ID is connected

C.

The area, levels, and interface MTU parameters must match, and system MTU must be unique for two IS-IS routers to become adjacent

D.

Faster IS-IS hello and dead timers increase bandwidth and CPU use, and may cause instability

E.

The IS-IS hello and dead timers should be tuned to detect failures as quickly as possible

F.

A DIS is elected between the IS-IS neighbors and the elected Dis is pre-empted if a router with a lower system ID is connected

G.

The hello and dead timers must match for two IS-IS routers to become adjacent

Full Access
Question # 62

A customer has a DMVPN network with EIGRP as the overlay protocol. EIGRP timers cannot be shortened, yet the customer requires the detection of lost connectivity between neighbors in less than three seconds. Which action achieves this requirement?

A.

Adjust the GRE keepalive timers

B.

Enable BFD

C.

Deploy IPsec dead peer detection

D.

Adjust the NHRP timers.

Full Access
Question # 63

Which two functions are performed at the core layer of the three-layer hierarchical network design model? (Choose two).

A.

Fault isolation

B.

Qos classification and marking boundary

C.

Fast transport

D.

Reliability

E.

Load balancing

Full Access
Question # 64

You are designing a solution to connect a primary data center to a disaster recovery site, The hosted applications will be web and email servers that are provided through a virtualized environment. Which connectivity technology should you consider for this design?

A.

L2TPV3.

B.

VPWS.

C.

Point-To-Point GRE tunnels.

D.

VPLS.

Full Access
Question # 65

Which solution prevents microloops from be formed during network convergence time?

A.

RSVP-TE

B.

LFA

C.

Prefix suppression

D.

RLFA

Full Access
Question # 66

What is a design application of control plane policing?

A.

CPP protects the control plane from reconnaissance and or denial-of-service attacks

B.

CPP protects the forwarding plane by rate –limiting excessive routing protocol traffic

C.

CPP protects the forwarding plane by allowing legitimate traffic and dropping excessive traffic

D.

CPP drop malformed packet that are sent to the CPU

Full Access
Question # 67

Which two are IoT sensor-specific constraints? (Choose two)

A.

Memory

B.

Processing power

C.

The amount of devices

D.

Cooling

E.

Standard transport protocols

Full Access
Question # 68

The cloud service provider CSP is planning to launch five data centers in Egypt, United Arab Emirates, Saudi Arabia, Qatar and Turkey. CSP is looking for VLAN extension and DCIs between these five data centers to allow for software replication, where original and backup VMs must be on the same subnet. Which tunneling technology must they use?

A.

VPLS

B.

IPsec VPN

C.

VPWS

D.

L2TPv3

Full Access
Question # 69

A large enterprise network has two data centers and a WLAN edge with a large hub-and spoke network. The complete network is configured as a single OSPF area, and spoke routers are connected to unreliable WAN links. Which two changes should you make to deploy LSA on the spoke routers? (Choose two)

A.

Place spoke routers in stub areas

B.

Make the hub routers ABR

C.

Make the hub routers ASBR

D.

Place spoke routers in totally stubby areas

E.

Keep the spoke routers in normal areas

Full Access
Question # 70

Which effect of designing a Layer 2 network using the PortFast fast feature with PVST+ is true?

A.

It shuts down the port when receiving the superior BPDU

B.

It accelerates the network convergence on the trunk uplinks

C.

In combination with BPDU filtering, it causes the switch port to stay in the forwarding state

D.

It moves the switch port directly to the forwarding state

Full Access
Question # 71

As a part of a network design, you should tighten security to prevent man-in-the-middle. Which two security options ensure that authorized ARP responses take place according to know IP-to-MAC address mapping? (Choose two)

A.

DHCP snooping

B.

ARP spoofing

C.

ARP rate limiting

D.

Dynamic ARP Inspection

E.

Port security

Full Access
Question # 72

Which two options are potential problems with route aggregation? (Choose two)

A.

Maintaining host IP addresses during migrations

B.

Route flapping

C.

Suboptimal routing

D.

Topology hiding

E.

Asymmetric routing

F.

Prefix hijacking

Full Access
Question # 73

Drag and drop the design characteristics of GET VPN from the left to the right. Not all options are used.

352-011 question answer

Full Access
Question # 74

.which two options are benefits of using Topology Independent Loop-Free Alternate in WAN design? (Choose two)

A.

It provides backup convergence for all topologies by avoiding the post-convergence path

B.

It maximizes the network utilization by load-sharing across low bandwidth and edge links while IGP convergence is in progress

C.

No additional protocols are required in the MPLS network because it uses LDP labels to signal the backup path

D.

Although it requires enabling segment routing, SR does not have to be activated as the preferred forwarding method

E.

It can provide backup paths for IPv4, IPv6 and LDP traffic

Full Access