352-001 Premium Bundle

352-001 Premium Bundle

CCDE Written Exam Certification Exam

4.5 
(24975 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 352-001 Free Practice Questions

Q1. A customer wants to understand the benefits of a proposed network design that utilizes SNMPv3. Which two network threats is SNMPv3 effective against? (Choose two.) 

A. modification of information threats 

B. masquerade threats 

C. denial of service threats 

D. traffic analysis threats 

Answer: AB 

Q2. Refer to the exhibit. 

Service Provider A and Service Provider B have agreed to a strategic interconnect relationship that will allow them access into each other's geographies by using an inter-AS eBGP VPNv4 multihop between route reflectors. Which two options will accomplish this scenario? (Choose two.) 

A. RR 1 and RR 2 peer using multihop eBGP VPNv4 to exchange prefixes. 

B. ASBR 1 and ASBR 2 act as inline route reflectors that set themselves as the next-hop. 

C. An LSP is formed between ASBR 1 and ASBR 2 using eBGP IPv4. 

D. An LSP is formed between ASBR 1 and ASBR 2 using eBGP VPNv4. 

E. RR 1 and RR 2 peer using multihop eBGP IPv4 to exchange prefixes. 

Answer: AC 

Q3. You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ a link-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2 connectivity within the service provider network? 

A. The routers will immediately lose their adjacencies and converge. 

B. The routing protocol will not converge until the hold timers have expired. 

C. The switch ports connected to the router will go down and the routers will immediately converge. 

D. The VLAN on the switches will go inactive, the ports associated on the switch will go down, and the routers will immediately converge. 

Answer:

Q4. A company requests that you consult with them regarding the design of their production, development, and test environments. They indicate that the environments must communicate effectively, but they must be kept separate due to the inherent failures on the development network. What will be configured on the links between the networks to support their design requirements? 

A. IBGP 

B. EBGP 

C. OSPF 

D. static routes 

Answer:

Q5. Refer to the exhibit. 

After this new OSPF design with per-packet load balancing was implemented, Host A reported that large file downloads from Server A became slow and sometimes failed. The operations team discovered that packets are arriving out of order on R1. Which cost-conscious redesign action will fix the issue? 

A. Upgrade all links to 10 Gbps. 

B. Add an IP SLA probe on R1 and R4. 

C. Adjust the OSPF auto-cost reference bandwidth on R4. 

D. Adjust the OSPF auto-cost reference bandwidth on all routers. 

Answer:

Q6. Which two features can be used to extend VRFs across a campus? (Choose two.) 

A. 802.1q trunks 

B. LDP 

C. MPLS TE 

D. GRE 

E. port channels 

Answer: AD 

Q7. A company wants to use an external appliance between its data center and WAN to optimize email and HTTP communications. The traffic flow must pass this appliance in both directions. The appliance is connected with only one interface to a Cisco IOS router and has a single IP address. Which two adjustments can you make to the network design so that the appliance is added into the traffic path? (Choose two.) 

A. Configure static routes to route the traffic to the appliance. 

B. Adjust the dynamic routing to route the traffic to the appliance. 

C. Configure NAT to force the traffic to the appliance. 

D. Configure a route map at the data center-side interface to forward the traffic to the appliance IP address. 

E. Configure a route map at the appliance-facing interface to forward the traffic to the appliance IP address. 

F. Configure a route map at the WAN-side interface to forward the traffic to the appliance IP address. 

Answer: DF 

Q8. To meet specific business requirements, QoS-marked traffic must be sent over a dedicated link. Which technology fulfills this requirement? 

A. MPLS 

B. Q-in-Q tunneling 

C. policy-based routing 

D. EIGRP with modified metrics 

Answer:

Q9. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances? 

A. IP packets with broadcast IP source addresses 

B. IP packets with identical source and destination IP addresses 

C. fragmented packets with the do-not-fragment bit set 

D. IP packets with the multicast IP source address 

E. IP packets with the multicast IP destination address 

F. IP packets with the destination IP address 0.0.0.0 

Answer:

Q10. Refer to the exhibit. 

In this design, which technology would provide for the best use of resources to provide end-to-end Layer 2 connectivity? 

A. MSTP 

B. PAgP 

C. Multichassis EtherChannel 

D. LACP 

Answer:

Q11. Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement? 

A. Modular QoS CLI 

B. committed accessrRate 

C. policy-based routing 

D. traffic shaping 

Answer:

Q12. Refer to the exhibit. 

You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.) 

A. When router B fragments packets after the encryption, router C must reassemble these fragmented packets. 

B. When router B fragments packets before the encryption, router C must reassemble these fragmented packets. 

C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets. 

D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets. 

E. When router A fragments packets, router C must reassemble these fragmented packets. 

F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets. 

Answer: ADF 

Q13. Refer to the exhibit. 

How would you adjust the design to improve convergence on the network? 

A. Add an intra-POP link between routers 1A and 1B, and enable IP LFA FRR. 

B. Use an IP SLA between the end stations to detect path failures. 

C. Enable SSO-NSF on routers 1A and 1B. 

D. Use BGP to connect the sites over the WAN. 

Answer:

Q14. On a VoIP solution design, which option shows one-way latency, packet loss, and jitter measurements that ensure acceptable voice quality? 

A. Latency: 110 ms Packet loss: 1% Jitter: 40 ms 

B. Latency: 130 ms Packet loss: 0.5% Jitter: 30 ms 

C. Latency: 150 ms Packet loss: 1.25% Jitter: 20 ms 

D. Latency: 170 ms Packet loss: 0.75% Jitter: 10 ms 

Answer:

Q15. In order to meet your service level agreement, your network designer created a design solution that includes interface dampening. In which two ways will interface dampening benefit your overall network design? (Choose two.) 

A. Interface dampening uses an exponential backoff algorithm to suppress event reporting to the upper-level protocols. 

B. When the interface is dampened, further link events are not reported to the upper protocol modules. 

C. When the interface is dampened, further link events are reported to the upper protocol module. 

D. Periodic interface flapping that affects the routing system as a whole should have a period shorter than the system convergence time. 

Answer: AB 

START 352-001 EXAM