Cisco Certified Design Expert 352-001 Exam Questions

Cisco CCDE written exam will validate that professionals have the expertise to gather and clarify network functional requirements, develop network designs to meet functional specifications, develop an implementation plan, convey design decisions and their rationale, and possess expert-level network infrastructure knowledge. PassQuestion new updated Cisco Certified Design Expert 352-001 Exam Questions to help you practice real questions and answers, it will ensure you pass your Cisco 352-001 exam easily.

Test Online Cisco 352-001 Free Questions

1. Which statement about the SDN framework environment is true?

 
 
 
 
 

2. Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network? (Choose two)

 
 
 
 
 

3. Which two functions of an NSSA an OSPF network design are true? (Choose two)

 
 
 
 
 

4. Refer to the exhibit.

A retail company has around 500 branches across the U.S. The company is connected to the DC and DR routers through a Frame Relay cloud. All the communication happens only between BR routers to DC or DR routers, and there is no BR router to BR rotter communication. The service provider has decided to discontinue the Frame Relay service and replace it with Metro Ethernet. The retail company currently uses OSPF NBMA mode as IGP, which is the only scenario that the IT team is familiar with. The retail company decides to optimize the data center computing resources with server virtualisation. They have many serve, segments that need Layer 2 connectivity between the DC router and me DR router tor VM failover.

Which Metro Ethernet technology uses a minimum of resources from the service provider network?

 
 
 
 

5. An enterprise campus is adopting a network virtualization design solution with these requirements

✑ It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

✑ It must maintain end-to-end logical path transport separation across the network

✑ resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

 
 
 
 
 

6. Which description of the RPF check in the multicast forwarding traffic is true?

 
 
 
 

7. You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops, vPC removes Layer 2 loops while providing redundancy through which mechanism?

 
 
 
 

8. Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

 
 
 
 

9. Which two descriptions of the transport protocols used by RESTCONF and NETCONF are true? (Choose two)

 
 
 
 
 
 

10. You are designing an MPLS Layer 3 VPN network where the data path must be the same in both directions. Sites are connected to two PE routers.

Which two design considerations allow this symmetric routing to be achieved? (Choose two.)

 
 
 
 
 

11. ACME corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain conditions in the network.

Which feature should be used to meet this design requirement?

 
 
 
 

12. An existing wireless network was designed to support data traffic only. You must now install context Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)

 
 
 
 
 

13. You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password that they are already using to access existing applications. A user may not always use the same device to access the VPN.

Which two options combined meet the requirements? (Choose two)

 
 
 
 
 
 

14. The network designer needs to use GLOP IP address in order make them unique within their ASN, which multicast address range will be considered?

 
 
 
 

15. You have been hired by ACME corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks.

When evaluating the network, which switch option should you investigate to ensure that authorized ARP responses take according to known IP-MAC address mapping?

 
 
 
 

16. A mobile network operator is planning to create a NGN backhaul by migrating the existing backhaul network from a legacy SONET-based transport to a packet-based transport. The NGN backhaul network must achieve similar failover and failback times as the legacy network (50ms).

Which method allows for similar failover and failback times within a packet-based network?

 
 
 
 

17. Refer Io the exhibit.

The company must connect five new remote sites to the network core of its corporate headquarters with path reliability These remote sites run voce and data traffic Two data centers are in the core.

Which two virtualized network solutions can achieve the required goal? (Choose two)

 
 
 
 
 

18. A service provider hires you to design its new managed CE offering to meet these requirements:

Which tunnelling technology do you recommend?

 
 
 
 

19. DRAG DROP

Drag and drop the EIGRP design considerations from the left onto the corresponding hierarchical layer characteristics on the right

20. Which is design considerations of policy-based routing is true?

 
 
 
 

21. Two offices are connected via one 10 Gigabit Ethernet link.

What happens to the EIGRP neighborship if a link failure occurs?

 
 
 
 

22. Which design benefit of PortF ast is true?

 
 
 
 
 
 

23. Which three disadvantages of connecting an on-premises private cloud to a colocation facility versus a cloud VPN are true? (Choose three)

 
 
 
 
 
 

24. Which network topology type has the longest EIGRP convergence time?

 
 
 
 

25. Refer to the exhibit.

This enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer 3 VPN solution and manages the CE routers, but they do not currently support multicast.

Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

 
 
 
 
 

26. Which two design solutions provide IPv6 interdomain multicast? (Choose two)

 
 
 
 
 

27. A customer requests that you determine how much of their remote branch traffic into a central data center is related to a call manager that resolves in the data center.

Which solution do you recommend?

 
 
 
 
 
 

28. When is it required to leak routes into an IS-IS Level 1 area?

 
 
 
 

29. You are designing a fabricpath network that connects to a spine-and-leaf topology using Layer 2 IS-IS as the IGP. The solution must be able to detect changes in the network topology and calculate loop-free paths to other nodes in the network that are being used as top-of Crack switches, which three characteristics of this fabricpath design solution are true? (Choose two)

 
 
 
 
 
 

30. Refer to the exhibit.

A route health injector is deployed on the network to monitor reachable services. The route health injector injects /32 prefixes into BGP with the next hop of 98.18.0.2. These /32 prefixes are not being installed into the RIB of router.

A which BGP feature must be deployed to make sure this design works?

 
 
 
 

31. A customer requests a design that ensures that client devices are not dynamically configured with incorrect DNS information.

Which security technology must be configured on Ore switches when finalising the network design?

 
 
 
 

32. Which solution prevents microloops from being formed during network convergence time?

 
 
 
 

33. As service provider you must support a Layer 2 virtualization protocol that does not include the use of label switching.

Which technology meets this design requirement?

 
 
 
 

34. Which two statements about MLD snooping are true? (Choose two)

 
 
 
 

35. Which solution provides interoperability and protects data traffic from eavesdropping?

 
 
 
 

36. You want to mitigate failures that are caused by STF loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPOUs.

Which mechanism do you use along with UDLD?

 
 
 
 

37. Which two fast reroute technologies provide the highest level of protected path converge in a ring topology? (Choose two)

 
 
 
 
 

38. When designing a network that uses IPsec, which technique is suggested to avoid network fragmentation?

 
 
 
 

39. Which two pain points are the most common for container technology adoption? (Choose two)

 
 
 
 
 
 

40. Refer to the exhibit.

You are asked to design the network to converge within 60 ms for unicast packets after a link failure. Native IPv4 forwarding is used and the forwarding plane may not be altered.

Which technology can be enabled while conforming to the design requirements?

 
 
 
 

41. Refer to the exhibit.

A customer currently has a large EIGRP based network with several remote sites attached. All remote sites connect to the two Corporate data centers, depicted as 10.1.1.0 and 10.1.2.O. The customer has experienced several network wide failures where neighbours were stuck in active and had other network stabilitty issues due to some links flapping.

Which two redesign options increase network stability and reduce the load on the remote site routers, while still maintaining optimal routing between remote sites and the two data centers? (Choose two)

 
 
 
 
 

42. An enter pose customer will deploy a centralized unified communications application to provide voice, video, and instant messaging to their branch offices Some of the branch offices are located m remote locations and are connected via a 1 5 Mb’s Layer 3 VPN connection.

Which two actions are the most cost-effective ways to ensure that this new application is implemented properly? (Choose two)

 
 
 
 
 
 
 

43. The BGP table contains hundreds of thousands of routes.

Which design technique improves the convergence time?

 
 
 
 

44. Refer to the exhibit.

As part of a redesign project you must predict multicast behavior.

What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated?

 
 
 
 

45. Two enterprise networks must be connected together Both networks are using the same private IP addresses. The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload feature to save IF addresses from the NAT pools.

Which design addresses this requirement using only one Cisco I OS NAT router for both directions?

 
 
 
 
 

46. Which MPLS attribute is required or links to carry a given Cisco MPLS TE tunnel?

 
 
 
 

47. Refer to the exhibit.

A customer runs EIGRP and has remote routers with EIGRP stub configured. The customer tests the redundancy by shutting down the B link, and surprisingly the 10.0.0.0/24 subnet is no longer accessed by the hub router.

Which action resolves this issue?

 
 
 
 

48. Which design consideration is valid when you contrast fabricPath and trill?

 
 
 
 

49. Refer to the exhibit.

As the new network designer for a manufacturing company. You are designing this resilient. Ethernet ring of the plant Ethernet network that is connected to the core, which does not use STP. Both edge ports are on the same switch in a ring segment. There is connectivity between the edge ports throughout the segment, so you can create a redundant connection between any two switches in the ring.

Which three characteristics of this design are true? (Choose two)

 
 
 
 
 

50. Which two design considerations must be considered when introducing FCoE into an existing network? (Choose two)

 
 
 
 
 

51. You are redesigning an OSPF network that currently uses RFC 1918 Class A address space to optimize its convergence time The entire network consists of point-to-point interfaces between routers.

Which reason is the best reason to implement topology summarization in this network?

 
 
 
 

52. When designing a Source Specific Multicast solution, what must you consider?

 
 
 
 

53. Which two conditions are required for successful route aggregation? (Choose two)

 
 
 
 
 

54. As part of the security protocol for your network design, you have designated that operator 82 is enabled for DHCP snooping.

When option 82 is enabled, which information will be added to the DHCP request?

 
 
 
 

55. Which main IoT migration aspect should be reviewed for a manufacturing plant?

 
 
 
 
 

56. Refer to the exhibit

Assume that no multicast optimization is done on LAN switches A and B.

Which two solutions can be used to optimize multicast traffic forwarding in this situation? (Choose two)

 
 
 
 
 

57. You must change a network design to include link-state topology summarization.

Which two effects of route summarization should you be concerned about? (Choose two)

 
 
 
 
 

58. Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

 
 
 
 

59. Which two SAN designs are appropriate to support large-scale SAN environments? (Choose two)

 
 
 
 
 

60. Which three terms describe an OS-level virtualization method for deploying and running distributed applications? (Choose three)

 
 
 
 
 
 
 

Question 1 of 60

Cisco Meraki Solutions Specialist 500-220 Free Dumps Questions
CCNP Data Center 300-630 DCACIA Exam Questions

Leave a Reply

Your email address will not be published. Required fields are marked *