Cause all that matters here is passing the Cisco 352-001 exam. Cause all that you need is a high score of 352-001 CCDE Written Exam exam. The only one thing you need to do is downloading Ucertify 352-001 exam study guides now. We will not let you down with our money-back guarantee.
2021 Mar 352-001 vce
Q131. Acme Corporation wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)
A. BPDU Guard
B. PortFast
C. Loop Guard
D. Port Security
E. UDLD
Answer: AD
Q132. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated Internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements:
The network supports four service queues with equal treatment for delay, jitter, and packet loss.
Queues are numbered 0-3, where 0 is the default queue.
Three queues have one treatment.
One queue has either one or two treatments.
If your design includes eight CoS queues on the Service Provider XYZ MPLS PE router ingress (CE facing) interface, how will customer traffic be classified as it enters the MLS P routers?
A. The eight CoS queues in the MPLS P router are remapped to the eight CoS queues.
B. Traffic is classified on the MPLS PE routers on core facing interface. The DSCP value is mapped into EXP field where multiple EXP settings (2+) will be assigned to a single queue throughout the MPLS P routers.
C. Discard the traffic from the eight CoS queues that does not match the four CoS queues of the MPLS P routers.
D. The 8 CoS queues in the MPLS P router are remapped to four 4 flow-label queues.
Answer: B
Q133. You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP QoS is implemented properly? (Choose two.)
A. Differentiated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data
B. Integrated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the resources end to end before sending the data
C. Integrated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node
D. Differentiated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node
E. Integrated Services, where the user, with the assistance of the DSCP signaling protocol, reserves the resources end to end before sending the data
Answer: BD
Q134. You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.)
A. EIGRP
B. IS-IS
C. BGP
D. static
E. RIP
Answer: ABCD
Q135. You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?
A. ACL-based forwarding
B. ACL filtering by destination
C. Unicast RPF loose mode
D. Unicast RPF strict mode
Answer: D
Rebirth 352-001 exam answers:
Q136. Refer to the exhibit.
Your company designed a network to allow server VLANs to span all access switches in a data center. In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches. Which two features will improve STP stability within the network design? (Choose two.)
A. BPDU guard on access ports
B. Edge port on access ports
C. Root guard on access ports
D. BPDU guard on the aggregation switch downlinks toward access switches
E. Root guard on the aggregation switch downlinks toward access switches
F. Access switch pairs are explicitly determined to be root and backup root bridges
Answer: AE
Q137. Refer to the exhibit.
You must ensure that both core A and core B devices have only the minimum information required for reaching the spoke routers yet maintain full reachability during network failures.
Which of the following design solutions accomplishes these requirements?
A. Route summarization, with specific route leaking on hubs A and B
B. Route summarization, with GRE tunnel on hubs A and B
C. Implement PfR enhancements on hubs A and B.
D. Implement ODR for hub-to-spoke routing.
Answer: B
Q138. Service provider XYZ plans to provide dedicated Internet access and MPLS L3VPN services to business customers. XYZ has these design specifications:
. MP-BGP running on the core MPLS P routers with external Internet routes.
. The core network will include 16 Point of Presence IP POPs throughout the Asia-Pacific region. . An additional nine non-P routers will use EBGP peering with multiple providers for Internet traffic. . An additional 50 PE routers will provide end customers with dedicated Internet access and L3VPN services throughout the Asia-Pacific region.
In what two ways can the MP-BGP be removed from the MPLS P core routers and still provide dedicated Internet access and MPLS L3VPN services? (Choose two.)
A. Disable BGP from the MPLS core P routers and have the MPLS core P routers run OSPF and LDP.
B. Enable separate BGP control plane routers using a route reflector server concept that will be fully meshed with peer route reflector servers and have clients as MPLS PE routers and EBGP peering routers.
C. Enable all EBGP routers as route reflector servers and MPLS PE routers as their clients.
D. It is not possible to disable BGP from the MPLS core P routers without impacting the dedicated Internet access and MPLS L3VPN services.
Answer: BC
Q139. Refer to the exhibit.
The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN be seen on the core devices?
A. via CE A and CE B
B. via CE A
C. via CE B
D. no WAN routes will be accessible
Answer: C
Q140. The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.)
A. It is not recommended on BGP route reflectors.
B. It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable.
C. It can be set on a router during the startup process for a fixed period of time.
D. It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.
E. It can be set on a router until other interacting protocols have signaled convergence.
Answer: BCE