We provide real 352-001 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 352-001 Exam quickly & easily. The 352-001 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 352-001 dumps pdf and vce product and material, you can easily pass the 352-001 exam.
Q91. A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection?
A. IP addresses of the GRE tunnel endpoints
B. IPsec configuration
C. MTU size on the GRE tunnel
D. encapsulation of the GRE tunnel
Q92. You work for a large company that has just acquired another smaller company. You have been asked to lead a group of SAN experts from both companies to design the integration plan that will be used to interconnect the SANs and migrate the data from the newly acquired company to the main storage arrays. The first thing that the team discovers is that the two SANs have the same domain IDs.
As the SAN team lead, what would you advise your team to do so that you can interconnect the two SANs while minimizing disruption?
A. Use FCIP with Write Acceleration and IVR version 1 with a transit VSAN to expedite the data transfer between the two SANs.
B. Change the domain IDs on both SANs so that they are both unique and then connect ISLs between the SANs.
C. Use IVR NAT with a transit VSAN between the SANs.
D. The two SANs cannot be merged without disruption.
Q93. You are designing an 802.11 wireless network to include a controller as a central configuration point and access points across several remote sites. Which two aspects will manage the flow of the traffic to meet these design considerations? (Choose two.)
A. WLAN local switching with VLAN mapping requires that VLAN ID that is mapped on the AP to match a dynamic interface that is configured on the wireless LAN controller.
B. Layer 3 roaming is not supported for locally switched WLANs.
C. The 802.1x authentication for a client associated to an AP on a locally switched WLAN is always handled at the wireless LAN controller side.
D. The access point can receive multicast traffic in the form of multicast packets from the WLC.
E. WLAN access lists can be applied only to centrally switched WLANs.
Q94. Which option is a benefit of using N-Port Virtualization?
A. reduces the amount of domain IDs that are used in the fabric
B. does not need to create zoning
C. reduces latency when using local switching on Fibre Channel ports
D. allows trunking to the upstream switch
E. does not need to configure the upstream switches
Q95. The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.)
A. It is not recommended on BGP route reflectors.
B. It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable.
C. It can be set on a router during the startup process for a fixed period of time.
D. It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.
E. It can be set on a router until other interacting protocols have signaled convergence.
Q96. You are the lead IP network designer for a new service provider called XYZ, and you are working closely with the CTO to finalize design requirements. The CTO informs you that they want to transport IPv6 prefixes of customers through the XYZ network at this time; however, they need your advice on whether to deploy dual stack or MPLS 6PE/6VPE. Which two options do you recommend? (Choose two.)
A. Build a dual-stack network. Enable BGP in the core. Redistribute EBGP routes into IGP.
B. Use MPLS 6PE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
C. Use MPLS 6VPE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
D. Prepare the dual-stack infrastructure from the beginning, even if BGP prefixes would have to be announced via IPv4 in case you decide to maintain the BGP-free core.
Q97. Company X will be integrating an IPv6 application into their network and wants to develop a test environment to evaluate application performance across the network. This application will require both unicast and multicast communications. The company can do this implementation only in certain areas of its existing IPv4-only network, but wants all areas to communicate with each other. When developing the design to provide connectivity between these testing locations, what tunneling technology would work in this scenario?
Q98. Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.)
Q99. Refer to the exhibit.
Which two options are two characteristics of the single-tier headend architecture for DMVPN designs? (Choose two.)
A. The mGRE and crypto functions are on the same router.
B. Each DMVPN cloud has two different headend routers for high availability purposes.
C. It is used in dual-cloud topologies for spoke-to-spoke connectivity.
D. It only supports hub-and-spoke connectivity.
E. Spokes cannot be used as RP in multicast deployments.
Q100. You are deploying a nationwide intranet solution for a company with 4 data centers and 400 remote branches connected via a provider-based solution. As part of the network design, you must ensure efficient content distribution of training material to remote sites. Which two VPN technologies leverage replication in the network core and provide for efficient bandwidth optimization? (Choose two.)
C. MPLS Layer 3 VPN
E. GET VPN
To know more about the 352-001, click here.