352-001 Guide

Regenerate 352-001 Exam Study Guides With New Update Exam Questions

Verified of 352-001 test engine materials and training tools for Cisco certification for customers, Real Success Guaranteed with Updated 352-001 pdf dumps vce Materials. 100% PASS CCDE Written Exam exam Today!

Q1. When designing a network, which two security features should be added to the design to protect hosts from potential IPv6 neighbor discovery denial of service attacks at the access layer? (Choose two.) 

A. SEND 

B. RA Guard 

C. IKEv2 

D. IPsec 

E. DMVPNv6 

Answer: AB 


Q2. While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many VLANs? 

A. STP 

B. MST 

C. PVRSTP 

D. PVSTP+ 

Answer:


Q3. In order to meet your service level agreement, your network designer created a design solution that includes interface dampening. In which two ways will interface dampening benefit your overall network design? (Choose two.) 

A. Interface dampening uses an exponential backoff algorithm to suppress event reporting to the upper-level protocols. 

B. When the interface is dampened, further link events are not reported to the upper protocol modules. 

C. When the interface is dampened, further link events are reported to the upper protocol module. 

D. Periodic interface flapping that affects the routing system as a whole should have a period shorter than the system convergence time. 

Answer: AB 


Q4. A company has these requirements for access to their wireless and wired corporate LANs using 802.1x: 

. Client devices that are corporate assets and have been joined to the Active 

Directory domain are allowed access. 

. Personal devices must not be allowed access. 

. Clients and access servers must be mutually authenticated. 

Which solution meets these requirements? 

A. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with user authentication 

B. Extensible Authentication Protocol-Transport Layer Security with machine authentication 

C. Extensible Authentication Protocol-Transport Layer Security with user authentication 

D. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with machine authentication 

Answer:


Q5. Network designers plan to interconnect two geographically separated data centers using an Ethernet-over-MPLS pseudowire. Within that design, the link between the sites is stable, there are no apparent loops in the topology, and the root bridges for the respective VLANs are stable and unchanging. What additional aspect of the design should be adjusted to mitigate the chance of connectivity issues to the peer data center when the connection takes place? 

A. Enable 802.1d on one data center, and 802.1w on the other. 

B. Ensure that the spanning tree diameter for one or more VLANs is not too large. 

C. Enable UDLD on the link between the data centers. 

D. Enable root guard on the link between the data centers. 

Answer:


Q6. You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ a link-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2 connectivity within the service provider network? 

A. The routers will immediately lose their adjacencies and converge. 

B. The routing protocol will not converge until the hold timers have expired. 

C. The switch ports connected to the router will go down and the routers will immediately converge. 

D. The VLAN on the switches will go inactive, the ports associated on the switch will go down, and the routers will immediately converge. 

Answer:


Q7. Which design concern should be accounted for in all Layer 3 virtualization technologies? 

A. Layer 3 redundancy 

B. packet sizing 

C. application usage 

D. Layer 3 stability 

Answer:


Q8. Which three methods allow storage access across an IP network? (Choose three.) 

A. FCIP 

B. Fiber Channel over GRE 

C. Fiber Channel over L2TPv3 

D. iSCSI 

E. NFS 

Answer: ADE 


Q9. What is the definition of the ITIL framework? 

A. an ISO framework that establishes a model for network management and contains guidelines for managing objects, the management database, and the application entity 

B. a five-volume framework for service management that covers design, transition, and delivery of service, and from which the ISO 20000 was developed 

C. a series of tools for process improvement that uses statistical methods to reduce defects in processes and manufacturing 

D. a framework for enterprise architecture that provides a comprehensive approach for designing, planning, implementing, and governing an enterprise information architecture 

E. a framework for enterprise IP Address Management (IPAM) based on the IANA trusted IP lease allocation scheme 

Answer:


Q10. Which mechanism should be added to a network design to identify unidirectional Spanning Tree Protocol failures through BPDU loss? 

A. UDLD 

B. loop guard 

C. BPDU guard? 

D. root guard 

Answer:


To know more about the 352-001, click here.

Tagged as : Cisco 352-001 Dumps, Download 352-001 pdf, 352-001 VCE, 352-001 pass4sure, examcollection 352-001