It is impossible to pass Cisco 352-001 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Cisco 352-001 practice questions. You will get a surprising result by our Avant-garde CCDE Written Exam practice guides.
Q11. When you design a network, when would it be required to leak routes into a Level 1 area?
A. when a multicast RP is configured in the nonbackbone area
B. when MPLS L3VPN PE devices are configured in the Level 1 areas
C. when equal cost load balancing is required between the backbone and nonbackbone areas
D. when unequal cost load balancing is required between the backbone and nonbackbone areas
Answer: B
Q12. How should multiple OSPF areas be designed when deployed on a classic three-layer (core/distribution/access) network hierarchy?
A. The OSPF flooding domain boundary should be at the edge of the core layer.
B. The OSPF flooding domain boundary should be within the distribution layer.
C. OSPF should generally be deployed in a three-layer domain hierarchy to align with the physical three-layer hierarchy.
D. OSPF flooding domain boundaries should be placed with route aggregation in mind.
Answer: D
Q13. Your enterprise customer has asked where they should deploy flow monitoring in their network to monitor traffic between branch offices. What is your design recommendation?
A. at the edge of the network so that user traffic will be seen
B. at the central site, because all traffic from the remotes will be seen there.
C. in the core, because all traffic will be seen there
D. in the data center, because all user traffic will be seen there
Answer: B
Q14. A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection?
A. IP addresses of the GRE tunnel endpoints
B. IPsec configuration
C. MTU size on the GRE tunnel
D. encapsulation of the GRE tunnel
Answer: C
Q15. Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which one of these addresses would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?
A. inside local
B. outside local
C. inside global
D. outside global
Answer: A
Q16. Which mechanism provides a Layer 2 fault isolation between data centers?
A. TRILL
B. LISP
C. advanced VPLS
D. OTV
E. fabric path
Answer: D
Q17. Which multicast technology provides a large, many-to-many connectivity for a new application while minimizing load on the existing network infrastructure?
A. Bidirectional PIM
B. PIM Sparse Mode
C. Any-source Multicast
D. Source Specific Multicast
Answer: A
Q18. A Mobile Service Provider would like to design and deploy an Ethernet service which has similar physical link failover/failback characteristics on the active/backup links as the APS/MSP SONET properties. Which Layer 2 services should be considered to address this design feature?
A. Port-Channel
B. MLPPP
C. Flex Link
D. Ethernet Pseudowires
Answer: C
Q19. Which two aspects are considered when designing a dual hub, dual DMVPN cloud topology? (Choose two.)
A. recommended for high availability
B. requires all sites to have dual Internet connections C. spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly
D. hub sites must connect to both DMVPN clouds
E. will only work with single-tier headend architecture
Answer: AE
Q20. A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspects must be considered before the network design is finalized? (Choose two.)
A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D.
B. UniDirectional Link Detection Protocol can be enabled on Resilient Ethernet Protocol interfaces to detect unidirectional failures.
C. The guaranteed convergence recovery time is less than 50 ms for the local segment.
D. A Resilient Ethernet Protocol segment is limited to a maximum of seven devices.
E. VLAN load balancing for optimal bandwidth usage is supported in any Resilient Ethernet Protocol segment.
Answer: BE
To know more about the 352-001, click here.