Download New Updated (July) Cisco 352-001 Actual Test 1-10

Ensurepass

QUESTION 1

A network designer wants to improve a company network design due to multiple network crashes. Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?

 

A.

Bidirectional Forwarding Detection

B.

automatic protection switching

C.

UniDirectional Link Detection

D.

Ethernet OAM

 

Correct Answer: B

 

 

QUESTION 2

Refer to the exhibit. If IEEE 802.1w is in use for this network design, what are two locations where spanning- tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.)

 

clip_image002

 

A.

Switch A

B.

Switch B

C.

Switch C

D.

Switch D

 

Correct Answer: CD

 

 

QUESTION 3

A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?

 

A.

Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be pro

cessed by the CPU and hosts will be sent by the routers in the network.

B.

Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.

C.

The multicast application sends too many packets into the network and the network infrastructure drops packets.

D.

The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.

 

Correct Answer: D

 

 

QUESTION 4

When you design a network, when would it be required to leak routes into a Level 1 area?

 

A.

when a multicast RP is configured in the nonbackbone area

B.

when MPLS L3VPN PE devices are configured in the Level 1 areas

C.

when equal cost load balancing is required between the backbone and nonbackbone areas

D.

when unequal cost load balancing is required between the backbone and nonbackbone areas

 

Correct Answer: B

 

 

QUESTION 5

Your organization is working on a design solution for a new Internet-based remote access virtual private network that has 1000 remote sites. A network administrator recommends GETVPN as the model because the network of today uses DMVPN, which results in a lot of background NHRP control traffic. What is a potential problem with using GETVPN for this design solution?

 

A.

GETVPN would require a high level of background traffic to maintain its IPsec SAs.

B.

GETVPN is not scalable to a large number of remote sites.

C.

GETVPN and DMVPN will not interoperate.

D.

< font style="font-size: 10pt" color="#000000">GETVPN key servers would be on public, hacker-reachable space and need higher security.

 

Correct Answer: D

 

 

 

 

 

 

 

 

QUESTION 6

Refer to the exhibit. You are designing an IPv4 unicast Layer 3 VPN load-balancing solution. Which L3VPN feature needs to be configured on the PE routers to support the design requirement?

 

clip_image004

 

A.

nonmatching route distinguishers

B.

matching route target values

C.

disable split horizon on PE2 and PE3

D.

matching route distinguishers

 

Correct Answer: A

 

 

 

 

 

 

 

 

 

QUESTION 7

A customer is using a service provider to provide a WAN backbone for a 30-site network. In establishing the network, the customer must work within these constraints:

 

clip_image006The customer has a self-managed MPLS backbone.

clip_image006[1]The VPLS WAN backbone of the service provider does not support PIM snooping.

clip_image006[2]Multicast VPN must be used for multicast support inside some VRFs.

 

What can the customer do so that multicast traffic is NOT flooded to all sites?

 

A.

Configure static GRE tunnels and run the MPLS and multicast VPN inside these GRE tunnels.

B.

Use Label Switched Multicast for the multicast transport.

C.

Use PIM-SSM as the multicast routing protocol with IETF Rosen Draft multicast VPN.

D.

Configure a static mapping between multicast addresses and MAC addresses.

E.

Use GET VPN to encrypt the multicast packets inside the WAN.

 

Correct Answer: A

 

 

QUESTION 8

A network designer is working with a company to improve convergence at the Layer 2 control plane and decides to use LACP. Which of these components does LACP use to create the system ID?

 

A.

LACP system priority and switch MAC address

B.

LACP port priority and switch MAC address

C.

LACP port priority and port number

D.

LACP system priority and port number

 

Correct Answer: A

 

 

QUESTION 9

A company has these requirements for access to their wireless and wired corporate LANs using 802.1x:

 

clip_image006[3]Client devices that are corporate assets and have been joined to the Active Directory domain are allowed access.

clip_image006[4]Personal devices must not be allowed access.

clip_image006[5]Clients and access servers must be mutually authenticated.

 

Which solution meets these requirements?

 

A.

Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with user authentication

B.

Extensible Authentication Protocol-Transport Layer Security with machine authentication

C.

Extensible Authentication Protocol-Transport Layer Security with user authentication

D.

Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with machine authentication

 

Correct Answer: B

 

 

QUESTION 10

In which two ways is IPv4 and IPv6 traffic handled in a network design that uses QoS deployment options? (Choose two.)

 

A.

IPv6 and IPv4 traffic is treated in the same way by using a single QoS policy that classifies and matches on both protocols.

B.

IPv6 traffic is treated differently than IPv4 by using the flow-label field, which is built into the IPv6 packet header.

C.

IPv6 traffic does not require QoS because it uses to the flow-label field, which classifies and matches on the IPv6 protocol.

D.

IPv6 traffic is treated differently than IPv4 by using two different QoS policies.

E.

IPv6 traffic is treated differently than IPv4 because it uses only the DSCP value and not the IP precedence.

 

Correct Answer: AD

 

Free VCE & PDF File for Cisco 352-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

This entry was posted in Uncategorized by admin. Bookmark the permalink.

Comments are closed.