Download New Updated (July) Cisco 352-001 Actual Test 61-70

Ensurepass

QUESTION 61

In an MPLS-VPN environment, what is the effect of configuring an identical set of route targets for a particular VRF, but then configuring nonidentical route distinguisher across multiple PE devices?

 

A.

The routes will be correctly handled by the control plane, but there will be instances where routes take up twice as much memory.

B.

The routes will propagate to the remote PE, but the PE will never install them in its forwarding table.

C.

The routes will be rejected by the remote PE because they have a different RD than its routes.

D.

The routes will not even be sent to any remote PE with a different RD.

 

Correct Answer: A

 

 

QUESTION 62

A data center provider has designed a network using these requirements:

 

clip_image002Two data center sites are connected to the public Internet.

clip_image002[1]Both data centers are connected to different Internet providers.

clip_image002[2]Both data centers are also directly connected with a private connection for the internal traffic, and public Internet traffic can also be routed at this direct connection.

clip_image002[3]The data center provider has only one /19 public IP address block.

 

Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connection fails, the complete traffic for both data centers should be routed by using the remaining Internet connection. In which two ways can this routing be achieved? (Choose two.)

 

A.

The data center provider must have an additional public IP address block for this routing.

B.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the /20 block from the remote data center is sent out with a higher BGP weight at both sites.

C.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the /20 block from the remote data center is sent out with path prepending at both sites.

D.

One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining Internet connection.

E.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference at both sites.

F.

BGP will always load-balance the traffic to both data center sites.

 

Correct Answer: CD

 

 

QUESTION 63

Refer to the exhibit. In this BGP design, what is the next hop for 10.1.1.0/24 on R8 and R7?

 

clip_image003

 

A.

The next hop for 10.1.1.0/24 on R7 is R8 and the next hop for R8 is R7.

B.

The next hop for 10.1.1.0/24 on R7 is R5 and the next hop for R8 is R6.

C.

The next hop for 10.1.1.0/24 on R7 is R6 and the next hop for R8 is R5.

D.

The next hop for 10.1.1.0/24 on R7 is R3 and the next hop for R8 is R4.

 

Correct Answer: A

 

 

QUESTION 64

Your design plan includes mutual redistribution of two OSPF networks at multiple locations, with connectivity to all locations in both networks. How is this accomplished without creating routing loops?

 

A.

Use route maps on the ASBRs to allow only internal routes to be redistributed.

B.

Use route maps on the ASBRs to allow internal and external routes to be redistributed.

C.

Use route maps on the ASBRs to set tags for redistributed routes.

D.

Use route maps on the ASBRs to filter routes with tags so they are not redistributed.

 

Correct Answer: D

 

 

QUESTION 65

A network administrator is in charge of multiple IPsec VPN headend devices that service thousands of remote connectivity, point-to-point, IPsec/GRE tunnels. During a recent power outage, in which it was found that a backup power supply in one of those headend devices was faulty, one of the headend routers suffered a complete shutdown event. When the router was successfully recovered, remote users found intermittent connectivity issues that went away after several hours. Network operations staff accessed the headend devices and found that the recently recovered unit was near 100% CPU for a long period of time. How would you redesign the network VPN headend devices to prevent this from happening again in the future?

 

A.

Move the tunnels more evenly across the headend devices.

B.

Implement Call Admission Control.

C.

Use the scheduler allocate command to curb CPU usage.

D.

Change the tunnels to DMVPN.

 

Correct Answer: B

 

 

QUESTION 66

You are designing an optical network. Your goal is to ensure that your design contains the highest degree of resiliency. In which two ways will you leverage a wavelength-switched optical network solution in your network design? (Choose two.)

 

A.

a wavelength-switched optical network assigns routing and wavelength information

B.

a wavelength-switched optical network takes linear and nonlinear optical impairment calculation into account

C.

a wavelength-switched optical network guarantees restoration based strictly on the shortest path available

D.

a wavelength-switched optical network eliminates the need for dispersion compensating units in a network

 

Correct Answer: AB

 

 

 

 

 

 

 

 

 

QUESTION 67

You are a network designer and have been asked to consult with your server operations team to further enhance the security of the network. The operations team provides you with these details about the network:

 

clip_image002[4]A pool of servers is accessed by numerous data centers and remote sites.

clip_image002[5]The servers are accessed via a cluster of firewalls.

clip_image002[6]The firewalls are configured properly and are not dropping traffic.

clip_image002[7]The firewalls occasionally cause asymmetric routing of traffic within the server data center.

 

Which technology would you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

 

A.

Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster

B.

Poison certain subnets by adding static routes to Null0 on the server farm core switches.

C.

Unicast Reverse Path Forwarding in strict mode

D.

Unicast Reverse Path Forwarding in loose mode

 

Correct Answer: D

 

 

 

QUESTION 68

Refer to the exhibit. The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN be seen on the core devices?

 

clip_image005

 

A.

via CE A and CE B

B.

via CE A

C.

via CE B

D.

no WAN routes will be accessible

 

Correct Answer: C

 

 

 

QUESTION 69

A company wants to use SSM as the multicast routing protocol inside its network. Some of its multicast applications do not support IGMPv3. In which two ways can the mapping be done when these applications send IGMPv2 join messages? (Choose two.)

 

A.

The Layer 2 switches can send a request to a DNS server.

B.

The Layer 3 multicast routers can send a request to a DNS server.

C.

The mapping can be done statically at the Layer 2 switches.

D.

The mapping can be done statically at the Layer 3 multicast routers.

E.

The Layer 2 switches can transform the IGMPv2 join to an IGMPv3lite join.

F.

The Layer 3 multicast routers can transform the IGMPv2 join to an IGMPv3lite join.

 

Correct Answer: BD

 

 

QUESTION 70

You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements:

 

clip_image002[8]The network supports four service queues with equal treatment for delay, jitter, and packet loss.

clip_image002[9]Queues are numbered 0-3, where 0 is the default queue.

clip_image002[10]Three queues have one treatment.

One queue has either one or two treatments.

 

How would you design your solution to map the DSCP value properly so that the traffic is assigned to the respective queues in the Service Provider XYZ MPLS core network?

 

A.

Classify traffic according to DSCP value into appropriate P router queues.

B.

Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS P routers.

C.

Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS PE routers.

D.

Based on the DSCP value, traffic is mapped automatically into appropriate queues in the MPLS CE routers.

 

Correct Answer: C

 

Free VCE & PDF File for Cisco 352-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

This entry was posted in Uncategorized by admin. Bookmark the permalink.

Comments are closed.