352-001 Latest Exam (Aug 2018)

[Free] 2018(Aug) Ensurepass Cisco 352-001 Dumps with VCE and PDF 61-70

August 8, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 352-001
100% Free Download! 100% Pass Guaranteed!

CCDE鈩?Written Exam

Question No: 61 – (Topic 1)

You are designing the QoS features for a large enterprise network that includes DMVPN. When would you need to configure QoS preclassify?

  1. when you are marking packets with the DSCP bits

  2. when you are marking packets with the TOS bits

  3. when your service provider requires the DSCP bits be set

  4. when the QoS policy cannot be based on DSCP ToS bits

Answer: D

Question No: 62 – (Topic 1)

Your design plan includes mutual redistribution of two OSPF networks at multiple locations, with connectivity to all locations in both networks. How is this accomplished without

creating routing loops?

  1. Use route maps on the ASBRs to allow only internal routes to be redistributed.

  2. Use route maps on the ASBRs to allow internal and external routes to be redistributed.

  3. Use route maps on the ASBRs to set tags for redistributed routes.

  4. Use route maps on the ASBRs to filter routes with tags so they are not redistributed.

Answer: D

Question No: 63 – (Topic 1)

What are three key design principles when using a classic hierarchical network model? (Choose three.)

  1. The core layer controls access to resources for security.

  2. The core layer should be configured with minimal complexity.

  3. The core layer is designed first, followed by the distribution layer and then the access layer.

  4. A hierarchical network design model aids fault isolation.

  5. The core layer provides server access in a small campus.

  6. A hierarchical network design facilitates changes.

Answer: B,D,F

Question No: 64 – (Topic 1)

You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?

  1. ACL-based forwarding

  2. ACL filtering by destination

  3. Unicast RPF loose mode

  4. Unicast RPF strict mode

Answer: D

Question No: 65 – (Topic 1)

A large enterprise customer is migrating thousands of retail offices from legacy TDM circuits to an Ethernet-based service. The network is running OSPF and has been stable for many years. It is now possible to backhaul the circuits directly to the data centers, bypassing the regional aggregation routers. Which two networking issues need to be addressed to ensure stability with the new design? (Choose two.)

  1. Nothing will change if the number of offices is the same.

  2. Nothing will change if the number of physical interfaces stays the same.

  3. The RIB will increase significantly.

  4. The FIB will increase significantly.

  5. The amount of LSA flooding will increase significantly.

  6. The size of the link-state database will increase significantly.

Answer: E,F

Question No: 66 – (Topic 1)

You are designing a wireless LAN with the following components:

->High-density indoor access point deployment

->2.4-GHz and 5-GHz radios

->802.11a, 802.11g, and 802.11n mode wireless LAN clients

Site survey results show negligible foreign WiFi and non-WiFi interference. What is the best method to decrease duty cycle (radio frequency utilization) and increase overall wireless LAN client performance for this design?

  1. Disable all data rates below 12 Mb/s on all access points.

  2. Decrease radio transmit power on all access points that report a high duty cycle.

  3. Increase radio transmit power on all access points that report a high duty cycle.

  4. Disable all data rates above 12 Mb/s on all access points.

  5. Increase radio transmit power on all access points.

Answer: A

Question No: 67 – (Topic 1)

In order to meet your service level agreement, your network designer created a design solution that includes interface dampening. In which two ways will interface dampening benefit your overall network design? (Choose two.)

  1. Interface dampening uses an exponential backoff algorithm to suppress event reporting to the upper-level protocols.

  2. When the interface is dampened, further link events are not reported to the upper protocol modules.

  3. When the interface is dampened, further link events are reported to the upper protocol module.

  4. Periodic interface flapping that affects the routing system as a whole should have a period shorter than the system convergence time.

Answer: A,B

Question No: 68 – (Topic 1)

A network designer is redesigning an enterprise campus network to ensure that Ethernet switches proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in the fiber pair, leading to looping. Which feature could be implemented in the design to allow the Spanning Tree Protocol on the switches to be protected?

  1. loop guard

  2. UniDirectional Link Detection

  3. UniDirectional Link Detection aggressive mode

  4. root guard

Answer: C

Question No: 69 – (Topic 1)

You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design and implementation of the SAN in the new virtualized environment.

In which two ways can NPIV be used in your proposed design? (Choose two.)

  1. NPIV is used to assign multiple FCIDs to a single N Port.

  2. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN.

  3. You recommend NPIV so that hosts can be members of different zones.

  4. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN.

Answer: A,D

Question No: 70 – (Topic 1)

You have been hired by Acme Corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks. When evaluating the network, which switch security option should you investigate to ensure that authorized ARP responses take place according to known IP-to-MAC address mapping?

  1. ARP rate limiting

  2. DHCP snooping

  3. Dynamic ARP Inspections

  4. IP Source Guard

Answer: C

100% Ensurepass Free Download!
352-001 PDF
100% Ensurepass Free Guaranteed!
352-001 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No