[Free] 2017(Oct) Dumps4cert Testinsides Cisco 352-001 Dumps with VCE and PDF Download 161-170

Dumps4Cert 2017 Oct Cisco Official New Released 352-001
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4Cert.com/352-001.html

CCDE鈩?Written Exam

Question No: 161 – (Topic 2)

What are two benefits of using BFD for failure detection in the design of a network? (Choose two.)

  1. BFD can provide failure detection in less than one second.

  2. BFD can be used as a generic and consistent failure detection mechanism for EIGRP, IS-IS, and OSPF.

  3. BFD eliminates router protocol hello notification.

  4. BFD can be used for all types of network interfaces.

  5. BFD is independent of the network protocol.

Answer: A,B

Question No: 162 – (Topic 2)

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of

Enterprise business it is receiving. The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer 3 VPN. Which of the following would need to be reviewed to ensure stability in their network?

  1. Assigning unique Route Target ID#39;s

  2. Assigning unique Route Distinguishers

  3. Assigning unique IP address space for the Enterprise NAT/Firewalls

  4. Assigning unique VRF ID#39;s to each Layer 3 VPN

Answer: B

Question No: 163 – (Topic 2)

A company would like to distribute a virtual machine (VM) hosting cluster between three data centers with the capability to move VMs between sites. The connectivity between data centers is IP only and the new design should use the existing WAN. Which Layer 2 tunneling technology do you recommend?

  1. VPLS

  2. L2TPv3

  3. OTV

  4. AToM

Answer: C

Question No: 164 – (Topic 2)

Refer to the exhibit.

Dumps4Cert 2017 PDF and VCE

In the DWDM network, a ring topology carries multiple services between two sites. Which option describes the employed protection design?

  1. Y-cable protection

  2. Splitter protection

  3. Client protection

  4. UDLD

  5. FEC protection

Answer: C

Question No: 165 – (Topic 2)

When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.)

  1. CPU capabilities

  2. bandwidth capabilities

  3. packets per second capabilities

  4. maximum tunnel termination capabilities

Answer: C,D

Question No: 166 – (Topic 2)

Refer to the exhibit.

Dumps4Cert 2017 PDF and VCE

You must ensure that both core A and core B devices have only the minimum information required for reaching the spoke routers yet maintain full reachability during network failures.

Which of the following design solutions accomplishes these requirements?

  1. Route summarization, with specific route leaking on hubs A and B

  2. Route summarization, with GRE tunnel on hubs A and B

  3. Implement PfR enhancements on hubs A and B.

  4. Implement ODR for hub-to-spoke routing.

Answer: B

Question No: 167 – (Topic 2)

An IBGP mesh design is being scoped, and in the discussions, one of the design engineers proposes the use of route reflectors. Which limitation is valid when using route reflectors in this design?

  1. The configuration complexity on the routers will be increased.

  2. Route reflectors will limit the total number of routes in the topology.

  3. Multipath information is difficult to propagate in a route reflector topology.

  4. Route reflectors will cause an opportunity to create routing loops.

Answer: C

Question No: 168 – (Topic 2)

A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that currently traffic is not being classified and marked correctly somewhere in the network. Which tool should the designer recommend to validate quality of service mappings and use?

  1. SNMP

  2. IPFIX

  3. IP SLA

  4. protocol analyzer

  5. NBAR

Answer: B

Question No: 169 – (Topic 2)

When network summaries are created for access networks in a network design, how does it change the behavior of the Shortest Path First (SPF) running in a backbone area?

  1. There would be fewer incremental SPFs.

  2. There would be fewer partial SPFs.

  3. There would be fewer full SPFs.

  4. There would be no change with the SPFs.

Answer: B

Question No: 170 – (Topic 2)

Refer to the exhibit.

Dumps4Cert 2017 PDF and VCE

You are designing a network using the Multiple Spanning Tree Protocol for loop avoidance. VLAN trunking is not allowed due to security requirements. Which option describes how you can design this Layer 2 network while using untagged interfaces between both switches?

  1. Assign VLAN 100 and VLAN 200 to the IST instance.

  2. Assign VLAN 100 and VLAN 200 to instance 1.

  3. Assign VLAN 100 to instance 1 and VLAN 200 to instance 2.

  4. Assign VLAN 100 to the IST instance and VLAN 200 to instance 1.

Answer: C

100% Free Download!
Download Free Demo:352-001 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4Cert 352-001 Full Exam PDF and VCE

Dumps4Cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4Cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *