Exam Code: 352-001 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CCDE Written Exam
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 352-001 Exam.
2017 NEW RECOMMEND
Free VCE & PDF File for Cisco 352-001 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q11. Your design plan includes mutual redistribution of two OSPF networks at multiple locations, with connectivity to all locations in both networks. How is this accomplished without creating routing loops?
A. Use route maps on the ASBRs to allow only internal routes to be redistributed.
B. Use route maps on the ASBRs to allow internal and external routes to be redistributed.
C. Use route maps on the ASBRs to set tags for redistributed routes.
D. Use route maps on the ASBRs to filter routes with tags so they are not redistributed.
Q12. You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure?
A. SPAN monitor ports
C. IP NBAR
D. passive taps
Q13. You are designing an 802.11 wireless network to include a controller as a central configuration point and access points across several remote sites. Which two aspects will manage the flow of the traffic to meet these design considerations? (Choose two.)
A. WLAN local switching with VLAN mapping requires that VLAN ID that is mapped on the AP to match a dynamic interface that is configured on the wireless LAN controller.
B. Layer 3 roaming is not supported for locally switched WLANs.
C. The 802.1x authentication for a client associated to an AP on a locally switched WLAN is always handled at the wireless LAN controller side.
D. The access point can receive multicast traffic in the form of multicast packets from the WLC.
E. WLAN access lists can be applied only to centrally switched WLANs.
Q14. Which mechanism should be added to a network design to identify unidirectional Spanning Tree Protocol failures through BPDU loss?
B. loop guard
C. BPDU guard?
D. root guard
Q15. Refer to the exhibit.
Service Provider A and Service Provider B have agreed to a strategic interconnect relationship that will allow them access into each other's geographies by using an inter-AS eBGP VPNv4 multihop between route reflectors. Which two options will accomplish this scenario? (Choose two.)
A. RR 1 and RR 2 peer using multihop eBGP VPNv4 to exchange prefixes.
B. ASBR 1 and ASBR 2 act as inline route reflectors that set themselves as the next-hop.
C. An LSP is formed between ASBR 1 and ASBR 2 using eBGP IPv4.
D. An LSP is formed between ASBR 1 and ASBR 2 using eBGP VPNv4.
E. RR 1 and RR 2 peer using multihop eBGP IPv4 to exchange prefixes.
Q16. Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data?
Q17. You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?
A. ACL-based forwarding
B. ACL filtering by destination
C. Unicast RPF loose mode
D. Unicast RPF strict mode
Q18. Your firm has been awarded a contract to design a Criminal Justice Information Services Version 5.0-compliant network utilizing advanced authentication policies. Which two methods could be utilized? (Choose two.)
Q19. Company X will be integrating an IPv6 application into their network and wants to develop a test environment to evaluate application performance across the network. This application will require both unicast and multicast communications. The company can do this implementation only in certain areas of its existing IPv4-only network, but wants all areas to communicate with each other. When developing the design to provide connectivity between these testing locations, what tunneling technology would work in this scenario?
Q20. As part of the security protocol for your network design, you have designated that option 82 is enabled for DHCP snooping. When option 82 is enabled, which information will be added to the DHCP request?
A. switch MAC address and VLAN, module, and port
B. remote ID and circuit ID
C. switch IP address and VLAN, module, and port
D. switch MAC address and switch IP address