Cause all that matters here is passing the Cisco 352-001 exam. Cause all that you need is a high score of 352-001 CCDE Written Exam exam. The only one thing you need to do is downloading Examcollection 352-001 exam study guides now. We will not let you down with our money-back guarantee.
2017 NEW RECOMMEND
Free VCE & PDF File for Cisco 352-001 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q131. In a redesign of a multiple-area network, it is recommended that summarization is to be implemented. For redundancy requirements, summarization is done at multiple locations for each summary. Some customers now complain of higher latency and performance issues for a server hosted in the summarized area. What design issues should be considered when creating the summarization?
A. Summarization adds CPU overhead on the routers sourcing the summarized advertisement.
B. Summarization prevents the visibility of the metric to the component subnets.
C. Summarization creates routing loops.
D. Summarization causes packet loss when RPF is enabled.
Q132. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?
A. IP packets with broadcast IP source addresses
B. IP packets with identical source and destination IP addresses
C. fragmented packets with the do-not-fragment bit set
D. IP packets with the multicast IP source address
E. IP packets with the multicast IP destination address
F. IP packets with the destination IP address 0.0.0.0
Q133. What should be taken into consideration when designing IPsec networks using Authentication Header (AH)?
B. transform set
C. crypto maps
Q134. You need to redesign your NMS system so that it can collect information without causing adverse effects in the network, such as high CPU utilization on network devices and network instability. Which two options will minimize the impact of the trusted NMS polling your network in this situation? (Choose two.)
A. Implement SNMP community restrictions that are associated with an ACL.
B. Unload unused MIBs from the network devices.
C. Prevent polling of large tables through the use of SNMP OID restrictions.
D. Disable unused OIDs and MIBs on the NMS systems.
Q135. A junior engineer is implementing one of your optical designs and asks about CWDM (Coarse Wavelength Division Multiplexing). Which two features describe CWDM? (Choose two.)
A. typically used over long distances, but requires optical amplification
B. allows up to 32 optical carriers to be multiplexed onto a single fiber
C. shares the same transmission window as DWDM
D. uses the 850-nm band
E. Passive CWDM devices require no electrical power.
Q136. A large service provider offers VoIP and Video services to business customers. Which three areas should the service provider monitor related to these services? (Choose three.)
A. bandwidth utilization
B. service response time
C. packet loss
Q137. You are designing the QoS features for a large enterprise network that includes DMVPN. When would you need to configure QoS preclassify?
A. when you are marking packets with the DSCP bits
B. when you are marking packets with the TOS bits
C. when your service provider requires the DSCP bits be set
D. when the QoS policy cannot be based on DSCP ToS bits
Q138. In which two ways is a network design improved by the inclusion of IP Event Dampening? (Choose two.)
A. reduces processing load
B. provides sub-second convergence
C. improves network stability
D. prevents routing loops
E. quickly detects network failures
Q139. Your organization is working on a design solution for a new Internet-based remote access virtual private network that has 1000 remote sites. A network administrator recommends GETVPN as the model because the network of today uses DMVPN, which results in a lot of background NHRP control traffic. What is a potential problem with using GETVPN for this design solution?
A. GETVPN would require a high level of background traffic to maintain its IPsec SAs.
B. GETVPN is not scalable to a large number of remote sites.
C. GETVPN and DMVPN will not interoperate.
D. GETVPN key servers would be on public, hacker-reachable space and need higher security.
Q140. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated Internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements:
The network supports four service queues with equal treatment for delay, jitter, and packet loss.
Queues are numbered 0-3, where 0 is the default queue.
Three queues have one treatment.
One queue has either one or two treatments.
If your design includes eight CoS queues on the Service Provider XYZ MPLS PE router ingress (CE facing) interface, how will customer traffic be classified as it enters the MLS P routers?
A. The eight CoS queues in the MPLS P router are remapped to the eight CoS queues.
B. Traffic is classified on the MPLS PE routers on core facing interface. The DSCP value is mapped into EXP field where multiple EXP settings (2+) will be assigned to a single queue throughout the MPLS P routers.
C. Discard the traffic from the eight CoS queues that does not match the four CoS queues of the MPLS P routers.
D. The 8 CoS queues in the MPLS P router are remapped to four 4 flow-label queues.