[Top Quality] 352-001 Cisco exam question 21-30 (May 2017)

Want to know Testking 352-001 Exam practice test features? Want to lear more about Cisco CCDE Written Exam certification experience? Study Approved Cisco 352-001 answers to Up to the immediate present 352-001 questions at Testking. Gat a success with an absolute guarantee to pass Cisco 352-001 (CCDE Written Exam) test on your first attempt.


Free VCE & PDF File for Cisco 352-001 Real Exam
(Full Version!)

Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on:

Q21. You are designing a wireless LAN with the following components: 

High-density indoor access point deployment 

2.4-GHz and 5-GHz radios 

802.11a, 802.11g, and 802.11n mode wireless LAN clients 

Site survey results show negligible foreign WiFi and non-WiFi interference. What is the best method to decrease duty cycle (radio frequency utilization) and increase overall wireless LAN client performance for this design? 

A. Disable all data rates below 12 Mb/s on all access points. 

B. Decrease radio transmit power on all access points that report a high duty cycle. 

C. Increase radio transmit power on all access points that report a high duty cycle. 

D. Disable all data rates above 12 Mb/s on all access points. 

E. Increase radio transmit power on all access points. 


Q22. Refer to the exhibit. 

You are designing an IPv4 unicast Layer 3 VPN load-balancing solution. Which L3VPN feature needs to be configured on the PE routers to support the design requirement? 

A. nonmatching route distinguishers 

B. matching route target values 

C. disable split horizon on PE2 and PE3 

D. matching route distinguishers 


Q23. During a corporate merger, a network designer is asked for a solution that will provide connectivity between the two enterprise networks. The solution must have the ability to support video sessions so that the CEO can message merger activities to the employees. The designer decides to consider multicast as a transport with MSDP to provide redundancy. Which transport feature does the network designer need to apply to the interconnecting firewall to ensure that Source-Active messages between the MSDP peers can be sent in both enterprise networks? 

A. unicast over a UDP connection 

B. multicast over a UDP connection 

C. unicast over a TCP connection 

D. multicast over a TCP connection 


Q24. A company is planning to deploy high-availability cluster support for their servers in a collapsed core data center design. Which issue should be a concern with this design? 

A. NIC teaming 

B. MAC address aging 

C. Layer 3 domain sizing 

D. Layer 2 domain sizing 


Q25. Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement? 

A. Modular QoS CLI 

B. committed accessrRate 

C. policy-based routing 

D. traffic shaping 


Q26. There is an MPLS-enabled link constantly flapping on an MPLS VPN network. Given that the network runs OSPF as the IGP protocol, which design mechanism will stabilize the network and avoid constant reconvergences? 


B. IP Event Dampening 

C. OSPF fast hellos 

D. partial SPF 


Q27. A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspects must be considered before the network design is finalized? (Choose two.) 

A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D. 

B. UniDirectional Link Detection Protocol can be enabled on Resilient Ethernet Protocol interfaces to detect unidirectional failures. 

C. The guaranteed convergence recovery time is less than 50 ms for the local segment. 

D. A Resilient Ethernet Protocol segment is limited to a maximum of seven devices. 

E. VLAN load balancing for optimal bandwidth usage is supported in any Resilient Ethernet Protocol segment. 

Answer: BE 

Q28. The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.) 

A. It is not recommended on BGP route reflectors. 

B. It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable. 

C. It can be set on a router during the startup process for a fixed period of time. 

D. It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node. 

E. It can be set on a router until other interacting protocols have signaled convergence. 

Answer: BCE 

Q29. A designer is working with a large bank to redesign their network. The designer wants to minimize complaints regarding slow application response times across the WAN. It is suspected that currently traffic is not being classified and marked correctly somewhere in the network. Which tool should the designer recommend to validate quality of service mappings and use? 




D. protocol analyzer 



Q30. You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design and implementation of the SAN in the new virtualized environment. 

In which two ways can NPIV be used in your proposed design? (Choose two.) 

A. NPIV is used to assign multiple FCIDs to a single N Port. 

B. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN. 

C. You recommend NPIV so that hosts can be members of different zones. 

D. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN. 

Answer: AD