[Lead2pass New] Download Free Cisco 352-001 Exam Questions And Answers From Lead2pass (301-320)

2017 October Cisco Official New Released 352-001 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

As a professional IT exam study material provider, Lead2pass gives you more than just 352-001 exam questions and answers. We provide our customers with the most accurate study material about the 352-001 exam and the guarantee of pass. We assist you to prepare for 352-001 certification which is regarded valuable the IT sector.

Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/352-001.html

You are the lead IP network designer for a new service provider called XYZ, and you are working closely with the CTO to finalize design requirements. The CTO informs you that they want to transport IPv6 prefixes of customers through the XYZ network at this time; however, they need your advice on whether to deploy dual stack or MPLS 6PE/6VPE.
Which two options do you recommend? (Choose two.)

A.    Build a dual-stack network. Enable BGP in the core.
Redistribute EBGP routes into IGP.
B.    Use MPLS 6PE to simplify the operation and keep a BGP-free core.
When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
C.    Use MPLS 6VPE to simplify the operation and keep a BGP-free core.
When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
D.    Prepare the dual-stack infrastructure from the beginning, even if BGP prefixes would have to be announced via IPv4 in case you decide to maintain the BGP-free core.

Answer: BD

A Service Provider network designer is considering the use of the G.8032 Ethernet Ring Protection mechanism in order to provide resiliency in the network.
Which three concepts will be supported with the implementation G.8032? (Choose three.)

A.    Ring Protection Link (RPL)
B.    Ring Automatic Protection Switching (R-APS)
C.    Multi-Router Automatic Protection Switching (MR-APS)
D.    Automatic Protection Switching (APS) Channel

Answer: ABD

Which two headend router scalability factors should be considered when designing a DMVPN network solution that uses a hub-and-spoke topology? (Choose two.)

A.    the required aggregated packet per second
B.    the amount of bandwidth necessary to terminate all the remote tunnels
C.    the routing protocol chosen for the data plane routing
D.    the maximum number of tunnels supported by the headend router
E.    the CPU and memory of the headend router

Answer: AD

The Service Provider you work for wants to deploy CoS functionality on the P routers of the MPLS core, to provide a complete CoS solution to all customers that purchase services such as dedicated Internet access, MPLS Layer 3 VPN, and Layer 2 VPN (pseudowire).
The design requirements are:

– The network supports four service queues with equal treatment for delay, jitter, and packet loss.
– Queues are numbered 0-3, where 0 is the default queue.
– Three queues have one treatment, whereas the other queue has either one or two treatments.
– The Service Provider manages control traffic, whereas the customers manage business critical and best effort.

Which two statements could you recommend to allow for the appropriate level of bandwidth allocation? (Choose two.)

A.    Control plane 10%, Real Time 30%, Business Critical 40%, Best Effort 20%
B.    Control plane 80%. Real Time 10%, Business Critical 5%, Best Effort 5%
C.    Control plane 90%, Real Time 5%, Business Critical 5%, Best Effort 0%
D.    Control plane 20%, Real Time 40%, Business Critical 30%, Best Effort 10%

Answer: AD

A customer wants to understand the benefits of a proposed network design that utilizes SNMPv3. Which two network threats is SNMPv3 effective against? (Choose two.)

A.    modification of information threats
B.    masquerade threats
C.    denial of service threats
D.    traffic analysis threats

Answer: AB

Which two statements describe how including Cisco IPoDWDM proactive protection in an optical design would minimize packet loss in the event of a fiber cut? (Choose two).

A.    It uses the FEC field on the OTN frame to trigger protection.
B.    It uses a “not to exceed” predefined BER threshold to cause traffic redirection.
C.    It reroutes the optical circuit after an event that impacts service.
D.    It is effective both when you have redundant and nonredundant Layer 3 MPLS paths.

Answer: AB

To improve the stability of a global network, you have been tasked with changing the design to include link-state topology summarization.
What are two issues that you should address as part of the design? (Choose two.)

A.    slow convergence
B.    suboptimal routing
C.    traffic black-holing
D.    packet reordering

Answer: BC

Refer to the exhibit. Four customer sites are connected through an EoMPLS-based VPLS over an MPLS provider. You are migrating from OSPF to multi-level IS-IS as the routing protocol to run on the four CE routers, and connectivity between all four sites is required.
You want to control which CE or CEs will be elected as the Designated Intermediate System.
Which two key aspects should be taken into account? (Choose two.)


A.    The DIS role for Level1 and Level2 can be performed by different routers.
B.    The CE with the second highest priority will be elected as the backup DIS on the LAN segment.
C.    One of the CE routers will be elected as the DIS based on interface priority then highest MAC address.
D.    It is recommended to use point-to-point link type on the CEs.
E.    If a new CE router is added to the VPLS cloud with a lower interface priority it will become the DIS.

Answer: AC

The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design.
Which three options about the Overload Bit are true? (Choose three.)

A.    It is not recommended on BGP route reflectors.
B.    It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable.
C.    It can be set on a router during the startup process for a fixed period of time.
D.    It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.
E.    It can be set on a router until other interacting protocols have signaled convergence.

Answer: BCE

You are working on a network design for Customer A. This design should consider fast convergence features, and it was agreed that BFD should be used for faster link-transition detection.
Which three options apply to the use of the echo function in BFD? (Choose three.)

A.    It can be used with asynchronous mode.
B.    BFD control packets are not required.
C.    It can be enabled individually in each direction.
D.    It has the advantage of testing the forwarding path on the remote system.
E.    The rate of periodic transmission of BFD control packets should be increased.

Answer: ACD

Refer to the exhibit. Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged.
Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.)


A.    Enable mutual redistribution between OSPF and RIP on one border router.
B.    Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags.
C.    Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router B.
D.    Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database.
E.    Filter external routes on Router A and Router B based on route tags.

Answer: BCE

You are designing a core MPLS-based network with a single OSPF area with no external routes. Which two mechanisms can be used to improve convergence time during a failure? (Choose two.)

A.    incremental SPF
B.    route filtering
C.    graceful restart
D.    BFD

Answer: AD

Which three factors slow down network convergence? (Choose three.)

A.    constant interface flapping
B.    lack of redundant paths
C.    inconsistent topology states between routers
D.    transport network failing to generate LoS
E.    wrong summarization in ABRs

Answer: ACD

Refer to the exhibit. Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.)


A.    PVRSTP on all switches
B.    REP on all switches
C.    MST on all switches
D.    BPDU guard on Switch A and Switch D
E.    8032 on ring A-B-C-D

Answer: BE

Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)

A.    The firewall acts like a router hop in the network.
B.    OSPF adjacencies can be established through the firewall.
C.    Changes in the existing IP addressing and subnets are required.
D.    Multicast traffic can traverse the firewall.
E.    The firewall can participate actively on spanning tree.

Answer: BD

Refer to the exhibit. Service Provider A and Service Provider B have agreed to a strategic interconnect relationship that will allow them access into each other’s geographies by using an inter-AS eBGP VPNv4 multihop between route reflectors.
Which two options will accomplish this scenario? (Choose two.)


A.    RR 1 and RR 2 peer using multihop eBGP VPNv4 to exchange prefixes.
B.    ASBR 1 and ASBR 2 act as inline route reflectors that set themselves as the next-hop.
C.    An LSP is formed between ASBR 1 and ASBR 2 using eBGP IPv4.
D.    An LSP is formed between ASBR 1 and ASBR 2 using eBGP VPNv4.
E.    RR 1 and RR 2 peer using multihop eBGP IPv4 to exchange prefixes.

Answer: AC

You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication.
Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

A.    EoMPLS
B.    DWDM
C.    Multichassis EtherChannel over Pseudowire
D.    OTV
E.    VPLS

Answer: BF

You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS.
Which two interconnect technologies support MACsec? (Choose two.)

A.    EoMPLS
B.    MPLS Layer 3 VPN
D.    OTV
E.    VPLS

Answer: AE

You need to redesign your NMS system so that it can collect information without causing adverse effects in the network, such as high CPU utilization on network devices and network instability. Which two options will minimize the impact of the trusted NMS polling your network in this situation? (Choose two.)

A.    Implement SNMP community restrictions that are associated with an ACL.
B.    Unload unused MIBs from the network devices.
C.    Prevent polling of large tables through the use of SNMP OID restrictions.
D.    Disable unused OIDs and MIBs on the NMS systems.

Answer: CD

Refer to the exhibit. This new OSPF network has four areas, but the hub-and-spoke area experiences frequent flapping. You must fix this design failure.
Which two mechanisms can you use to isolate the data center area from the hub-and-spoke area without losing IP connectivity? (Choose two.)


A.    Make the DC area totally stub.
B.    Make the DC area an NSSA.
C.    Convert the DC area to EIGRP protocol.
D.    Deploy a prefix summarization on router D.
E.    Use OSPF distribute-list filtering on router A.

Answer: AD

Lead2pass.com has been the world leader in providing online training solutions for 352-001 Certification. You use our training materials that have been rigorously tested by international experts.

352-001 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDaUphM0lMOWRjUU0

2017 Cisco 352-001 exam dumps (All 510 Q&As) from Lead2pass:

https://www.lead2pass.com/352-001.html [100% Exam Pass Guaranteed]