Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 352-011 Cisco Certified Design Expert Practical Exam Exam Practice Test

Page: 1 / 25
Total 249 questions

Cisco Certified Design Expert Practical Exam Questions and Answers

Question 1

Which three options are important design functions of IPv6 first-hop security? (Choose three)

Options:

A.

It prevents rogue DHCP servers farms assigning IPv6 addresses.

B.

It prevents IPv6 packets fragmentation.

C.

It limits IPv6 route the advertisement in the network.

D.

It implements a broadcast-control mechanism.

E.

It suppresses excessive multicast neighbor discovery.

F.

It implements multihoming security.

Question 2

Refer to the exhibit.

Question # 2

This enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer 3VPN solution and manages the CE routers, but they do not currently multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

Options:

A.

Enable a GRE tunnel between nodes C1 and C4

B.

Enable a GRE tunnel between nodes CE1 and CE2

C.

Enable a GRE tunnel between nodes C2 and C4

D.

Implement hub and spoke MPLS VPN over DMVPN(also known as 2547oDMVPN) between CE1 and CE2

E.

The service provider must provide a Draft Rosen Solution to enable a GRE tunnel node PE1 and PE2

Question 3

When you design a network that uses IPsec, where can you reduce MTU to avoid network fragmentation?

Options:

A.

on both ends of the TCP connection

B.

on the side closest to the client

C.

on the side closest to the server

D.

in the WAN

Question 4

Which two options describe the advantages of using DWDM over traditional optical networks? (Choose two)

Options:

A.

Inherent topology flexibility with intelligent chromatic dispersion

B.

Inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

C.

Inherent topology flexibility with built-in service protection

D.

Inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

E.

Ability to expand bandwidth over existing optical infrastructure

Question 5

ACME Agricultural requires that access to all network devices is granted based on identify validation, and an authentication server was installed for this purpose. Currently the network team uses a list of passwords based on regions to access the internal corporate network devices. Which protocol do you recommend to ensure identify validation from the authentication server to the corporate directory?

Options:

A.

HTTPS

B.

TACACS+

C.

SSH

D.

LDAP

Question 6

Refer to the exhibit.

Question # 6

ACME Mining has four data centers in Santiago, Cape Town, Mumbai, and Beijing. They are full-mesh connected via a 400 Mb/s EVP-LAN. A 1-TB transfer occurs daily via FTP between the Santiago and Mumbai data centers. When testing, the data transfer took an ''unexpected and outrageous, with an average transfer rate of 47 KB/s. The team provided this information.

LAN bandwidth usage below 5% at both data centers during transfer.

WAN bandwidth usage was between 20-30% at both data centers during transfer.

The only QoS on WAN is KB/s strict priority configured for other types of traffic.

There is no QoS on LAN.

The ping RTT average between data centers is 378 milliseconds.

Which action improves the file transfer rate?

Options:

A.

Use SFTP instead of FTP

B.

Apply optimization techniques at both data centers.

C.

Use TFTP instead of FTP.

D.

Classify FTP transfer and use the strict priority queue on the WAN.

Question 7

What is a design application of control plane policing?

Options:

A.

CPP protects the control plane from reconnaissance and or denial-of-service attacks

B.

CPP protects the forwarding plane by rate –limiting excessive routing protocol traffic

C.

CPP protects the forwarding plane by allowing legitimate traffic and dropping excessive traffic

D.

CPP drop malformed packet that are sent to the CPU

Question 8

Which feature or technology that affects the operations of IPsec should be taken into account when designing an IPsec network using Authentication header?

Options:

A.

TCP MSS adjustment

B.

Certificate-based authentication

C.

Transform set

D.

NAT

Question 9

Refer to the exhibit,

Question # 9

Which two design considerations should be implemented on the pseudowire between N-PE and U-PE routers for a loop-free hierarchical VPLS service? (Choose two)

Options:

A.

Disable split horizon towards the U-PE router.

B.

Disable MAC learning on the U-PE router.

C.

Enable split horizon towards the N-PE routers.

D.

Disable MAC learning on the U-PE routers.

E.

Disable MAC learning on the U-PE routers.

F.

Enable split horizon towards the U-PE routers.

G.

Disable split horizon toward the N-PE routers.

Question 10

Which mechanism should be added to a network design to identify unidirectional Spanning Tree Protocol failures through BPDU loss?

Options:

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

UDLD

Question 11

Which two are IoT sensor-specific constraints? (Choose two)

Options:

A.

Memory

B.

Processing power

C.

The amount of devices

D.

Cooling

E.

Standard transport protocols

Question 12

In a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries, which two mechanisms avoid suboptimal routing? (Choose two)

Options:

A.

Route filtering

B.

AD manipulation

C.

Matching EIGRP process ID

D.

Matching OSPF external routes

E.

Route tagging

Question 13

You are designing an optical network. Your goal is to ensure that your design contains the highest degree of resiliency. In which two ways should you leverage a wavelength-switched optical network solution in your network design? (Choose two.)

Options:

A.

a wavelength-switched optical network guarantees restoration based strictly on the shortest path available

B.

a wavelength-switched optical network provides fault tolerance for single failures only

C.

a wavelength-switched optical network takes linear and nonlinear optical impairment calculation into account

D.

a wavelength-switched optical network assigns routing and wavelength information

E.

a wavelength-switched optical network eliminates the need for dispersion compensating units in a network

Question 14

Which two conditions are required for successful route aggregation? (Choose two)

Options:

A.

Contiguous prefix allocation

B.

Logical separation between zones or layers within networks

C.

Matching traffic aggregation with route aggregation locations

D.

Consistent prefix allocations per network

E.

Physical separation between zones or layers within networks

Question 15

Refer to the exhibit.

Question # 15As part of a redesign project, you must predict multicast behavior. What is the resultant multicast traffic receiving on the shared tree( , G), if it is received on the LHR interface indicated?

Options:

A.

It is dropped due to an unsuccessful RPF check against the multicast receiver

B.

It is switched due to a successful RPF check against the routing table

C.

It is switched given that no RPF check is performed

D.

It is dropped due to an unsuccessful RPF check against the multicast source

Question 16

A data center provider has designed a network using these requirements

 Two data center sites are connected to the public internet

 Both data centers are connected to different Internet providers

 Both data centers are also directly connected with a private connection for the internal traffic can also be at this direct connection The data center provider has only /19 public IP address block

Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connections fails to complete traffic for both data centers should be routed by using the remaining Internet connection in which two ways can this routing be achieved? (Choose two)

Options:

A.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the /20 block from the remote data center is sent out with path prepending at both sites

B.

One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining internet connection

C.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference of both sites

D.

BGP will always load-balance the traffic to both data center sites

E.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the /20 block from the remote data center is sent out with a higher BGP weight at both sites

F.

The data center provider must have an additional public IP address block for this routing

Question 17

ACME Corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain condition in the network.

Which feature should be used to meet this design requirement?

Options:

A.

IP SLA

B.

reflect ACLs

C.

Cisco IOS Embedded Event Manager

D.

SOAP

Question 18

Question # 18

Options:

Question 19

You are designing dual-homed active/active ISP connections from an enterprise customer for internet services, and you have recommended BGP between the customer and ISP. When three security mechanisms do you enable to secure the connection? (Choose three)

Options:

A.

uRPF is strict mode

B.

remote triggered black holes

C.

IDS

D.

GTSM

E.

Routing protocol authentication

F.

uRPF in loose mode

Question 20

Which interconnectivity method offers the fastest convergence in the event of a unidirectional issue between three Layer 3 switches connected together with routed links in the same rack in a data center?

Options:

A.

Fiber Ethernet connectivity with UDLD enabled

B.

Copper Ethernet connectivity with BFD enabled

C.

Fiber Ethernet connectivity with BFD enabled

D.

Copper Ethernet connectivity with UDLD enabled

Question 21

A large ISP is analysing which IGP meets these following requirements

 Network must be resilient against unstable MTU in one side of newly released transmission pieces of equipment

 Network must support MPLS traffic engineering solution for future use

Which IGP must be selected and why?

Options:

A.

ISIS : in case MTU changes your TE tunnels keep the LSP stable

B.

OSPF: adjacency remains up even if MTU changes

C.

OSPF: in case MTU changes your TE tunnels keep the LSP stable

D.

ISIS: adjacency remains up even if MTU changes

Question 22

Which two SAN designs appropriate to support large-scale SAN environments? (Choose two)

Options:

A.

Edge-core-edge design

B.

Fibre Channel forwarder

C.

Split fabric design

D.

Core-edge design

E.

Dual fabric design

Question 23

Company ABC grew organically and now their single-area OSPF network has an unacceptably slow convergence time after a topology change. To address the slow convergence time, they want to introduce a multiarea OSPF design and implement address summarization at the area border routers, which option should be their main concern about this redesign?

Options:

A.

Routing is suboptimal

B.

SPF calculation takes longer

C.

Operations complexity is increased

D.

More memory is needed across the routers on the network

Question 24

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

Options:

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Question 25

Which option is a critical mechanism to optimize convergence speed when using MPLS FRR?

Options:

A.

IGP timers

B.

Bandwidth reservation

C.

Shared risk link groups

D.

Down detection

Question 26

What is an effect of using ingress filtering to prevent spoofed addresses on a network design?

Options:

A.

It reduces the effect of DDoS attacks when associated with DSCP remaking to Scavenger

B.

It protects the network infrastructure against spoofed DDoS attacks

C.

It filters RFC 1918 addresses

D.

It classifies bogon traffic and remarks it with DSCP bulk

Question 27

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50MSEC). In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?

Options:

A.

TE backup tunnel

B.

Next-hop (NHop) tunnel

C.

FRR Backup tunnel

D.

next-next-hop (NNHop) tunnel

Question 28

Which two statements about VXLAN are true? (Choose two)

Options:

A.

VXLAN is a Cisco proprietary solution

B.

VXLAN is an encapsulation method used to create a Layer 3 overlay network

C.

VXLAN can be used to enforce Layer 2 isolation in a multitenant infrastructure

D.

VXLAN uses the Spanning Tree protocol for loop prevention

E.

VXLAN overcomes the 802.1Q virtual LAN address space limitation

Question 29

Your client is considering acquiring a new IPv6 address block so that all Ethernet interfaces on the network receive addresses based on their burned-in hardware addresses, with support for 600 VLANs. Which action do you recommend?

Options:

A.

Acquire a new /60 IPv6 network and subnet it into /70 networks, one per VLAN

B.

Acquire a new /58 IPv6 network and subnet it into /64 networks, one per VLAN

C.

Acquire a new /60 Ipv6 network and subnet it into /68 networks, one per VLAN

D.

Acquire a new/54 IPv6 network and subnet it into /64 networks , one per VLAN

Question 30

What is an advantage of placing the IS-IS flooding domain boundary at the core Layer in a three-layer hierarchical network?

Options:

A.

The L1 and L2 domains can easily overlap

B.

The L2 domain is contained and more stable

C.

It can be applied to any kind of topology

D.

It reduces the complexity of the L1 domains

Question 31

Refer to the exhibit.

Question # 31

A customer interconnected hundreds of branch offices into a single DMVPN network, with the HUB in the main data center. Due to security policies, the customer requires that the default route for all Internet traffic from the users at the branches must go through the tunnel and the only connections that are allowed to and from the branch router over the local internet circuit are the DMVPN tunnels. Which two combined actions must you take on the branch router to address these security requirements and keep the solution scalable? (Choose two)

Options:

A.

Place the WAN interface in a front-door VRF, leaving the tunnel interface in the default routing instance

B.

Protect the WAN interface by an inbound ACL that permits only IPsec-related traffic

C.

Implement a zone-based firewall that allows only IPsec-related traffic from zone UNTRUSTED to zone TRUSTED

D.

Add a host route for the public IP address of each remote branch and HUB routers that points directly to the local ISP, and add a default route that points to the tunnel

E.

Use a floating default route with the preferred path over the tunnel and a backup path over the Internet natively

Question 32

Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two)

Options:

A.

The Reported Distance from a successor is lower than the local Feasible Distance

B.

The Reported Distance from a successor is higher than the local Feasible Distance

C.

A feasible successor must be present

D.

The feasible Distance from a successor is lower than the local Reported Distance

E.

The feasibility condition do not need to be met

Question 33

Which option reduces jitter in a VoIP network?

Options:

A.

Deploy WRED

B.

Deploy call Admission Control

C.

Adjust the playout delay buffer at the receiver

D.

Increase the bandwidth of the links

Question 34

Which two impacts of adding the Ip events dampening feature to a network design are true? (Choose two.)

Options:

A.

It switches traffic immediately after a link failure.

B.

It reduce the utilization of system processing resources.

C.

It speeds up link failure detection.

D.

It protects against routing loops.

E.

it improves overall network stability.

Question 35

Refer to the exhibit.

Question # 35

On this MPLS-based network ring, links have failed between router A and router E. These failures formed microloops while the network converged, when A forwarded traffic to B but B forwards it back to A. Which technology is the simplest solution to avoid microloops without enabling a new protocol in the network?

Options:

A.

TE Fast ReRoute

B.

IP Fast ReRoute

C.

Loop-Free Alternate

D.

Remote Loop-Free Alternate

Question 36

Which mechanism provides fast path failure detection?

Options:

A.

Non-Stop Forwarding

B.

Carrier delay

C.

Graceful restart

D.

UDLD

E.

Fast hello packets

F.

iSPF

Question 37

Which two options are reasons for designing a large OSPF network with multiple areas connected to the backbone? (Choose two)

Options:

A.

Reduce the number of routes within an area

B.

Route tagging capability

C.

Simplify logical topology

D.

Enhance failure detection

E.

Reduce SPF algorithm runs

Page: 1 / 25
Total 249 questions