Summer Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 60certs

Cisco 352-011 Dumps

Page: 1 / 9
Total 249 questions

Cisco Certified Design Expert Practical Exam Questions and Answers

Question 1

Which two statements regarding to QoS marking are true? (Choose two)

Options:

A.

Shaping is one of the ways that packets can be remarked

B.

Class-based marking occurs after packet classification

C.

802.1Q/p CoS bits and IP Precedence are both layer 3 marking fields

D.

QoS marking establishes a trust boundary that scheduling tools depend on

E.

MPLS EXP and DSCP are both layer 2 marking fields

Question 2

Which IEEE standard is commonly used at the data link layer for an access network, in an IoT environment?

Options:

A.

Wireless Regional Area Network

B.

Low-Rate Wireless Network

C.

Wireless Local Area Network

D.

Broadband wireless metropolitan Network

Question 3

Company ABC is using an Ethernet virtual circuit as its provider’s DCI solution. A goal is to reduce the time to detect the link failure. Which protocol accomplishes this goal?

Options:

A.

UDLD

B.

Spanning tree bridge assurance

C.

Link aggregation group

D.

Ethernet OAM

Question 4

Options:

Question 5

How must queue sizes be designed to ensure that an application functions correctly?

Options:

A.

The default queue sizes are good for any deployment

B.

Each individual device queuing delay in chain must be less than or equal to the application required delay

C.

The queuing delay on every device in chain must be exactly the same

D.

The sum of the queuing delay of all devices in chain must be less than or equal to the application required delay

Question 6

You are presented with requirements to design a development, testing and production environments. These environment should communicate with each other, yet they should be kept as separate failure domains. Which routing protocol should be configured on the links between the networks to support the design requirements?

Options:

A.

OSPF

B.

EIGRP

C.

IS-IS

D.

BGP

Question 7

In a VPLS design solution, which situation indicates that BGP must be used instead of LDP in the control plane?

Options:

A.

MAC address learning scales better through BGP

B.

BGP supports VPLS interworking

C.

Pseudowire configuration overhead is reduced

D.

There are no full-mesh pseudowire due to the route reflection feature of BGP

Question 8

Refer to the exhibit.

As part of a redesign project, you must predict multicast behavior. What is the resultant multicast traffic receiving on the shared tree( , G), if it is received on the LHR interface indicated?

Options:

A.

It is dropped due to an unsuccessful RPF check against the multicast receiver

B.

It is switched due to a successful RPF check against the routing table

C.

It is switched given that no RPF check is performed

D.

It is dropped due to an unsuccessful RPF check against the multicast source

Question 9

Drag the fast Reroute mechanism on the left and drop it onto the corresponding routing protocol on the right

Options:

Question 10

Options:

Question 11

Which markup language is used to format Ansible's playbook?

Options:

A.

ADML

B.

YAML

C.

HTML

D.

XML

E.

NAML

Question 12

A network designer wants to improve a company network design due to multiple network crashes. Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?

Options:

A.

Bidirectional Forwarding Detection

B.

automatic protection switching

C.

UDLD

D.

Ethernet OAM

Question 13

Which two SAN designs appropriate to support large-scale SAN environments? (Choose two)

Options:

A.

Edge-core-edge design

B.

Fibre Channel forwarder

C.

Split fabric design

D.

Core-edge design

E.

Dual fabric design

Question 14

What is an advantage of placing the IS-IS flooding domain boundary at the core Layer in a three-layer hierarchical network?

Options:

A.

The L1 and L2 domains can easily overlap

B.

The L2 domain is contained and more stable

C.

It can be applied to any kind of topology

D.

It reduces the complexity of the L1 domains

Question 15

Which two are IoT sensor-specific constraints? (Choose two)

Options:

A.

Memory

B.

Processing power

C.

The amount of devices

D.

Cooling

E.

Standard transport protocols

Question 16

What is an effect of using ingress filtering to prevent spoofed addresses on a network design?

Options:

A.

It reduces the effect of DDoS attacks when associated with DSCP remaking to Scavenger

B.

It protects the network infrastructure against spoofed DDoS attacks

C.

It filters RFC 1918 addresses

D.

It classifies bogon traffic and remarks it with DSCP bulk

Question 17

Refer to the exhibit.

You are designing MPLS-TE for this network. The links form Perth to Sydney and from Perth to Adelaide share the same optical fiber in one given segment. Which feature should you implement to eliminate the risk that a backup tunnel is installed over the same optical fiber as the primary one?

Options:

A.

Shared Risk Link Groups

B.

MPLS-TE Path Protection

C.

MPLS-TE auto-tunnel backup

D.

MPLS-TE Link protection

Question 18

Which open source message broker is in the Cisco Cloud Center?

Options:

A.

Apache kafka

B.

HornetQ

C.

RabbitMQ

D.

Fuse Message Broker

E.

Oracle Message Broker

Question 19

Refer to the exhibit.

This new OSPF network has four areas, but the hub-and-spoke area experiences frequent flapping. In order to fix this design failure, which two mechanisms can you use to isolate the data center area from the hub-and-spoke area without losing Ip connectivity? (Choose two)

Options:

A.

Use OSPF distribute-list filtering on router A

B.

Deploy a prefix summarization on router D

C.

Make the data center area a NSSA

D.

Make the data center area totally stub

E.

Convert the data center area to EIGRP protocol

Question 20

Which two components are the responsibility of the customers in a platform as a Service offering? (Choose two)

Options:

A.

Applications

B.

Infrastructure connectivity

C.

Hardware

D.

Data

E.

APIs

Question 21

What are three common objectives of customers using multiple cloud providers? (Choose three )

Options:

A.

regional cloud provider access

B.

security

C.

analytics

D.

high availability

E.

feature disparity

F.

bandwidth

Question 22

Which two functions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two).

Options:

A.

Fault isolation

B.

QoS classification and marking boundary

C.

Fast transport

D.

Reliability

E.

Load balancing

Question 23

Which two design aspects should a metro service provider consider when planning to deploy REP for his backbone? (Choose two.)

Options:

A.

Two REP segments can be connected redundantly at two points, one connection will be blocked as per the STP defined in IEEE 802.1d.

B.

UDLD can be enabled on REP interfaces to detect unidirectional failures.

C.

The guaranteed convergence recovery time is less than 50 ms for the local segment.

D.

A REP segment is limited to a maximum of seven devices.

E.

VLAN load balancing for optimal bandwidth usage is supported in any REP segment.

Question 24

Which three options are IS-IS design considerations when connecting two Layer 3 switches directly using a 10 GBASE-T cabling and formatting an IS-IS neighbor adjacency?

Options:

A.

The default IS-IS network type is point-to-point so a DIS is not elected

B.

A DIS is elected between the IS-IS neighbors and the elected DIS is pre-empted if router with a higher system ID is connected

C.

The area, levels, and interface MTU parameters must match, and system MTU must be unique for two IS-IS routers to become adjacent

D.

Faster IS-IS hello and dead timers increase bandwidth and CPU use, and may cause instability

E.

The IS-IS hello and dead timers should be tuned to detect failures as quickly as possible

F.

A DIS is elected between the IS-IS neighbors and the elected Dis is pre-empted if a router with a lower system ID is connected

G.

The hello and dead timers must match for two IS-IS routers to become adjacent

Question 25

A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?

Options:

A.

Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.

B.

Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.

C.

The multicast application sends too many packets into the network and the network infrastructure drops packets.

D.

The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.

Question 26

Refer to the exhibit.

This layer 2 network is expected to add 150 VLANS over the next year, In addition to the existing 50 VLANs within the network which STP types will support this design requirement the least amount of CPU resource and achieving load balancing?

Options:

A.

PVST+

B.

CST

C.

MST

D.

RSTP

Question 27

Across a large WAN network, there will be new video traffic being distributed from a single source at any given time however, the video source might originate from different parts of the multicast domain at different times . Which multicast technology provides for this multicast traffic to be distributed with optimal path selection to the source?

Options:

A.

Any source Multicast.

B.

PIM sparse mode.

C.

Bidirectional PIM.

D.

Source Specific Multicast.

Question 28

A data center provider has designed a network using these requirements

 Two data center sites are connected to the public internet

 Both data centers are connected to different Internet providers

 Both data centers are also directly connected with a private connection for the internal traffic can also be at this direct connection The data center provider has only /19 public IP address block

Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connections fails to complete traffic for both data centers should be routed by using the remaining Internet connection in which two ways can this routing be achieved? (Choose two)

Options:

A.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the /20 block from the remote data center is sent out with path prepending at both sites

B.

One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining internet connection

C.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference of both sites

D.

BGP will always load-balance the traffic to both data center sites

E.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the /20 block from the remote data center is sent out with a higher BGP weight at both sites

F.

The data center provider must have an additional public IP address block for this routing

Question 29

Which two options are potential problems with route aggregation? (Choose two)

Options:

A.

Maintaining host IP addresses during migrations

B.

Route flapping

C.

Suboptimal routing

D.

Topology hiding

E.

Asymmetric routing

F.

Prefix hijacking

Question 30

Your client is considering acquiring a new IPv6 address block so that all Ethernet interfaces on the network receive addresses based on their burned-in hardware addresses, with support for 600 VLANs. Which action do you recommend?

Options:

A.

Acquire a new /60 IPv6 network and subnet it into /70 networks, one per VLAN

B.

Acquire a new /58 IPv6 network and subnet it into /64 networks, one per VLAN

C.

Acquire a new /60 Ipv6 network and subnet it into /68 networks, one per VLAN

D.

Acquire a new/54 IPv6 network and subnet it into /64 networks , one per VLAN

Question 31

You are consultant network designer for a large GET VPN deployment for a large bank with International coverage. Between 1800 and 2000 remote locations connect to the central location through four hubs using an MPLS backbone and using two keys servers. The bank is concerned with security and replay attacks. Which two actions should you use to tune the GET VPN to meet the bank requirements? (Choose two)

Options:

A.

Increase the cryptographic key size.

B.

Replace unicast rekey with multicast rekey.

C.

Reduce the SAR clock interval duration

D.

Increase the TEK and KEK lifetime.

E.

Reduce the Dead Peer Detection periodic timer.

Question 32

Which aspect is a significant disadvantage of containers?

Options:

A.

Security

B.

Time to deploy

C.

Inefficiency

D.

Reduced operational overhead

E.

Resource consumption

Question 33

Which reason prevents a designer from using a GDOI-based VPN to secure traffic that traverses the Internet?

Options:

A.

Enterprise host IP addresses are typically not routable.

B.

GDOI is less secure than traditional IPsec.

C.

Network address translation functions interfere with tunnel header preservation.

D.

The use of public addresses is not supported with GDOI.

Question 34

When is it required to leak routes into an IS-IS level 1 area?

Options:

A.

When MPLS L3VPN PE devices are configured in the level 1 areas

B.

When unequal cost load balancing is required between the backbone and nonbackbone areas

C.

When a multicast RP is configured in the nonbackbone area

D.

When equal cost load balancing is required between the backbone and nonbackbone areas

Question 35

Which option describes a design benefit of root guard?

Options:

A.

It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST+ and MST.

B.

It prevents switch loops by detecting on one-way communications on the physical port.

C.

It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops.

D.

It makes the port go immediately into the forwarding state after being connected.

E.

It prevents switched traffic from traversing suboptimal paths on the network.

F.

It does not generate a spanning-tree topology change upon connecting and disconnecting a station on a port.

Question 36

The service provider that you work for wants to offer IPv6 internet service to its customers without upgrading all of its access equipment to support IPv6, which transition technology do you recommend?

Options:

A.

NAT64

B.

CGN

C.

Dual-stack CPE

D.

6RD

Question 37

.which two options are benefits of using Topology Independent Loop-Free Alternate in WAN design? (Choose two)

Options:

A.

It provides backup convergence for all topologies by avoiding the post-convergence path

B.

It maximizes the network utilization by load-sharing across low bandwidth and edge links while IGP convergence is in progress

C.

No additional protocols are required in the MPLS network because it uses LDP labels to signal the backup path

D.

Although it requires enabling segment routing, SR does not have to be activated as the preferred forwarding method

E.

It can provide backup paths for IPv4, IPv6 and LDP traffic

Page: 1 / 9
Total 249 questions