Download New Latest (May) Cisco 352-001 Actual Tests 111-120

Ensurepass

 

QUESTION 111  (Topic 2)

 

A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and 234.145.4.5 inside the same network?

 

A.

Multicast packets from both applications are flooded to all Layer 2 ports in a segment where a multicast receiver is located.

B.

Multicast packets from both applications are flooded to ports where one multicast receiver from one application is located.

C.

Only one multicast stream is received at the port where the receivers from both applications are located.

D.

Both multicast senders will always receive the multicast packets from the other multicast application.

E.

The routers doing PIM-SM cannot distinguish between the two multicast applications.

 

Answer: B

 

 

QUESTION 112  (Topic 2)

 

Refer to the exhibit.

 

clip_image001

 

A new IPv4 multicast-based video-streaming service is being provisioned. During the design-validation tests, you realize that the link between the two buildings is carrying multicast traffic even when there are no receivers connected to the switch in Building B and despite IGMP snooping being enabled on both Layer 2 switches and IGMPv2 runs on the hosts. Which design change will prevent the multicast traffic from being unnecessarily flooded throughout the campus network?

 

A.

Enable PIM snooping on both Layer 2 switches.

B.

Enable multicast storm control on the link between Switch 1 and Switch 2.

C.

Use static Layer 2 MAC forwarding entries on Switch 1.

D.

Change the IPv4 multicast group address such that it excludes the usage of link-local MAC addresses.

E.

Ensure that Switch 1 is an IGMP querier.

 

Answer: D

 

 

QUESTION 113  (Topic 2)

 

You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to

 

 

prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

 

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

OTV

E.

VPLS

F.

GET VPN

 

Answer: AE

 

 

QUESTION 114  (Topic 2)

 

Acme Corporation indicates that their network design must support the ability to scale to support a high number of remote sites. Which IGP is considered to scale better for a hub- and-spoke topology?

 

A.

BGP

B.

OSPF

C.

IS-IS

D.

EIGRP

 

Answer: D

 

 

QUESTION 115

DRAG DROP  (Topic 2)

 

clip_image002

Answer:

 

 

clip_image003

 

A.

 

B.

 

C.

 

D.

 

 

Answer:

 

 

QUESTION 116  (Topic 2)

 

You are working on a network design for Customer

 

A.

This design should consider fast convergence features, and it was agreed that BFD should be used for faster link-transition detection. Which three options apply to the use of the echo function in BFD? (Choose three.)

 

 

A.It can be used with asynchronous mode.

B.

BFD control packets are not required.

C.

It can be enabled individually in each direction.

D.

It has the advantage of testing the forwarding path on the remote system.

E.

The rate of periodic transmission of BFD control packets should be increased.

 

Answer: ACD

 

 

QUESTION 117  (Topic 2)

 

Which option is a BFD design consideration?

 

A.

BFD should not be used with RSVP-TE backup tunnels.

B.

BFD echo mode may reduce convergence time.

C.

BFD does not support sessions over MPLS LSPs.

D.

BFD is supported on indirectly connected peers.

 

Answer: B

 

 

QUESTION 118  (Topic 2)

 

You are designing an 802.11 wireless network to include a controller as a central configuration point and access points across several remote sites. Which two aspects will

 

 

manage the flow of the traffic to meet these design considerations? (Choose two.)

 

A.

WLAN local switching with VLAN mapping requires that VLAN ID that is mapped on the AP to match a dynamic interface that is configured on the wireless LAN controller.

B.

Layer 3 roaming is not supported for locally switched WLANs.

C.

The 802.1x authentication for a client associated to an AP on a locally switched WLAN is always handled at the wireless LAN controller side.

D.

The access point can receive multicast traffic in the form of multicast packets from the WLC.

E.

WLAN access lists can be applied only to centrally switched WLANs.

 

Answer: BE

 

 

QUESTION 119  (Topic 2)

 

Which two headend router scalability factors should be considered when designing a DMVPN network solution that uses a hub-and-spoke topology? (Choose two.)

 

A.

the required aggregated packet per second

B.

the amount of bandwidth necessary to terminate all the remote tunnels

C.

the routing protocol chosen for the data plane routing

D.

the maximum number of tunnels supported by the headend router

E.

the CPU and memory of the headend router

 

Answer: AD

 

 

QUESTION 120  (Topic 2)

 

Two medium-sized companies recently merged and would like to share their two campus buildings as soon as possible. Employees should be able to sit and work in either building. If the IP addresses in the networks overlap, which virtualization technology could be deployed quickly to achieve the business objective?

 

A.

MPLS-VPN

B.

VRF-LITE

C.

EoMPLS

D.

L2TPv3

 

Answer: B

Free VCE & PDF File for Cisco 352-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

 

Posted in Uncategorized