Download New Latest (May) Cisco 352-001 Actual Tests 91-100

Ensurepass

 

QUESTION 91  (Topic 1)

 

You work as a network designer for a company that is replacing their Frame Relay WAN with an MPLS VPN service, where the PE-to-CE routing protocol is BGP. The company has 3000 routes in their distribution routers, and they would like to advertise their access routers through the MPLS network. Their service provider, however, only supports 1000 prefixes per VRF. Which two design solutions can be applied to ensure that your access routers will be able to reach all devices in your network? (Choose two.)

 

A.

Use prefix lists on your distribution routers to control which routes are sent to the MPLS network.

B.

On your distribution routers, configure null routes and aggregate routes for the prefixes in your network.

C.

Configure your distribution routers to send a default route to the MPLS network.

D.

Summarize the routes on the MPLS WAN interfaces of your distribution routers.

 

Answer: BC

 

 

QUESTION 92  (Topic 1)

 

In an MPLS-VPN environment, what is the effect of configuring an identical set of route targets for a particular VRF, but then configuring nonidentical route distinguisher across multiple PE devices?

 

A.

The routes will be correctly handled by the control plane, but there will be instances where routes take up twice as much memory.

B.

The routes will propagate to the remote PE, but the PE will never install them in its forwarding table.

C.

The routes will be rejected by the remote PE because they have a different RD than its routes.

D.

The routes will not even be sent to any remote PE with a different RD.

 

Answer: A

 

 

QUESTION 93  (Topic 1)

 

You are designing a Group Encrypted Transport virtual private network solution for an existing branch network. The existing network has the following characteristics:

 

50 remote sites (with an additional 30 remote sites expected over the next 3 years) Connectivity between all sites is via Multiprotocol Label Switching Layer 3 virtual private network service from a single provider

Open Shortest Path First is the routing protocol used between provider edge and customer edge routers

The customer edge routers will become group members performing the encryption between sites

 

Which additional routing protocol would you use for the overlay routing between the group members?

 

A.

Open Shortest Path First (with a different process ID)

B.

Enhanced Interior Gateway Routing Protocol

C.

No additional protocol is necessary.

D.

External Border Gateway Protocol

E.

Routing Information Protocol Version 2

F.

Next Hop Resolution Protocol

 

Answer: C

 

 

QUESTION 94  (Topic 1)

 

A company has these requirements for access to their wireless and wired corporate LANs using 802.1x:

 

Client devices that are corporate assets and have been joined to the Active Directory domain are allowed access.

Personal devices must not be allowed access.

Clients and access servers must be mutually authenticated.

 

Which solution meets these requirements?

 

A.

Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with user authentication

B.

Extensible Authentication Protocol-Transport Layer Security with machine authentication

C.

Extensible Authentication Protocol-Transport Layer Security with user authentication

D.

Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol Version 2 with machine authentication

 

Answer: B

 

 

QUESTION 95  (Topic 1)

 

Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose three.)

 

A.

aggregate routing information on an OSPF ABR

B.

fully meshed distribution layer

C.

Equal-Cost Multipath routing

D.

EIGRP query boundaries

E.

multiple IS-IS flooding domains

F.

tuned Spanning Tree Protocol timers

 

Answer: ADE

 

 

QUESTION 96  (Topic 1)

 

A network designer is redesigning an enterprise campus network to ensure that Ethernet switches proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in the fiber pair, leading to looping. Which feature could be implemented in the design to allow the Spanning Tree Protocol on the switches to be protected?

 

A.

loop guard

B.

UniDirectional Link Detection

C.

UniDirectional Link Detection aggressive mode

D.

root guard

 

Answer: C

 

 

QUESTION 97  (Topic 1)

 

Tesla Radio GmbH is going to build a new research lab network based on a set of switches that would connect to their existing enterprise network. They are considering a design that would guarantee loop-free behavior within the set of switches. The design would also allow the group of switches to seem like a single switch to the enterprise network, because it is owned by a separate administrative group. Which Spanning Tree Protocol should be used to support the design requirements?

 

A.

IEEE 802.1w

B.

IEEE 802.1D

C.

IEEE 802.1s

D.

IEEE 802.1p

 

Answer: C

 

 

QUESTION 98  (Topic 1)

 

You are identifying performance management requirements for a VoIP migration. What

 

 

three key performance indicators would you use to track media quality? (Choose three.)

 

A.

delay

B.

trunk group usage

C.

jitter

D.

packet loss

E.

call processing (call detail records)

F.

call processing (performance counters)

G.

echo

H.

crosstalk

 

Answer: ACD

 

 

QUESTION 99  (Topic 1)

 

A network designer wants to improve a company network design due to multiple network crashes. Which technology would allow for the restore of a network connection without informing the Layer 3 protocol?

 

A.

Bidirectional Forwarding Detection

B.

automatic protection switching

C.

UniDirectional Link Detection

D.

Ethernet OAM

 

Answer: B

 

 

QUESTION 100  (Topic 1)

 

You have been hired by Acme Corporation to evaluate their existing network and determine if the current network design is secure enough to prevent man-in-the-middle attacks. When evaluating the network, which switch security option should you investigate to ensure that authorized ARP responses take place according to known IP-to-MAC address mapping?

 

A.

ARP rate limiting

B.

DHCP snooping

C.

Dynamic ARP Inspections

D.

IP Source Guard

 

Answer: C

Topic 2, Volume B

Free VCE & PDF File for Cisco 352-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

Posted in Uncategorized