[Lead2pass New] Lead2pass Dumps For Exam 352-001 With New Updated Exam Questions (301-320)

2017 October Cisco Official New Released 352-001 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

As a professional IT exam study material provider, Lead2pass gives you more than just 352-001 exam questions and answers. We provide our customers with the most accurate study material about the 352-001 exam and the guarantee of pass. We assist you to prepare for 352-001 certification which is regarded valuable the IT sector.

Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/352-001.html

QUESTION 301
You are the lead IP network designer for a new service provider called XYZ, and you are working closely with the CTO to finalize design requirements. The CTO informs you that they want to transport IPv6 prefixes of customers through the XYZ network at this time; however, they need your advice on whether to deploy dual stack or MPLS 6PE/6VPE.
Which two options do you recommend? (Choose two.)

A.    Build a dual-stack network. Enable BGP in the core.
Redistribute EBGP routes into IGP.
B.    Use MPLS 6PE to simplify the operation and keep a BGP-free core.
When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
C.    Use MPLS 6VPE to simplify the operation and keep a BGP-free core.
When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.
D.    Prepare the dual-stack infrastructure from the beginning, even if BGP prefixes would have to be announced via IPv4 in case you decide to maintain the BGP-free core.

Answer: BD

QUESTION 302
A Service Provider network designer is considering the use of the G.8032 Ethernet Ring Protection mechanism in order to provide resiliency in the network.
Which three concepts will be supported with the implementation G.8032? (Choose three.)

A.    Ring Protection Link (RPL)
B.    Ring Automatic Protection Switching (R-APS)
C.    Multi-Router Automatic Protection Switching (MR-APS)
D.    Automatic Protection Switching (APS) Channel

Answer: ABD

QUESTION 303
Which two headend router scalability factors should be considered when designing a DMVPN network solution that uses a hub-and-spoke topology? (Choose two.)

A.    the required aggregated packet per second
B.    the amount of bandwidth necessary to terminate all the remote tunnels
C.    the routing protocol chosen for the data plane routing
D.    the maximum number of tunnels supported by the headend router
E.    the CPU and memory of the headend router

Answer: AD

QUESTION 304
The Service Provider you work for wants to deploy CoS functionality on the P routers of the MPLS core, to provide a complete CoS solution to all customers that purchase services such as dedicated Internet access, MPLS Layer 3 VPN, and Layer 2 VPN (pseudowire).
The design requirements are:

– The network supports four service queues with equal treatment for delay, jitter, and packet loss.
– Queues are numbered 0-3, where 0 is the default queue.
– Three queues have one treatment, whereas the other queue has either one or two treatments.
– The Service Provider manages control traffic, whereas the customers manage business critical and best effort.

Which two statements could you recommend to allow for the appropriate level of bandwidth allocation? (Choose two.)

A.    Control plane 10%, Real Time 30%, Business Critical 40%, Best Effort 20%
B.    Control plane 80%. Real Time 10%, Business Critical 5%, Best Effort 5%
C.    Control plane 90%, Real Time 5%, Business Critical 5%, Best Effort 0%
D.    Control plane 20%, Real Time 40%, Business Critical 30%, Best Effort 10%

Answer: AD

QUESTION 305
A customer wants to understand the benefits of a proposed network design that utilizes SNMPv3. Which two network threats is SNMPv3 effective against? (Choose two.)

A.    modification of information threats
B.    masquerade threats
C.    denial of service threats
D.    traffic analysis threats

Answer: AB

QUESTION 306
Which two statements describe how including Cisco IPoDWDM proactive protection in an optical design would minimize packet loss in the event of a fiber cut? (Choose two).

A.    It uses the FEC field on the OTN frame to trigger protection.
B.    It uses a “not to exceed” predefined BER threshold to cause traffic redirection.
C.    It reroutes the optical circuit after an event that impacts service.
D.    It is effective both when you have redundant and nonredundant Layer 3 MPLS paths.

Answer: AB

QUESTION 307
To improve the stability of a global network, you have been tasked with changing the design to include link-state topology summarization.
What are two issues that you should address as part of the design? (Choose two.)

A.    slow convergence
B.    suboptimal routing
C.    traffic black-holing
D.    packet reordering

Answer: BC

QUESTION 308
Refer to the exhibit. Four customer sites are connected through an EoMPLS-based VPLS over an MPLS provider. You are migrating from OSPF to multi-level IS-IS as the routing protocol to run on the four CE routers, and connectivity between all four sites is required.
You want to control which CE or CEs will be elected as the Designated Intermediate System.
Which two key aspects should be taken into account? (Choose two.)

 

A.    The DIS role for Level1 and Level2 can be performed by different routers.
B.    The CE with the second highest priority will be elected as the backup DIS on the LAN segment.
C.    One of the CE routers will be elected as the DIS based on interface priority then highest MAC address.
D.    It is recommended to use point-to-point link type on the CEs.
E.    If a new CE router is added to the VPLS cloud with a lower interface priority it will become the DIS.

Answer: AC

QUESTION 309
The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design.
Which three options about the Overload Bit are true? (Choose three.)

A.    It is not recommended on BGP route reflectors.
B.    It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable.
C.    It can be set on a router during the startup process for a fixed period of time.
D.    It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.
E.    It can be set on a router until other interacting protocols have signaled convergence.

Answer: BCE

QUESTION 310
You are working on a network design for Customer A. This design should consider fast convergence features, and it was agreed that BFD should be used for faster link-transition detection.
Which three options apply to the use of the echo function in BFD? (Choose three.)

A.    It can be used with asynchronous mode.
B.    BFD control packets are not required.
C.    It can be enabled individually in each direction.
D.    It has the advantage of testing the forwarding path on the remote system.
E.    The rate of periodic transmission of BFD control packets should be increased.

Answer: ACD

QUESTION 311
Refer to the exhibit. Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged.
Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.)

 

A.    Enable mutual redistribution between OSPF and RIP on one border router.
B.    Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags.
C.    Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router B.
D.    Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database.
E.    Filter external routes on Router A and Router B based on route tags.

Answer: BCE

QUESTION 312
You are designing a core MPLS-based network with a single OSPF area with no external routes. Which two mechanisms can be used to improve convergence time during a failure? (Choose two.)

A.    incremental SPF
B.    route filtering
C.    graceful restart
D.    BFD

Answer: AD

QUESTION 313
Which three factors slow down network convergence? (Choose three.)

A.    constant interface flapping
B.    lack of redundant paths
C.    inconsistent topology states between routers
D.    transport network failing to generate LoS
E.    wrong summarization in ABRs

Answer: ACD

QUESTION 314
Refer to the exhibit. Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.)

 

A.    PVRSTP on all switches
B.    REP on all switches
C.    MST on all switches
D.    BPDU guard on Switch A and Switch D
E.    8032 on ring A-B-C-D

Answer: BE

QUESTION 315
Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)

A.    The firewall acts like a router hop in the network.
B.    OSPF adjacencies can be established through the firewall.
C.    Changes in the existing IP addressing and subnets are required.
D.    Multicast traffic can traverse the firewall.
E.    The firewall can participate actively on spanning tree.

Answer: BD

QUESTION 316
Refer to the exhibit. Service Provider A and Service Provider B have agreed to a strategic interconnect relationship that will allow them access into each other’s geographies by using an inter-AS eBGP VPNv4 multihop between route reflectors.
Which two options will accomplish this scenario? (Choose two.)

 

A.    RR 1 and RR 2 peer using multihop eBGP VPNv4 to exchange prefixes.
B.    ASBR 1 and ASBR 2 act as inline route reflectors that set themselves as the next-hop.
C.    An LSP is formed between ASBR 1 and ASBR 2 using eBGP IPv4.
D.    An LSP is formed between ASBR 1 and ASBR 2 using eBGP VPNv4.
E.    RR 1 and RR 2 peer using multihop eBGP IPv4 to exchange prefixes.

Answer: AC

QUESTION 317
You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication.
Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

A.    EoMPLS
B.    DWDM
C.    Multichassis EtherChannel over Pseudowire
D.    OTV
E.    VPLS
F.    SONET/SDH

Answer: BF

QUESTION 318
You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS.
Which two interconnect technologies support MACsec? (Choose two.)

A.    EoMPLS
B.    MPLS Layer 3 VPN
C.    DMVPN
D.    OTV
E.    VPLS
F.    GET VPN

Answer: AE

QUESTION 319
You need to redesign your NMS system so that it can collect information without causing adverse effects in the network, such as high CPU utilization on network devices and network instability. Which two options will minimize the impact of the trusted NMS polling your network in this situation? (Choose two.)

A.    Implement SNMP community restrictions that are associated with an ACL.
B.    Unload unused MIBs from the network devices.
C.    Prevent polling of large tables through the use of SNMP OID restrictions.
D.    Disable unused OIDs and MIBs on the NMS systems.

Answer: CD

QUESTION 320
Refer to the exhibit. This new OSPF network has four areas, but the hub-and-spoke area experiences frequent flapping. You must fix this design failure.
Which two mechanisms can you use to isolate the data center area from the hub-and-spoke area without losing IP connectivity? (Choose two.)

 

A.    Make the DC area totally stub.
B.    Make the DC area an NSSA.
C.    Convert the DC area to EIGRP protocol.
D.    Deploy a prefix summarization on router D.
E.    Use OSPF distribute-list filtering on router A.

Answer: AD

Lead2pass.com has been the world leader in providing online training solutions for 352-001 Certification. You use our training materials that have been rigorously tested by international experts.

352-001 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDaUphM0lMOWRjUU0

2017 Cisco 352-001 exam dumps (All 510 Q&As) from Lead2pass:

https://www.lead2pass.com/352-001.html [100% Exam Pass Guaranteed]

Lead2pass Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99-$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back