★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 352-001 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/352-001-dumps.html


Benefits of Cisco 352-001: Any 352-001 accreditation for Cisco present you with the possible ways to be employed in any part around the world as it would be known evenly overall areas. That not just helps your talent and data yet helps you to develop your job. Cisco 352-001 certification provides each possible ways to create trained and better by using most solutions underneath various problems.

2021 Oct 352-001 cisco:

Q151. A network designer wants to improve a company network design due to multiple network crashes. Which technology would allow for the restore of a network connection without informing the Layer 3 protocol? 

A. Bidirectional Forwarding Detection 

B. automatic protection switching 

C. UniDirectional Link Detection 

D. Ethernet OAM 

Answer: B 


Q152. An IBGP mesh design is being scoped, and in the discussions, one of the design engineers proposes the use of route reflectors. Which limitation is valid when using route reflectors in this design? 

A. The configuration complexity on the routers will be increased. 

B. Route reflectors will limit the total number of routes in the topology. 

C. Multipath information is difficult to propagate in a route reflector topology. 

D. Route reflectors will cause an opportunity to create routing loops. 

Answer: C 


Q153. Refer to the exhibit. 


You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.) 

A. When router B fragments packets after the encryption, router C must reassemble these fragmented packets. 

B. When router B fragments packets before the encryption, router C must reassemble these fragmented packets. 

C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets. 

D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets. 

E. When router A fragments packets, router C must reassemble these fragmented packets. 

F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets. 

Answer: ADF 


Q154. Refer to the exhibit. 


Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration? (Choose two.) 

A. PVRSTP on all switches 

B. REP on all switches 

C. MST on all switches 

D. BPDU guard on Switch A and Switch D 

E. 8032 on ring A-B-C-D 

Answer: BE 


Q155. A metro service provider is planning Resilient Ethernet Protocol for his backbone. Which two aspects must be considered before the network design is finalized? (Choose two.) 

A. Two Resilient Ethernet Protocol segments can be connected redundantly at two points. One connection will be blocked, using the Spanning Tree Protocol defined in IEEE 802.1D. 

B. UniDirectional Link Detection Protocol can be enabled on Resilient Ethernet Protocol interfaces to detect unidirectional failures. 

C. The guaranteed convergence recovery time is less than 50 ms for the local segment. 

D. A Resilient Ethernet Protocol segment is limited to a maximum of seven devices. 

E. VLAN load balancing for optimal bandwidth usage is supported in any Resilient Ethernet Protocol segment. 

Answer: BE 


352-001 real exam

Down to date 352-001 actual test:

Q156. A green data center is being deployed and a design requirement is to be able to readily scale server virtualization. Which IETF standard technology can provide this requirement? 

A. Transparent Interconnection of Lots of Links 

B. fabric path 

C. data center bridging 

D. unified fabric 

Answer: A 


Q157. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements: 

The network supports four service queues with equal treatment for delay, jitter, and packet loss. 

Queues are numbered 0-3, where 0 is the default queue. 

Three queues have one treatment. 

One queue has either one or two treatments. 

How would you design your solution to map the DSCP value properly so that the traffic is assigned to the respective queues in the Service Provider XYZ MPLS core network? 

A. Classify traffic according to DSCP value into appropriate P router queues. 

B. Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS P routers. 

C. Map the appropriate DSCP value into the EXP field based on the number of queues in the MPLS PE routers. 

D. Based on the DSCP value, traffic is mapped automatically into appropriate queues in the MPLS CE routers. 

Answer: C 


Q158. What is a key benefit of a layered network design? 

A. cost savings 

B. increased security 

C. increased flexibility 

D. decreased broadcast 

Answer: C 


Q159. Refer to the exhibit. 


You are designing a loop-free hierarchical VPLS service. Which two design considerations should be implemented for the pseudowires between the N-PE and U-PE routers? (Choose two.) 

A. Disable split horizon toward the N-PE routers. 

B. Disable split horizon toward the U-PE router. 

C. Enable split horizon toward the U-PE router. 

D. Enable split horizon toward the N-PE routers. 

E. Disable MAC learning on the U-PE route. 

F. Disable MAC learning on the N-PE routers. 

Answer: BD 


Q160. Which technique can you use to detect forwarding path failures at a uniform rate, and reconvergence times will be consistent and predictable when your routers are in the same broadcast domain? 

A. Enable BFD on your routers. 

B. Configure your routers with IP-SLA to ping the peer router. 

C. Configure your routers with IP-SLA and track to ping the peer and switch to a default route if the pings fail. 

D. Tune your routing protocol timers. 

Answer: A