This page was exported from Best Free Exam Guide [ http://free.exams4sures.com ] Export date:Fri Mar 14 21:17:05 2025 / +0000 GMT ___________________________________________________ Title: 2022 352-001 Dumps PDF - 352-001 Real Exam Questions Answers [Q113-Q137] --------------------------------------------------- 2022 352-001 Dumps PDF - 352-001 Real Exam Questions Answers Valid 352-001 Test Answers & Cisco 352-001 Exam PDF 352-001 Exam topics Candidates must know the exam topics before they start of preparation. Because it will really help them in hitting the core. Our 352-001 exam dumps will include the following topics: Layer 2 Control Plane 24%Evolving Technologies v1.1 10%Network Virtualization 15%Design Considerations 18%Layer 3 Control Plane 33%   NEW QUESTION 113Refer to the exhibit.A service provider would like to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP-SW2. In which two of these ways can you design this solution? (Choose two.)  Enable Y.1731 Connectivity Fault Management on the SP switches.  E-LMI PDUs must be forwarded over VPLS.  Cisco Discovery Protocol PDUs must be forwarded over the VPLS.  Use upward maintenance endpoints on the SP switches.  Enable IEEE 802.1ag Connectivity Fault Management on the SP switches. NEW QUESTION 114You are designing the QoS features for a large enterprise network that includes DMVPN. When would you need to configure QoS preclassify?  when you are marking packets with the DSCP bits  when you are marking packets with the TOS bits  when your service provider requires the DSCP bits be set  when the QoS policy cannot be based on DSCP ToS bits NEW QUESTION 115What is the most common IoT threat vector?  Attacks against programming errors in IoT devices  Insertion of invalid inputs that cause denial of service  Physical access to IoT devices that are installed in non-secure locations  Human error and social engineering to access supervisory control systems. NEW QUESTION 116A company wants to use SSM as the multicast routing protocol inside its network. Some of its multicast applications do not support IGMPv3. In which two ways can the mapping be done when these applications send IGMPv2 join messages? (Choose two.)  The Layer 2 switches can send a request to a DNS server.  The Layer 3 multicast routers can send a request to a DNS server.  The mapping can be done statically at the Layer 2 switches.  The mapping can be done statically at the Layer 3 multicast routers.  The Layer 2 switches can transform the IGMPv2 join to an IGMPv3lite join.  The Layer 3 multicast routers can transform the IGMPv2 join to an IGMPv3lite join. NEW QUESTION 117Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the “trusted” interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?  inside global  outside global  inside local  outside local NEW QUESTION 118You are designing a FabricPath network that connects to a spine-and-leaf topology using layer 2 IS-IS as the IGP. The solution should be able to detect changes in the network topology and calculate loop-free paths to other nodes in the network that are being used as top-of-rack switches. Which four options are characteristics of this FabricPath design solution? (Choose 4)  The FabricPath domain should be replaced because it does not run STP.  The switch operating system uses multiple equal-cost, parallel links that provide ECMP.  To use the basic FabricPath functionality, you must configure IS-IS on every interface between the leaf-and-spine switches.  FabricPath Layer 2 IS-IS uses the standard IS-IS functionality to populate up to 16 routes for a given destination switch.  This path is used for forwarding unicast Fabricpath frames.  Each switch computes its shortest path to every other switch in the network using theSPF algorithm.  The interfaces in a FabricPath network run only the FabricPath Layer 2 IS-IS protocol with FTags disabled. NEW QUESTION 119Flex Links are a pair of a Layer 2 interfaces (switchports or port channels), where one interface is configured to act as a backup to the other. Which two statements are correct regarding Flex Links?  An interface can only belong to single Flex Links.  An interface can belong to multiple Flex Links.  Flex Links operate only over single pairs of links.  Flex Links automatically disable STP so no BPDUs are propagated. Section: (none)Explanation/Reference:NEW QUESTION 120Refer to the exhibit,Which two design considerations should be implemented on the pseudowire between N-PE and U-PE routers for a loop-free hierarchical VPLS service? (Choose two)  Disable split horizon towards the U-PE router.  Disable MAC learning on the U-PE router.  Enable split horizon towards the N-PE routers.  Disable MAC learning on the U-PE routers.  Disable MAC learning on the U-PE routers.  Enable split horizon towards the U-PE routers.  Disable split horizon toward the N-PE routers. NEW QUESTION 121What are three key design principles when using a classic hierarchical network model? (Choose three.)  The core layer controls access to resources for security.  The core layer should be configured with minimal complexity.  The core layer is designed first, followed by the distribution layer and then the access layer.  A hierarchical network design model aids fault isolation.  The core layer provides server access in a small campus.  A hierarchical network design facilitates changes. NEW QUESTION 122A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection?  IP addresses of the GRE tunnel endpoints  IPsec configuration  MTU size on the GRE tunnel  encapsulation of the GRE tunnel NEW QUESTION 123You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality onthe core MPLS network (P routers). The goal of the network design is to provide a complete CoSsolution to all customers that purchase services such as dedicated Internet access, MPLS L3VPN,and L2VPN (pseudowire). Service Provider XYZ has these design requirements:-The network supports four service queues with equal treatment for delay, jitter, and packet loss.-Queues are numbered 0-3, where 0 is the default queue.-Three queues have one treatment.-One queue has either one or two treatments.If your design includes eight CoS queues on the Service Provider XYZ MPLS PE router ingress(CE facing) interface, how will customer traffic be classified as it enters the MLS P routers?  The eight CoS queues in the MPLS P router are remapped to the eight CoS queues.  Traffic is classified on the MPLS PE routers on core facing interface. The DSCP value is mapped into EXP field where multiple EXP settings (2+) will be assigned to a single queue throughout the MPLS P routers.  Discard the traffic from the eight CoS queues that does not match the four CoS queues of the MPLS P routers.  The 8 CoS queues in the MPLS P router are remapped to four 4 flow-label queues. NEW QUESTION 124You are redesigning an OSPF v2 network and must migrate some links. You are concerned that there are different subnet masks. Which two link types will still form an OSPF adjacency even if there are subnet mask mismatches? (Choose two.)  virtual  broadcast  point-to-multipoint  non-broadcast  point-to-point NEW QUESTION 125You are designing an IPv4 any source multicast redundancy solution. Which technology ensures the quickest RP convergence?  Auto-RP  Embedded RP  bootstrap router  MSDP anycast RP NEW QUESTION 126An enterprise company has an audit requirement to encrypt traffic between selected development teams. Those teams are located in multiple sites across the country. They must migrate all locations to an MPLS Layer 3 VPN-based service, but this implementations must not impact the VoIP traffic to and from the call centre sites must be copied to the data center servers so that it is recorded to meet another audit requirement, which solution meets these requirements?  Implement a DMVON-based solution encrypting all traffic expect the VoIP traffic  Implement site-to-site GRE tunnels only for development traffic.  Implement LISP-based tunnel for the development traffic.  Implement GETVPN with selective encryption only for the development traffic NEW QUESTION 127What are three key design principles when using a classic hierarchical network model? (Choose three.)  The core layer controls access to resources for security.  The core layer should be configured with minimal complexity.  The core layer is designed first, followed by the distribution layer and then the access layer.  A hierarchical network design model aids fault isolation.  The core layer provides server access in a small campus.  A hierarchical network design facilitates changes. NEW QUESTION 128Refer to the exhibit.RTR 1 uses RTR 2 as the primary WAN exit point. When a failure occurs in the link connected to RTR 2 LAN, it takes about 40 seconds for RTR 1 to use the backup path viaRTR 3.Which two mechanisms can be used independently to improve the failure detection time to1 second or less when RTR 1 failover to RTR3? (Choose two.)  Configure EEM on RTR 2.  Change OSPF throttling timer.  Use BFD with OSPF between RTR 1 and RTR 2.  Use BFD with OSPF between RTR 2 and RTR 3.  Tune OSPF fast hello on all the routers. NEW QUESTION 129An ISP provides VoIP and internet services to its customers. For security reasons, these services must be transported in different MPLS Layer 3 VPNs over the ISP core network. The customer CEs do not have the ability to segment the services using different VLANs and have only one uplink interface that does not support VLAN tagging. How should you design the network to ensure that VoIP traffic that is received from the CE goes in the VoIP VPN, and that Internet traffic goes into the Internet VPN on the ISP PE devices?  Use a secondary interface IP address to differentiate between VoIP and Internet traffic  Extend the Layer 3 VPN toward the CE  Enable NBAR on the PE to direct the traffic into the correct VRF  Use a subinterface on the PE for each service, VoIP and Internet, with different subnets  Use policy-based routing to direct traffic into the correct VRF NEW QUESTION 130AS100 and AS200 each have two peering points in different parts of their network. AS100 would65like to use one of the links and keep the other link as backup. What should be changed for the design inside AS100 for prefixes received from AS200?  MED  weight  AS-PATH  local preference Explanation/Reference:Explanation:NEW QUESTION 131You are designing an Out of Band Cisco Network Admission Control, Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be trunked back to the Clean Access Server from the access switch?  untrusted VLAN  user VLAN  management VLAN  authentication VLAN NEW QUESTION 132A company is planning to connect its 30 sites with a VPLS WAN backbone. A router ateach site should establish neighborships with all other routers using the OSPF routing protocol. Which three points must be considered regarding DR and BDR when different router platforms are used? (Choose three.)  It is a best practice that the routers with the most powerful hardware should take the role of the DR and BDR.  If the IP OSPF priority is the same for all routers, the highest loopback IP address and router ID will decide which routers will take the DR and BDR role during the selection process.  To select the DR and BDR, the IP OSPF priority must be set to a higher value than the default value at the DR and BDR during the selection process.  To select the DR and BDR, the IP OSPF priority must be set to a lower value than the default value at the DR and BDR during the selection process.  The role for the DR and BDR will be selected when a new OSPF router comes up.  To force two routers to become a DR and a BDR, the IP OSPF priority can be set to zero at all other OSPF routers. NEW QUESTION 133A switched network is being designed to support a manufacturing factory. Due to cost constraints, fiber- based connectivity is not an option. Which design allows for a stable network when there is a risk of interference from the manufacturing hardware in use on the factory floor?  Design the network to include UDLD to detect unidirectional links and take them out of service.  Design the network to include EtherChannel bundles to prevent a single-link failure from taking down a switch interconnection point.  Design the network to include loop guard to prevent a loop in the switched network when a link has too much interference.  Design the network to include BackboneFast on all devices to accelerate failure convergence times. Explanation/Reference:given answer is suitable.NEW QUESTION 134You are evaluating convergence characteristics of various interior gateway protocols for a new network design. Which technology allows link-state routing protocols to calculate paths to destination prefixes that are functionally similar to feasible successors in Enhanced Interior Gateway Routing Protocol?  Incremental Shortest Path First  Cisco Multiprotocol Label Switching Traffic Engineering Fast Reroute  Loop-Free Alternate Fast Reroute  partial route calculation  Fast-Flooding NEW QUESTION 135You are creating a network design that will influence the traffic path across the MPLS core on a virtual private LAN. Which parameter is included in your design to manage the traffic?  Deploy MPLS traffic engineering and modify the path using the preferred path.  Deploy MPLS traffic engineering and modify the path using auto-route, static routing, or PBR.  Create an MPLS traffic engineering tunnel and modify the path using a static route.  Create an MPLS traffic engineering tunnel and modify the path using auto-route announce. NEW QUESTION 136Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data?  IPFIX  NETFLOW  RMON  IPFLOW  NBAR Explanation/Reference:IPFIX is only one which is an IETF StandardNEW QUESTION 137DRAG DROP  Loading … Cisco 352-001 Exam Syllabus Topics: TopicDetailsTopic 1Tunnelling Parameter Optimization Of End-User Applications, Endpoint Selection, Technology SelectionTopic 2Tunnelling Parameter Optimization Of End-User Applications Analyze The Implementation Of TunnellingTopic 3Describe The Effect Of Fault Isolation And Resiliency On Network Design Or Network ReliabilityTopic 4Automation And Orchestration Tools (Cloudcenter, Cisco DNA-Center, And Kubernetes) Infrastructure, Platform, And Software As A Service (Xaas)Topic 5Describe Layer 2 And Layer 3 Tunnelling Technologies Tunnelling Endpoint SelectionTopic 6Tunnelling For Traffic Optimization, For Protocol Integration, For Network Extension Network Programmability (SDN)Topic 7Describe Route Aggregation Concepts And Techniques Determine Aggregation Location And Techniques Metrics To Modify Traffic FlowTopic 8Describe Tools And Technologies For IEEE 802.11 Wireless Deployment Describe Tools And Technologies For Identity ManagementTopic 9Routing Protocol Selection And Tuning For Tunnels Describe Layer 2 And Layer 3 Tunnelling TechnologiesTopic 10Tunnelling For Traffic Optimization, For Resiliency, For Network Extension, For Protocol IntegrationTopic 11Compare And Contrast Public, Private, Hybrid, And Multicloud Design Considerations Security Implications, Compliance, And PolicyTopic 12Describe Fast Convergence Techniques And Mechanisms Spanning Tree Tuning Techniques Loop Detection And MitigationTopic 13Describe Best Practices For Protecting Network Infrastructure Describe Best Practices For Protecting Network ServicesTopic 14Identify Network Application Reporting Requirements Describe Technologies, Tools, And Protocols That Are Used For Network ManagementTopic 15Describe Architectural And Operational Considerations For A Programmable Network Connectivity (Virtual Switches, SD-WAN And SD-Access)Topic 16Describe The Effect Of Transport Mechanisms And Their Interaction With Routing Protocols Over Different Types Of LinksTopic 17Describe The Effect Of Fault Isolation And Resiliency On Network Design Describe Loop Detection And Mitigation ProtocolsTopic 18Identify Network Management Requirements Describe Tools And Technologies For SAN Fabric DeploymentTopic 19Describe Mechanisms That Are Available For Creating Loop-Free Topologies Describe Multicast Routing ConceptsTopic 20Configuration Management Tools (Agent And Agentless) And Version Control Systems (Git And SVN) Compute Virtualization (Containers And Virtual Machines)Topic 21Routing Protocol Selection And Tuning For Tunnels, Analyze The Implementation Of TunnellingTopic 22Describe The Theory And Application Of Network Topology Layering Describe The Theory And Application Of Network Topology Abstraction   352-001 Exam Dumps - PDF Questions and Testing Engine: https://www.exams4sures.com/Cisco/352-001-practice-exam-dumps.html --------------------------------------------------- Images: https://free.exams4sures.com/wp-content/plugins/watu/loading.gif https://free.exams4sures.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-06-27 17:44:44 Post date GMT: 2022-06-27 17:44:44 Post modified date: 2022-06-27 17:44:44 Post modified date GMT: 2022-06-27 17:44:44