Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

352-011 Exam Dumps - Cisco Certified Design Expert Practical Exam

Question # 4

Drag the fast Reroute mechanism on the left and drop it onto the corresponding routing protocol on the right

Full Access
Question # 5

You are redesigning a single-level IS-IS network with 500 routers, which have short-haul and long-haul links Most of the time the routing domain is stable, but periodically interfaces on long-haul links bounce for a short period of time , causing 10 to 20 flaps in a few minutes. The probable cause is local road construction. Although fast convergence important, the client has concerns about taxing CPU cycles on the older routing platforms. What change should you recommend that both protects the CPU of the older routers during the short periods of excessive flapping, yet does not have an impact on fast convergence for all interface failures?

A.

Modify hello timers on routers with short-haul links

B.

Implement LSP generation throttling on routers with long-haul links

C.

Modify the length of time than an LSP remains in the router database without being refreshed on all routers

D.

Implement a delay between successive IS-IS LSP packet transmissions on routers with long-haul links

Full Access
Question # 6

What is an implication of using route reflectors in an iBGP topology?

A.

Route reflection limits the total number of iBGP routers.

B.

Route reflection causes traffic to flow in a hub-and-spoke fashion.

C.

The manipulation of BGP attributes is not supported on the other routers than the route reflectors.

D.

Route reflectors can create routing loops when more than one router reflector is used in the same cluster.

E.

Multipath information is difficult to propagate in a route reflector topology.

Full Access
Question # 7

Which native mechanism does OSPF use to prevent loops in MPLS VPNs?

A.

CE devices that run OSPF set the DN bit toward the PE router

B.

PE devices that run OSPF clear the DN bit toward the CE router

C.

CE devices that run OSPF clear the DN bit toward the PE router

D.

Creation of PE to PE OSPF sham link across the MPLS-created super backbone

E.

PE routers verify OSPF domain IDs used by CE OSPF processes

F.

PE devices that run OSPF set the DN bit toward the CE router

Full Access
Question # 8

Which two statements about VXLAN are true? (Choose two)

A.

VXLAN is a Cisco proprietary solution

B.

VXLAN is an encapsulation method used to create a Layer 3 overlay network

C.

VXLAN can be used to enforce Layer 2 isolation in a multitenant infrastructure

D.

VXLAN uses the Spanning Tree protocol for loop prevention

E.

VXLAN overcomes the 802.1Q virtual LAN address space limitation

Full Access
Question # 9

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Full Access
Question # 10

Which two options must be part of your network design to support dynamic mutual redistribution between multiple OSPFv2 and IS-IS boundaries, to avoid suboptimal routing? (Choose two)

A.

Matching OSPF external routes

B.

Route aggregation

C.

Route tagging

D.

Route filtering

E.

Disabling IS-IS wide metrics

Full Access
Question # 11

You are hired to assist an enterprise customer to design their global WAN network. A protected DWDM circuit with disjoint fiber routes and guaranteed restoration times is ordered to connect two hub sites. Which option is a BFD design consideration in relation to protected DWDM?

A.

BFD failure detection must be faster than DWDM restoration time

B.

The BFD hello timer must match the DWDM circuit restoration time

C.

BFD failure detection must be longer than DWDM restoration time

D.

BFD cannot be used with protected DWDM

Full Access
Question # 12

Which two foundational aspects of loT are still evolving and being worked on by the industry at large? (Choose two)

A.

Regulatory domains

B.

loT consortia

C.

Standards

D.

Low energy Bluetooth sensors

E.

WiFi protocols

Full Access
Question # 13

Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement?

A.

Modular QoS CLI

B.

committed access Rate

C.

policy-based routing

D.

traffic shaping

Full Access
Question # 14

ACME Corporation is integrating IPv6 into their network, which relies heavily on multicast distribution of data. Which two IPv6 integration technologies support IPv6 multicast? (Choose two.)

A.

6VPE

B.

6PE

C.

dual stack

D.

ISATAP

E.

6to4

F.

IPv6INIP

Full Access
Question # 15

In an OSPF network, users in a particular OSPF non-backbone area are complaining about show access speeds to a shared corporate resource in another OSPF area. Traceroutes show that the users are taking a suboptimal default route to the destinations. Which solution will improve access speed?

A.

Make the area totally stubby so that the default can be followed along the best path

B.

Create a virtual link between the areas so that traffic can shortcut directly between them

C.

Leak specific summaries on the ABRs for the remote subnets in addition to the default

D.

Implement policy routing to channel the traffic in the optimal direction

Full Access
Question # 16

Which mechanism does OSPF use to prevent loops in an MPLS Layer 3 VPNS environment?

A.

Sham link

B.

Down bit

C.

P-Bit

D.

Domain ID

E.

Routing bit

Full Access
Question # 17

Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two)

A.

WRED drop treatment

B.

Small transactions (HTTP – like behavior)

C.

Tolerance to packet loss

D.

Intolerance to jitter

E.

TCP based application

Full Access
Question # 18

Which two functions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)

A.

Fast transport

B.

QoS classification and marking boundary

C.

Fault isolation

D.

Redundancy and load balancing

E.

Reliability

Full Access
Question # 19

Full Access
Question # 20

Which load balancing option for IP-only traffic is the least efficient in terms of EtherChannel physical links utilization?

A.

On a per source IP address basis

B.

On a per destination MAC address basis

C.

On a per destination IP address basis

D.

On a per port number basis

Full Access
Question # 21

Which three network management requirements are common practices in network design? (Choose three)

A.

Ensure that all network devices have their clocks synchronized.

B.

Collect SNMP poll information for future regression analysis.

C.

Capture both ingress and egress flow-based packets, while avoiding duplication of flows.

D.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.

E.

Validate data plane health, and application and services availability, with synthetic traffic.

Full Access
Question # 22

What is a design benefit of PortFast?

A.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

B.

PortFast disables spanning-tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

Portfast does not generate a spanning-tree topology change when a station on a port is connected or disconnected

D.

PortFast detects one-way communications on the physical port, when prevents switch loops

E.

PortFast prevents switched traffic from traversing suboptimal paths on the network

F.

PortFast prevents switch loops that are caused by a unidirectional point-to-point link condition on Rapid PVST+ and MST

Full Access
Question # 23

Drag and drop the Fast ReRoute mechanisms on the left to the correct routing protocols on the right. Not all options are used.

Full Access
Question # 24

A company would like to distribute a virtual machine (VM) hosting cluster between three data centers with the capability to move VMs between sites. The connectivity between data centers is IP only and the new design should use the existing WAN. Which Layer 2 tunneling technology do you recommend?

A.

AToM

B.

L2TPv3

C.

OTV

D.

VPLS

Full Access
Question # 25

You are designing an IPv4 any source multicast redundancy solution. Which technology ensures the quickest RP convergence?

A.

Bootstrap router

B.

MSDP anycast RP

C.

Auto-RP

D.

Embedded RP

Full Access
Question # 26

What are two benefits of following a structured hierarchical and modular design? (Choose two.)

A.

Each component can be designed independently for its role.

B.

Each component can be managed independently based on its role.

C.

Each component can be funded by different organizations based on its role.

D.

Each component can support multiple roles based on the requirements.

E.

Each component can provide redundancy for applications and services.

Full Access
Question # 27

Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two)

A.

The Reported Distance from a successor is lower than the local Feasible Distance

B.

The Reported Distance from a successor is higher than the local Feasible Distance

C.

A feasible successor must be present

D.

The feasible Distance from a successor is lower than the local Reported Distance

E.

The feasibility condition do not need to be met

Full Access
Question # 28

When designing a network .Which method can be used to control the exit point for traffic an autonomous system, at the layer 3 control plane?

A.

Prepending AS path.

B.

Tuning the multi-exit discriminator.

C.

Setting the site of Origin extended community.

D.

Tuning the metric of the under-tying IGP.

Full Access
Question # 29

You are designing a WAN network solution with EIGRP based on VPLS. The interface speed is 10Mb/s, but the access rate of the WAN connection is 256 Kb/s. What should you include in the network design, in order to avoid potential issues with EIGRP?

A.

Limit EIGRP traffic to the access rate with a policer.

B.

Tag outbound EIGRP traffic and have the WAN provider add it to the priority queue.

C.

Limit traffic to the access rate with interface traffic shaping.

D.

Set the interface bandwidth to match the access rate.

Full Access
Question # 30

As a part of a network design, you should tighten security to prevent man-in-the-middle. Which two security options ensure that authorized ARP responses take place according to know IP-to-MAC address mapping? (Choose two)

A.

DHCP snooping

B.

ARP spoofing

C.

ARP rate limiting

D.

Dynamic ARP Inspection

E.

Port security

Full Access
Question # 31

What two options are significant drivers for 5G in IoT networks? (Choose two)

A.

Energy Efficiency

B.

Lower Latency

C.

Mass Connectivity

D.

Programmability

E.

Higher data rates

Full Access
Question # 32

A Mobile Service Provider would like to design and deploy an Ethernet service which has similar physical link failover/failback characteristics on the active/backup links as the APS/MSP SONET properties. Which Layer 2 service addresses should be considered to address this design feature?

A.

Port-Channel

B.

MLPPP

C.

Flex Link

D.

Ethernet Pseudowire

Full Access
Question # 33

Which MPLS attribute is required for links to carry a given MPLSTE tunnel?

A.

TE tunnel destination address

B.

Tunnel path-selection metric

C.

Affinity

D.

Next-hop backup tunnel

Full Access
Question # 34

Refer to the exhibit

company xyz has 150 branch location across the U.S. Each branch is connected to two aggregation router one router in each data center The network is configured with Multiple OSPF with multiple OSPF areas and the aggregation router are ABRs A requirement is to keep an optimal path to the data centers and at the same time reduce the LSA propagation and SPF recomputation during a change in any part of the network

Which design elements should be included on the aggregation router?

A.

OSPF NSSA

B.

distribute lists

C.

OSPF summarization

D.

OSPF totally stubby area

Full Access
Question # 35

Which two options are reasons for designing a large OSPF network with multiple areas connected to the backbone? (Choose two)

A.

Reduce the number of routes within an area

B.

Route tagging capability

C.

Simplify logical topology

D.

Enhance failure detection

E.

Reduce SPF algorithm runs

Full Access
Question # 36

Full Access
Question # 37

Refer to the exhibit.

Assume that no multicast optimization is done on LAN switches A and B. Which two features can be used to optimize multicast traffic forwarding in this situation? (Choose two.)

A.

Enable IGMP snooping querier on both switches.

B.

Configure a static MAC entry for the multicast server.

C.

Disable IGMP snooping on both switches.

D.

Disable the IGMP query election process.

E.

Enable PIM snooping on both switches.

Full Access