Free of 352-001 free exam materials and ebook for Cisco certification for IT examinee, Real Success Guaranteed with Updated 352-001 pdf dumps vce Materials. 100% PASS CCDE Written Exam exam Today!
Q71. Which option is a BFD design consideration?
A. BFD should not be used with RSVP-TE backup tunnels.
B. BFD echo mode may reduce convergence time.
C. BFD does not support sessions over MPLS LSPs.
D. BFD is supported on indirectly connected peers.
Q72. Your company is designing a service provider network management solution in which customers are billed for 95th percentile network utilization. The service provider requires that an IETF standard be utilized to collect the data. Which method should be used to collect the data?
Q73. Your design client has requested that you ensure that the client devices are not dynamically configured with incorrect DNS information. When finalizing the network design, which security option must be configured on the switches?
A. IGMP snooping
B. DHCP snooping
C. root guard
D. DNS snooping
Q74. Tesla Radio GmbH is going to build a new research lab network based on a set of switches that would connect to their existing enterprise network. They are considering a design that would guarantee loop-free behavior within the set of switches. The design would also allow the group of switches to seem like a single switch to the enterprise network, because it is owned by a separate administrative group. Which Spanning Tree Protocol should be used to support the design requirements?
A. IEEE 802.1w
B. IEEE 802.1D
C. IEEE 802.1s
D. IEEE 802.1p
Q75. In which two ways is IPv4 and IPv6 traffic handled in a network design that uses QoS deployment options? (Choose two.)
A. IPv6 and IPv4 traffic is treated in the same way by using a single QoS policy that classifies and matches on both protocols.
B. IPv6 traffic is treated differently than IPv4 by using the flow-label field, which is built into the IPv6 packet header.
C. IPv6 traffic does not require QoS because it uses to the flow-label field, which classifies and matches on the IPv6 protocol.
D. IPv6 traffic is treated differently than IPv4 by using two different QoS policies.
E. IPv6 traffic is treated differently than IPv4 because it uses only the DSCP value and not the IP precedence.
Q76. Which two options are characteristics of firewall transparent mode operations in a firewall solution design? (Choose two.)
A. The firewall acts like a router hop in the network.
B. OSPF adjacencies can be established through the firewall.
C. Changes in the existing IP addressing and subnets are required.
D. Multicast traffic can traverse the firewall.
E. The firewall can participate actively on spanning tree.
Q77. Which two factors can significantly affect the OSPF network convergence time? (Choose two.)
A. the tuning of OSPF LSA timers
B. the number of OSPF routes
C. the diameter of the OSPF network
D. different processor capabilities of devices
Q78. You have been tasked to create a Layer 2 network design that uses vPC to provide resiliency and avoid loops. vPC removes Layer 2 loops while providing redundancy through which mechanism?
A. dual-active detection
B. address synchronization
C. strict forwarding rules
D. Bridge Assurance
Q79. During a network design review, it is recommended that the network with a single large area should be broken up into a backbone and multiple nonbackbone areas. There are differing opinions on how many ABRs are needed for each area for redundancy. What would be the impact of having additional ABRs per area?
A. There is no impact to increasing the number of ABRs.
B. The SPF calculations are more complex.
C. The number of externals and network summaries are increased.
D. The size of the FIB is increased.
Q80. You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressure by management to further optimize server utilization by implementing virtualization technologies on all servers and increase virtual machines density. Faced with some SAN challenges, the server team requests your help in the design and implementation of the SAN in the new virtualized environment.
In which two ways can NPIV be used in your proposed design? (Choose two.)
A. NPIV is used to assign multiple FCIDs to a single N Port.
B. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN.
C. You recommend NPIV so that hosts can be members of different zones.
D. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN.