Master the 352-001 CCDE Written Exam content and be ready for exam day success quickly with this Exambible 352-001 exam. We guarantee it!We make it a reality and give you real 352-001 questions in our Cisco 352-001 braindumps.Latest 100% VALID Cisco 352-001 Exam Questions Dumps at below page. You can use our Cisco 352-001 braindumps and pass your exam.

Q51. Which multicast technology provides a large, many-to-many connectivity for a new application while minimizing load on the existing network infrastructure? 

A. Bidirectional PIM 

B. PIM Sparse Mode 

C. Any-source Multicast 

D. Source Specific Multicast 

Answer:


Q52. Which mechanism provides a Layer 2 fault isolation between data centers? 

A. TRILL 

B. LISP 

C. advanced VPLS 

D. OTV 

E. fabric path 

Answer:


Q53. On a VoIP solution design, which option shows one-way latency, packet loss, and jitter measurements that ensure acceptable voice quality? 

A. Latency: 110 ms Packet loss: 1% Jitter: 40 ms 

B. Latency: 130 ms Packet loss: 0.5% Jitter: 30 ms 

C. Latency: 150 ms Packet loss: 1.25% Jitter: 20 ms 

D. Latency: 170 ms Packet loss: 0.75% Jitter: 10 ms 

Answer:


Q54. What should be taken into consideration when designing IPsec networks using Authentication Header (AH)? 

A. NAT 

B. transform set 

C. crypto maps 

D. ISAKMP 

Answer:


Q55. For a storage area network design, which technology allows a switch to support multiple Fibre Channel IDs per fabric port? 

A. N-Port Identifier Virtualization 

B. Inter-Virtual Storage Area Network Routing 

C. Zoning 

D. Fabric Port Trunking 

E. Node Port Virtualization 

F. Expansion Port Trunking 

Answer:


Q56. You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mb/s and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner? 

A. Use a WRED random drop policy. 

B. Increase the queue to at least 1 GB. 

C. Enable the TCP Nagle algorithm on the receiver. 

D. Change the protocol to CIFS. 

Answer:


Q57. You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure? 

A. SPAN monitor ports 

B. NetFlow 

C. IP NBAR 

D. passive taps 

Answer:


Q58. A customer wants to understand the benefits of a proposed network design that utilizes SNMPv3. Which two network threats is SNMPv3 effective against? (Choose two.) 

A. modification of information threats 

B. masquerade threats 

C. denial of service threats 

D. traffic analysis threats 

Answer: AB 


Q59. A customer is using a service provider to provide a WAN backbone for a 30-site network. In establishing the network, the customer must work within these constraints: 

The customer has a self-managed MPLS backbone. 

The VPLS WAN backbone of the service provider does not support PIM snooping. 

Multicast VPN must be used for multicast support inside some VRFs. 

What can the customer do so that multicast traffic is NOT flooded to all sites? 

A. Configure static GRE tunnels and run the MPLS and multicast VPN inside these GRE tunnels. 

B. Use Label Switched Multicast for the multicast transport. 

C. Use PIM-SSM as the multicast routing protocol with IETF Rosen Draft multicast VPN. 

D. Configure a static mapping between multicast addresses and MAC addresses. 

E. Use GET VPN to encrypt the multicast packets inside the WAN. 

Answer:


Q60. Which design concern should be accounted for in all Layer 3 virtualization technologies? 

A. Layer 3 redundancy 

B. packet sizing 

C. application usage 

D. Layer 3 stability 

Answer: