Download New Updated (July) Cisco 352-001 Actual Test 141-150

Ensurepass

QUESTION 141

The Customer X network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which three options about the Overload Bit are true? (Choose three.)

 

A.

It is not recommended on BGP route reflectors.

B.

It only affects the use of the respective node as a transit node, and networks advertised within the LSPs of the node are still reachable.

C.

It can be set on a router during the startup process for a fixed period of time.

D.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

E.

It can be set on a router until other interacting protocols have signaled convergence.

 

Correct Answer: BCE

 

QUESTION 142

A Mobile Service Provider would like to design and deploy an Ethernet service which has similar physical link failover/failback characteristics on the active/backup links as the APS/MSP SONET properties. Which Layer 2 services should be considered to address this design feature?

 

A.

Port-Channel

B.

MLPPP

C.

Flex Link

D.

Ethernet Pseudowires

 

Correct Answer: C

 

 

QUESTION 143

Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.)

 

A.

Solu

tion should be resistant to sensor failure.

B.

Solution should allow for stream normalization.

C.

Solution should not impact jitter and latency for voice traffic.

D.

Solution should allow for signature-based pattern matching.

E.

Solution should allow to deny packets inline.

 

Correct Answer: ACD

 

 

QUESTION 144

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which three factors should you to consider when you adjust the timer values? (Choose three.)

 

A.

access bandwidth

B.

service provider agreement to support tuned timers

C.

number of routes on the CE router

D.

number of VRFs on the PE router

E.

service provider scheduling of changes to the PE

 

Correct Answer: ABC

 

 

QUESTION 145

You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

 

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

OTV

E.

VPLS

F.

GET VPN

 

Correct Answer: AE

 

 

QUESTION 146

Refer to the exhibit. You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.)

 

clip_image002

 

A.

When router B fragments packets after the encryption,

router C must reassemble these fragmented packets.

B.

When router B fragments packets before the encryption, router C must reassemble these fragmented packets.

C.

When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets.

D.

When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets.

E.

When router A fragments packets, router C must reassemble these fragmented packets.

F.

When router A fragments packets, endpoint 2 must reassemble these fragmented packets.

 

Correct Answer: ADF

 

 

QUESTION 147

A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and 234.145.4.5 inside the same network?

 

A.

Multicast packets from both applications are flooded to all Layer 2 ports in a segment where a multicast receiver is located.

B.

Multicast packets from both applications are flooded to ports where one multicast receiver from one application is located.

C.

Only one multicast stream is received at the port where the receivers from both applications are located.

D.

Both multicast senders will always receive the multicast packets from the other multicast application.

E.

The routers doing PIM-SM cannot distinguish between the two multicast applications.

 

Correct Answer: B

 

 

QUESTION 148

Refer to the exhibit. You are asked to design this OSPF network to converge within 60 ms for unicast packets after a topology change due to a single link failure. Which technology can be enabled while conforming to the design requirements?

 

clip_image004

 

A.

Loop-Free Alternates

B.

BFD

C.

IGP neighbor timer tuning

D.

IGP SPF timer tuning

E.

RSVP-TE Fast Reroute

 

Correct Answer: A

 

 

QUESTION 149

You are the lead IP network designer for a new service provider called XYZ, and you are working closely with the CTO to finalize design requirements. The CTO informs you that they want to transport IPv6 prefixes of customers through the XYZ network at this time; however, they need your advice on whether to deploy dual stack or MPLS 6PE/6VPE. Which two options do you recommend? (Choose two.)

 

A.

Build a dual-stack network. Enable BGP in the core. Redistribute EBGP routes into IGP.

B.

Use MPLS 6PE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.

C.

Use MPLS 6VPE to simplify the operation and keep a BGP-free core. When the LDPv6 becomes available, change to 4PE or keep the core using both IPv4 and IPv6. The main goal is to keep the core BGP-free and ensure that IPv4, IPv6, VPNv4, and VPNv6 are all label-switched.

D.

Prepare the dual-stack infrastructure from the beginning, even if BGP prefixes would have to be announced via IPv4 in case you decide to maintain the BGP-free core.

 

Correct Answer: BD

QUESTION 150

Refer to the exhibit. This new OSPF network has four areas, but the hub-and-spoke area experiences frequent flapping. You must fix this design failure. Which two mechanisms can you use to isolate the data center area from the hub-and-spoke area without losing IP connectivity? (Choose two.)

 

clip_image006

 

< tr style="mso-yfti-irow: 1">

A.

Make the DC area totally stub.

B.

Make the DC area an NSSA.

C.

Convert the DC area to EIGRP protocol.

D.

Deploy a prefix summarization on router D.

E.

Use OSPF distribute-list filtering on router A.

 

Correct Answer: AD

 

Free VCE & PDF File for Cisco 352-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …