[Improved] actual test 352-001

352-001 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!

https://www.2passeasy.com/dumps/352-001/

Depending on outstanding technology, better services for purchasers. Examcollection offer you 24 hour customer support for Cisco examinee and you can get what you would like realize anytime. Your own satisfaction in our 352-001 is our services objective, the companys joint development along with clients is our persistent goal inside a large number. Thus please dont hesitate to contact all of us when you have questions associated with 352-001 examination.

2016 Jun 352-001 dumps

Q166. You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mb/s and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner? 

A. Use a WRED random drop policy. 

B. Increase the queue to at least 1 GB. 

C. Enable the TCP Nagle algorithm on the receiver. 

D. Change the protocol to CIFS. 

Answer: A 


Q167. A company supports IPv4 and IPv6 addresses, and they need to be able to support flow-based translations for multiple IPv6 devices to a single IPv4 address. Which address family translation design solution should be recommended? 

A. stateful NAT-PT 

B. NAT-PT 

C. stateless NAT64 

D. stateful NAT64 

Answer: D 


Q168. You have been hired to redesign a network due to issues with congestion. How will a router function if the QoS mechanism of congestion avoidance is integrated into the existing network design? 

A. the router handles the overflow of traffic by using FIFO B. the router handles the possible buildup of congestion by using WRED 

C. the router forces inbound and outbound traffic to stay within a defined profile by using rate limiting 

D. the router separates packets based on certain characteristics by using NBAR 

E. the router marks packets based on certain characteristics by using PBR 

Answer: B 


Q169. Refer to the exhibit. 


In this BGP design, what is the next hop for 10.1.1.0/24 on R8 and R7? 

A. The next hop for 10.1.1.0/24 on R7 is R8 and the next hop for R8 is R7. 

B. The next hop for 10.1.1.0/24 on R7 is R5 and the next hop for R8 is R6. 

C. The next hop for 10.1.1.0/24 on R7 is R6 and the next hop for R8 is R5. 

D. The next hop for 10.1.1.0/24 on R7 is R3 and the next hop for R8 is R4. 

Answer: A 


Q170. In a network design using carrier Ethernet, which three mechanisms can be used to improve Layer 2 down detection and thereby reduce routing convergence time? (Choose three.) 

A. BFD 

B. Ethernet port debounce timers 

C. link-state tracking 

D. object tracking 

E. fast IGP hello 

Answer: ADE 


Q171. Which design concern should be accounted for in all Layer 3 virtualization technologies? 

A. Layer 3 redundancy 

B. packet sizing 

C. application usage 

D. Layer 3 stability 

Answer: B 


Q172. A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances? 

A. IP packets with broadcast IP source addresses 

B. IP packets with identical source and destination IP addresses 

C. fragmented packets with the do-not-fragment bit set 

D. IP packets with the multicast IP source address 

E. IP packets with the multicast IP destination address 

F. IP packets with the destination IP address 0.0.0.0 

Answer: B 


2passeasy.com

Improved actual test 352-001:

Q173. A company plans to include Nonstop Forwarding and Bidirectional Forwarding Detection as a part of their network redundancy plan. In which two ways do NSF and BFD work together when different hardware platforms are compared? (Choose two.) 

A. During supervisor engine or routing engine failover, the NSF feature will always ensure that the BFD at the peer router will not trigger a link down independent of the used hardware platform. 

B. At some hardware platforms, BFD and NSF are not supported together. During supervisor engine or routing engine failover, the BFD at the peer router will trigger a link down. 

C. To ensure that BFD at the peer router will not trigger a link down during NSF, the BFD packets must be processed fast enough, and, during supervisor engine or routing engine failover, by processing the BFD independent from the supervisor engine or routing engine. 

D. Because BFD is always processed at the line cards (not at the supervisor engine or routing engine), a supervisor engine or routing engine failover will not affect the BFD peer router. 

E. Because BFD is always processed at the supervisor engine or routing engine, a supervisor engine or routing engine failover will always trigger a link down at the peer router. 

Answer: BC 


Q174. You are designing the QoS features for a large enterprise network that includes DMVPN. When would you need to configure QoS preclassify? 

A. when you are marking packets with the DSCP bits 

B. when you are marking packets with the TOS bits 

C. when your service provider requires the DSCP bits be set 

D. when the QoS policy cannot be based on DSCP ToS bits 

Answer: D 


Q175. You are designing a multisite VPN solution for a customer and you are concerned with the additional overhead of point-to-point tunnels and the associated overlay routing with DMVPN. How does a GDOI-based VPN eliminate the additional tunnel and routing overhead found in DMVPN? 

A. The GDOI-based VPN requires overlaying a secondary routing infrastructure through the tunnels. 

B. In a GDOI-based VPN, all group members share a common security association. 

C. The GDOI-based VPN requires the provisioning of a complex connectivity mesh. 

D. The GDOI-based VPN leverages the routing protocol to find its peer for tunnel setup. 

Answer: B 


Q176. In a redesign of a multiple-area network, it is recommended that summarization is to be implemented. For redundancy requirements, summarization is done at multiple locations for each summary. Some customers now complain of higher latency and performance issues for a server hosted in the summarized area. What design issues should be considered when creating the summarization? 

A. Summarization adds CPU overhead on the routers sourcing the summarized advertisement. 

B. Summarization prevents the visibility of the metric to the component subnets. 

C. Summarization creates routing loops. 

D. Summarization causes packet loss when RPF is enabled. 

Answer: B 


Q177. A network designer is working with a company to improve convergence at the Layer 2 control plane and decides to use LACP. Which of these components does LACP use to create the system ID? 

A. LACP system priority and switch MAC address 

B. LACP port priority and switch MAC address 

C. LACP port priority and port number 

D. LACP system priority and port number 

Answer: A 


Q178. Refer to the exhibit. 


You are designing a loop-free hierarchical VPLS service. Which two design considerations should be implemented for the pseudowires between the N-PE and U-PE routers? (Choose two.) 

A. Disable split horizon toward the N-PE routers. 

B. Disable split horizon toward the U-PE router. 

C. Enable split horizon toward the U-PE router. 

D. Enable split horizon toward the N-PE routers. 

E. Disable MAC learning on the U-PE route. 

F. Disable MAC learning on the N-PE routers. 

Answer: BD 


Q179. You are designing a large-scale DMVPN network with more than 500 spokes using EIGRP as the IGP protocol. Which design option eliminates potential tunnel down events on the spoke routers due to the holding time expiration? 

A. Increase the hold queue on the tunnel interface of the spoke routers. 

B. Increase the hold queue on the physical interface of the spoke routers. 

C. Increase the hold queue on the physical interface of the hub router. 

D. Increase the hold queue on the tunnel interface of the hub router. 

E. Apply QoS for pak_priority class. 

Answer: D 


Q180. What is a key role for the access layer in a hierarchical network design? 

A. The access layer provides a security, QoS, and policy trust boundary. 

B. The access layer provides an aggregation point for services and applications. 

C. The access layer serves as a distribution point for services and applications. 

D. The access layer can be used to aggregate remote users. 

Answer: A 



see more CCDE Written Exam