Download Cisco Certified Design Expert Qualification Exam.352-001.TestKing.2015-05-21.198q.vcex

Vendor: Cisco
Exam Code: 352-001
Exam Name: Cisco Certified Design Expert Qualification Exam
Date: May 21, 2015
File Size: 3 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
A company plans to include Nonstop Forwarding and Bidirectional Forwarding Detection as a part of their network redundancy plan. In which two ways do NSF and BFD work together when different hardware platforms are compared? (Choose two.)
  1. During supervisor engine or routing engine failover, the NSF feature will always ensure that the BFD at the peer router will not trigger a link down independent of the used hardware platform.
  2. At some hardware platforms, BFD and NSF are not supported together. During supervisor engine or routing engine failover, the BFD at the peer router will trigger a link down.
  3. To ensure that BFD at the peer router will not trigger a link down during NSF, the BFD packets must be processed fast enough, and, during supervisor engine or routing engine failover, by processing the BFD independent from the supervisor engine or routing engine.
  4. Because BFD is always processed at the line cards (not at the supervisor engine or routing engine), a supervisor engine or routing engine failover will not affect the BFD peer router.
  5. Because BFD is always processed at the supervisor engine or routing engine, a supervisor engine or routing engine failover will always trigger a link down at the peer router.
Correct answer: BC
Question 2
You are tasked with implementing a 1000-phone remote access solution, where phones will traverse a WAN edge router. Assuming all of the following features are supported in a hardware-assisted manner, which of the following will have the most detrimental impact on the delay of the packet?
  1. encryption
  2. stateful firewall
  3. MPLS encapsulation
  4. GRE encapsulation
Correct answer: A
Explanation:
Question 3
You are designing a Group Encrypted Transport virtual private network solution for an existing branch network. The existing network has the following characteristics:
Which additional routing protocol would you use for the overlay routing between the group members?
  1. Open Shortest Path First (with a different process ID)
  2. Enhanced Interior Gateway Routing Protocol
  3. No additional protocol is necessary.
  4. External Border Gateway Protocol
  5. Routing Information Protocol Version 2
  6. Next Hop Resolution Protocol
Correct answer: C
Question 4
Refer to the exhibit. 
  
You are designing a loop-free hierarchical VPLS service. Which two design considerations should be implemented for the pseudowires between the N-PE and U-PE routers? (Choose two.)
  1. Disable split horizon toward the N-PE routers.
  2. Disable split horizon toward the U-PE router.
  3. Enable split horizon toward the U-PE router.
  4. Enable split horizon toward the N-PE routers.
  5. Disable MAC learning on the U-PE route.
  6. Disable MAC learning on the N-PE routers.
Correct answer: BD
Question 5
You are designing a network using multipoint GRE tunnels and need to be able to detect when connectivity between the GRE tunnel endpoints is broken. Which statement is true about configuring keepalives for multipoint GRE tunnels? 
 
  1. The keepalive timer values on the routers must have the same value.
  2. Both routers must support GRE tunnel keepalives.
  3. No configuration is required to detect when connectivity is broken between the GRE tunnel endpoints.
  4. GRE tunnel keepalives will not detect when connectivity is broken between the GRE tunnel endpoints.
Correct answer: D
Question 6
A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection?
  1. IP addresses of the GRE tunnel endpoints
  2. IPsec configuration
  3. MTU size on the GRE tunnel
  4. encapsulation of the GRE tunnel
Correct answer: C
Explanation:
Question 7
Company X will be integrating an IPv6 application into their network and wants to develop a test environment to evaluate application performance across the network. This application will require both unicast and multicast communications. The company can do this implementation only in certain areas of its existing IPv4-only network, but wants all areas to communicate with each other. When developing the design to provide connectivity between these testing locations, what tunneling technology would work in this scenario?
  1. ISATAP
  2. 6to4
  3. DMVPN
  4. 6vPE
  5. 6PE
Correct answer: C
Question 8
You are working on a network design plan for a company with approximately 2000 sites. The sites will be connected using the public Internet. You plan to use private IP addressing in the network design, which will be routed without NAT through an encrypted WAN network. Some sites will be connected to the Internet with dynamic public IP addresses, and these addresses may change occasionally. Which VPN solution will support these design requirements?
  1. GET VPN must be used, because DMVPN does not scale to 2000 sites.
  2. DMVPN must be used, because GET VPN does not scale to 2000 sites.
  3. GET VPN must be used, because private IP addresses cannot be transferred with DMVPN through the public Internet.
  4. DMVPN must be used, because private IP addresses cannot be transferred with GET VPN through the public Internet.
  5. GET VPN must be used, because DMVPN does not support dynamic IP addresses for some sites.
  6. DMVPN must be used, because GET VPN does not support dynamic IP addresses for some sites.
Correct answer: D
Question 9
A company wants to connect two data center sites using a hub-and-spoke design with 2000 remote sites. One design consideration is the requirement to transfer MPLS packets over the public Internet. In addition, one router at each site should be used, and the MPLS packets must be encapsulated inside IP packets because the public Internet cannot transfer native MPLS packets. Which feature can be used to simplify the network design?
  1. GET VPN can be used to encrypt the MPLS packets with IPsec.
  2. DMVPN can be used to build up GRE tunnels dynamically with MPLS encapsulation inside.
  3. L2TPv3 can be used to encapsulate the MPLS packets.
  4. Site-to-site IPsec without GRE can be used to encapsulate the MPLS packets.
  5. PPPoE can be used to encapsulate the MPLS packets.
Correct answer: B
Question 10
When creating a network design that routes an IGP over L2VPNs, with which device does the remote CE router form an IGP adjacency?
  1. the hub site PE router
  2. the hub site CE router
  3. the directly connected PE router
  4. The IGP will not establish adjacency over the MPLS network.
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!