Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

352-011 Sample Questions Answers

Questions 4

A network design engineer is designing a new storage area network that combines multiple separate legacy SAN environments within a data center. Which technology isolates events within one of the SAN environment from the others?

Options:

A.

FCIP tunnels

B.

N-port ID Virtualization

C.

N-Port Virtualization

D.

Virtual SANs

Buy Now
Questions 5

A data center deign requires monitoring of their business critical voice and video services accessed by remote locations. Which two items are applicable? (Choose two)

Options:

A.

If multiple applications share the same DSCP or CoS values, NBAR can be utilized

B.

The applications being monitored must be assigned a unique CoS value

C.

If multiple applications share the same the same DSCP or CoS values, IPFIX can be utilized

D.

The applications being monitored must be assigned a unique QoS profile

E.

The applications being monitored must be assigned unique DSCP values

F.

The reporting data must be assigned to a QoS profile to ensure accurate statistics

Buy Now
Questions 6

A financial trading organization plans to monitor the network latency for multicast data feeds on a hop-by-hop basis. Which technology should be added to their design to support this requirement?

Options:

A.

SPAN

B.

NBAR

C.

IPFIX

D.

Precision Time Protocol

Buy Now
Questions 7

Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.)

Options:

A.

Solution should be resistant to sensor failure.

B.

Solution should allow for stream normalization.

C.

Solution should not impact jitter and latency for voice traffic.

D.

Solution should allow for signature-based pattern matching.

E.

Solution should allow to deny packets inline.

Buy Now
Questions 8

Which two options are design considerations when introducing FCoE into an existing network? (Choose two)

Options:

A.

The FCoE QoS markings may overlap with call signaling QoS markings

B.

Optical cabling is needed to transmit FCoE traffic between a server and its directly connected Ethernet switch

C.

The existing network must support a MTU of 3280 bytes

D.

Twinaxial cabling can be used to transmit FCoE traffic between a server and its directly connected Ethernet switch, if it is less than 10 meters

E.

All the servers in the data center must be retrofitted with converged Network Adapters

Buy Now
Questions 9

ACME Agricultural requires that access to all network devices is granted based on identify validation, and an authentication server was installed for this purpose. Currently the network team uses a list of passwords based on regions to access the internal corporate network devices. Which protocol do you recommend to ensure identify validation from the authentication server to the corporate directory?

Options:

A.

HTTPS

B.

TACACS+

C.

SSH

D.

LDAP

Buy Now
Questions 10

Which option is a design consideration when using routers in a distributed hardware architecture?

Options:

A.

Routing information is stored in the RIB and the FIB makes forwarding decisions as programmed on the line card hardware

B.

After a link failure occurs in the core, the RIB continues to forward the traffic while FIB convergence is in progress

C.

BGP routes are stored in the RIB and IGP routes are stored in the FIB

D.

IP routes are stored in the RIB and MPLS labels are stored in the FIB

Buy Now
Questions 11

Refer the exhibit.

You have designed a IPv6 migration plan, and now you need to determine the impact on the existing IPv4 network. Which is likely to happen when you enable IPv6 routing on the link between R3 and R2, starting at R3?

Options:

A.

R3 advertises the link from R3-R2 to R1, R4 and R5 only.

B.

R2 receives an IPv6 default route from R3.

C.

Only R3 and R2 have IPv4 and IPv6 reachability.

D.

Loopback reachability between all routers for IPv4 is lost.

E.

All routers except R2 are reachable through IPv4.

Buy Now
Questions 12

Which DCI technology utilizes a “flood and learn” technique to populate the Layer 2 forwarding table?

Options:

A.

OTV

B.

E-VPN

C.

VPLS

D.

LISP

Buy Now
Questions 13

Which two reasons for implementing Cisco MPLS TE in a service provider MPLS backbone are valid? (Choose two.)

Options:

A.

when Cisco MPLS TE is a prerequisite for implementing RSVP in the backbone

B.

when Cisco MPLS TE is required to reroute traffic within Jess than 1 second in case of a link failure inside the backbone

C.

when Cisco MPLS TE is required to create backup paths independently from the IGP

D.

when Cisco MPLS TE can detect and react to neighbor failures faster than IGPs can

E.

when Cisco MPLS TE is required to route different MPLS QoS service classes through different paths

Buy Now
Questions 14

Which OSPF design consideration, with regards to simplicity and address preservation, must be considered when connecting two Layer 3 switches directly using 10 GBASE-T cabling and formatting an OSPF neighbor adjacency?

Options:

A.

Mesh groups must be included in the design

B.

The OSPF Hello and Dead timers must be tuned to detect failures as quickly as possible

C.

The OSPF network type must be set to point-to-multipoint

D.

An OSPF neighbor adjacency formed over loopback interfaces must be placed in Area 0

E.

The OSPF network type must be set to point-to-point

Buy Now
Questions 15

Which major block is not included in the ETSI network Function Virtualization reference framework?

Options:

A.

Network Function Virtualization Infrastructure

B.

Network Function Virtualization Management and Orchestration

C.

Network Function Virtualization Policy Manager

D.

Virtualized Network Function/ Element Management Systems

Buy Now
Questions 16

In an Ethernet link containing five routers with OSPF network interface type configured as broadcast, how many OSPF adjacencies are established on this Ethernet link?

Options:

A.

7

B.

5

C.

10

D.

20

E.

6

Buy Now
Questions 17

Which IEEE standard is commonly used at the data link layer for an access network, in an IoT environment?

Options:

A.

Wireless Regional Area Network

B.

Low-Rate Wireless Network

C.

Wireless Local Area Network

D.

Broadband wireless metropolitan Network

Buy Now
Questions 18

A regional ISP is running MPLS TE. These tunnels are configured manually using paths. Which technology centralizes the traffic engineering decisions to reduce operational complexity?

Options:

A.

BGP Link State

B.

DiffServ-TE

C.

TE autobandwidth

D.

Shared Risk link Group

Buy Now
Questions 19

Which feature or technology that affects the operations of IPsec should be taken into account when designing an IPsec network using Authentication header?

Options:

A.

TCP MSS adjustment

B.

Certificate-based authentication

C.

Transform set

D.

NAT

Buy Now
Questions 20

A small local business recently had an outage after an employee plugged a switch into the corporate network, which caused the traffic pattern in the network to change. You have been tasked to redesign the network so that this does not happen again. From the left side to the right side, drag the PVRST+ features that should be implemented to prevent the corresponding root cause. Not all sources will be used.

Options:

Buy Now
Questions 21

Which two foundational aspects of loT are still evolving and being worked on by the industry at large? (Choose two)

Options:

A.

Regulatory domains

B.

loT consortia

C.

Standards

D.

Low energy Bluetooth sensors

E.

WiFi protocols

Buy Now
Questions 22

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used.

Options:

Buy Now
Questions 23

Which two conditions are required for successful route aggregation? (Choose two)

Options:

A.

Contiguous prefix allocation

B.

Logical separation between zones or layers within networks

C.

Matching traffic aggregation with route aggregation locations

D.

Consistent prefix allocations per network

E.

Physical separation between zones or layers within networks

Buy Now
Questions 24

Which open source message broker is in the Cisco Cloud Center?

Options:

A.

Apache kafka

B.

HornetQ

C.

RabbitMQ

D.

Fuse Message Broker

E.

Oracle Message Broker

Buy Now
Questions 25

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three)

Options:

A.

To enable unused services

B.

Warning banners

C.

Routing protocol authentication

D.

Control Plane Policing

E.

Redundant AAA servers

F.

SNMPv3

Buy Now
Questions 26

What is a design application of control plane policing?

Options:

A.

CPP protects the control plane from reconnaissance and or denial-of-service attacks

B.

CPP protects the forwarding plane by rate –limiting excessive routing protocol traffic

C.

CPP protects the forwarding plane by allowing legitimate traffic and dropping excessive traffic

D.

CPP drop malformed packet that are sent to the CPU

Buy Now
Questions 27

Drag and drop the Fast ReRoute mechanisms on the left to the correct routing protocols on the right. Not all options are used.

Options:

Buy Now
Questions 28

You have been asked to design a high -density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

Options:

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels.

B.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

C.

Choose a high minimum data rate to reduce the dory cycle.

D.

Enable 802.11n channel bonding both 2.4 GHz and 5 GHz to increase the aggregated cell throughput.

E.

Increase the number of SSIDs to load-balance the client traffic.

Buy Now
Questions 29

Which two control plane policer design options should you consider to achieve high availability? (Choose two)

Options:

A.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence

B.

Control plane policers are really needed only on externally facing devices

C.

Control plane policers can cause the network management systems to create false alarms

D.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform-dependent in terms of classification ability

E.

Control plane policers must be processes before a forwarding decision is made

Buy Now
Questions 30

Refer to the exhibit.

Which impact of using three or more ABRs between the backbone area and area 1 is true?

Options:

A.

In a large-scale network, LSA repletion, by all ABRs. can cause serious scalability issues

B.

Prefixes from the non-backbone area ate advertised by one ABR lo the backbone area

C.

Multiple ABRs reduce the CPU processing on each ABR due to spWtmg prefix advertisement between areas.

D.

In a large--scale network multiple ABRs can create microloops.

Buy Now
Questions 31

Which two design aspects should a metro service provider consider when planning to deploy REP for his backbone? (Choose two.)

Options:

A.

Two REP segments can be connected redundantly at two points, one connection will be blocked as per the STP defined in IEEE 802.1d.

B.

UDLD can be enabled on REP interfaces to detect unidirectional failures.

C.

The guaranteed convergence recovery time is less than 50 ms for the local segment.

D.

A REP segment is limited to a maximum of seven devices.

E.

VLAN load balancing for optimal bandwidth usage is supported in any REP segment.

Buy Now
Questions 32

Which load balancing option for IP-only traffic is the least efficient in terms of EtherChannel physical links utilization?

Options:

A.

On a per source IP address basis

B.

On a per destination MAC address basis

C.

On a per destination IP address basis

D.

On a per port number basis

Buy Now
Questions 33

What is a design benefit of PortFast?

Options:

A.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

B.

PortFast disables spanning-tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

Portfast does not generate a spanning-tree topology change when a station on a port is connected or disconnected

D.

PortFast detects one-way communications on the physical port, when prevents switch loops

E.

PortFast prevents switched traffic from traversing suboptimal paths on the network

F.

PortFast prevents switch loops that are caused by a unidirectional point-to-point link condition on Rapid PVST+ and MST

Buy Now
Questions 34

.which two options are benefits of using Topology Independent Loop-Free Alternate in WAN design? (Choose two)

Options:

A.

It provides backup convergence for all topologies by avoiding the post-convergence path

B.

It maximizes the network utilization by load-sharing across low bandwidth and edge links while IGP convergence is in progress

C.

No additional protocols are required in the MPLS network because it uses LDP labels to signal the backup path

D.

Although it requires enabling segment routing, SR does not have to be activated as the preferred forwarding method

E.

It can provide backup paths for IPv4, IPv6 and LDP traffic

Buy Now
Questions 35

You are designing an IPv4 any source multicast redundancy solution. Which technology ensures the quickest RP convergence?

Options:

A.

Bootstrap router

B.

MSDP anycast RP

C.

Auto-RP

D.

Embedded RP

Buy Now
Questions 36

Which two statements about VXLAN are true? (Choose two)

Options:

A.

VXLAN is a Cisco proprietary solution

B.

VXLAN is an encapsulation method used to create a Layer 3 overlay network

C.

VXLAN can be used to enforce Layer 2 isolation in a multitenant infrastructure

D.

VXLAN uses the Spanning Tree protocol for loop prevention

E.

VXLAN overcomes the 802.1Q virtual LAN address space limitation

Buy Now
Questions 37

Which two options describe the advantages of using DWDM over traditional optical networks? (Choose two)

Options:

A.

Inherent topology flexibility with intelligent chromatic dispersion

B.

Inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

C.

Inherent topology flexibility with built-in service protection

D.

Inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

E.

Ability to expand bandwidth over existing optical infrastructure

Buy Now
Questions 38

You are presented with requirements to design a development, testing and production environments. These environment should communicate with each other, yet they should be kept as separate failure domains. Which routing protocol should be configured on the links between the networks to support the design requirements?

Options:

A.

OSPF

B.

EIGRP

C.

IS-IS

D.

BGP

Buy Now
Questions 39

In a routed access hierarchical campus design, the access-to-distribution Layer 2 uplink trunks are replaced with Layer 3 point-to-point routed links. Why is it recommended that VLANs are confined on a single access switch rather than span across multiple access switches?

Options:

A.

to allow for better convergence time

B.

to prevent the occurrence of Layer 2 loops

C.

to allow for fault isolation

D.

to prevent routing black holes

Buy Now
Questions 40

You must make IGP redesign recommendations for a client that has old equipment, with low CPU power and memory, that they do not have budget replace. They are very concerned about CPU load on routers. They are using IS-IS as the IGP in a single l1 area and all routers are connected to each other with point-to-point links. Which method do you recommend to reduce or limit CPU overhead caused by IS-IS?

Options:

A.

Use mesh groups to limit flooding of LSAs

B.

Implement wide style metrics for IS-IS on all routers

C.

Select a router to act as a pseudowire to limit topology synchronization

D.

Divide the router into multiple areas and implement address summarization

Buy Now
Questions 41

In which two ways is a network design improved by including IP Event Dampening? (Choose two)

Options:

A.

Provides sub-second convergence

B.

Quickly detects network failures

C.

Prevent routing loops

D.

Improves network stability

E.

Reduces processing load

Buy Now
Questions 42

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50MSEC). In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?

Options:

A.

TE backup tunnel

B.

Next-hop (NHop) tunnel

C.

FRR Backup tunnel

D.

next-next-hop (NNHop) tunnel

Buy Now
Questions 43

Which statement about SDN framework environment is true?

Options:

A.

The control plane functions is split between a SDN controller and the networking element

B.

The data plane is pulled from the networking element and put in a SDN controller

C.

The data plane is controlled by a centralized SDN element

D.

The control plane is pulled from the networking element and put in a SDN controller

E.

The control plane and data plane is pulled from the networking element and put in a SDN controller and SDN agent

Buy Now
Questions 44

You work as a network designer for a company that is replacing their Frame Relay WAN with an MPLS VPN service, where the PE-to-CE routing protocol is BGP. The company has 3000 routes in their distribution routers, and they would like to advertise their access routers through the MPLS network. Their service provider, however, only supports 1000 prefixes per VRF. Which two design solutions can be applied to ensure that your access routers will be able to reach all devices in your network? (Choose two.)

Options:

A.

Configure the distribution routers to send a default route to the MPLS network

B.

Configure null routes and aggregate routes for the prefixes in your network on the distribution routers

C.

Summarize the routes on MPLS WAN interfaces of the distribution routers

D.

Use prefix lists on the distribution routers to control which routes are sent to MPLS network

E.

Configure the access routers to send a default route to the MPLS network

Buy Now
Questions 45

Options:

Buy Now
Questions 46

A service provider wants to use a controller to automate the provisioning of service function chaining. Which two overlay technologies can be used with EVPN MP-BGP to create the service chains in the data center?

Options:

A.

VXLAN

B.

MPLS L2VPN

C.

Provider Backbone Bridging EVPN

D.

802.1Q

Buy Now
Questions 47

The enterprise customer ABC Corp will deploy a centralized unified communications application to provide voice, and instant messaging to their branch offices. Some of the branch offices are located in remote locations and are connected via a 1.5 Mb/s Layer 3 VPN connection. Which two ways are the most cost-effective to ensure that this new application is implemented properly? (Choose two)

Options:

A.

Use a low bitrate codec such as G 711

B.

Set voice activity detection to avoid sending packets when the conversations is silent

C.

Enable VRF-Lite on the CE router to create a separate voice VRF

D.

Set LFI on the WAN connections to interleave the small voice packets with the large data packets

E.

Set WAN optimization on the CE router to compress the voice packets for improved bandwidth utilization and performance

F.

Use a low bitrate codec such as G 729

Buy Now
Questions 48

What is an advantage of placing the IS-IS flooding domain boundary at the core Layer in a three-layer hierarchical network?

Options:

A.

The L1 and L2 domains can easily overlap

B.

The L2 domain is contained and more stable

C.

It can be applied to any kind of topology

D.

It reduces the complexity of the L1 domains

Buy Now
Questions 49

Which option lists the cloud service models?

Options:

A.

Internet as a Service, Platform as a Service, and Storage as a Service.

B.

Infrastructure as a Service, Platform as a Service, and Storage as a Service.

C.

Infrastructure as a Service, Platform as a Service, and Software as a Service.

D.

Internet as a Service, Product as a Service, and Storage as a Service.

E.

Internet as a Service, Platform as a Service, and Software as a Service.

Buy Now
Questions 50

You are redesigning a high-speed transit network due to congestion-related issues. Which congestion avoidance mechanism can you apply to the existing network?

Options:

A.

NBAR

B.

FIFO

C.

WRED

D.

Rate-limit

E.

Policy-Based Routing

Buy Now
Questions 51

Which mechanism should be added to a network design to identify unidirectional Spanning Tree Protocol failures through BPDU loss?

Options:

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

UDLD

Buy Now
Questions 52

A network has several routers running IS-IS L1L2 mode on the same Ethernet segment. Which action reduces to a minimum the number of IS-IS adjacencies in this segment?

Options:

A.

Define only the router on the segment to be DIS

B.

Change all routers connected to this segment to a single-level area

C.

Make the interface priority on the backup DIS lower than the primary DIS

D.

Change half the routers to be L1-only and other half to be L2-only on this segment

Buy Now
Questions 53

Why is a redundant PIM stub router topology a bad network design decision?

Options:

A.

Multicast convergence takes long

B.

Multicast traffic duplication will occur

C.

It interferes with IGMP snooping

D.

It interfaces with PIM snooping

Buy Now
Questions 54

Refer to the exhibit.

This Layer 2 ring has 10 VLANs with 1000 MAC addresses in each VLAN. Which protocol or mechanism provides the shortest traffic outage if the link marked with “X” fails?

Options:

A.

Ethernet linear protection switching

B.

PVRST

C.

MST

D.

Ethernet ring protection switching

Buy Now
Questions 55

Which options do you investigate first when designing fast network convergence?

Options:

A.

Routing protocol database size

B.

MTU of the involved interfaces

C.

Link speed between sites

D.

Supported Layer 3 failure detection mechanism

Buy Now
Questions 56

Which three network management requirements are common practices in network design? (Choose three)

Options:

A.

Collect RMON poll information for future regression analysis

B.

Ensure that all network devices have their clocks synchronized

C.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.

D.

Collect SNMP poll information for future regression analysis

E.

Validate data plane health, application and services availability with synthetic traffic

F.

Capture both ingress and egress flow-based packets. While avoiding duplications of flows

Buy Now
Questions 57

Which solution suppresses the effect of excessive interface flapping events on routing protocols?

Options:

A.

IP Event Dampening

B.

SPF Backoff

C.

Carrier Delay

D.

BFD

Buy Now
Questions 58

As a network designer for a major multiservice network, your first assignment is to improve the IS-IS convergence to meet application requirements. Drag and drop the convergence tools or techniques to be used on your proposal from the left into the corresponding convergence phase on the right.

Options:

Buy Now
Questions 59

Which two options are Loop-Free Alternate design considerations? (Choose two)

Options:

A.

MPLS TE must be enabled because it is used for building the backup paths

B.

Backup coverage and effectiveness is dependent on the network topology

C.

It can simplify the capacity planning by matching the backup path with the post-convergence path

D.

It provides an optional backup path by avoiding low bandwidth and edge links

E.

It can impact SLA-sensitive appliance by routing traffic to low bandwidth links while IGP convergence is in progress

Buy Now
Questions 60

Refer to the exhibit.

Service provider ACME Internet just added a 100 GB/s peering in Paris that it wants to use by default for outbound traffic to Big ISP. Which routing policy achieves the desired outcomes?

Options:

A.

Use traffic engineering by injecting a preferred LOCAL_PREF attribute to routes advertised from Very Big ISP in Paris

B.

Apply an import policy in New York that adds a Weight attribute to routes learned from Very Big ISP via Paris

C.

Apply an export policy in Paris by applying a MED or community attribute with a preference that very Big ISP act upon

D.

Apply an import policy hat filters longer prefixes than /24 in Brussels and zurich

Buy Now
Questions 61

Which two options are two advantages of summarizing networks at the aggregation layer rather than at the core? (Choose two.)

Options:

A.

It prevents the core from having unnecessary routes.

B.

It no longer needs a core layer.

C.

It prevents black hole routing.

D.

It avoids network-wide impact upon VLAN changes local to the aggregation devices.

E.

it allows for optimal routing

Buy Now
Questions 62

Which option reduces jitter in a VoIP network?

Options:

A.

Deploy WRED

B.

Deploy call Admission Control

C.

Adjust the playout delay buffer at the receiver

D.

Increase the bandwidth of the links

Buy Now
Questions 63

Which two functions are performed at the core layer of the three-layer hierarchical network design model? (Choose two).

Options:

A.

Fault isolation

B.

Qos classification and marking boundary

C.

Fast transport

D.

Reliability

E.

Load balancing

Buy Now
Questions 64

You are designing a new data center network. Drag and drop new data center requirements on the left into the appropriate design principle on the right.

Options:

Buy Now
Questions 65

A service provider must provide Internet connectivity to an MPLS Layer 3 VPN customer. Which solution allows this customer to have Internet access?

Options:

A.

Implement a global default route with a next hop in the VRF late on PE

B.

Implement policy-based routing between PE and CE

C.

Implement a default route in the VRF with a next hop in the global routing table of PE

D.

Implement destination NAT between the VRF and the global RIB of PE

Buy Now
Questions 66

Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

Options:

A.

Transmit delay

B.

Throttle timer

C.

SPF hold time

D.

Interface dampening

Buy Now
Questions 67

In a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries, which two mechanisms avoid suboptimal routing? (Choose two)

Options:

A.

Route filtering

B.

AD manipulation

C.

Matching EIGRP process ID

D.

Matching OSPF external routes

E.

Route tagging

Buy Now
Questions 68

Which two techniques are used in an OSPF network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two)

Options:

A.

LSA throttling

B.

SPF throttling

C.

IP event dampening

D.

Link-state incremental SPF

E.

Link-state partial SPF

Buy Now
Questions 69

Drag and drop the technology details or features support on the left into the corresponding Layer 2 multipath technologies on the right. Not all options will be used.

Options:

Buy Now
Questions 70

Your customer asked you to redesign there is-IS network to reduce to a minimum the number of adjacencies because the network has several routers running L1/L2 mode on the sme Ethernet segment. Which action do you recommend?

Options:

A.

Define only one router on the segment to be DIS

B.

Make the interface priority on the backup DIS lower than the primary DIS

C.

Change half the routers to L1 routers and half to L2 routers

D.

Change all routers to a single-level area

Buy Now
Questions 71

An enterprise customer has a national WAN network based on DMVPN over the Internet, with sites located throughout the country. The customer has recently deployed VoIP throughout the entire network , and users report that it takes up to 2 seconds to establish a telephone call to an IP telephone at another office network. Drag and drop the root cause and the corresponding design solution from the left onto the correct targets on the right Not all options are used

Options:

Buy Now
Questions 72

Refer to the exhibit.

A customer interconnected hundreds of branch offices into a single DMVPN network, with the HUB in the main data center. Due to security policies, the customer requires that the default route for all Internet traffic from the users at the branches must go through the tunnel and the only connections that are allowed to and from the branch router over the local internet circuit are the DMVPN tunnels. Which two combined actions must you take on the branch router to address these security requirements and keep the solution scalable? (Choose two)

Options:

A.

Place the WAN interface in a front-door VRF, leaving the tunnel interface in the default routing instance

B.

Protect the WAN interface by an inbound ACL that permits only IPsec-related traffic

C.

Implement a zone-based firewall that allows only IPsec-related traffic from zone UNTRUSTED to zone TRUSTED

D.

Add a host route for the public IP address of each remote branch and HUB routers that points directly to the local ISP, and add a default route that points to the tunnel

E.

Use a floating default route with the preferred path over the tunnel and a backup path over the Internet natively

Buy Now
Questions 73

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

Options:

A.

Build neighbor adjacencies in a triangulated fashion

B.

Build neighbor adjacencies in a squared fashion

C.

Limit the query domain by use of distribute lists

D.

Limit the query domain b use of summarization

E.

Limit the query domain by use of default routes

Buy Now
Questions 74

Refer to the exhibit.

An enterprise has three sites over a Layer 2 Metro Ethernet ELAN service. 100Mb/s and 10 Mb/s links have been provisioned to provide redundancy for the head office. When OSPF routing enabled to provide connectivity and the correct bandwidth statement has been applied to each interface, the branch sites observe two equal-cost routes to the head office. The enterprise wants to send all traffic through the 100 Mb/s link and use the 10Mb/S link strictly as a backup. Which OSPF network type must be set to ensure that the head office 100 Mb/s circuit is preferred over the 10 Mb/s circuit, at the same time minimize the amount of configuration required on all of the routers throughout the network?

Options:

A.

NBMA

B.

Point-to-multipoint

C.

Point-to-point

D.

Broadcast

Buy Now
Exam Code: 352-011
Exam Name: Cisco Certified Design Expert Practical Exam
Last Update: Nov 20, 2024
Questions: 249
$68  $169.99
$52  $129.99
$44  $109.99
buy now 352-011