PrepAway - Latest Free Exam Questions & Answers

Category: 352-001

352-001-Cisco Certified Design Expert Qualification Exam

In which two ways will interface dampening benefit your overall network design?

In order to meet your service level agreement, your network designer created a design solution that includes
interface dampening. In which two ways will interface dampening benefit your overall network design?
(Choose two.)
A. Interface dampening uses an exponential backoff algorithm to suppress event reporting to the upper-level
protocols.
B. When the interface is dampened, further link events are not reported to the upper protocol modules.
C. When the interface is dampened, further link events are reported to the upper protocol module.
D. Periodic interface flapping that affects the routing system as a whole should have a period shorter than the
system convergence time.

In which two ways can NPIV be used in your proposed design? (Choose two

You are the SAN designer for the ABC Company. Due to budget constraints, there is increased pressureby
management to further optimize server utilization by implementing virtualization technologies on allservers
and increase virtual machines density. Faced with some SAN challenges, the server team requests yourhelp
in the design and implementation of the SAN in the new virtualized environment.
In which two ways can NPIV be used in your proposed design? (Choose two.)
A. NPIV is used to assign multiple FCIDs to a single N Port.
B. NPIV is used to define and bind multiple virtual WWNs (VIs) to a single physical pWWN.
C. You recommend NPIV so that hosts can be members of different zones.
D. NPIV can be used to allow multiple applications on the same port to use different IDs in the same VSAN.

design? (Choose two

You are designing an optical network. Your goal is to ensure that your design contains the highest degree of
resiliency. In which two ways will you leverage a wavelength-switched optical network solution in your network
design? (Choose two.)
A. a wavelength-switched optical network assigns routing and wavelength information
B. a wavelength-switched optical network takes linear and nonlinear optical impairment calculation into
account
C. a wavelength-switched optical network guarantees restoration based strictly on the shortest path available
D. a wavelength-switched optical network eliminates the need for dispersion compensating units in a network

Which solution meets these requirements?

A company has these requirements for access to their wireless and wired corporate LANs using 802.1x:
– Client devices that are corporate assets and have been joined to the Active Directory domain are allowed
access.
– Personal devices must not be allowed access.
– Clients and access servers must be mutually authenticated.
Which solution meets these requirements?
A. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol
Version 2 with user authentication
B. Extensible Authentication Protocol-Transport Layer Security with machine authentication
C. Extensible Authentication Protocol-Transport Layer Security with user authentication
D. Protected Extensible Authentication Protocol/Microsoft Challenge Handshake Authentication Protocol
Version 2 with machine authentication

known IP-to-MAC address mapping?

You have been hired by Acme Corporation to evaluate their existing network and determine if the current
network design is secure enough to prevent man-in-the-middle attacks. When evaluating the network, which
switch security option should you investigate to ensure that authorized ARP responses take place according to
known IP-to-MAC address mapping?
A. ARP rate limiting
B. DHCP snooping
C. Dynamic ARP Inspections
D. IP Source Guard

hacker compromising a workstation and redirecting flows at the servers?

You are a network designer and have been asked to consult with your server operations team to further
enhance the security of the network. The operations team provides you with these details about the network:
– A pool of servers is accessed by numerous data centers and remote sites.
– The servers are accessed via a cluster of firewalls.
– The firewalls are configured properly and are not dropping traffic.
– The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology would you recommend to enhance security by limiting traffic that could originate from a
hacker compromising a workstation and redirecting flows at the servers?
A. Access control lists to limit sources of traffic that exits the server-facing interface of the firewall cluster
B. Poison certain subnets by adding static routes to Null0 on the server farm core switches.
C. Unicast Reverse Path Forwarding in strict mode
D. Unicast Reverse Path Forwarding in loose mode
37

What is your design recommendation?

Your enterprise customer has asked where they should deploy flow monitoring in their network to monitor
traffic between branch offices. What is your design recommendation?
A. at the edge of the network so that user traffic will be seen
B. at the central site, because all traffic from the remotes will be seen there.
C. in the core, because all traffic will be seen there
D. in the data center, because all user traffic will be seen there

in this report? (Choose two

As part of a new network design, you are helping the Network Management Team to develop a proactive
report to identify places in the network where problems may happen. The network management tool can poll
the network devices only via SNMP GET operations. Which two threshold-crossing metrics should you include
in this report? (Choose two.)
A. packet loss
B. CPU utilization
C. heat dissipation
D. IP reachability
E. energy consumption
F. link bandwidth utilization


Page 10 of 17« First...89101112...Last »