PrepAway - Latest Free Exam Questions & Answers

Category: 352-001

352-001-Cisco Certified Design Expert Qualification Exam

deploying VSS? (Choose three

61

Refer to the exhibit.

When designing an MPLS-based LAN extension between DC-1 and DC-2, what are three advantages of
deploying VSS? (Choose three.)
A. Layers 2, 3, and 4 flow-based load balancing
B. native VSS and MEC failover without using scripts
C. sub-second failover
D. required to configure VPLS
E. failover time depends on Cisco IOS EEM and STP convergence
F. limited VLAN-based VPLS traffic hashing

interface, how will customer traffic be classified as it enters the MLS P routers?

You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core
MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all
customers that purchase services such as dedicated Internet access, MPLS L3VPN, and L2VPN (pseudowire).
Service Provider XYZ has these design requirements:
– The network supports four service queues with equal treatment for delay, jitter, and packet loss.
– Queues are numbered 0-3, where 0 is the default queue.
– Three queues have one treatment.
– One queue has either one or two treatments.
If your design includes eight CoS queues on the Service Provider XYZ MPLS PE router ingress (CE facing)
interface, how will customer traffic be classified as it enters the MLS P routers?
A. The eight CoS queues in the MPLS P router are remapped to the eight CoS queues.
B. Traffic is classified on the MPLS PE routers on core facing interface. The DSCP value is mapped intoEXP
field where multiple EXP settings (2+) will be assigned to a single queue throughout the MPLS P routers.
C. Discard the traffic from the eight CoS queues that does not match the four CoS queues of the MPLS P
routers.
D. The 8 CoS queues in the MPLS P router are remapped to four 4 flow-label queues.

service provider, which QoS policy should be recommended?

You are tasked to design a QoS policy for a service provider so they can include it in the design oftheir MPLS
core network. If the design must support an MPLS network with six classes, and CEs will be managed by the
service provider, which QoS policy should be recommended?
A. map DSCP bits into the Exp field
B. map IP precedence bits into the DSCP field
C. map flow-label bits into the Exp field
D. map IP CoS bits into the IP Precedence field
E. map IP ToS bits into the Exp field

access) network hierarchy?

How should multiple OSPF areas be designed when deployed on a classic three-layer (core/distribution/
access) network hierarchy?
A. The OSPF flooding domain boundary should be at the edge of the core layer.
B. The OSPF flooding domain boundary should be within the distribution layer.
C. OSPF should generally be deployed in a three-layer domain hierarchy to align with the physical three-layer
hierarchy.
D. OSPF flooding domain boundaries should be placed with route aggregation in mind.

QoS is implemented properly? (Choose two

You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP
QoS is implemented properly? (Choose two.)
A. Differentiated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the
resources end to end before sending the data
B. Integrated Services, where the user, with the assistance of the RSVP signaling protocol, reserves the
resources end to end before sending the data
C. Integrated Services, which relies on the information carried within each packet.

resource-allocation decisions at each network node
D. Differentiated Services, which relies on the information carried within each packet to make resource-allocation decisions at each network node
E. Integrated Services, where the user, with the assistance of the DSCP signaling protocol, reserves the
resources end to end before sending the data

What is a key role for the access layer in a hierarchical network design?

What is a key role for the access layer in a hierarchical network design?
A. The access layer provides a security, QoS, and policy trust boundary.
B. The access layer provides an aggregation point for services and applications.
C. The access layer serves as a distribution point for services and applications.
D. The access layer can be used to aggregate remote users.


Page 5 of 17« First...34567...10...Last »