PrepAway - Latest Free Exam Questions & Answers

Category: 352-001

352-001-Cisco Certified Design Expert Qualification Exam

paths during a single-failure incident as well as during normal operation?

Refer to the exhibit.

In this network design, where should summarization occur to provide the best summarization and optimal
paths during a single-failure incident as well as during normal operation?
A. a single identical summary for all the branch offices placed on routers 1A, 1B, 2A, and 2B
B. two summaries on 1A and 1B, and two summaries on 2A and 2B
C. a single identical summary on 3A and 3B
14

D. a single summary on each aggregation device for the branches connected to them

When you design a network, when would it be required to leak routes into a Level 1 area?

When you design a network, when would it be required to leak routes into a Level 1 area?
A. when a multicast RP is configured in the nonbackbone area
B. when MPLS L3VPN PE devices are configured in the Level 1 areas
C. when equal cost load balancing is required between the backbone and nonbackbone areas
D. when unequal cost load balancing is required between the backbone and nonbackbone areas

Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose

Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose
three.)
A. aggregate routing information on an OSPF ABR
B. fully meshed distribution layer
C. Equal-Cost Multipath routing
D. EIGRP query boundaries
E. multiple IS-IS flooding domains
F. tuned Spanning Tree Protocol timers

What are three key design principles when using a classic hierarchical network model? (Choose three

What are three key design principles when using a classic hierarchical network model? (Choose three.)
A. The core layer controls access to resources for security.
B. The core layer should be configured with minimal complexity.
C. The core layer is designed first, followed by the distribution layer and then the access layer.
D. A hierarchical network design model aids fault isolation.
E. The core layer provides server access in a small campus.
F. A hierarchical network design facilitates changes.

What are two design advantages to using virtual port channel? (Choose two

What are two design advantages to using virtual port channel? (Choose two.)
A. enhanced system availability through multiple systems
B. reduced Spanning Tree Protocol convergence time
C. loop management without use of Spanning Tree Protocol
D. ability to use Spanning Tree Protocol blocked ports to forward traffic
E. enhanced ability to recover from Spanning Tree Protocol changes

What can the customer do so that multicast traffic is NOT flooded to all sites?

A customer is using a service provider to provide a WAN backbone for a 30-site network. In establishing the
network, the customer must work within these constraints:
– The customer has a self-managed MPLS backbone.
– The VPLS WAN backbone of the service provider does not support PIM snooping.
– Multicast VPN must be used for multicast support inside some VRFs.
What can the customer do so that multicast traffic is NOT flooded to all sites?
A. Configure static GRE tunnels and run the MPLS and multicast VPN inside these GRE tunnels.
B. Use Label Switched Multicast for the multicast transport.
C. Use PIM-SSM as the multicast routing protocol with IETF Rosen Draft multicast VPN.
D. Configure a static mapping between multicast addresses and MAC addresses.
E. Use GET VPN to encrypt the multicast packets inside the WAN.

What impact will their choice have on the existing multicast design?

A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1
multicast group to stream the video to users. They want to know if this choice will impact the existing multicast
design. What impact will their choice have on the existing multicast design?
A. Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the
CPU and hostswill be sent by the routers in the network.
B. Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group
updates that will have to be processed by the CPU and hosts.
C. The multicast application sends too many packets into the network and the network infrastructure drops
packets.
D. The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent
to the CPU and flooded out all ports.

connectivity within the service provider network?

You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ alink-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2
connectivity within the service provider network?
A. The routers will immediately lose their adjacencies and converge.
B. The routing protocol will not converge until the hold timers have expired.
C. The switch ports connected to the router will go down and the routers will immediately converge.
D. The VLAN on the switches will go inactive, the ports associated on the switch will go down, and the routers
will immediately converge.


Page 15 of 17« First...10...1314151617