352-001 Exam - CCDE Written Exam

certleader.com

Q1. Two medium-sized companies recently merged and would like to share their two campus buildings as soon as possible. Employees should be able to sit and work in either building. If the IP addresses in the networks overlap, which virtualization technology could be deployed quickly to achieve the business objective? 

A. MPLS-VPN 

B. VRF-LITE 

C. EoMPLS 

D. L2TPv3 

Answer:

Q2. Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.) 

A. Solution should be resistant to sensor failure. 

B. Solution should allow for stream normalization. 

C. Solution should not impact jitter and latency for voice traffic. 

D. Solution should allow for signature-based pattern matching. 

E. Solution should allow to deny packets inline. 

Answer: ACD 

Q3. You are designing a solution to eliminate the risk of high CPU utilization on a core network composed of CRS-1 devices. Which option would eliminate the risk of high CPU utilization across the network? 

A. Use Local Packet Transport Services (LPTS) to manage hardware SNMP flow rate. 

B. Use the in-band control plane policy feature to reduce the SNMP flow rate. 

C. Use the control plane policy feature and reduce SNMP flow rate. 

D. Use control-plane management-plane in-band and reduce the SNMP flow rate. 

E. Use the control-plane management-plane out-of-band feature to reduce the SNMP flow rate. 

Answer:

Q4. A company plans to include Nonstop Forwarding and Bidirectional Forwarding Detection as a part of their network redundancy plan. In which two ways do NSF and BFD work together when different hardware platforms are compared? (Choose two.) 

A. During supervisor engine or routing engine failover, the NSF feature will always ensure that the BFD at the peer router will not trigger a link down independent of the used hardware platform. 

B. At some hardware platforms, BFD and NSF are not supported together. During supervisor engine or routing engine failover, the BFD at the peer router will trigger a link down. 

C. To ensure that BFD at the peer router will not trigger a link down during NSF, the BFD packets must be processed fast enough, and, during supervisor engine or routing engine failover, by processing the BFD independent from the supervisor engine or routing engine. 

D. Because BFD is always processed at the line cards (not at the supervisor engine or routing engine), a supervisor engine or routing engine failover will not affect the BFD peer router. 

E. Because BFD is always processed at the supervisor engine or routing engine, a supervisor engine or routing engine failover will always trigger a link down at the peer router. 

Answer: BC 

Q5. Currently a service provider provides IPv4 traceroute services between MPLS PE routers. The provider wants to implement IPv6 with MPLS 6PE/6VPE and then provide parallel IPv6 traceroute services between MPLS PE routers. Which two design solutions provide this service? (Choose two.) 

A. The P routers must support ICMPv6. 

B. The PE routers must support ICMPv6. 

C. The P routers must support full IPv6. 

D. The PE routers must support full IPv6. 

Answer: BD 

Q6. You are the lead network designer hired by Service Provider XYZ to deploy CoS functionality on the core MPLS network (P routers). The goal of the network design is to provide a complete CoS solution to all customers that purchase services such as dedicated Internet access, MPLS L3VPN, and L2VPN (pseudowire). Service Provider XYZ has these design requirements: 

The network supports four service queues with equal treatment for delay, jitter, and packet loss. 

Queues are numbered 0-3, where 0 is the default queue. 

Three queues have one treatment. 

One queue has either one or two treatments. 

If your design includes eight CoS queues on the Service Provider XYZ MPLS PE router ingress (CE facing) interface, how will customer traffic be classified as it enters the MLS P routers? 

A. The eight CoS queues in the MPLS P router are remapped to the eight CoS queues. 

B. Traffic is classified on the MPLS PE routers on core facing interface. The DSCP value is mapped into EXP field where multiple EXP settings (2+) will be assigned to a single queue throughout the MPLS P routers. 

C. Discard the traffic from the eight CoS queues that does not match the four CoS queues of the MPLS P routers. 

D. The 8 CoS queues in the MPLS P router are remapped to four 4 flow-label queues. 

Answer:

Q7. You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.) 

A. EIGRP 

B. IS-IS 

C. BGP 

D. static 

E. RIP 

Answer: ABCD 

Q8. Your enterprise customer has asked where they should deploy flow monitoring in their network to monitor traffic between branch offices. What is your design recommendation? 

A. at the edge of the network so that user traffic will be seen 

B. at the central site, because all traffic from the remotes will be seen there. 

C. in the core, because all traffic will be seen there 

D. in the data center, because all user traffic will be seen there 

Answer:

Q9. A company wants to connect two data center sites using a hub-and-spoke design with 2000 remote sites. One design consideration is the requirement to transfer MPLS packets over the public Internet. In addition, one router at each site should be used, and the MPLS packets must be encapsulated inside IP packets because the public Internet cannot transfer native MPLS packets. Which feature can be used to simplify the network design? 

A. GET VPN can be used to encrypt the MPLS packets with IPsec. 

B. DMVPN can be used to build up GRE tunnels dynamically with MPLS encapsulation inside. 

C. L2TPv3 can be used to encapsulate the MPLS packets. 

D. Site-to-site IPsec without GRE can be used to encapsulate the MPLS packets. 

E. PPPoE can be used to encapsulate the MPLS packets. 

Answer:

Q10. What are three key design principles when using a classic hierarchical network model? (Choose three.) 

A. The core layer controls access to resources for security. 

B. The core layer should be configured with minimal complexity. 

C. The core layer is designed first, followed by the distribution layer and then the access layer. 

D. A hierarchical network design model aids fault isolation. 

E. The core layer provides server access in a small campus. 

F. A hierarchical network design facilitates changes. 

Answer: BDF