2017/July New Cisco 352-001 Exam Dumps with PDF and VCE Updated in www.Braindump2go.com  Today for Free Download!
100% Real Exam Questions! 100% Exam Pass Guaranteed!

1.|2017 New 352-001 Exam Dumps (PDF & VCE) 499Q&As Download:
http://www.braindump2go.com/352-001.html

2.|2017 New 352-001 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/0B75b5xYLjSSNSUNBNi1aYkpfOTQ?usp=sharing

QUESTION 101
Which two features can be used to extend VRFs across a campus? (Choose two.)

A.    802.1q trunks
B.    LDP
C.    MPLS TE
D.    GRE
E.    port channels

Answer: AD

QUESTION 102
You are asked to design a large campus network that will be using multicast for data transport. Which feature should be enabled at the Layer 2 access edge for host-only ports?

A.    PortFast
B.    BPDU guard
C.    PIM-SM
D.    PIM query interval

Answer: A

QUESTION 103
After the recent implementation of a new design that incorporated GRE tunnels into the network, the network operations staff is seeing the following syslog message in multiple routers on the network – %TUN-5-RECURDOWN: Tunnel0 temporarily disabled due to recursive routing.
From a design perspective, what was not taken into account prior to implementing the solution?

A.    The neighboring routers cannot respond within the specified hold time.
B.    The interface on the router that is the source of the tunnel is down.
C.    The interface on the neighboring router that is the source of the tunnel is down.
D.    The router is learning the route to the tunnel destination address using the tunnel interface.
E.    The tunnel interface on the router is not receiving any keepalives within the specified hold time.

Answer: D

QUESTION 104
A company plans to establish a new network using Cisco Catalyst switches for its multicast applications. What is the disadvantage when two multicast applications are using the multicast IP addresses 234.17.4.5 and 234.145.4.5 inside the same network?

A.    Multicast packets from both applications are flooded to all Layer 2 ports in a segment where a
multicast receiver is located.
B.    Multicast packets from both applications are flooded to ports where one multicast receiver from
one application is located.
C.    Only one multicast stream is received at the port where the receivers from both applications are located.
D.    Both multicast senders will always receive the multicast packets from the other multicast application.
E.    The routers doing PIM-SM cannot distinguish between the two multicast applications.

Answer: B

QUESTION 105
Which design concern should be accounted for in all Layer 3 virtualization technologies?

A.    Layer 3 redundancy
B.    packet sizing
C.    application usage
D.    Layer 3 stability

Answer: B

QUESTION 106
A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365?

A.    224.0.0.60
B.    232.192.0.60
C.    239.128.0.60
D.    239.193.0.60

Answer: D

QUESTION 107
Refer to the exhibit. You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.)
 

A.    When router B fragments packets after the encryption, router C must reassemble these fragmented
packets.
B.    When router B fragments packets before the encryption, router C must reassemble these fragmented
packets.
C.    When router B fragments packets after the encryption, the endpoint 2 must reassemble these
fragmented packets.
D.    When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented
packets.
E.    When router A fragments packets, router C must reassemble these fragmented packets.
F.    When router A fragments packets, endpoint 2 must reassemble these fragmented packets.

Answer: ADF

QUESTION 108
When a design calls for spanning VLANs across a campus network, what are two issues that need to be addressed in the design? (Choose two.)

A.    network convergence
B.    network accessibility
C.    fault isolation
D.    application scalability
E.    user experience

Answer: AC

QUESTION 109
Which two aspects are considered when designing a dual hub, dual DMVPN cloud topology? (Choose two.)

A.    recommended for high availability
B.    requires all sites to have dual Internet connections
C.    spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly
D.    hub sites must connect to both DMVPN clouds
E.    will only work with single-tier headend architecture

Answer: AE

QUESTION 110
When creating a network design, which one of these options provides for basic Layer 2 client isolation to prevent broadcast traffic exposure?

A.    SVI
B.    VLAN
C.    routed port
D.    edge port

Answer: B

QUESTION 111
When adding an IPSec headend termination device to your network design, which two performance indicators are the most accurate to determine device scalability? (Choose two.)

A.    CPU capabilities
B.    bandwidth capabilities
C.    packets per second capabilities
D.    maximum tunnel termination capabilities

Answer: CD


!!!RECOMMEND!!!

1.|2017 New 352-001 Exam Dumps (PDF & VCE) 499Q&As Download:
http://www.braindump2go.com/352-001.html

2.|2017 New 352-001 Study Guide Video:
https://youtu.be/mTLcNm1jZow