This page was exported from Lead2pass Dumps For Exam With New Updated Exam Questions [ ] Export date:Wed Oct 23 5:44:14 2019 / +0000 GMT ___________________________________________________ Title: [Lead2pass New] Lead2pass 2017 100% Real 352-001 Exam Questions (341-360) --------------------------------------------------- 2017 October Cisco Official New Released 352-001 Dumps in! 100% Free Download! 100% Pass Guaranteed! Lead2pass is now offering Lead2pass 352-001 dumps PDF and Test Engine with 100% passing guarantee. Buy Lead2pass 352-001 PDF and pass your exam easily. If you want real exam simulation then buy test engine and install on your pc for preparation. Following questions and answers are all new published by Cisco Official Exam Center: QUESTION 341Which three statements are correct for route filtering? (Choose three.) A.    The OSPF router LSA can be filtered with route maps so they are not installed on the OSPF database.B.    Route filtering can create suboptimal routing, thus increasing latency in the network.C.    Inbound route filtering affects outbound traffic flow.D.    By default, EIGRP filters topology information at every hop in the network.E.    IS-IS filters reachability information from the Level 1 to Level 2 domain.F.    By default, EIGRP filters the reachability information at every hop in the network.Answer: BCD QUESTION 342What are three design criteria to consider when you choose how many classes to implement in a DiffServ policy? (Choose three.) A.    service provider support capabilities, which include SLA, PHB, and marking criteriaB.    the ability to group applications and their requirements into classesC.    baseline expectations and projected growth of RSVP sessionsD.    the ability to leverage single-rate and dual-rate token bucket policers for different classesE.    the total queue depth on the corresponding devices in the networkF.    different capabilities in the network to apply PHBs and queue structures, and the ability to map multiple service classes to PHB Answer: ABF QUESTION 343Which three tasks are common network management practices? (Choose three.) A.    Ensure that all network devices have their clocks synchronized.B.    Collect SNMP poll information for future regression analysis.C.    Capture both ingress and egress flow-based packets, while avoiding duplication of flows.D.    Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.E.    Validate data plane health, and application and services availability, with synthetic traffic. Answer: ADE QUESTION 344In a rented office, workers are not assigned to specific cubes. The facility just began to use IEEE 802.1X authentication for the tenants. When workers have previously logged in to a PC, it works correctly, but when they move to another PC that has never been used before, they are unable to log in. Which redesign action will overcome this issue with minimal operational burden? A.    Use machine authentication.B.    Establish a "Bring Your Own Device" portal.C.    Disable and re-enable network authentication when a new worker logs in to a new machine.D.    Enable MAC Authentication Bypass. Answer: A QUESTION 345When designing IP addressing for route summarization, which consideration is true? A.    Summarization can be applied regardless of the network topology if the IP addressing scheme is structured.B.    IP address space assignments should be based on the divisions of the company.C.    Suboptimal routing is commonly caused by the information that is hidden in the summary route.D.    Summary metrics are constant, regardless of the instabilities of the summary components. Answer: C QUESTION 346In a network design, there are three distribution layers and one data center. What are the two main reasons for using a core layer in this design? (Choose two.) A.    The use of a core layer provides Layer 3 capabilities to the campus.B.    The core layer reduces the number of ports that are needed in the distribution layers.C.    The core layer is needed when there are two or more distribution layers that are to be connected.D.    The core layer would fulfill core network functions such as DPI and security policies.E.    The core layer is capable of faster forwarding than any other layer or module in the network. Answer: BC QUESTION 347What are three advantages of using ISATAP? (Choose three.) A.    It is easier to set up than other tunneling mechanisms, such as 6RD and 6to4.B.    It is supported on many platforms, such as Linux, Windows, and Cisco IOS Software.C.    It works with both private and public addressing spaces.D.    It is a point-to-multipoint tunneling mechanism.E.    It does not require any changes on the underlying IPv4 network to operate. Answer: BCE QUESTION 348What are two reasons to choose L2TPv3 over other technologies for a VPN solution? (Choose two.) A.    The VPN solution does not contain MPLS on the network core.B.    The VPN solution should support Frame Relay to Ethernet pseudowire connections.C.    The VPN solution requires multipoint Ethernet LAN service.D.    The VPN solution should be industry-standard. Answer: AD QUESTION 349Company Y is a mobile backhaul provider that uses microwave rings in their network. Which low-cost, simple technology do you recommend to Company Y to ensure the fastest convergence times in a ring topology? A.    sub-second IGP hello and dead timersB.    MPLS Traffic EngineeringC.    Remote Loop-Free AlternateD.    IP Event DampeningE.    hub and spoke with ECMP Answer: C QUESTION 350On a large-scale DMVPN network design, what are two DMVPN characteristics? (Choose two.) A.    DMVPN can interoperate with other vendors' equipment.B.    DMVPN supports multicast replication at the hub.C.    DMVPN supports non-IP protocols.D.    DMVPN supports dynamic partial- or full-mesh tunnels. Answer: BD QUESTION 351What are two design characteristics of GETVPN? (Choose two.) A.    It uses GDOI to distribute keys.B.    It supports private addresses over public Internet.C.    It requires multicast replication at the hub.D.    It uses tunnel-less technology.E.    It supports dynamic partial- or full-mesh tunnels. Answer: AD QUESTION 352A financial services company runs HSRP at the edge of its network to allow for redundancy for the default gateway for its servers. The CTO of the company is concerned that the failover time for HSRP is too slow and a different mechanism should be used. The network engineer disagrees and believes that HSRP can provide the required fast down detection and failover for the edge of the network. Which option is the fastest down detection and failover solution for this HSRP environment? A.    Limit the Layer 2 broadcast domain.B.    Decrease the HSRP timers.C.    Implement BFD.D.    Migrate from IEEE 802.1D to 802.1w.E.    Implement HSRP preemption. Answer: C QUESTION 353The Database team will deploy a new clustering technology that uses IPv4, multicast-based data replication, where the servers listen and transmit at the same time on multiple groups. Multicast is not being run on the current network and there are no plans to enable it. New Layer 2 switches will be purchased to connect new servers in order to keep multicast traffic off the existing network. Which two features should the new switches support to provide good multicast performance? (Choose two.) A.    IGMP snoopingB.    PIM snoopingC.    MLD snoopingD.    IGMP querierE.    Bidirectional PIM Answer: AD QUESTION 354In a routed access hierarchical campus design, the access-to-distribution Layer 2 uplink trunks are replaced with Layer 3 point-to-point routed links. Why is it recommended that VLANs are confined on a single access switch rather than span across multiple access switches? A.    to allow for better convergence timeB.    to prevent the occurrence of Layer 2 loopsC.    to allow for fault isolationD.    to prevent routing black holes Answer: D QUESTION 355Which two mechanisms can anycast RPs use to share multicast state information with other RPs? (Choose two.) A.    MSDPB.    PIM anycast RP setsC.    IGMPv3D.    MLDE.    static mroutes Answer: AB QUESTION 356Which technique can be used to deploy IPv6 services in an IPv4-only routed backbone network? A.    NAT64 at the peering locationsB.    6PE in the backbone networkC.    6RD on CE routers and 6RD border relays at the peering locationsD.    dual-stack lite and NAT44 at the peering locations Answer: C QUESTION 357The network architect wants to reduce the OSPF database in the network by using summarization techniques. In which two places in the network can summarization be applied to maximum effect? (Choose two.) A.    on the OSPF links of all ABR routersB.    on the OSPF links of all ASBR routersC.    on the OSPF links of all backbone routersD.    on the routing process of all ABR routersE.    on the routing process of all ASBR routersF.    on the routing process of all backbone routers Answer: DE QUESTION 358You are auditing the network design of a PIM BiDir multicast network. Which option is the most appropriate multicast group source discovery design consideration for this design? A.    A phantom RP advertises the multicast group sources.B.    Source discovery is not applicable to PIM BiDir.C.    Subscribers discover the multicast group sources via DNS.D.    Subscribers are statically configured with specific sources.E.    MSDP is used to discover multicast group sources. Answer: B QUESTION 359To improve the stability of the network and protect it from intrusions, you must design control plane security. Which two features should you enable as part of this design? (Choose two.) A.    SNMP securityB.    uRPFC.    IPsecD.    IP receive ACLE.    control plane policingF.    role-based CLI access Answer: DE QUESTION 360You are a network designer who must fine tune the convergence of an IS-IS network. The failure detection mechanism has been addressed with reliable loss-of-signal at the interface level. Which three other tools or techniques should be employed to achieve your requirements? (Choose three.) A.    Use prefix prioritization techniques.B.    Use BFD on point-to-point links.C.    Speed up LSP generation.D.    Disable LDP-IGP synchronization.E.    Speed up the initial link state computation.F.    Eliminate the time that the overload bit is advertised to neighbors. Answer: ACE Now we are one step ahead in providing updated real exam dumps for 352-001. We provide 100% 352-001 exam passing guarantee as we will provide you same questions of 352-001 exam with their answers. Our Cisco 352-001 new questions are verified by experts. 352-001 new questions on Google Drive: 2017 Cisco 352-001 exam dumps (All 510 Q&As) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-10-19 09:08:36 Post date GMT: 2017-10-19 09:08:36 Post modified date: 2017-10-19 09:08:36 Post modified date GMT: 2017-10-19 09:08:36 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from