Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCDE > 352-011

352-011 Cisco Certified Design Expert Practical Exam Question and Answers

Question # 4

As part of network design, two geographically separated data centers must be interconnected using Ethernet-over-MPLS pseudowire. The link between the sites is stable, the topology has no apparent loops, and the root bridges for the respective VLANs are stable and unchanging. Which aspect must be the part of the design to mitigate the risk of connectivity issues between the data centers?

A.

Enable Spanning Tree on one data center, and Rapid Reconfiguration of Spanning tree on the other

B.

Ensure that the spanning tree diameter for one or more VLANs is not too large.

C.

Enable UDLD on the link between the data centers.

D.

Enable root guard on the link between the data centers.

Full Access
Question # 5

What are two benefits of following a structured hierarchical and modular design? (Choose two.)

A.

Each component can be designed independently for its role.

B.

Each component can be managed independently based on its role.

C.

Each component can be funded by different organizations based on its role.

D.

Each component can support multiple roles based on the requirements.

E.

Each component can provide redundancy for applications and services.

Full Access
Question # 6

Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement?

A.

Modular QoS CLI

B.

committed access Rate

C.

policy-based routing

D.

traffic shaping

Full Access
Question # 7

Which two options are considered risks or concerns when both the Internet and VPN service functions are on the same PE router? (Choose two.)

A.

Internet-based attacks can affect VPN customers.

B.

BGP cannot simultaneously run on the PE router that runs MPLS.

C.

MP-BGP prefixes increase routers' global routing tables, which affects network convergence.

D.

Failure on the PE router affects both VPN and Internet services.

E.

Customer performance can be affected by VPN traffic if Internet-based traffic is not prioritized on the PE

Full Access
Question # 8

A data center deign requires monitoring of their business critical voice and video services accessed by remote locations. Which two items are applicable? (Choose two)

A.

If multiple applications share the same DSCP or CoS values, NBAR can be utilized

B.

The applications being monitored must be assigned a unique CoS value

C.

If multiple applications share the same the same DSCP or CoS values, IPFIX can be utilized

D.

The applications being monitored must be assigned a unique QoS profile

E.

The applications being monitored must be assigned unique DSCP values

F.

The reporting data must be assigned to a QoS profile to ensure accurate statistics

Full Access
Question # 9

Which three processes are part of the ITILv3 Service Operation? (Choose three)

A.

Release and deployment management

B.

Problem management

C.

Incident management

D.

Event management

E.

Service-level management

F.

Change management

Full Access
Question # 10

An enterprise campus is adopting a network virtualization design solution with these requirements

ï‚· It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

ï‚· It must maintain end-to-end logical path transport separation across the network

ï‚· resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

A.

Path isolation

B.

Session isolation

C.

Group virtualization

D.

Services virtualization

E.

Edge isolation

Full Access
Question # 11

A data center provider has designed a network using these requirements

ï‚· Two data center sites are connected to the public internet

ï‚· Both data centers are connected to different Internet providers

ï‚· Both data centers are also directly connected with a private connection for the internal traffic can also be at this direct connection The data center provider has only /19 public IP address block

Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connections fails to complete traffic for both data centers should be routed by using the remaining Internet connection in which two ways can this routing be achieved? (Choose two)

A.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the /20 block from the remote data center is sent out with path prepending at both sites

B.

One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining internet connection

C.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference of both sites

D.

BGP will always load-balance the traffic to both data center sites

E.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the /20 block from the remote data center is sent out with a higher BGP weight at both sites

F.

The data center provider must have an additional public IP address block for this routing

Full Access
Question # 12

Which two options describe the advantages of using DWDM over traditional optical networks? (Choose two)

A.

Inherent topology flexibility with intelligent chromatic dispersion

B.

Inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

C.

Inherent topology flexibility with built-in service protection

D.

Inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

E.

Ability to expand bandwidth over existing optical infrastructure

Full Access
Question # 13

ACME Corporation is integrating IPv6 into their network, which relies heavily on multicast distribution of data. Which two IPv6 integration technologies support IPv6 multicast? (Choose two.)

A.

6VPE

B.

6PE

C.

dual stack

D.

ISATAP

E.

6to4

F.

IPv6INIP

Full Access
Question # 14

Which two SAN designs appropriate to support large-scale SAN environments? (Choose two)

A.

Edge-core-edge design

B.

Fibre Channel forwarder

C.

Split fabric design

D.

Core-edge design

E.

Dual fabric design

Full Access
Question # 15

A financial trading organization plans to monitor the network latency for multicast data feeds on a hop-by-hop basis. Which technology should be added to their design to support this requirement?

A.

SPAN

B.

NBAR

C.

IPFIX

D.

Precision Time Protocol

Full Access
Question # 16

What is a design application of control plane policing?

A.

CPP protects the control plane from reconnaissance and or denial-of-service attacks

B.

CPP protects the forwarding plane by rate –limiting excessive routing protocol traffic

C.

CPP protects the forwarding plane by allowing legitimate traffic and dropping excessive traffic

D.

CPP drop malformed packet that are sent to the CPU

Full Access
Question # 17

You are implementing a one-to-many multicast solution for a large service provider network. Which technology offers optimal routing of multicast traffic?

A.

PIM sparse mode

B.

PIM SSM

C.

Anycast RP

D.

MSDP

E.

Bidirectional PIM.

Full Access
Question # 18

Which design benefit of Bridge Assurance is true?

A.

It prevents switched traffic from traversing suboptimal paths on the network.

B.

It prevents switched loops caused by unidirectional point-to-point, link condition on Rapid PVST+ and MST

C.

It allows small unmanaged switches to be plugged into ports of access scenes without the risk of switch loops.

D.

It suppresses a spanning-tree topology change upon connecting and disconnecting a station on a port.

Full Access
Question # 19

A company would like to distribute a virtual machine (VM) hosting cluster between three data centers with the capability to move VMs between sites. The connectivity between data centers is IP only and the new design should use the existing WAN. Which Layer 2 tunneling technology do you recommend?

A.

AToM

B.

L2TPv3

C.

OTV

D.

VPLS

Full Access
Question # 20

Drag and drop the design characteristics of GET VPN from the left to the right. Not all options are used.

Full Access
Question # 21

You are consultant network designer for a large GET VPN deployment for a large bank with International coverage. Between 1800 and 2000 remote locations connect to the central location through four hubs using an MPLS backbone and using two keys servers. The bank is concerned with security and replay attacks. Which two actions should you use to tune the GET VPN to meet the bank requirements? (Choose two)

A.

Increase the cryptographic key size.

B.

Replace unicast rekey with multicast rekey.

C.

Reduce the SAR clock interval duration

D.

Increase the TEK and KEK lifetime.

E.

Reduce the Dead Peer Detection periodic timer.

Full Access
Question # 22

Refer to the exhibit.

Which data format is used in this REST API call?

A.

JSON

B.

HTMLv5

C.

HTML

D.

XML

E.

BASH

Full Access
Question # 23

Which reason prevents a designer from using a GDOI-based VPN to secure traffic that traverses the Internet?

A.

Enterprise host IP addresses are typically not routable.

B.

GDOI is less secure than traditional IPsec.

C.

Network address translation functions interfere with tunnel header preservation.

D.

The use of public addresses is not supported with GDOI.

Full Access
Question # 24

Refer to the exhibit.

Assume that no multicast optimization is done on LAN switches A and B. Which two features can be used to optimize multicast traffic forwarding in this situation? (Choose two.)

A.

Enable IGMP snooping querier on both switches.

B.

Configure a static MAC entry for the multicast server.

C.

Disable IGMP snooping on both switches.

D.

Disable the IGMP query election process.

E.

Enable PIM snooping on both switches.

Full Access
Question # 25

A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?

A.

Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.

B.

Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.

C.

The multicast application sends too many packets into the network and the network infrastructure drops packets.

D.

The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.

Full Access
Question # 26

Refer to the exhibit.

A new IPv4 multicast-based video-streaming service is being provisioned. During the design-validation tests, you realize that the link between the two buildings is carrying multicast traffic even when there are no receivers connected to the switch in Building B and despite IGMP snooping being enabled on both Layer 2 switches and IGMPv2 runs on the hosts. Which design change will prevent the multicast traffic from being unnecessarily flooded throughout the campus network?

A.

Enable PIM snooping on both Layer 2 switches.

B.

Enable multicast storm control on the link between Switch 1 and Switch 2.

C.

Use static Layer 2 MAC forwarding entries on Switch 1.

D.

Change the IPv4 multicast group address such that it excludes the usage of link-local MAC addresses.

E.

Ensure that Switch 1 is an IGMP querier.

Full Access
Question # 27

Drag and drop the NETCONF layers on the left onto their appropriate description on the left.

Full Access
Question # 28

Which two options are two advantages of summarizing networks at the aggregation layer rather than at the core? (Choose two.)

A.

It prevents the core from having unnecessary routes.

B.

It no longer needs a core layer.

C.

It prevents black hole routing.

D.

It avoids network-wide impact upon VLAN changes local to the aggregation devices.

E.

it allows for optimal routing

Full Access
Question # 29

In a VPLS design solution, which situation indicates that BGP must be used instead of LDP in the control plane?

A.

MAC address learning scales better through BGP

B.

BGP supports VPLS interworking

C.

Pseudowire configuration overhead is reduced

D.

There are no full-mesh pseudowire due to the route reflection feature of BGP

Full Access
Question # 30

You are designing an IPv4 any source multicast redundancy solution. Which technology ensures the quickest RP convergence?

A.

Bootstrap router

B.

MSDP anycast RP

C.

Auto-RP

D.

Embedded RP

Full Access
Question # 31

Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

A.

Transmit delay

B.

Throttle timer

C.

SPF hold time

D.

Interface dampening

Full Access
Question # 32

In a design around fast convergence in case of a link failure, what is the justification for using a point-to-point OSPF network type on the Ethernet links between leaf-and-spine switches on a data center fabric?

A.

Link failure tears down neighbor relationships regardless of network type configured

B.

Type 1 LSAs are not generated on a point-to-point network type

C.

Adjacencies can be built faster without a DR/BDR on the segment

D.

The fabric memory requirements are significantly smaller than with a DR/BDR on each leaf and spine segment

E.

The point-to-point network type allows for NSF to be used in this design

Full Access
Question # 33

A customer requests that you determine how much of their remote branch traffic into a central data center is related to a call manager that resides in the data center. Which solution do you recommend?

A.

Enable NetFLow on branch routers

B.

Enable netFlow on central data center routers

C.

Perform SNMP polling of central data center routers

D.

Perform SNMP polling of branch routers

E.

Create an ACL on the local call manager switch with logging enabled

F.

Span traffic from the switch port on the call manager to a data analyzer

Full Access
Question # 34

Which three different behaviors must a network designer expect when bidirectional PIM is used instead of PIM Sparse Mode? (Choose three)

A.

The source IP addresses from the multicast senders cannot be seen in the multicast routing table

B.

The RPF check does not prevent routing loops when bidirectional PIM is used

C.

Many possible rendezvous point can be used for bidirectional PIM as compared to PIM Sparse Mode

D.

PIMv2 BSR is not supported with bidirectional PIM

E.

The join messages to join a bidirectional PIM multicast group are different compared to PIM-SM

F.

No rendezvous point is required when bidirectional PIM is used

G.

Auto-RP is not supported with bidirectional PIM

Full Access
Question # 35

Which two functions are performed at the core layer of the three-layer hierarchical network design model? (Choose two).

A.

Fault isolation

B.

Qos classification and marking boundary

C.

Fast transport

D.

Reliability

E.

Load balancing

Full Access
Question # 36

You are designing the QoS features for a large enterprise network that includes DMVPN. In which situation should you use the QoS pre-classify feature?

A.

When you are marking packets with the ToS bits

B.

When the QoS policy cannot be based on DSCP bits

C.

When you are marking packets with the DSCP bits

D.

When your service provider requires the DSCP bits be set

Full Access
Question # 37

You are designing a new data center network. Drag and drop new data center requirements on the left into the appropriate design principle on the right.

Full Access