Surf the internet and cease at the greatest Cisco Cisco website-Examcollection.com. Find the best Cisco 352-001 exam preparation materials. Try the easier and safer way to 352-001 certification exam. Your 352-001 exam is one of the Cisco certification exam. Examcollection has the most accurate and logical Cisco 352-001 practice Q&As that happen to be similar to the genuine test. The Cisco Cisco exam dumps can help you pass the Cisco exam at first attempt.

2021 Mar 352-001 question

Q81. If a network design must support rapid convergence on half-duplex interfaces, which IEEE 802.1w capability should be used? 

A. root guard 

B. proposal-agreement handshake 

C. loop guard 

D. UplinkFast 

Answer:


Q82. You are designing a NAC OOB Layer 3 Real-IP Gateway deployment for a customer. Which VLAN must be trunked back to the Clean Access Server from the access switch? 

A. untrusted VLAN 

B. user VLAN 

C. management VLAN 

D. authentication VLAN 

Answer:


Q83. ACME Corporation is integrating IPv6 into their network, which relies heavily on multicast distribution of data. Which two IPv6 integration technologies support IPv6 multicast? (Choose two.) 

A. 6VPE 

B. 6PE 

C. dual stack 

D. ISATAP 

E. 6to4 

F. IPv6INIP 

Answer: CF 


Q84. A Mobile Service Provider would like to design and deploy an Ethernet service which has similar physical link failover/failback characteristics on the active/backup links as the APS/MSP SONET properties. Which Layer 2 services should be considered to address this design feature? 

A. Port-Channel 

B. MLPPP 

C. Flex Link 

D. Ethernet Pseudowires 

Answer:


Q85. Which two options are two advantages of summarizing networks at the aggregation layer rather than at the core? (Choose two.) 

A. It prevents the core from having unnecessary routes. 

B. It no longer needs a core layer. 

C. It prevents black hole routing. 

D. It avoids network-wide impact upon VLAN changes local to the aggregation devices. 

Answer: AD 


Renovate 352-001 testing engine:

Q86. Refer to the exhibit. 

You are asked to design this OSPF network to converge within 60 ms for unicast packets after a topology change due to a single link failure. Which technology can be enabled while conforming to the design requirements? 

A. Loop-Free Alternates 

B. BFD 

C. IGP neighbor timer tuning 

D. IGP SPF timer tuning 

E. RSVP-TE Fast Reroute 

Answer:


Q87. When designing a network, which two security features should be added to the design to protect hosts from potential IPv6 neighbor discovery denial of service attacks at the access layer? (Choose two.) 

A. SEND 

B. RA Guard 

C. IKEv2 

D. IPsec 

E. DMVPNv6 

Answer: AB 


Q88. An IBGP mesh design is being scoped, and in the discussions, one of the design engineers proposes the use of route reflectors. Which limitation is valid when using route reflectors in this design? 

A. The configuration complexity on the routers will be increased. 

B. Route reflectors will limit the total number of routes in the topology. 

C. Multipath information is difficult to propagate in a route reflector topology. 

D. Route reflectors will cause an opportunity to create routing loops. 

Answer:


Q89. Refer to the exhibit. 

You are planning the design of an encrypted WAN. IP packets will be transferred over encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-byte IP packets to endpoint 2, in what three ways will the network design handle the fragmentation in three different possible network configurations? (Choose three.) 

A. When router B fragments packets after the encryption, router C must reassemble these fragmented packets. 

B. When router B fragments packets before the encryption, router C must reassemble these fragmented packets. 

C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets. 

D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets. 

E. When router A fragments packets, router C must reassemble these fragmented packets. 

F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets. 

Answer: ADF 


Q90. Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.) 

A. Solution should be resistant to sensor failure. 

B. Solution should allow for stream normalization. 

C. Solution should not impact jitter and latency for voice traffic. 

D. Solution should allow for signature-based pattern matching. 

E. Solution should allow to deny packets inline. 

Answer: ACD