Sep/2020 Latest Braindump2go 352-001 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 352-001 Real Exam Questions!
A large retail bank is designing a unified communications solution to be deployed to its 200 branches. Its current network traffic consists of a web-based portal, Internet browsing, and general file server access. Each branch has between 15 and 20 users. The current WAN is based on Layer 3 MPLS and the customer manages its own CE routers. The WAN circuit interface to the service provider is Gigabit Ethernet, although the MPLS service that is contracted from the service provider is 10 Mb/s. The design is to use a DSCP-based four-class QoS policy to manage traffic demands. From the options below, which two QoS design options that should be implemented on the customer side will meet the requirement? (Choose two.)
A. Shape traffic to 10 Mb/s on the CE router.
B. Police traffic to drop outbound traffic that exceeds 10 Mb/s.
C. Classify DSCP value EF for call signaling and voice packets, and place traffic in a strict priority queue.
D. Priority queue traffic to demand up to 80% of total bandwidth.
E. Enable DSCP-based WRED on all AF classes.
What is the definition of the FCAPS framework?
A. an ISO framework that establishes a model for network management and contains guidelines for managing objects, the management database, and the application entity
B. a five-volume framework for service management that covers design, transition, and delivery of service, and from which the ISO 20000 was developed
C. a series of tools for process improvement that uses statistical methods to reduce defects in processes and manufacturing
D. a framework for enterprise architecture that provides a comprehensive approach for designing, planning, implementing, and governing an enterprise information architecture
E. a framework for enterprise IP Address Management (IPAM) based on the IANA trusted IP lease allocation scheme
What are three tools for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)
A. active monitoring via synthetic probes to measure loss, latency, and jitter
B. passive monitoring via synthetic probes to measure loss, latency, and jitter
C. flow-based analysis to measure bandwidth mix of applications and their flows
D. flow-based analysis with PTP time-stamping to measure loss, latency, and jitter
E. call management analysis to identify CAC failures and call quality issues
In an MPLS-based network, there is a link that constantly flaps. This flapping makes the network constantly reconverge and causes it to become unstable. Which two technologies can be deployed to resolve the design failure? (Choose two.)
A. IP Event Dampening
C. Carrier Delay
D. IP Routing Protocol Route Purge
Refer to the exhibit. This OSPF network has just been deployed with four areas, but the hub-and-spoke area frequently flaps. You must fix this design failure. Which two reasons describe why the implementation of link-state summarization will minimize the effect of the instability in this network? (Choose two.)
A. It lowers CPU utilization on ABR routers.
B. It allows for a more scalable network.
C. It separates the data center area from the hub-and-spoke area.
D. It runs a partial SPF on the campus area when any link of the hub-and-spoke flaps.
E. It minimizes the number of prefixes that are advertised to other areas.
While designing a security solution, which three requirements would make you decide to deploy an IPS sensor in inline mode? (Choose three.)
A. The solution should be resistant to sensor failure.
B. The solution should allow for stream normalization.
C. The solution should not impact jitter and latency for voice traffic.
D. The solution should allow for signature-based pattern matching.
E. The solution should allow denying packets inline.
Refer to the exhibit. Assume that no multicast optimization is done on LAN switches A and B. Which two features can be used to optimize multicast traffic forwarding in this situation? (Choose two.)
A. Enable IGMP snooping querier on both switches.
B. Configure a static MAC entry for the multicast server.
C. Disable IGMP snooping on both switches.
D. Disable the IGMP query election process.
E. Enable PIM snooping on both switches.
Refer to the exhibit. You are designing an MPLS network with Layer 3 VPNs, where the traffic path must be the same in both directions inside the MPLS network to ensure that symmetric routing occurs. The sites are connected to two PE routers. Which two design considerations will allow you to achieve this symmetric routing? (Choose two.)
A. When MPLS TE is used, the bidirectional TE tunnel automatically provides symmetric routing.
B. The MPLE TE tunnels should be set up in both directions so that the same path is used.
C. There should not be any equal cost paths for IGP inside the MPLS backbone, the IGP routing should use the same path in both directions, and the BGP routing does not matter.
D. There should not be any equal cost paths for BGP inside the MPLS backbone, the BGP routing should use the same path in both directions, and the IGP routing does not matter.
E. There should not be any equal cost paths for the IGP and the BGP inside the MPLS backbone, and both IGP and BGP routing should use the same path in both directions.
You are designing an IEEE 802.1X solution for a customer, where the network supports a large number of IP phones and printers. You plan to configure MAC address bypass for the phones and printers. What is your primary design and security concern?
A. the additional AAA traffic on the network
B. the placement of the AAA server
C. the potential of MAC address spoofing
D. the scaling of the MAC address database
When you design a network that uses IPsec, where can you reduce MTU to avoid network fragmentation?
A. on both ends of the TCP connection
B. on the side closest to the client
C. on the side closest to the server
D. in the WAN
What is a characteristic of traffic shaping?
A. It minimizes traffic transmission intervals.
B. It remarks excess packets above the committed rates.
C. It delays and can drop excess traffic.
D. It classifies traffic based on certain characteristics.
What is the purpose of dynamically created tunnels using IPv6 multicast?
A. multicast source registration to the RP
B. bypass of the RPF check to the RP
C. transport of all IPv6 multicast traffic to the RP
D. first-hop router registration to the RP
Which ISAKMP feature could be used within your design recommendation to reduce device CPU load in a small scale setup for known active ISAKMP security associations?
A. main mode
C. Dead Peer Detection (DPD)
D. Security Parameter Index (SPI)
Acme Corporation wants to minimize the risk of users plugging unauthorized switches and hubs into the network. Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)
A. BPDU Guard
C. Loop Guard
D. Root Guard
Which two OSPF network type combinations can you use in the design of a Phase 3 DMVPN that requires spoke-to-spoke direct traffic? (Choose two.)
A. hub as point-to-multipoint and spokes as non-broadcast
B. hub as point-to-multipoint and spokes as point-to-point
C. hub as broadcast and spokes as non-broadcast
D. hub as point-to-point and spokes as point-to-point
Which mechanism can you use to improve network performance over PPPoE, IPsec, and GRE networks?
A. Path MTU Discovery
B. Simple Service Discovery Protocol
C. ICMP Router Discovery Protocol
D. Bidirectional Forwarding Detection
1.2020 Latest Braindump2go 352-001 Exam Dumps (PDF & VCE) Free Share:
2.2020 Latest Braindump2go 352-001 PDF and 352-001 VCE Dumps Free Share:
3.2020 Free Braindump2go 352-001 PDF Download:
Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!