Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 352-011 - Cisco Certified Design Expert Practical Exam

Page: 7 / 8
Total 249 questions

Which two options describe the advantages of using DWDM over traditional optical networks? (Choose two)

A.

Inherent topology flexibility with intelligent chromatic dispersion

B.

Inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

C.

Inherent topology flexibility with built-in service protection

D.

Inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

E.

Ability to expand bandwidth over existing optical infrastructure

Which two options are Loop-Free Alternate design considerations? (Choose two)

A.

MPLS TE must be enabled because it is used for building the backup paths

B.

Backup coverage and effectiveness is dependent on the network topology

C.

It can simplify the capacity planning by matching the backup path with the post-convergence path

D.

It provides an optional backup path by avoiding low bandwidth and edge links

E.

It can impact SLA-sensitive appliance by routing traffic to low bandwidth links while IGP convergence is in progress

You are performing a BGP design review for a service provider that offers MPLS-based services to their end customers. The network is comprised of several PE routers that run iBGP with a pair of route reflectors for all BGP address families. Which two options about the use of Constrained Route Distribution for BGP/MPLS VPNs are true? (Choose two.)

A.

The RRs do not need to advertise any route target filter toward the PE routers

B.

The RR must advertise the default route target filter toward the PE routers

C.

Both PE and RR routers must support this feature

D.

This feature must be enabled on all devices in the network at the same time

E.

Route distinguishers are used to constrain routing updates

Your client is considering acquiring a new IPv6 address block so that all Ethernet interfaces on the network receive addresses based on their burned-in hardware addresses, with support for 600 VLANs. Which action do you recommend?

A.

Acquire a new /60 IPv6 network and subnet it into /70 networks, one per VLAN

B.

Acquire a new /58 IPv6 network and subnet it into /64 networks, one per VLAN

C.

Acquire a new /60 Ipv6 network and subnet it into /68 networks, one per VLAN

D.

Acquire a new/54 IPv6 network and subnet it into /64 networks , one per VLAN

Which multicast technology provides a large, many-to-many connectivity for a new application while minimizing load on the existing network infrastructure?

A.

PIM Sparse Mode

B.

Bidirectional PIM

C.

Any-Source Multicast

D.

Source Specific Multicast

In an OSPF network, users in a particular OSPF non-backbone area are complaining about show access speeds to a shared corporate resource in another OSPF area. Traceroutes show that the users are taking a suboptimal default route to the destinations. Which solution will improve access speed?

A.

Make the area totally stubby so that the default can be followed along the best path

B.

Create a virtual link between the areas so that traffic can shortcut directly between them

C.

Leak specific summaries on the ABRs for the remote subnets in addition to the default

D.

Implement policy routing to channel the traffic in the optimal direction

Refer to the exhibit,

Which two design considerations should be implemented on the pseudowire between N-PE and U-PE routers for a loop-free hierarchical VPLS service? (Choose two)

A.

Disable split horizon towards the U-PE router.

B.

Disable MAC learning on the U-PE router.

C.

Enable split horizon towards the N-PE routers.

D.

Disable MAC learning on the U-PE routers.

E.

Disable MAC learning on the U-PE routers.

F.

Enable split horizon towards the U-PE routers.

G.

Disable split horizon toward the N-PE routers.

Which design benefit of Bridge Assurance is true?

A.

It prevents switched traffic from traversing suboptimal paths on the network.

B.

It prevents switched loops caused by unidirectional point-to-point, link condition on Rapid PVST+ and MST

C.

It allows small unmanaged switches to be plugged into ports of access scenes without the risk of switch loops.

D.

It suppresses a spanning-tree topology change upon connecting and disconnecting a station on a port.

A multisite data center network runs OSPF and DWDM point-to-point interfaces for site to-site connectivity. Which method to detect interfaces the fastest?

A.

interface event dampening

B.

LoS/AJS event faults

C.

UDLD

D.

fast-hello> timers

Which three options are important design functions of IPv6 first-hop security? (Choose three)

A.

It prevents rogue DHCP servers farms assigning IPv6 addresses.

B.

It prevents IPv6 packets fragmentation.

C.

It limits IPv6 route the advertisement in the network.

D.

It implements a broadcast-control mechanism.

E.

It suppresses excessive multicast neighbor discovery.

F.

It implements multihoming security.