Vous êtes sur la page 1sur 5

Cisco 352-001

ADVDESIGN
Version: Demo 3.00

Cisco 352-001 Exam Topic 1, D D QUESTION NO: 1 Which statement correctly describes OSPF incremental SPF? A. iSPF is negotiated during the OSPF adjacency process. B. iSPF must be enabled on all routers in the domain. C. iSPF must be enabled on all routers in a particular area. D. iSPF is local to the router and does not require interoperability. Answer: D

Topic 2, C C QUESTION NO: 2 Which description is correct about how MTU mismatches are addressed in the IS-IS neighborformation process? A. IS-IS does not check for MTU mismatches when forming a neighbor relationship. B. IS-IS checks the locally configured MTU against the MTU advertised in neighbor hello packets. C. IS-IS checks the locally configured MTU against the MTU advertised in neighbor LSPs. D. IS-IS pads hellos, so neighbor relationships will not be formed on links with mismatched MTUs. Answer: D

Topic 3, B B QUESTION NO: 3 Which two are characteristics of RSVP? (Choose two.) A. RSVP itself provides bandwidth and delay guarantees. B. For RSVP to be end-to-end, all devices must support RSVP. C. RSVP reservations are maintained by a centralized reservations server. D. An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations. Answer: B,D

"Ensure Success with Money back Guarantee" - Testinsides.com

Cisco 352-001 Exam

Topic 1, D D QUESTION NO: 4 Which two practices need to be implemented to increase SNMPv1 security? (Choose two.) A. Use SNMP encryption for transport confidentiality. B. Use ACLs to allow only specific IP addresses to poll SNMP. C. Use a combination of alphanumeric characters for the community strings. D. Restrict access to the specific SNMP engine IDs in use. Answer: B,C

Topic 4, A A QUESTION NO: 5 When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? (Choose three.) A. rate limit voice traffic B. onfigure spanning-tree for fast link convergence C. isolate voice traffic on separate VLANs D. classify and mark traffic close to the source Answer: B,C,D

Topic 3, B B QUESTION NO: 6 Which option is true about routing control while using routing protocols in a DMVPN network (or any GRE-over-IPsec network)? A. Routing of the data plane traffic should be carried out by means of the GRE tunnel and a separate routing instance should be used to handle routing of the crypto endpoints. B. The control plane traffic for the crypto endpoints should be routed through the GRE tunnel; the "Ensure Success with Money back Guarantee" - Testinsides.com 3

Cisco 352-001 Exam control plane traffic for the data plane traffic should travel via the transport network. C. If the network is a private MPLS network, the routing for the data plane traffic and the crypto endpoints should be run outside of the GRE tunnel. D. The routing used to establish the crypto endpoints should include information for the data networks behind the endpoints. Answer: A

QUESTION NO: 7 Which two reasons are for instrumenting your network and network devices to collect performance data? (Choose two.) A. to route traffic around constrained choke points in the network B. to enable capacity planning decisions C. to determine the impact of jitter and latency on application performance D. to determine the locations at which QoS needs to be implemented Answer: B,D

Topic 4, A A QUESTION NO: 8 The following exhibit shows us that all the routers in this network are running EIGRP on all links. In Network 1, all links are the same cost. In Network 2, router P4S-RE prefers the path through P4SRC, and does not have a feasible successor. Which network converges faster in the event of the failure of the link between router P4S-RA and 10.1.1.0/24? A. network 1, because there are fewer query hops through the network B. network 2, because there are more alternate paths available C. network 2, because routers P4S-RC and P4S-RD have feasible successors D. network 1, because all routers have feasible successors in this network Answer: A

Topic 2, C C

"Ensure Success with Money back Guarantee" - Testinsides.com

Cisco 352-001 Exam QUESTION NO: 9 All network devices provided in the following exhibit are running IPv6. When host P4S-A is attached to this link, how will it discover the presence of routers P4S-RB and P4S-RC? A. Routers P4S-RB and P4S-RC send out periodic gratuitous ARPv6 messages to alert newly attached hosts to their presence. B. Routers P4S-RB and P4S-RC will respond to an ICMP get route request sent by host P4S-A. C. Host P4S-A will discover routers P4S-RB and P4S-RC through the neighbor discovery process. D. Routers P4S-RB and P4S-RC will detect the addition of the new host the first time it transmits any packets, and will send an ICMP router discovery reply to host P4S-A. Answer: C

Topic 4, A A QUESTION NO: 10 Which two steps can be taken by the sinkhole technique? (Choose two.) A. reverse the direction of an attack B. redirect an attack away from its target C. monitor attack noise, scans, and other activity D. delay an attack from reaching its target Answer: B,C

"Ensure Success with Money back Guarantee" - Testinsides.com

Vous aimerez peut-être aussi