Download New Updated (July) Cisco 352-001 Actual Test 121-131

Ensurepass

QUESTION 121

Which statement about the behavior of OSPF on a hub-and-spoke topology is true?

 

A.

Additional host routes are added to the routing table on a NBMA network type.

B.

The DR and BDR election occurs regardless of the underlying OSPF network type.

C.

The DR election is a challenge unless a point-to-point network type is used.

D.

Traffic does not need to traverse the hub to reach the spokes.

 

Correct Answer: C

 

 

QUESTION 122

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during TCN in a Layer 2 switched network with many VLANs?

 

A.

STP

B.

MST

C.

PVRSTP

D.

PVSTP+

 

Correct Answer: D

 

 

 

QUESTION 123

Which two statements describe how including Cisco IPoDWDM proactive protection in an optical design would minimize packet loss in the event of a fiber cut? (Choose two).

 

A.

It uses the FEC field on the OTN frame to trigger protection.

B.

It uses a “not to exceed” predefined BER threshold to cause traffic redirection.

C.

It reroutes the optical circuit after an event that impacts service.

D.

It is effective both when you have redundant and nonredundant Layer 3 MPLS paths.

 

Correct Answer: AB

 

 

QUESTION 124

ACME Corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain conditions in the network. Which feature should be used to meet this design requirement?

 

A.

Cisco IOS Embedded Event Manager

B.

IP SLA

C.

reflexive ACLs

D.

route maps

E.

SOAP

F.

exit status

 

Correct Answer: A

 

 

QUESTION 125

A many-to-many enterprise messaging application is using multicast as a transport mechanism. As part of the network design for this application, which multicast address should be used, according to best practices outlined in RFC 2365?

 

A.

224.0.0.60

B.

232.192.0.60

C.

239.128.0.60

D.

239.193.0.60

 

Correct Answer: D

 

 

QUESTION 126

You are redesigning an OSPF v2 network and must migrate some links. You are concerned that there are different subnet masks. Which two link types will still form an OSPF adjacency even if there are subnet mask mismatches? (Choose two.)

 

A.

virtual

B.

broadcast

C.

point-to-multipoint

D.

non-broadcast

E.

point-to-point

 

Correct Answer: AE

 

QUESTION 127

You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure?

 

A.

SPAN monitor ports

B.

NetFlow

C.

IP NBAR

D.

passive taps

 

Correct Answer: D

 

 

QUESTION 128

You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mb/s and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner?

 

A.

Use a WRED random drop policy.

B.

Increase the queue to at least 1 GB.

C.

Enable the TCP Nagle algorithm on the receiver.

D.

Change the protocol to CIFS.

 

Correct Answer: A

 

 

QUESTION 129

You are performing a BGP design review for a service provider that offers MPLS-based services to their end customers. The network is comprised of several PE routers that run iBGP with a pair of route reflectors for all BGP address families. Which two options about the use of Constrained Route Distribution for BGP/MPLS VPNs are true? (Choose two.)

 

A.

This feature must be enabled on all devices in the network at the same time.

B.

The RR must advertise the default route target filter toward the PE routers.

C.

The RRs do not need to advertise any route target filter toward the PE routers.

D.

Both PE and RR routers must support this feature.

 

Correct Answer: BD

 

 

QUESTION 130

You need to redesign your NMS system so that it can collect information without causing adverse effects in the network, such as high CPU utilization on network devices and network instability. Which two options will minimize the impact of the trusted NMS polling your network in this situation? (Choose two.)

 

A.

Implement SNMP community restrictions that are associated with an ACL.

B.

Unload unused MIBs from the network devices.

C.

Prevent polling of large tables through the use of SNMP OID restrictions.

D.

Disable unused OIDs and MIBs on the NMS systems.

 

Correct Answer: CD

 

Free VCE & PDF File for Cisco 352-001 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

This entry was posted in 352-001 Real Tests (July) and tagged , , , , , , . Bookmark the permalink.