Cisco (352-001) Exam Questions And Answers page 10
What are two true statements about QoS marking?
Multiple Choice
Which two statements about QoS marking are true? (Choose two.)
MPLS EXP and DSCP are Layer 2 marking fields
QoS marking establishes a trust boundary that scheduling tools later depend on
Shaping is one of the ways that packets can be remarked
802.1Q/p CoS bits and IP Precedence are Layer 3 marking fields
Routing and Switching
Security Design
Which two techniques are used in an OSPF network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two.)
link-state partial SPF
IP event dampening
LSA throttling
SPF throttling
link-state incremental SPF
Routing and Switching
Data Center Design
You are asked to provide a design that allows full dynamic routing updates between two networks: one network runs OSPF, and the other network runs EIGRP. Two links with an EIGRP neighbor relationship are provided to connect the networks and exchange routes. You are considering the use of routing loops.
Which route-filtering method should you recommend, in order to prevent loops with the least amount of reconfiguration effort?
Which route-filtering method should you recommend, in order to prevent loops with the least amount of reconfiguration effort?
distribute lists
offset lists
route filtering
route tagging
Routing and Switching
Data Center Design
You are designing a FabricPath network that connects to a spine-and-leaf topology using Layer 2 IS-IS as the IGP. The solution should be able to detect changes in the network topology and calculate loop-free paths to other nodes in the network that are being used as top-of-rack switches.
Which four options are characteristics of this FabricPath design solution? (Choose four.)
Which four options are characteristics of this FabricPath design solution? (Choose four.)
FabricPath Layer 2 IS-IS uses the standard IS-IS functionality to populate up to 16 routes for a given destination switch.
The FabricPath domain should be replaced because it does not run STP.
The interfaces in a FabricPath network run only the FabricPath Layer 2 IS-IS protocol with FTags disabled.
Each switch computes its shortest path to every other switch in the network using the SPFalgorithm.
To use the basic FabricPathfunctionality, you must configure IS-IS on every interface between the leaf-and-spine switches.
The switch operating system uses multiple equal-cost, parallel links that provide ECMP.
This path is used for forwarding unicast FabricPath frames.
Routing and Switching
Data Center Design
You are designing a network solution to connect a primary data center to a disaster recovery site. The applications hosted on the site will be mainly web and email servers that are provided through a virtualized environment. A third data center facility may also be added in the next six months. Which connectivity type is appropriate for this design?
L2TPv3
VPLS
point-to-point GRE tunnels
VPWS
Network Design
WAN Design
You are designing a QoS solution for a large enterprise network that uses DMVPN. In which situation should the QoS pre-classify feature be used?
When your service provider requires the DSCP bits be set
When the QoS policy cannot be based on DSCP bits
When you are marking packets with the ToS bits
When you are marking packets with the DSCP bits
Routing and Switching
Security Design
You are designing a wireless LAN with the following components:
• High-densityindoor access point deployment
• 2.4-GHz and 5-GHz radios
• 802.11a, 802.11g,and 802.11n mode wireless LAN clients
Site survey results show negligible foreign WiFi and non-WiFi interference. What is the best method to decrease duty cycle (radio frequency utilization) and increase overall wireless LAN client performance for this design?
• High-densityindoor access point deployment
• 2.4-GHz and 5-GHz radios
• 802.11a, 802.11g,and 802.11n mode wireless LAN clients
Site survey results show negligible foreign WiFi and non-WiFi interference. What is the best method to decrease duty cycle (radio frequency utilization) and increase overall wireless LAN client performance for this design?
Disable all data rates below 12 Mb/s on all access points.
Decrease radio transmit power on all access points that report a high duty cycle.
Increase radio transmit power on all access points that report a high duty cycle.
Disable all data rates above 12 Mb/s on all access points.
Increase radio transmit power on all access points.
Network Design
Routing and Switching
You are implementing a multicast solution for a large service provider network. Which technology offers optimal routing of multicast traffic?
PIM sparse mode
MSDP
Bidirectional PIM
PIM SSM
Anycast RP
Routing and Switching
You are working on a network design plan for a company with approximately 2000 sites. The sites will be connected using the public Internet. You plan to use private IP addressing in the network design, which will be routed without NAT through an encrypted WAN network. Some sites will be connected to the Internet with dynamic public IP addresses, and these addresses may change occasionally. Which VPN solution will support these design requirements?
GET VPN must be used, because DMVPN does not scale to 2000 sites.
DMVPN must be used, because GET VPN does not scale to 2000 sites.
GET VPN must be used, because private IP addresses cannot be transferred with DMVPN through the publicInternet.
DMVPN must be used, because private IP addresses cannot be transferred with GET VPN through the public Internet.
GET VPN must be used, because DMVPN does not support dynamic IP addresses for some sites.
DMVPN must be used, because GET VPN does not support dynamic IP addresses for some sites.
WAN Design
Security Design
You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access based on their user role. Users must use a password that they are already using to access existing applications. A user may not always use the same device to access the VPN. Which two options combined meet the requirement? (Choose two.)
Deploy certificates that are unique to each device
Deploy a SSL VPN solution
Deploy an IPsec VPN solution
Use local usernames and passwords on the VPN device
Deploy a central authentication directory that users can be authenticated and authorized against
Deploy certificates that are unique to each user
Routing and Switching
Security Design
Comments