352-001 - Cisco Certified Design Expert Qualification Exam

Go back to Cisco

Exam FAQ

How many questions are there on the 352-001 exam? How long is the 352-001 exam? How much does the 352-001 exam cost? What is the best way to study for the 352-001 exam?

Example Questions

A network vulnerability scanner is part of which critical element of network and system security? Service provider XYZ plans to provide dedicated Internet access and MPLS L3VPN services to business customers. XYZ has these design specifications: In what two ways can the MP-BGP be removed from the MPLS P core routers and still provide dedicated Internet access and MPLS L3VPN services? (Choose two.) When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two.) Header compression is the most cost-effective way to increase link efficiency for VoIP traffic. What is the most effective way to improve BGP convergence in the event that a point-to-point link, over which an EBGP session is running, fails? For the following options, which deployment can provide the least amount of downtime and also allow for dual active-active hubs? You are designing a network that includes IP QoS. Which two architectures could be used to ensure that IP QoS is implemented properly? (Choose two.) IS-IS supports which two network or interface types? (Choose two.) Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes? You are the lead IP/MPLS network designer of a service provider called XYZ. You are leading a design discussion regarding IPv6 implementation in the XYZ MPLS network, using MPLS 6PE/6VPE techniques. Currently, XYZ provides IPv4 multicast services over an MPLS network by using MVPN, and would like to provide parallel IPv6 multicast services. Which three multicast solutions should be enabled? (Choose three.) Which content networking device allows bandwidth configuration settings so that streaming content will not interfere with other network traffic? An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A, providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds, which are sourced at the central site and consist of 20 groups at 5 Mb/s each. Which service provider recommendation is the most scalable? Users at the your Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time? You are a network technician for the PG Ltd. You are redistributing between EIGRP autonomous systems 100 and 200. Assume that there are no routing filters or aggregation applied anyplace in the network, which item is the result when a query originating in AS 100 reaches the router redistributing between the two autonomous systems? Fibre Channel, or FC, is a gigabit-speed network technology primarily used for storage networking. Fibre Channel is standardized in the T11 Technical Committee of the InterNational Committee for Information Technology Standards (INCITS), an American National Standards Institute (ANSI) Caccredited standards committee. Which two of these correctly describe Fibre Channel? (Choose two.) MPLS VPN is a family of methods for harnessing the power of Multiprotocol Label Switching (MPLS) to create Virtual Private Networks (VPNs). When using MP-BGP peering to connect two MPLS-VPN service providers to one another between route reflectors. Which type of routes should be exchanged between the ASBRs? You are a network technician for the P4S Ltd. You are redistributing between EIGRP autonomous systems 100 and 200. Assume that there are no routing filters or aggregation applied anyplace in the network, which item is the result when a query originating in AS 100 reaches the router redistributing between the two autonomous systems? The P4S company is deploying OSPF on a point-to-multipoint Frame Relay network. The remote sites needn??t to communicate with each other and there are a relatively small number of sites (scaling is not a concern). How to configure OSPF for this topology in order to minimize the additional routing information injected into the network and keep the configuration size and complexity to a minimum? When network summaries are created for access networks in a network design, how does it change the behavior of the Shortest Path First (SPF) running in a backbone area? Which attack type may be indicated by unsolicited ACKs directed toward an unused portion of a network's IP address space? Which three types of LSA could each trigger a partial SPF? (Choose three.) Which description is true about RSVP reservations? When dealing with transparent caching, where should the Content Engines e placed? A company plans to include Nonstop Forwarding and Bidirectional Forwarding Detection as a part of their network redundancy plan. In which two ways do NSF and BFD work together when different hardware platforms are compared? (Choose two.) The IGP next-hop reachability for a BGP route is lost but a default route is available. Assuming that BGP connectivity is maintained, what will happen to the BGP route? Which control plane problem can be prevented by implementing QoS, and how to eliminate the problem? What is a key benefit of a layered network design? You are performing a BGP design review for a service provider that offers MPLS-based services to their end customers. The network is comprised of several PE routers that run iBGP with a pair of route reflectors for all BGP address families. Which two options about the use of Constrained Route Distribution for BGP/MPLS VPNs are true? (Choose two.) Which is the reason that EIGRP uses queries? A virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre Channel switches that form a virtual fabric. Which technology allows centralized storage services to be shared across different VSANs? Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time? You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the least amount of burden on the network infrastructure? Study the subject carefully, then answer the following question. A service provider has an MPLS VPN network in USA. It recently bought another provider in India and would like to quickly integrate the newly acquired provider's network into the existing MPLS VPN infrastructure via the Internet. Which two technologies will be used by the service provider to integrate its new network? (Choose two.) Which action can identify and monitor denial of service attacks? What is the way that an OSPF ABR uses to prevent summary route information from being readvertised from an area into the network core (Area 0)? Your enterprise customer has asked where they should deploy flow monitoring in their network to monitor traffic between branch offices. What is your design recommendation? A virtual storage area network (VSAN) is a collection of ports from a set of connected Fibre Channel switches, that form a virtual fabric. Which technology allows centralized storage services to be shared across different VSANs? Which tunneling mechanism provides confidentiality as well as tunneling capabilities? Which statement about CiscoWorks 2000 Inventory Manager is true? A network designer has provisioned a router to use IPsec to encrypt the traffic over a GRE tunnel going to a web server at a remote location. From the router, the network designer can ping the web server, although the users in the office comment that they are unable to reach it. (Note: The DF bit is not set.) Which aspect should be changed in the design of the virtual connection? When designing, why would a network architect use active performance monitoring instead of passive performance monitoring? Which two items could be used to determine how much jitter is occurring across a customer's existing network? (Choose two.) Flex Links are a pair of a Layer 2 interfaces (switchports or port channels), where one interface is configured to act as a backup to the other. Which two statements are correct regarding Flex Links? During periods of congestion, which two impacts are of traffic shaping on traffic flows? (Choose two.) What are two functions of an NSSA in an OSPF network design? (Choose two.) When is the site-to-site remote access model appropriate? Fair queuing is a scheduling algorithm used in computer and telecommunications networks to allow multiple packet flows to fairly share the link capacity. How does Fair Queuing divide bandwidth? Which one of the following technologies allows a router to route traffic according to the size of the incoming packet? A service provider is offering four classes of service, with each class mapped to a separate queue. Some customers complain about receiving out-of-order packets, which cause application degradation. Which QoS policy activity most likely causes these out-of-order packets? Which is the way that an OSPF ABR uses to prevent summary route information from being re- advertised from an area into the network core (Area 0)?