Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

352-011 Cisco Certified Design Expert Practical Exam Questions and Answers

Questions 4

You are designing an optical network. Your goal is to ensure that your design contains the highest degree of resiliency. In which two ways should you leverage a wavelength-switched optical network solution in your network design? (Choose two.)

Options:

A.

a wavelength-switched optical network guarantees restoration based strictly on the shortest path available

B.

a wavelength-switched optical network provides fault tolerance for single failures only

C.

a wavelength-switched optical network takes linear and nonlinear optical impairment calculation into account

D.

a wavelength-switched optical network assigns routing and wavelength information

E.

a wavelength-switched optical network eliminates the need for dispersion compensating units in a network

Buy Now
Questions 5

A regional ISP is running MPLS TE. These tunnels are configured manually using paths. Which technology centralizes the traffic engineering decisions to reduce operational complexity?

Options:

A.

BGP Link State

B.

DiffServ-TE

C.

TE autobandwidth

D.

Shared Risk link Group

Buy Now
Questions 6

Which main IoT migration aspect should be reviewed for a manufacturing plant?

Options:

A.

Sensors

B.

Security

C.

Applications

D.

Wi-Fi Infrastructure

E.

Ethernet Switches

Buy Now
Questions 7

Which three network management requirements are common practices in network design? (Choose three)

Options:

A.

Ensure that all network devices have their clocks synchronized.

B.

Collect SNMP poll information for future regression analysis.

C.

Capture both ingress and egress flow-based packets, while avoiding duplication of flows.

D.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.

E.

Validate data plane health, and application and services availability, with synthetic traffic.

Buy Now
Questions 8

352-011 Question 8

Options:

Buy Now
Questions 9

Refer to the exhibit.

352-011 Question 9

As part of your design to monitor reachable services, a route health injector has just been deployed on the network. The route health injector injects /32 host routes into BGP with the next hop of 192.18.0.2, but the /32 routes are not being installed into the RIB or FIB of Router A. Which BGP feature must be deployed to make be deployed to make the design to work?

Options:

A.

BGP community attributes

B.

MP-BGP

C.

BGP AS-Path prepending

D.

eBGP multihop attribute

Buy Now
Questions 10

You are designing a solution to connect a primary data center to a disaster recovery site, The hosted applications will be web and email servers that are provided through a virtualized environment. Which connectivity technology should you consider for this design?

Options:

A.

L2TPV3.

B.

VPWS.

C.

Point-To-Point GRE tunnels.

D.

VPLS.

Buy Now
Questions 11

An enterprise customer A with provider-independent address space is dual-homed to two ISP. Which two options , when combined, allow for customer A to efficiently achieve out-bond traffic load-balancing? ( Choose two)

Options:

A.

Advertise Customer A subnets with a shorter AS path prepend to one of the ISPs than to the other

B.

Advertise Customer A subnets with different MED values to the two ISPs

C.

Accept a default route from both ISPs

D.

Make the CE connected to both ISPs route reflector

E.

Accept the routes originated on both ISPs and their direct peers

Buy Now
Questions 12

What are two possible drawbacks of ending Loop-Free Alternate to support fast convergence for most destination IGP prefixes? (Choose two)

Options:

A.

The IGP topology might need to be adjust

B.

Loop-free alternate’s convergence in less than 100 milliseconds is not possible

C.

Loop-free alternate’s are supported only for prefixes that are considered external tot the IGP

D.

Loop-free alternates are not supported in global VPN VRF OSPF instances

E.

Additional path computations are needed

Buy Now
Questions 13

A service provider must provide Internet connectivity to an MPLS Layer 3 VPN customer. Which solution allows this customer to have Internet access?

Options:

A.

Implement a global default route with a next hop in the VRF late on PE

B.

Implement policy-based routing between PE and CE

C.

Implement a default route in the VRF with a next hop in the global routing table of PE

D.

Implement destination NAT between the VRF and the global RIB of PE

Buy Now
Questions 14

A financial trading organization plans to monitor the network latency for multicast data feeds on a hop-by-hop basis. Which technology should be added to their design to support this requirement?

Options:

A.

SPAN

B.

NBAR

C.

IPFIX

D.

Precision Time Protocol

Buy Now
Questions 15

After a large EIGRP network had automatic summarization enabled throughout, it started experiencing routing loops. Which action should you take to quickly resolve the routing loops yet to perform summarization?

Options:

A.

Redistribute connected routes at major IP networks boundaries

B.

Redesign the IP addressing scheme

C.

Increase the AD of the automatically summarized routes

D.

Replace the automatic summarization with more specific summary routes

Buy Now
Questions 16

Which two functions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)

Options:

A.

Fast transport

B.

QoS classification and marking boundary

C.

Fault isolation

D.

Redundancy and load balancing

E.

Reliability

Buy Now
Questions 17

Which markup language is used to format Ansible ' s playbook?

Options:

A.

ADML

B.

YAML

C.

HTML

D.

XML

E.

NAML

Buy Now
Questions 18

Refer to the exhibit,

352-011 Question 18

Which two design considerations should be implemented on the pseudowire between N-PE and U-PE routers for a loop-free hierarchical VPLS service? (Choose two)

Options:

A.

Disable split horizon towards the U-PE router.

B.

Disable MAC learning on the U-PE router.

C.

Enable split horizon towards the N-PE routers.

D.

Disable MAC learning on the U-PE routers.

E.

Disable MAC learning on the U-PE routers.

F.

Enable split horizon towards the U-PE routers.

G.

Disable split horizon toward the N-PE routers.

Buy Now
Questions 19

Which DCI technology utilizes a “flood and learn” technique to populate the Layer 2 forwarding table?

Options:

A.

OTV

B.

E-VPN

C.

VPLS

D.

LISP

Buy Now
Questions 20

You are working on a network design plan for a company with approximately 2000 sites. The sites will be connected using the public Internet. You plan to use private IP addressing in the network design, which will be routed without NAT through an encrypted WAN network. Some sites will be connected to the Internet with dynamic public IP addresses, and these addresses may change occasionally. Which VPN solution will support these design requirements?

Options:

A.

GET VPN must be used, because DMVPN does not scale to 2000 sites.

B.

DMVPN must be used, because GET VPN does not scale to 2000 sites.

C.

GET VPN must be used, because private IP addresses cannot be transferred with DMVPN through the public Internet.

D.

DMVPN must be used, because private IP addresses cannot be transferred with GET VPN through the public Internet.

E.

GET VPN must be used, because DMVPN does not support dynamic IP addresses for some sites.

F.

DMVPN must be used, because GET VPN does not support dynamic IP addresses for some sites.

Buy Now
Questions 21

You must make IGP redesign recommendations for a client that has old equipment, with low CPU power and memory, that they do not have budget replace. They are very concerned about CPU load on routers. They are using IS-IS as the IGP in a single l1 area and all routers are connected to each other with point-to-point links. Which method do you recommend to reduce or limit CPU overhead caused by IS-IS?

Options:

A.

Use mesh groups to limit flooding of LSAs

B.

Implement wide style metrics for IS-IS on all routers

C.

Select a router to act as a pseudowire to limit topology synchronization

D.

Divide the router into multiple areas and implement address summarization

Buy Now
Questions 22

Which option is a design consideration when using routers in a distributed hardware architecture?

Options:

A.

Routing information is stored in the RIB and the FIB makes forwarding decisions as programmed on the line card hardware

B.

After a link failure occurs in the core, the RIB continues to forward the traffic while FIB convergence is in progress

C.

BGP routes are stored in the RIB and IGP routes are stored in the FIB

D.

IP routes are stored in the RIB and MPLS labels are stored in the FIB

Buy Now
Questions 23

What two options are significant drivers for 5G in IoT networks? (Choose two)

Options:

A.

Energy Efficiency

B.

Lower Latency

C.

Mass Connectivity

D.

Programmability

E.

Higher data rates

Buy Now
Questions 24

Which two functions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two).

Options:

A.

Fault isolation

B.

QoS classification and marking boundary

C.

Fast transport

D.

Reliability

E.

Load balancing

Buy Now
Questions 25

In which two ways is a network design improved by including IP Event Dampening? (Choose two)

Options:

A.

Provides sub-second convergence

B.

Quickly detects network failures

C.

Prevent routing loops

D.

Improves network stability

E.

Reduces processing load

Buy Now
Questions 26

352-011 Question 26

Options:

Buy Now
Questions 27

352-011 Question 27

Options:

Buy Now
Questions 28

Which two general SDN characteristics? (Choose two)

Options:

A.

Southbound interfaces are interfaces used between the control plane and the date plane

B.

OpenFlow is considered one of the first Northbound APIs used by SDN controllers

C.

Northbound interfaces are open interfaces used between the control plane and the data plane

D.

The separation of the control plane from the data plane

E.

OVSDB is an application database management protocol

Buy Now
Questions 29

You are redesigning a high-speed transit network due to congestion-related issues. Which congestion avoidance mechanism can you apply to the existing network?

Options:

A.

NBAR

B.

FIFO

C.

WRED

D.

Rate-limit

E.

Policy-Based Routing

Buy Now
Questions 30

Which two reasons for implementing Cisco MPLS TE in a service provider MPLS backbone are valid? (Choose two.)

Options:

A.

when Cisco MPLS TE is a prerequisite for implementing RSVP in the backbone

B.

when Cisco MPLS TE is required to reroute traffic within Jess than 1 second in case of a link failure inside the backbone

C.

when Cisco MPLS TE is required to create backup paths independently from the IGP

D.

when Cisco MPLS TE can detect and react to neighbor failures faster than IGPs can

E.

when Cisco MPLS TE is required to route different MPLS QoS service classes through different paths

Buy Now
Questions 31

Refer to the exhibit.

352-011 Question 31

How should you redesign this network running BGP to improve availability of the routers 1A and 1B at the core site?

Options:

A.

Deploy BGP PIC

B.

Use link bundles over multiple slots

C.

Enable graceful restart

D.

Create a multichassis system with the two routers

Buy Now
Questions 32

How must queue sizes be designed to ensure that an application functions correctly?

Options:

A.

The default queue sizes are good for any deployment

B.

Each individual device queuing delay in chain must be less than or equal to the application required delay

C.

The queuing delay on every device in chain must be exactly the same

D.

The sum of the queuing delay of all devices in chain must be less than or equal to the application required delay

Buy Now
Questions 33

A small local business recently had an outage after an employee plugged a switch into the corporate network, which caused the traffic pattern in the network to change. You have been tasked to redesign the network so that this does not happen again. From the left side to the right side, drag the PVRST+ features that should be implemented to prevent the corresponding root cause. Not all sources will be used.

352-011 Question 33

Options:

Buy Now
Questions 34

Which option is a critical mechanism to optimize convergence speed when using MPLS FRR?

Options:

A.

IGP timers

B.

Bandwidth reservation

C.

Shared risk link groups

D.

Down detection

Buy Now
Questions 35

Which IEEE standard is commonly used at the data link layer for an access network, in an IoT environment?

Options:

A.

Wireless Regional Area Network

B.

Low-Rate Wireless Network

C.

Wireless Local Area Network

D.

Broadband wireless metropolitan Network

Buy Now
Questions 36

Classify the OSPF Fast Network Convergence technique by dragging the techniques on the left and dropping them into the corresponding categories on the right.

352-011 Question 36

Options:

Buy Now
Questions 37

Which three network management requirements are common practices in network design? (Choose three)

Options:

A.

Collect RMON poll information for future regression analysis

B.

Ensure that all network devices have their clocks synchronized

C.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.

D.

Collect SNMP poll information for future regression analysis

E.

Validate data plane health, application and services availability with synthetic traffic

F.

Capture both ingress and egress flow-based packets. While avoiding duplications of flows

Buy Now
Questions 38

Refer to the exhibit.

352-011 Question 38

A customer currently has a large EIGRP-based network with several remote sites attached. All remote sites connect to the two corporate data centers, depicted as 10.1.1.0 and 10.1.2.0. The customer has experienced several network-wide failures where neighbors were stuck-in-active and had other network stability issues due to some links flapping. Which two redesign options increase stability and reduce the load on the remote site routers, still maintaining optimal routing between remote sites and the two data centers? (Choose two)

Options:

A.

Set the data center routers as stub-routers

B.

Perform summarization at the data centers, selectively leaking routes sent to the remote sites

C.

Perform summarization at the remote sites, selectively leaking routes sent to the data centers

D.

Set the hello interval timer to be larger than the hold interval

E.

Increase the hold interval to accommodate lost hello packets on error-prone links

Buy Now
Questions 39

Refer to the exhibit.

352-011 Question 39

You must review this single OSPF area, DMVPN network because the company has noticed a few area 0 convergence and stability issues. Also, traffic destined to the data center from one of the spokes as the next hop on the path. The company prefers that all traffic destined to the data center uses the least amount of hops. Which solution resolves these issues with the minimum amount of changes on the network?

Options:

A.

Migrate from OSPF to static routes between the hub routers and the spoke routers and deploy IP SLA for route health checks

B.

Migrate from OSPF to EIGRP between the hub routers and the spoke routers

C.

Modify OSPF cost metrics on all backup links

D.

Create areas between each hub and their spoke routers, to ensure that the hub routers become DRs

Buy Now
Questions 40

In a design around fast convergence in case of a link failure, what is the justification for using a point-to-point OSPF network type on the Ethernet links between leaf-and-spine switches on a data center fabric?

Options:

A.

Link failure tears down neighbor relationships regardless of network type configured

B.

Type 1 LSAs are not generated on a point-to-point network type

C.

Adjacencies can be built faster without a DR/BDR on the segment

D.

The fabric memory requirements are significantly smaller than with a DR/BDR on each leaf and spine segment

E.

The point-to-point network type allows for NSF to be used in this design

Buy Now
Questions 41

Which are two data plane hardening techniques? (Choose two)

Options:

A.

Infrastructure ACLs

B.

Control Plane Policing

C.

Redundant AAA servers

D.

Disable unused services

E.

Routing protocol authentication

F.

SNMPv3

G.

Warning banners

Buy Now
Questions 42

Which three options are important design functions of IPv6 first-hop security? (Choose three)

Options:

A.

It prevents rogue DHCP servers farms assigning IPv6 addresses.

B.

It prevents IPv6 packets fragmentation.

C.

It limits IPv6 route the advertisement in the network.

D.

It implements a broadcast-control mechanism.

E.

It suppresses excessive multicast neighbor discovery.

F.

It implements multihoming security.

Buy Now
Questions 43

Refer to the exhibit.

352-011 Question 43 As part of a redesign project, you must predict multicast behavior. What is the resultant multicast traffic receiving on the shared tree( , G), if it is received on the LHR interface indicated?

Options:

A.

It is dropped due to an unsuccessful RPF check against the multicast receiver

B.

It is switched due to a successful RPF check against the routing table

C.

It is switched given that no RPF check is performed

D.

It is dropped due to an unsuccessful RPF check against the multicast source

Buy Now
Questions 44

You are hired to assist an enterprise customer to design their global WAN network. A protected DWDM circuit with disjoint fiber routes and guaranteed restoration times is ordered to connect two hub sites. Which option is a BFD design consideration in relation to protected DWDM?

Options:

A.

BFD failure detection must be faster than DWDM restoration time

B.

The BFD hello timer must match the DWDM circuit restoration time

C.

BFD failure detection must be longer than DWDM restoration time

D.

BFD cannot be used with protected DWDM

Buy Now
Questions 45

A DMVPN network is being deployed for 10 branch sites to connect to the central headquarters over the Internet. Each branch site connects to the internet via a 1.5 Mb/s ADSL line, and the headquarters connects to the Internet over a 100Mb/s circuit limited to 20 Mb/s by the service provider. Which QoS mechanism if any, do you recommend at the headquarters location?

Options:

A.

Rate-limiting the 100 Mb/s circuit to 20 Mb/s

B.

Applying hierarchical QoS with parent policy for the overall circuit and child policy for the spokes

C.

Traffic shaping the 100 Mb/s circuit to 20 Mb/s

D.

QoS is not required in this instance due to maximum traffic being received by the branches being 15 Mb/s

Buy Now
Questions 46

Refer to the exhibit.

352-011 Question 46

Assume that no multicast optimization is done on LAN switches A and B. Which two features can be used to optimize multicast traffic forwarding in this situation? (Choose two.)

Options:

A.

Enable IGMP snooping querier on both switches.

B.

Configure a static MAC entry for the multicast server.

C.

Disable IGMP snooping on both switches.

D.

Disable the IGMP query election process.

E.

Enable PIM snooping on both switches.

Buy Now
Questions 47

An enterprise customer has a national WAN network based on DMVPN over the Internet, with sites located throughout the country. The customer has recently deployed VoIP throughout the entire network , and users report that it takes up to 2 seconds to establish a telephone call to an IP telephone at another office network. Drag and drop the root cause and the corresponding design solution from the left onto the correct targets on the right Not all options are used

352-011 Question 47

Options:

Buy Now
Questions 48

Refer to the exhibit.

352-011 Question 48

Which routing solution is the most scalable to connect the branches to the HQ and to connect the branches together over the internet using DMVPN?

Options:

A.

EIGRP

B.

EIGRP with the branch routers setup as stubs

C.

OSPF with each branch router as an ABR

D.

IS-IS L2 in all locations

E.

OSPF Area 0 in all locations

Buy Now
Questions 49

Which two options are considered risks or concerns when both the Internet and VPN service functions are on the same PE router? (Choose two.)

Options:

A.

Internet-based attacks can affect VPN customers.

B.

BGP cannot simultaneously run on the PE router that runs MPLS.

C.

MP-BGP prefixes increase routers ' global routing tables, which affects network convergence.

D.

Failure on the PE router affects both VPN and Internet services.

E.

Customer performance can be affected by VPN traffic if Internet-based traffic is not prioritized on the PE

Buy Now
Questions 50

Which option lists the cloud service models?

Options:

A.

Internet as a Service, Platform as a Service, and Storage as a Service.

B.

Infrastructure as a Service, Platform as a Service, and Storage as a Service.

C.

Infrastructure as a Service, Platform as a Service, and Software as a Service.

D.

Internet as a Service, Product as a Service, and Storage as a Service.

E.

Internet as a Service, Platform as a Service, and Software as a Service.

Buy Now
Questions 51

In an OSPF network with 20 routers connected together with Ethernet cabling , which topology typically takes the longest to converge?

Options:

A.

Full mesh

B.

Ring

C.

Squared

D.

Triangulated

E.

Partial mesh

Buy Now
Questions 52

A large ISP is analysing which IGP meets these following requirements

 Network must be resilient against unstable MTU in one side of newly released transmission pieces of equipment

 Network must support MPLS traffic engineering solution for future use

Which IGP must be selected and why?

Options:

A.

ISIS : in case MTU changes your TE tunnels keep the LSP stable

B.

OSPF: adjacency remains up even if MTU changes

C.

OSPF: in case MTU changes your TE tunnels keep the LSP stable

D.

ISIS: adjacency remains up even if MTU changes

Buy Now
Questions 53

Which network topology is characterized by a link fate-sharing situation?

A)

352-011 Question 53

B) 352-011 Question 53

C) 352-011 Question 53

D) 352-011 Question 53

Options:

A.

Exhibit A

B.

Exhibit B

C.

Exhibit C

D.

Exhibit D

Buy Now
Questions 54

At which two networks points is route summarization supported? (Choose two)

Options:

A.

At EIGRP AS boundaries

B.

At EIGRP interface boundaries

C.

At OSPF virtual-link boundaries

D.

At EIGRP are boundaries

E.

At OSPF area boundaries

F.

At EIGRP stub interface boundaries

Buy Now
Questions 55

ACME Agricultural requires that access to all network devices is granted based on identify validation, and an authentication server was installed for this purpose. Currently the network team uses a list of passwords based on regions to access the internal corporate network devices. Which protocol do you recommend to ensure identify validation from the authentication server to the corporate directory?

Options:

A.

HTTPS

B.

TACACS+

C.

SSH

D.

LDAP

Buy Now
Questions 56

The enterprise customer ABC Corp will deploy a centralized unified communications application to provide voice, and instant messaging to their branch offices. Some of the branch offices are located in remote locations and are connected via a 1.5 Mb/s Layer 3 VPN connection. Which two ways are the most cost-effective to ensure that this new application is implemented properly? (Choose two)

Options:

A.

Use a low bitrate codec such as G 711

B.

Set voice activity detection to avoid sending packets when the conversations is silent

C.

Enable VRF-Lite on the CE router to create a separate voice VRF

D.

Set LFI on the WAN connections to interleave the small voice packets with the large data packets

E.

Set WAN optimization on the CE router to compress the voice packets for improved bandwidth utilization and performance

F.

Use a low bitrate codec such as G 729

Buy Now
Questions 57

352-011 Question 57

Options:

Buy Now
Questions 58

Refer to the Exhibit.

352-011 Question 58

The server is running multiple VLANs on its NIC. Which two Layer 2 features should be applied to the network location identified by a circle? (Choose two)

Options:

A.

UDLD

B.

BPDU guard

C.

BPDU filtering

D.

Port Fast

E.

Loop guard

F.

PortFast trunk

Buy Now
Questions 59

Which two techniques are used in an OSPF network design to slow down the distribution of topology information caused by a rapidly flapping link? (Choose two)

Options:

A.

LSA throttling

B.

SPF throttling

C.

IP event dampening

D.

Link-state incremental SPF

E.

Link-state partial SPF

Buy Now
Questions 60

When is it required to leak routes into an IS-IS level 1 area?

Options:

A.

When MPLS L3VPN PE devices are configured in the level 1 areas

B.

When unequal cost load balancing is required between the backbone and nonbackbone areas

C.

When a multicast RP is configured in the nonbackbone area

D.

When equal cost load balancing is required between the backbone and nonbackbone areas

Buy Now
Questions 61

Refer to the exhibit.

352-011 Question 61

This Layer 2 ring has 10 VLANs with 1000 MAC addresses in each VLAN. Which protocol or mechanism provides the shortest traffic outage if the link marked with “X” fails?

Options:

A.

Ethernet linear protection switching

B.

PVRST

C.

MST

D.

Ethernet ring protection switching

Buy Now
Questions 62

Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two)

Options:

A.

WRED drop treatment

B.

Small transactions (HTTP – like behavior)

C.

Tolerance to packet loss

D.

Intolerance to jitter

E.

TCP based application

Buy Now
Questions 63

Which two options are design considerations when introducing FCoE into an existing network? (Choose two)

Options:

A.

The FCoE QoS markings may overlap with call signaling QoS markings

B.

Optical cabling is needed to transmit FCoE traffic between a server and its directly connected Ethernet switch

C.

The existing network must support a MTU of 3280 bytes

D.

Twinaxial cabling can be used to transmit FCoE traffic between a server and its directly connected Ethernet switch, if it is less than 10 meters

E.

All the servers in the data center must be retrofitted with converged Network Adapters

Buy Now
Questions 64

Which two functions are performed at the core layer of the three-layer hierarchical network design model? (Choose two).

Options:

A.

Fault isolation

B.

Qos classification and marking boundary

C.

Fast transport

D.

Reliability

E.

Load balancing

Buy Now
Questions 65

An operations engineer asks for your help with a new switching deployment. The engineer confirms that STP is enabled on an edge switch, and a particular port is connected to another switch. The switch is not receiving configuration BPDUs, although it appears that everything is functioning correctly in the network. What is the design explanation?

Options:

A.

Bridge Assurance is enabled on the port

B.

Storm control broadcast is enabled on the port

C.

REP is enabled on the port

D.

BPDU Guard is enabled on the port

Buy Now
Questions 66

An enterprise campus is adopting a network virtualization design solution with these requirements

 It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

 It must maintain end-to-end logical path transport separation across the network

 resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

Options:

A.

Path isolation

B.

Session isolation

C.

Group virtualization

D.

Services virtualization

E.

Edge isolation

Buy Now
Questions 67

Which option describes a design benefit of root guard?

Options:

A.

It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST+ and MST.

B.

It prevents switch loops by detecting on one-way communications on the physical port.

C.

It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops.

D.

It makes the port go immediately into the forwarding state after being connected.

E.

It prevents switched traffic from traversing suboptimal paths on the network.

F.

It does not generate a spanning-tree topology change upon connecting and disconnecting a station on a port.

Buy Now
Questions 68

As a part of a network design, you should tighten security to prevent man-in-the-middle. Which two security options ensure that authorized ARP responses take place according to know IP-to-MAC address mapping? (Choose two)

Options:

A.

DHCP snooping

B.

ARP spoofing

C.

ARP rate limiting

D.

Dynamic ARP Inspection

E.

Port security

Buy Now
Questions 69

What is a design application of control plane policing?

Options:

A.

CPP protects the control plane from reconnaissance and or denial-of-service attacks

B.

CPP protects the forwarding plane by rate –limiting excessive routing protocol traffic

C.

CPP protects the forwarding plane by allowing legitimate traffic and dropping excessive traffic

D.

CPP drop malformed packet that are sent to the CPU

Buy Now
Questions 70

A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?

Options:

A.

Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.

B.

Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.

C.

The multicast application sends too many packets into the network and the network infrastructure drops packets.

D.

The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.

Buy Now
Questions 71

Refer to the exhibit.

352-011 Question 71

ACME Mining has four data centers in Santiago, Cape Town, Mumbai, and Beijing. They are full-mesh connected via a 400 Mb/s EVP-LAN. A 1-TB transfer occurs daily via FTP between the Santiago and Mumbai data centers. When testing, the data transfer took an ' ' unexpected and outrageous, with an average transfer rate of 47 KB/s. The team provided this information.

LAN bandwidth usage below 5% at both data centers during transfer.

WAN bandwidth usage was between 20-30% at both data centers during transfer.

The only QoS on WAN is KB/s strict priority configured for other types of traffic.

There is no QoS on LAN.

The ping RTT average between data centers is 378 milliseconds.

Which action improves the file transfer rate?

Options:

A.

Use SFTP instead of FTP

B.

Apply optimization techniques at both data centers.

C.

Use TFTP instead of FTP.

D.

Classify FTP transfer and use the strict priority queue on the WAN.

Buy Now
Questions 72

Which open source message broker is in the Cisco Cloud Center?

Options:

A.

Apache kafka

B.

HornetQ

C.

RabbitMQ

D.

Fuse Message Broker

E.

Oracle Message Broker

Buy Now
Questions 73

How can a network designer reduce the amount of LSA flooding occurring in a large, single area fully-meshed OSPF topology?

Options:

A.

Implemented passive OSPF interfaces on the routers not participating on the DR/BDR election.

B.

Use access control lists to control outbound advertisements.

C.

Ensure DR and BDR routers are placed optimally in the topology.

D.

Place all point-to-point links in their own dedicated areas.

Buy Now
Questions 74

A healthcare customer requested that health statistics from their infrastructure devices are to be sent over their service provider MPLS network. Which protocol must be enabled?

Options:

A.

SNMPv3

B.

Syslog TLS

C.

syslog

D.

SNMPv2

E.

SSH

Buy Now
Exam Code: 352-011
Exam Name: Cisco Certified Design Expert Practical Exam
Last Update: Apr 30, 2026
Questions: 249

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 352-011 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 352-011 pdf