Summer Sale - Special Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 44314956B5

Good News !!! 352-011 Cisco Certified Design Expert Practical Exam is now Stable and With Pass Result

352-011 Practice Exam Questions and Answers

Cisco Certified Design Expert Practical Exam

Last Update 2 days ago
Total Questions : 249

352-011 is stable now with all latest exam questions are added 2 days ago. Just download our Full package and start your journey with Cisco Certified Design Expert Practical Exam certification. All these Cisco 352-011 practice exam questions are real and verified by our Experts in the related industry fields.

352-011 PDF

352-011 PDF (Printable)
$59.85
$132.99

352-011 Testing Engine

352-011 PDF (Printable)
$65.25
$144.99

352-011 PDF + Testing Engine

352-011 PDF (Printable)
$81.9
$181.99
Question # 1

An ISP provides VoIP and internet services to its customers. For security reasons, these services must be transported in different MPLS Layer 3 VPNs over the ISP core network. The customer CEs do not have the ability to segment the services using different VLANs and have only one uplink interface that does not support VLAN tagging. How should you design the network to ensure that VoIP traffic that is received from the CE goes in the VoIP VPN, and that Internet traffic goes into the Internet VPN on the ISP PE devices?

Options:

A.  

Use a secondary interface IP address to differentiate between VoIP and Internet traffic

B.  

Extend the Layer 3 VPN toward the CE

C.  

Enable NBAR on the PE to direct the traffic into the correct VRF

D.  

Use a subinterface on the PE for each service, VoIP and Internet, with different subnets

E.  

Use policy-based routing to direct traffic into the correct VRF

Discussion 0
Question # 2

Refer to the exhibit.

Question # 2

In a link failure scenario, what is a benefit of adding APS protected link to the design solution?

Options:

A.  

APS switches traffic to a backup fiber automatically and sends notifications

B.  

APS detects failure and sends notifications

C.  

APS detects failure on transmission infrastructure based on copper.

D.  

APS applies QoS policies in case Of link failure

Discussion 0
Question # 3

You are designing a new data center network. Drag and drop new data center requirements on the left into the appropriate design principle on the right.

Question # 3

Options:

Discussion 0
Question # 4

You must measure the amount of traffic that a mobile packet gateway produces when mobile phones access rather than the Internet. Which action do you take to allow this visibility?

Options:

A.  

Poll OID that is configured for internal servers with SNMP.

B.  

Collect information about traffic to the service prowler marked with IP precedence.

C.  

Collect traffic information that is related to internal server IP addresses with NetFlow.

D.  

Measure traffic characteristics of known internal servers with IP SL

A.  

Discussion 0
Question # 5

Which load balancing option for IP-only traffic is the least efficient in terms of EtherChannel physical links utilization?

Options:

A.  

On a per source IP address basis

B.  

On a per destination MAC address basis

C.  

On a per destination IP address basis

D.  

On a per port number basis

Discussion 0
Question # 6

You are solving a design failure on a massive Hadoop cluster network that has an application with TCP incast behavior (also known as TCP Throughput collapse) affecting its many-to-one communications with packet loss at the last-hop network device. Which metric must be measured to ensure that the network provides the best performance for this application?

Options:

A.  

Availability

B.  

Bandwidth utilization

C.  

Jitter values

D.  

Buffer utilization

Discussion 0
Question # 7

Which markup language is used to format Ansible's playbook?

Options:

A.  

ADML

B.  

YAML

C.  

HTML

D.  

XML

E.  

NAML

Discussion 0
Question # 8

Which two impacts of adding the Ip events dampening feature to a network design are true? (Choose two.)

Options:

A.  

It switches traffic immediately after a link failure.

B.  

It reduce the utilization of system processing resources.

C.  

It speeds up link failure detection.

D.  

It protects against routing loops.

E.  

it improves overall network stability.

Discussion 0
Question # 9

In which two ways is a network design improved by including IP Event Dampening? (Choose two)

Options:

A.  

Provides sub-second convergence

B.  

Quickly detects network failures

C.  

Prevent routing loops

D.  

Improves network stability

E.  

Reduces processing load

Discussion 0
Question # 10

Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two)

Options:

A.  

WRED drop treatment

B.  

Small transactions (HTTP – like behavior)

C.  

Tolerance to packet loss

D.  

Intolerance to jitter

E.  

TCP based application

Discussion 0
Question # 11

Which option describes the fundamental design differences between an IP-based network design and a SAN-based?

Options:

A.  

An IP-based design has redundant connectivity in the fabric and high amounts of east-west traffic, whereas a SAN-based design uses redundancy from a dual-attached host, which uses separate fabrics and has very little east-west traffic

B.  

An IP-based design has redundancy from the host and high amounts of east-west traffic, whereas a SAN-based design uses redundancy in the fabric and very little east-west traffic

C.  

An IP-based design has redundant connectivity in the fabric and high amounts of east-west traffic, whereas a SAN-based design uses zoning based redundancy which uses separate fabrics and has very little east-west traffic

D.  

An IP-based design has redundant connectivity in the fabric and very little east-west traffic, whereas a SAN-based design uses redundancy in the host, which uses separate fabrics and has high amounts of east-west traffic

Discussion 0
Question # 12

An operations engineer asks for your help with a new switching deployment. The engineer confirms that STP is enabled on an edge switch, and a particular port is connected to another switch. The switch is not receiving configuration BPDUs, although it appears that everything is functioning correctly in the network. What is the design explanation?

Options:

A.  

Bridge Assurance is enabled on the port

B.  

Storm control broadcast is enabled on the port

C.  

REP is enabled on the port

D.  

BPDU Guard is enabled on the port

Discussion 0
Question # 13

Refer to the exhibit.

Question # 13

Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

Options:

A.  

Encapsulate packets into an EoIP tunnel and send them to the anchor controller

B.  

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

C.  

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel

D.  

Send packets without encapsulation to the anchor controller over the routed network

Discussion 0
Question # 14

Which design benefit of Bridge Assurance is true?

Options:

A.  

It prevents switched traffic from traversing suboptimal paths on the network.

B.  

It prevents switched loops caused by unidirectional point-to-point, link condition on Rapid PVST+ and MST

C.  

It allows small unmanaged switches to be plugged into ports of access scenes without the risk of switch loops.

D.  

It suppresses a spanning-tree topology change upon connecting and disconnecting a station on a port.

Discussion 0
Question # 15

Which multicast technology provides a large, many-to-many connectivity for a new application while minimizing load on the existing network infrastructure?

Options:

A.  

PIM Sparse Mode

B.  

Bidirectional PIM

C.  

Any-Source Multicast

D.  

Source Specific Multicast

Discussion 0
Question # 16

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three)

Options:

A.  

To enable unused services

B.  

Warning banners

C.  

Routing protocol authentication

D.  

Control Plane Policing

E.  

Redundant AAA servers

F.  

SNMPv3

Discussion 0
Question # 17

You are redesigning a single-level IS-IS network with 500 routers, which have short-haul and long-haul links Most of the time the routing domain is stable, but periodically interfaces on long-haul links bounce for a short period of time , causing 10 to 20 flaps in a few minutes. The probable cause is local road construction. Although fast convergence important, the client has concerns about taxing CPU cycles on the older routing platforms. What change should you recommend that both protects the CPU of the older routers during the short periods of excessive flapping, yet does not have an impact on fast convergence for all interface failures?

Options:

A.  

Modify hello timers on routers with short-haul links

B.  

Implement LSP generation throttling on routers with long-haul links

C.  

Modify the length of time than an LSP remains in the router database without being refreshed on all routers

D.  

Implement a delay between successive IS-IS LSP packet transmissions on routers with long-haul links

Discussion 0
Question # 18

Which two options are design considerations when introducing FCoE into an existing network? (Choose two)

Options:

A.  

The FCoE QoS markings may overlap with call signaling QoS markings

B.  

Optical cabling is needed to transmit FCoE traffic between a server and its directly connected Ethernet switch

C.  

The existing network must support a MTU of 3280 bytes

D.  

Twinaxial cabling can be used to transmit FCoE traffic between a server and its directly connected Ethernet switch, if it is less than 10 meters

E.  

All the servers in the data center must be retrofitted with converged Network Adapters

Discussion 0
Question # 19

What is design considerations of policy-based routing?

Options:

A.  

It decreases failure detection time

B.  

It can create microloops during network reconvergence

C.  

It routes traffic destined to a set of users through different exit points

D.  

It uses RSVP to differentiate traffic flows, so queuing mechanisms can prioritize them

Discussion 0
Question # 20

Refer to the exhibit.

Question # 20

Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged. Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.)

Options:

A.  

Enable mutual redistribution between OSPF and RIP on one border router.

B.  

Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags.

C.  

Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router

B.  

D.  

Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database.

E.  

Filter external routes on Router A and Router B based on route tags.

Discussion 0
Question # 21

Which two options describe the advantages of using DWDM over traditional optical networks? (Choose two)

Options:

A.  

Inherent topology flexibility with intelligent chromatic dispersion

B.  

Inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

C.  

Inherent topology flexibility with built-in service protection

D.  

Inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

E.  

Ability to expand bandwidth over existing optical infrastructure

Discussion 0
Question # 22

An enterprise campus is adopting a network virtualization design solution with these requirements

 It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

 It must maintain end-to-end logical path transport separation across the network

 resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

Options:

A.  

Path isolation

B.  

Session isolation

C.  

Group virtualization

D.  

Services virtualization

E.  

Edge isolation

Discussion 0
Question # 23

Drag the fast Reroute mechanism on the left and drop it onto the corresponding routing protocol on the right

Question # 23

Options:

Discussion 0
Question # 24

A switched network is being designed to support a manufacturing factory. Due to cost constraints, fiber-based connectivity is not an option. Which design allows for a stable network when there is a risk of interference from the manufacturing hardware in use on the factory floor?

Options:

A.  

Design the network to include UDLD to detect unidirectional links and take them out of service.

B.  

Design the network to include Ether Channel bundles to prevent a single-link failure from taking down a switch interconnection point.

C.  

Design the network to include loop guard to prevent a loop in the switched network when a link has too much interference.

D.  

Design the network to include Backbone Fast on all devices to accelerate failure convergence times.

Discussion 0
Question # 25

You are hired to assist an enterprise customer to design their global WAN network. A protected DWDM circuit with disjoint fiber routes and guaranteed restoration times is ordered to connect two hub sites. Which option is a BFD design consideration in relation to protected DWDM?

Options:

A.  

BFD failure detection must be faster than DWDM restoration time

B.  

The BFD hello timer must match the DWDM circuit restoration time

C.  

BFD failure detection must be longer than DWDM restoration time

D.  

BFD cannot be used with protected DWDM

Discussion 0
Question # 26

A large enterprise network running IS-IS wants to deploy IGP traffic engineering, but they are concerned that the IS-IS default metrics are not flexible enough. Which feature must be enabled to provide traffic engineering with the minimum amount of changes?

Options:

A.  

IS-IS Narrow Metrics

B.  

IS-IS DIS

C.  

IS-IS Wide Metrics

D.  

IS-IS Multitopology

Discussion 0
Question # 27

Which two are IoT sensor-specific constraints? (Choose two)

Options:

A.  

Memory

B.  

Processing power

C.  

The amount of devices

D.  

Cooling

E.  

Standard transport protocols

Discussion 0
Question # 28

You are working on a network design plan for a company with approximately 2000 sites. The sites will be connected using the public Internet. You plan to use private IP addressing in the network design, which will be routed without NAT through an encrypted WAN network. Some sites will be connected to the Internet with dynamic public IP addresses, and these addresses may change occasionally. Which VPN solution will support these design requirements?

Options:

A.  

GET VPN must be used, because DMVPN does not scale to 2000 sites.

B.  

DMVPN must be used, because GET VPN does not scale to 2000 sites.

C.  

GET VPN must be used, because private IP addresses cannot be transferred with DMVPN through the public Internet.

D.  

DMVPN must be used, because private IP addresses cannot be transferred with GET VPN through the public Internet.

E.  

GET VPN must be used, because DMVPN does not support dynamic IP addresses for some sites.

F.  

DMVPN must be used, because GET VPN does not support dynamic IP addresses for some sites.

Discussion 0
Question # 29

What two options are significant drivers for 5G in IoT networks? (Choose two)

Options:

A.  

Energy Efficiency

B.  

Lower Latency

C.  

Mass Connectivity

D.  

Programmability

E.  

Higher data rates

Discussion 0
Question # 30

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50MSEC). In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?

Options:

A.  

TE backup tunnel

B.  

Next-hop (NHop) tunnel

C.  

FRR Backup tunnel

D.  

next-next-hop (NNHop) tunnel

Discussion 0
Question # 31

How must queue sizes be designed to ensure that an application functions correctly?

Options:

A.  

The default queue sizes are good for any deployment

B.  

Each individual device queuing delay in chain must be less than or equal to the application required delay

C.  

The queuing delay on every device in chain must be exactly the same

D.  

The sum of the queuing delay of all devices in chain must be less than or equal to the application required delay

Discussion 0
Question # 32

You work as a network designer for a company that is replacing their Frame Relay WAN with an MPLS VPN service, where the PE-to-CE routing protocol is BGP. The company has 3000 routes in their distribution routers, and they would like to advertise their access routers through the MPLS network. Their service provider, however, only supports 1000 prefixes per VR

F.  

Which two design solutions can be applied to ensure that your access routers will be able to reach all devices in your network? (Choose two.)

Options:

A.  

Configure the distribution routers to send a default route to the MPLS network

B.  

Configure null routes and aggregate routes for the prefixes in your network on the distribution routers

C.  

Summarize the routes on MPLS WAN interfaces of the distribution routers

D.  

Use prefix lists on the distribution routers to control which routes are sent to MPLS network

E.  

Configure the access routers to send a default route to the MPLS network

Discussion 0
Question # 33

There is an MPLS-enabled link constantly flapping on an MPLS VPN network. Given that the network runs OSPF as the IGP protocol, which design mechanism will stabilize the network and avoid constant re-convergence?

Options:

A.  

IP Event Dampening

B.  

OSPF fast hellos

C.  

IP SLA

D.  

Partial SPF

Discussion 0
Question # 34

What are two possible drawbacks of ending Loop-Free Alternate to support fast convergence for most destination IGP prefixes? (Choose two)

Options:

A.  

The IGP topology might need to be adjust

B.  

Loop-free alternate’s convergence in less than 100 milliseconds is not possible

C.  

Loop-free alternate’s are supported only for prefixes that are considered external tot the IGP

D.  

Loop-free alternates are not supported in global VPN VRF OSPF instances

E.  

Additional path computations are needed

Discussion 0
Question # 35

Refer to the exhibit.

Question # 35

This enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer 3VPN solution and manages the CE routers, but they do not currently multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

Options:

A.  

Enable a GRE tunnel between nodes C1 and C4

B.  

Enable a GRE tunnel between nodes CE1 and CE2

C.  

Enable a GRE tunnel between nodes C2 and C4

D.  

Implement hub and spoke MPLS VPN over DMVPN(also known as 2547oDMVPN) between CE1 and CE2

E.  

The service provider must provide a Draft Rosen Solution to enable a GRE tunnel node PE1 and PE2

Discussion 0
Question # 36

Drag and drop the design characteristics of GET VPN from the left to the right. Not all options are used.

Question # 36

Options:

Discussion 0
Question # 37

Which two functions are performed at the core layer of the three-layer hierarchical network design model? (Choose two).

Options:

A.  

Fault isolation

B.  

Qos classification and marking boundary

C.  

Fast transport

D.  

Reliability

E.  

Load balancing

Discussion 0
Get 352-011 dumps and pass your exam in 24 hours!

Free Exams Sample Questions