352-001.pdf
Q: 1
Refer to the exhibit. You are asked to design the network to converge within 60 ms for unicast
packets after a link failure. Native IPv4 forwarding is used and the forwarding plane may not be
altered. Which technology can be enabled while conforming to the design requirements?Options
Q: 2
Two offices are connected via one 10 Gigabit Ethernet link. What happens to the EIGRP neighborship
if a link failure occurs?
Options
Q: 3
As network designer what will be your main concern with regards to virtualizing multiple network
zones into a single hardware device?
Options
Q: 4
Which design consideration is valid when you contrast fabricPath and trill?
Options
Q: 5
A Layer 2 Cisco FabricPath multipoint processor network requires more bandwidth. How can you
reduce the oversubscription ratio for the edge ports in the network design?
Options
Q: 6
You are a network designer and you must ensure that the network you design is secure . How do you
plan to prevent infected devices on your network from sourcing random DDoS attacks using forged
source address?
Options
Q: 7
What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-
layer hierarchical network is true?
Options
Q: 8
You are reviewing a new data center design for a customer. They chose to leverage a tunnel-based
overlay technology for quick deployment and multitenant security. Which design concern can affect
the availability across the data center?
Options
Q: 9
In a routed access hierarchical campus design, the access-to-distribution Layer 2 uplink trunks are
replaced with Layer 3 point-to-point routed links. Why is it recommended that VLANs are confined on
a single access switch rather than span across multiple access switches?
Options
Q: 10
Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?
Options
Question 1 of 10