CCDE™ Written Exam (v2.1) v13.0 (352-001)

Page:    1 / 34   
Total 507 questions

A customer is using a service provider to provide a WAN backbone for a 30-site network. In establishing the network, the customer must work within these constraints:
The customer has a self-managed MPLS backbone.
The VPLS WAN backbone of the service provider does not support PIM snooping.
Multicast VPN must be used for multicast support inside some VRFs.
What can the customer do so that multicast traffic is NOT flooded to all sites?

  • A. Configure static GRE tunnels and run the MPLS and multicast VPN inside these GRE tunnels.
  • B. Use Label Switched Multicast for the multicast transport.
  • C. Use PIM-SSM as the multicast routing protocol with IETF Rosen Draft multicast VPN.
  • D. Configure a static mapping between multicast addresses and MAC addresses.
  • E. Use GET VPN to encrypt the multicast packets inside the WAN.


Answer : A

When you design a network, when would it be required to leak routes into a Level 1 area?

  • A. when a multicast RP is configured in the nonbackbone area
  • B. when MPLS L3VPN PE devices are configured in the Level 1 areas
  • C. when equal cost load balancing is required between the backbone and nonbackbone areas
  • D. when unequal cost load balancing is required between the backbone and nonbackbone areas


Answer : B

What are two benefits of following a structured hierarchical and modular design? (Choose two.)

  • A. Each component can be designed independently for its role.
  • B. Each component can be managed independently based on its role.
  • C. Each component can be funded by different organizations based on its role.
  • D. Each component can support multiple roles based on the requirements.
  • E. Each component can provide redundancy for applications and services.


Answer : A,B

Refer to the exhibit.


An enterprise is migrating its single-area OSPF network from a Frame Relay WAN service to an MPLS L3VPN service. Frame Relay will remain in only a few sites that require increased resiliency via two different WAN connections.
Which feature could be used in the?
MPLS VPN service provider network to support the design requirement by ensuring that during normal operation, intersite traffic will only use the MPLS VPN service and not the old
Frame Relay service?

  • A. virtual links
  • B. sham links
  • C. multiple stub areas
  • D. super backbone


Answer : B

ACME Corporation is deploying a new HR application that requires the network infrastructure to monitor and react to certain conditions in the network. Which feature should be used to meet this design requirement?

  • A. Cisco IOS Embedded Event Manager
  • B. IP SLA
  • C. reflexive ACLs
  • D. route maps
  • E. SOAP
  • F. exit status


Answer : A

A company plans to include Nonstop Forwarding and Bidirectional Forwarding Detection as a part of their network redundancy plan. In which two ways do NSF and BFD work together when different hardware platforms are compared? (Choose two.)

  • A. During supervisor engine or routing engine failover, the NSF feature will always ensure that the BFD at the peer router will not trigger a link down independent of the used hardware platform.
  • B. At some hardware platforms, BFD and NSF are not supported together. During supervisor engine or routing engine failover, the BFD at the peer router will trigger a link down.
  • C. To ensure that BFD at the peer router will not trigger a link down during NSF, the BFD packets must be processed fast enough, and, during supervisor engine or routing engine failover, by processing the BFD independent from the supervisor engine or routing engine.
  • D. Because BFD is always processed at the line cards (not at the supervisor engine or routing engine), a supervisor engine or routing engine failover will not affect the BFD peer router.
  • E. Because BFD is always processed at the supervisor engine or routing engine, a supervisor engine or routing engine failover will always trigger a link down at the peer router.


Answer : B,C

Which two aspects are considered when designing a dual hub, dual DMVPN cloud topology? (Choose two.)

  • A. recommended for high availability
  • B. requires all sites to have dual Internet connections
  • C. spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly
  • D. hub sites must connect to both DMVPN clouds
  • E. will only work with single-tier headend architecture


Answer : A,E

Refer to the exhibit.


Traffic in this network that is destined for 10.1.3.1 arrives at R1. Which path will the traffic take from here and why?

  • A. through R3, because it is the lowest cost path
  • B. through R2, because it is an intra-area path
  • C. through R2, because R3 is in a different autonomous system
  • D. through R3, because R1 will only have a summary (type 3) LSA from R2


Answer : B

You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?

  • A. ACL-based forwarding
  • B. ACL filtering by destination
  • C. Unicast RPF loose mode
  • D. Unicast RPF strict mode


Answer : D

The network administrator of a branch office network has decided to deploy Unicast RPF at the access layer.
He insists that the design must guarantee that all the packets arriving on the router interfaces are assigned to the same interface subnet.
Which mode of Unicast RPF would you recommend as the lead network designer?

  • A. uRPF strict mode
  • B. uRPF loose mode
  • C. uRPF VRF mode
  • D. RPF feasible mode


Answer : A

Which technique can you use to detect forwarding path failures at a uniform rate, and reconvergence times will be consistent and predictable when your routers are in the same broadcast domain?

  • A. Enable BFD on your routers.
  • B. Configure your routers with IP-SLA to ping the peer router.
  • C. Configure your routers with IP-SLA and track to ping the peer and switch to a default route if the pings fail.
  • D. Tune your routing protocol timers.


Answer : A

Refer to the exhibit.


You are designing a loop-free hierarchical VPLS service. Which two design considerations should be implemented for the pseudowires between the N-PE and U-PE routers? (Choose two.)

  • A. Disable split horizon toward the N-PE routers.
  • B. Disable split horizon toward the U-PE router.
  • C. Enable split horizon toward the U-PE router.
  • D. Enable split horizon toward the N-PE routers.
  • E. Disable MAC learning on the U-PE route.
  • F. Disable MAC learning on the N-PE routers.


Answer : B,D

You are tasked with implementing a 1000-phone remote access solution, where phones will traverse a WAN edge router. Assuming all of the following features are supported in a hardware- assisted manner, which of the following will have the most detrimental impact on the delay of the packet?

  • A. encryption
  • B. stateful firewall
  • C. MPLS encapsulation
  • D. GRE encapsulation


Answer : A

AS100 and AS200 each have two peering points in different parts of their network. AS100 would like to use one of the links and keep the other link as backup. What should be changed for the design inside AS100 for prefixes received from AS200?

  • A. MED
  • B. weight
  • C. AS-PATH
  • D. local preference


Answer : D

Two MPLS service providers (SP1 and SP2) are offering inter-provider RFC 2547/4364- based IP-VPN service to an enterprise customer. IP traffic among some of the customer's sites has to traverse both of the service providers. The service providers and the enterprise do not know what the minimum MTU is along the end-to-end path.
What could be done to guarantee that large packets are not dropped for MTU-related reasons?

  • A. enable Path MTU Discovery on all devices within SP1 and SP2
  • B. enable Path MTU Discovery on all devices within the enterprise
  • C. configure the IP sender or senders to set the DF flag in the IP header
  • D. configure the IP sender or senders to clear the DF flag in the IP header


Answer : B

Page:    1 / 34   
Total 507 questions