Cisco 352-001 - CCDE™ Written Exam (v2.1) Exam

Question #6 (Topic: Topic 1)
Refer to the exhibit.
[Cisco-352-001-13.0/Cisco-352-001-5_2.png]
You are designing a spanning-tree network for a small campus. Which two of these options
would result in a trouble-free spanning-tree network design? (Choose two.)
A. Convert all ports to trunk ports, prune off the VLANs that you do not require, and minimize the number of blocking ports. B. Introduce Layer 3 VLANs (SVIs) and prune off the VLANs that you do not require. C. Convert all the ports to trunk and enable BackboneFast. D. Convert all the ports to trunk and enable UplinkFast between all the links.
Answer: A,B
Question #7 (Topic: Topic 1)
What are three key design principles when using a classic hierarchical network model?
(Choose three.)
A. The core layer controls access to resources for security. B. The core layer should be configured with minimal complexity. C. The core layer is designed first, followed by the distribution layer and then the access layer. D. A hierarchical network design model aids fault isolation. E. The core layer provides server access in a small campus. F. A hierarchical network design facilitates changes.
Answer: B,D,F
Question #8 (Topic: Topic 1)
Refer to the exhibit.
[Cisco-352-001-13.0/Cisco-352-001-6_2.png]
You are planning the design of an encrypted WAN. IP packets will be transferred over
encrypted GRE tunnels between routers B and C. The packet size is limited to a maximum
of 1500 bytes inside the WAN between routers B and C. If endpoint 1 tries to send 1500-
byte IP packets to endpoint 2, in what three ways will the network design handle the
fragmentation in three different possible network configurations?
(Choose three.)
A. When router B fragments packets after the encryption, router C must reassemble these fragmented packets. B. When router B fragments packets before the encryption, router C must reassemble these fragmented packets. C. When router B fragments packets after the encryption, the endpoint 2 must reassemble these fragmented packets. D. When router B fragments packets before the encryption, endpoint 2 must reassemble these fragmented packets. E. When router A fragments packets, router C must reassemble these fragmented packets. F. When router A fragments packets, endpoint 2 must reassemble these fragmented packets.
Answer: A,D,F
Question #9 (Topic: Topic 1)
Which network management tool should a network manager consult in order to pinpoint the
cause of a routing recursion error?
A. debug (for BGP output) B. syslog (for BGP errors) C. RMON events group D. SNMP routing traps
Answer: A
Question #10 (Topic: Topic 1)
Refer to the exhibit.
[Cisco-352-001-13.0/Cisco-352-001-8_2.png]
All routers in this network are configured to run OSPF on all interfaces. If you examine the
OSPF database on R4, in which LSA will you find 10.1.5.0/24?
A. 10.1.5.0/24 is in a network (type 2) LSA originated by R3. B. 10.1.5.0/24 is in a summary (type 3) LSA originated by R3. C. 10.1.5.0/24 is not in any LSA in the OSPF database at R4, because R4 and R3 are in different areas. D. 10.1.5.0/24 is in a router (type 1) LSA generated by R3.
Answer: B
Download Exam
Page: 2 / 101
Total 501 questions