Pass the Cisco CCDE 352-011 Questions and answers with CertsForce

Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions
Questions # 41:

An network is designed to use OSPF to reach eBGP peers. Which condition should be avoided in the design to potentially prevent the eBGP peers do not flap continuously in case of link failure?

Options:

A.

Disable BGP synchronization.


B.

Advertise IP addresses used on eBGP peer statement via a non-backbone OSPF area.


C.

Advertise via eBGP IP addresses used on eBGP peer statements.


D.

Use an ACL to block BGP in one direction.


Expert Solution
Questions # 42:

You are designing dual-homed active/active ISP connections from an enterprise customer for internet services, and you have recommended BGP between the customer and ISP. When three security mechanisms do you enable to secure the connection? (Choose three)

Options:

A.

uRPF is strict mode


B.

remote triggered black holes


C.

IDS


D.

GTSM


E.

Routing protocol authentication


F.

uRPF in loose mode


Expert Solution
Questions # 43:

In a design around fast convergence in case of a link failure, what is the justification for using a point-to-point OSPF network type on the Ethernet links between leaf-and-spine switches on a data center fabric?

Options:

A.

Link failure tears down neighbor relationships regardless of network type configured


B.

Type 1 LSAs are not generated on a point-to-point network type


C.

Adjacencies can be built faster without a DR/BDR on the segment


D.

The fabric memory requirements are significantly smaller than with a DR/BDR on each leaf and spine segment


E.

The point-to-point network type allows for NSF to be used in this design


Expert Solution
Questions # 44:

Which two statements about VXLAN are true? (Choose two)

Options:

A.

VXLAN is a Cisco proprietary solution


B.

VXLAN is an encapsulation method used to create a Layer 3 overlay network


C.

VXLAN can be used to enforce Layer 2 isolation in a multitenant infrastructure


D.

VXLAN uses the Spanning Tree protocol for loop prevention


E.

VXLAN overcomes the 802.1Q virtual LAN address space limitation


Expert Solution
Questions # 45:

You are designing a traffic monitoring and analysis system for a customer. Which traffic monitoring technique would you recommend to place the amount of burden on the network infrastructure?

Options:

A.

SPAN monitor ports


B.

passive taps


C.

IP NBAR


D.

NetFlow


Expert Solution
Questions # 46:

Which two design aspects should a metro service provider consider when planning to deploy REP for his backbone? (Choose two.)

Options:

A.

Two REP segments can be connected redundantly at two points, one connection will be blocked as per the STP defined in IEEE 802.1d.


B.

UDLD can be enabled on REP interfaces to detect unidirectional failures.


C.

The guaranteed convergence recovery time is less than 50 ms for the local segment.


D.

A REP segment is limited to a maximum of seven devices.


E.

VLAN load balancing for optimal bandwidth usage is supported in any REP segment.


Expert Solution
Questions # 47:

A Mobile Service Provider would like to design and deploy an Ethernet service which has similar physical link failover/failback characteristics on the active/backup links as the APS/MSP SONET properties. Which Layer 2 service addresses should be considered to address this design feature?

Options:

A.

Port-Channel


B.

MLPPP


C.

Flex Link


D.

Ethernet Pseudowire


Expert Solution
Questions # 48:

Which three network management requirements are common practices in network design? (Choose three)

Options:

A.

Ensure that all network devices have their clocks synchronized.


B.

Collect SNMP poll information for future regression analysis.


C.

Capture both ingress and egress flow-based packets, while avoiding duplication of flows.


D.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.


E.

Validate data plane health, and application and services availability, with synthetic traffic.


Expert Solution
Questions # 49:

Refer to the exhibit.

Question # 49

Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

Options:

A.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller


B.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite


C.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel


D.

Send packets without encapsulation to the anchor controller over the routed network


Expert Solution
Questions # 50:

Which four resources does Cisco Cloud Center provision in an ACL environment? (Choose four)

Options:

A.

VLAN Pool


B.

Contracts


C.

End point Group (EPG)


D.

VRF


E.

Subject/Filters


F.

Application Network Profile (ANP)


Expert Solution
Viewing page 5 out of 8 pages
Viewing questions 41-50 out of questions