Tag: 352-001

Cisco 352-001 Dumps, Download Latest Cisco 352-001 Answers Are Based On The Real ExamCisco 352-001 Dumps, Download Latest Cisco 352-001 Answers Are Based On The Real Exam

Welcome to download the newest Flydumps 642-832 VCE dumps: http://www.flydumps.com/642-832.html

Cisco 352-001 exam is very adapted to the people who are interesting in the information technology domain. If you want to get the higher level, you not only to take part in the Cisco 648-385 exam sample questions in FLYDUMPS, but also other Cisco certification. The FLYDUMPS prepares many certifications for people. Find the upgrade versions of Cisco 352-001 exam science, latest Cisco 352-001 questions and Cisco 352-001 pdf exam. With FLYDUMPS Cisco 352-001 exam sample questions, your success is guaranteed. There must be your acquisitive. This will present you with facts that you simply need to get success the exam.

QUESTION 26
During a network design review, it is recommended that the network with a single large area should be broken up into a backbone and multiple nonbackbone areas. There are differing opinions on how many ABRs are needed for each area for redundancy. What would be the impact of having additional ABRs per area?
A. There is no impact to increasing the number of ABRs.
B. The SPF calculations are more complex.
C. The number of externals and network summaries are increased.
D. The size of the FIB is increased.

Correct Answer: C
QUESTION 27
A large enterprise customer is migrating thousands of retail offices from legacy TDM circuits to an Ethernet-based service. The network is running OSPF and has been stable for many years. It is now possible to backhaul the circuits directly to the data centers, bypassing the regional aggregation routers. Which two networking issues need to be addressed to ensure stability with the new design? (Choose two.)
A. Nothing will change if the number of offices is the same.
B. Nothing will change if the number of physical interfaces stays the same.
C. The RIB will increase significantly.
D. The FIB will increase significantly.
E. The amount of LSA flooding will increase significantly.
F. The size of the link-state database will increase significantly.

Correct Answer: EF
QUESTION 28
Refer to the exhibit.

The design is being proposed for use within the network. The CE devices are OSPF graceful restart-capable, and the core devices are OSPF graceful restart-aware. The WAN advertisements received from BGP are redistributed into OSPF. A forwarding supervisor failure event takes place on CE A. During this event, how will the routes learned from the WAN be seen on the core devices?
A. via CE A and CE B
B. via CE A
C. via CE B
D. no WAN routes will be accessible

Correct Answer: C QUESTION 29
Refer to the exhibit.

How would you adjust the design to improve convergence on the network?
A. Add an intra-POP link between routers 1A and 1B, and enable IP LFA FRR.
B. Use an IP SLA between the end stations to detect path failures.
C. Enable SSO-NSF on routers 1A and 1B.
D. Use BGP to connect the sites over the WAN.

Correct Answer: A
QUESTION 30
A company requests that you consult with them regarding the design of their production, development, and test environments. They indicate that the environments must communicate effectively, but they must be kept separate due to the inherent failures on the development network. What will be configured on the links between the networks to support their design requirements?
A. IBGP
B. EBGP
C. OSPF
D. static routes

Correct Answer: B QUESTION 31
A service provider creates a network design that runs MPLS in its WAN backbone using OSPF as the IGP routing protocol. What would be two effects of additionally implementing MPLS-TE? (Choose two.)
A. MPLS-TE is required to reroute traffic within less than 1 second in case of a link failure inside the backbone.
B. MPLS-TE is required to route different MPLS QoS service classes through different paths.
C. MPLS-TE and OSPF cannot be used together inside one MPLS network.
D. MPLS-TE cannot use OSPF for the traffic path calculation.
E. MPLS-TE is required to create backup paths independently from the IGP.

Correct Answer: BE
QUESTION 32
Refer to the exhibit.

Your junior design engineer presents this configuration design. What is the next-hop router for CE3, and why?
A. CE1. BGP weight is higher than CE2.
B. CE2. EBGP administrative distance is lower than RIP.
C. CE2. The link between CE2 and PE1 has more bandwidth than CE1-to-PE1.
D. CE1. HSRP on CE1 is in active state.

Correct Answer: D
QUESTION 33
Which two mechanisms ensure that a network design provides fast path failure detection? (Choose two.)
A. BFD
B. fast hello packets
C. UDLD
D. IP Cisco Express Forwarding

Correct Answer: AB
QUESTION 34
In which two ways is a network design improved by the inclusion of IP Event Dampening? (Choose two.)
A. reduces processing load
B. provides sub-second convergence
C. improves network stability
D. prevents routing loops
E. quickly detects network failures
Correct Answer: AC QUESTION 35
You are evaluating convergence characteristics of various interior gateway protocols for a new network design. Which technology allows link-state routing protocols to calculate paths to destination prefixes that are functionally similar to feasible successors in Enhanced Interior Gateway Routing Protocol?
A. Incremental Shortest Path First
B. Cisco Multiprotocol Label Switching Traffic Engineering Fast Reroute
C. Loop-Free Alternate Fast Reroute
D. partial route calculation
E. Fast-Flooding

Correct Answer: C
QUESTION 36
You are hired to design a solution that will improve network availability for users on a campus network with routed access. If the budget limits you to three components, which three components would you recommend in your design proposal? (Choose three.)
A. redundant power supplies in the access routers
B. standby route processors for SSO in the core routers
C. standby route processors for SSO in the distribution routers
D. standby route processors for SSO in the access routers
E. replace copper links between devices with fiber links

Correct Answer: ADE
QUESTION 37
You are designing a network to support data, voice and video. Which two main factors will you address to improve network convergence? (Choose two.)
A. event propagation delay
B. failure detection delay
C. forwarding engine update delay
D. routing table recalculation delay
Correct Answer: BD
QUESTION 38
Refer to the exhibit.

This diagram depicts the design of a small network that will run EIGRP on R1 and R2, and EIGRP Stub on R3. In which two ways will this network be impacted if there is link instability between R1 and R2? (Choose two.)
A. R1 will have routes in its routing table that originate from R2 and R3.
B. R3 will have routes in its routing table that originate from R1 and R2.
C. R2 will have routes in its routing table that originate from R1 and R3.
D. R3 will be transit for traffic between R1 and R2.
E. R3 will not be transit for traffic between R1 and R2.

Correct Answer: BE
QUESTION 39
Refer to the exhibit.

In this BGP design, what is the next hop for 10.1.1.0/24 on R8 and R7?
A. The next hop for 10.1.1.0/24 on R7 is R8 and the next hop for R8 is R7.
B. The next hop for 10.1.1.0/24 on R7 is R5 and the next hop for R8 is R6.
C. The next hop for 10.1.1.0/24 on R7 is R6 and the next hop for R8 is R5.
D. The next hop for 10.1.1.0/24 on R7 is R3 and the next hop for R8 is R4.

Correct Answer: A QUESTION 40
Refer to the exhibit.

You are developing a migration plan to enable IPv6 in your IPv4 network. Starting at R3 and assuming default IS-IS operations, what is likely to happen when you enable IPv6 routing on the link from R3 to R2?
A. Only R3 and R2 have IPv4 and IPv6 reachability.
B. R2 receives an IPv6 default route from R3.
C. Loopback reachability between all routers for IPv4 is lost.
D. All routers except R2 are reachable through IPv4.
E. R3 advertises the link from R3-R2 to R1, R4 and R5 only.

Correct Answer: C
QUESTION 41
You are a network designer and are responsible for ensuring that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?
A. ACL-based forwarding
B. ACL filtering by destination
C. Unicast RPF loose mode
D. Unicast RPF strict mode

Correct Answer: D
QUESTION 42
Your design plan includes mutual redistribution of two OSPF networks at multiple locations, with connectivity to all locations in both networks. How is this accomplished without creating routing loops?
A. Use route maps on the ASBRs to allow only internal routes to be redistributed.
B. Use route maps on the ASBRs to allow internal and external routes to be redistributed.
C. Use route maps on the ASBRs to set tags for redistributed routes.
D. Use route maps on the ASBRs to filter routes with tags so they are not redistributed.

Correct Answer: D
QUESTION 43
A planned EBGP network will use OSPF to reach the EBGP peer addresses. Which of these conditions should be avoided in the design that could otherwise cause the peers to flap continuously?
A. An ACL blocks TCP port 179 in one direction.
B. IP addresses used to peer are also being sent via EBGP.
C. The OSPF area used for peering is nonbackbone (not area 0).
D. The routers are peered by using a default route sent by OSPF.

Correct Answer: B
QUESTION 44
When designing a large full mesh network running OSPF, how would you reduce LSA repetition?
A. Elect a DR and BDR.
B. Use access control lists to control outbound advertisements.
C. Choose one or two routers to re-flood LSA information.
D. Put each of the point-to-point links in your full mesh networking into a separate area.

Correct Answer: C
QUESTION 45
A data center provider has designed a network using these requirements:
Two data center sites are connected to the public Internet.

Both data centers are connected to different Internet providers.

Both data centers are also directly connected with a private connection for the internal traffic, and public Internet traffic can also be routed at this direct
connection.
The data center provider has only one /19 public IP address block.
Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connection fails, the complete traffic for both data centers should be routed by using the remaining Internet connection. In which two ways can this routing be achieved? (Choose two.)
A. The data center provider must have an additional public IP address block for this routing.
B. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the / 20 block from the remote data center is sent out with a higher BGP weight at both sites.
C. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the / 20 block from the remote data center is sent out with path prepending at both sites.
D. One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining Internet connection.
E. One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference at both sites.
F. BGP will always load-balance the traffic to both data center sites.

Correct Answer: CD

Flydumps.com will provide you with the most updates material to prepare for the tests all the Cisco 352-001 torrent are available at the site. Studying with dumps makes it much easier to pass the certification. Number of networking downloads including the Cisco 352-001 download are available on the website. Various websites offering such information have information in various formats you can easily download the format that is suitable for you it can be in Cisco 352-001 Testing Engine or in html.

Flydumps 642-832 dumps with PDF + Premium VCE + VCE Simulator: http://www.flydumps.com/642-832.html

Cisco 352-001 Dumps, Download Latest Cisco 352-001 Answers Are Based On The Real Exam

Cisco 352-001 Exam Questions Vce, High Success Rate Cisco 352-001 Exam Dumps Is What You Need To TakeCisco 352-001 Exam Questions Vce, High Success Rate Cisco 352-001 Exam Dumps Is What You Need To Take

100% Pass!Do you want to pass Cisco 352-001 exam quickly? Go to flydumps.com to get more free exam dumps.All the Cisco 352-001 dumps are timely updated by the professional experts.Also we guarantee 100% pass and money back guarante.

QUESTION 1
A company plans to include Nonstop Forwarding and Bidirectional Forwarding Detection as a part of their network redundancy plan. In which two ways do NSF and BFD work together when different hardware platforms are compared? (Choose two.)
A. During supervisor engine or routing engine failover, the NSF feature will always ensure that the BFD at the peer router will not trigger a link down independent of the used hardware platform.
B. At some hardware platforms, BFD and NSF are not supported together. During supervisor engine or routing engine failover, the BFD at the peer router will trigger a link down.
C. To ensure that BFD at the peer router will not trigger a link down during NSF, the BFD packets must be processed fast enough, and, during supervisor engine or routing engine failover, by processing the BFD independent from the supervisor engine or routing engine.
D. Because BFD is always processed at the line cards (not at the supervisor engine or routing engine), a supervisor engine or routing engine failover will not affect the BFD peer router.
E. Because BFD is always processed at the supervisor engine or routing engine, a supervisor engine or routing engine failover will always trigger a link down at the peer router.

Correct Answer: BC
QUESTION 2
Refer to the exhibit.

A service provider would like to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP-SW2. In which two of these ways can you design this solution? (Choose two.)
A. Enable Y.1731 Connectivity Fault Management on the SP switches.
B. E-LMI PDUs must be forwarded over VPLS.
C. Cisco Discovery Protocol PDUs must be forwarded over the VPLS.
D. Use upward maintenance endpoints on the SP switches.
E. Enable IEEE 802.1ag Connectivity Fault Management on the SP switches.

Correct Answer: DE
QUESTION 3
A network design shows two routers directly connected to an Ethernet switch using optical connections. There is an OSPF adjacency between the routers. In this design, which solution will ensure that interface down detection is reported as quickly as possible to the IGP?
A. optimized OSPF SPF timers
B. Bidirectional Forwarding Detection
C. automatic protection switching
D. optimized OSPF LSA timers
E. Ethernet OAM CFM monitoring

Correct Answer: B
QUESTION 4
A network designer is working with a company to improve convergence at the Layer 2 control plane and decides to use LACP. Which of these components does LACP use to create the system ID?
A. LACP system priority and switch MAC address
B. LACP port priority and switch MAC address
C. LACP port priority and port number
D. LACP system priority and port number

Correct Answer: A
QUESTION 5
Refer to the exhibit.

You are designing a spanning-tree network for a small campus. Which two of these options would result in a trouble-free spanning-tree network design? (Choose two.)
A. Convert all ports to trunk ports, prune off the VLANs that you do not require, and minimize the number of blocking ports.
B. Introduce Layer 3 VLANs (SVIs) and prune off the VLANs that you do not require.
C. Convert all the ports to trunk and enable BackboneFast.
D. Convert all the ports to trunk and enable UplinkFast between all the links.

Correct Answer: AB QUESTION 6
A network designer is redesigning an enterprise campus network to ensure that Ethernet switches proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in the fiber pair, leading to looping. Which feature could be implemented in the design to allow the Spanning Tree Protocol on the switches to be protected?
A. loop guard
B. UniDirectional Link Detection
C. UniDirectional Link Detection aggressive mode
D. root guard

Correct Answer: C QUESTION 7
A switched network is being designed to support a manufacturing factory. Due to cost constraints, fiber-based connectivity is not an option. Which design allows for a stable network when there is a risk of interference from the manufacturing hardware in use on the factory floor?
A. Design the network to include UDLD to detect unidirectional links and take them out of service.
B. Design the network to include EtherChannel bundles to prevent a single-link failure from taking down a switch interconnection point.
C. Design the network to include loop guard to prevent a loop in the switched network when a link has too much interference.
D. Design the network to include BackboneFast on all devices to accelerate failure convergence times.

Correct Answer: A QUESTION 8
Refer to the exhibit.

If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.)
A. Switch A
B. Switch B
C. Switch C
D. Switch D

Correct Answer: CD
QUESTION 9
A service provider has a Resilient Ethernet Protocol ring running as a metro backbone between its locations in one city. A customer wants to connect one site with one box redundant to the Resilient Ethernet Protocol ring at two different service provider locations. How can this be done without producing any Layer 2 loops within the network design?
A. Spanning tree at the service provider side only must be enabled.
B. Spanning tree at the customer side only must be enabled.
C. Flex Links at the service provider side only must be enabled.
D. Flex Links at the customer side only must be enabled.
E. EtherChannel at the service provider side and the customer side must be enabled.
F. Spanning tree at the service provider side and the customer side must be enabled.
G. Flex Links at the service provider side and the customer side must be enabled.
Correct Answer: D
QUESTION 10
Refer to the exhibit.

Your company designed a network to allow server VLANs in a data center to span all access switches. In the design, Layer 3 VLAN interfaces and HSRP are
configured on the aggregation switches. In which three ways should the design of the STP domain be optimized for server and application performance? (Choose three.)
A. Use loop guard on access ports.
B. Use PortFast on access ports.
C. Use root guard on access ports.
D. Align Layer 2 and Layer 3 forwarding paths.
E. Use BPDU Skew Detection on access ports.
F. Explicitly determine root and backup root bridges.

Correct Answer: BDF
QUESTION 11
You have created a network design that has two point-to-point Metro Ethernet circuits extending a single production VLAN between two data centers. Under normal circumstances, one circuit will carry traffic and spanning tree will block the other. If the company wants you to make use of both circuits to carry production traffic, which two technologies and features will you investigate to integrate into your network design? (Choose two.)
A. EtherChannel
B. MST
C. Multichassis EtherChannel
D. PVST+

Correct Answer: AC
QUESTION 12
Voice traffic between two campus enterprise networks is growing. The network designers decide to add a second 10-Mb Metro Ethernet service parallel to their original 10-Mb service in order to provide more bandwidth and diversity. The QoS profile will be the same on the new 10-Mb service due to the voice stability on the first Metro Ethernet link. When the second link is added to the OSPF domain, which traffic design consideration would have the most impact on the voice traffic when both links are active?
A. per-destination IP address basis
B. per-flow basis
C. per-packet basis
D. per-source IP address basis

Correct Answer: C
QUESTION 13
You work as a network designer for a company that is replacing their Frame Relay WAN with an MPLS VPN service, where the PE-to-CE routing protocol is BGP. The company has 3000 routes in their distribution routers, and they would like to advertise their access routers through the MPLS network. Their service provider, however, only supports 1000 prefixes per VRF. Which two design solutions can be applied to ensure that your access routers will be able to reach all devices in your network? (Choose two.)
A. Use prefix lists on your distribution routers to control which routes are sent to the MPLS network.
B. On your distribution routers, configure null routes and aggregate routes for the prefixes in your network.
C. Configure your distribution routers to send a default route to the MPLS network.
D. Summarize the routes on the MPLS WAN interfaces of your distribution routers.

Correct Answer: BC
QUESTION 14
You are designing a network that will run EIGRP over a Metro Ethernet service that does not employ a link-loss technology. What will be the impact on convergence if there is a break in the end-to-end Layer 2 connectivity within the service provider network?
A. The routers will immediately lose their adjacencies and converge.
B. The routing protocol will not converge until the hold timers have expired.
C. The switch ports connected to the router will go down and the routers will immediately converge.
D. The VLAN on the switches will go inactive, the ports associated on the switch will go down, and the routers will immediately converge.
Correct Answer: B
QUESTION 15
Refer to the exhibit.

Acme Corporation hired you as a network designer to upgrade their network so that it supports IPv4 and IPv6 multicast. Which two protocols are needed on the LAN switch? (Choose two.)
A. PIM sparse mode
B. IGMP snooping
C. PIM snooping
D. Source Specific Multicast
E. MLD snooping

Correct Answer: BE
QUESTION 16
A new video multicast application is deployed in the network. The application team wants to use the 239.0.0.1 multicast group to stream the video to users. They want to know if this choice will impact the existing multicast design. What impact will their choice have on the existing multicast design?
A. Because 239.0.0.1 is a private multicast range, a flood of PIM packets that have to be processed by the CPU and hosts will be sent by the routers in the network.
B. Because 239.0.0.1 is a private multicast range, the rendezvous point has to send out constant group updates that will have to be processed by the CPU and hosts.
C. The multicast application sends too many packets into the network and the network infrastructure drops packets.
D. The 239.0.0.1 group address maps to a system MAC address, and all multicast traffic will have to be sent to the CPU and flooded out all ports.

Correct Answer: D
QUESTION 17
A customer is using a service provider to provide a WAN backbone for a 30-site network. In establishing the network, the customer must work within these constraints:
The customer has a self-managed MPLS backbone.

The VPLS WAN backbone of the service provider does not support PIM snooping.

Multicast VPN must be used for multicast support inside some VRFs.
What can the customer do so that multicast traffic is NOT flooded to all sites?
A. Configure static GRE tunnels and run the MPLS and multicast VPN inside these GRE tunnels.
B. Use Label Switched Multicast for the multicast transport.
C. Use PIM-SSM as the multicast routing protocol with IETF Rosen Draft multicast VPN.
D. Configure a static mapping between multicast addresses and MAC addresses.
E. Use GET VPN to encrypt the multicast packets inside the WAN.
Correct Answer: A
QUESTION 18
What are two design advantages to using virtual port channel? (Choose two.)
A. enhanced system availability through multiple systems
B. reduced Spanning Tree Protocol convergence time
C. loop management without use of Spanning Tree Protocol
D. ability to use Spanning Tree Protocol blocked ports to forward traffic
E. enhanced ability to recover from Spanning Tree Protocol changes
Correct Answer: AC
QUESTION 19
Refer to the exhibit.

In this design, which technology would provide for the best use of resources to provide end-to- end Layer 2 connectivity?
A. MSTP
B. PAgP
C. Multichassis EtherChannel
D. LACP

Correct Answer: C
QUESTION 20
What are three key design principles when using a classic hierarchical network model? (Choose three.)
A. The core layer controls access to resources for security.
B. The core layer should be configured with minimal complexity.
C. The core layer is designed first, followed by the distribution layer and then the access layer.
D. A hierarchical network design model aids fault isolation.
E. The core layer provides server access in a small campus.
F. A hierarchical network design facilitates changes.

Correct Answer: BDF
QUESTION 21
Which three techniques can be used to improve fault isolation in an enterprise network design? (Choose three.)
A. aggregate routing information on an OSPF ABR
B. fully meshed distribution layer
C. Equal-Cost Multipath routing
D. EIGRP query boundaries
E. multiple IS-IS flooding domains
F. tuned Spanning Tree Protocol timers
Correct Answer: ADE
QUESTION 22
When you design a network, when would it be required to leak routes into a Level 1 area?
A. when a multicast RP is configured in the nonbackbone area
B. when MPLS L3VPN PE devices are configured in the Level 1 areas
C. when equal cost load balancing is required between the backbone and nonbackbone areas
D. when unequal cost load balancing is required between the backbone and nonbackbone areas
Correct Answer: B
QUESTION 23
Refer to the exhibit.

In this network design, where should summarization occur to provide the best summarization and optimal paths during a single-failure incident as well as during normal operation?
A. a single identical summary for all the branch offices placed on routers 1A, 1B, 2A, and 2B
B. two summaries on 1A and 1B, and two summaries on 2A and 2B
C. a single identical summary on 3A and 3B
D. a single summary on each aggregation device for the branches connected to them

Correct Answer: C
QUESTION 24
What are two benefits of following a structured hierarchical and modular design? (Choose two.)
A. Each component can be designed independently for its role.
B. Each component can be managed independently based on its role.
C. Each component can be funded by different organizations based on its role.
D. Each component can support multiple roles based on the requirements.
E. Each component can provide redundancy for applications and services.

Correct Answer: AB
QUESTION 25
In a large enterprise network with multiple data centers and thousands of access devices, OSPF is becoming unstable due to link flapping. The current design has the access devices multihomed to large aggregation routers at each of the data centers. How would you redesign the network to improve stability?
A. Add a layer of regional Layer 3 aggregation devices, but leave the ABR function on the data center aggregation routers.
B. Add a layer of regional Layer 2 aggregation devices, but leave the ABR function on the data center aggregation routers.
C. Add a layer of regional Layer 3 aggregation devices and move the ABR function to the regional aggregation device.
D. Add a layer of regional Layer 2 aggregation devices and move the ABR function to the regional aggregation device.

Correct Answer: C

Cisco 352-001 Questions & Answers with explanations is all what you surely want to have before taking Cisco 352-001 exam.Cisco 352-001 Interactive Testing Engine is ready to help you to get your Cisco 352-001 by saving your time by preparing you quickly for the Cisco exam. If you are worried about getting your Cisco 352-001 certification passed and are in search of some best and useful material,Cisco 352-001 Q&A will surely serve you to enhance your Interconnecting Cisco Networking Devices study.

Provide Latest Cisco 352-001 With All New Questions And Answer 100% PassProvide Latest Cisco 352-001 With All New Questions And Answer 100% Pass

Exam A
QUESTION 1
According to the following exhibit, company 1 contains two autonomous systems (AS1 and AS2) connected via ISP A, which has an AS number of 100. Router B and Router C are advertising an aggregate of X.X.X.0/23 so that AS1 is able to reach the two server farms. The two links from AS2 are not being used efficiently.
How can AS2 use both of the links coming into it?
Exhibit:

A. advertise each X.X.X.0/24 independently from Router B and Router C
B. create another link between Router A in AS1 and ISP A
C. configure iBGP between Router B and Router C to load-share traffic once it reaches AS2
D. configure two static routes in Router A for X.X.X.0/23 pointing to Router B and Router C
Correct Answer: A QUESTION 2
Study the topology provided in this exhibit. Which configuration change will maximize the efficiency of both the routing design and data forwarding plane?
Exhibit: A. Configure Router B with a static route for the aggregate to Null0

B. Configure Router A to advertise 10.0.0.0/8 instead of the default route to Router B
C. Configure Router B to advertise the more specific prefixes in addition to the aggregate
D. Configure Router B to advertise the more specific prefixes instead of the aggregate

Correct Answer: A
QUESTION 3
Which two reasons are valid for aggregating routing information within a network? (Choose two)
A. To reduce the amount of information any specific Router within the network must store and process
B. To isolate the impact of DDoS attacks
C. To improve optimal routing within the network
D. To reduce the impact of topology changes
Correct Answer: AD
QUESTION 4
Which three statements are correct about OSPF route summarization? (Choose three.)
A. Route summarization can lead to a more stable network.
B. A flat addressing scheme is required in order to summarize OSPF routes.
C. OSPF type 5 external routes can be summarized only at the ASBRs.
D. OSPF internal routes can be summarized only at the ABRs.
Correct Answer: ACD
QUESTION 5
EIGRP performs route summarization at the interface level with the “ip summary-address” command. Which three statements correctly describe EIGRP route summarization? (Choose three)
A. By default, EIGRP automatically summarizes internal routes, but only each time a major network boundary is crossed.
B. EIGRP route summarization can reduce the query diameter to help prevent SIA problems.
C. Summary routes are inserted in the routing table with a next hop of null 0 and a high administrative distance, to prevent black holing of traffic.
D. The metric for each summarized route is inherited from the lowest metric of the component routes.
Correct Answer: ABD QUESTION 6

Why build link state flooding domain boundaries in large-scale networks running OSPF or IS-IS? (Choose two.)
A. Doing so provides logical break points at which to troubleshoot individual parts of the network, rather than trying to troubleshoot the whole network at once.
B. Doing so limits the extent of SPF and allows the use of PRC for some best path calculations.
C. Flooding domain borders block the transmission of external routing information in the network, which improves scaling and convergence times.
D. Network administrators can quickly find specific destinations when detailed link state information is sorted by flooding domain in the link state database.
Correct Answer: AB
QUESTION 7
Which two options are true about the impact flooding domain boundaries have when built in OSPF? (Choose two)
A. They decrease convergence time by reducing the complexity and size of the shortest path trees in the individual areas.
B. They isolate network failures within a domain.
C. They decrease convergence time by automatically summarizing reachability information transmitted through the network, thereby decreasing the number of routes that must be installed in each Router’s routing table.
D. They increase convergence time by adding the time required to run two full Shortest Path First computations on the area border Routers.
Correct Answer: AB
QUESTION 8
Which two reasons are correct about building a flooding domain boundary in a link-state network? (Choose two.)
A. To provide an administrative boundary between portions of the network
B. To segregate complex and rapidly changing portions of the network from one another
C. To aggregate reachability information
D. To increase the size of the Shortest Path First tree
Correct Answer: BC

QUESTION 9
What are three reasons to summarize link state topology information? (Choose three)
A. To reduce the amount of routing information being advertised
B. To create boundaries for containing potential network changes and instabilities
C. To permit traffic engineering between areas
D. To hide detailed topology information
Correct Answer: ABD

QUESTION 10
Scalability is provided in the server farm module by which of the following design strategies?
A. Redundant servers at the access level
B. High port densities at the access level
C. Modular block design at the access level
D. Up to 10 Gbps of bandwidth at the access level
Correct Answer: C QUESTION 11
There are two hub-and-spoke networks in the following exhibit. Each has about 60 branches spread over a wide area. Connect Routers E and F to two different frame providers. Problems with one provider have impacted branches connected to the other provider and reaching the data center.
Which is the best place to build flooding domain boundaries to isolate these WAN issues?
Exhibit:

A. At Routers D, E, and F, because this will provide good route aggregation and also separate complex topologies within the network from one another
B. At Routers B and C, because this will provide a good balance between separating the complex topologies behind Routers D, E, and F from the core and good route aggregation
C. At Routers B and F, because this will provide good route aggregation and prevent routing along suboptimal paths in the case of link failure
D. At Router A, because this will provide optimal route aggregation and prevent suboptimal routing in the case of link failure

Correct Answer: A