Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

352-011 Cisco Certified Design Expert Practical Exam Questions and Answers

Questions 4

Refer to the exhibit.

Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

Options:

A.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller

B.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

C.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel

D.

Send packets without encapsulation to the anchor controller over the routed network

Buy Now
Questions 5

Which two options are considered risks or concerns when both the Internet and VPN service functions are on the same PE router? (Choose two.)

Options:

A.

Internet-based attacks can affect VPN customers.

B.

BGP cannot simultaneously run on the PE router that runs MPLS.

C.

MP-BGP prefixes increase routers' global routing tables, which affects network convergence.

D.

Failure on the PE router affects both VPN and Internet services.

E.

Customer performance can be affected by VPN traffic if Internet-based traffic is not prioritized on the PE

Buy Now
Questions 6

An operations engineer asks for your help with a new switching deployment. The engineer confirms that STP is enabled on an edge switch, and a particular port is connected to another switch. The switch is not receiving configuration BPDUs, although it appears that everything is functioning correctly in the network. What is the design explanation?

Options:

A.

Bridge Assurance is enabled on the port

B.

Storm control broadcast is enabled on the port

C.

REP is enabled on the port

D.

BPDU Guard is enabled on the port

Buy Now
Questions 7

Your customer asks you to assist with their traffic policy design. They want to guarantee a minimum amount of bandwidth to certain traffic classes. Which technique would you advise them to implement?

Options:

A.

Modular QoS CLI

B.

committed access Rate

C.

policy-based routing

D.

traffic shaping

Buy Now
Questions 8

Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true? (Choose three.)

Options:

A.

Solution should be resistant to sensor failure.

B.

Solution should allow for stream normalization.

C.

Solution should not impact jitter and latency for voice traffic.

D.

Solution should allow for signature-based pattern matching.

E.

Solution should allow to deny packets inline.

Buy Now
Questions 9

Options:

Buy Now
Questions 10

ACME Corporation is integrating IPv6 into their network, which relies heavily on multicast distribution of data. Which two IPv6 integration technologies support IPv6 multicast? (Choose two.)

Options:

A.

6VPE

B.

6PE

C.

dual stack

D.

ISATAP

E.

6to4

F.

IPv6INIP

Buy Now
Questions 11

Which two statements about VXLAN are true? (Choose two)

Options:

A.

VXLAN is a Cisco proprietary solution

B.

VXLAN is an encapsulation method used to create a Layer 3 overlay network

C.

VXLAN can be used to enforce Layer 2 isolation in a multitenant infrastructure

D.

VXLAN uses the Spanning Tree protocol for loop prevention

E.

VXLAN overcomes the 802.1Q virtual LAN address space limitation

Buy Now
Questions 12

The service provider that you work for wants to offer IPv6 internet service to its customers without upgrading all of its access equipment to support IPv6, which transition technology do you recommend?

Options:

A.

NAT64

B.

CGN

C.

Dual-stack CPE

D.

6RD

Buy Now
Questions 13

Which option describes the fundamental design differences between an IP-based network design and a SAN-based?

Options:

A.

An IP-based design has redundant connectivity in the fabric and high amounts of east-west traffic, whereas a SAN-based design uses redundancy from a dual-attached host, which uses separate fabrics and has very little east-west traffic

B.

An IP-based design has redundancy from the host and high amounts of east-west traffic, whereas a SAN-based design uses redundancy in the fabric and very little east-west traffic

C.

An IP-based design has redundant connectivity in the fabric and high amounts of east-west traffic, whereas a SAN-based design uses zoning based redundancy which uses separate fabrics and has very little east-west traffic

D.

An IP-based design has redundant connectivity in the fabric and very little east-west traffic, whereas a SAN-based design uses redundancy in the host, which uses separate fabrics and has high amounts of east-west traffic

Buy Now
Questions 14

Which native mechanism does OSPF use to prevent loops in MPLS VPNs?

Options:

A.

CE devices that run OSPF set the DN bit toward the PE router

B.

PE devices that run OSPF clear the DN bit toward the CE router

C.

CE devices that run OSPF clear the DN bit toward the PE router

D.

Creation of PE to PE OSPF sham link across the MPLS-created super backbone

E.

PE routers verify OSPF domain IDs used by CE OSPF processes

F.

PE devices that run OSPF set the DN bit toward the CE router

Buy Now
Questions 15

Across a large WAN network, there will be new video traffic being distributed from a single source at any given time however, the video source might originate from different parts of the multicast domain at different times . Which multicast technology provides for this multicast traffic to be distributed with optimal path selection to the source?

Options:

A.

Any source Multicast.

B.

PIM sparse mode.

C.

Bidirectional PIM.

D.

Source Specific Multicast.

Buy Now
Questions 16

Which solution prevents microloops from be formed during network convergence time?

Options:

A.

RSVP-TE

B.

LFA

C.

Prefix suppression

D.

RLFA

Buy Now
Questions 17

Refer to the exhibit.

Company A is running a single-area OSPF, and Company B is running RIP as the IGP with no overlapping IP address spaces. Company A has just acquired Company B and both networks must be merged. Which three design components are recommended to guarantee connectivity and redundancy between the two networks? (Choose three.)

Options:

A.

Enable mutual redistribution between OSPF and RIP on one border router.

B.

Enable mutual redistribution between OSPF and RIP on Router A and Router B using route tags.

C.

Increase the administrative distance to 130 for the OSPF external prefixes on Router A and Router B.

D.

Implement an ACL on Router A and Router B to prevent OSPF external routes from being installed in the OSPF database.

E.

Filter external routes on Router A and Router B based on route tags.

Buy Now
Questions 18

Drag and drop the Fast ReRoute mechanisms on the left to the correct routing protocols on the right. Not all options are used.

Options:

Buy Now
Questions 19

Which statement about SDN framework environment is true?

Options:

A.

The control plane functions is split between a SDN controller and the networking element

B.

The data plane is pulled from the networking element and put in a SDN controller

C.

The data plane is controlled by a centralized SDN element

D.

The control plane is pulled from the networking element and put in a SDN controller

E.

The control plane and data plane is pulled from the networking element and put in a SDN controller and SDN agent

Buy Now
Questions 20

Which two options are potential problems with route aggregation? (Choose two)

Options:

A.

Maintaining host IP addresses during migrations

B.

Route flapping

C.

Suboptimal routing

D.

Topology hiding

E.

Asymmetric routing

F.

Prefix hijacking

Buy Now
Questions 21

A company would like to distribute a virtual machine (VM) hosting cluster between three data centers with the capability to move VMs between sites. The connectivity between data centers is IP only and the new design should use the existing WAN. Which Layer 2 tunneling technology do you recommend?

Options:

A.

AToM

B.

L2TPv3

C.

OTV

D.

VPLS

Buy Now
Questions 22

Refer to the exhibit.

You are a network designer who is given these design requirements:

 Multicast services must be provided for Layer 3 VPN customers

 The same forwarding technology must be used as Layer 3 VPN unicast packets

 Replication of multicast traffic is not allowed on the ingress PE

Which multicast VPN technology conforms to the design requirements?

Options:

A.

Multipoint-to-point LDP

B.

MSDP

C.

MLDP VPN

D.

Rosen Draft using LDP

Buy Now
Questions 23

Which technology , implemented on aggregation –edge nodes at the aggregation layer, provides per –tenant isolation at Layer 3 , with separate dedicated per-tenant routing and forwarding tables on the inside interfaces of firewall contexts?

Options:

A.

VDC

B.

VLAN

C.

VXLAN

D.

VRF-lite

Buy Now
Questions 24

A Company has these requirements for access to their wireless and wired corporate LANs using 802.1x

 Clients devices that corporate assets and have joined the active directory domain are allowed access

 Personal devices must be not allowed access

 Clients and access servers must be mutually authenticated.

Which solution meets these requirements?

Options:

A.

Protected EAP/Microsoft CHAP v2 with user authentication

B.

EAP-TLS with machine authentication

C.

EAP-TLS with user authentication

D.

Protected EAP/Microsoft CHAP v2 with Machine authentication

Buy Now
Questions 25

You are designing a new data center network. Drag and drop new data center requirements on the left into the appropriate design principle on the right.

Options:

Buy Now
Questions 26

You are hired to assist an enterprise customer to design their global WAN network. A protected DWDM circuit with disjoint fiber routes and guaranteed restoration times is ordered to connect two hub sites. Which option is a BFD design consideration in relation to protected DWDM?

Options:

A.

BFD failure detection must be faster than DWDM restoration time

B.

The BFD hello timer must match the DWDM circuit restoration time

C.

BFD failure detection must be longer than DWDM restoration time

D.

BFD cannot be used with protected DWDM

Buy Now
Questions 27

Which major block is not included in the ETSI network Function Virtualization reference framework?

Options:

A.

Network Function Virtualization Infrastructure

B.

Network Function Virtualization Management and Orchestration

C.

Network Function Virtualization Policy Manager

D.

Virtualized Network Function/ Element Management Systems

Buy Now
Questions 28

Refer to the exhibit.

Which impact of using three or more ABRs between the backbone area and area 1 is true?

Options:

A.

In a large-scale network, LSA repletion, by all ABRs. can cause serious scalability issues

B.

Prefixes from the non-backbone area ate advertised by one ABR lo the backbone area

C.

Multiple ABRs reduce the CPU processing on each ABR due to spWtmg prefix advertisement between areas.

D.

In a large--scale network multiple ABRs can create microloops.

Buy Now
Questions 29

Which options do you investigate first when designing fast network convergence?

Options:

A.

Routing protocol database size

B.

MTU of the involved interfaces

C.

Link speed between sites

D.

Supported Layer 3 failure detection mechanism

Buy Now
Questions 30

Refer to the Exhibit.

In which three Layers should you use nonstop Forwarding to reduce service impact in case of failure? (Choose three)

Options:

A.

Enterprise Edge

B.

Enterprise Core

C.

Service provider Edge

D.

Dual-attached sever Layer

E.

Enterprise Non-Routed Access Layer

F.

Enterprise Non-Routed Distribution Layer.

Buy Now
Questions 31

Which three network management requirements are common practices in network design? (Choose three)

Options:

A.

Ensure that all network devices have their clocks synchronized.

B.

Collect SNMP poll information for future regression analysis.

C.

Capture both ingress and egress flow-based packets, while avoiding duplication of flows.

D.

Look at average counters instead of instantaneous counters for inconsistent and bursty KPIs, such as CPU utilization and interface utilization.

E.

Validate data plane health, and application and services availability, with synthetic traffic.

Buy Now
Questions 32

Options:

Buy Now
Questions 33

A data center provider has designed a network using these requirements

 Two data center sites are connected to the public internet

 Both data centers are connected to different Internet providers

 Both data centers are also directly connected with a private connection for the internal traffic can also be at this direct connection The data center provider has only /19 public IP address block

Under normal conditions, Internet traffic should be routed directly to the data center where the services are located. When one Internet connections fails to complete traffic for both data centers should be routed by using the remaining Internet connection in which two ways can this routing be achieved? (Choose two)

Options:

A.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out without path prepending and the /20 block from the remote data center is sent out with path prepending at both sites

B.

One /20 block is used for the first data center and the second /20 block is used for the second data center. Each /20 block is only sent out locally. The /19 block is sent out at both Internet connections for the backup case to reroute the traffic through the remaining internet connection

C.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP local preference and the /20 block from the remote data center is sent out with a higher BGP local preference of both sites

D.

BGP will always load-balance the traffic to both data center sites

E.

One /20 block is used for the first data center and the second /20 block is used for the second data center. The /20 block from the local data center is sent out with a low BGP weight and the /20 block from the remote data center is sent out with a higher BGP weight at both sites

F.

The data center provider must have an additional public IP address block for this routing

Buy Now
Questions 34

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used.

Options:

Buy Now
Questions 35

What is a design aspect regarding multicast transport for MPLS Layer 3 VPNs using the Rosen Draft implementation?

Options:

A.

LDP is the multicast control plane protocol.

B.

Multicast traffic is forwarded over GRE tunnels.

C.

Multicast traffic is forwarded over LDP or RSVP signaled LSPs.

D.

Using the MDT SAFI in BGP ensures that PIM can be disabled in the core.

Buy Now
Questions 36

VPLS is implemented in a Layer 2 network with 2000 VLANs. Which must be the primary concern to ensure successful deployment of VPLS?

Options:

A.

The underlying transport mechanism

B.

PE scalability

C.

Flooding is necessary to propagate MAC address reachability information

D.

VLAN scalability

Buy Now
Questions 37

Which two options are IoT use cases that require the low-latency and high reliability that 5G networks provide? (Choose two)

Options:

A.

Sports and Fitness

B.

Smart Home

C.

Automotive

D.

Smart Cities

E.

Industrial Automation

F.

Health and wellness

Buy Now
Exam Code: 352-011
Exam Name: Cisco Certified Design Expert Practical Exam
Last Update: Jun 16, 2025
Questions: 249
352-011 pdf

352-011 PDF

$33.25  $94.99
352-011 Engine

352-011 Testing Engine

$38.5  $109.99
352-011 PDF + Engine

352-011 PDF + Testing Engine

$50.75  $144.99