CCDE 352-001 Real Exam Questions

Cisco Certified Design Expert (CCDE™) validates advanced network infrastructure design principles and fundamentals for large networks. With a CCDE certification, a network professional demonstrate an ability to develop solutions which address planning, design, integration, optimization, operations, security and ongoing support focused at the infrastructure level for customer networks.

1.Which two statements accurately describe QoS in MPLS VPN (RFC 2547bis) networks? (Choose two.)
A:MPLS QoS is a scalable and simple solution because it only requires application at the Edge-LSR.
B:MPLS can force packets into specific paths and bandwidths based on Edge-LSR mapping of DSCP to EXP.
C:DiffServ information must be made known to the LSR in the MPLS header using the EXP field.
D:On egress from the Edge-LSR, the EXP field is used for PHB QoS towards the CE.
Correct Answers:  B, C

2.Which three statements about EIGRP route summarization are correct? (Choose three.)
A:By default, all EIGRP routes are automatically summarized; all routes will be summarized unless the no-auto summary command is configured.
B:By default, EIGRP automatically summarizes internal routes, but only each time a major network boundary is crossed.
C:EIGRP route summarization can reduce the query diameter to help prevent SIA problems.
D:Summary routes are inserted in the routing table with a next hop of null 0 and a high administrative distance, to prevent black holing of traffic.
E:The metric for each summarized route is inherited from the lowest metric of the component routes.
Correct Answers:  B, C, E

3.Which two resources are propagated by the headend router for constrained based path computation with MPLS Traffic Engineering? (Choose two.)
A:average link utilization
B:average input queue depth
C:link bandwidth
D:link affinity
E:link delay
F:link jitter
Correct Answers:  C, D

4.What statement is true about designing a policy in which more than one class share a queue?
A: It must be avoided under all circumstances.
B: It will result in a negative class.
C: It requires consideration of the performance targets of classes sharing the queue.
D: It should be deployed throughout the network to simplify the design.
Correct Answers:  C

5.You have discovered packets you think are part of an attack. What benefit would you gain from redirecting them through a packet scrubbing device?
A: Packet scrubbing forwards valid traffic.
B: Packet scrubbing is "line rate."
C: Packet scrubbing filters all traffic.
D: Packet scrubbing provides better logging of suspected attacks.
Correct Answers:  A

6.What is the primary requirement for deploying OSPF graceful restart on a router?
A: Aggressive routing protocol hellos and keepalives must be running on the router.
B: The adjacent router must support graceful restart helper mode.
C: Some form of fast Layer 2 down detection must be enabled on the router.
D: The adjacent routers must be enabled to forward traffic during the failure.
Correct Answers:  B

7.Which of these is a function of NetFlow?
A: monitor CPU utilization
B: monitor memory utilization
C: monitor link utilization
D: monitor configuration changes
E: generate traps for failure conditions
Correct Answers:  C

8.You are currently assessing an attack. Which information might you gain from TCP flags?
A: priority of the attack traffic
B: type of attack
C: source of the attack
D: target of the attack
Correct Answers:  B

9.Refer to the exhibit. In this network, R1 is redistributing into Area 1.
Which LSA containing will R6 have in its database?
A: R6 will have an NSSA external (type 7) LSA in its local database for
B: R6 will have an external (type 5) LSA for in its local database.
C: R6 will have a border router (type 4) LSA in its local database for
D: R6 will not have any LSAs containing
Correct Answers:  D

10.Which statement is true about the RSVP protocol?
A: It is reserved bi-directionally by each originating node.
B: It is only for avoiding packet drop on collision-prone media (such as Ethernet).
C: It is initiated uni-directionally along the data path downstream from each requesting node.
D: It is only shared by pairs of peers participating in delay-sensitive, real-time applications like VoIP.
Correct Answers:  C

Download  |  Password: