Updated Cisco 352-001 Exam – Download Cisco 352-001 PDF Download

Valid and updated Cisco 352-001 Exam, Real Cisco 352-001 PDF Download UP To 50% Off, pass ADVDESIGN.

Cisco 352-001 PDF Dump, 100% Pass Guarantee Cisco 352-001 Exam On Our Store

 

FLYDUMPS Cisco 352-001 exam sample questions are an objective type study material that provides you basic and essential knowledge for passing IT certifications without wasting your precious time as well as money. FLYDUMPS Cisco 352-001 technical experts have collected and certified 280 questions and answers of Cisco 352-001 Security Essentials Certification which are designed to cover the knowledge points of the Cisco 352-001 exam sample questions and enhance candidates' abilities. Cisco 352-001 exam sample questions assesses you on information of Cisco 352-001 Security Essentials Certification structure. In the area of IT Cisco 352-001 Security Essentials Certification GSEC, it is very hard to succeed with only the primary Cisco 352-001 test certification.

http://www.king4exam.com/352-001.html

QUESTION 56
VLAN Tagging, also known as Frame Tagging, is a method developed by Cisco to help identify packets travelling through trunk links. When an Ethernet frame traverses a trunk link, a special VLAN tag is added to the frame and sent across the trunk link .How does ERS use the VLAN tag?
A. provide service internetworking
B. support transparency for Layer 2 frames
C. indicate destination as a connection identifier
D. map to the DLCI in service internetworking

Correct Answer: C
QUESTION 57
RSVP is short for Resource Reservation Protocol. Which statement is true about the RSVP protocol?
A. It is reserved bi-directionally by each originating node.
B. It is only for avoiding packet drop on collision-prone media (such as Ethernet).
C. It is initiated uni-directionally along the data path downstream from each requesting node.
D. It is only shared by pairs of peers participating in delay-sensitive, real-time applications like VoIP.

Correct Answer: C
QUESTION 58
You are a network technician. After examining the following exhibit, can you tell me what the label at the top of the label stack for the IP Packet is when it leaves PE2 for the 10.1.1.0/24 network?

A. 20
B. 30
C. 40
D. 90

Correct Answer: B
QUESTION 59
Which tunneling mechanism provides confidentiality and tunneling capabilities?
A. L2TPv3
B. IPsec ESP
C. IPsec AH
D. MPLS L3VPN
Correct Answer: B QUESTION 60
Which one of the following technologies could offer effective authentication and port-based access control in a wireless network by use of static WEP keys?
A. 802.1X
B. AES-CCMP
C. RADIUS
D. TKIP

Correct Answer: A QUESTION 61
What is one of the reasons that custom QoS ACLs are recommended over automatic QoS when configuring ports on a Catalyst 6500 for use with IP phones?
A. 79xx IP phones do not automatically mark voice packets with non-zero DSCP values.
B. 79xx IP phones do not mark protocol packets such as DHCP, DNS, or TFTP with non-zero DSCP values.
C. 79xx IP phones do not mark voice packets with optimal DSCP values.
D. 79xx IP phones use a custom protocol to communicate CDP information to the switch.

Correct Answer: B QUESTION 62
Which two benefits are of protecting the control plane of a network device? (Choose two.)
A. protects against DoS attacks targeted at the network infrastructure
B. increases the reliability, security, and availability of the network
C. protects data flowing through devices
D. separates attack traffic from normal network traffic

Correct Answer: AB QUESTION 63
EIGRP supports internal and external routes. Which router should be configured as EIGRP stub routers while deploying EIGRP on a network?
A. routers on the border of the EIGRP stub area
B. routers never used to transit traffic between their neighboring upstream routers
C. routers within the core of the network
D. routers that do not need to originate any type of route into the autonomous system

Correct Answer: B QUESTION 64
At all sites provided in the following exhibit. OSPF is used as the PE-CE protocol Which path is preferred from CE1 to CE3?

A. CE1-PE1-PE3-CE3
B. CE1-PE1-CE2-PE2-PE3-CE3
C. CE1-PE1-PE2-CE3
D. CE1-PE1-PE2-PE3-CE3

Correct Answer: A
QUESTION 65
Fibre Channel, or FC, is a gigabit-speed network technology primarily used for storage networking. Fibre Channel is standardized in the T11 Technical Committee of the InterNational Committee for Information Technology Standards (INCITS), an American National Standards Institute (ANSI) Caccredited standards committee. Which two of these correctly describe Fibre Channel? (Choose two.)
A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. provides a high speed transport for SCSI payloads

Correct Answer: AD
QUESTION 66
You work as a network administrator for the P4S company. Study the exhibit carefully, the network is running EIGRP. You need traffic from P4S-R5 destined for 172.30.1.0/24 to be routed through P4S-R4. You should complete which two actions combined? (Choose two.)

A. change the bandwidth on the link between P4S-R4 and P4S-R5 to 110
B. change the bandwidth on the link between P4S-R2 and P4S-R5 to 70
C. change the bandwidth on the link between P4S-R1 and P4S-R3 to 80
D. change the bandwidth on the link between P4S-R3 and P4S-R5 to 70

Correct Answer: BD
QUESTION 67
Which item will be attacked by a DoS attack?
A. availability
B. correlation
C. integrity
D. confidentiality

Correct Answer: A
QUESTION 68
Which is a requirement for performing attack detection by use of anomaly detection technologies?
A. syslog data
B. packet captures
C. baseline data
D. exploit signatures

Correct Answer: C
QUESTION 69
The P4S company connects a pair of sites with three GigE links between two routers with fairly high
processor utilization. It has a great many pairs of hosts communicating between the sites, and some use
applications that may be sensitive to packet re-ordering.
How to maximize the utility of the links while adding minimal load to the routers?

A. use policy-based routing to force all delivery order applications onto a single link and configure per-packet load sharing across the remaining two links
B. verify that the total delay of each link is within 100 milliseconds of the other two links and configure per-packet load sharing across the three links
C. set the link metrics so all three paths are installed in the routing table and use the default per-flow load sharing across the links
D. use multilink PPP to bundle the three links into a single logical link and adjust the routing metrics as needed

Correct Answer: C
QUESTION 70
Which two are characteristics of RSVP? (Choose two.)
A. RSVP itself provides bandwidth and delay guarantees.
B. For RSVP to be end-to-end, all devices must support RSVP.
C. RSVP reservations are maintained by a centralized reservations server.
D. An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations.

Correct Answer: BD
QUESTION 71
Which two potential effects are caused by increasing the percentage of priority traffic? (Choose two.)
A. can increase latency and jitter for priority traffic
B. can increase latency and jitter for non-priority traffic
C. must be avoided regardless of traffic patterns
D. will not ever change the performance of non-priority traffic

Correct Answer: AB
QUESTION 72
Which description is true about RSVP reservations?
A. static, and cannot be removed once they are first requested by a delay-sensitive, real-time application
B. static, and must always be installed after power-up
C. dynamic, and depend on the amount of delay-sensitive, real-time data passing through
D. dynamic, allocated when requested, and removed at the end of each session for which they were requested
Correct Answer: D
QUESTION 73
Which security benefit can be provided by IPv4 anycast for a service such as DNS?
A. robust detection capabilities
B. multiple paths to the service
C. improved availability of services during DoS attacks
D. mitigation of attacks

Correct Answer: C
QUESTION 74
The Cisco MDS 9000 Series Multilayer SAN Switches can help lower the total cost of ownership of the most demanding storage environments. By combining a robust and flexible hardware architecture with multiple layers of network and storage-management intelligence, the Cisco MDS 9000 Series helps you build highly available, scalable storage networks with advanced security and unified management. What method does the Cisco MDS 9000 Series use to support trunking?
A. ISL
B. VLAN Trunk
C. VoQ
D. Enhanced ISL

Correct Answer: D
QUESTION 75
A service provider sets up LSP among all the edge routers in its network by using LDP. A user would like
to maintain its DSCP marking across the service provider backbone. Mark the MPLS packets with the
appropriate EXP values according to QoS policies.
Which step should be taken to classify and queue packets on egress nodes on the basis of EXP marking?

A. disable penultimate hop popping
B. use MPLS network-wide QoS propagation
C. copy IP DSCP at the ingress into MPLS EXP
D. copy MPLS EXP at penultimate hop into DSCP

Correct Answer: A
QUESTION 76
In the network presented below, configure routers P4S-RE and P4S-RF as route reflector clients of router P4S-RA. When router P4S-RE transmits a route to router P4S-RA, which router or routers will router P4S-RA send an update to?

A. only iBGP routers, except router P4S-RE
B. only route reflector clients, except router P4S-RE
C. all routers, except router P4S-RE
D. only EBGP routers

Correct Answer: C
QUESTION 77
Which two statements correctly describe OSPF flooding? (Choose two.)
A. Type 11 Opaque LSAs have area-local flooding scope.
B. Type 1 and Type 2 LSAs have an area scope and are flooded only within an area boundary.
C. Type 5 LSAs are converted to Type 7 LSAs in an NSSA area.
D. OSPF areas help in containing the flooding scope and hiding topology details of other parts of the network.

Correct Answer: BD QUESTION 78
Which QoS requirement applies to streaming video traffic?
A. one-way latency of 150 ms to 200 ms
B. jitter of 30 ms or less
C. packet loss of 2 percent or less
D. 150bps of overhead bandwidth

Correct Answer: C QUESTION 79
You are the Cisco Network Designer in P4S. What is the
term for a logical SAN which provides isolation among devices physically connected to the same fabric?

A. InterSwitch Link
B. Virtua LAN
C. Virtual Output Queuing
D. virtual storage area network

Correct Answer: D QUESTION 80
For the following options, which deployment can provide the least amount of downtime and also allow for dual active-active hubs?
A. dynamic VPN tunnels
B. stateful IPsec failover tied to an HSRP address on dual hubs
C. GRE tunnels from spokes to dual hubs
D. stateful IPsec failover with dead peer detection across dual hubs

Correct Answer: C QUESTION 81

 

 

Cisco 352-001 is the composite exam associated with the Cisco Certified Network Associate certification.Candidates can prepare for this Cisco 352-001 exam.This Cisco 352-001 exam tests a candidate's knowledge and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network.

http://www.king4exam.com/352-001.html

http://www.itcertlab.com/cisco-352-001-pdf.html