Which two benefits are of protecting the control plane of a network device? (Choose two.)
A. Increases the reliability, security, and availability of the network
B. Protects against DoS attacks targeted at the network infrastructure
C. Separates attack traffic from normal network traffic
D. Protects data flowing through devices
Which two statements are design benefits of route summarization in a network? (Choose 2)
A. A summary route has a composite or user-defined single metric for all routes that it represents.
B. If a route that is part of a summary flaps, other routers beyond the summarization point will not see a change in the route.
C. The routing table takes up less memory.
D. Specific routes no longer appear in the routing table, so traffic can go along alternative paths that carry a more specific route.
E. The LSA type changes for OSPF summaries.
For the following items, which one is the weakness of rate limiting as a response to a DoS attack?
A. Rate limiting does not drop enough packets.
B. Rate limiting does not detect attacks.
C. Rate limiting only works on inbound traffic.
D. Rate limiting is too processor-intensive.
Which technology provides for the best use of resources to provide end-to-end Layer 2 connectivity?
A. MSTP
B. Multichassis EtherChannel
C. PAgP
D. LACP
In secure IP multicast, which protocol handles group key management?
A. IPsec
B. GDOI
C. MD5
D. SHA-256
Which item will be attacked by a DoS attack?
A. Correlation
B. Availability
C. Integrity
D. Confidentiality
A service provider wants to use a controller to automate the provisioning of service function chaining. Which two overlay technologies can be used with EVPN MP-BGP to create the service chains in the data center? (Choose 2)
A. MPLS L2VPN
B. 802.1Q
C. MPLSoGRE
D. VXLAN
E. Provider Backbone Bridging EVPN
The Middle East-based cloud service provider, CSP, is planning to launch five data centers in Egypt, United Arab Emirates, Saudi Arabia, Qatar, and Turkey. CSP is looking for VLAN extension and DCIs between these five data centers to allow for software replication, where original and backup VMs must be on the same subnet. Which tunneling technology must they use?
A. VPWS
B. L2TPv3
C. IPsec VPN
D. VPLS
What is a correct design consideration of IPv6 MLD snooping?
A. MLD snooping requires IGMP snooping to be implemented.
B. MLD snooping conserves CPU by sharing IPv4 and IPv6 multicast topology.
C. MLD snooping is used to filter all MLD queries.
D. MLD snooping conserves bandwidth on switches.
Which two IEEE standards are commonly used at the data link layer for an access network, in an loT environment? (Choose 2)
A. 802.11
B. 802.16
C. 802.15.4
D. 1901.2 NB-PLC
E. 802.22
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 352-001 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.