352-001 CCDE Design Written Exam v2.0 and v2.1

Exam Number 352-001 CCDE
Associated Certifications CCDE
Duration 120 minutes (90 – 110 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

Cisco CCDE Written Exam will validate that professionals have the expertise to gather and clarify network functional requirements, develop network designs to meet functional specifications, develop an implementation plan, convey design decisions and their rationale, and possess expert-level network infrastructure knowledge.

Exam Description
Cisco CCDE® Written Exam (352-001) version 2 is a 2-hour test with 90−110 questions that will validate that professionals have the expertise to gather and clarify network functional requirements, develop network designs to meet functional specifications, develop an implementation plan, convey design decisions and their rationale, and possess expert-level network infrastructure knowledge. The exam is closed book, and no outside reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

CCDE Written Exam Topics v2.0 (Recommended for candidates who are scheduled to take the exam BEFORE July 25, 2016)

1.0 Layer 2 Control Plane 26%

1.1 Describe fast convergence techniques and mechanisms

1.1.a Down detection
1.1.b Interface dampening

1.2 Describe loop detection and mitigation protocols

1.2.a Spanning tree types
1.2.b Spanning tree tuning techniques

1.3 Describe mechanisms that are available for creating loop-free topologies

1.3.a REP
1.3.b Multipath
1.3.c Switch clustering
1.3.d Flex links
1.3.e Loop detection and mitigation

1.4 Describe the effect of transport mechanisms and their interaction with routing protocols over different types of links

1.5 Describe multicast routing concepts

1.6 Describe the effect of fault isolation and resiliency on network design

1.6.a Fault isolation
1.6.b Fate sharing
1.6.c Redundancy
1.6.d Virtualization
1.6.e Segmentation

2.0 Layer 3 Control Plane 37%

2.1 Describe route aggregation concepts and techniques

2.1.a Purpose of route aggregation
2.1.b When to leak routes / avoid suboptimal routing
2.1.c Determine aggregation location and techniques

2.2 Describe the theory and application of network topology layering

2.2.a Layers and their purposes in various environments

2.3 Describe the theory and application of network topology abstraction

2.3.a Purpose of link state topology summarization
2.3.b Use of link state topology summarization

2.4 Describe the effect of fault isolation and resiliency on network design or network reliability

2.4.a Fault isolation
2.4.b Fate sharing
2.4.c Redundancy

2.5 Describe metric-based traffic flow and modification

2.5.a Metrics to modify traffic flow
2.5.b Third-party next hop

2.6 Describe fast convergence techniques and mechanisms

2.6.a Protocol timers
2.6.b Loop-free alternates

2.7 Describe factors affecting convergence

2.7.a Recursion
2.7.b Microloops
2.7.c Transport

2.8 Describe unicast routing protocol operation (OSPF, EIGRP, ISIS, BGP, and RIP) in relation to network design

2.8.a Neighbor relationships
2.8.b Loop-free paths
2.8.c Flooding domains and stubs
2.8.d iBGP scalability

2.9 Analyze operational costs and complexity

2.9.a Routing policy
2.9.b Redistribution methods

2.10 Describe the interaction between routing protocols and topologies

2.11 Describe generic routing and addressing concepts

2.11.a Policy-based routing
2.11.b NAT
2.11.c Subnetting
2.11.d RIB-FIB relationships

2.12 Describe multicast routing concepts

2.12.a General multicast concepts
2.12.b Source specific
2.12.c MSDP/anycast
2.12.d PIM
2.12.e mVPN

2.13 Describe IPv6 concepts and operation

2.13.a General IPv6 concepts
2.13.b IPv6 security
2.13.c IPv6 transition techniques

3.0 Network Virtualization 17%

3.1 Describe Layer 2 and Layer 3 tunnelling technologies

3.1.a Tunnelling for security
3.1.b Tunnelling for network extension
3.1.c Tunnelling for resiliency
3.1.d Tunnelling for protocol integration
3.1.e Tunnelling for traffic optimization

3.2 Analyze the implementation of tunnelling

3.2.a Tunnelling technology selection
3.2.b Tunnelling endpoint selection
3.2.c Tunnelling parameter optimization of end-user applications
3.2.d Effects of tunnelling on routing
3.2.e Routing protocol selection and tuning for tunnels

4.0 Design Considerations 20%

4.1 Analyze various QoS performance metrics

4.1.a Application requirements
4.1.b Performance metrics

4.2 Describe types of QoS techniques

4.2.a Classification and marking
4.2 b Shaping
4.2.c Policing
4.2.d Queuing

4.3 Identify QoS strategies based on customer requirements

4.3.a DiffServ
4.3.b IntServ

4.4 Identify network management requirements

4.5 Identify network application reporting requirements

4.6 Describe technologies, tools, and protocols that are used for network management

4.7 Describe the reference models and processes that are used in network management, such as FCAPS, ITIL®), and TOGAF

4.8 Describe best practices for protecting network infrastructure

4.8.a Secure administrative access
4.8.b Control plane protection

4.9 Describe best practices for protecting network services

4.9.a Deep packet inspection
4.9.b Data plane protection

4.10 Describe tools and technologies for identity management

4.11 Describe tools and technologies for IEEE 802.11 wireless deployment

4.12 Describe tools and technologies for optical deployment

4.13 Describe tools and technologies for SAN fabric deployment
CCDE Written Exam (352-001) Version 2.1

Exam Description
Cisco CCDE® Written Exam [352-001] version 2.1 is a 2-hour test with 90−110 questions that test a candidate’s combined knowledge of routing protocols, internetworking theory and design principles. The exam assesses a candidate’s understanding of network design in the areas of routing, tunneling, Quality of Service, Management, Cost, Capacity, and Security. This exam combines in-depth technical concepts with Network Design principles and is intended for a Network Professional with at least 7 years of experience in Network Engineering or Advanced Network Design. Product-specific knowledge including version of code, implementation and operations specific concepts is not tested on the CCDE exam. The exam is closed book and no outside reference materials are allowed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

CCDE Written Exam Topics v2.1 (Recommended for candidates who are scheduled to take the exam on July 25, 2016 and beyond)

1.0 Layer 2 Control Plane 24%

1.1 Describe fast convergence techniques and mechanisms

1.1.a Down detection
1.1.b Interface dampening

1.2 Describe loop detection and mitigation protocols

1.2.a Spanning tree types
1.2.b Spanning tree tuning techniques

1.3 Describe mechanisms that are available for creating loop-free topologies

1.3.a REP
1.3.b Multipath
1.3.c Switch clustering
1.3.d Flex links
1.3.e Loop detection and mitigation

1.4 Describe the effect of transport mechanisms and their interaction with routing protocols over different types of links

1.5 Describe multicast routing concepts

1.6 Describe the effect of fault isolation and resiliency on network design

1.6.a Fault isolation
1.6.b Fate sharing
1.6.c Redundancy
1.6.d Virtualization
1.6.e Segmentation

2.0 Layer 3 Control Plane 33%

2.1 Describe route aggregation concepts and techniques

2.1.a Purpose of route aggregation
2.1.b When to leak routes / avoid suboptimal routing
2.1.c Determine aggregation location and techniques

2.2 Describe the theory and application of network topology layering

2.2.a Layers and their purposes in various environments

2.3 Describe the theory and application of network topology abstraction

2.3.a Purpose of link state topology summarization
2.3.b Use of link state topology summarization

2.4 Describe the effect of fault isolation and resiliency on network design or network reliability

2.4.a Fault isolation
2.4.b Fate sharing
2.4.c Redundancy

2.5 Describe metric-based traffic flow and modification

2.5.a Metrics to modify traffic flow
2.5.b Third-party next hop

2.6 Describe fast convergence techniques and mechanisms

2.6.a Protocol timers
2.6.b Loop-free alternates

2.7 Describe factors affecting convergence

2.7.a Recursion
2.7.b Microloops
2.7.c Transport

2.8 Describe unicast routing protocol operation [OSPF, EIGRP, ISIS, BGP, and RIP] in relation to network design

2.8.a Neighbor relationships
2.8.b Loop-free paths
2.8.c Flooding domains and stubs
2.8.d iBGP scalability

2.9 Analyze operational costs and complexity

2.9.a Routing policy
2.9.b Redistribution methods

2.10 Describe the interaction between routing protocols and topologies

2.11 Describe generic routing and addressing concepts

2.11.a Policy-based routing
2.11.b NAT
2.11.c Subnetting
2.11.d RIB-FIB relationships

2.12 Describe multicast routing concepts

2.12.a General multicast concepts
2.12.b Source specific
2.12.c MSDP/anycast
2.12.d PIM
2.12.e mVPN

2.13 Describe IPv6 concepts and operation

2.13.a General IPv6 concepts
2.13.b IPv6 security
2.13.c IPv6 transition techniques

3.0 Network Virtualization 15%

3.1 Describe Layer 2 and Layer 3 tunnelling technologies

3.1.a Tunnelling for security
3.1.b Tunnelling for network extension
3.1.c Tunnelling for resiliency
3.1.d Tunnelling for protocol integration
3.1.e Tunnelling for traffic optimization

3.2 Analyze the implementation of tunnelling

3.2.a Tunnelling technology selection
3.2.b Tunnelling endpoint selection
3.2.c Tunnelling parameter optimization of end-user applications
3.2.d Effects of tunnelling on routing
3.2.e Routing protocol selection and tuning for tunnels

4.0 Design Considerations 18%

4.1 Analyze various QoS performance metrics

4.1.a Application requirements
4.1.b Performance metrics

4.2 Describe types of QoS techniques

4.2.a Classification and marking
4.2 b Shaping
4.2.c Policing
4.2.d Queuing

4.3 Identify QoS strategies based on customer requirements

4.3.a DiffServ
4.3.b IntServ

4.4 Identify network management requirements

4.5 Identify network application reporting requirements

4.6 Describe technologies, tools, and protocols that are used for network management

4.7 Describe the reference models and processes that are used in network management, such as FCAPS, ITIL®, and TOGAF

4.8 Describe best practices for protecting network infrastructure

4.8.a Secure administrative access
4.8.b Control plane protection

4.9 Describe best practices for protecting network services

4.9.a Deep packet inspection
4.9.b Data plane protection

4.10 Describe tools and technologies for identity management

4.11 Describe tools and technologies for IEEE 802.11 wireless deployment

4.12 Describe tools and technologies for optical deployment

4.13 Describe tools and technologies for SAN fabric deployment

5.0 Evolving Technologies 10%

5.1 Cloud

5.1.a Compare and contrast Cloud deployment models
5.1.a [i] Infrastructure, platform, and software services [XaaS]
5.1.a [ii] Performance and reliability
5.1.a [iii] Security and privacy
5.1.a [iv] Scalability and interoperability
5.1.b Describe Cloud implementations and operations
5.1.b [i] Automation and orchestration
5.1.b [ii] Workload mobility
5.1.b [iii] Troubleshooting and management
5.1.b [iv] OpenStack components

5.2 Network programmability [SDN]

5.2.a Describe functional elements of network programmability [SDN] and how they interact
5.2.a [i] Controllers
5.2.a [ii] APIs
5.2.a [iii] Scripting
5.2.a [iv] Agents
5.2.a [v] Northbound vs. Southbound protocols
5.2.b Describe aspects of virtualization and automation in network environments
5.2.b [i] DevOps methodologies, tools and workflows
5.2.b [ii] Network/application function virtualization [NFV, AFV]
5.2.b [iii] Service function chaining
5.2.b [iv] Performance, availability, and scaling considerations

5.3 Internet of Things

5.3.a Describe architectural framework and deployment considerations for Internet of Things [IoT]
5.3.a [i] Performance, reliability and scalability
5.3.a [ii] Mobility
5.3.a [iii] Security and privacy
5.3.a [iv] Standards and compliance
5.3.a [v] Migration
5.3.a [vi] Environmental impacts on the network

QUESTION 1
A network designer is redesigning an enterprise campus network to ensure that Ethernet switches
proactively attempt to reconnect after a fiber cut. In the design, they will have to address areas
where fiber cuts exist on campus from past troubleshooting, where a single fiber is disconnected in
the fiber pair, leading to looping. Which feature could be implemented in the design to allow the
Spanning Tree Protocol on the switches to be protected?

A. loop guard
B. UniDirectional Link Detection
C. UniDirectional Link Detection aggressive mode
D. root guard

Answer: C

Explanation:


QUESTION 2
A switched network is being designed to support a manufacturing factory. Due to cost constraints,
fiber-based connectivity is not an option. Which design allows for a stable network when there is a
risk of interference from the manufacturing hardware in use on the factory floor?

A. Design the network to include UDLD to detect unidirectional links and take them out of service.
B. Design the network to include EtherChannel bundles to prevent a single-link failure from taking
down a switch interconnection point.
C. Design the network to include loop guard to prevent a loop in the switched network when a link
has too much interference.
D. Design the network to include BackboneFast on all devices to accelerate failure convergence
times.

Answer: A

Explanation:


QUESTION 3
A service provider has a Resilient Ethernet Protocol ring running as a metro backbone between its
locations in one city. A customer wants to connect one site with one box redundant to the Resilient
Ethernet Protocol ring at two different service provider locations. How can this be done without
producing any Layer 2 loops within the network design?

A. Spanning tree at the service provider side only must be enabled.
B. Spanning tree at the customer side only must be enabled.
C. Flex Links at the service provider side only must be enabled.
D. Flex Links at the customer side only must be enabled.
E. EtherChannel at the service provider side and the customer side must be enabled.
F. Spanning tree at the service provider side and the customer side must be enabled.
G. Flex Links at the service provider side and the customer side must be enabled.

Answer: D

Explanation:


QUESTION 4
You have created a network design that has two point-to-point Metro Ethernet circuits extending a
single production VLAN between two data centers. Under normal circumstances, one circuit will
carry traffic and spanning tree will block the other. If the company wants you to make use of both
circuits to carry production traffic, which two technologies and features will you investigate to
integrate into your network design? (Choose two.)

A. EtherChannel
B. MST
C. Multichassis EtherChannel
D. PVST+

Answer: A,C

Explanation:


QUESTION 5
Voice traffic between two campus enterprise networks is growing. The network designers decide
to add a second 10-Mb Metro Ethernet service parallel to their original 10-Mb service in order to
provide more bandwidth and diversity. The QoS profile will be the same on the new 10-Mb service
due to the voice stability on the first Metro Ethernet link. When the second link is added to the
OSPF domain, which traffic design consideration would have the most impact on the voice traffic
when both links are active?

A. per-destination IP address basis
B. per-flow basis
C. per-packet basis
D. per-source IP address basis

Answer: C

Explanation:

Click here to view complete Q&A of 352-001 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Cisco 352-001 Certification, Cisco 352-001 Training at certkingdom.com

 

Click to rate this post!
[Total: 0 Average: 0]

Comments |0|

Legend *) Required fields are marked
**) You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>