Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

400-007 Sample Questions Answers

Questions 4

What is the most important operational driver in building a resilient and secure modular network design?

Options:

A.

Dependencies on hardware or software that is difficult to scale

B.

Minimize app downtime

C.

Reduce the frequency of failures requiring human intervention

D.

Increase time spent on developing new features

Buy Now
Questions 5

An enterprise solution team is analyzing multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

Options:

A.

Deploy a root controller to gather a complete network-level view.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

C.

Build direct physical connectivity between different controllers.

D.

Use OpenFlow to implement and adapt new protocols.

Buy Now
Questions 6

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access based on their user role. Users must use a password that they are already using to access existing applications. A user may not always use the same device to access the VPN. Which two options combined meet the requirements? (Choose two)

Options:

A.

Use local usernames and passwords on the VPN device

B.

Deploy a central authentication directory that users can be authenticated and authorized against

C.

Deploy certificates that are unique to each user

D.

Deploy an IPsec VPN solution

E.

Deploy certificates that are unique to each device

F.

Deploy a SSL VPN solution

Buy Now
Questions 7

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

Options:

A.

EIGRP

B.

RPVST+

C.

MST

D.

L2MP

Buy Now
Questions 8

Customer XYZ network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozen MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

Options:

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Buy Now
Questions 9

When consumers that leverage IaaS reach 100% resource capacity, what can be used to redirect the overflow of traffic to the public cloud so there is no disruption to service?

Options:

A.

Cloud policing

B.

Cloud spill

C.

Cloud bursting

D.

Cloud shaping

Buy Now
Questions 10

A network hacker introduces a packet with duplicate sequence numbers to disrupt an IPsec session. During this, high-priority traffic is transmitted. What design parameter helps mitigate this?

Options:

A.

Classify and mark duplicate sequence packets

B.

Apply anti-replay window 4096

C.

Restrict keyword in IPsec tunnel

D.

Increase QoS shape policy

Buy Now
Questions 11

What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two.)

Options:

A.

Establishing user roles

B.

Polymorphism

C.

Lack of visibility and tracking

D.

Increased attack surface

E.

User credential validation

Buy Now
Questions 12

An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, it cannot access the network until updated. Which component should be built into the NAC design?

Options:

A.

Posture assessment with remediation VLAN

B.

Quarantine SGTs

C.

dACLs with SGTs

D.

Quarantine VLAN

Buy Now
Questions 13

Company XYZ is designing the network for IPv6 security and they have these design requirements:

    A switch or router must deny access to traffic from sources with addresses that are correct but topologically incorrect.

    Devices must block Neighbor Discovery Protocol resolution for destination addresses not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

Options:

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Buy Now
Questions 14

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

Options:

A.

Device resiliency

B.

Device type

C.

Network type

D.

Network resiliency

E.

Network size

Buy Now
Questions 15

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

Options:

A.

Reduction in time to detect and respond to threats

B.

Integration with an incident response plan

C.

Adoption and improvement of threat-detection response

D.

Asset identification and grouping decisions

Buy Now
Questions 16

Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

Options:

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Buy Now
Questions 17

When planning their cloud migration journey, what is crucial for virtually all organizations to perform?

Options:

A.

SASE framework deployment

B.

Optimizing the WAN environment

C.

Assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Buy Now
Questions 18

Refer to the exhibit.

Refer to the exhibit. Two data center sites (X and Y) connect to the Internet and each other using a backdoor link. Both advertise the same IP prefix (100.75.10.0/23) to the Internet. Firewalls are behind R1 and R2.

Problem: When users attempt to reach 100.75.10.0/23, the return traffic is routed to Site-Y, regardless of where the session originated. This results in asymmetric traffic and potentially broken sessions due to firewall behavior.

Which design resolves the issue?

Options:

A.

Use BGP MED to influence Site-X return traffic. Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration. Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X. Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers. Have Site-X advertise an IP pool with a longer prefix.

Buy Now
Questions 19

Refer to the exhibit.

The enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer 3 VPN solution and manages the CE routers, but they do not currently support multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

Options:

A.

Enable a GRE tunnel between nodes CE1 and CE2

B.

Enable a GRE tunnel between nodes C2 and C4

C.

Enable a GRE tunnel between nodes C1 and C4

D.

Implement hub and spoke MPLS VPN over DMVPN (also known as 2547o DMVPN) between CE1 and CE2

E.

The service provider must provide a Draft Rosen solution to enable a GRE tunnel between nodes PE1 and PE2

Buy Now
Questions 20

SDN is still maturing. Throughout the evolution of SDN, which two things will play a key role in enabling a successful deployment and avoiding performance visibility gaps in the infrastructure? (Choose two.)

Options:

A.

Rapid on-demand growth

B.

Dynamic real-time change

C.

Falling back to old behaviors

D.

Peer-to-peer controller infrastructure

E.

Integration of device context

Buy Now
Questions 21

A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.

    Project scope and weekly progress should be visualized by the management.

    Always consider feedback and make changes accordingly during the project.

    Should consider flexibility to change scope at any point in time.

Which project methodology meets the requirements and has the least impact on the outcome?

Options:

A.

Scrum

B.

LEAN

C.

Kanban

D.

Six-Sigma

Buy Now
Questions 22

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

Options:

A.

PIM dense mode with RP located at the hub

B.

PIM sparse mode with RP located at each remote site

C.

PIM sparse mode with RP located at the hub

D.

PIM dense mode with RP located at each remote site

Buy Now
Questions 23

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

Options:

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

BPDU filtering

Buy Now
Questions 24

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol. A spoke-to-spoke data propagation model must be set up. Which two design considerations must be taken into account? (Choose two)

Options:

A.

Configure all the sites as network type broadcast.

B.

The network type on all sites should be point-to-multipoint.

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Buy Now
Questions 25

What is a description of a control plane action?

Options:

A.

De-encapsulating and re-encapsulating a packet in a data-link frame

B.

Matching the destination MAC address of an Ethernet frame to the MAC address table

C.

Matching the destination IP address of an IP packet to the IP routing table

D.

Hosts locating routers that reside on attached links using the IPv6 Neighbor Discovery Protocol

Buy Now
Questions 26

A service provider recently migrated to an SD-WAN solution for delivering WAN connections to its customers. One of the main challenges with the SD-WAN deployment is that branch site volume increases every year, which causes management complexity. Which action resolves the issue?

Options:

A.

Implement a scalable network management system to manage all sites.

B.

Adopt a well-structured SD-WAN service management lifecycle model.

C.

Build a service orchestration platform on top of the network controller.

D.

Set up a dedicated team to monitor and provision new customers.

Buy Now
Questions 27

Your company wants to deploy a new data center infrastructure. Based on the requirements you have chosen VXLAN as encapsulation technology. The customer is concerned about misconfiguration of Layer 2 devices and DC-wide outages caused by Layer 2 loops. What do you answer?

Options:

A.

VXLAN offers native loop avoidance mechanism

B.

Storm Control should be enabled on all ports

C.

VPC+ could prevent L2 loop on access ports

D.

BPDU Guard should be enabled on all VTEP access ports

Buy Now
Questions 28

Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high-speed connections. The company is now redesigning their network and must comply with these design requirements:

    Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.

    Use the Internet as the underlay for the private WAN.

    Securely transfer the corporate data over the private WAN.

Which two technologies should be incorporated into the design of this network? (Choose two.)

Options:

A.

S-VTI

B.

IPsec

C.

DMVPN

D.

GET VPN

E.

PPTP

Buy Now
Questions 29

Which two characteristics are associated with 802.1s? (Choose two)

Options:

A.

802.1s supports up to 1024 instances of 802.1

B.

802.1s is a Cisco enhancement to 802.1w.

C.

802.1s provides for faster convergence over 802.1D and PVST+.

D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

E.

802.1s maps multiple VLANs to the same spanning-tree instance.

Buy Now
Questions 30

A large enterprise cloud design team is evaluating cloud consumption models. What is an example of a typical PaaS limitation or concern?

Options:

A.

Vendor lock-in

B.

Runtime issues

C.

Lack of control

D.

Multi-tenant security

Buy Now
Questions 31

Refer to the exhibit.

This network is running OSPF and EIGRP as the routing protocols. Mutual redistribution of the routing protocols has been configured on the appropriate ASBRs. The OSPF network must be designed so that flapping routes in EIGRP domains do not affect the SPF runs within OSPF. The design solution must not affect the way EIGRP routes are propagated into the EIGRP domains. Which technique accomplishes the requirement?

Options:

A.

route summarization at the ASBR interfaces facing the OSPF domain

B.

route summarization on the appropriate ASBRs

C.

route summarization on the appropriate ABRs

D.

route summarization on EIGRP routers connecting toward the ASBR

Buy Now
Questions 32

Which mechanism provides Layer 2 fault isolation between data centers?

Options:

A.

FabricPath

B.

OTV

C.

Advanced VPLS

D.

LISP

E.

TRILL

Buy Now
Questions 33

Which two design options are available to dynamically discover the RP in an IPv6 multicast network? (Choose two)

Options:

A.

Embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Buy Now
Questions 34

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

Options:

A.

Control Plane Protection using queue thresholding on the transit subinterface

B.

Control Plane Protection using port filtering on the transit subinterface

C.

Control Plane Protection using port filtering on the main interface

D.

Control Plane Protection using queue thresholding on the host subinterface

E.

Control Plane Protection using port filtering on the host subinterface

Buy Now
Questions 35

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

Options:

A.

Access

B.

Core

C.

Collapsed core

D.

Distribution

Buy Now
Questions 36

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

Options:

A.

CPU and memory usage on the spoke routers

B.

Memory usage on the hub router

C.

CPU usage on the hub router

D.

Interface buffers on the hub and spoke routers

Buy Now
Questions 37

A network architect must redesign a service provider edge, where multiservice and multitenant PEs are currently present. Which design feature should be minimized in the new design to achieve reliability?

Options:

A.

bridging

B.

fate sharing

C.

redundancy

D.

unicast overlay routing

Buy Now
Questions 38

What are two advantages of controller-based networks versus traditional networks? (Choose two.)

Options:

A.

The ability to have forwarding tables at each device

B.

More flexible configuration per device

C.

More consistent device configuration

D.

Programmatic APIs that are available per device

E.

The ability to configure the features for the network rather than per device

Buy Now
Questions 39

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

Options:

A.

Uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

Separates infrastructure and policy

C.

Uses policy-based forwarding of real-time traffic with less complexity

D.

Unifies the WAN backbone

E.

Manages failures through backup links

Buy Now
Questions 40

The network designer needs to use GLOP IP addresses to make them unique within their ASN. Which multicast address range will be considered?

Options:

A.

239.0.0.0 to 239.255.255.255

B.

224.0.0.0 to 224.0.0.255

C.

233.0.0.0 to 233.255.255.255

D.

232.0.0.0 to 232.255.255.255

Buy Now
Questions 41

Which function is performed at the access layer of the three-layer hierarchical network design model?

Options:

A.

Fault isolation

B.

QoS classification and marking boundary

C.

Reliability

D.

Fast transport

E.

Redundancy and load balancing

Buy Now
Questions 42

Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

Options:

A.

GRE

B.

MPLS

C.

VXLAN

D.

LISP

E.

CAPWAP

Buy Now
Questions 43

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard (PCI DSS)? (Choose two.)

Options:

A.

Conduct risk analyses

B.

Install firewalls

C.

Use antivirus software

D.

Establish monitoring policies

E.

Establish risk management policies

Buy Now
Questions 44

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

Options:

A.

Control Plane Protection host subinterface

B.

Control Plane Protection main interface

C.

Control Plane Protection transit subinterface

D.

Control Plane Protection CEF-exception subinterface

Buy Now
Questions 45

Refer to the exhibit.

Company XYZ must design a DMVPN tunnel between the three sites. Chicago is going to act as the NHS, and the company wants DMVPN to detect peer endpoint failures. Which technology should be used in the design?

Options:

A.

VPLS

B.

IP SLA

C.

GRE

D.

L2TPv3

Buy Now
Questions 46

You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city. OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)

Options:

A.

Use a multipoint Metro-E service for router connections

B.

Use a single address per router for all P2P links

C.

Use P2P links between routers in a hub-and-spoke design

D.

Configure address aggregation at each site router

E.

Determine which OSPF routers will be DR/BDR

Buy Now
Questions 47

What advantage of placing the IS-IS Layer 2 flooding domain boundary at the core layer in a three-layer hierarchical network is true?

Options:

A.

The Layer 1 and Layer 2 domains can easily overlap

B.

It reduces the complexity of the Layer 1 domains

C.

It can be applied to any kind of topology

D.

The Layer 2 domain is contained and more stable

Buy Now
Questions 48

While computer networks and sophisticated applications have allowed individuals to be more productive the need to prepare for security threats has increased dramatically A six-step methodology on security incident handling has been adopted by many organizations including service providers enterprises, and government organizations to ensure that organizations are aware of significant security incidents and act quickly to stop the attacker, minimize damage caused, and prevent follow on attacks or similar incidents in the future Drag and drop the actions on the left to the targets on the right in the correct order.

Options:

Buy Now
Questions 49

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used

Options:

Buy Now
Questions 50

How must the queue sizes be designed to ensure that an application functions correctly?

Options:

A.

Each individual device queuing delay in the chain must be less than or equal to the application required delay.

B.

The queuing delay on every device in the chain must be exactly the same to the application required delay.

C.

The default queue sizes are good for any deployment as it compensates the serialization delay.

D.

The sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay.

Buy Now
Questions 51

An enterprise organization currently provides WAN connectivity to their branch sites using MPLS technology, and the enterprise network team is considering rolling out SD-WAN services for all sites.

With regards to the deployment planning, drag and drop the actions from the left onto the corresponding steps on the right.

Options:

Buy Now
Questions 52

Which management category is not part of FCAPS framework?

Options:

A.

Configuration

B.

Security

C.

Performance

D.

Authentication

E.

Fault-management

Buy Now
Questions 53

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub-interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

Options:

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Buy Now
Questions 54

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

Options:

A.

inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

B.

ability to expand bandwidth over existing optical infrastructure

C.

inherent topology flexibility with built-in service protection

D.

inherent topology flexibility with intelligent chromatic dispersion

E.

inherent topology flexibility with service protection provided through a direct integration with an upper layer protocol

Buy Now
Questions 55

Backups and mirror copies of data are part of RPO (Recovery Point Objective) strategies. If a business wants to reduce their CAPEX for disaster recovery, which solution is most applicable?

Options:

A.

Perform an annual cybersecurity assessment or penetration test

B.

Renew backup software annually to get the newest version

C.

Migrate parts of or all the infrastructure to the cloud

D.

Build a redundant infrastructure at another location

Buy Now
Questions 56

A customer asks you to perform a high-level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via multipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

Options:

A.

EIGRP

B.

IS-IS

C.

OSPF

D.

BGP

Buy Now
Questions 57

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Options:

Buy Now
Questions 58

Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)

Options:

A.

Check for high roaming delay.

B.

Check for uniform radio coverage across the floors.

C.

Check for high channel utilization.

D.

Check for latency over wireless.

E.

Identify frequent TX power changes.

Buy Now
Questions 59

Which two points must network designers consider when designing a new network design or when evaluating an existing network design to help them understand the high-level design direction with regards to the security aspects? (Choose two)

Options:

A.

Consider Business objectives and goals

B.

Consider organization’s security policy standards

C.

Consider for only multi-site networks

D.

Consider for only new network technologies and components

Buy Now
Questions 60

Which two statements describe the hierarchical LAN design model? (Choose two)

Options:

A.

It is a well-understood architecture that provides scalability

B.

It is the best design for modern data centers

C.

It is the most optimal design but is highly complex

D.

It provides a simplified design

E.

Changes, upgrades, and new services can be introduced in a controlled and staged manner

Buy Now
Questions 61

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.

Options:

Buy Now
Questions 62

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)

Options:

A.

Changes in the existing IP addressing and subnets are required

B.

The firewall can participate actively on spanning tree.

C.

Multicast traffic can traverse the firewall.

D.

OSPF adjacencies can be established through the firewall

E.

The firewall acts like a router hop in the network.

Buy Now
Questions 63

The goal for any network designer is to strive to build a resilient network that adapts to changing conditions rapidly with minimal impact on the services running over the network. A resilient network can adapt to failures, but which soft failure can be harder to define and detect?

Options:

A.

A network with operational challenges due to lack of skills

B.

A network that is not running in an optimal way

C.

A network which does not solve complexity issues

D.

A network or service that experiences outages

Buy Now
Questions 64

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP Path MTU Discovery be enabled. Which effect will this have on the network?

Options:

A.

It will enhance the performance of TCP-based applications.

B.

It will increase the convergence time.

C.

It will improve the convergence time.

D.

It will create a loop free path.

Buy Now
Questions 65

Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

Options:

A.

Southbound APIs

B.

Northbound APIs

C.

Orchestration layer

D.

SDN controller

Buy Now
Questions 66

Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two.)

Options:

A.

Bandwidth utilization increases

B.

Traffic flows are suboptimal

C.

High-end routers are required to support NFV

D.

OpenFlow must be supported in the network

E.

An SDN orchestration layer is required to support NFV

Buy Now
Questions 67

An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate this during the migration phase?

Options:

A.

Deploy controllers, deploy SD-WAN edge routers in the data center, and migrate branch sites.

B.

Migrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers.

C.

Migrate branch sites, migrate data center WAN routers, and deploy controllers.

D.

Deploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites.

Buy Now
Questions 68

Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?

Options:

A.

It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger.

B.

It protects the network infrastructure against spoofed DDoS attacks.

C.

It classifies bogon traffic and remarks it with DSCP bulk.

D.

It filters RFC 1918 IP addresses.

Buy Now
Questions 69

Refer to the exhibit. A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP-SW2. Which two ways to design this solution are true? (Choose two)

Options:

A.

Enable unicast heartbeat messages to be periodically exchanged between MEPs

B.

Enable Connectivity Fault Management on the SP switches

C.

Use upward maintenance endpoints on the SP switches

D.

Forward E-LMI PDUs over VPLS

E.

Forward LLDP PDUs over the VPLS

Buy Now
Questions 70

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?

Options:

A.

Binary indexed explicit routing

B.

Binary intermediate enhanced routing

C.

Bit indexed explicit replication

D.

Bi-directional implicit replication

Buy Now
Questions 71

A BGP route reflector in the network is taking longer than expected to converge during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?

Options:

A.

Increase the size of the hold queue.

B.

Increase the size of the large buffers.

C.

Decrease the size of the small buffers.

D.

Increase the keepalive timers for each BGP neighbor.

Buy Now
Questions 72

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

Options:

A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Buy Now
Questions 73

What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)

Options:

A.

Monitoring capabilities

B.

Project time frame

C.

Staff experience

D.

Component availability

E.

Total cost

Buy Now
Questions 74

Cost is often one of the motivators for a business to migrate from a traditional network to a software-defined network. Which design decision is directly influenced by CAPEX drivers?

Options:

A.

Scalability

B.

Stability

C.

Complexity

D.

Manageability

Buy Now
Questions 75

A software-defined networking (SDN) controller learns network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers. Each policy is represented as a RIB entry in the control plane of the router. Which SDN model has been implemented?

Options:

A.

SDN centralized

B.

SDN traffic engineering

C.

SD-WAN

D.

SDN hybrid

Buy Now
Questions 76

How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?

Options:

A.

5

B.

6

C.

7

D.

10

E.

20

Buy Now
Questions 77

An enterprise has identified these causes for inefficient CAPEX spending:

    CAPEX planning is driven by technology and not by business objectives.

    The CAPEX planning team lacks the data it needs to perform due diligence tasks.

    The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

Options:

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

B.

CxO-level staff must have a full technical understanding but they should not trust their technical leaders fully.

C.

Adopt new organizational models that promote real accountability for ROI, not just revenue, EBITDA, and cash.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Buy Now
Questions 78

What is a country-specific requirement that data is subject to the laws of the country in which it is collected or processed and must remain within its borders?

Options:

A.

Data sovereignty

B.

Data rationality

C.

Data inheritance

D.

Data replication

Buy Now
Questions 79

Drag and drop the characteristics from the left onto the corresponding network management options on the right.

Options:

Buy Now
Questions 80

Refer to the exhibit.

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

Options:

A.

community

B.

MED

C.

local preference

D.

AS path

Buy Now
Questions 81

An enterprise campus is adopting a network virtualization design solution with these requirements:

• It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

• It must maintain end-to-end logical path transport separation across the network

• Resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

Options:

A.

Path isolation

B.

Session isolation

C.

Group virtualization

D.

Services virtualization

E.

Edge isolation

Buy Now
Questions 82

Which two impacts of adding the IP event dampening feature to a network design are true? (Choose two.)

Options:

A.

It protects against routing loops.

B.

It switches traffic immediately after a link failure.

C.

It speeds up link failure detection.

D.

It reduces the utilization of system processing resources.

E.

It improves overall network stability.

Buy Now
Questions 83

Company XYZ allows employees to use any open desk and plug their laptops in. They want authentication using domain credentials and future capability for segmentation within the same subnet. Which protocol can be recommended?

Options:

A.

LDAP

B.

EAP

C.

TACACS+

D.

RADIUS

Buy Now
Questions 84

Which BGP feature provides fast convergence?

Options:

A.

BGP PIC

B.

BGP-EVPN

C.

BGP FlowSpec

D.

BGP-LS

Buy Now
Questions 85

A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?

Options:

A.

Fragmented packet with the do-not-fragment bit set

B.

IP packets with broadcast IP source addresses

C.

IP packets with the multicast IP source address

D.

IP packet with the multicast IP destination address

E.

IP packets with identical source and destination IP addresses

F.

IP packets with the destination IP address 0.0.0.0.

Buy Now
Questions 86

Which two features describe controller-based networking solutions compared to traditional networking solutions? (Choose two.)

Options:

A.

Inflate licensing costs

B.

Reduce network configuration complexity

C.

Provide centralization of primary IT functions

D.

Allow for fewer network failures

E.

Increase network bandwidth usage

Buy Now
Questions 87

Refer to the exhibit.

After a network audit, a network engineer must optimize the current network convergence time. The proposed solution must consider link layer and control plane failures. Which solution meets the requirements?

Options:

A.

Configure debounce timers

B.

Increase fast hello timers

C.

Implement BFD

D.

Enable LSP fast flood

Buy Now
Questions 88

Which design benefit of bridge assurance is true?

Options:

A.

It supposes a spanning-tree topology change upon connecting and disconnecting a station on a port

B.

It prevents switched traffic from traversing suboptimal paths on the network.

C.

It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops.

D.

It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST+ and MST

Buy Now
Questions 89

Which design solution reduces the amount of IGMP state in the network?

Options:

A.

IGMP filtering

B.

IGMPv3 with PIM-SSM

C.

Multiple multicast domains

D.

One multicast group address throughout network regardless of IGMP version

Buy Now
Questions 90

Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)

Options:

A.

Target RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites.

B.

VSANs must be routed between sites to isolate fault domains and increase overall availability.

C.

Synchronous data replication must be used to meet the business requirements.

D.

Asynchronous data replication should be used in this scenario to avoid performance impact in the primary site.

E.

VSANs must be extended from the primary to the secondary site to improve performance and availability.

Buy Now
Questions 91

Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbor relationships minimized on each segment and the LSDB size optimized. Which design can be used?

Options:

A.

Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area

B.

Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1

C.

Design the network so that all routers are Level 1 routers

D.

Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1

Buy Now
Questions 92

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

Options:

A.

Flow-based analysis to measure bandwidth mix of applications and their flows

B.

Call management analysis to identify network convergence-related failures

C.

Call management analysis to identify CAC failures and call quality issues

D.

Active monitoring via synthetic probes to measure loss, latency, and jitter

E.

Passive monitoring via synthetic probes to measure loss, latency, and jitter

F.

Flow-based analysis with PTP time-stamping to measure loss, latency, and jitter

Buy Now
Questions 93

You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

Options:

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels

B.

Choose a high minimum data rate to reduce the duty cycle.

C.

Increases the number of SSIDs to load-balance the client traffic.

D.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

E.

Enable 802.11n channel bonding on both 2.4 GHz and 5 GHz to increase the maximum aggregated cell throughput.

Buy Now
Questions 94

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design, which two technologies are recommended? (Choose two.)

Options:

A.

Design MLAG/MC-LAG into the network wherever possible.

B.

Configure DHCP snooping on the switches.

C.

Use root guard.

D.

Use BPDU guard.

E.

Use UniDirectional Link Detection.

Buy Now
Questions 95

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

Options:

A.

Wide area network

B.

Mobile network

C.

Metro network

D.

Application network

E.

Control network

Buy Now
Questions 96

A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs. Which consideration supports the new business requirement?

Options:

A.

VDI servers should be contained centrally within a DMZ

B.

The thin client traffic should be placed in a WAN QoS priority queue

C.

VDI servers should be contained within dedicated VLANs in each branch location

D.

The WAN should offer low latency and be resized

Buy Now
Questions 97

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants a simplified and controlled approach to interconnecting multicast domains. Which technology is the best fit?

Options:

A.

MSDP

B.

PIM SSM

C.

MPLS

D.

PIM sparse mode

Buy Now
Questions 98

Refer to the exhibit.

Refer to the exhibit. A new high availability DB server cluster is installed in the network. These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.

Which solution supports these requirements?

Options:

A.

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.

Add secondary links to REP segments 1 and 2

C.

Add two new links between SW1 and SW2 configured as REP segment 3

D.

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Buy Now
Questions 99

What are two design constraints in a standard spine and leaf architecture? (Choose two.)

Options:

A.

Spine switches can connect to each other.

B.

Each spine switch must connect to every leaf switch.

C.

Leaf switches must connect to each other.

D.

Endpoints connect only to the spine switches.

E.

Each leaf switch must connect to every spine switch.

Buy Now
Questions 100

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

Options:

A.

System-oriented architecture

B.

OSASE architecture

C.

Platform-oriented architecture

D.

SASE architecture

Buy Now
Questions 101

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

Options:

A.

Partial mesh

B.

Full mesh

C.

Ring

D.

Squared

E.

Triangulated

Buy Now
Questions 102

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network. Which network threat is SNMPv3 effective against?

Options:

A.

Man-in-the-middle attack

B.

Masquerade threats

C.

DDoS attack

D.

Brute force dictionary attack

Buy Now
Questions 103

Various teams in different organizations within an enterprise are preparing low-level design documents using a Waterfall project model. Input from relevant stakeholders was captured at the start of the project, and the scope has been defined. What impact will it have if stakeholders ask for changes before documentation is complete?

Options:

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Buy Now
Questions 104

A network architect is designing a policy where database applications access the internet directly, while other traffic routes through the data center, with dynamic path switching based on performance. Which solution meets these requirements?

Options:

A.

MPLS L3VPN with QoS

B.

Cloud OnRamp for IaaS

C.

Cloud OnRamp for SaaS

D.

MPLS Direct Connect

Buy Now
Exam Code: 400-007
Exam Name: Cisco Certified Design Expert (CCDE v3.1)
Last Update: Jun 27, 2025
Questions: 349
$239.6  $599
$179.6  $449
$159.6  $399
buy now 400-007