Cisco: Exam Questions 400-007
Cisco: Exam Questions 400-007
Cisco: Exam Questions 400-007
Cisco
Exam Questions 400-007
Cisco Certified Design Expert (CCDE v3.0) Written Exam
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical
functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid
hardware issues yet have control of its applications and operating system?
A. SaaS
B. PaaS
C. laaS
D. hybrid cloud
Answer: C
NEW QUESTION 2
SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to
the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which
overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?
A. TLS
B. DTLS
C. IPsec
D. GRE
Answer: C
NEW QUESTION 3
Which best practice ensures data security in the private cloud?
Answer: B
NEW QUESTION 4
As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Sen/ice (DaaS), by hosting the backend system in their on-
premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center
and head office do not experience this behavior. Which technology can be used to mitigate this issue?
A. tail drop
B. traffic shaping
C. WRED
D. traffic policing
Answer: B
Explanation:
Traffic Shaping does help with congestion and better bandwidth utilization over the WAN.
NEW QUESTION 5
An enterprise has identified these causes for inefficient CAPEX spending:
CAPEX planning is driven by technology and not by business objectives.
The CAPEX planning team lacks the data it needs to perform due diligence tasks.
The organizational structure lacks sufficient accountability and incentives.
Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?
A. Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.
B. CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully.
C. Adopt new organizational models that promote real accountability for RO
D. not just revenu
E. EBITDA, and cash.
F. Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.
Answer: C
NEW QUESTION 6
Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources
required by applications?
A. southbound APIs
B. northbound APIs
C. orchestration layer
D. SDN controller
Answer: B
NEW QUESTION 7
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined
toward next hop routers. Which technology can be used to prevent these types of attacks?
A. MPP
B. CPPr
C. CoPP
D. DPP
Answer: B
Explanation:
https://learningnetwork.cisco.com/s/question/0D53i00000KsuyvCAB/copp-vs-cppr
NEW QUESTION 8
Refer to the table.
A customer investigates connectivity options for a DCI between two production data centers to aid a
large-scale migration project. The solution must provide a single 10G connection between locations and be able to run its own varying QoS profiles without service
provider interaction based on the migration stages. All connectivity methods are at 10 Gbps. Which transport technology costs the least if the connectivity is
required for just one year?
Answer: A
NEW QUESTION 9
Which solution component helps to achieve rapid migration to the cloud for SaaS and public cloud leveraging SD-WAN capabilities?
Answer: B
NEW QUESTION 10
What statement describes the application layer as defined in the software-defined networking architecture?
A. This layer is responsible for collecting the network status such as network usage and topology.
B. This layer contains programs that communicate their desired network behavior to controllers.
C. This layer is responsible for handling packets based on the rules provided by the controller.
D. This layer processes the instructions and requirements sent by networking components.
Answer: B
NEW QUESTION 10
You were tasked to enhance the security of a network with these characteristics:
• A pool of servers is accessed by numerous data centers and remote sites
• The servers are accessed via a cluster of firewalls
• The firewalls are configured properly and are not dropping traffic
• The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting
flows at the servers?
A. Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.
B. Deploy uRPF strict mode.
C. Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.
D. Deploy uRPF loose mode
Answer: C
NEW QUESTION 11
Which two pain points are the most common for container technology adoption? (Choose two)
A. Performance
B. Security
C. Cost
D. Container deployment
E. Skilled staff
F. Compliance
Answer: DE
NEW QUESTION 13
Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?
Answer: D
NEW QUESTION 14
Refer to the exhibit.
An engineer is designing the network for a multihomed customer running in AS 111 does not have any other Ass connected to it. Which technology is more
comprehensive to use in the design to make sure that the AS is not being used as a transit AS?
A. Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.
B. Use the local preference attribute to configure your AS as a non-transit'' AS.
C. include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.
D. Include a prefix list to only receive routes from neighboring ASs.
Answer: C
NEW QUESTION 16
Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)
Answer: AC
Explanation:
https://community.cisco.com/t5/wireless/channel-utilization/td-p/2716667
NEW QUESTION 20
What are two design constraints in a standard spine and leaf architecture? (Choose two.)
Answer: BE
NEW QUESTION 22
How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?
Answer: D
NEW QUESTION 24
Refer to the exhibit.
The enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a
Layer3 VPN solution and manages the CE routers, but they do not currently support multicast. Which solution quickly allows this multicast traffic to go through
while allowing for future scalability?
Answer: B
NEW QUESTION 26
Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that
confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?
A. local addresses
B. private addresses
C. link-local addresses
D. unique local addresses
Answer: D
NEW QUESTION 29
What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core
layers?
A. low bandwidth
B. securityC scalability
C. high latency
Answer: A
NEW QUESTION 31
Which extensions to GRE tunneling provide session tracking and in-order packet delivery in exchange for additional state stored in tunnel endpoints?
Answer: D
NEW QUESTION 33
Drag and drop the multicast protocols from the left onto the current design situation on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A picture containing table Description automatically generated
IPv4:
Host Registration - IGMP
Router Registration - PIM-DM, PIM-SM, SSM, BIDIR Inter-Domain Source Discovery - MSDP
IPv6:
Host Registration - MLD
Router Registration - PIM-SM, SSM, BIDIR
NEW QUESTION 35
An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet
link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link
during times of congestion. Which QoS technique can be used to facilitate this requirement?
Answer: C
NEW QUESTION 40
Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?
A. It transmits packets that traverse over network devices like switches and routers
B. It encapsulates packets at source and destination, which incurs additional overhead
C. Packet delivery and reliability occurs at Layer 3 and Layer 4
D. It is responsible for the delivery of packets; NAT- or VRF-based segregation is required
Answer: B
NEW QUESTION 41
In the case of outsourced IT services, the RTO is defined within the SLA. Which two support terms are often included in the SLA by IT and other service providers?
(Choose two.)
Answer: BE
NEW QUESTION 43
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data)
from unauthorized access, modification, inspection, or destruction? (Choose three.)
A. confidential
B. serviceability
C. reliability
D. availability
E. integrity
F. scalability
Answer: ADE
NEW QUESTION 48
An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication
method and data center technology should be used?
Answer: B
Explanation:
RTO and RPO are measures of how quickly and accurately a system can be recovered after a disaster or failure. RTO refers to the amount of time it takes to
restore a system to its normal operation after a failure, while RPO refers to the amount of data that can be lost as a result of a failure. In synchronous replication,
data is written to both the primary and secondary systems at the same time. This ensures that the data on the secondary system is always up-to-date and ready
for use in the event of a disaster or failure. Geographically dispersed dual data centers refer to two data centers that are located in different geographical locations,
which can help to reduce the risk of a disaster or failure impacting both data centers at the same time.
NEW QUESTION 50
Which design principal improves network resiliency?
A. Added load-balancing
B. Added redundancy
C. Added confidentiality
D. Added reliability
Answer: B
NEW QUESTION 51
The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements
describe a centralized SDN control path? (Choose two.)
A. Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing.
B. It is highly-available by design with no single-point-of-failure risks present.
C. Integrating smart NIC capabilities on the local host level is made easier through rest APIs.
D. It significantly improves the latency when performing reactive handling of PACKET_IN events.
E. It centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment.
Answer: AE
NEW QUESTION 52
A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.
Project scope and weekly progress should be visualized by the management.
Always consider feedback and make changes accordingly during the project.
Should consider flexibility to change scope at the point of time.
Which project methodology meets the requirements and have the least impact on the outcome?
A. Scrum
B. LEAN
C. Kanban
D. Six-Sigma
Answer: A
Explanation:
https://firebrand.training/uk/blog/scrum-vs-six-sigma-which-one-is-right-for-you
NEW QUESTION 54
Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint
devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?
Answer: B
NEW QUESTION 59
Which tool automates network implementation activities and shortens the implementation lifecycle?
A. LISP
B. Java
C. Conclusion
D. Python
Answer: D
NEW QUESTION 64
You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE
MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)
A. EoMPLS
B. MPLS Layer 3 VPN
C. DMVPN
D. GET VPN
E. KVPLS
Answer: AE
NEW QUESTION 67
An international media provider is an early adopter of Docker and micro services and is using an open-source homegrown container orchestration system. A few
years ago, they migrated from on-premises data centers to the cloud Now they are faced with challenges related to management of the deployed services with
their current homegrown orchestration system.
Which platform is well-suited as a state-aware orchestration system?
A. Puppet
B. Kubemetes
C. Ansible
D. Terraform
Answer: B
NEW QUESTION 70
Which two data plane hardening techniques are true? (Choose two)
A. warning banners
B. redundant AAA servers
C. Control Plane Policing
D. SNMPv3
E. infrastructure ACLs
F. disable unused services
G. routing protocol authentication
Answer: EF
NEW QUESTION 74
Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data
protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two
considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)
A. Target RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites.
B. VSANs must be routed between sites to isolate fault domains and increase overall availability.
C. Synchronous data replication must be used to meet the business requirements
D. Asynchronous data replication should be used in this scenario to avoid performance impact in the primary site.
E. VSANs must be extended from the primary to the secondary site to improve performance and availability.
Answer: CD
Explanation:
synchronous data replication must be used to meet the business requirements, is incorrect. As described above, asynchronous replication would be a better
choice in this scenario due to the distance between the data center sites and the target RPO/RTO requirements.
asynchronous data replication should be used in this scenario to avoid performance impact in the primary site, is correct. Asynchronous replication would allow
Company XYZ to meet the target RPO/RTO requirements while avoiding the performance impact of synchronous replication.
NEW QUESTION 75
Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two)
Answer: CE
NEW QUESTION 76
Refer to the diagram.
Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?
A. Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite
B. Send packets without encapsulation to the anchor controller over the routed network.
C. Encapsulate packets into an EoIP tunnel and send them to the anchor controller.
D. Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.
Answer: C
NEW QUESTION 80
A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving The network engineers are re-
evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN.
Which concept would need to be reviewed to ensure stability in their network?
Answer: A
NEW QUESTION 81
Which two statements explain the operation of BFD asynchronous mode? (Choose two )
A. BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.
B. BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.
C. BFD asynchronous mode with and without echo packets use control packets.
D. BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.
E. BFD asynchronous mode with echo packets uses separate control packets and echo packets.
Answer: CE
NEW QUESTION 85
Which two technologies enable multilayer segmentation? (Choose two.)
A. policy-based routing
B. segment routing
C. data plane markings
D. firewalls
E. filter lists
Answer: AD
NEW QUESTION 90
An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to
virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used
to accommodate this during the migration phase?
Answer: A
NEW QUESTION 93
The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based,
Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve
response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2
Mbps) with a managed CE service provided by the telco.
Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Table Description automatically generated
NEW QUESTION 98
While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )
Answer: AD
A. Implement filtenng to control traffic that is sourced from the infrastructure IP space.
B. Enable and use only secure protocols.
C. Send logs to a centralized logging collection server.
D. Implement EBGP to advertise all owned IP blocks.
E. Use login banners and interface access lists to restrict administrative access to the system
Answer: BE
A. LDAP
B. EAP
C. TACACS+
D. RADIUS
Answer: D
Explanation:
https://www.networkstraining.com/what-is-cisco-ise/
A. Focus on the solution instead of the problem, which helps to reduce downtime duration
B. The location of the data collection
C. What direction the data or flows should be metered
D. Identify traffic types and top talkers over this link
Answer: A
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Graphical user interface Description automatically generated with medium confidence
Answer: B
A. bridging
B. fate sharing
C. redundancy
D. unicast overlay routing
Answer: B
into the network in the near future. Which technology can be used to meet these requirements?
Answer: B
Answer: DE
Answer: AD
A. IGMP filtering
B. IGMPv3 with PIM-SSM
C. multiple multicast domains
D. one multicast group address thorough network regardless of IGMP version
Answer: A
Answer: AD
A. access
B. core
C. collapsed core
D. distribution
Answer: A
Answer: A
What are two key design principles when using a hierarchical core-distribution-access network model? (Choose two )
Answer: AD
A. Increase the hold queue on the physical interface of the hub router.
B. Increase the hold queue on the tunnel interface of the spoke routers
C. Increase the hold queue on the tunnel interface of the hub router
D. Apply QoS for pak_priority class
E. Increase the hold queue on the physical interface of the spoke routers.
Answer: C
A. Ensure that strong cryptography is applied for users who have administrative access through networks
B. Apply strong cryptography and security protocols to safeguard sensitive cardholder data.
C. Apply strong encryption for transmission of cardholder data across public networks.
D. Protect all user systems against malware and frequently update antivirus software
E. Maintain a policy that addresses information security for employees and third parties.
Answer: CE
This network is running OSPF as the routing protocol. The internal networks are being advertised in OSPF London and Rome are using the direct link to reach
each other although the transfer rates are better via Barcelona Which OSPF design change allows OSPF to calculate the proper costs?
Answer: A
Answer: D
A. FlexVPN
B. point-to-point GRE
C. DMVPN
D. LISP
Answer: D
Answer: C
Answer: D
A. It supposes a spanning-tee topology change upon connecting and disconnecting a station on a port
B. It prevents switched traffic from traversing suboptimal paths on the network.
C. It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops.
D. It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST + and MST
Answer: D
Answer: BE
A. MSDP
B. PIM SSM
C. MPLS
D. PIM sparse mode
Answer: A
A. Root guard
B. BPDU guard
C. Loop guard
D. BPDU filtering
Answer: C
Answer: D
Answer: C
Explanation:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/sd-wan/nb-06-cloud-onramp-saas-faq-ct
A. inside global
B. outside global
C. inside local
D. outside local
Answer: C
A. DAI
B. IP Source Guard
C. BEEP
D. CPPr
E. MPP
Answer: AB
Answer: D
Answer: DE
A. Loop Guard
B. PortFast
C. DTF
D. Root Guard
E. BPDU Guard
Answer: BE
A. device resiliency
B. device type
C. network type
D. network resiliency
E. network size
Answer: AD
Answer: BC
A. PortFast
B. UDLD
C. Root guard
D. BPDU guard
Answer: D
Answer: D
A. Path isolation
B. Session isolation
C. Group virtualization
D. Services virtualization
E. Edge isolation
Answer: AD
A. The Reported Distance from a successor is lower than the local Feasible Distance.
B. The Reported Distance from a successor is higher than the local Feasible Distance.
C. The feasibility condition does not need to be met.
D. The Feasible Distance from a successor is lower than the local Reported Distance.
E. A feasible successor must be present.
Answer: AE
Answer: B
A. TE backup tunnel
B. Next-hop (NHop) tunnel
C. FRR Backup tunnel
D. next-next-hop (NNHop) tunnel
Answer: D
Answer: C
Answer: D
Answer: C
Answer: BD
An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain EIGRP routes are getting redistributed into OSPF ,OSPF area
20 has routers with limited memory and CPU resources The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222
routes to How in Which OSPF area type fulfills this design requirement?
Answer: C
Answer: ACD
A. persona-based
B. power-based
C. push-based
D. possession-based
E. pull-based
Answer: CD
A. standardize resiliency
B. minimize operational costs
C. integrate endpoint posture
D. ensure faster obsolescence
E. reduce complexity
Answer: BE
Answer: E
A. Fate sharing
B. CPU resource allocation
C. Congestion control
D. Security
E. Bandwidth allocation
Answer: A
A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design
this solution are true? (Choose two)
Answer: BC
A. inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation
B. ability to expand bandwidth over existing optical Infrastructure
C. inherent topology flexibility with built-in service protection
D. inherent topology flexibility with intelligent chromatic dispersion
E. inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol
Answer: BC
A. Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value.
B. Redistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the ext value and the value is the same in all ASBRs.
C. Enable OSPF load-balancing over unequal cost path.
D. Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external internal values.
Answer: D
Answer: A
B. unified fabric
C. Transparent Interconnection of Lots of Links
D. fabric path
Answer: C
Answer: AC
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/cloudonramp/vedge-20-x/cloud-onramp-boo
Answer: A
Answer: D
Relate Links
https://www.exambible.com/400-007-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/