Certbus > Cisco > CCDE > 400-007 > 400-007 Online Practice Questions and Answers

400-007 Online Practice Questions and Answers

Questions 4

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

A. flow-based analysis to measure bandwidth mix of applications and their flows

B. call management analysis to identify network convergence-related failures

C. call management analysis to identify CAC failures and call quality issues

D. active monitoring via synthetic probes to measure loss, latency, and jitter

E. passive monitoring via synthetic probes to measure loss, latency, and jitter

F. flow-based analysis with PTP time-stamping to measure loss, latency, and jitter

Browse 298 Q&As
Questions 5

Which two statements describe network automation and network orchestration? (Choose two.)

A. Network automation does not provide governance or policy management.

B. Network automation spans multiple network services, vendors, and environments.

C. Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.

D. Provisioning network services is an example of network automation.

E. Network orchestration is used to run single, low-level tasks without human intervention

Browse 298 Q&As
Questions 6

Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?

A. local addresses

B. private addresses

C. link-local addresses

D. unique local addresses

Browse 298 Q&As
Questions 7

A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?

A. All device configurations are in read-only mode until the controller is restored.

B. The control plane is unavailable until the controller is restored.

C. If a device fails, the configuration backup is unavailable

D. Manual changes are only possible until the controller is restored

Browse 298 Q&As
Questions 8

A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?

A. data center perimeter firewalling

B. VACLs on data center switches

C. transparent firewalling

D. routed firewalls

Browse 298 Q&As
Questions 9

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)

A. It significantly improves the latency when performing reactive handling of PACKET_IN events

B. Integrating smart NIC capabilities on the local host level is made easier through rest APIs

C. A centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment

D. It is highly-available by design with no single-point-of-failure risks present

E. Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing

Browse 298 Q&As
Questions 10

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

A. device resiliency

B. device type

C. network type

D. network resiliency

E. network size

Browse 298 Q&As
Questions 11

Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops.

What do you answer?

A. VXLAN offers native loop avoidance mechanism

B. Storm Control should be enabled on all ports

C. VPC+ could prevent L2 loop on access ports

D. BPDU Guard should be enabled on all VTEP access ports

Browse 298 Q&As
Questions 12

An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?

A. EoMPLS-based VPLS can carry multicast traffic in a scalable manner

B. Use a mesh of GRE tunnels to carry the streams between sites

C. Enable snooping mechanisms on the provider PE routers.

D. Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites

Browse 298 Q&As
Questions 13

Router R1 is a BGP speaker with one peering neighbor over link "A". When the R1 link/interface "A" fails, routing announcements are terminated, which results in the tearing down of the state for all BGP routes at each end of the link. What is this a good example of?

A. fault isolation

B. resiliency

C. redundancy

D. fate sharing

Browse 298 Q&As
Questions 14

While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )

A. when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)

B. on distribution layer switches

C. when hello timers are changed to more aggressive values

D. on access layer switches

E. on the core switches

Browse 298 Q&As
Questions 15

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A. redundant AAA servers

B. Control Plane Policing

C. warning banners

D. to enable unused .services

E. SNMPv3

F. routing protocol authentication

Browse 298 Q&As
Questions 16

SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?

A. need for intelligent traffic monitoring

B. exponential growth of resource-intensive application

C. complex and distributed management flow

D. higher operating expense and capital expenditure

Browse 298 Q&As
Questions 17

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?

A. routed firewall

B. VLAN ACLs on the switch

C. transparent firewall

D. zone-based firewall on the Layer 3 device

Browse 298 Q&As
Questions 18

Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?

A. It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger.

B. It protects the network Infrastructure against spoofed DDoS attacks.

C. It Classifies bogon traffic and remarks it with DSCP bulk.

D. It filters RFC 1918 IP addresses.

Browse 298 Q&As
Exam Code: 400-007
Exam Name: Cisco Certified Design Expert (CCDE Written)
Last Update: Apr 28, 2024
Questions: 298 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99