Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium Cisco 400-007 Dumps Questions Answers

Page: 1 / 29
Total 381 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 1

Refer to the exhibit.

A new high availability DB sever cluster is installed in the network.

These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.

Which solution supports these requirements?

Options:

A.

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.

Add secondary links to REP segments 1 and 2

C.

Add two new links between SW1 and SW2 configured as REP segment 3

D.

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Buy Now
Question 2

Which optimal use of interface dampening on a fast convergence network design is true?

Options:

A.

When occasional flaps of long duration occur

B.

when numerous adjacent flaps of very short duration occur

C.

when the router hardware it slower than the carrier delay down detection

D.

when the switch hardware is faster than the debounce timer down detection

Question 3

In a redundant hub and spoke "wheel" design, all spokes are connected to the hub, and spokes are connected to other spokes as well. During failure on one spoke link, the traffic from that site can be sent to a neighboring site for it to be forwarded to the hub site. But during peak hours, a link is overloaded and traffic is re-routed to a neighbor, which subsequently becomes overloaded. This overload results in network traffic oscillation as the load varies at each spoke site. This design provides more redundancy but not more resiliency because the routing protocol must process many alternate paths to determine the lowest cost path. Which two design

changes help to improve resilience in this case? (Choose two.)

Options:

A.

Increase the number of redundant paths considered during the routing convergence calculation.

B.

Eliminate links between every spoke.

C.

Increase routing protocol convergence timers.

D.

Increase unequal-cost parallel paths.

E.

Use two links to each remote site instead of one.

Question 4

Hybrid cloud computing allows organizations to like advantage of public and private cloud models Which best practice should organizations follow to ensure data security in the private cloud?

Options:

A.

Use standard protocols for data transmission over the network.

B.

Encrypt data when it is at rest and in motion

C.

Communicate all data security risks to customers and end users.

D.

Use standard network protocols for data communication between unsecured network connections.

Question 5

QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3. A high availability application is synchronizing data between host A and host B. To increase chance of delivery the same data is sent twice from host A on two different NICs toward the two NICs on host B.

Which solution must be deployed in the network to ensure that any failure in the network does not trigger data loss on host B?

Options:

A.

EIGRP with feasible successors

B.

BFD

C.

IP Fast Reroute

D.

Static routes

Question 6

The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner However the company network does not support BFD Which other feature can be used to fulfill the design requirement?

Options:

A.

STP

B.

fast hello

C.

LFA

D.

DPD

Question 7

Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network?

(Choose two)

Options:

A.

BFD

B.

Ti-LFA

C.

minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Question 8

Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure Which technique can be Implemented In the design to detect such a failure in a subsecond?

Options:

A.

STP

B.

fate sharing

C.

OSPF LFA

D.

BFD

E.

flex links

Question 9

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

Options:

A.

redundant AAA servers

B.

Control Plane Policing

C.

warning banners

D.

to enable unused .services

E.

SNMPv3

F.

routing protocol authentication

Question 10

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Options:

Question 11

The line between security and compliance is easily blurred and is, to a large extent, a moving target Drag and drop each of the requirements on the left to the appropriate section on the right

Options:

Question 12

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?

Options:

A.

fault management

B.

performance management

C.

security management

D.

accounting management

Question 13

Which option is a fate-sharing characteristic in regards to network design?

Options:

A.

A failure of a single element causes the entire service to fail

B.

It protects the network against failures in the distribution layer

C.

It acts as a stateful forwarding device

D.

It provides data sequencing and acknowledgment mechanisms

Question 14

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location The networks are joined to enable host migration at Layer 2 What is the final migration step after hosts have physically migrated to have traffic flowing through the new network without changing any host configuration?

Options:

A.

Shut down legacy Layer 3 SVIs. clear ARP caches on all hosts being migrated and then configure the legacy VRRP address onto new VXLAN core switches

B.

Increase VRRP priorities on new infrastructure over legacy VRRP values, then shut down legacy SVIs

C.

Shut down legacy infrastructure to allow VXLAN gateways to become active

D.

Shut down legacy Layer 3 SVIs and activate new preconfigured Layer 3 SVIs on VXLAN

Question 15

You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

Options:

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Question 16

Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:

• hardware sizing and power consumption

• Layer 2 and layer 3 services parameters

• configuration of all control plane protocols

Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?

Options:

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Question 17

Refer to the exhibit A customer network design team is planning a migration from a legacy TDM-based L2VPN to an MPLS-based L3VPN Migration is planned in a phased approach:

•OSPF backbone Link between HUB A and HUB B sites to be migrated to eBGP

•Spoke A2 and Spoke B1 will be migrated to the L3VPN

Which solution design can be considered to avoid routing loops during backbone link migration?

Options:

A.

Enable route-filtering on OSPF backbone routers for spoke traffic

B.

Advertise low AD value for transit traffic on hub sites.

C.

OSPF backbone area advertises summarized routes to hub.

D.

Redistribute EIGRP 200 and 300 with low cost into BGP

Question 18

Which two statements describe the hierarchical LAN design model? (Choose two)

Options:

A.

It is a well-understood architecture that provides scalability

B.

It is the best design for modern data centers

C.

It is the most optimal design but is highly complex

D.

It provides a simplified design

E.

Changes, upgrades, and new services can be introduced in a controlled and stagged manner

Question 19

The administrator of a small branch office wants to implement the Layer 2 network without running STP The office has some redundant paths Which mechanism can the administrator use to allow redundancy without creating Layer 2 loops?

Options:

A.

Use double-sided VPC on both switches

B.

Use two port channels as Flex links

C.

Use fabric path with ECMP

D.

Use 802.3ad link bundling.

Question 20

A business customer deploys workloads in the public cloud. Now the customer network faces governance issues with the flow of IT traffic and must ensure the security of data and intellectual property. Which action helps to identify the issue for further resolution?

Options:

A.

Set up a secure tunnel from customer routers to ensure that traffic is protected as it travels to the cloud service providers.

B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud service providers

C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic sent to cloud service providers

D.

Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud.

Question 21

What is the most important operational driver when building a resilient and secure modular network design?

Options:

A.

Reduce the frequency of failures requiring human intervention

B.

Minimize app downtime

C.

Increase time spent on developing new features

D.

Dependencies on hardware or software that is difficult to scale

Question 22

What are two descriptions of network optimization? (Choose two.)

Options:

A.

maintain high availability

B.

proactive network management

C.

network redesign

D.

network health maintenance

E.

identify network requirements

Question 23

A network architect in an enterprise is designing a network policy for certain database applications. The goal of the policy is to allow these applications to access the internet directly, whereas other user and network applications that communicate with systems or users outside their own network must be routed through the data center. The focus is on achieving higher availability and a better user experience for the database applications, but switching between different network paths based on performance characteristics must be supported.

Which solution meets these requirements?

Options:

A.

MPLS L3VPN with QoS

B.

Cloud onRamp for laaS

C.

Cloud onRamp for SaaS

D.

MPLS direct connect

Question 24

Company XYZ wants to redesign the Layer 2 part of their network and wants to use all available uplinks for increased performance. They also want to have end host reachability supporting conversational learning. However, due to design constraints, they cannot implement port-channel on the uplinks. Which other technique can be used to make sure the uplinks are in active/active state?

Options:

A.

TRILL

B.

LISP

C.

MSTP

D.

switch stack

Question 25

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

Options:

A.

Limit the query domain by use of distribute lists.

B.

Build neighbor adjacencies in a triangulated fashion.

C.

Build neighbor adjacencies in squared fashion.

D.

Limit the query domain by use of summarization.

E.

Limit the query domain by use of default routes.

Question 26

Refer to the exhibit.

Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)

Options:

A.

BPDU guard on access ports

B.

BPDU guard on the aggregation switch downlinks toward access switches

C.

root guard on the aggregation switch downlinks toward access switches

D.

root guard on access ports

E.

edge port on access ports

F.

access switch pairs explicitly determined to be root and backup root bridges

Question 27

Which two points must network designers consider when designing a new network design or when evaluating an existing network design to help them understand the high-level design direction with regards to the security aspects? (Choose two)

Options:

A.

Consider Business objectives and goals

B.

Consider organization’s security policy standards

C.

Consider for only multi-site networks

D.

Consider for only new network technologies and components

Question 28

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two )

Options:

A.

will only work with single-tier headend architecture

B.

hub sites must connect to both DMVPN clouds

C.

recommended for high availability

D.

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.

requires all sites to have dual Internet connections

Question 29

Which layer of the SDN architecture orchestrates how the applications are given the resources available in the network?

Options:

A.

orchestration layer

B.

southbound API

C.

northbound API

D.

control layer

Question 30

A large enterprise cloud design team is evaluating different cloud consumption models. What is an example of typical PaaS limitations or concerns that should be considered during service design?

Options:

A.

vendor lock-in

B.

runtime issues

C.

lack of control

D.

multi-tenant security

Question 31

A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets shold the IPS forward for BFD to work under all circumstances?

Options:

A.

Fragmented packet with the do-not-fragment bit set

B.

IP packets with broadcast IP source addresses

C.

IP packets with the multicast IP source address

D.

IP packet with the multicast IP destination address

E.

IP packets with identical source and destination IP addresses

F.

IP packets with the destination IP address 0.0.0.0.

Question 32

A software-defined networking (SDN) controller teams network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers Each policy is represented as a RIB entry in the control plane of the router Which SDN model has been implemented?

Options:

A.

SDN centralized

B.

SDN traffic engineering

C.

SD-WAN

D.

SDN hybrid

Question 33

What are two key design principles when using a hierarchical core-distribution-access network model? (Choose two )

Options:

A.

A hierarchical network design model aids fault isolation

B.

The core layer is designed first, followed by the distribution layer and then the access layer

C.

The core layer provides server access in a small campus.

D.

A hierarchical network design facilitates changes

E.

The core layer controls access to resources for security

Question 34

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Options:

Question 35

A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs Which consideration supports the new business requirement?

Options:

A.

VDI servers should be contained centrally within a DMZ

B.

The thin client traffic should be placed in a WAN QoS priority queue

C.

VDI servers should be contained within dedicated VLANs in each branch location

D.

The WAN should offer low latency and be resized

Question 36

What are two advantages of controller-based networks versus traditional networks? (Choose two.)

Options:

A.

the ability to have forwarding tables at each device

B.

more flexible configuration per device

C.

more consistent device configuration

D.

programmatic APIs that are available per device

E.

the ability to configure the features for the network rather than per device

Question 37

What is the most important operational driver in building a resilient and secure modular network design?

Options:

A.

Dependencies on hardware or software that is difficult to scale

B.

Minimize app downtime

C.

Reduce the frequency of failures requiring human intervention

D.

Increase time spent on developing new features

Question 38

As part of a new network design documentation, you are required to explain the reason for choosing cisco FabricPath for Layer 2 loop avoidance.

Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network?

(Choose two)

Options:

A.

MAC tunneling

B.

IS-IS multipath

C.

RPF check

D.

TTL header

Question 39

Which two statements describe network automation and network orchestration? (Choose two.)

Options:

A.

Network automation does not provide governance or policy management.

B.

Network automation spans multiple network services, vendors, and environments.

C.

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.

D.

Provisioning network services is an example of network automation.

E.

Network orchestration is used to run single, low-level tasks without human intervention

Question 40

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)

Options:

A.

service provider agreement to support tuned timers

B.

manual updates to the peer groups

C.

service provider scheduling of changes to the PE

D.

number of routes on the CE router

E.

number of VRFs on the PE router

Question 41

Which two benefits can software defined networks provide to businesses? (Choose two.)

Options:

A.

provides additional redundancy

B.

decentralized management

C.

reduced latency

D.

enables innovation

E.

reduction of OpEx/CapEx

F.

meets high traffic demands

Question 42

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

Options:

A.

too many overlapping controls

B.

too many disparate solutions and technology silos

C.

an overabundance of manual processes

D.

a network security skills shortage

Question 43

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Options:

Question 44

Network changes because of mergers, acquisitions, and divestment can be very disruptive to the network if not carried out carefully. When an organization sells parts of its business, it must detach the affected parts of the network from the rest of the network. Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?

Options:

A.

redundant design

B.

modular design

C.

less complex design

D.

routed access design

Question 45

Refer to the exhibit.

ACME Mining has four data centers in Santiago. Cape Town. Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN They want to deploy a new mission-critical application with these

requirements:

    cluster heartbeat 2 Mb/s continuous (250 KB/s)

    cluster heartbeat one-way maximum latency 100 ms

These are the current ping tests results between the four data centers:

Which hosting data center pair can host the new application?

Options:

A.

Mumbai and Beijing

B.

Santiago and Cape Town

C.

Santiago and Mumbai

D.

Cape Town and Mumbai

E.

Cape Town and Beijing

F.

Santiago and Beijing

Question 46

According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?

Options:

A.

requirement for data-in-motion encryption and 2FA authentication

B.

requirement for data-at-rest encryption foe user identification within the VPN termination hardware

C.

categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs

D.

ensuring that authorized users have high-availability system access from defined zones to defined systems or zones

Question 47

Network designers often segment networks by creating modules for various reasons Sometimes however a network can be unintentionally segmented For instance, if the only way to connect a remote site to a headquarters or regional site is to connect them both to the public Internet the corporate network is now unintentionally segmented Which of the following option can be used to desegment the network in this situation?

Options:

A.

Build virtual networks that pass over the network

B.

Mark traffic for special handling through quality of service

C.

Configure little to no control data plane policy

D.

Block specific sources from reaching specific destinations

Question 48

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used

Options:

Question 49

A network attacker exploits application flaws to compromise critical systems in the organization with these objectives:

• Obtain sensitive data and export the data out of the network.

• Compromise developer and administrator credentials to potentially

What is the next step after application discovery is completed in Zero Trust networkings

Options:

A.

Establish visibility and behavior modeling

B.

Enforce policies and microsegmentation.

C.

Assess real-time security health.

D.

Ensure trustworthiness of systems.

Question 50

Creating a network that functions as a strategic part of the business rather than simply being a cost center, starts with a good understanding of business requirements and processes What specific type of knowledge helps to create high-level LAN WAN. and data center designs that support and enable the business?

Options:

A.

risk assessment

B.

monitoring and management of data

C.

understanding of data flows

D.

recovery time of the system s functionality

Question 51

What are two examples of business goals to be considered when a network design is built? (Choose two.)

Options:

A.

standardize resiliency

B.

minimize operational costs

C.

integrate endpoint posture

D.

ensure faster obsolescence

E.

reduce complexity

Question 52

IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?\

Options:

A.

performance monitoring

B.

security

C.

observation of critical links

D.

capacity planning

Question 53

Which best practice ensures data security in the private cloud?

Options:

A.

Use IPsec for communication between unsecured network connection

B.

Encrypt data at rest and in transition.

C.

Use the same vendor for consistent encryption.

D.

Anonymize data ownership to comply with privacy rules.

Question 54

Which relationship between IBGP and the underlying physical topology is true?

Options:

A.

iBGP full mesh requirement does not dictate any specific network topology.

B.

iBGP can worn only on a ring network topology with a link-state protocol like OSPF or IS-IS

C.

iBGP full mesh requires an underlying fully meshed network topology.

D.

iBGP does not work on a ring network topology even with an underlying IGP.

Question 55

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?

Options:

A.

SNMPv3

B.

Syslog

C.

Syslog TLS

D.

SNMPv2

E.

SSH

Question 56

A large enterprise customer is planning a new WAN connection to its headquarters. The current architecture is

dual homed with static routing, but users complain when a specific link fails. Failure of the other link does not

affect any services or applications. The new WAN connection must provide the headquarters with a resilient

network design and increase the return on investment.

Which solution should be recommended to the customer?

Options:

A.

Implement granular quality of service on the links.

B.

Procure additional bandwidth.

C.

Use dynamic routing toward the WAN.

D.

Add an additional link to the WAN.

Question 57

Refer to the exhibit.

The WAN network of the General Bank of Greece has experienced several outages It takes too long to activate a new branch site The networking department of the bank plans to upgrade the legacy end-of-life WAN network with a new flexible manageable, and scalable in-house solution The number of branches will increase exponentially in the next fiscal year The CTO states that the bank’s mam goal is OPEX reduction The network engineering team prepares a table to evaluate the available options Which WAN technology can be used for the solution?

Options:

A.

DMVPN over L3VPN

B.

Managed SD-WAN

C.

SD-WAN over L3VPN

D.

SD-WAN over L2VPN

Question 58

A network hacker is trying to interrupt the transport packet on IPSEC. A packet with duplicate sequence numbers is introduced. The customer sends high-priority traffic during this window. Which design parameter should be considered to mitigate this issue?

Options:

A.

Classify and Mark duplicate sequence packets.

B.

Apply anti-replay window 4096.

C.

Restrict keywork in IPSEC Tunnel.

D.

Increase QoS shape policy.

Question 59

Which BGP feature provides fast convergence?

Options:

A.

BGP PIC |

B.

BGP-EVPN

C.

BGP FlowSpec

D.

BGP-LS

Question 60

Company XYZ, a global content provider, owns data centers on different continents Their data center design involves a standard three-layer design with a Layer 3-only core VRRP is used as the FHRP They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe in the absence of other business or technical constraints which termination point is optimal for the Layer 2 interconnection?

Options:

A.

at the core layer, to offer the possibility to isolate STP domains

B.

at the access layer because the STP root bridge does not need to align with the VRRP active node

C.

at the core layer because all external connections must terminate there for security reasons

D.

at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

Question 61

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Sen/ice (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?

Options:

A.

tail drop

B.

traffic shaping

C.

WRED

D.

traffic policing

Question 62

Drag and drop the design use cases from the left onto the correct uRPF techniques used to prevent spoofing attacks Not all options are used.

Options:

Question 63

Cost is often one of the motivators for a business to migrate from a traditional network to a software- defined network. Which design decision is directly influenced by CAPEX drivers?

Options:

A.

scalability

B.

stability

C.

complexity

D.

manageability

Question 64

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services If one ISP suffers loss or latency?

Options:

A.

Cloud onRamp gateway site

B.

Cloud onRamp SWG

C.

Cloud onRamp

D.

Cloud onRamp SaaS

Question 65

What is a description of a control plane action?

Options:

A.

de-encapsulating and re-encapsulating a packet in a data-link frame

B.

matching the destination MAC address of an Ethernet frame to the MAC address table

C.

matching the destination IP address of an IP packet to the IP routing table

D.

hosts locating routers that reside on attached links using the IPv6 Neighbor Discover Protocol

Question 66

Which two foundational aspects of loT are still evolving and being worked on by the industry at large? (Choose two)

Options:

A.

WiFi protocols

B.

Regulatory domains

C.

Low energy Bluetooth sensors

D.

loT consortia

E.

Standards

Question 67

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

Options:

A.

reduction in time to detect and respond to threats

B.

integration with an incident response plan

C.

adoption and improvement of threat-detection response

D.

asset identification and grouping decisions

Question 68

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

Options:

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Question 69

Which three characteristics of the Single Tier and the Dual Tier Headend Architectures for DMVPN designs are true? (Choose three.)

Options:

A.

A Dual Tier Headend Architecture is required when using dual cloud topologies with spoke-to-spoke connectivity

B.

In a Single Tier Headend Architecture there is a single headend router per DMVPN cloud topology

C.

A Single Tier Headend Architecture is required when using dual cloud topologies with spoke-to-spoke connectivity

D.

In a Dual Tier Headend Architecture, there are two different headend routers per DMVPN cloud for high availability purposes

E.

In a Single Tier Headend Architecture, the GRE tunnel endpoint and encryption endpoint functionalities are on the same router

F.

In a Dual Tier Headend Architecture, the GRE tunnel endpoint and encryption endpoint functionalities are on different routers

Question 70

An enterprise service provider is designing the network for a customer who runs a video application in both a centralized and distributed fashion The team has looked at the following parameters

•The available bandwidth for branches and the associated cost

•Video resource cost

•Usage patterns at hub-and-spoke sites.

•Call agent bridge selection algorithm

Which key piece of information is missing and needs to be taken into consideration in order to determine the correct resource allocation model?

Options:

A.

video traffic jitter and delay

B.

type of video resources

C.

transport protocol and traffic engineering

D.

network management and monitoring

Question 71

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Options:

A.

Use two phantom RP addresses

B.

Manipulate the administration distance of the unicast routes to the two RPs

C.

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.

Advertise the two RP addresses in the routing protocol

E.

Use anycast RP based on MSDP peering between the two RPs

F.

Control routing to the two RPs through a longest match prefix

Question 72

Which component of the SDN architecture automatically ensures that application traffic is routed according to policies established by network administrators?

Options:

A.

packet forwarding engine

B.

northbound API

C.

southbound API

D.

SDN controller

Question 73

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

Options:

A.

access

B.

core

C.

collapsed core

D.

distribution

Question 74

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password that they are already using to access existing applications . A user may not always use the same device to access the VPN. Which two options combined meet the requirements? (Choose two)

Options:

A.

Use local usernames and passwords on the VPN device

B.

Deploy a central authentication directory that users can be authenticated and authorized against

C.

Deploy certificates that are unique to each user

D.

Deploy an IPsec VPN solution

E.

Deploy certificates that are unique to each device

F.

Deploy a SSL VPN solution

Question 75

During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward

• Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years

• Network bandwidth capacity requirements are dynamic and are expected to change over the next year

• If new technologies are to be introduced, operational expenses must be kept at a minimum. Which cloud strategy meets these requirements?

Options:

A.

private

B.

hybrid

C.

public

D.

multicloud

Question 76

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

Options:

A.

Enforce risk-based and adaptive access policies.

B.

Assess real-time security health of devices.

C.

Apply a context-based network access control policy for users.

D.

Ensure trustworthiness of devices.

Question 77

Which statement about hot-potato routing architecture design is true?

Options:

A.

Hot-potato routing is the preferred architecture when connecting to content providers

B.

Hop-potato keeps traffic under the control of the network administrator for longer

C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric

D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks

Question 78

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Options:

Question 79

A BGP route reflector in the network is taking longer than expected to coverage during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?

Options:

A.

Increase the size of the hold queue.

B.

Increase the size of the large buffers.

C.

Decrease the size of the small buffers.

D.

Increase the keepalive timers for each BGP neighbor.

Question 80

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

Options:

A.

PIM dense mode with RP located at the hub

B.

PIM sparse mode with RP located at each remote site

C.

PIM sparse mode with RP located at the hub

D.

PIM dense mode with RP located at each remote site

Question 81

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?

Options:

A.

working design over comprehensive documentation

B.

contract negotiation over customer collaboration

C.

following a plan over responding to change

D.

processes and tools over individuals and interactions over time

Question 82

It is often seen that companies pick a cloud vendor solely based on technical preferences without putting enough weight on the business strategies that are driving the cloud initiatives Which strategic requirement may come into play where it is more likely that the decision makers will look to leverage laaS over SaaS or PaaS?

Options:

A.

selling products and services globally 24/7

B.

integration with partner or vendor supply chains

C.

control over the underlying infrastructure

D.

speed-to-market is more important for an initiative

Question 83

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

Options:

A.

Local to global NAT translation is done after routing

B.

Global to local NAT translation is done before routing.

C.

Local to global NAT translation is done before policy-based routing

D.

Global to local NAT translation is done after policy-based routing.

Question 84

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

Options:

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.

B.

Control plane policers are really needed only on externally facing devices.

C.

Control plane policers can cause the network management systems to create false alarms.

D.

Control plane policers must be processed before a forwarding decision is made.

E.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.

Question 85

Which two statements about MLD snooping are true? (Choose two)

Options:

A.

When MLD snooping is enabled, QoS is automatically enabled.

B.

A VLAN can support multiple active MLD snooping queries, as long as each one is associated to a different

multicast group.

C.

AN MLD snooping querier election occurs when any MLD snooping querier goes down or if there is an IP

address change on the active querier.

D.

When multiple MLD snooping queriers are enabled in a VLAN, the querier with the lowest IP address in the

VLAN is elected as the active MLD snooping querier.

Question 86

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization Which IETF standard technology can provide this requirement?

Options:

A.

data center bridging

B.

unified fabric

C.

Transparent Interconnection of Lots of Links

D.

fabric path

Question 87

An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?

Options:

A.

class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

class-based traffic shaping

Question 88

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The mam requirements are ZTP support, end-to-end encryption application awareness and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

Options:

A.

SD-branch

B.

DMVPN with PfR

C.

managed SD-WAN

D.

SD-WAN

Question 89

Which two technologies enable multilayer segmentation? (Choose two.)

Options:

A.

policy-based routing

B.

segment routing

C.

data plane markings

D.

firewalls

E.

filter lists

Question 90

As a service provider is implementing Strong Access Control Measures, which two of the following PCI Data Security Standard requirements must be met’ (Choose two.)

Options:

A.

Assign a unique ID each person with computer access

B.

Restrict access to cardholder data to on a need-to-know basis

C.

Encrypt transmission of cardholder data across open or public networks

D.

Each location must require validating PCI compliance if business has multiple locations

E.

Protect stored cardholder data

Question 91

What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core layers?

Options:

A.

low bandwidth

B.

security

C.

scalability

D.

high latency

Question 92

You are designing a network running both IPv4 and IPv6 to deploy QoS Which consideration is correct about the QoS for IPv4 and IPv6?

Options:

A.

IPv4 and IPv6 traffic types can use use queuing mechanisms such as LLQ, PQ and CQ.

B.

IPv6 packet classification is only available with process switching, whereas IPv4 packet classification is available with both process switching and CEF.

C.

IPv6 and IB/4 traffic types can use a single QoS policy to match both protocols

D.

Different congestion management mechanisms need to be used for IPv4 and IPv6 traffic types

Question 93

In the wake of a security compromise incident where the internal networks were breached by an outside attacker at the perimeter of the infrastructure, an enterprise is now evaluating potential measures that can help protect against the same type of incident in the future. What are two design options that can be employed? (Choose two)

Options:

A.

microzoning

B.

segmentation

C.

domain fencing

D.

virtualization

E.

microperimeters

Question 94

An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?

Options:

A.

posture assessment with remediation VLAN

B.

quarantine SGTs

C.

dACLs with SGTs

D.

quarantine VLAN

Question 95

The cloud like the Internet is a massive network of independent resources that are designed to be fault tolerant Software components that run in the cloud have no dependencies on the underlying infrastructure which may fail at any time Which two constraints of REST are important when building cloud-based solutions'? (Choose two )

Options:

A.

separation of resources from representation

B.

migration of resources by representations

C.

distribution of resources through platforms

D.

hyper-scale as the engine of application state

E.

self-descriptive messages

Question 96

Which two pain points are the most common for container technology adoption? (Choose two)

Options:

A.

Performance

B.

Security

C.

Cost

D.

Container deployment

E.

Skilled staff

F.

Compliance

Question 97

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?

Options:

A.

PVRSTP

B.

MST

C.

STP

D.

PVSTP+

Question 98

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI data. Which type of security safeguard should be implemented to resolve this issue?

Options:

A.

technical and physical access control

B.

administrative security management processes

C.

physical device and media control

D.

technical integrity and transmission security

Question 99

An existing wireless network was designed to support data traffic only. You must now install context Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)

Options:

A.

Add access points along the perimeter of the coverage area.

B.

Increase the access point density to create an average inter-access point distance of less than 40 feet or 12.2 meters

C.

Use directional antennas to provide more cell overlapping

D.

Install additional access points in monitor mode where the co-channel interference would otherwise be affected

E.

Fine tune the radio configuration of the access point to have a higher average transmission power to achieve better coverage

Question 100

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

Options:

A.

system-oriented architecture

B.

OSASE architecture

C.

platform-oriented architecture

D.

SASE architecture

Question 101

Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements:

    Only the loopback address of each of the enterprise CE X and Y routers must be advertised to the interconnecting service provider cloud network.

    The transport layer must carry the VPNv4 label and VPN payload over the MP-BGP control plane.

    The transport layer must not be under service provider control.

Which enterprise WAN transport virtualization technique meets the requirements?

Options:

A.

EIGRP Over the Top

B.

MPLS over BGP over multipoint GRE

C.

DMVPN per VRF

D.

point-to-point GRE per VRF

Question 102

Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?

Options:

A.

OSPF fast hellos

B.

BFD echo

C.

Change the protocol to BGP

D.

Change the OSPF hello and dead intervals

Question 103

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

Options:

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Question 104

Company XYZ wants design recommendations for Layer 2 redundancy (using Layer 2 technologies) The company wants to prioritize flexibility and scalability elements in the new design Which two technologies help meet these requirements'? (Choose two)

Options:

A.

Avoid stretching VLANs across switches

B.

Use switch clustering at the distnbution layer where possible

C.

Configure DHCP snooping on the switches

D.

Use Unidirectional Link Detection

E.

Use root guard

Question 105

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

Options:

A.

Evaluate bandwidth utilization and connection quality

B.

Enable special requirements such as direct DID lines on pickup

C.

Make recommendations to limit the size of the half-open session table on routers

D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

Question 106

Which two descriptions of CWDM are true? (Choose two)

Options:

A.

typically used over long distances, but requires optical amplification

B.

uses the 850nm band

C.

allows up to 32 optical earners to be multiplexed onto a single fiber

D.

shares the same transmission window as DWDM

E.

Passive CWDM devices require no electrical power

Question 107

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity what must be deployed?

Options:

A.

bridging

B.

service chaining

C.

linking

D.

daisy chaining

E.

switching

Question 108

Refer to the exhibit A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)

Options:

A.

Enable unicast heartbeat messages to be periodically exchanged between MEPs

B.

Enable Connectivity Fault Management on the SP switches

C.

Use upward maintenance endpoints on the SP switches

D.

Forward E-LMI PDUs over VPLS

E.

Forward LLD PDUs over the VPLS

Question 109

A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

Options:

A.

EIGRP

B.

IS-IS

C.

OSPF

D.

BGP

Question 110

The SD-WAN architecture is composed of separate orchestration management, control, and data planes Which activity happens at the orchestration plane?

Options:

A.

automatic onboarding of the SD-WAN routers into the SD-WAN overlay

B.

decision-making process on where traffic flows

C.

packet forwarding

D.

central configuration and monitoring

Question 111

Refer to the diagram.

Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

Options:

A.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

B.

Send packets without encapsulation to the anchor controller over the routed network.

C.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller.

D.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.

Question 112

Which two features control multicast traffic in a VLAN environment? (Choose two)

Options:

A.

IGMP snooping

B.

MLD snooping

C.

RGMP

D.

PIM snooping

E.

pruning

Question 113

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

Options:

A.

first-hop router registration to the RP

B.

multicast client registration to the RP

C.

multicast source registration to the RP

D.

transport of all IPv6 multicast traffic

Question 114

Scrum is a subset of Agile and is a lightweight process framework for Agile development Which role becomes the interface between the business the customers and their product-related needs on one side and the Team on the other?

Options:

A.

Product Owner

B.

Product Manager

C.

Scrum Master

D.

Program Manager

Page: 1 / 29
Total 381 questions