Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Cisco 400-007 Dumps

Page: 1 / 25
Total 329 questions

Cisco Certified Design Expert (CCDE v3.0) Questions and Answers

Question 1

Refer to the exhibit.

Which impact of using three or more ABRs between the backbone area and area 1 is true?

Options:

A.

In a large-scale network LSA replication by all ABRs can cause serious scalability issues

B.

Multiple ABRs reduce the CPU processing on each A6R due to splitting prefix advertisement

C.

In a large-scale network multiple ABRs can create microloops.

D.

Prefixes from the non-backbone area are advertised by one ABR to the backbone

Question 2

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

Options:

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.

B.

Control plane policers are really needed only on externally facing devices.

C.

Control plane policers can cause the network management systems to create false alarms.

D.

Control plane policers must be processed before a forwarding decision is made.

E.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.

Question 3

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

Options:

A.

Control Plane Protection using queue thresholding on the transit subinterface

B.

Control Plane Protection using port filtering on the transit subinterface

C.

Control Plane Protection using port filtering on the main interface

D.

Control Plane Protection using queue thresholding on the host subinterface

E.

Control Plane Protection using port filtering on the host subinterface

Question 4

Which mechanism provides Layer 2 fault isolation between data centers?

Options:

A.

fabric path

B.

OTV

C.

advanced VPLS

D.

LISP

E.

TRILL

Question 5

How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?

Options:

A.

5

B.

6

C.

7

D.

10

E.

20

Question 6

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network Which network threat is SNMPv3 effective against?

Options:

A.

man-in-the-middle attack

B.

masquerade threats

C.

DDoS attack

D.

brute force dictionary attack

Question 7

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two )

Options:

A.

will only work with single-tier headend architecture

B.

hub sites must connect to both DMVPN clouds

C.

recommended for high availability

D.

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.

requires all sites to have dual Internet connections

Question 8

Refer to the exhibit.

Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?

Options:

A.

The LA administrator should use route aggregation to summarize the 10 1 4.0/24, 10 1 5 0/24, 10.1.6.0/24, and 10 1 7 0/24 networks toward Chicago

B.

The LA administrator should use route dampening for the 10.1.5 0/24 network so that it does not get propagated when it flaps up and down.

C.

The LA administrator should use route filtering to block the 10.1.5.0/24 network from getting propagated toward Chicago and New York.

D.

The Chicago administrator should use route filtering to block the 10.1.5.0/24 network from coming in from the LA router.

Question 9

An enterprise campus is adopting a network virtualization design solution with these requirements

  • It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs
  • It must maintain end-to-end logical path transport separation across the network
  • resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

Options:

A.

Path isolation

B.

Session isolation

C.

Group virtualization

D.

Services virtualization

E.

Edge isolation

Question 10

Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)

Options:

A.

Check for high roaming delay.

B.

Check for uniform radio coverage across the floors.

C.

Check for high channel utilization.

D.

Check for latency over wireless.

E.

Identify frequent TX power changes.

Question 11

Company XYZ, a global content provider, owns data centers on different continents Their data center design involves a standard three-layer design with a Layer 3-only core VRRP is used as the FHRP They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe in the absence of other business or technical constraints which termination point is optimal for the Layer 2 interconnection?

Options:

A.

at the core layer, to offer the possibility to isolate STP domains

B.

at the access layer because the STP root bridge does not need to align with the VRRP active node

C.

at the core layer because all external connections must terminate there for security reasons

D.

at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

Question 12

Refer to the exhibit.

An engineer is designing the network for a multihomed customer running in AS 111 does not have any other Ass connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?

Options:

A.

Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.

B.

Use the local preference attribute to configure your AS as a non-transit'' AS.

C.

include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.

D.

Include a prefix list to only receive routes from neighboring ASs.

Question 13

Refer to the exhibit.

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

Options:

A.

address family translation

B.

dual stack

C.

host-to-host tunneling

D.

6rd tunneling

Question 14

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

Options:

A.

geographically dispersed data centers with asynchronous replication

B.

a single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

geographically dispersed data centers with synchronous replication

D.

a single data center with duplicated infrastructure and dual PSUs

Question 15

Which two statements describe the hierarchical LAN design model? (Choose two)

Options:

A.

It is a well-understood architecture that provides scalability

B.

It is the best design for modern data centers

C.

It is the most optimal design but is highly complex

D.

It provides a simplified design

E.

Changes, upgrades, and new services can be introduced in a controlled and stagged manner

Question 16

The SD-WAN architecture is composed of separate orchestration management, control, and data planes Which activity happens at the orchestration plane?

Options:

A.

automatic onboarding of the SD-WAN routers into the SD-WAN overlay

B.

decision-making process on where traffic flows

C.

packet forwarding

D.

central configuration and monitoring

Question 17

While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )

Options:

A.

when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)

B.

on distribution layer switches

C.

when hello timers are changed to more aggressive values

D.

on access layer switches

E.

on the core switches

Question 18

Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)

Options:

A.

workload

B.

work domain

C.

workplace

D.

workgroup

E.

workspace

Question 19

Which two technologies enable multilayer segmentation? (Choose two.)

Options:

A.

policy-based routing

B.

segment routing

C.

data plane markings

D.

firewalls

E.

filter lists

Question 20

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?

Options:

A.

routed firewall

B.

VLAN ACLs on the switch

C.

transparent firewall

D.

zone-based firewall on the Layer 3 device

Question 21

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?

Options:

A.

MSDP

B.

PIM SSM

C.

MPLS

D.

PIM sparse mode

Question 22

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

Options:

A.

Design in a way that expects outages and attacks on the network and its protected resources

B.

The design approach should consider simple and centralized management aspect

C.

Design in a way that it simplifies and improves ease of deployment

D.

Design automation tools wherever it is appropriate for greater visibility

Question 23

Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:

• hardware sizing and power consumption

• Layer 2 and layer 3 services parameters

• configuration of all control plane protocols

Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?

Options:

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Question 24

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?

Options:

A.

working design over comprehensive documentation

B.

contract negotiation over customer collaboration

C.

following a plan over responding to change

D.

processes and tools over individuals and interactions over time

Question 25

Which two descriptions of CWDM are true? (Choose two)

Options:

A.

typically used over long distances, but requires optical amplification

B.

uses the 850nm band

C.

allows up to 32 optical earners to be multiplexed onto a single fiber

D.

shares the same transmission window as DWDM

E.

Passive CWDM devices require no electrical power

Question 26

Refer to the exhibit.

This network is running legacy STP 802.1 d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

Options:

A.

The transit_delay=5 and dpdu_delay=20 are recommended values, considering helto_timer=2 and specified

B.

Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802. to speed up STP convergence process C. The max_age and forward delay parameters can be adjusted to speed up STP convergence process.

C.

Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

Question 27

When consumers that leverage laaS reach 100% resource capacity, what can be used to redirect the overflow of traffic to the public cloud so there is no disruption to service?

Options:

A.

cloud policing

B.

cloud spill

C.

cloud bursting

D.

cloud shaping

Question 28

Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)

Options:

A.

Increase WAN bandwidth

B.

Increase memory branch switch.

C.

Fragment data packets.

D.

Replace any electrical links with optical links

E.

Prioritize voice packets

Question 29

Which methodology is the leading lifecycle approach to network design and implementation?

Options:

A.

PPDIOO

B.

Waterfall model

C.

Spiral model

D.

V model

Question 30

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?

Options:

A.

Binary indexed explicit routing

B.

Binary intermediate enhanced routing

C.

Bit indexed explicit replication

D.

Bi-directional implicit replication

Question 31

Which management category is not part of FCAPS framework?

Options:

A.

Configuration

B.

Security

C.

Performance

D.

Authentication

E.

Fault-management

Question 32

Which two design option are available to dynamically discover the RP in an IPv6 multicast network? (Choose

two)

Options:

A.

embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Question 33

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

Options:

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Question 34

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

Options:

A.

too many overlapping controls

B.

too many disparate solutions and technology silos

C.

an overabundance of manual processes

D.

a network security skills shortage

Question 35

Which component of the SDN architecture automatically ensures that application traffic is routed according to policies established by network administrators?

Options:

A.

packet forwarding engine

B.

northbound API

C.

southbound API

D.

SDN controller

Question 36

Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?

Options:

A.

Transport Mode in IPsec Phase I

B.

Transport Mode in IPsec Phase II

C.

Tunnel Mode in IPsec Phase II

D.

Tunnel Mode in IPsec Phase I

Question 37

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?

Options:

A.

Focus on the solution instead of the problem, which helps to reduce downtime duration

B.

The location of the data collection

C.

What direction the data or flows should be metered

D.

Identify traffic types and top talkers over this link

Question 38

Company XYZ is designing the network for IPv6 security and they have these design requirements:

  • A switch or router must deny access to traffic from sources with addresses that are correct, but are topologically incorrect
  • Devices must block Neighbor Discovery Protocol resolution for destination addresses that are not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

Options:

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Question 39

Which aspect of BGP-LS makes it scalable in large network when multiarea topology information must be gathered?

Options:

A.

transmit flow control

B.

open-loop flow control

C.

hardware flow control

D.

TCP-based flow control

Question 40

Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)

Options:

A.

The Reported Distance from a successor is lower than the local Feasible Distance.

B.

The Reported Distance from a successor is higher than the local Feasible Distance.

C.

The feasibility condition does not need to be met.

D.

The Feasible Distance from a successor is lower than the local Reported Distance.

E.

A feasible successor must be present.

Question 41

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization Which IETF standard technology can provide this requirement?

Options:

A.

data center bridging

B.

unified fabric

C.

Transparent Interconnection of Lots of Links

D.

fabric path

Question 42

Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network?

(Choose two)

Options:

A.

BFD

B.

Ti-LFA

C.

minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Question 43

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

Options:

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Question 44

Which Interconnectivity method offers the fastest convergence in the event of a unidirectional issue between three Layer 3 switches connected together with routed links in the same rack in a data center?

Options:

A.

Copper Ethernet connectivity with BFD enabled

B.

Copper Ethernet connectivity with UDLD enabled

C.

Fiber Ethernet connectivity with BFD enabled

D.

Fiber Ethernet connectivity with UDLD enabled

Question 45

An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?

Options:

A.

class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

class-based traffic shaping

Question 46

Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?

Options:

A.

LDAP

B.

EAP

C.

TACACS+

D.

RADIUS

Question 47

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

Options:

A.

system-oriented architecture

B.

OSASE architecture

C.

platform-oriented architecture

D.

SASE architecture

Question 48

A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.

  • Project scope and weekly progress should be visualized by the management.

  • Always consider feedback and make changes accordingly during the project.

  • Should consider flexibility to change scope at the point of time.

Which project methodology meets the requirements and have the least impact on the outcome?

Options:

A.

Scrum

B.

LEAN

C.

Kanban

D.

Six-Sigma

Question 49

Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)

Options:

A.

Target RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites.

B.

VSANs must be routed between sites to isolate fault domains and increase overall availability.

C.

Synchronous data replication must be used to meet the business requirements

D.

Asynchronous data replication should be used in this scenario to avoid performance impact in the primary site.

E.

VSANs must be extended from the primary to the secondary site to improve performance and availability.

Question 50

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

Options:

A.

SaaS

B.

PaaS

C.

laaS

D.

hybrid cloud

Question 51

Refer to the exhibit.

Traffic was equally balanced between Layer 3 links on core switches SW1 and SW2 before an introduction of the new video server in the network. This video server uses multicast to send video streams to hosts and now one of the links between core switches is over utilized Which design solution solves this issue?

Options:

A.

Add more links between core switches.

B.

Aggregate links Layer 2 link aggregation.

C.

Apply a more granular load- balancing method on SW1.

D.

Apply a more granular load-balancing method on SW2.

E.

Filter IGMP joins on an over -utilized link.

Question 52

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

Options:

A.

redundant AAA servers

B.

Control Plane Policing

C.

warning banners

D.

to enable unused .services

E.

SNMPv3

F.

routing protocol authentication

Question 53

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

Options:

A.

EIGRP

B.

RPVST+

C.

MST

D.

L2MP

Question 54

What are two examples of business goals to be considered when a network design is built? (Choose two.)

Options:

A.

standardize resiliency

B.

minimize operational costs

C.

integrate endpoint posture

D.

ensure faster obsolescence

E.

reduce complexity

Question 55

Which two features describe controller-based networking solutions compared to traditional networking solutions? (Choose two.)

Options:

A.

inflate licensing costs

B.

reduce network configuration complexity

C.

provide centralization of primary IT functions

D.

allow for fewer network failures

E.

increase network bandwidth usage

Question 56

Refer to the exhibit.

A customer runs OSPF with Area 5 between its aggregation router and an internal router When a network change occurs in the backbone. Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5 You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area How can you accomplish this task*?

Options:

A.

Increase the bandwidth on the connection between Router A and Router B

B.

Implement LSA filtering ontheAB, allowing summary routes and preventing more specific routes into Area 5

C.

Create a virtual link to Area 0 from Router B to the ABR

D.

Turn on LSA throttling on all devices in Area 5

E.

Set Area 5 to stubby at the ABR anyway

Question 57

Which technology supports antispoofing and does not have any impact on encryption performance regardless of packet size?

Options:

A.

MACsec

B.

IP source guard

C.

DHCP snooping with DAI

D.

IPsec

Question 58

Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two )

The group-pacing timer controls the interval that is used for group and individual LSA refreshment

Options:

A.

OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size

B.

OSPF retransmission-pacing timers allow control of interpacket spaang between consecutive link-state update packets in the OSPF retransmission queue.

C.

OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue.

D.

OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue

Question 59

Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?

Options:

A.

Use switch clustering in the access layer.

B.

Use switch clustering in the core/distribution layer.

C.

Use spanning-tree PortFast.

D.

Use BFD.

Question 60

Which two pain points are the most common for container technology adoption? (Choose two)

Options:

A.

Performance

B.

Security

C.

Cost

D.

Container deployment

E.

Skilled staff

F.

Compliance

Question 61

Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

Options:

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Question 62

You are a network designer and you must ensure that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source address?

Options:

A.

ACL based forwarding

B.

unicast RPF loose mode

C.

unicast RPF strict mode

D.

ACL filtering by destination

Question 63

What is a characteristic of a secure cloud architecture model?

Options:

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Question 64

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity what must be deployed?

Options:

A.

bridging

B.

service chaining

C.

linking

D.

daisy chaining

E.

switching

Question 65

What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two.)

Options:

A.

establishing user roles

B.

polymorphism

C.

lack of visibility and tracking

D.

increased attack surface

E.

user credential validation

Question 66

In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?

Options:

A.

Jenkins

B.

Ansible

C.

Perl

D.

Chef

Question 67

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The mam requirements are ZTP support, end-to-end encryption application awareness and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

Options:

A.

SD-branch

B.

DMVPN with PfR

C.

managed SD-WAN

D.

SD-WAN

Question 68

Which two characteristics are associated with 802 1s? (Choose two)

Options:

A.

802.1s supports up to 1024 instances of 802.1

B.

802.1 s is a Cisco enhancement to 802.1w.

C.

802.1s provides for faster convergence over 802 1D and PVST+.

D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

E.

802.1s maps multiple VLANs to the same spanning-tree instance

Question 69

Refer to the exhibit.

Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)

Options:

A.

BPDU guard on access ports

B.

BPDU guard on the aggregation switch downlinks toward access switches

C.

root guard on the aggregation switch downlinks toward access switches

D.

root guard on access ports

E.

edge port on access ports

F.

access switch pairs explicitly determined to be root and backup root bridges

Question 70

Which two statements explain the operation of BFD asynchronous mode? (Choose two )

Options:

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

C.

BFD asynchronous mode with and without echo packets use control packets.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Question 71

Which statement about hot-potato routing architecture design is true?

Options:

A.

Hot-potato routing is the preferred architecture when connecting to content providers

B.

Hop-potato keeps traffic under the control of the network administrator for longer

C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric

D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks

Question 72

SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?

Options:

A.

need for intelligent traffic monitoring

B.

exponential growth of resource-intensive application

C.

complex and distributed management flow

D.

higher operating expense and capital expenditure

Question 73

A consultant needs to evaluate project management methodologies for a new service deployment on the existing network of a customer. The customer wants to be involved in the end-to-end project progress and be provided with frequent updates. The customer also wants the ability to change the requirements if needed, as the project progresses. Which project management methodology should be used?

Options:

A.

three principles

B.

phased

C.

Agile

D.

Waterfall

Question 74

The administrator of a small branch office wants to implement the Layer 2 network without running STP The office has some redundant paths Which mechanism can the administrator use to allow redundancy without creating Layer 2 loops?

Options:

A.

Use double-sided VPC on both switches

B.

Use two port channels as Flex links

C.

Use fabric path with ECMP

D.

Use 802.3ad link bundling.

Question 75

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

Options:

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

BPDU filtering

Question 76

An existing wireless network was designed to support data traffic only. You must now install context Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)

Options:

A.

Add access points along the perimeter of the coverage area.

B.

Increase the access point density to create an average inter-access point distance of less than 40 feet or 12.2 meters

C.

Use directional antennas to provide more cell overlapping

D.

Install additional access points in monitor mode where the co-channel interference would otherwise be affected

E.

Fine tune the radio configuration of the access point to have a higher average transmission power to achieve better coverage

Question 77

Which function is performed at the access layer of the three-layer hierarchical network design model?

Options:

A.

fault isolation

B.

QoS classification and marking boundary

C.

reliability -

D.

fast transport

E.

redundancy and load balancing

Question 78

In a redundant hub and spoke "wheel" design, all spokes are connected to the hub, and spokes are connected to other spokes as well. During failure on one spoke link, the traffic from that site can be sent to a neighboring site for it to be forwarded to the hub site. But during peak hours, a link is overloaded and traffic is re-routed to a neighbor, which subsequently becomes overloaded. This overload results in network traffic oscillation as the load varies at each spoke site. This design provides more redundancy but not more resiliency because the routing protocol must process many alternate paths to determine the lowest cost path. Which two design

changes help to improve resilience in this case? (Choose two.)

Options:

A.

Increase the number of redundant paths considered during the routing convergence calculation.

B.

Eliminate links between every spoke.

C.

Increase routing protocol convergence timers.

D.

Increase unequal-cost parallel paths.

E.

Use two links to each remote site instead of one.

Question 79

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Options:

Question 80

Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?

Options:

A.

OSPF fast hellos

B.

BFD echo

C.

Change the protocol to BGP

D.

Change the OSPF hello and dead intervals

Question 81

The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)

Options:

A.

access control lists

B.

firewalls

C.

QoS policy propagation with BGP

D.

remote black-holing trigger

E.

prefix lists

Question 82

Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops What do you answer?

Options:

A.

VXLAN offers native loop avoidance mechanism

B.

Storm Control should be enabled on all ports

C.

VPC+ could prevent L2 loop on access ports

D.

BPDU Guard should be enabled on all VTEP access ports

Question 83

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

Options:

A.

device resiliency

B.

device type

C.

network type

D.

network resiliency

E.

network size

Question 84

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

Options:

A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Question 85

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?

Options:

A.

Assigning unique Route Distinguishers

B.

Assigning unique Route Target ID'S

C.

Assigning unique IP address space for the Enterprise NAT/Firewalls

D.

Assigning unique VRF ID's to each L3VPN

Question 86

Which two impacts of adding the IP event dampening feature to a network design are true? (Choose two.)

Options:

A.

It protects against routing loops.

B.

It switches traffic immediately after a link failure.

C.

lt speeds up link failure detection.

D.

It reduces the utilization of system processing resources.

E.

It improves overall network stability.

Question 87

Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:

• Securely transfer the corporate data over the private WAN

• Use a centralized configuration model.

• Minimize overhead on the tunneled traffic.

Which technology can be used in the new design to meet the company's requirements?

Options:

A.

S-VTI

B.

DMVPN

C.

MGRE

D.

GET VPN

Question 88

Which encoding format does cisco ios XE software support for NETCONF?

Options:

A.

It supports HTML encoding for NETCONF

B.

It supports YAML encoding for NETCONF

C.

It supports XML encoding for NETCONF

D.

It supports JSON encoding for NETCONF

Question 89

You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)

Options:

A.

Use a multipoint Metro-E service for router connections

B.

Use a single address per router for all P2P links

C.

Use P2P links between routers in a hub-and-spoke design

D.

Configure address aggregation at each site router

E.

Determine which OSPF routers will be DR/BDR

Question 90

Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?

Options:

A.

After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval

B.

After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval

C.

Timers renegotiate indefinitely, so the timer exchange phase never converges

D.

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

Question 91

Refer to the exhibit.

After a network audit a network engineer must optimize the current network convergence time The proposed solution must consider link layer and control plane failures. Which solution meets the requirements?

Options:

A.

Configure debounce timers

B.

Increase fast hello timers

C.

Implement BFD

D.

Enable LSP fast flood

Question 92

A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?

Options:

A.

All device configurations are in read-only mode until the controller is restored.

B.

The control plane is unavailable until the controller is restored.

C.

If a device fails, the configuration backup is unavailable-

D.

Manual changes are only possible until the controller is restored

Question 93

An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?

Options:

A.

EoMPLS-based VPLS can carry multicast traffic in a scalable manner

B.

Use a mesh of GRE tunnels to carry the streams between sites

C.

Enable snooping mechanisms on the provider PE routers.

D.

Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites

Question 94

Which two features control multicast traffic in a VLAN environment? (Choose two)

Options:

A.

IGMP snooping

B.

MLD snooping

C.

RGMP

D.

PIM snooping

E.

pruning

Question 95

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

Options:

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Question 96

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

Options:

A.

Control Plane Protection host subinterface

B.

Control Plane Protection main interface

C.

Control Plane Protection transit subinterface

D.

Control Plane Protection CEF-exception subinterface

Question 97

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

Options:

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

separates infrastructure and policy

C.

uses policy-based forwarding of real-time traffic with less complexity

D.

unifies the WAN backbone

E.

manages failures through backup links

Question 98

The Agile Manifesto is a document that defines the key values and principles behind the Agile philosophy and helps development teams work more efficiently and sustainably Each of the four key values is split into two sections a left-hand side and a right-hand side In other words, though there is value in the items on the right we value the items on the left more What is one of the key values of the Agile Manifesto?

Options:

A.

comprehensive documentation over working software

B.

contract negotiation over customer collaboration

C.

individuals and interactions over processes and tools

D.

following a plan over responding to change

Page: 1 / 25
Total 329 questions