Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 400-007 Actual Questions

Page: 5 / 29
Total 381 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 17

Refer to the exhibit A customer network design team is planning a migration from a legacy TDM-based L2VPN to an MPLS-based L3VPN Migration is planned in a phased approach:

•OSPF backbone Link between HUB A and HUB B sites to be migrated to eBGP

•Spoke A2 and Spoke B1 will be migrated to the L3VPN

Which solution design can be considered to avoid routing loops during backbone link migration?

Options:

A.

Enable route-filtering on OSPF backbone routers for spoke traffic

B.

Advertise low AD value for transit traffic on hub sites.

C.

OSPF backbone area advertises summarized routes to hub.

D.

Redistribute EIGRP 200 and 300 with low cost into BGP

Question 18

Which two statements describe the hierarchical LAN design model? (Choose two)

Options:

A.

It is a well-understood architecture that provides scalability

B.

It is the best design for modern data centers

C.

It is the most optimal design but is highly complex

D.

It provides a simplified design

E.

Changes, upgrades, and new services can be introduced in a controlled and stagged manner

Question 19

The administrator of a small branch office wants to implement the Layer 2 network without running STP The office has some redundant paths Which mechanism can the administrator use to allow redundancy without creating Layer 2 loops?

Options:

A.

Use double-sided VPC on both switches

B.

Use two port channels as Flex links

C.

Use fabric path with ECMP

D.

Use 802.3ad link bundling.

Question 20

A business customer deploys workloads in the public cloud. Now the customer network faces governance issues with the flow of IT traffic and must ensure the security of data and intellectual property. Which action helps to identify the issue for further resolution?

Options:

A.

Set up a secure tunnel from customer routers to ensure that traffic is protected as it travels to the cloud service providers.

B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud service providers

C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic sent to cloud service providers

D.

Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud.

Page: 5 / 29
Total 381 questions