Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCDE v3.0 > 400-007

400-007 Cisco Certified Design Expert (CCDE v3.1) Question and Answers

Question # 4

Refer to the exhibit.

Company XYZ must design a DMVPN tunnel between the three sites Chicago is going to act as the NHS and the company wants DMVPN to detect peer endpoint failures Which technology should be used m the design?

A.

VPLS

B.

IP SLA

C.

GRE

D.

L2TPv3

Full Access
Question # 5

Refer to the exhibit.

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

A.

community

B.

MED

C.

local preference

D.

As path

Full Access
Question # 6

Refer to the exhibit.

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

A.

address family translation

B.

dual stack

C.

host-to-host tunneling

D.

6rd tunneling

Full Access
Question # 7
A.

low bandwidth

B.

security

C scalability

C.

high latency

Full Access
Question # 8

A service provider recently migrated to an SD-WAN solution for delivering WAN connections to its customers. One of the main challenges with the SD-WAN deployment is that branch site volume increases every year, which causes management complexity. Which action resolves the issue?

A.

Implement a scalable network management system to manage all sites.

B.

Adopt a well-structured SD-WAN service management lifecycle model

C.

Build a service orchestration platform on top of the network controller

D.

Set up a dedicated team to monitor and provision new customers

Full Access
Question # 9

Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)

A.

Target RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites.

B.

VSANs must be routed between sites to isolate fault domains and increase overall availability.

C.

Synchronous data replication must be used to meet the business requirements

D.

Asynchronous data replication should be used in this scenario to avoid performance impact in the primary site.

E.

VSANs must be extended from the primary to the secondary site to improve performance and availability.

Full Access
Question # 10

The SD-WAN architecture is composed of separate orchestration management, control, and data planes Which activity happens at the orchestration plane?

A.

automatic onboarding of the SD-WAN routers into the SD-WAN overlay

B.

decision-making process on where traffic flows

C.

packet forwarding

D.

central configuration and monitoring

Full Access
Question # 11

Refer to the exhibit A customer network design team is planning a migration from a legacy TDM-based L2VPN to an MPLS-based L3VPN Migration is planned in a phased approach:

•OSPF backbone Link between HUB A and HUB B sites to be migrated to eBGP

•Spoke A2 and Spoke B1 will be migrated to the L3VPN

Which solution design can be considered to avoid routing loops during backbone link migration?

A.

Enable route-filtering on OSPF backbone routers for spoke traffic

B.

Advertise low AD value for transit traffic on hub sites.

C.

OSPF backbone area advertises summarized routes to hub.

D.

Redistribute EIGRP 200 and 300 with low cost into BGP

Full Access
Question # 12

The Agile release train workflow focuses on tasks which can be accomplished reliably and efficiently Scrum and Kanban are two of the most popular Agile frameworks, but both have a specific use case based on the implementation requirements In which two situations are Kanban the ideal framework to use”? (Choose two.)

A.

acquisition of automation tools

B.

carrier lead times

C.

network configuration design

D.

physical hardware deployment

E.

logical topology deployment

Full Access
Question # 13

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

A.

Local to global NAT translation is done after routing

B.

Global to local NAT translation is done before routing.

C.

Local to global NAT translation is done before policy-based routing

D.

Global to local NAT translation is done after policy-based routing.

Full Access
Question # 14

Refer to the exhibit.

As part of a redesign project, you must predict multicast behavior What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated*?

A.

It is dropped due to an unsuccessful RPF check against the multicast source

B.

It is switched give that no RPF check is performed

C.

It is switched due to a successful RPF check against the routing table

D.

It is dropped due to an unsuccessful RPk8t8ck against the multicast receiver.

Full Access
Question # 15

Refer to the exhibit A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)

A.

Enable unicast heartbeat messages to be periodically exchanged between MEPs

B.

Enable Connectivity Fault Management on the SP switches

C.

Use upward maintenance endpoints on the SP switches

D.

Forward E-LMI PDUs over VPLS

E.

Forward LLD PDUs over the VPLS

Full Access
Question # 16

Which MPLS TE design consideration is true?

A.

MPLS TE replaces LDP and the dependency of the IGP to identify the best path.

B.

MPLS TE provides link and node protection

C.

MPLS TE optimizes the routing of IP traffic, given the constraints imposed by backbone capacity and

application requirements.

D.

MPLS TE requires Layer 3 VPN full-mesh topology deployment

Full Access
Question # 17

Which management category is not part of FCAPS framework?

A.

Configuration

B.

Security

C.

Performance

D.

Authentication

E.

Fault-management

Full Access
Question # 18

Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)

A.

Fast transport

B.

Reliability

C.

QoS classification and marking boundary

D.

Fault isolation

E.

Redundancy and load balancing

Full Access
Question # 19

What are two advantages of controller-based networks versus traditional networks? (Choose two.)

A.

the ability to have forwarding tables at each device

B.

more flexible configuration per device

C.

more consistent device configuration

D.

programmatic APIs that are available per device

E.

the ability to configure the features for the network rather than per device

Full Access
Question # 20

A network architect must redesign a service provider edge, where multiservice and multitenant PEs are currently present. Which design feature should be minimized in the new design to achieve reliability?

A.

bridging

B.

fate sharing

C.

redundancy

D.

unicast overlay routing

Full Access
Question # 21

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?

A.

fault management

B.

performance management

C.

security management

D.

accounting management

Full Access
Question # 22

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Full Access
Question # 23

Which project management methodology is characterized by a having a low client

involvement?

A.

Traditional project management

B.

LEAN project management

C.

Kanban project management

D.

Agile project management

Full Access
Question # 24

The major business applications of an enterprise are largely monolithic and hard-coded As part of a major modernization and overhaul of the applications the goal is to move to a modular and containerized application architecture mode At the same time decoupling from the hardware is desired to move to an on-demand provisioning However the CyberOps team mandated that the final architecture must provide the same security levels as an air-gapped data center. Which cloud architecture meets these requirements?

A.

laaS

B.

private cloud

C.

PaaS

D.

hybrid cloud

E.

public cloud

Full Access
Question # 25

SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?

A.

TLS

B.

DTLS

C.

IPsec

D.

GRE

Full Access
Question # 26

Which two design option are available to dynamically discover the RP in an IPv6 multicast network? (Choose

two)

A.

embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Full Access
Question # 27

Which two benefits can software-defined networks provide to businesses? (Choose two.)

A.

provides additional redundancy

B.

reduction of OpEx/CapEx

C.

reduced latency

D.

decentralized management

E.

enables innovation

F.

meets high traffic demands

Full Access
Question # 28

Refer to the exhibit.

There are multiple trees in the Cisco FabricPath All switches in the Layer 2 fabric share the same view of each tree. Which two concepts describe how the multicast traffic is load-balanced across this topology? (Choose two )

A.

A specific (S.G) traffic is not load-balanced

B.

All trees are utilized at the same level of the traffic rate

C.

Every leaf node assigns the specific (S.G) to the same tree.

D.

A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.

E.

The multicast traffic is generally load-balanced across all trees

Full Access
Question # 29

In the wake of a security compromise incident where the internal networks were breached by an outside attacker at the perimeter of the infrastructure, an enterprise is now evaluating potential measures that can help protect against the same type of incident in the future. What are two design options that can be employed? (Choose two)

A.

microzoning

B.

segmentation

C.

domain fencing

D.

virtualization

E.

microperimeters

Full Access
Question # 30

Refer to the exhibit.

A new high availability DB sever cluster is installed in the network.

These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.

Which solution supports these requirements?

A.

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.

Add secondary links to REP segments 1 and 2

C.

Add two new links between SW1 and SW2 configured as REP segment 3

D.

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Full Access
Question # 31

Which optimal use of interface dampening on a fast convergence network design is true?

A.

When occasional flaps of long duration occur

B.

when numerous adjacent flaps of very short duration occur

C.

when the router hardware it slower than the carrier delay down detection

D.

when the switch hardware is faster than the debounce timer down detection

Full Access
Question # 32

Company XYZ wants to deploy OSPF. The design plan requires that two OSPF networks be mutually redistributed at multiple locations and ensure end-to-end connectivity to all of the company's networks Which technology can be used to fulfill the requirements while avoiding the creation of routing loops?

A.

Create a virtual link between ASBRs.

B.

Change the router ID for both ASBRs.

C.

Redistribute routes as external type 2 routes.

D.

Use route maps on ASBRs to filter routes with tags so they are not redistributed.

Full Access
Question # 33

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location The networks are joined to enable host migration at Layer 2 What is the final migration step after hosts have physically migrated to have traffic flowing through the new network without changing any host configuration?

A.

Shut down legacy Layer 3 SVIs. clear ARP caches on all hosts being migrated and then configure the legacy VRRP address onto new VXLAN core switches

B.

Increase VRRP priorities on new infrastructure over legacy VRRP values, then shut down legacy SVIs

C.

Shut down legacy infrastructure to allow VXLAN gateways to become active

D.

Shut down legacy Layer 3 SVIs and activate new preconfigured Layer 3 SVIs on VXLAN

Full Access
Question # 34

Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?

A.

Use switch clustering in the access layer.

B.

Use switch clustering in the core/distribution layer.

C.

Use spanning-tree PortFast.

D.

Use BFD.

Full Access
Question # 35

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?

A.

The Layer 1 and Layer 2 domains can easily overlap

B.

It reduces the complexity of the Layer 1 domains

C.

It can be applied to any kind of topology

D.

The Layer 2 domain is contained and more stable

Full Access
Question # 36

Which two application requirements are mandatory tor traffic to receive proper treatment when placed in the priority queue? (Choose two.)

A.

small transactions (HTTP-like behavior)

B.

WRED drop treatment

C.

tolerance to packet loss

D.

intolerance to jitter

E.

TCP-based application

Full Access
Question # 37

What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?

A.

NPIV

B.

NFVIS

C.

NFV

D.

VNF

Full Access
Question # 38

Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

A.

Transmit delay

B.

Throttle timer

C.

SPF hold time

D.

Interface dampening

Full Access
Question # 39

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Full Access
Question # 40

Which mechanism provides Layer 2 fault isolation between data centers?

A.

fabric path

B.

OTV

C.

advanced VPLS

D.

LISP

E.

TRILL

Full Access
Question # 41

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

A.

wide area network

B.

mobile network

C.

metro network

D.

application network

E.

control network

Full Access
Question # 42

A European government passport agency considers upgrading its IT systems to increase performance and workload flexibility in response to constantly changing requirements. The budget manager wants to reduce capital expenses and IT staff and must adopt the lowest-cost technology. Which technology choice is suitable?

A.

on premises

B.

private cloud

C.

public cloud

D.

hybrid cloud

Full Access
Question # 43

Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?

A.

Ansible

B.

Contrail

C.

Java

D.

Jinja2

Full Access
Question # 44

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)

A.

cost optimization approach

B.

strategic planning approach

C.

modular approach

D.

tactical planning approach

E.

business optimization approach

Full Access
Question # 45

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

A.

fault management

B.

accounting management

C.

performance management

D.

security management

Full Access
Question # 46

A software-defined network can be defined as a network with an API that allows applications to understand and react to the state of the network in near real time. A vendor is building an SDN solution that exposes an API to the RIB and potentially the forwarding engine directly. The solution provides off-box processes with the capability to interact with the routing table in the same way as a distributed routing process. Which SDN framework model does the solution use?

A.

replace

B.

augmented

C.

hybrid

D.

distributed

Full Access
Question # 47

Refer to the exhibit.

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the existing path Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Into the 91.7.0.0/16 network?

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.

Full Access
Question # 48

Refer to the exhibit.

Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?

A.

The LA administrator should use route aggregation to summarize the 10 1 4.0/24, 10 1 5 0/24, 10.1.6.0/24, and 10 1 7 0/24 networks toward Chicago

B.

The LA administrator should use route dampening for the 10.1.5 0/24 network so that it does not get propagated when it flaps up and down.

C.

The LA administrator should use route filtering to block the 10.1.5.0/24 network from getting propagated toward Chicago and New York.

D.

The Chicago administrator should use route filtering to block the 10.1.5.0/24 network from coming in from the LA router.

Full Access
Question # 49

A network uses an SDN architecture with switches and a centralized controller What should be on the switches but not on the controller?

A.

control plane functions

B.

a southbound interface

C.

data plane functions

D.

a northbound interface

Full Access
Question # 50

Which design solution reduces the amount of IGMP state in the network?

A.

IGMP filtering

B.

IGMPv3 with PIM-SSM

C.

multiple multicast domains

D.

one multicast group address thorough network regardless of IGMP version

Full Access
Question # 51

Which tool automates network implementation activities and shortens the implementation lifecycle?

A.

LISP

B.

Java

C.

Conclusion

D.

Python

Full Access
Question # 52

What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two.)

A.

establishing user roles

B.

polymorphism

C.

lack of visibility and tracking

D.

increased attack surface

E.

user credential validation

Full Access
Question # 53

Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two )

The group-pacing timer controls the interval that is used for group and individual LSA refreshment

A.

OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size

B.

OSPF retransmission-pacing timers allow control of interpacket spaang between consecutive link-state update packets in the OSPF retransmission queue.

C.

OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue.

D.

OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue

Full Access
Question # 54

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)

A.

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing.

B.

It is highly-available by design with no single-point-of-failure risks present.

C.

Integrating smart NIC capabilities on the local host level is made easier through rest APIs.

D.

It significantly improves the latency when performing reactive handling of PACKET_IN events.

E.

It centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment.

Full Access
Question # 55

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

A.

PortFast

B.

UDLD

C.

Root guard

D.

BPDU guard

Full Access
Question # 56

Which two benefits can software defined networks provide to businesses? (Choose two.)

A.

provides additional redundancy

B.

decentralized management

C.

reduced latency

D.

enables innovation

E.

reduction of OpEx/CapEx

F.

meets high traffic demands

Full Access
Question # 57

A large enterprise customer is planning a new WAN connection to its headquarters. The current architecture is

dual homed with static routing, but users complain when a specific link fails. Failure of the other link does not

affect any services or applications. The new WAN connection must provide the headquarters with a resilient

network design and increase the return on investment.

Which solution should be recommended to the customer?

A.

Implement granular quality of service on the links.

B.

Procure additional bandwidth.

C.

Use dynamic routing toward the WAN.

D.

Add an additional link to the WAN.

Full Access
Question # 58

When planning their cloud migration journey what is crucial for virtually all organizations to perform?

A.

SASE framework deployment

B.

optimizing the WAN environment

C.

assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Full Access
Question # 59

Two enterprise networks must be connected together. Both networks are using the same private IP addresses.

The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload

feature to save IF addresses from the NAT pools. Which design addresses this requirement using only one

Cisco I OS NAT router for both directions?

A.

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT, with overload in

both directions.

B.

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload

option in both directions.

C.

The overload feature is the default and does not have to be configured.

D.

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands

for the overload feature in both directions.

E.

The Nat Virtual interface must be used to achieve this requirement.

Full Access
Question # 60

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

C.

Apply strong encryption for transmission of cardholder data across public networks.

D.

Protect all user systems against malware and frequently update antivirus software

E.

Maintain a policy that addresses information security for employees and third parties.

Full Access
Question # 61

A large enterprise cloud design team is evaluating different cloud consumption models. What is an example of typical PaaS limitations or concerns that should be considered during service design?

A.

vendor lock-in

B.

runtime issues

C.

lack of control

D.

multi-tenant security

Full Access
Question # 62

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

routing protocol authentication

B.

SNMPv3

C.

Control Plane Policing

D.

redundant AAA servers

E.

warning banners

F.

to enable unused services

Full Access
Question # 63

The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner However the company network does not support BFD Which other feature can be used to fulfill the design requirement?

A.

STP

B.

fast hello

C.

LFA

D.

DPD

Full Access
Question # 64

Refer to the exhibit.

Traffic was equally balanced between Layer 3 links on core switches SW1 and SW2 before an introduction of the new video server in the network. This video server uses multicast to send video streams to hosts and now one of the links between core switches is over utilized Which design solution solves this issue?

A.

Add more links between core switches.

B.

Aggregate links Layer 2 link aggregation.

C.

Apply a more granular load- balancing method on SW1.

D.

Apply a more granular load-balancing method on SW2.

E.

Filter IGMP joins on an over -utilized link.

Full Access
Question # 65

Which interface between the controller and the networking device enables the two to communicate and allows the controller to program the data plane forwarding tables of the networking device?

A.

controller interface

B.

southbound interface

C.

application programming interface

D.

northbound interface

Full Access
Question # 66

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two )

A.

Serialization delays are invariable because they depend only on the line rate of the interface

B.

Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.

C.

Serialization delay is the time required to transmit the packet on the physical media.

D.

Serialization delays are variable because they depend only on the size of the packet being serialized

E.

Serialization delay depends not only on the line rate of the interface but also on the size of the packet

Full Access
Question # 67

Which two statements explain the operation of BFD asynchronous mode? (Choose two )

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

C.

BFD asynchronous mode with and without echo packets use control packets.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Full Access
Question # 68

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design. Which two technologies are recommended? (Choose two.)

A.

Design MLAG/MC-LAG into the network wherever possible.

B.

Configure DHCP snooping on the switches.

C.

Use root guard.

D.

Use BPDU guard.

E.

Use UniDirectional Link Detection.

Full Access
Question # 69

As a service provider is implementing Strong Access Control Measures, which two of the following PCI Data Security Standard requirements must be met’ (Choose two.)

A.

Assign a unique ID each person with computer access

B.

Restrict access to cardholder data to on a need-to-know basis

C.

Encrypt transmission of cardholder data across open or public networks

D.

Each location must require validating PCI compliance if business has multiple locations

E.

Protect stored cardholder data

Full Access
Question # 70

A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?

A.

data center perimeter firewalling

B.

VACLs on data center switches

C.

transparent firewalling

D.

routed firewalls

Full Access
Question # 71

You want to add 900 VLANs to the existing 90 VLANs on a data center Which two spanning-tree concerns must you consider? (Choose two )

A.

STP is increased by a factor of 10 convergence time

B.

To add 990 VLANs to the switching hardware reserved VLANs requires you to use extended VLAN

C.

The diameter of the STP topology is increased.

D.

The PVST+ increases CPU utilization

E.

BPDU does not support 990 VLANs

Full Access
Question # 72

You want to split an Ethernet domain in two.

Which parameter must be unique in this design to keep the two domains separated?

A.

VTP domain

B.

VTP password

C.

STP type

D.

VLAN ID

Full Access
Question # 73

For a company that offers online billing systems for their customers, which strategy ensures the RPO is kept as low as possible?

A.

cloud backup to mirror data

B.

spare onsite disks

C.

periodic snapshot of data

D.

backup on external storage

Full Access
Question # 74

Which development model is closely associated with traditional project management?

A.

static model

B.

Agile model

C.

evolutionary delivery model

D.

lifecycle model

Full Access
Question # 75

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Full Access
Question # 76

What are two key design principles when using a hierarchical core-distribution-access network model? (Choose two )

A.

A hierarchical network design model aids fault isolation

B.

The core layer is designed first, followed by the distribution layer and then the access layer

C.

The core layer provides server access in a small campus.

D.

A hierarchical network design facilitates changes

E.

The core layer controls access to resources for security

Full Access
Question # 77

Which design benefit of PortF ast is true?

A.

PortFast does not generate a spanning tree topology change hen a station on a port is connected or disconnected

B.

PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

D.

PortFast detects one-way communications on the physical port, which prevents switch loops

E.

PortFast prevents switch loops that are caused by a unidirectional point to point link condition on Rapid PVST+ and MST

F.

PortFast prevents switched traffic from traversing suboptimal paths on the network

Full Access
Question # 78

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI data. Which type of security safeguard should be implemented to resolve this issue?

A.

technical and physical access control

B.

administrative security management processes

C.

physical device and media control

D.

technical integrity and transmission security

Full Access
Question # 79

Refer to the exhibit.

This network is running legacy STP 802.1 d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

A.

The transit_delay=5 and dpdu_delay=20 are recommended values, considering helto_timer=2 and specified

B.

Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802. to speed up STP convergence process C. The max_age and forward delay parameters can be adjusted to speed up STP convergence process.

C.

Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

Full Access
Question # 80

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

A.

inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

B.

ability to expand bandwidth over existing optical Infrastructure

C.

inherent topology flexibility with built-in service protection

D.

inherent topology flexibility with intelligent chromatic dispersion

E.

inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

Full Access
Question # 81

An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?

A.

posture assessment with remediation VLAN

B.

quarantine SGTs

C.

dACLs with SGTs

D.

quarantine VLAN

Full Access
Question # 82

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over dual data centers via DWDM

B.

synchronous replication over geographically dispersed dual data centers via MPLS

C.

synchronous replication over dual data centers via Metro Ethernet

D.

asynchronous replication over geographically dispersed dual data centers via CWDM

Full Access
Question # 83

Refer to the exhibit.

OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?

A.

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

B.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

C.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

D.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

Full Access
Question # 84

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)

A.

conduct risk analyses

B.

install firewalls

C.

use antivirus software

D.

establish monitoring policies

E.

establish risk management policies

Full Access
Question # 85

Which methodology is the leading lifecycle approach to network design and implementation?

A.

PPDIOO

B.

Waterfall model

C.

Spiral model

D.

V model

Full Access
Question # 86

A product manufacturing organization is integrating cloud services into their IT solution The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step. This step defines the scope of IT, the application, and the service What is one topic that should be considered in the Define Strategy step?

A.

financial and governance models

B.

innovate and align with business according to volume

C.

due diligence and financial scenarios

D.

contingency exit strategy steps

Full Access
Question # 87

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Full Access
Question # 88

The Agile Manifesto is a document that defines the key values and principles behind the Agile philosophy and helps development teams work more efficiently and sustainably Each of the four key values is split into two sections a left-hand side and a right-hand side In other words, though there is value in the items on the right we value the items on the left more What is one of the key values of the Agile Manifesto?

A.

comprehensive documentation over working software

B.

contract negotiation over customer collaboration

C.

individuals and interactions over processes and tools

D.

following a plan over responding to change

Full Access
Question # 89

You were tasked to enhance the security of a network with these characteristics:

• A pool of servers is accessed by numerous data centers and remote sites

• The servers are accessed via a cluster of firewalls

• The firewalls are configured properly and are not dropping traffic

• The firewalls occasionally cause asymmetric routing of traffic within the server data center.

Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

A.

Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.

B.

Deploy uRPF strict mode.

C.

Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.

D.

Deploy uRPF loose mode

Full Access
Question # 90

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

A.

too many overlapping controls

B.

too many disparate solutions and technology silos

C.

an overabundance of manual processes

D.

a network security skills shortage

Full Access
Question # 91

Which two features describe controller-based networking solutions compared to traditional networking solutions? (Choose two.)

A.

inflate licensing costs

B.

reduce network configuration complexity

C.

provide centralization of primary IT functions

D.

allow for fewer network failures

E.

increase network bandwidth usage

Full Access
Question # 92

You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Full Access
Question # 93

As more links are added to the network, information and attributes related to the link is added to the control plane meaning every link that gets added will slow down the convergence of the control plane by some measurable amount of time. As a result when additional redundancy is built or added the MTTR will increase too Which risk increases along with the increased MTTR?

A.

management visibility

B.

slower data plane convergence

C.

overlapping outages

D.

topology change detection

Full Access
Question # 94

An enterprise has identified these causes for inefficient CAPEX spending:

    CAPEX planning is driven by technology and not by business objectives.

    The CAPEX planning team lacks the data it needs to perform due diligence tasks.

    The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

B.

CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully.

C.

Adopt new organizational models that promote real accountability for ROI. not just revenue. EBITDA, and cash.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Full Access
Question # 95

Refer to the exhibit.

Two data center siles X and Y are connected with a direct backdoor link with these conditions •Site-specific firewalls are deployed behind the Internet edge routers R1 and R2 •Both sites are advertising the address pool 100 75 10 0/23 toward the internet Site-X finds that Internet traffic returning from user PCs comes back on the Site-Y link Which design resolves the issue?

A.

Use BGP MED to influence Site-X return traffic Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration.

Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X.

Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers.

Have Site-X advertise an IP pool with a longer prefix.

Full Access
Question # 96

Refer to the exhibit.

Which impact of using three or more ABRs between the backbone area and area 1 is true?

A.

In a large-scale network LSA replication by all ABRs can cause serious scalability issues

B.

Multiple ABRs reduce the CPU processing on each A6R due to splitting prefix advertisement

C.

In a large-scale network multiple ABRs can create microloops.

D.

Prefixes from the non-backbone area are advertised by one ABR to the backbone

Full Access
Question # 97

The network designer needs to use GLOP IP address in order make them unique within their ASN, which

multicast address range will be considered?

A.

239.0.0.0 to 239.255.255.255

B.

224.0.0.0 to 224.0.0.255

C.

233.0.0.0 to 233.255.255.255

D.

232.0.0.0 to 232.255.255.255

Full Access
Question # 98

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The solution must provide a single 10G connection between locations and be able to run its own varying QoS profiles without service provider interaction based on the migration stages. All connectivity methods are at 10 Gbps. Which transport technology costs the least if the connectivity is required for just one year?

A.

MPLS wires only

B.

CWDM over dark fiber

C.

DWDM over dark fiber

D.

Metro Ethernet

Full Access
Question # 99

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Sen/ice (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?

A.

tail drop

B.

traffic shaping

C.

WRED

D.

traffic policing

Full Access
Question # 100

A network attacker exploits application flaws to compromise critical systems in the organization with these objectives:

• Obtain sensitive data and export the data out of the network.

• Compromise developer and administrator credentials to potentially

What is the next step after application discovery is completed in Zero Trust networkings

A.

Establish visibility and behavior modeling

B.

Enforce policies and microsegmentation.

C.

Assess real-time security health.

D.

Ensure trustworthiness of systems.

Full Access
Question # 101

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

A.

device resiliency

B.

device type

C.

network type

D.

network resiliency

E.

network size

Full Access
Question # 102

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used

Full Access
Question # 103

Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbour relationships to be minimized on each network segment and want to optimize the size of the IS-IS LSDB on each router. Which can design can be used to meet these requirements?

A.

Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area

B.

Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1

C.

Design the network so that all routers are Level 1 routers

D.

Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1

Full Access
Question # 104

Two routers R1 and R2 are directly connected through an Ethernet link Both routers are running OSPF. OSPF has been registered with BFD and BFD is running in asynchronous mode with the echo function enabled Which two actions occur that are related to the echo function? (Choose two)

A.

BFD control packets are sent at a slower pace because the echo function is enabled

B.

BFD echo packets are sent from forwarding engines along the Layer 2 path to perform detection

C.

BFD control packets are sent at a higher pace because the echo function is enabted

D.

Only BFD control packets are sent from forwarding engines along the Layer 2 path to perform detection

E.

DUMPS BFD sessions at either end actively participate in the forwarding of echo packets

Full Access
Question # 105

Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?

A.

After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval

B.

After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval

C.

Timers renegotiate indefinitely, so the timer exchange phase never converges

D.

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

Full Access
Question # 106

You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)

A.

Use a multipoint Metro-E service for router connections

B.

Use a single address per router for all P2P links

C.

Use P2P links between routers in a hub-and-spoke design

D.

Configure address aggregation at each site router

E.

Determine which OSPF routers will be DR/BDR

Full Access
Question # 107

Which two pain points are the most common for container technology adoption? (Choose two)

A.

Performance

B.

Security

C.

Cost

D.

Container deployment

E.

Skilled staff

F.

Compliance

Full Access
Question # 108

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?

A.

SNMPv3

B.

Syslog

C.

Syslog TLS

D.

SNMPv2

E.

SSH

Full Access
Question # 109

Refer to the exhibit.

Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)

A.

BPDU guard on access ports

B.

BPDU guard on the aggregation switch downlinks toward access switches

C.

root guard on the aggregation switch downlinks toward access switches

D.

root guard on access ports

E.

edge port on access ports

F.

access switch pairs explicitly determined to be root and backup root bridges

Full Access
Question # 110

A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. Recently, they added a new branch to their network. Due to physical security concerns, they want to extend their existing IP CCTV network of the head office to the new branch, without any routing changes in the network. They are also under some time constraints. What is the best approach to extend the existing IP CCTV network to the new branch, without incurring any IP address changes?

A.

GRE

B.

L2TPv3

C.

VXLAN

D.

EoMPLS

Full Access
Question # 111

Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:

• Securely transfer the corporate data over the private WAN

• Use a centralized configuration model.

• Minimize overhead on the tunneled traffic.

Which technology can be used in the new design to meet the company's requirements?

A.

S-VTI

B.

DMVPN

C.

MGRE

D.

GET VPN

Full Access
Question # 112

An international media provider is an early adopter of Docker and micro services and is using an open-source homegrown container orchestration system. A few years ago, they migrated from on-premises data centers to the cloud Now they are faced with challenges related to management of the deployed services with their current homegrown orchestration system.

Which platform is well-suited as a state-aware orchestration system?

A.

Puppet

B.

Kubemetes

C.

Ansible

D.

Terraform

Full Access
Question # 113

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

A.

Use two phantom RP addresses

B.

Manipulate the administration distance of the unicast routes to the two RPs

C.

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.

Advertise the two RP addresses in the routing protocol

E.

Use anycast RP based on MSDP peering between the two RPs

F.

Control routing to the two RPs through a longest match prefix

Full Access
Question # 114

Company XYZ has multiple production units and marketing departments across the region The current network is a mixture of point-to-point links and MPLS Layer 3 VPN service from the provider. The Info-Sec team has suggested to isolate production traffic end-to-end with an encryption over the transport network to comply with the HIPAA standard Which solution must be used in their design if Company XYZ wants a quick roll out”?

A.

IPsec point-to-point tunnels over the MPLS and point-to-point links provide an isolated and encrypted packet end-to-end

B.

GETVPN can be implemented over the MPLS provider which provides a payload encryption without the overhead of the tunnelling

C.

A firewall can be placed centrally to filter out the traffic based on required ports

D.

VRF-Lite can be implemented toward the downstream network and VRF-based tunnels combined with IPsec can be implemented over the service provider

Full Access