Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCDE v3.0 > 400-007

400-007 Cisco Certified Design Expert (CCDE v3.0) Written Exam Question and Answers

Question # 4

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity what must be deployed?

A.

bridging

B.

service chaining

C.

linking

D.

daisy chaining

E.

switching

Full Access
Question # 5

Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?

A.

Ansible

B.

Contrail

C.

Java

D.

Jinja2

Full Access
Question # 6

An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?

A.

class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

class-based traffic shaping

Full Access
Question # 7

Which design benefit of PortF ast is true?

A.

PortFast does not generate a spanning tree topology change hen a station on a port is connected or disconnected

B.

PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

D.

PortFast detects one-way communications on the physical port, which prevents switch loops

E.

PortFast prevents switch loops that are caused by a unidirectional point to point link condition on Rapid PVST+ and MST

F.

PortFast prevents switched traffic from traversing suboptimal paths on the network

Full Access
Question # 8

A network attacker exploits application flaws to compromise critical systems in the organization with these objectives:

• Obtain sensitive data and export the data out of the network.

• Compromise developer and administrator credentials to potentially

What is the next step after application discovery is completed in Zero Trust networkings

A.

Establish visibility and behavior modeling

B.

Enforce policies and microsegmentation.

C.

Assess real-time security health.

D.

Ensure trustworthiness of systems.

Full Access
Question # 9

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

A.

too many overlapping controls

B.

too many disparate solutions and technology silos

C.

an overabundance of manual processes

D.

a network security skills shortage

Full Access
Question # 10

An external edge router provides connectivity from a service provider to an enterprise Which two Internet edge best practices meet compliance regulations'? (Choose two )

A.

Implement filtenng to control traffic that is sourced from the infrastructure IP space.

B.

Enable and use only secure protocols.

C.

Send logs to a centralized logging collection server.

D.

Implement EBGP to advertise all owned IP blocks.

E.

Use login banners and interface access lists to restrict administrative access to the system

Full Access
Question # 11

Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?

A.

local addresses

B.

private addresses

C.

link-local addresses

D.

unique local addresses

Full Access
Question # 12

Which aspect of BGP-LS makes it scalable in large network when multiarea topology information must be gathered?

A.

transmit flow control

B.

open-loop flow control

C.

hardware flow control

D.

TCP-based flow control

Full Access
Question # 13

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

A.

access

B.

core

C.

collapsed core

D.

distribution

Full Access
Question # 14

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

A.

Enforce risk-based and adaptive access policies.

B.

Assess real-time security health of devices.

C.

Apply a context-based network access control policy for users.

D.

Ensure trustworthiness of devices.

Full Access
Question # 15

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

C.

Apply strong encryption for transmission of cardholder data across public networks.

D.

Protect all user systems against malware and frequently update antivirus software

E.

Maintain a policy that addresses information security for employees and third parties.

Full Access
Question # 16

Company XYZ wants to redesign the Layer 2 part of their network and wants to use all available uplinks for increased performance. They also want to have end host reachability supporting conversational learning. However, due to design constraints, they cannot implement port-channel on the uplinks. Which other technique can be used to make sure the uplinks are in active/active state?

A.

TRILL

B.

LISP

C.

MSTP

D.

switch stack

Full Access
Question # 17

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

A.

geographically dispersed data centers with asynchronous replication

B.

a single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

geographically dispersed data centers with synchronous replication

D.

a single data center with duplicated infrastructure and dual PSUs

Full Access
Question # 18

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization Which IETF standard technology can provide this requirement?

A.

data center bridging

B.

unified fabric

C.

Transparent Interconnection of Lots of Links

D.

fabric path

Full Access
Question # 19

An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?

A.

EoMPLS-based VPLS can carry multicast traffic in a scalable manner

B.

Use a mesh of GRE tunnels to carry the streams between sites

C.

Enable snooping mechanisms on the provider PE routers.

D.

Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites

Full Access
Question # 20

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?

A.

The Layer 1 and Layer 2 domains can easily overlap

B.

It reduces the complexity of the Layer 1 domains

C.

It can be applied to any kind of topology

D.

The Layer 2 domain is contained and more stable

Full Access
Question # 21

Which mechanism provides Layer 2 fault isolation between data centers?

A.

fabric path

B.

OTV

C.

advanced VPLS

D.

LISP

E.

TRILL

Full Access
Question # 22

Refer to the exhibit.

Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10.1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can be used in the routing policy design so that the rest of the network is not affected by the flapping issue?

A.

Use route dampening on LA router for the 10 1 5 0/24 network so that it does not get propagated when it flaps up and down

B.

Use route filtering on Chicago router to block the 10.1.5.0/24 network from coming in from the LA router

C.

Use route filtering on LA router to block the 10.15.0/24 network from getting propagated toward Chicago and New York

D.

Use route aggregation on LA router to summarize the 10.1.4.0V24, 10.1.5.0724, 10.1.6.0/24. and 10.1.7.0/24 networks toward Chicago

Full Access
Question # 23

Which two statements about MLD snooping are true? (Choose two)

A.

When MLD snooping is enabled, QoS is automatically enabled.

B.

A VLAN can support multiple active MLD snooping queries, as long as each one is associated to a different

multicast group.

C.

AN MLD snooping querier election occurs when any MLD snooping querier goes down or if there is an IP

address change on the active querier.

D.

When multiple MLD snooping queriers are enabled in a VLAN, the querier with the lowest IP address in the

VLAN is elected as the active MLD snooping querier.

Full Access
Question # 24

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

A.

CPU and memory usage on the spoke routers

B.

memory usage on the hub router

C.

CPU usage on the hub router

D.

interface buffers on the hub and spoke routers

Full Access
Question # 25

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services If one ISP suffers loss or latency?

A.

Cloud onRamp gateway site

B.

Cloud onRamp SWG

C.

Cloud onRamp

D.

Cloud onRamp SaaS

Full Access
Question # 26

Refer to the exhibit.

The network 10.10.0 .0/16 has been redistributed to OSPF processes and the best path to the destination from R1 has been chosen as R1-R2-R3 A failure occurred on the link between R2 and R3 and the path was changed to R1-R4-R5-R3 What happens when the link between R2 and R3 is restored'?

A.

The path R1-R4-R5-R3 continues to be the best path because the metric is better

B.

The path reverts back to R1-R2-R3 because the route type is E1

C.

The path R1-R4-R5-R3 continues to be the best path because OSPF does not compare the metrics between two domains

D.

The path reverts to R1-R2-R3 because this was the previous best path

Full Access
Question # 27

As part of a new network design documentation, you are required to explain the reason for choosing cisco FabricPath for Layer 2 loop avoidance.

Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network?

(Choose two)

A.

MAC tunneling

B.

IS-IS multipath

C.

RPF check

D.

TTL header

Full Access
Question # 28

Which service abstracts away the management of the operating system, middleware, and runtime?

A.

laaS

B.

PaaS

C.

SaaS

D.

BMaaS

Full Access
Question # 29

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?

A.

MSDP

B.

PIM SSM

C.

MPLS

D.

PIM sparse mode

Full Access
Question # 30

When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?

A.

QoE estimation

B.

security

C.

traffic patterns

D.

flow forwarding

Full Access
Question # 31

What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?

A.

NPIV

B.

NFVIS

C.

NFV

D.

VNF

Full Access
Question # 32

A service provider hires you to design its new managed CE offering to meet these requirements

• The CEs cannot run a routing protocol with the PE

• Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios.

• Provide support for IPv6 customer routes

• Scale up to 250.000 CE devices per customer.

• Provide low operational management to scale customer growth.

• Utilize low-end (inexpensive) routing platforms for CE functionality.

Which tunneling technology do you recommend?

A.

FlexVPN

B.

point-to-point GRE

C.

DMVPN

D.

LISP

Full Access
Question # 33

Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF However they also want to prevent excess flooding of LSAs if there is a constantly flapping link on the network Which timers can help prevent excess flooding of LSAs for OSPF?

A.

OSPF propagation timers

B.

OSPF throttling timers

C.

OSPF delay timers

D.

OSPF flooding timers

Full Access
Question # 34

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?

A.

Allow VoIP and the custom application to share the same priority queue,

B.

The custom application and VoIP must be assigned their own separate priority queue.

C.

Interleave the custom application with other TCP applications in the same CBWR

D.

Avoid placing the custom application in a CBWFQ queue that contains other

Full Access
Question # 35

Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:

• hardware sizing and power consumption

• Layer 2 and layer 3 services parameters

• configuration of all control plane protocols

Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Full Access
Question # 36

Drag and drop the end-to-end network virtualization elements from the left onto the correct network areas on the right.

Full Access
Question # 37

Refer to the exhibit.

The enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer3 VPN solution and manages the CE routers, but they do not currently support multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

A.

Enable a GRE tunnel between nodes CE1 and CE2

B.

Enable a GRE tunnel between nodes C2 and C4

C.

Enable a GRE tunnel between nodes C1 and C4

D.

Implement hub and spoke MPLS VPN over DMVPN (also known as 2547o DMVPN) between CE1 and CE2

E.

The service provider must provide a Draft Rosen solution to enable a GRE tunnel between nodes PE1 and PE2

Full Access
Question # 38

You are a network designer and you must ensure that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source address?

A.

ACL based forwarding

B.

unicast RPF loose mode

C.

unicast RPF strict mode

D.

ACL filtering by destination

Full Access
Question # 39

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

redundant AAA servers

B.

Control Plane Policing

C.

warning banners

D.

to enable unused .services

E.

SNMPv3

F.

routing protocol authentication

Full Access
Question # 40

What are two advantages of controller-based networks versus traditional networks? (Choose two.)

A.

the ability to have forwarding tables at each device

B.

more flexible configuration per device

C.

more consistent device configuration

D.

programmatic APIs that are available per device

E.

the ability to configure the features for the network rather than per device

Full Access
Question # 41

Which two factors provide multifactor authentication for secure access to applications and data, no matter where the users are or which devices they are on? (Choose two.)

A.

persona-based

B.

power-based

C.

push-based

D.

possession-based

E.

pull-based

Full Access
Question # 42

You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature Which four routing protocols can you use to facilitate this? (Choose four.)

A.

IS-IS

B.

static

C.

RIP

D.

EIGRP

E.

BGP

Full Access
Question # 43

Company XYZ is in the process of identifying which transport mechanism(s) to use as their WAN technology. Their main two requirements are.

• a technology that could offer DPI, SLA, secure tunnels, privacy, QoS, scalability, reliability, and ease of management

• a technology that is cost-effective

Which WAN technology(ies) should be included in the design of company XYZ?

A.

Software-defined WAN should be the preferred choice because it complements both technologies, covers all the required features, and it is the most cost-effective solution.

B.

Internet should be the preferred option because it is cost effective and supports BFD, IP SLA. and IPsec for secure transport over the public Internet.

C.

Both technologies should be used. Each should be used to back up the other one; where the primary links are MPLS, the internet should be used as a backup link with IPsec (and vice versa).

D.

MPLS meets all these requirements and it is more reliable than using the Internet. It is widely used with defined best practices and an industry standard.

Full Access
Question # 44

Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries? (Choose two.)

A.

AD manipulation

B.

matching OSPF external routes

C.

route tagging

D.

route tagging

E.

route filtering

F.

matching EIGRP process ID

Full Access
Question # 45

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

A.

partial mesh

B.

full mesh

C.

ring

D.

squared

E.

triangulated

Full Access
Question # 46

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke 'J

A.

Configure all the sites as network type broadcast

B.

The network type on all sites should be point-to-multipoint

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Full Access
Question # 47

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

separates infrastructure and policy

C.

uses policy-based forwarding of real-time traffic with less complexity

D.

unifies the WAN backbone

E.

manages failures through backup links

Full Access
Question # 48

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

A.

PortFast

B.

UDLD

C.

Root guard

D.

BPDU guard

Full Access
Question # 49

Which parameter is the most important factor to consider when deciding service placement in a cloud solution?

A.

data replication cost

B.

application structure

C.

security framework Implementation time

D.

data confidentiality rules

Full Access
Question # 50

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over dual data centers via DWDM

B.

synchronous replication over geographically dispersed dual data centers via MPLS

C.

synchronous replication over dual data centers via Metro Ethernet

D.

asynchronous replication over geographically dispersed dual data centers via CWDM

Full Access
Question # 51

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

A.

EIGRP

B.

RPVST+

C.

MST

D.

L2MP

Full Access
Question # 52

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Full Access
Question # 53

Refer to the exhibit.

OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?

A.

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

B.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

C.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

D.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

Full Access
Question # 54

An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

A.

Deploy a root controller to gather a complete network-level view.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

C.

Build direct physical connectivity between different controllers.

D.

Use OpenFlow to implement and adapt new protocols.

Full Access
Question # 55

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?

A.

PVRSTP

B.

MST

C.

STP

D.

PVSTP+

Full Access
Question # 56

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP path MTU discovery be enabled. Which effect will this have on the network?

A.

It will enhance the performance of TCP-based applications.

B.

It will increase the convergence time.

C.

It will improve the convergence time.

D.

It will create a loop free path.

Full Access
Question # 57

What best describes the difference between Automation and Orchestration?

A.

Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions.

B.

Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that require the network administrator to coordinate

C.

Automation refers to an automatic process for completing multiple tasks with conditions and Orchestration refers to executing tasks in parallel.

D.

Automation refers to scripting languages (Python. Ansible etc.) and Orchestration refers to commercial products that control configuration deployment

Full Access
Question # 58

What are two examples of components that are part of an SDN architecture? (Choose two.)

A.

software plane

B.

control plane

C.

application plane

D.

management plane

E.

network plane

Full Access
Question # 59

What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core layers?

A.

low bandwidth

B.

security

C.

scalability

D.

high latency

Full Access
Question # 60

Which undesired effect of increasing the jitter compensation buffer is true?

A.

The overall transport jitter decreases and quality improves.

B.

The overall transport jitter increases and quality issues can occur.

C.

The overall transport delay increases and quality issues can occur.

D.

The overall transport delay decreases and quality improves.

Full Access
Question # 61

Which methodology is the leading lifecycle approach to network design and implementation?

A.

PPDIOO

B.

Waterfall model

C.

Spiral model

D.

V model

Full Access
Question # 62

What is the most important operational driver in building a resilient and secure modular network design?

A.

Dependencies on hardware or software that is difficult to scale

B.

Minimize app downtime

C.

Reduce the frequency of failures requiring human intervention

D.

Increase time spent on developing new features

Full Access
Question # 63

Which two statements explain the operation of BFD asynchronous mode? (Choose two )

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

C.

BFD asynchronous mode with and without echo packets use control packets.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Full Access
Question # 64

Company XYZ, a global content provider, owns data centers on different continents Their data center design involves a standard three-layer design with a Layer 3-only core VRRP is used as the FHRP They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe in the absence of other business or technical constraints which termination point is optimal for the Layer 2 interconnection?

A.

at the core layer, to offer the possibility to isolate STP domains

B.

at the access layer because the STP root bridge does not need to align with the VRRP active node

C.

at the core layer because all external connections must terminate there for security reasons

D.

at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

Full Access
Question # 65

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

Full Access
Question # 66

What are two descriptions of network optimization? (Choose two.)

A.

maintain high availability

B.

proactive network management

C.

network redesign

D.

network health maintenance

E.

identify network requirements

Full Access
Question # 67

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)

A.

Changes in the existing IP addressing and subnets are required

B.

The firewall can participate actively on spanning tree.

C.

Multicast traffic can traverse the firewall.

D.

OSPF adjacencies can be established through the firewall

E.

The firewall acts like a router hop in the network.

Full Access
Question # 68

SDN is still maturing Throughout the evolution of SDN which two things will play a key role in enabling a successful deployment and avoiding performance visibility gaps in the infrastructure? (Choose two.)

A.

rapid on-demand growth

B.

dynamic real-time change

C.

falling back to old behaviors

D.

peer-to-peer controller infrastructure

E.

integration of device context

Full Access
Question # 69

A BGP route reflector in the network is taking longer than expected to coverage during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?

A.

Increase the size of the hold queue.

B.

Increase the size of the large buffers.

C.

Decrease the size of the small buffers.

D.

Increase the keepalive timers for each BGP neighbor.

Full Access
Question # 70

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

A.

inside global

B.

outside global

C.

inside local

D.

outside local

Full Access
Question # 71

Which two foundational aspects of loT are still evolving and being worked on by the industry at large? (Choose two)

A.

WiFi protocols

B.

Regulatory domains

C.

Low energy Bluetooth sensors

D.

loT consortia

E.

Standards

Full Access
Question # 72

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

routing protocol authentication

B.

SNMPv3

C.

Control Plane Policing

D.

redundant AAA servers

E.

warning banners

F.

to enable unused services

Full Access
Question # 73

Which technology supports antispoofing and does not have any impact on encryption performance regardless of packet size?

A.

MACsec

B.

IP source guard

C.

DHCP snooping with DAI

D.

IPsec

Full Access
Question # 74

Refer to the exhibit.

Traffic was equally balanced between Layer 3 links on core switches SW1 and SW2 before an introduction of the new video server in the network. This video server uses multicast to send video streams to hosts and now one of the links between core switches is over utilized Which design solution solves this issue?

A.

Add more links between core switches.

B.

Aggregate links Layer 2 link aggregation.

C.

Apply a more granular load- balancing method on SW1.

D.

Apply a more granular load-balancing method on SW2.

E.

Filter IGMP joins on an over -utilized link.

Full Access
Question # 75

Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two)

A.

Bandwidth utilization increases

B.

Traffic flows are suboptimal

C.

High-end routers are required to support NFV

D.

OpenFlow must be supported in the network

E.

An SDN orchestration layer is required to support NFV

Full Access
Question # 76

Refer to the exhibit.

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

A.

community

B.

MED

C.

local preference

D.

As path

Full Access
Question # 77

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?

A.

Assigning unique Route Distinguishers

B.

Assigning unique Route Target ID'S

C.

Assigning unique IP address space for the Enterprise NAT/Firewalls

D.

Assigning unique VRF ID's to each L3VPN

Full Access
Question # 78

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

A.

data governance

B.

additional latency

C.

security

D.

cloud connectivity

Full Access
Question # 79

A software-defined network can be defined as a network with an API that allows applications to understand and react to the state of the network in near real time. A vendor is building an SDN solution that exposes an API to the RIB and potentially the forwarding engine directly. The solution provides off-box processes with the capability to interact with the routing table in the same way as a distributed routing process. Which SDN framework model does the solution use?

A.

replace

B.

augmented

C.

hybrid

D.

distributed

Full Access
Question # 80

While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )

A.

when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)

B.

on distribution layer switches

C.

when hello timers are changed to more aggressive values

D.

on access layer switches

E.

on the core switches

Full Access
Question # 81

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

A.

Use two phantom RP addresses

B.

Manipulate the administration distance of the unicast routes to the two RPs

C.

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.

Advertise the two RP addresses in the routing protocol

E.

Use anycast RP based on MSDP peering between the two RPs

F.

Control routing to the two RPs through a longest match prefix

Full Access
Question # 82

Retef to the exhibit.

An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain EIGRP routes are getting redistributed into OSPF ,OSPF area 20 has routers with limited memory and CPU resources The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222 routes to How in Which OSPF area type fulfills this design requirement?

A.

area 20 as a stub area

B.

type 5 LSA filtering on the ASBR between EIGRP 111 and area a

C.

area 20 as a NSSA area

D.

type 3 LSA filtering on the ABR between area 0 area 20

Full Access
Question # 83

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

A.

Design in a way that expects outages and attacks on the network and its protected resources

B.

The design approach should consider simple and centralized management aspect

C.

Design in a way that it simplifies and improves ease of deployment

D.

Design automation tools wherever it is appropriate for greater visibility

Full Access
Question # 84

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network Which network threat is SNMPv3 effective against?

A.

man-in-the-middle attack

B.

masquerade threats

C.

DDoS attack

D.

brute force dictionary attack

Full Access
Question # 85

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Full Access
Question # 86

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

A.

flow-based analysis to measure bandwidth mix of applications and their flows

B.

call management analysis to identify network convergence-related failures

C.

call management analysis to identify CAC failures and call quality issues

D.

active monitoring via synthetic probes to measure loss, latency, and jitter

E.

passive monitoring via synthetic probes to measure loss, latency, and jitter

F.

flow-based analysis with PTP time-stamping to measure loss, latency, and jitter

Full Access
Question # 87

Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?

A.

Transport Mode in IPsec Phase I

B.

Transport Mode in IPsec Phase II

C.

Tunnel Mode in IPsec Phase II

D.

Tunnel Mode in IPsec Phase I

Full Access
Question # 88

Refer to the exhibit.

Company XYZ must design a DMVPN tunnel between the three sites Chicago is going to act as the NHS and the company wants DMVPN to detect peer endpoint failures Which technology should be used m the design?

A.

VPLS

B.

IP SLA

C.

GRE

D.

L2TPv3

Full Access
Question # 89

Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

A.

southbound APIs

B.

northbound APIs

C.

orchestration layer

D.

SDN controller

Full Access
Question # 90

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Full Access
Question # 91

Which two design option are available to dynamically discover the RP in an IPv6 multicast network? (Choose

two)

A.

embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Full Access
Question # 92

You have been tasked with designing a data center interconnect as part of business continuity You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

A.

DWDM

B.

EoMPLS

C.

SONET/SDH

D.

Multichassis EtherChannel over Pseudowire

E.

VPLS

Full Access
Question # 93

Customer XYZ network consists of an MPLS core. IS-IS running as IGP a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Full Access
Question # 94

The network designer needs to use GLOP IP addresses in order to make them unique within their ASN Which multicast address range should be used?

A.

232.0.0.0 to 232 255.255.255

B.

H233.0.0 0 to 233.255.255 255

C.

239000 to 239255255.255

D.

224000 to 2240.0 255

Full Access
Question # 95

Which design principal improves network resiliency?

A.

Added load-balancing

B.

Added redundancy

C.

Added confidentiality

D.

Added reliability

Full Access
Question # 96

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Full Access
Question # 97

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?

A.

Binary indexed explicit routing

B.

Binary intermediate enhanced routing

C.

Bit indexed explicit replication

D.

Bi-directional implicit replication

Full Access
Question # 98

Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)

A.

Target RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites.

B.

VSANs must be routed between sites to isolate fault domains and increase overall availability.

C.

Synchronous data replication must be used to meet the business requirements

D.

Asynchronous data replication should be used in this scenario to avoid performance impact in the primary site.

E.

VSANs must be extended from the primary to the secondary site to improve performance and availability.

Full Access