Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Cisco > CCDE v3.0 > 400-007

400-007 Cisco Certified Design Expert (CCDE v3.1) Question and Answers

Question # 4

Company XYZ is designing the network for IPv6 security and they have these design requirements:

    A switch or router must deny access to traffic from sources with addresses that are correct but topologically incorrect.

    Devices must block Neighbor Discovery Protocol resolution for destination addresses not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Full Access
Question # 5

Refer to the exhibit.

The enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer 3 VPN solution and manages the CE routers, but they do not currently support multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

A.

Enable a GRE tunnel between nodes CE1 and CE2

B.

Enable a GRE tunnel between nodes C2 and C4

C.

Enable a GRE tunnel between nodes C1 and C4

D.

Implement hub and spoke MPLS VPN over DMVPN (also known as 2547o DMVPN) between CE1 and CE2

E.

The service provider must provide a Draft Rosen solution to enable a GRE tunnel between nodes PE1 and PE2

Full Access
Question # 6

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

A.

Access

B.

Core

C.

Collapsed core

D.

Distribution

Full Access
Question # 7

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

A.

Control Plane Protection using queue thresholding on the transit subinterface

B.

Control Plane Protection using port filtering on the transit subinterface

C.

Control Plane Protection using port filtering on the main interface

D.

Control Plane Protection using queue thresholding on the host subinterface

E.

Control Plane Protection using port filtering on the host subinterface

Full Access
Question # 8

Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)

A.

Check for high roaming delay.

B.

Check for uniform radio coverage across the floors.

C.

Check for high channel utilization.

D.

Check for latency over wireless.

E.

Identify frequent TX power changes.

Full Access
Question # 9

Company XYZ plans to run OSPF on a DMVPN network. They want to use spoke-to-spoke tunnels in the design. What is a drawback or concern in this type of design?

A.

Additional host routes will be inserted into the routing tables

B.

Manual configuration of the spokes with the appropriate priority will be needed

C.

There will be split-horizon issue at the hub

D.

Manual configuration of the spoke IP address on the hub will be needed

Full Access
Question # 10

Which three Cisco products are used in conjunction with Red Hat to provide an NFVi solution? (Choose three.)

A.

Cisco Prime Service Catalog

B.

Cisco Open Virtual Switch

C.

Cisco Nexus switches

D.

Cisco UCS

E.

Cisco Open Container Platform

F.

Cisco Virtual Network Function

Full Access
Question # 11

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection. Which technology meets the updated requirements and can be incorporated into the design?

A.

Routed firewall

B.

VLAN ACLs on the switch

C.

Transparent firewall

D.

Zone-based firewall on the Layer 3 device

Full Access
Question # 12

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

A.

Evaluate bandwidth utilization and connection quality

B.

Enable special requirements such as direct DID lines on pickup

C.

Make recommendations to limit the size of the half-open session table on routers

D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

Full Access
Question # 13

Which two design solutions ensure sub-50 msec of the convergence time after a link failure in the network? (Choose two)

A.

BFD

B.

Ti-LFA

C.

Minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Full Access
Question # 14

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

A.

CPU and memory usage on the spoke routers

B.

Memory usage on the hub router

C.

CPU usage on the hub router

D.

Interface buffers on the hub and spoke routers

Full Access
Question # 15

A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?

A.

Data center perimeter firewalling

B.

VACLs on data center switches

C.

Transparent firewalling

D.

Routed firewalls

Full Access
Question # 16

Which service abstracts away the management of the operating system, middleware, and runtime?

A.

IaaS

B.

PaaS

C.

SaaS

D.

BMaaS

Full Access
Question # 17

Refer to the exhibit.

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500. Traffic destined to AS 111 network 91.7.0.0/16 should come in via AS 100, while traffic destined to all other networks in AS 111 should continue to use the existing path. Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 into the 91.7.0.0/16 network?

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91.7.0.0/16 network.

Full Access
Question # 18

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

A.

fault management

B.

accounting management

C.

performance management

D.

security management

Full Access
Question # 19

A network hacker introduces a packet with duplicate sequence numbers to disrupt an IPsec session. During this, high-priority traffic is transmitted. What design parameter helps mitigate this?

A.

Classify and mark duplicate sequence packets

B.

Apply anti-replay window 4096

C.

Restrict keyword in IPsec tunnel

D.

Increase QoS shape policy

Full Access
Question # 20

Company XYZ wants to deploy OSPF. The design plan requires that two OSPF networks be mutually redistributed at multiple locations and ensure end-to-end connectivity to all of the company's networks. Which technology can be used to fulfill the requirements while avoiding the creation of routing loops?

A.

Create a virtual link between ASBRs.

B.

Change the router ID for both ASBRs.

C.

Redistribute routes as external type 2 routes.

D.

Use route maps on ASBRs to filter routes with tags so they are not redistributed.

Full Access
Question # 21

What is the most important operational driver when building a resilient and secure modular network design?

A.

Reduce the frequency of failures requiring human intervention

B.

Minimize app downtime

C.

Increase time spent on developing new features

D.

Dependencies on hardware or software that is difficult to scale

Full Access
Question # 22

The line between security and compliance is easily blurred and is, to a large extent, a moving target Drag and drop each of the requirements on the left to the appropriate section on the right

Full Access
Question # 23

Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF. However, they also want to prevent excess flooding of LSAs if there is a constantly flapping link on the network. Which timers can help prevent excess flooding of LSAs for OSPF?

A.

OSPF propagation timers

B.

OSPF throttling timers

C.

OSPF delay timers

D.

OSPF flooding timers

Full Access
Question # 24

Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?

A.

Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value.

B.

Redistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the ext value and the value is the same in all ASBRs.

C.

Enable OSPF load-balancing over unequal cost path.

D.

Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external internal values.

Full Access
Question # 25

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Full Access
Question # 26

As a network designer, you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications. Which of the following design considerations will not impact design decision?

A.

Focus on the solution instead of the problem, which helps to reduce downtime duration

B.

The location of the data collection

C.

What direction the data or flows should be metered

D.

Identify traffic types and top talkers over this link

Full Access
Question # 27

Which two descriptions of CWDM are true? (Choose two)

A.

Typically used over long distances, but requires optical amplification

B.

Uses the 850nm band

C.

Allows up to 32 optical carriers to be multiplexed onto a single fiber

D.

Shares the same transmission window as DWDM

E.

Passive CWDM devices require no electrical power

Full Access
Question # 28

Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements:

    Only the loopback address of each of the enterprise CE X and Y routers must be advertised to the interconnecting service provider cloud network.

    The transport layer must carry the VPNv4 label and VPN payload over the MP-BGP control plane.

    The transport layer must not be under service provider control.

Which enterprise WAN transport virtualization technique meets the requirements?

A.

EIGRP Over the Top

B.

MPLS over BGP over multipoint GRE

C.

DMVPN per VRF

D.

Point-to-point GRE per VRF

Full Access
Question # 29

Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the Layer 2 interconnection?

A.

at the core layer, to offer the possibility to isolate STP domains

B.

at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

C.

at the access layer because the STP root bridge does not need to align with the HSRP active node

D.

at the core layer because all external connections must terminate there for security reasons

Full Access
Question # 30

A service provider hires you to design its new managed CE offering to meet these requirements:

    The CEs cannot run a routing protocol with the PE.

    Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios.

    Provide support for IPv6 customer routes.

    Scale up to 250,000 CE devices per customer.

    Provide low operational management to scale customer growth.

    Utilize low-end (inexpensive) routing platforms for CE functionality.

Which tunneling technology do you recommend?

A.

FlexVPN

B.

point-to-point GRE

C.

DMVPN

D.

LISP

Full Access
Question # 31

Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)

A.

Increase WAN bandwidth

B.

Increase memory branch switch.

C.

Fragment data packets.

D.

Replace any electrical links with optical links

E.

Prioritize voice packets

Full Access
Question # 32

Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Full Access
Question # 33

Various teams in different organizations within an enterprise are preparing low-level design documents using a Waterfall project model. Input from relevant stakeholders was captured at the start of the project, and the scope has been defined. What impact will it have if stakeholders ask for changes before documentation is complete?

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Full Access
Question # 34

Which tool automates network implementation activities and shortens the implementation lifecycle?

A.

LISP

B.

Java

C.

Conclusion

D.

Python

Full Access
Question # 35

As part of a new network design documentation, you are required to explain the reason for choosing Cisco FabricPath for Layer 2 loop avoidance.

Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network? (Choose two)

A.

MAC tunneling

B.

IS-IS multipath

C.

RPF check

D.

TTL header

Full Access
Question # 36

Which two technologies enable multilayer segmentation? (Choose two.)

A.

policy-based routing

B.

segment routing

C.

data plane markings

D.

firewalls

E.

filter lists

Full Access
Question # 37

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?

A.

SNMPv3

B.

Syslog

C.

Syslog TLS

D.

SNMPv2

E.

SSH

Full Access
Question # 38

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Full Access
Question # 39

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

A.

map IP CoS bits into the IP Precedence field

B.

map flow-label bits into the Exp field

C.

map IP precedence bits into the DSCP field

D.

map DSCP bits into the Exp field

Full Access
Question # 40

Hybrid cloud computing allows organizations to take advantage of public and private cloud models. Which best practice should organizations follow to ensure data security in the private cloud?

A.

Use standard protocols for data transmission over the network.

B.

Encrypt data when it is at rest and in motion.

C.

Communicate all data security risks to customers and end users.

D.

Use standard network protocols for data communication between unsecured network connections.

Full Access
Question # 41

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The main requirements are ZTP support, end-to-end encryption, application awareness, and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

A.

SD-branch

B.

DMVPN with PfR

C.

Managed SD-WAN

D.

SD-WAN

Full Access
Question # 42

The Layer 3 control plane steers traffic toward destinations. Which two techniques offer a more dynamic, flexible, controlled, and secure control plane design in service provider networks? (Choose two.)

A.

Access control lists

B.

Firewalls

C.

QoS policy propagation with BGP

D.

Remote black-holing trigger

E.

Prefix lists

Full Access
Question # 43

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network. Which network threat is SNMPv3 effective against?

A.

Man-in-the-middle attack

B.

Masquerade threats

C.

DDoS attack

D.

Brute force dictionary attack

Full Access
Question # 44

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over dual data centers via DWDM

B.

synchronous replication over geographically dispersed dual data centers via MPLS

C.

synchronous replication over dual data centers via Metro Ethernet

D.

asynchronous replication over geographically dispersed dual data centers via CWDM

Full Access
Question # 45

Which two characteristics are associated with 802.1s? (Choose two)

A.

802.1s supports up to 1024 instances of 802.1

B.

802.1s is a Cisco enhancement to 802.1w.

C.

802.1s provides for faster convergence over 802.1D and PVST+.

D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

E.

802.1s maps multiple VLANs to the same spanning-tree instance.

Full Access
Question # 46

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

A.

Control Plane Protection host subinterface

B.

Control Plane Protection main interface

C.

Control Plane Protection transit subinterface

D.

Control Plane Protection CEF-exception subinterface

Full Access
Question # 47

The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner. However, the company network does not support BFD. Which other feature can be used to fulfill the design requirement?

A.

STP

B.

Fast hello

C.

LFA

D.

DPD

Full Access
Question # 48

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways. They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

A.

inside global

B.

outside global

C.

inside local

D.

outside local

Full Access
Question # 49

A business wants to refresh its legacy Frame Relay WAN and consolidate product specialists via video in 200 branches. Which technology should be used?

A.

DMVPN phase 1 network over the Internet

B.

Layer 3 MPLS VPN hub and spoke

C.

Layer 2 VPLS

D.

Layer 3 MPLS VPN full mesh

Full Access
Question # 50

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Full Access
Question # 51

A customer asks you to perform a high-level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via multipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

A.

EIGRP

B.

IS-IS

C.

OSPF

D.

BGP

Full Access
Question # 52

You were tasked to enhance the security of a network with these characteristics:

    A pool of servers is accessed by numerous data centers and remote sites

    The servers are accessed via a cluster of firewalls

    The firewalls are configured properly and are not dropping traffic

    The firewalls occasionally cause asymmetric routing of traffic within the server data center.

Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

A.

Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.

B.

Deploy uRPF strict mode.

C.

Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.

D.

Deploy uRPF loose mode.

Full Access
Question # 53

What are two descriptions of network optimization? (Choose two.)

A.

Maintain high availability

B.

Proactive network management

C.

Network redesign

D.

Network health maintenance

E.

Identify network requirements

Full Access
Question # 54

VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to ensure successful deployment of VPLS?

A.

Flooding is necessary to propagate MAC address reachability information

B.

PE scalability

C.

The underlying transport mechanism

D.

VLAN scalability

Full Access
Question # 55

Router R1 is a BGP speaker with one peering neighbor over link "A". When link "A" fails, routing announcements are terminated, which results in the tearing down of the state for all BGP routes at each end of the link. What is this a good example of?

A.

Fault isolation

B.

Resiliency

C.

Redundancy

D.

Fate sharing

Full Access
Question # 56

Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbor relationships minimized on each segment and the LSDB size optimized. Which design can be used?

A.

Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area

B.

Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1

C.

Design the network so that all routers are Level 1 routers

D.

Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1

Full Access
Question # 57

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

A.

EIGRP

B.

RPVST+

C.

MST

D.

L2MP

Full Access
Question # 58

A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?

A.

All device configurations are in read-only mode until the controller is restored.

B.

The control plane is unavailable until the controller is restored.

C.

If a device fails, the configuration backup is unavailable.

D.

Manual changes are only possible until the controller is restored.

Full Access
Question # 59

When planning their cloud migration journey, what is crucial for virtually all organizations to perform?

A.

SASE framework deployment

B.

Optimizing the WAN environment

C.

Assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Full Access
Question # 60

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two.)

A.

If overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic. However, the intermediate system can still forward Level 1 traffic.

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems.

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems.

Full Access
Question # 61

Refer to the exhibit.

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

A.

Address family translation

B.

Dual stack

C.

Host-to-host tunneling

D.

6rd tunneling

Full Access
Question # 62

A large enterprise cloud design team is evaluating cloud consumption models. What is an example of a typical PaaS limitation or concern?

A.

Vendor lock-in

B.

Runtime issues

C.

Lack of control

D.

Multi-tenant security

Full Access
Question # 63

An enterprise campus is adopting a network virtualization design solution with these requirements:

• It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

• It must maintain end-to-end logical path transport separation across the network

• Resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

A.

Path isolation

B.

Session isolation

C.

Group virtualization

D.

Services virtualization

E.

Edge isolation

Full Access
Question # 64

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)

A.

service provider agreement to support tuned timers

B.

manual updates to the peer groups

C.

service provider scheduling of changes to the PE

D.

number of routes on the CE router

E.

number of VRFs on the PE router

Full Access
Question # 65

An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, it cannot access the network until updated. Which component should be built into the NAC design?

A.

Posture assessment with remediation VLAN

B.

Quarantine SGTs

C.

dACLs with SGTs

D.

Quarantine VLAN

Full Access
Question # 66

Company XYZ is migrating their existing network to IPv6. Some access layer switches do not support IPv6, while core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used?

A.

The access layer switches must support IGMP snooping at a minimum. Any switches that do not support IGMP snooping must be replaced.

B.

Upgrade the non-supporting switches. Otherwise, it will cause an issue with the migration.

C.

Layer 2 switches will not affect the implementation of IPv6. They can be included in the design in their current state.

D.

The access layer switches must support DHCPv6. Any switches that do not support DHCPv6 must be replaced.

Full Access
Question # 67

An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones. Which workaround solution meets the requirement?

A.

Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.

B.

Enable phone VPN authentication based on end-user username and password.

C.

Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.

D.

Use authentication-based clear text password with no EAP-MD5 on the legacy phones.

Full Access
Question # 68

The major business applications of an enterprise are largely monolithic and hard-coded. As part of a major modernization and overhaul of the applications, the goal is to move to a modular and containerized application architecture model. At the same time, decoupling from the hardware is desired to move to an on-demand provisioning. However, the CyberOps team mandated that the final architecture must provide the same security levels as an air-gapped data center. Which cloud architecture meets these requirements?

A.

IaaS

B.

Private cloud

C.

PaaS

D.

Hybrid cloud

E.

Public cloud

Full Access
Question # 69

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

Routing protocol authentication

B.

SNMPv3

C.

Control Plane Policing

D.

Redundant AAA servers

E.

Warning banners

F.

To enable unused services

Full Access
Question # 70

Retef to the exhibit.

An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain. EIGRP routes are getting redistributed into OSPF. OSPF area 20 has routers with limited memory and CPU resources. The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222 routes to flow in. Which OSPF area type fulfills this design requirement?

A.

area 20 as a stub area

B.

type 5 LSA filtering on the ASBR between EIGRP 111 and area 0

C.

area 20 as a NSSA area

D.

type 3 LSA filtering on the ABR between area 0 and area 20

Full Access
Question # 71

Refer to the exhibit.

Refer to the exhibit. A new high availability DB server cluster is installed in the network. These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.

Which solution supports these requirements?

A.

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.

Add secondary links to REP segments 1 and 2

C.

Add two new links between SW1 and SW2 configured as REP segment 3

D.

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Full Access
Question # 72

You are designing a network running both IPv4 and IPv6 to deploy QoS. Which consideration is correct about the QoS for IPv4 and IPv6?

A.

IPv4 and IPv6 traffic types can use queuing mechanisms such as LLQ, PQ, and CQ.

B.

IPv6 packet classification is only available with process switching, whereas IPv4 packet classification is available with both process switching and CEF.

C.

IPv6 and IPv4 traffic types can use a single QoS policy to match both protocols.

D.

Different congestion management mechanisms need to be used for IPv4 and IPv6 traffic types.

Full Access
Question # 73

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

A.

It can limit network scalability

B.

It can create microloops during reconvergence

C.

It increases convergence time.

D.

It reduces convergence time.

Full Access
Question # 74

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

A.

Design in a way that expects outages and attacks on the network and its protected resources

B.

The design approach should consider simple and centralized management aspect

C.

Design in a way that it simplifies and improves ease of deployment

D.

Design automation tools wherever it is appropriate for greater visibility

Full Access
Question # 75

What are two examples of business goals to be considered when a network design is built? (Choose two.)

A.

standardize resiliency

B.

minimize operational costs

C.

integrate endpoint posture

D.

ensure faster obsolescence

E.

reduce complexity

Full Access
Question # 76

Which option is a fate-sharing characteristic in regards to network design?

A.

A failure of a single element causes the entire service to fail

B.

It protects the network against failures in the distribution layer

C.

It acts as a stateful forwarding device

D.

It provides data sequencing and acknowledgment mechanisms

Full Access
Question # 77

Your company wants to deploy a new data center infrastructure. Based on the requirements you have chosen VXLAN as encapsulation technology. The customer is concerned about misconfiguration of Layer 2 devices and DC-wide outages caused by Layer 2 loops. What do you answer?

A.

VXLAN offers native loop avoidance mechanism

B.

Storm Control should be enabled on all ports

C.

VPC+ could prevent L2 loop on access ports

D.

BPDU Guard should be enabled on all VTEP access ports

Full Access
Question # 78

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.

Full Access
Question # 79

You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mbps and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner?

A.

Change the protocol to CIFS.

B.

Increase the queue to at least 1 GB

C.

Use a WRED random drop policy

D.

Enable the TCP Nagle algorithm on the receiver

Full Access
Question # 80

As technologies such as big data, cloud, and loT continue to grow, so will the demand for network bandwidth Business strategies must be flexible to accommodate these changes when it comes to priorities and direction and the network design strategy also must be agile and adaptable Drag and drop the benefits from the left onto the corresponding strategic approaches on the right as they relate to network design and management.

Full Access
Question # 81

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

A.

Threat-centric protection

B.

Integrated actionable intelligence

C.

Distributed enforcement

D.

Central command and control

Full Access
Question # 82

Refer to the exhibit.

A company named XYZ needs to apply security policies for end-user browsing by installing a secure web proxy appliance. All the web traffic must be inspected by the appliance, and the remaining traffic must be inspected by an NGFW that has been upgraded with intrusion prevention system functionality. In which two ways must the routing be performed? (Choose two)

A.

Policy-based routing on the collapsed core

B.

Policy-based routing on the internet edge

C.

Policy-based routing on firewalls

D.

Static routing on the appliance

Full Access
Question # 83

You want to split an Ethernet domain in two.

Which parameter must be unique in this design to keep the two domains separated?

A.

VTP domain

B.

VTP password

C.

STP type

D.

VLAN ID

Full Access
Question # 84

In outsourced IT services, the RTO is defined within the SLA. Which two support terms are often included in the SLA by IT and other service providers? (Choose two.)

A.

Network size and cost

B.

Support availability

C.

Network sustainability

D.

Network reliability

E.

Resolution time

Full Access
Question # 85

Which two statements explain the operation of BFD asynchronous mode? (Choose two.)

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

C.

BFD asynchronous mode with and without echo packets use control packets.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Full Access
Question # 86

The Agile Manifesto is a document that defines the key values and principles behind the Agile philosophy and helps development teams work more efficiently and sustainably. Each of the four key values is split into two sections—a left-hand side and a right-hand side. In other words, though there is value in the items on the right, we value the items on the left more. What is one of the key values of the Agile Manifesto?

A.

Comprehensive documentation over working software

B.

Contract negotiation over customer collaboration

C.

Individuals and interactions over processes and tools

D.

Following a plan over responding to change

Full Access
Question # 87

Which undesired effect of increasing the jitter compensation buffer is true?

A.

The overall transport jitter decreases and quality improves.

B.

The overall transport jitter increases and quality issues can occur.

C.

The overall transport delay increases and quality issues can occur.

D.

The overall transport delay decreases and quality improves.

Full Access
Question # 88

You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Full Access
Question # 89

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Full Access
Question # 90

Which two design options are available to dynamically discover the RP in an IPv6 multicast network? (Choose two)

A.

Embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Full Access
Question # 91

Which network management framework can be used to develop a network architecture that contains business requirements analysis, gap analysis, and network diagrams as artifacts to be used for design and implementation later?

A.

TOGAF

B.

ITIL

C.

FCAPS

D.

Cobit

Full Access
Question # 92

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Full Access
Question # 93

What is a disadvantage of the traditional three-tier architecture model when east-west traffic between different pods must go through the distribution and core layers?

A.

Low bandwidth

B.

Security

C.

Scalability

D.

High latency

Full Access
Question # 94

During a pre-sales meeting with a potential customer, the customer CTO asks a question about advantages of controller-based networks versus a traditional network. What are two advantages to mention? (Choose two)

A.

Per device forwarding tables

B.

Programmatic APIs available per device

C.

Abstraction of individual network devices

D.

Distributed control plane

E.

Consistent device configuration

Full Access
Question # 95

Refer to the exhibit.

Refer to the exhibit. Two data center sites (X and Y) connect to the Internet and each other using a backdoor link. Both advertise the same IP prefix (100.75.10.0/23) to the Internet. Firewalls are behind R1 and R2.

Problem: When users attempt to reach 100.75.10.0/23, the return traffic is routed to Site-Y, regardless of where the session originated. This results in asymmetric traffic and potentially broken sessions due to firewall behavior.

Which design resolves the issue?

A.

Use BGP MED to influence Site-X return traffic. Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration. Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X. Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers. Have Site-X advertise an IP pool with a longer prefix.

Full Access
Question # 96

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

A.

Geographically dispersed data centers with asynchronous replication

B.

A single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

Geographically dispersed data centers with synchronous replication

D.

A single data center with duplicated infrastructure and dual PSUs

Full Access
Question # 97

An enterprise requires MPLS-connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services if one ISP suffers loss or latency?

A.

Cloud onRamp gateway site

B.

Cloud onRamp SWG

C.

Cloud onRamp

D.

Cloud onRamp SaaS

Full Access
Question # 98

You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

A.

DWDM

B.

EoMPLS

C.

SONET/SDH

D.

Multichassis EtherChannel over Pseudowire

E.

VPLS

Full Access
Question # 99

When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?

A.

QoE estimation

B.

Security

C.

Traffic patterns

D.

Flow forwarding

Full Access
Question # 100

An international media provider faces challenges managing deployed services with a homegrown orchestration system. Which platform is well-suited as a state-aware orchestration system?

A.

Puppet

B.

Kubernetes

C.

Ansible

D.

Terraform

Full Access
Question # 101

When a company network architect is working on a new network design, they are expected to ensure that business requirements and technical aspects are factored in, but often there are other factors that come into play as well. Which non-business constraint must also be considered throughout the design phase?

A.

Location

B.

Cost

C.

Time

D.

Compliance

Full Access
Question # 102

An engineer must design a network for a company that uses OSPF LFA to reduce loops. Which type of loop would be reduced by using this design?

A.

DTP

B.

Micro loops

C.

STP

D.

REP

Full Access
Question # 103

Company XYZ has 30 sites using MPLS L3 VPN and is concerned about data integrity. They want a centralized configuration model and minimal overhead. Which technology can be used?

A.

S-VTI

B.

DMVPN

C.

MGRE

D.

GET VPN

Full Access
Question # 104

Refer to the exhibit.

Your company designed a network to allow server VLANs to span all access switches in a data center. In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches. Which two features improve STP stability within the network design? (Choose two.)

A.

BPDU guard on access ports

B.

BPDU guard on the aggregation switch downlinks toward access switches

C.

root guard on the aggregation switch downlinks toward access switches

D.

root guard on access ports

E.

edge port on access ports

F.

access switch pairs explicitly determined to be root and backup root bridges

Full Access