Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCDE v3.0 > 400-007

400-007 Cisco Certified Design Expert (CCDE v3.1) Question and Answers

Question # 4

What are three examples of solution components of the network infrastructure that help enforce security policy compliance on all devices as they seek to access the network and computing resources, thereby limiting damage from emerging security threats such as viruses, worms, and spyware? (Choose three)

A.

posture agent

B.

network access devices

C.

endpoint security application

D.

management and reporting tools

E.

web filtering devices

F.

audit and decision point servers

Full Access
Question # 5

A network automation team plans to develop tasks to configure services on a network by using a Python controller The configuration tasks must be implemented by using operations that support network-wide transactions The candidate configuration must be validated automatically for all targeted devices before being applied to each specific device What can be used to apply the configuration to the network devices?

A.

RESTCONF/YANG

B.

NETCONF/YANG

C.

CLI over SSH

D.

XML Agent TTY

Full Access
Question # 6

Refer to the exhibit. An architect has been tasked to design an ISIS solution for a medium-size financial customer. The resulting design must meet these requirements:

Which two ISIS design aspects must be included? (Choose two.)

A.

Region-A and Region-B major routers establish passive ISIS peering with HQ router.

B.

Branch site routers and major site routers establish L2 adjacency.

C.

Region-A and Region-B major routers advertise a default route toward the other region.

D.

Different ISIS instances on HQ router to separate Region-A and Region-B.

E.

Branch site routers establish L1 adjacencies and major site routers establish L1/L2 adjacencies.

Full Access
Question # 7

Network orchestration enables network administrators to focus on strategic initiatives, innovation, and value-added tasks rather than spending time on manual and repetitive network management activities. Drag and drop the orchestration types from the left onto the corresponding functions on the right. Not all options are used.

Full Access
Question # 8

In a multi-cloud environment, which two practices should be implemented to safeguard the integrity of Al-driven network decisions? (Choose two.)

A.

executing real-time change monitoring for all Al model modifications and setups across cloud platforms

B.

employing a centralized Al control plane to oversee and supervise all machine learning models in the cloud

C.

implementing machine learning models exclusively within isolated, on-premises data centers to mitigate cloud vulnerabilities

D.

employing federated learning to guarantee data privacy and integrity across multiple cloud environments

E.

implementing rigorous network segmentation among cloud providers to avert cross-cloud data leaks

Full Access
Question # 9

What is a characteristic of a secure cloud architecture model?

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Full Access
Question # 10

An enterprise service provider is planning to migrate the customer network to MPLS to connect cloud applications The customer network team and service provider team are analyzing all process (tows before live migration and implementation Before planning the migration, what is a crucial task that must be executed?

A.

real-time process monitoring and maintenance

B.

impact forecasts and risk analysis

C.

application packaging and deployment

D.

impact analysis and application refactoring

Full Access
Question # 11

A software-defined network can be defined as a network with an API that allows applications to understand and react to the state of the network in near real time A vendor is building an SDN solution that exposes an API to the RIB and potentially the forwarding engine directly The solution provides off-box processes with the capability to interact with the routing table in the same way as a distributed routing process Which SDN framework model does the solution use?

A.

replace

B.

augmented

C.

hybrid

D.

distributed

Full Access
Question # 12

The goal for any network designer is to strive to build a resilient network that adapts to changing conditions rapidly with minimal impact on the services running over the network A resilient network can adapt to failures but which soft failure can be harder to define and detect?

A.

a network with operational challenges due to lack of skills

B.

a network which does not solve complexity issues

C.

a network that is not running in an optimal way

D.

a network or service that experiences outages

Full Access
Question # 13

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

A.

flow-based analysis to measure bandwidth mix of applications and their flows

B.

call management analysis to identify network convergence-related failures

C.

call management analysis to identify CAC failures and call quality issues

D.

active monitoring via synthetic probes to measure loss, latency, and jitter

E.

passive monitoring via synthetic probes to measure loss, latency, and jitter

F.

flow-based analysis with PTP time-stamping to measure loss, latency, and jitter

Full Access
Question # 14

Which two statements describe network automation and network orchestration? (Choose two)

A.

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms

B.

Network automation does not provide governance or policy management

C.

Network orchestration is used to run single, low-level tasks without human intervention

D.

Network automation spans multiple network services, vendors and environments

E.

Provisioning network services is an example of network automation

Full Access
Question # 15

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?

A.

Redistributed using metric type 2 into OSPF

B.

Redistribute using metric type 1 into EIGRP

C.

Redistribute using metric type 1 into OSPF

D.

Redistribute using metric type 2 into EIGRP

Full Access
Question # 16

SDN controllers need to sustain healthy operation under the pressure of different objectives from the applications they host. High availability can be achieved through improved southbound APIs and controller placement heuristics and formal models. Which two implementation strategy help to maximize resilience and scalability? (Choose two.)

A.

Efficient implementation by connecting forwarding devices to multiple controller.

B.

Cost-effective implementation by connecting forwarding devices to single controller.

C.

Controller deployment planning is more dependent on network size than on the topology.

D.

Controller deployment planning is more dependent on network type than application need

E.

Controller deployment planning is more dependent on the topology than on network size.

Full Access
Question # 17

Which interface between the controller and the networking device enables the two to communicate and allows the controller to program the data plane forwarding tables of the networking device?

A.

Controller interface

B.

Southbound interface

C.

Application programming interface

D.

Northbound interface

Full Access
Question # 18

A network consists of multiple planes where each plane represents a different area of network operations and cames different types of network traffic Which two statements describe the concepts of assurance in the context of control planes ' ? (Choose two.)

A.

It is responsible for collecting analyzing, and enforcing policies based on observed data

B.

It primarily deals with configuring system access and network traffic flow policies

C.

It focuses on gathering and analyzing metrics, logs, and traces to infer the health of systems

D.

It executes predefined policies and forwards network traffic

E.

It is the ability to ensure system compliance and reliability under specified conditions.

Full Access
Question # 19

A company with an existing multivendor network is moving from 1 G dark fiber to an ISP virtual leased-line solution The company ' s internal security policy states that any traffic traversing a network that is not owned by the company must be encrypted What must be used to meet the requirements?

A.

IPsec AH

B.

Dynamic Multipoint VPN tunnel

C.

IPsec ESP

D.

GETVPN tunnel

Full Access
Question # 20

Refer lo the exhibit Company XYZ BGP topology is as shown in the diagram The interface on the LA router connected toward the 10 1 5 0/24 network is faulty and is going up and down, which affects the entre routing domain Which routing technique can be used in the routing policy design so that the rest of the network is not affected by the flapping issue ?

A.

Use route filtering on Chicago router to block the 10 1.5.0V24 network from coming in from the LA router.

B.

Use route filtering on LA router To block the 10 1 5 074 network from getting propagated toward Chicago and New York.

C.

Use route aggregation on LA router to summarize the 10.1.4 074.10.1.5.0*24,10.1.6.0/24. and 10.1.7.004 networks toward Chicago.

D.

Use route dampening on LA router for the 10.1.5.074 network so that it does not get propagated when it (laps up and down)

Full Access
Question # 21

What are two parameters that can be leveraged by SAML in mixed private/public cloud environments by using identity and asset management? (Choose two)

A.

unified directories

B.

policy-based tokens

C.

link federations

D.

identity federations

E.

multifactor hard tokens

Full Access
Question # 22

Which component of the SDN architecture automatically ensures that application traffic is routed according to policies established by network administrators?

A.

southbound API

B.

northbound API

C.

SDN controller

D.

packet forwarding engine

Full Access
Question # 23

A large enterprise customer is planning a new WAN connection to its headquarters The current architecture is dual homed with static routing but users complain when a specific link fails Failure of the other link does not affect any services or applications The new WAN connection must provide the headquarters with a resilient network design and increase the return on investment Which solution should be recommended to the customer?

A.

Implement granular quality of service on the links

B.

Procure additional bandwidth

C.

Use dynamic routing toward the WAN

D.

Add an additional link to the WAN

Full Access
Question # 24

In large-scale networks controllers needs to be able to process millions of flows per second without compromising the quality of the service What are two actions that must be implemented to address scaling limitations when deploying the network*? (Choose two.)

A.

Spirt the control logic functions between specialized data plane devices and controllers

B.

Deploy a high-throughput application platform

C.

Delegate work to the forwarding devices to reduce control plane overhead

D.

Deploy high performance controllers to increase the performance of the data plane

E.

Deploy authoritative switches to reduce the amount of controller workloads.

Full Access
Question # 25

A customer migrates from a traditional Layer 2 data center network Into a new SDN- based, spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. Which activity should be completed each time a legacy network is migrated?

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Full Access
Question # 26

What are two reasons for a company to prefer a hybrid approach rather than a mixed approach while transitioning to a software-defined network? (Choose two.)

A.

Mixed approach creates more complexity which makes troubleshooting more difficult

B.

Hybrid approach allows box-by-box transition to spread out the costs

C.

Mixed approach is more palatable to the small-size companies

D.

Hybrid approach allows to deploy portions of the network without impacting performance

E.

Hybrid approach is more palatable to the large-size companies

Full Access
Question # 27

The goal of a business continuity plan is to provide exhaustive information about backup sites and disaster recovery services, to specify who is responsible for business continuity planning and recovery efforts, and to define how different teams should respond Plans should also include step-by-step operational strategies to ensure operations during short-term and long-term disruptions Drag and drop the activities from the left onto the corresponding stages on the tight.

Full Access
Question # 28

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services If one ISP suffers loss or latency?

A.

Cloud onRamp gateway site

B.

Cloud onRamp SWG

C.

Cloud onRamp

D.

Cloud onRamp SaaS

Full Access
Question # 29

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Full Access
Question # 30

A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.

Project scope and weekly progress should be visualized by the management.

Always consider feedback and make changes accordingly during the project.

Should consider flexibility to change scope at the point of time.

Which project methodology meets the requirements and have the least impact on the outcome?

A.

Scrum

B.

LEAN

C.

Kanban

D.

Six-Sigma

Full Access
Question # 31

While positive feedback loops generally don ' t last long enough to bring down a network completely, they can still last long enough to disrupt traffic flows or to cause the network to converge more slowly than it should.

What are two examples of cases where a positive feedback loop can be long-lived and devastating to the network ' s control plane? (Choose two)

A.

During redistribution of reachability information between multiple control planes

B.

Modifying the flow of traffic through the network by steering traffic based on QoS attributes

C.

When input traffic volumes on an interfaces causes the interface queue to overflow.

D.

The rate at which the information earned in the various control plane protocols changes

E.

When more paths available in any given routing process than are installed in the routing table

Full Access
Question # 32

A bank recently had their security compromised during an initial key exchange between devices using a symmetric cryptography algorithm, and as a result the key was revealed/leaked. Going forward, they want to ensure that key exchanges are performed using asymmetric cryptography algorithms. Which algorithm offers the desired functionality?

A.

AES

B.

RSA

C.

RC4

D.

Diffie-Hellman

Full Access
Question # 33

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.

Full Access
Question # 34

What is the key strategy to address scalability challenges In the rapidly evolving digital landscape with resilient designs?

A.

Mitigate the impact of power outages.

B.

Minimize the distance.

C.

Identify potential bottlenecks.

D.

Optimize resource utilization.

Full Access
Question # 35

The advantages of a hybrid SDN/OSPF control plane are broadly recognized in the networking community, as it promises the best of two worlds: programmability and agility of SDN and the reliability and fault tolerance of OSPF, but there are tradeoffs. Which two challenges of a hybrid SDN control plane exist in an operational network? (Choose two.)

A.

forwarding anomalies due to uncorrected control planes

B.

distributed routing protocol for packet forwarding

C.

model optimization for network management

D.

total cost of ownership for migration to SDN

E.

increased forwarding information base size

Full Access
Question # 36

It is often seen that companies pick a cloud vendor solely based on technical preferences without putting enough weight on the business strategies that are driving the cloud initiatives Which strategic requirement may come into play where it is more likely that the decision makers will look to leverage laaS over SaaS or PaaS?

A.

selling products and services globally 24/7

B.

integration with partner or vendor supply chains

C.

control over the underlying infrastructure

D.

speed-to-market is more important for an initiative

Full Access
Question # 37

The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)

A.

remote black-Holing trigger

B.

prefix lists

C.

firewalls

D.

access control lists

E.

QoS policy propagation with BGP

Full Access
Question # 38

What is the best approach in a large legacy application migration scenario when the goal is to complete the migration in the shortest possible time?

A.

refactoring

B.

replatfoming

C.

rearchitecting

D.

rehosting

Full Access
Question # 39

When consumers that leverage laaS reach 100% resource capacity what can be used to redirect the overflow of traffic to the public cloud, so there is no disruption to service?

A.

cloud policing

B.

cloud bursting

C.

cloud spill

D.

cloud shaping

Full Access
Question # 40

A global e-commerce company is expanding its operations and planning to migrate its entire infrastructure to a hybrid cloud solution. They are concerned about data governance and want to ensure that their customers ' data is treated with utmost respect to sovereignty and privacy. What is an appropriate approach?

A.

Replicate customer data across all data centers globally to ensure data redundancy and compliance with local data regulations.

B.

Utilize a cloud provider that offers region-specific data centers to store customer data within the same geographic region.

C.

Encrypt all customer data and store it in a public cloud environment to benefit from advanced security measures.

D.

Implement strict access controls for customer data and store it in a single central data center to maintain data sovereignty.

Full Access
Question # 41

Comparing traditional networks with SDN, where the network is only application aware, what is the advantage of SDN architecture?

A.

has faster network convergence time during catastrophic failures

B.

is resilient to scale with fixed number of network devices

C.

integrates real-time information about networking activity with the applications

D.

simplifies device management by managing each device independently

Full Access
Question # 42

A mega store plans to expand its business into the online world, and wants to operate using the highest possible security standards to prove to their customers that they take handling of their payment information seriously. Only TLS v1.3 will be allowed on their websites. Which type of SSL certificate will emphasize their commitment to enforcing high security standards and minimize risk of spoofing?

A.

DV SSL certificate

B.

PV SSL certificate

C.

OV SSL certificate

D.

EV SSL certificate

Full Access
Question # 43

Drag and drop the right functional descriptions from the left onto the corresponding protocols on the right.

Full Access
Question # 44

Company XYZ plans to run OSPF on a DMVPN network They want to use spoke-to-spoke tunnels in the design What is a drawback or concern in this type of design?

A.

Additional host routes will be inserted into the routing tables

B.

Manual configuration of the spoke IP address on the hub will be needed

C.

There will be split-horizon issue at the hub

D.

Manual configuration of the spokes with the appropriate priority will be needed

Full Access
Question # 45

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over geographically dispersed dual data centers via CWDM

B.

synchronous replication over dual data centers via Metro Ethernet

C.

asynchronous replication over dual data centers via DWDM

D.

synchronous replication over geographically dispersed dual data centers via MPLS

Full Access
Question # 46

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

redundant AAA servers

B.

Control Plane Policing

C.

warning banners

D.

to enable unused services

E.

SNMPv3

F.

routing protocol authentication

Full Access
Question # 47

The Enterprise Edge infrastructure modules aggregate the connectivity from the various elements outside the campus—using various services and WAN technologies as needed typicaly provisioned from service providers and route the traffic into the Campus Core layer The Enterprise Edge modules perform security functions when enterprise resources connect across public networks and the internet Drag and drop the network device types from the left onto the corresponding modules on the right Not all options are used

Full Access
Question # 48

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

A.

multicast source registration to the RP

B.

multicast client registration to the RP

C.

first-hop router registration to the RP

D.

transport of all IPv6 multicast traffic

Full Access
Question # 49

Company XYZ has a multicast domain that spans across multiple autonomous systems The company wants to choose a technology that provides a simplified and controlled approach to interconnecting the multicast domains Which technology is the best fit for this purpose?

A.

PIM sparse mode

B.

MSDP

C.

MPLS

D.

PIM SSM

Full Access
Question # 50

A network architect is working on a large project involving migration to a software-defined networking platform, and is currently working on writing an executive summary for final approval by the management board. When writing the executive summary, What is a limitation of or challenges with software-defined networks that must be listed?

A.

Provides better flexibility but decreases the speed of service delivery.

B.

Difficulties in making significant improvements to service request response times.

C.

Virtualization inherently adds overhead and network latency.

D.

Often comes with a high CAPEX due to use of automation tools.

Full Access
Question # 51

An enterprise SDWAN customer based in the US has several branches in Europe Currently branches use the HQ in the US to access both internal and external services over an MPLS arcuit The design team has been tasked to suggest a solution allowing branches to access their cloud-based office productivity tools and services directly Since all their applications and services are hosted in the cloud, the design team has also been asked to come up with a solution, so branches can connect to the cloud directly from the branch as well Which two cost-effective and optimized solutions can be suggested? (Choose two)

cloud onRamp (SaaS)

A.

DIA

B.

software-defined cloud interconnects

C.

cloud SSO broker

D.

cloud hubs

Full Access
Question # 52

Company XYZ is designing the network for IPv6 security and they have these design

requirements:

A switch or router must deny access to traffic from sources with addresses that are correct, but are topologically incorrect

Devices must block Neighbor Discovery Protocol resolution for destination addresses that are not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Full Access
Question # 53

Scalability is a desirable attribute of a network, system, or process Poor scalability can result in poor system performance, necessitating the reengineering or duplication of systems Load scalability is the ability of a system to perform gracefully as traffic increases Which two problems can occur due to poor load scalability design? (Choose two )

A.

cannot fully take advantage of parallelism

B.

algorithmically intolerable

C.

limited size of a data structure

D.

repeatedly engaging in wasteful activity

E.

redundant message logging

Full Access
Question # 54

Refer to the exhibit. This network is running legacy STP 802.1 d. Assuming " hello_timer " is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

A.

The transit_delay = 5 and bpdu_delay = 20 are recommended values, considering hello_timer = 2 and specified diameter.

B.

Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802.1d to speed up STP convergence process.

C.

The max_age and forward_delay parameters can be adjusted to speed up STP convergence process.

D.

Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

Full Access
Question # 55

Indicate the nature of automation and orchestration tasks by dragging the tasks on the left to the corresponding category on the right in no particular order.

Full Access
Question # 56

Refer to the exhibit A customer network design team is planning a migration from a legacy TDM-based L2VPN to an MPLS-based L3VPN Migration is planned in a phased approach:

•OSPF backbone Link between HUB A and HUB B sites to be migrated to eBGP

•Spoke A2 and Spoke B1 will be migrated to the L3VPN

Which solution design can be considered to avoid routing loops during backbone link migration

A.

Enable route-filtering on OSPF backbone routers for spoke traffic

B.

Advertise low AD value for transit traffic on hub sites

C.

OSPF backbone area advertises summarized routes to hub.

D.

Redistribute EIGRP 200 and 300 with low cost into BGP

Full Access
Question # 57

Refer to the exhibit. A customer needs to implement a connectivity model by using one active link for inbound and outbound traffic and a second link for backup. The backup link is low speed and is required only during outages of the primary link. Which design solution should be implemented?

A.

Advertise a longer AS PATH to ISP 2. Increase the MED to ISP 2.

B.

Advertise more specific routes to ISP 1. Increase the local preference attribute of inbound BGP from ISP1.

C.

Advertise less specific routes to ISP 2. Increase the AS PATH inbound from ISP 1.

D.

Advertise a higher local preference to ISP 2. Increase the AS PATH inbound from ISP 1.

Full Access
Question # 58

As part of a design solution a consultant needs to describe the trade-offs between different SDN models Drag the characteristics on the left to the correct controller-based network designs on the right in no particular order.

Full Access
Question # 59

The first step to building en A! strategy is understanding how it helps achieve business goals and objectives Al-first scorecard is an assessment of your organization ' s readiness to adopt and integrate AI technologies to gauge your capabilities and align stakeholders. Which scorecard is useful to understand whether the organization ' s digital infrastructure is strong enough to ensure seamless, standardized data flow between systems with optimal performance?

A.

Transfer Capabilities

B.

Data Adoption

C.

Al Architecture

D.

Data Governance

Full Access
Question # 60

What are two advantages of the Agile project management methodology? (Choose two)

A.

brief but detailed feedback loops

B.

extensive documentation

C.

well-detailed and reliable budget estimates

D.

creation of shippable enhancements

E.

tight and rigid model

Full Access
Question # 61

A networking team needs to prevent spoofing attacks They are describing the different uRPF design use cases so they can identify and deploy the optimal mode in various parts of their network

Drag and drop the use cases from the left onto the corresponding uRPF technique on the right Not all options are used

Full Access