Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Cisco 400-007 Dumps

Page: 1 / 21
Total 206 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 1

An enterprise service provider is planning to migrate the customer network to MPLS to connect cloud applications The customer network team and service provider team are analyzing all process (tows before live migration and implementation Before planning the migration, what is a crucial task that must be executed?

Options:

A.

real-time process monitoring and maintenance

B.

impact forecasts and risk analysis

C.

application packaging and deployment

D.

impact analysis and application refactoring

Question 2

as

Refer to the exhibit. A company is running their data center based on VXLAN and BGP EVPN with stretched subnets for servers attaching to the edge devices being an important feature. The security team has defined a requirement where server group A must not be able to communicate with each other but is allowed to communicate with server group B. while servers in Group B must be able to communicate with all servers. Which scalable solution can be deployed to support these requirements?

Options:

A.

VACL

B.

VRF with route leaking

C.

private VLAN

D.

transparent firewall

Question 3

as

Refer to the exhibit. As part of a redesign project, you must predict multicast behavior . What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated*?

Options:

A.

It is switched given that no RPF check is performed.

B.

It is dropped due to an unsuccessful RPF check against the multicast receiver.

C.

It is dropped due to an unsuccessful RPF check against the multicast source.

D.

It is switched due to a successful RPF check against the routing table

Question 4

A software-defined network can be defined as a network with an API that allows applications to understand and react to the state of the network in near real time A vendor is building an SDN solution that exposes an API to the RIB and potentially the forwarding engine directly The solution provides off-box processes with the capability to interact with the routing table in the same way as a distributed routing process Which SDN framework model does the solution use?

Options:

A.

replace

B.

augmented

C.

hybrid

D.

distributed

Question 5

Drag and drop the right functional descriptions from the left onto the corresponding protocols on the right.

as

Options:

Question 6

Which design method is achieved by layering the network control plane above a redundant physical infrastructure?

Options:

A.

scalability

B.

manageability

C.

resilience

D.

modulanty

Question 7

What is the most important operational driver when building a resilient and secure modular network design?

Options:

A.

Reduce the frequency of failures requiring human intervention

B.

Minimize app downtime

C.

Increase time spent on developing new features

D.

Dependencies on hardware or software that is difficult to scale

Question 8

SD-WAN can be used to provide secure connectivity to remote offices, branch offices, campus networks, data centers, and the cloud over any type of IP-based underlay transport network. Which two statements describe SD WAN solutions? (Choose two.)

Options:

A.

SD-WAN networks are inherently protected against slow performance.

B.

Control and data forwarding planes are kept separate.

C.

Improved operational efficiencies result in cost savings.

D.

Solutions include centralized orchestration, control, and zero-touch provisioning.

E.

Solutions allow for variations of commodity and specialized switching hardware

Question 9

An architect receives a business requirement from a CTO that states the RTO for a new system should be 4 hours, and the RPO should be less than 1 hour. Business continuity must also be ensured in the event of a natural disaster. Which replication method and data center technology should be used?

Options:

A.

asynchronous replication over dual data centers via DWDM

B.

asynchronous replication over geographically dispersed dual data centers via CWDM

C.

synchronous replication over geographically dispersed dual data centers via MPLS

D.

synchronous replication over dual data centers via Metro Ethernet

Question 10

Which CIA triad principle is used by social media platforms to constitute a standard procedure of user IDs and passwords requirements?

Options:

A.

integrity

B.

confidentiality

C.

availability

D.

compliance

Question 11

When constraint-based routing is under consideration to be added to a network design, what are two inherent characteristics or impacts that must be considered? (Choose two)

Options:

A.

better network utilization

B.

stability in the route table

C.

high computation overhead

D.

smaller routing table size

E.

less resources than the shortest path

Question 12

Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF However they also want to prevent excess flooding of ISAs if there is a constantly flapping link on the network Which timers can help prevent excess flooding of LSAs for OSPF?

Options:

A.

OSPF throttling timers

B.

OSPF delay timer

C.

MPS OSPF flooding timers

D.

OSPF propagation timers

Question 13

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services If one ISP suffers loss or latency?

Options:

A.

Cloud onRamp gateway site

B.

Cloud onRamp SWG

C.

Cloud onRamp

D.

Cloud onRamp SaaS

Question 14

Which technique facilitates analytics and knowledge discovery in big data systems to recognize hidden and complex patterns?

Options:

A.

predictive monitoring

B.

deep learning

C.

traffic classification

D.

network mobility

Question 15

In large-scale networks controllers needs to be able to process millions of flows per second without compromising the quality of the service What are two actions that must be implemented to address scaling limitations when deploying the network*? (Choose two.)

Options:

A.

Spirt the control logic functions between specialized data plane devices and controllers

B.

Deploy a high-throughput application platform

C.

Delegate work to the forwarding devices to reduce control plane overhead

D.

Deploy high performance controllers to increase the performance of the data plane

E.

Deploy authoritative switches to reduce the amount of controller workloads.

Question 16

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?

Options:

A.

Redistributed using metric type 2 into OSPF

B.

Redistribute using metric type 1 into EIGRP

C.

Redistribute using metric type 1 into OSPF

D.

Redistribute using metric type 2 into EIGRP

Question 17

Organic growth or decline comes from a company ' s normal business activities, rather than through acquisitions or divestment. Changes in usage patterns can also cause organic change in network requirements Which tool is useful when designing and operationalizing a network that is in the process of change?

Options:

A.

change management

B.

modularity

C.

mobility

D.

Monitoring

Question 18

What is the best approach to ensure both scalability and high availability for a cloud-based storage solution over the IP network?

Options:

A.

Using a RAID (Redundant Array of Independent Disks) setup to provide data redundancy and improve performance.

B.

Deploying a Content Delivery Network (CDN) to cache and serve frequently accessed storage content.

C.

Implementing Network Attached Storage (NAS) devices in a clustered configuration for load balancing.

D.

Utilizing a Storage Area Network (SAN) with redundant controllers and paths for storage access.

Question 19

Drag and drop the high-level descriptions of network automation and network orchestration on the left to the corresponding category on the right in no particular order.

as

Options:

Question 20

as

Refer to the exhibit. An architect has been tasked to design an ISIS solution for a medium-size financial customer. The resulting design must meet these requirements:

as

Which two ISIS design aspects must be included? (Choose two.)

Options:

A.

Region-A and Region-B major routers establish passive ISIS peering with HQ router.

B.

Branch site routers and major site routers establish L2 adjacency.

C.

Region-A and Region-B major routers advertise a default route toward the other region.

D.

Different ISIS instances on HQ router to separate Region-A and Region-B.

E.

Branch site routers establish L1 adjacencies and major site routers establish L1/L2 adjacencies.

Question 21

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

Options:

A.

flow-based analysis to measure bandwidth mix of applications and their flows

B.

call management analysis to identify network convergence-related failures

C.

call management analysis to identify CAC failures and call quality issues

D.

active monitoring via synthetic probes to measure loss, latency, and jitter

E.

passive monitoring via synthetic probes to measure loss, latency, and jitter

F.

flow-based analysis with PTP time-stamping to measure loss, latency, and jitter

Question 22

Implementing a network automation architecture usually follows a phased approach that increases automation as the new technology and processes in the preceding phases are integrated and adopted. What provides a model that greatly simplifies the interaction with network devices?

Options:

A.

vendor specific configuration

B.

network device migration

C.

abstraction layer

D.

CI/CD framework

Question 23

Which two compliance audit functions are useful to meet business requirements? (Choose two.)

Options:

A.

risk prevention

B.

advise auditing

C.

audit monitoring

D.

risk identification audit resolution

Question 24

Indicate the nature of automation and orchestration tasks by dragging the tasks on the left to the corresponding category on the right in no particular order.

as

Options:

Question 25

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

Options:

A.

It can limit network scalability

B.

It can create microloops during reconvergence.

C.

It increases convergence time.

D.

It reduces convergence time.

Question 26

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?

Options:

A.

security management

B.

accounting management

C.

performance management

D.

fault management

Question 27

Which undesired effect of increasing the jitter compensation buffer is true?

Options:

A.

The overall transport jitter decreases and quality improves

B.

The overall transport jitter increases and quality issues can occur.

C.

The overall transport delay increases and quality issues can occur.

D.

The overall transport delay decreases and quality improves.

Question 28

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity, what must be deployed?

Options:

A.

daisy chaining

B.

linking

C.

service chaining

D.

bridging

E.

switching

Question 29

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke data propagation model must be set up Which two design considerations must be taken into account ? (Choose two)

Options:

A.

Configure all the sites as network type broadcast.

B.

The network type on all sites should be point-to-multipoint.

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Question 30

Two companies need to implement an extranet overlay network solution by using a VPN tunnel over the internet to use each other ' s HTTP REST APIs. The solution must only provide data integrity because data confidentiality will be covered at the application layer The existing firewall devices will be used as VPN endpoints for the tunnel but they have limited available resources Which type of VPN tunnel must be deployed for the extranet service?

Options:

A.

GRE olPsec

B.

GRE tunnel

C.

IPsec ESP

D.

IPsec AH

Question 31

Drag t he components that are part of the CIA triad to the correct target on the right. Not all components are used.

as

Options:

Question 32

Network designers often segment networks by creating modules for various reasons Sometimes however a network can be unintentionally segmented For instance, if the only way to connect a remote site to a headquarters or regional site is to connect them both to the public Internet the corporate network is now unintentionally segmented Which of the following option can be used to desegment the network in this situation?

Options:

A.

Build virtual networks that pass over the network

B.

Mark traffic for special handling through quality of service

C.

Configure little to no control data plane policy

D.

Block specific sources from reaching specific destinations

Question 33

By monitoring the effects of the design variations, you can characterize the relative resilience of the design. Which method involves disturbing the network by removing an active interface and monitoring how the change is handled by the network?

Options:

A.

randomized configuration

B.

nondeterministic analysis

C.

failover testing

D.

passive monitoring

Question 34

Which hybrid cloud environment enables businesses to more readily stage data-intensive and time-sensitive tasks closer to the source, which reduces latency, eases networking requirements, and improves data protection?

Options:

A.

edge computing

B.

application migration

C.

digital transformation

D.

distributed data processing

Question 35

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

Options:

A.

integrated actionable intelligence

B.

distributed enforcement

C.

threat-centric protection

D.

central command and control

Question 36

The API of an SDN controller named CTL-A uses the HTTP POST method and the same URL for all resources The JSON body of each message is used to get information for specific resources and operations The API of a SDN controller named CTL-B uses HTTP CRUD methods and a uniform interface with different URLs for each resource Which API type is used by each SDN controller?

Options:

A.

CTL-A uses a RESTful API and CTL-B has an HTTP-based API

B.

CTL-B uses a RESTful API and CTL-A has an HTTP-based API

C.

CTL-A and CTL-B have a non-RESTful API

D.

CTL-A and CTL-B have a RESTful API

Question 37

An Agile for Infrastructure transition often means dismantling traditional IT hierarchies and rebuilding it to align with business objectives and workflows Organizations are seeing the benefits of using automation tools in the network such as faster more efficient more effective delivery of products and services. Which two components help increasing overall productivity and improve company culture? (Choose two.)

Options:

A.

dedicated infrastructure

B.

controlled infrastructure

C.

DevOps practices

D.

Agile code practices

E.

infrastructure-as-code

Question 38

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

Options:

A.

Partial mesh

B.

Full mesh

C.

Ring

D.

Squared

E.

Triangulated

Question 39

A network automation team plans to develop tasks to configure services on a network by using a Python controller The configuration tasks must be implemented by using operations that support network-wide transactions The candidate configuration must be validated automatically for all targeted devices before being applied to each specific device What can be used to apply the configuration to the network devices?

Options:

A.

RESTCONF/YANG

B.

NETCONF/YANG

C.

CLI over SSH

D.

XML Agent TTY

Question 40

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

Options:

A.

control network

B.

mobile network

C.

metro network

D.

application network

E.

wide area network

Question 41

What is the key strategy to address scalability challenges In the rapidly evolving digital landscape with resilient designs?

Options:

A.

Mitigate the impact of power outages.

B.

Minimize the distance.

C.

Identify potential bottlenecks.

D.

Optimize resource utilization.

Question 42

A centralized control plane generally means one or more controllers gather the reachability and topology information from each switching device and calculate some part of the forwarding information at some place. How can a centralized control plane be defined or described?

Options:

A.

ability to detect and react to changes remotely at each device

B.

set of processes running in a virtual or physical machine

C.

protocol running on each device

D.

set of algorithms implemented on all devices

Question 43

What is a characteristic of a secure cloud architecture model?

Options:

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Question 44

A customer migrates from a traditional Layer 2 data center network Into a new SDN- based, spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. Which activity should be completed each time a legacy network is migrated?

Options:

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Question 45

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

Options:

A.

inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

B.

inherent topology flexibility with a service protection provided through a direct integration with an upper layer protocol

C.

inherent topology flexibility with built-in service protection

D.

ability to expand bandwidth over existing optical infrastructure

E.

inherent topology flexibility with intelligent chromatic dispersion

Question 46

Which two statements describe network automation and network orchestration? (Choose two)

Options:

A.

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms

B.

Network automation does not provide governance or policy management

C.

Network orchestration is used to run single, low-level tasks without human intervention

D.

Network automation spans multiple network services, vendors and environments

E.

Provisioning network services is an example of network automation

Question 47

Company XYZ is designing the network for IPv6 security and they have these design

requirements:

A switch or router must deny access to traffic from sources with addresses that are correct, but are topologically incorrect

Devices must block Neighbor Discovery Protocol resolution for destination addresses that are not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

Options:

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Question 48

The first step to building en A! strategy is understanding how it helps achieve business goals and objectives Al-first scorecard is an assessment of your organization ' s readiness to adopt and integrate AI technologies to gauge your capabilities and align stakeholders. Which scorecard is useful to understand whether the organization ' s digital infrastructure is strong enough to ensure seamless, standardized data flow between systems with optimal performance?

Options:

A.

Transfer Capabilities

B.

Data Adoption

C.

Al Architecture

D.

Data Governance

Question 49

A network architect is working on the baseline policies dealing with the use of Infrastructure-as-Code within an IT department, and has been requested to present the plan at the monthly management board meeting. What are two examples of operational aspects of Infrastructure-as-Code that can be highlighted during the presentation? (Choose two.)

Options:

A.

API for programmatic control

B.

automatic trouble ticketing

C.

automated workflows

D.

source code management repository

E.

telemetry and monitoring

Question 50

A large enterprise customer is planning a new WAN connection to its headquarters The current architecture is dual homed with static routing but users complain when a specific link fails Failure of the other link does not affect any services or applications The new WAN connection must provide the headquarters with a resilient network design and increase the return on investment Which solution should be recommended to the customer?

Options:

A.

Implement granular quality of service on the links

B.

Procure additional bandwidth

C.

Use dynamic routing toward the WAN

D.

Add an additional link to the WAN

Question 51

Scalability is a desirable attribute of a network, system, or process Poor scalability can result in poor system performance, necessitating the reengineering or duplication of systems Load scalability is the ability of a system to perform gracefully as traffic increases Which two problems can occur due to poor load scalability design? (Choose two )

Options:

A.

cannot fully take advantage of parallelism

B.

algorithmically intolerable

C.

limited size of a data structure

D.

repeatedly engaging in wasteful activity

E.

redundant message logging

Question 52

Before migrating anything to the cloud, what are three cloud readiness assessment steps that are required to perform? (Choose three.)

Options:

A.

Determine the geolocation requirement

B.

Determine the technology obsolescence

C.

Identify the scope and business cases for migration.

D.

Assess infrastructure requirements.

E.

Evaluate available in-house resources

F.

Assess database security requirements

G.

Assess the cloud brokerage solutions

Question 53

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

Options:

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Question 54

Comparing traditional networks with SDN, where the network is only application aware, what is the advantage of SDN architecture?

Options:

A.

has faster network convergence time during catastrophic failures

B.

is resilient to scale with fixed number of network devices

C.

integrates real-time information about networking activity with the applications

D.

simplifies device management by managing each device independently

Question 55

risk is a major determining factor in whether a company chooses to go with a public cloud, a private, or a hybrid of both. what are two factors that impact the decision on which cloud service placement model to use? (choose two)

Options:

A.

cross zone redundancy

B.

regulation

C.

organization skills

D.

legacy architectures

E.

data ownership

Question 56

Setting a specific goal for throughput based on per-second data rates between end hosts does not identify the requirements for specific applications When specifying throughput goals for applications, it is important to understand the throughput requirements for each application Which two factors that can constrain application layer throughput? (Choose two.)

Options:

A.

protocol parameters, such as frame size and retransmission timers

B.

sent packets or cells at networking devices

C.

the pps or cps rate of networking devices

D.

workstation and server availability

E.

end-to-end throughput rates

Question 57

as

Refer to the exhibit Which two design options reduce the size of OSPF database in the shown topology? (Choose two.)

Options:

A.

Loop Free Alternate

B.

type 3 LSA filtering

C.

prefix suppression

D.

Layer 2 link aggregation between core switches

E.

incremental SPF

Question 58

PaaS provides a cloud-based platform for developing, running, managing applications. Users access the PaaS through a GUI, where development or DevOps teams can collaborate on all their work across the entire application lifecycle including coding, integration, testing, delivery, deployment, and feedback. Which benefit does an organization get by using PaaS?

Options:

A.

improved access

B.

comprehensive security

C.

improved responsiveness

D.

faster time to market

Question 59

When consumers that leverage laaS reach 100% resource capacity what can be used to redirect the overflow of traffic to the public cloud, so there is no disruption to service?

Options:

A.

cloud policing

B.

cloud bursting

C.

cloud spill

D.

cloud shaping

Question 60

A customer has a functional requirement that states HR systems within a data center must be segmented from other systems that reside in the same data center and same VLAN The systems run legacy applications by using hard-coded IP addresses with all HR systems dedicated to 129 to 254 of the 10 20.20 0/24 prefix Which segmentation method is optimal for the customer?

Options:

A.

transparent firewalling

B.

VACLs on data center switches

C.

routed firewalls

D.

data center perimeter firewalling

Question 61

Company XYZ has designed their network to run GRE over IPsec on their Internet- based VPN to connect two sites Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?

Options:

A.

unnel Mode in IPsec Phase I

B.

Transport Mode in IPsec Phase I

C.

Tunnel Mode in IPsec Phase II

D.

Transport Mode in IPsec Phase II

Page: 1 / 21
Total 206 questions