Pre-Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

400-007 Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Questions 4

The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner However the company network does not support BFD Which other feature can be used to fulfill the design requirement?

Options:

A.

STP

B.

fast hello

C.

LFA

D.

DPD

Buy Now
Questions 5

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

Options:

A.

access

B.

core

C.

collapsed core

D.

distribution

Buy Now
Questions 6

Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two )

The group-pacing timer controls the interval that is used for group and individual LSA refreshment

Options:

A.

OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size

B.

OSPF retransmission-pacing timers allow control of interpacket spaang between consecutive link-state update packets in the OSPF retransmission queue.

C.

OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue.

D.

OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue

Buy Now
Questions 7

What is the most important operational driver when building a resilient and secure modular network design?

Options:

A.

Reduce the frequency of failures requiring human intervention

B.

Minimize app downtime

C.

Increase time spent on developing new features

D.

Dependencies on hardware or software that is difficult to scale

Buy Now
Questions 8

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?

Options:

A.

MSDP

B.

PIM SSM

C.

MPLS

D.

PIM sparse mode

Buy Now
Questions 9

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

Options:

A.

map IP CoS bits into the IP Precedence field

B.

map flow-label bits into the Exp field

C.

map IP precedence bits into the DSCP field

D.

map DSCP bits into the Exp field

Buy Now
Questions 10

A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

Options:

A.

EIGRP

B.

IS-IS

C.

OSPF

D.

BGP

Buy Now
Questions 11

Which two pain points are the most common for container technology adoption? (Choose two)

Options:

A.

Performance

B.

Security

C.

Cost

D.

Container deployment

E.

Skilled staff

F.

Compliance

Buy Now
Questions 12

Customer XYZ network consists of an MPLS core. IS-IS running as IGP a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

Options:

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Buy Now
Questions 13

You are designing a large-scale DMVPN network with more than 500 spokes using EIGRP as the IGP protocol Which design option eliminates potential tunnel down events on the spoke routers due to the holding time expiration?

Options:

A.

Increase the hold queue on the physical interface of the hub router.

B.

Increase the hold queue on the tunnel interface of the spoke routers

C.

Increase the hold queue on the tunnel interface of the hub router

D.

Apply QoS for pak_priority class

E.

Increase the hold queue on the physical interface of the spoke routers.

Buy Now
Questions 14

Which two descriptions of CWDM are true? (Choose two)

Options:

A.

typically used over long distances, but requires optical amplification

B.

uses the 850nm band

C.

allows up to 32 optical earners to be multiplexed onto a single fiber

D.

shares the same transmission window as DWDM

E.

Passive CWDM devices require no electrical power

Buy Now
Questions 15

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

Options:

A.

confidential

B.

serviceability

C.

reliability

D.

availability

E.

integrity

F.

scalability

Buy Now
Questions 16

An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?

Options:

A.

EoMPLS-based VPLS can carry multicast traffic in a scalable manner

B.

Use a mesh of GRE tunnels to carry the streams between sites

C.

Enable snooping mechanisms on the provider PE routers.

D.

Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites

Buy Now
Questions 17

Which encoding format does cisco ios XE software support for NETCONF?

Options:

A.

It supports HTML encoding for NETCONF

B.

It supports YAML encoding for NETCONF

C.

It supports XML encoding for NETCONF

D.

It supports JSON encoding for NETCONF

Buy Now
Questions 18

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

Options:

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

BPDU filtering

Buy Now
Questions 19

Refer to the exhibit.

400-007 Question 19

OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?

Options:

A.

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

B.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

C.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

D.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

Buy Now
Questions 20

A large enterprise customer has a single router that uses two active/active 10-Mbps internet links in one of its

offices. Each link currently handles approximately 7 Mbps of traffic, which is close to the full link capacity.

When a link fails, the failure leads to significantly degraded performance of all applications. Static routing is

used. The current ISP cannot deliver additional bandwidth capacity on the existing links. The customer needs

a network design that is resistant to failure, but does not increase CAPEX. Which solution should be proposed

to the customer?

Options:

A.

Implement quality of service on the current links.

B.

Add a third link to the current router.

C.

Add an additional edge router connected to a second ISP.

D.

Use dynamic routing for equal-cost multipath.

Buy Now
Questions 21

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

Options:

A.

device resiliency

B.

device type

C.

network type

D.

network resiliency

E.

network size

Buy Now
Questions 22

Drag and drop the correct mitigation methods from the left onto the corresponding types of attack on the right

400-007 Question 22

Options:

Buy Now
Questions 23

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

Options:

A.

cryptography

B.

confidentiality

C.

authorization

D.

identification

E.

integrity

F.

availability

Buy Now
Questions 24

In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?

Options:

A.

Jenkins

B.

Ansible

C.

Perl

D.

Chef

Buy Now
Questions 25

Company XYZ plans to run OSPF on a DMVPN network. They want to use spoke-to-spoke tunnels in the design What is a drawback or concern in this type of design?

Options:

A.

Additional host routes will be inserted into the routing tables

B.

Manual configuration of the spokes with the appropriate priority will be needed

C.

There will be split-horizon issue at the hub

D.

Manual configuration of the spoke IP address on the hub will be needed

Buy Now
Questions 26

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?

Options:

A.

routed firewall

B.

VLAN ACLs on the switch

C.

transparent firewall

D.

zone-based firewall on the Layer 3 device

Buy Now
Questions 27

A private cloud is accessed over the private IT network infrastructure that is potentially vulnerable to violations, data leaks, and man-in- the-middle attacks. The security team is evaluating the following solutions to address the challenges:

•Encrypt data at rest and in transition.

•Use strong identity and access management (IAM) capabilities.

•Communicate the inherent data security risks to your customers and end-users.

Assuming that adoption of a hybrid cloud model is likely to occur within the next 12 months, which two solutions can also help provide protection in a hybrid cloud environment? (Choose two.)

Options:

A.

Avoid automating the scanning and remediation of security controls using open-source tooling

B.

Practice SSH network protocols for data communication between unsecured network connections

C.

Implement a common protective methodology for the same information at rest or motion at different points of time

D.

Provide distributed management and visibility across the infrastructure instead of centralized management

E.

Apply cryptographic protocols to secure data transmission over the network

Buy Now
Questions 28

You were tasked to enhance the security of a network with these characteristics:

• A pool of servers is accessed by numerous data centers and remote sites

• The servers are accessed via a cluster of firewalls

• The firewalls are configured properly and are not dropping traffic

• The firewalls occasionally cause asymmetric routing of traffic within the server data center.

Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

Options:

A.

Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.

B.

Deploy uRPF strict mode.

C.

Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.

D.

Deploy uRPF loose mode

Buy Now
Questions 29

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

Options:

A.

system-oriented architecture

B.

OSASE architecture

C.

platform-oriented architecture

D.

SASE architecture

Buy Now
Questions 30

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.

400-007 Question 30

Options:

Buy Now
Questions 31

A software-defined networking (SDN) controller teams network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers Each policy is represented as a RIB entry in the control plane of the router Which SDN model has been implemented?

Options:

A.

SDN centralized

B.

SDN traffic engineering

C.

SD-WAN

D.

SDN hybrid

Buy Now
Questions 32

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?

Options:

A.

Allow VoIP and the custom application to share the same priority queue,

B.

The custom application and VoIP must be assigned their own separate priority queue.

C.

Interleave the custom application with other TCP applications in the same CBWR

D.

Avoid placing the custom application in a CBWFQ queue that contains other

Buy Now
Questions 33

With virtualization being applied in many parts of the network every physical link is likely to carry one or more virtual links, but what is a drawback in cases like this?

Options:

A.

unneeded tunneling

B.

fate sharing

C.

bandwidth utilization

D.

serialization delay

Buy Now
Questions 34

An enterprise service provider is designing the network for a customer who runs a video application in both a centralized and distributed fashion The team has looked at the following parameters

•The available bandwidth for branches and the associated cost

•Video resource cost

•Usage patterns at hub-and-spoke sites.

•Call agent bridge selection algorithm

Which key piece of information is missing and needs to be taken into consideration in order to determine the correct resource allocation model?

Options:

A.

video traffic jitter and delay

B.

type of video resources

C.

transport protocol and traffic engineering

D.

network management and monitoring

Buy Now
Questions 35

Company XYZ has two offices connected to each other over unequal redundant paths and they are running OSPF as the routing protocol An external network architect recommends BFD for OSPF Which effect would BFD have in the case of a link failure?

Options:

A.

It would drop the dead per detection time to a single hello

B.

It would keep an alternate path ready in case of a link failure

C.

It would optimize the route summarization feature of OSPF

D.

It would detect that the neighbor is down in a subsecond manner

Buy Now
Questions 36

Company XYZ has multiple production units and marketing departments across the region The current network is a mixture of point-to-point links and MPLS Layer 3 VPN service from the provider. The Info-Sec team has suggested to isolate production traffic end-to-end with an encryption over the transport network to comply with the HIPAA standard Which solution must be used in their design if Company XYZ wants a quick roll out”?

Options:

A.

IPsec point-to-point tunnels over the MPLS and point-to-point links provide an isolated and encrypted packet end-to-end

B.

GETVPN can be implemented over the MPLS provider which provides a payload encryption without the overhead of the tunnelling

C.

A firewall can be placed centrally to filter out the traffic based on required ports

D.

VRF-Lite can be implemented toward the downstream network and VRF-based tunnels combined with IPsec can be implemented over the service provider

Buy Now
Questions 37

Organic growth or decline comes from a company's normal business activities, rather than through acquisitions or divestment. Changes in usage patterns can also cause organic change in network requirements Which tool is useful when designing and operationalizing a network that is in the process of change?

Options:

A.

change management

B.

modularity

C.

mobility

D.

monitoring

Buy Now
Questions 38

While access lists are generally associated with routers and firewalls, they can also be applied on layer 2 interfaces and to VLANs to provide granular security. Which are two benefits of using layer 2 access lists for segmentation? (Choose two.)

Options:

A.

traffic filtering

B.

contextual filtering

C.

containing lateral attacks

D.

reduced load at layer 2

E.

VLAN intercept

Buy Now
Questions 39

Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

Options:

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Buy Now
Questions 40

Creating a network that functions as a strategic part of the business rather than simply being a cost center, starts with a good understanding of business requirements and processes What specific type of knowledge helps to create high-level LAN WAN. and data center designs that support and enable the business?

Options:

A.

risk assessment

B.

monitoring and management of data

C.

understanding of data flows

D.

recovery time of the system s functionality

Buy Now
Questions 41

Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)

Options:

A.

Increase WAN bandwidth

B.

Increase memory branch switch.

C.

Fragment data packets.

D.

Replace any electrical links with optical links

E.

Prioritize voice packets

Buy Now
Questions 42

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

Options:

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.

B.

Control plane policers are really needed only on externally facing devices.

C.

Control plane policers can cause the network management systems to create false alarms.

D.

Control plane policers must be processed before a forwarding decision is made.

E.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.

Buy Now
Questions 43

One of the approaches used in cloud bursting scenarios is distributed load-balanced, which operate the workloads in tandem between a public cloud and a data center In which way can the characteristics of distributed load-balancing be described?

Options:

A.

Simultaneously provisions cloud resources

B.

Usually uses cloud APIs for communication.

C.

Useful for testing and proof-of-concept projects

D.

Useful for large but temporary cloud deployments

Buy Now
Questions 44

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)

Options:

A.

conduct risk analyses

B.

install firewalls

C.

use antivirus software

D.

establish monitoring policies

E.

establish risk management policies

Buy Now
Questions 45

Refer to the exhibit.

400-007 Question 45

As part of a redesign project, you must predict multicast behavior What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated*?

Options:

A.

It is dropped due to an unsuccessful RPF check against the multicast source

B.

It is switched give that no RPF check is performed

C.

It is switched due to a successful RPF check against the routing table

D.

It is dropped due to an unsuccessful RPk8t8ck against the multicast receiver.

Buy Now
Questions 46

Options:

A.

low bandwidth

B.

security

C scalability

C.

high latency

Buy Now
Questions 47

A network architect in an enterprise is designing a network policy for certain database applications. The goal of the policy is to allow these applications to access the internet directly, whereas other user and network applications that communicate with systems or users outside their own network must be routed through the data center. The focus is on achieving higher availability and a better user experience for the database applications, but switching between different network paths based on performance characteristics must be supported.

Which solution meets these requirements?

Options:

A.

MPLS L3VPN with QoS

B.

Cloud onRamp for laaS

C.

Cloud onRamp for SaaS

D.

MPLS direct connect

Buy Now
Questions 48

Which statement about hot-potato routing architecture design is true?

Options:

A.

Hot-potato routing is the preferred architecture when connecting to content providers

B.

Hop-potato keeps traffic under the control of the network administrator for longer

C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric

D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks

Buy Now
Questions 49

An enterprise organization currently provides WAN connectivity to their branch sites using MPLS technology, and the enterprise network team is considering rolling out SD-WAN services for all sites.

With regards to the deployment planning, drag and drop the actions from the left onto the corresponding steps on the right.

400-007 Question 49

Options:

Buy Now
Questions 50

Which two design option are available to dynamically discover the RP in an IPv6 multicast network? (Choose

two)

Options:

A.

embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Buy Now
Questions 51

The network designer needs to use GLOP IP address in order make them unique within their ASN, which

multicast address range will be considered?

Options:

A.

239.0.0.0 to 239.255.255.255

B.

224.0.0.0 to 224.0.0.255

C.

233.0.0.0 to 233.255.255.255

D.

232.0.0.0 to 232.255.255.255

Buy Now
Questions 52

Cost is often one of the motivators for a business to migrate from a traditional network to a software- defined network. Which design decision is directly influenced by CAPEX drivers?

Options:

A.

scalability

B.

stability

C.

complexity

D.

manageability

Buy Now
Questions 53

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

Options:

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

separates infrastructure and policy

C.

uses policy-based forwarding of real-time traffic with less complexity

D.

unifies the WAN backbone

E.

manages failures through backup links

Buy Now
Questions 54

Refer to the exhibit.

400-007 Question 54

Company XYZ must design a DMVPN tunnel between the three sites Chicago is going to act as the NHS and the company wants DMVPN to detect peer endpoint failures Which technology should be used m the design?

Options:

A.

VPLS

B.

IP SLA

C.

GRE

D.

L2TPv3

Buy Now
Questions 55

Network designers often segment networks by creating modules for various reasons Sometimes however a network can be unintentionally segmented For instance, if the only way to connect a remote site to a headquarters or regional site is to connect them both to the public Internet the corporate network is now unintentionally segmented Which of the following option can be used to desegment the network in this situation?

Options:

A.

Build virtual networks that pass over the network

B.

Mark traffic for special handling through quality of service

C.

Configure little to no control data plane policy

D.

Block specific sources from reaching specific destinations

Buy Now
Questions 56

A European government passport agency considers upgrading its IT systems to increase performance and workload flexibility in response to constantly changing requirements. The budget manager wants to reduce capital expenses and IT staff and must adopt the lowest-cost technology. Which technology choice is suitable?

Options:

A.

on premises

B.

private cloud

C.

public cloud

D.

hybrid cloud

Buy Now
Questions 57

Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)

Options:

A.

The Reported Distance from a successor is lower than the local Feasible Distance.

B.

The Reported Distance from a successor is higher than the local Feasible Distance.

C.

The feasibility condition does not need to be met.

D.

The Feasible Distance from a successor is lower than the local Reported Distance.

E.

A feasible successor must be present.

Buy Now
Questions 58

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN data center within the same location Its applications cannot be readdressed and the customer does not want to perform the migration in a single operation How should the legacy network and new network be connected?

Options:

A.

via Layer 3 links to border leaf switches

B.

via a Layer 2 trunk and Layer 3 routed links to border leaf switches

C.

via a Layer 2 trunk and Layer 3 routed links to spine switches

D.

via a Layer 2 trunk to border leaf switches

Buy Now
Questions 59

When consumers that leverage laaS reach 100% resource capacity, what can be used to redirect the overflow of traffic to the public cloud so there is no disruption to service?

Options:

A.

cloud policing

B.

cloud spill

C.

cloud bursting

D.

cloud shaping

Buy Now
Questions 60

Which design consideration is valid when you contrast fabricPath and trill?

Options:

A.

FabricPath uses IS-IS, but TRILL uses VxLAN

B.

FabricPath permits active-active FHRP and TRILL support anycast gateway.

C.

FabricPath Permits ECMP, but TRILL does not

D.

FabricPath permits active-active mode, but TRILL supports only active-standby mode.

Buy Now
Questions 61

Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

Options:

A.

southbound APIs

B.

northbound APIs

C.

orchestration layer

D.

SDN controller

Buy Now
Questions 62

Which two foundational aspects of loT are still evolving and being worked on by the industry at large? (Choose two)

Options:

A.

WiFi protocols

B.

Regulatory domains

C.

Low energy Bluetooth sensors

D.

loT consortia

E.

Standards

Buy Now
Questions 63

A network hacker is trying to interrupt the transport packet on IPSEC. A packet with duplicate sequence numbers is introduced. The customer sends high-priority traffic during this window. Which design parameter should be considered to mitigate this issue?

Options:

A.

Classify and Mark duplicate sequence packets.

B.

Apply anti-replay window 4096.

C.

Restrict keywork in IPSEC Tunnel.

D.

Increase QoS shape policy.

Buy Now
Questions 64

Refer to the exhibit.

400-007 Question 64

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

Options:

A.

community

B.

MED

C.

local preference

D.

As path

Buy Now
Questions 65

An architect designs a multi-controller network architecture with these requirements:

    Achieve fast failover to control traffic when controllers fail.

    Yield a short distance and high resiliency in the connection between the switches and the controller.

    Reduce connectivity loss and enable smart recovery to improve the SDN survivability.

    Improve connectivity by adding path diversity and capacity awareness for controllers.

Which control plane component of the multi-controller must be built to meet the requirements?

Options:

A.

control node reliability

B.

controller stale consistency

C.

control path reliability

D.

controller clustering

Buy Now
Questions 66

Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)

Options:

A.

workload

B.

work domain

C.

workplace

D.

workgroup

E.

workspace

Buy Now
Questions 67

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design. Which two technologies are recommended? (Choose two.)

Options:

A.

Design MLAG/MC-LAG into the network wherever possible.

B.

Configure DHCP snooping on the switches.

C.

Use root guard.

D.

Use BPDU guard.

E.

Use UniDirectional Link Detection.

Buy Now
Questions 68

Company XYZ is planning to deploy primary and secondary (disaster recovery) data center sites. Each of these sites will have redundant SAN fabrics and data protection is expected between the data center sites. The sites are 100 miles (160 km) apart and target RPO/RTO are 3 hrs and 24 hrs, respectively. Which two considerations must Company XYZ bear in mind when deploying replication in their scenario? (Choose two.)

Options:

A.

Target RPO/RTO requirements cannot be met due to the one-way delay introduced by the distance between sites.

B.

VSANs must be routed between sites to isolate fault domains and increase overall availability.

C.

Synchronous data replication must be used to meet the business requirements

D.

Asynchronous data replication should be used in this scenario to avoid performance impact in the primary site.

E.

VSANs must be extended from the primary to the secondary site to improve performance and availability.

Buy Now
Questions 69

Which relationship between IBGP and the underlying physical topology is true?

Options:

A.

iBGP full mesh requirement does not dictate any specific network topology.

B.

iBGP can worn only on a ring network topology with a link-state protocol like OSPF or IS-IS

C.

iBGP full mesh requires an underlying fully meshed network topology.

D.

iBGP does not work on a ring network topology even with an underlying IGP.

Buy Now
Questions 70

Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network?

(Choose two)

Options:

A.

BFD

B.

Ti-LFA

C.

minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Buy Now
Questions 71

An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

Options:

A.

Deploy a root controller to gather a complete network-level view.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

C.

Build direct physical connectivity between different controllers.

D.

Use OpenFlow to implement and adapt new protocols.

Buy Now
Questions 72

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

Options:

A.

partial mesh

B.

full mesh

C.

ring

D.

squared

E.

triangulated

Buy Now
Questions 73

Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?

Options:

A.

Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value.

B.

Redistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the ext value and the value is the same in all ASBRs.

C.

Enable OSPF load-balancing over unequal cost path.

D.

Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external internal values.

Buy Now
Questions 74

Your company utilizes many different types of network transports and you want to increase the efficiency of the network Which solution can be used to improve network efficiency over PPPoE IPsec, and GRE networks'?

Options:

A.

PMTUD

B.

OATM

C.

IRDP

D.

Host Discovery Protocol

Buy Now
Questions 75

Company XYZ is in the process of identifying which transport mechanism(s) to use as their WAN technology. Their main two requirements are.

• a technology that could offer DPI, SLA, secure tunnels, privacy, QoS, scalability, reliability, and ease of management

• a technology that is cost-effective

Which WAN technology(ies) should be included in the design of company XYZ?

Options:

A.

Software-defined WAN should be the preferred choice because it complements both technologies, covers all the required features, and it is the most cost-effective solution.

B.

Internet should be the preferred option because it is cost effective and supports BFD, IP SLA. and IPsec for secure transport over the public Internet.

C.

Both technologies should be used. Each should be used to back up the other one; where the primary links are MPLS, the internet should be used as a backup link with IPsec (and vice versa).

D.

MPLS meets all these requirements and it is more reliable than using the Internet. It is widely used with defined best practices and an industry standard.

Buy Now
Questions 76

Refer to the exhibit.

400-007 Question 76

This network is running OSPF as the routing protocol. The internal networks are being advertised in OSPF London and Rome are using the direct link to reach each other although the transfer rates are better via Barcelona Which OSPF design change allows OSPF to calculate the proper costs?

Options:

A.

Change the OSPF reference bandwidth to accommodate faster links.

B.

Filter the routes on the link between London and Rome

C.

Change the interface bandwidth on all the links.

D.

Implement OSPF summarisation to fix the issue

Buy Now
Questions 77

Retef to the exhibit.

400-007 Question 77

An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain EIGRP routes are getting redistributed into OSPF ,OSPF area 20 has routers with limited memory and CPU resources The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222 routes to How in Which OSPF area type fulfills this design requirement?

Options:

A.

area 20 as a stub area

B.

type 5 LSA filtering on the ASBR between EIGRP 111 and area a

C.

area 20 as a NSSA area

D.

type 3 LSA filtering on the ABR between area 0 area 20

Buy Now
Questions 78

Refer to the exhibit.

400-007 Question 78

A new high availability DB sever cluster is installed in the network.

These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.

Which solution supports these requirements?

Options:

A.

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.

Add secondary links to REP segments 1 and 2

C.

Add two new links between SW1 and SW2 configured as REP segment 3

D.

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Buy Now
Questions 79

A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. Recently, they added a new branch to their network. Due to physical security concerns, they want to extend their existing IP CCTV network of the head office to the new branch, without any routing changes in the network. They are also under some time constraints. What is the best approach to extend the existing IP CCTV network to the new branch, without incurring any IP address changes?

Options:

A.

GRE

B.

L2TPv3

C.

VXLAN

D.

EoMPLS

Buy Now
Questions 80

Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)

Options:

A.

Fast transport

B.

Reliability

C.

QoS classification and marking boundary

D.

Fault isolation

E.

Redundancy and load balancing

Buy Now
Questions 81

A business wants to refresh its legacy Frame Relay WAN. It currently has product specialists in each of its 200 branches but plans to reduce and consolidate resources. The goal is to have product specialists available via video link when customers visit the nationwide branch offices. Which technology should be used to meet this objective?

Options:

A.

DMVPN phase 1 network over the Internet

B.

Layer 3 MPLS VPN hub and spoke

C.

Layer2VPLS

D.

Layer 3 MPLS VPN full mesh

Buy Now
Questions 82

Which two data plane hardening techniques are true? (Choose two)

Options:

A.

warning banners

B.

redundant AAA servers

C.

Control Plane Policing

D.

SNMPv3

E.

infrastructure ACLs

F.

disable unused services

G.

routing protocol authentication

Buy Now
Questions 83

A software-defined network can be defined as a network with an API that allows applications to understand and react to the state of the network in near real time. A vendor is building an SDN solution that exposes an API to the RIB and potentially the forwarding engine directly. The solution provides off-box processes with the capability to interact with the routing table in the same way as a distributed routing process. Which SDN framework model does the solution use?

Options:

A.

replace

B.

augmented

C.

hybrid

D.

distributed

Buy Now
Questions 84

A business requirement is supplied to an architect from a car manufacturer stating their business model is changing to just-in-time manufacturing and a new network is required, the manufacturer does not produce all of the specific components m-house. which area should the architect focus on initially?

Options:

A.

Automation

B.

Zero Trust Networking

C.

Low Latency Infrastructure

D.

Modularity

Buy Now
Questions 85

Scrum is a subset of Agile and is a lightweight process framework for Agile development Which role becomes the interface between the business the customers and their product-related needs on one side and the Team on the other?

Options:

A.

Product Owner

B.

Product Manager

C.

Scrum Master

D.

Program Manager

Buy Now
Questions 86

A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?

Options:

A.

Static Routes for Route Leaking

B.

Policy Based Routing

C.

OSPF per VRF Instance

D.

Multi-Protocol BGP

Buy Now
Questions 87

An international media provider is an early adopter of Docker and micro services and is using an open-source homegrown container orchestration system. A few years ago, they migrated from on-premises data centers to the cloud Now they are faced with challenges related to management of the deployed services with their current homegrown orchestration system.

Which platform is well-suited as a state-aware orchestration system?

Options:

A.

Puppet

B.

Kubemetes

C.

Ansible

D.

Terraform

Buy Now
Questions 88

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

Options:

A.

data governance

B.

additional latency

C.

security

D.

cloud connectivity

Buy Now
Questions 89

What best describes the difference between Automation and Orchestration?

Options:

A.

Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions.

B.

Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that require the network administrator to coordinate

C.

Automation refers to an automatic process for completing multiple tasks with conditions and Orchestration refers to executing tasks in parallel.

D.

Automation refers to scripting languages (Python. Ansible etc.) and Orchestration refers to commercial products that control configuration deployment

Buy Now
Questions 90

Two enterprise networks must be connected together. Both networks are using the same private IP addresses.

The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload

feature to save IF addresses from the NAT pools. Which design addresses this requirement using only one

Cisco I OS NAT router for both directions?

Options:

A.

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT, with overload in

both directions.

B.

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload

option in both directions.

C.

The overload feature is the default and does not have to be configured.

D.

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands

for the overload feature in both directions.

E.

The Nat Virtual interface must be used to achieve this requirement.

Buy Now
Questions 91

Which two features describe controller-based networking solutions compared to traditional networking solutions? (Choose two.)

Options:

A.

inflate licensing costs

B.

reduce network configuration complexity

C.

provide centralization of primary IT functions

D.

allow for fewer network failures

E.

increase network bandwidth usage

Buy Now
Questions 92

A customer migrates from a traditional Layer 2 data center network into a new SDN-based. spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2 Which activity should be completed each time a legacy network is migrated?

Options:

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Buy Now
Questions 93

Drag and drop the optical technology design characteristics on the left to the correct optical technologies on the right. Not all options are used

400-007 Question 93

Options:

Buy Now
Questions 94

A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.

    Project scope and weekly progress should be visualized by the management.

    Always consider feedback and make changes accordingly during the project.

    Should consider flexibility to change scope at the point of time.

Which project methodology meets the requirements and have the least impact on the outcome?

Options:

A.

Scrum

B.

LEAN

C.

Kanban

D.

Six-Sigma

Buy Now
Questions 95

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

Options:

A.

threat-centric protection

B.

integrated actionable intelligence

C.

distributed enforcement

D.

central command and control

Buy Now
Questions 96

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

Options:

A.

routing protocol authentication

B.

SNMPv3

C.

Control Plane Policing

D.

redundant AAA servers

E.

warning banners

F.

to enable unused services

Buy Now
Questions 97

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

Options:

A.

inside global

B.

outside global

C.

inside local

D.

outside local

Buy Now
Questions 98

End users are moving swiftly toward a hybrid cloud model to support faster IT service delivery. To implement a hybrid cloud architecture, what are two critical requirements for broader cloud service provider and vendor interoperability in terms of cloud security and compliance? (Choose two.)

Options:

A.

cloud integration and data security

B.

tighter controls based on dynamic policy enforcement

C.

security event and data interoperability

D.

flexible controls based on policy application

E.

orchestration and cross cloud access security

Buy Now
Questions 99

An IT services company offers cloud services to a banking customer. The banking customer has raised a ticket about unauthorized access and data loss. They use an authentication token on a mobile phone for authenticating access to the cloud platform from their local applications. The security response team has determined that the attacker used a phishing scheme in an effort to replace the token allowing them to direct the banking data to which policy change can help prevent identical situations in the future ?

Options:

A.

Monitor connections to unknown cloud instances through the use of SSL decryption

B.

Monitor all API interfacing to the storage platform for suspicious activity

C.

Monitor any access from the outside except for expected operational areas of an organization

D.

Monitor the privileges for users that are making changes in the firewall configuration.

Buy Now
Questions 100

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

Options:

A.

PIM dense mode with RP located at the hub

B.

PIM sparse mode with RP located at each remote site

C.

PIM sparse mode with RP located at the hub

D.

PIM dense mode with RP located at each remote site

Buy Now
Questions 101

Refer to the table.

400-007 Question 101

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The solution must provide a single 10G connection between locations and be able to run its own varying QoS profiles without service provider interaction based on the migration stages. All connectivity methods are at 10 Gbps. Which transport technology costs the least if the connectivity is required for just one year?

Options:

A.

MPLS wires only

B.

CWDM over dark fiber

C.

DWDM over dark fiber

D.

Metro Ethernet

Buy Now
Questions 102

QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3. A high availability application is synchronizing data between host A and host B. To increase chance of delivery the same data is sent twice from host A on two different NICs toward the two NICs on host B.

400-007 Question 102

Which solution must be deployed in the network to ensure that any failure in the network does not trigger data loss on host B?

Options:

A.

EIGRP with feasible successors

B.

BFD

C.

IP Fast Reroute

D.

Static routes

Buy Now
Questions 103

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?

Options:

A.

The Layer 1 and Layer 2 domains can easily overlap

B.

It reduces the complexity of the Layer 1 domains

C.

It can be applied to any kind of topology

D.

The Layer 2 domain is contained and more stable

Buy Now
Questions 104

Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops What do you answer?

Options:

A.

VXLAN offers native loop avoidance mechanism

B.

Storm Control should be enabled on all ports

C.

VPC+ could prevent L2 loop on access ports

D.

BPDU Guard should be enabled on all VTEP access ports

Buy Now
Questions 105

Drag and drop the multicast protocols from the left onto the current design situation on the right.

400-007 Question 105

Options:

Buy Now
Questions 106

400-007 Question 106

Refer to the exhibit A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)

Options:

A.

Enable unicast heartbeat messages to be periodically exchanged between MEPs

B.

Enable Connectivity Fault Management on the SP switches

C.

Use upward maintenance endpoints on the SP switches

D.

Forward E-LMI PDUs over VPLS

E.

Forward LLD PDUs over the VPLS

Buy Now
Questions 107

Which function is performed at the access layer of the three-layer hierarchical network design model?

Options:

A.

fault isolation

B.

QoS classification and marking boundary

C.

reliability -

D.

fast transport

E.

redundancy and load balancing

Buy Now
Questions 108

Which DCI technology utilizes a “flood and learn” technique to populate the Layer2 forwarding table?

Options:

A.

LISP

B.

OTV

C.

VPLS

D.

EVPN

Buy Now
Questions 109

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

Options:

A.

It can limit network scalability

B.

It can create microloops during reconvergence

C.

It increases convergence time.

D.

It reduces convergence time.

Buy Now
Questions 110

IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?\

Options:

A.

performance monitoring

B.

security

C.

observation of critical links

D.

capacity planning

Buy Now
Questions 111

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

Options:

A.

Control Plane Protection using queue thresholding on the transit subinterface

B.

Control Plane Protection using port filtering on the transit subinterface

C.

Control Plane Protection using port filtering on the main interface

D.

Control Plane Protection using queue thresholding on the host subinterface

E.

Control Plane Protection using port filtering on the host subinterface

Buy Now
Questions 112

Which development model is closely associated with traditional project management?

Options:

A.

static model

B.

Agile model

C.

evolutionary delivery model

D.

lifecycle model

Buy Now
Questions 113

A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs Which consideration supports the new business requirement?

Options:

A.

VDI servers should be contained centrally within a DMZ

B.

The thin client traffic should be placed in a WAN QoS priority queue

C.

VDI servers should be contained within dedicated VLANs in each branch location

D.

The WAN should offer low latency and be resized

Buy Now
Questions 114

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Options:

A.

Use two phantom RP addresses

B.

Manipulate the administration distance of the unicast routes to the two RPs

C.

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.

Advertise the two RP addresses in the routing protocol

E.

Use anycast RP based on MSDP peering between the two RPs

F.

Control routing to the two RPs through a longest match prefix

Buy Now
Exam Code: 400-007
Exam Name: Cisco Certified Design Expert (CCDE v3.1)
Last Update: Mar 11, 2025
Questions: 381

PDF + Testing Engine

$239.6  $599

Testing Engine

$179.6  $449
buy now 400-007 testing engine

PDF (Q&A)

$159.6  $399
buy now 400-007 pdf