Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

400-007 Questions and Answers

Question # 6

An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

A.

Deploy a root controller to gather a complete network-level view.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

C.

Build direct physical connectivity between different controllers.

D.

Use OpenFlow to implement and adapt new protocols.

Full Access
Question # 7

A network architect must redesign a service provider edge, where multiservice and multitenant PEs are currently present. Which design feature should be minimized in the new design to achieve reliability?

A.

bridging

B.

fate sharing

C.

redundancy

D.

unicast overlay routing

Full Access
Question # 8

Which BGP feature provides fast convergence?

A.

BGP PIC |

B.

BGP-EVPN

C.

BGP FlowSpec

D.

BGP-LS

Full Access
Question # 9

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Full Access
Question # 10

Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?

A.

After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval

B.

After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval

C.

Timers renegotiate indefinitely, so the timer exchange phase never converges

D.

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

Full Access
Question # 11

During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward

• Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years

• Network bandwidth capacity requirements are dynamic and are expected to change over the next year

• If new technologies are to be introduced, operational expenses must be kept at a minimum. Which cloud strategy meets these requirements?

A.

private

B.

hybrid

C.

public

D.

multicloud

Full Access
Question # 12

Which development model is closely associated with traditional project management?

A.

static model

B.

Agile model

C.

evolutionary delivery model

D.

lifecycle model

Full Access
Question # 13

A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets shold the IPS forward for BFD to work under all circumstances?

A.

Fragmented packet with the do-not-fragment bit set

B.

IP packets with broadcast IP source addresses

C.

IP packets with the multicast IP source address

D.

IP packet with the multicast IP destination address

E.

IP packets with identical source and destination IP addresses

F.

IP packets with the destination IP address 0.0.0.0.

Full Access
Question # 14

Which mechanism provides Layer 2 fault isolation between data centers?

A.

fabric path

B.

OTV

C.

advanced VPLS

D.

LISP

E.

TRILL

Full Access
Question # 15

For a company that offers online billing systems for their customers, which strategy ensures the RPO is kept as low as possible?

A.

cloud backup to mirror data

B.

spare onsite disks

C.

periodic snapshot of data

D.

backup on external storage

Full Access
Question # 16

What are two descriptions of network optimization? (Choose two.)

A.

maintain high availability

B.

proactive network management

C.

network redesign

D.

network health maintenance

E.

identify network requirements

Full Access
Question # 17

In a redundant hub and spoke "wheel" design, all spokes are connected to the hub, and spokes are connected to other spokes as well. During failure on one spoke link, the traffic from that site can be sent to a neighboring site for it to be forwarded to the hub site. But during peak hours, a link is overloaded and traffic is re-routed to a neighbor, which subsequently becomes overloaded. This overload results in network traffic oscillation as the load varies at each spoke site. This design provides more redundancy but not more resiliency because the routing protocol must process many alternate paths to determine the lowest cost path. Which two design

changes help to improve resilience in this case? (Choose two.)

A.

Increase the number of redundant paths considered during the routing convergence calculation.

B.

Eliminate links between every spoke.

C.

Increase routing protocol convergence timers.

D.

Increase unequal-cost parallel paths.

E.

Use two links to each remote site instead of one.

Full Access
Question # 18

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

routing protocol authentication

B.

SNMPv3

C.

Control Plane Policing

D.

redundant AAA servers

E.

warning banners

F.

to enable unused services

Full Access
Question # 19

Refer to the exhibit.

For Company XYZ Bangkok is using ECMP to reach the 172 20 2 0/24 network The company wants a design that would allow them to forward traffic from 172 16 2 0/24 toward 172 20 2 0/24 via the Singapore router as the preferred route The rest of the traffic should continue to use ECMP Which technology fulfills this design requirement?

A.

policy-based routing

B.

route summarization

C.

unequal-cost load balancing using variance

D.

LFA

Full Access
Question # 20

Which option is a fate-sharing characteristic in regards to network design?

A.

A failure of a single element causes the entire service to fail

B.

It protects the network against failures in the distribution layer

C.

It acts as a stateful forwarding device

D.

It provides data sequencing and acknowledgment mechanisms

Full Access
Question # 21

Which solution component helps to achieve rapid migration to the cloud for SaaS and public cloud leveraging SD-WAN capabilities?

A.

service-oriented cloud architecture

B.

Cloud onramp

C.

cloud registry

D.

microservices in the cloud

Full Access
Question # 22

Which best practice ensures data security in the private cloud?

A.

Use IPsec for communication between unsecured network connection

B.

Encrypt data at rest and in transition.

C.

Use the same vendor for consistent encryption.

D.

Anonymize data ownership to comply with privacy rules.

Full Access
Question # 23

Refer to the exhibit.

The network 10.10.0 .0/16 has been redistributed to OSPF processes and the best path to the destination from R1 has been chosen as R1-R2-R3 A failure occurred on the link between R2 and R3 and the path was changed to R1-R4-R5-R3 What happens when the link between R2 and R3 is restored'?

A.

The path R1-R4-R5-R3 continues to be the best path because the metric is better

B.

The path reverts back to R1-R2-R3 because the route type is E1

C.

The path R1-R4-R5-R3 continues to be the best path because OSPF does not compare the metrics between two domains

D.

The path reverts to R1-R2-R3 because this was the previous best path

Full Access
Question # 24

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

A.

first-hop router registration to the RP

B.

multicast client registration to the RP

C.

multicast source registration to the RP

D.

transport of all IPv6 multicast traffic

Full Access
Question # 25

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?

A.

Assigning unique Route Distinguishers

B.

Assigning unique Route Target ID'S

C.

Assigning unique IP address space for the Enterprise NAT/Firewalls

D.

Assigning unique VRF ID's to each L3VPN

Full Access
Question # 26

QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3. A high availability application is synchronizing data between host A and host B. To increase chance of delivery the same data is sent twice from host A on two different NICs toward the two NICs on host B.

Which solution must be deployed in the network to ensure that any failure in the network does not trigger data loss on host B?

A.

EIGRP with feasible successors

B.

BFD

C.

IP Fast Reroute

D.

Static routes

Full Access
Question # 27
A.

low bandwidth

B.

security

C scalability

C.

high latency

Full Access
Question # 28

As part of a new network design documentation, you are required to explain the reason for choosing cisco FabricPath for Layer 2 loop avoidance.

Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network?

(Choose two)

A.

MAC tunneling

B.

IS-IS multipath

C.

RPF check

D.

TTL header

Full Access
Question # 29

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )

A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Full Access
Question # 30

Two routers R1 and R2 are directly connected through an Ethernet link Both routers are running OSPF. OSPF has been registered with BFD and BFD is running in asynchronous mode with the echo function enabled Which two actions occur that are related to the echo function? (Choose two)

A.

BFD control packets are sent at a slower pace because the echo function is enabled

B.

BFD echo packets are sent from forwarding engines along the Layer 2 path to perform detection

C.

BFD control packets are sent at a higher pace because the echo function is enabted

D.

Only BFD control packets are sent from forwarding engines along the Layer 2 path to perform detection

E.

DUMPS BFD sessions at either end actively participate in the forwarding of echo packets

Full Access
Question # 31

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

A.

CPU and memory usage on the spoke routers

B.

memory usage on the hub router

C.

CPU usage on the hub router

D.

interface buffers on the hub and spoke routers

Full Access
Question # 32

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

A.

PIM dense mode with RP located at the hub

B.

PIM sparse mode with RP located at each remote site

C.

PIM sparse mode with RP located at the hub

D.

PIM dense mode with RP located at each remote site

Full Access
Question # 33

Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:

• Securely transfer the corporate data over the private WAN

• Use a centralized configuration model.

• Minimize overhead on the tunneled traffic.

Which technology can be used in the new design to meet the company's requirements?

A.

S-VTI

B.

DMVPN

C.

MGRE

D.

GET VPN

Full Access
Question # 34

Refer to the exhibit.

Company XYZ must design a DMVPN tunnel between the three sites Chicago is going to act as the NHS and the company wants DMVPN to detect peer endpoint failures Which technology should be used m the design?

A.

VPLS

B.

IP SLA

C.

GRE

D.

L2TPv3

Full Access
Question # 35

What is the most important operational driver when building a resilient and secure modular network design?

A.

Reduce the frequency of failures requiring human intervention

B.

Minimize app downtime

C.

Increase time spent on developing new features

D.

Dependencies on hardware or software that is difficult to scale

Full Access
Question # 36

Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :

    Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.

    Use the Internet as the underlay for the private WAN.

    Securely transfer the corporate data over the private WAN.

Which two technologies should be Incorporated into the design of this network? (Choose two.)

A.

S-VTI

B.

IPsec

C.

DMVPN

D.

GET VPN

E.

PPTP

Full Access
Question # 37

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization Which IETF standard technology can provide this requirement?

A.

data center bridging

B.

unified fabric

C.

Transparent Interconnection of Lots of Links

D.

fabric path

Full Access
Question # 38

Scrum is a subset of Agile and is a lightweight process framework for Agile development Which role becomes the interface between the business the customers and their product-related needs on one side and the Team on the other?

A.

Product Owner

B.

Product Manager

C.

Scrum Master

D.

Program Manager

Full Access
Question # 39

You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Full Access
Question # 40

An engineer must redesign the QoS strategy for Company XYZ The current network is experiencing many dropped packets due to oversubscription of the guaranteed bandwidth allocated by the service provider. Company XYZ wants a design with a QoS strategy that controls the traffic flow leaving the Edge router to minimize packet drops Which QoS technique can be recommended as a solution?

A.

LLQ

B.

traffic shaping

C.

rate-limiting

D.

policing

Full Access
Question # 41

Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two)

A.

DAI

B.

IP Source Guard

C.

BEEP

D.

CPPr

E.

MPP

Full Access
Question # 42

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

A.

wide area network

B.

mobile network

C.

metro network

D.

application network

E.

control network

Full Access
Question # 43

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)

A.

service provider agreement to support tuned timers

B.

manual updates to the peer groups

C.

service provider scheduling of changes to the PE

D.

number of routes on the CE router

E.

number of VRFs on the PE router

Full Access
Question # 44

A consultant needs to evaluate project management methodologies for a new service deployment on the existing network of a customer. The customer wants to be involved in the end-to-end project progress and be provided with frequent updates. The customer also wants the ability to change the requirements if needed, as the project progresses. Which project management methodology should be used?

A.

three principles

B.

phased

C.

Agile

D.

Waterfall

Full Access
Question # 45

A large enterprise customer is planning a new WAN connection to its headquarters. The current architecture is

dual homed with static routing, but users complain when a specific link fails. Failure of the other link does not

affect any services or applications. The new WAN connection must provide the headquarters with a resilient

network design and increase the return on investment.

Which solution should be recommended to the customer?

A.

Implement granular quality of service on the links.

B.

Procure additional bandwidth.

C.

Use dynamic routing toward the WAN.

D.

Add an additional link to the WAN.

Full Access
Question # 46

Which type of interface are OpenFlow and OpFlex?

A.

southbound interface

B.

eastbound interface

C.

cloud-bound interface

D.

northbound interface

Full Access
Question # 47

Which encoding format does cisco ios XE software support for NETCONF?

A.

It supports HTML encoding for NETCONF

B.

It supports YAML encoding for NETCONF

C.

It supports XML encoding for NETCONF

D.

It supports JSON encoding for NETCONF

Full Access
Question # 48

You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server The performance is only approximately 700 Mbps and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner?

A.

Change the protocol to CIFS.

B.

Increase the queue to at least 1 GB

C.

Use a WRED random drop policy

D.

Enable the TCP Nagle algorithm on the receiver

Full Access
Question # 49

Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?

A.

LDAP

B.

EAP

C.

TACACS+

D.

RADIUS

Full Access
Question # 50

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Full Access
Question # 51

Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries? (Choose two.)

A.

AD manipulation

B.

matching OSPF external routes

C.

route tagging

D.

route tagging

E.

route filtering

F.

matching EIGRP process ID

Full Access
Question # 52

Refer to the exhibit.

OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?

A.

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

B.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

C.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

D.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

Full Access
Question # 53

Company XYZ has designed their network to run GRE over IPsec on their Internet-based VPN to connect two sites. Which IPsec tunneling feature can they enable to optimize the data flow while ensuring that the headers contain no duplicate IP addresses?

A.

Transport Mode in IPsec Phase I

B.

Transport Mode in IPsec Phase II

C.

Tunnel Mode in IPsec Phase II

D.

Tunnel Mode in IPsec Phase I

Full Access
Question # 54

A network architect in an enterprise is designing a network policy for certain database applications. The goal of the policy is to allow these applications to access the internet directly, whereas other user and network applications that communicate with systems or users outside their own network must be routed through the data center. The focus is on achieving higher availability and a better user experience for the database applications, but switching between different network paths based on performance characteristics must be supported.

Which solution meets these requirements?

A.

MPLS L3VPN with QoS

B.

Cloud onRamp for laaS

C.

Cloud onRamp for SaaS

D.

MPLS direct connect

Full Access
Question # 55

You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels

B.

Choose a high minimum data rate to reduce the duty cycle.

C.

increases the number of SSlDs to load-balance the client traffic.

D.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

E.

Enable 802.11n channel bonding on both 2.4 GHz and 5 GHz to increase the maximum aggregated cell throughput.

Full Access
Question # 56

The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)

A.

access control lists

B.

firewalls

C.

QoS policy propagation with BGP

D.

remote black-holing trigger

E.

prefix lists

Full Access
Question # 57

Drag and drop the end-to-end network virtualization elements from the left onto the correct network areas on the right.

Full Access
Question # 58

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Full Access
Question # 59

What statement describes the application layer as defined in the software-defined networking architecture?

A.

This layer is responsible for collecting the network status such as network usage and topology.

B.

This layer contains programs that communicate their desired network behavior to controllers.

C.

This layer is responsible for handling packets based on the rules provided by the controller.

D.

This layer processes the instructions and requirements sent by networking components.

Full Access
Question # 60

Which two application requirements are mandatory tor traffic to receive proper treatment when placed in the priority queue? (Choose two.)

A.

small transactions (HTTP-like behavior)

B.

WRED drop treatment

C.

tolerance to packet loss

D.

intolerance to jitter

E.

TCP-based application

Full Access
Question # 61

Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

A.

southbound APIs

B.

northbound APIs

C.

orchestration layer

D.

SDN controller

Full Access
Question # 62

Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements:

    Only the loopback address of each of the enterprise CE X and Y routers must be advertised to the interconnecting service provider cloud network.

    The transport layer must carry the VPNv4 label and VPN payload over the MP-BGP control plane.

    The transport layer must not be under service provider control.

Which enterprise WAN transport virtualization technique meets the requirements?

A.

EIGRP Over the Top

B.

MPLS over BGP over multipoint GRE

C.

DMVPN per VRF

D.

point-to-point GRE per VRF

Full Access
Question # 63

What is a country-specific requirement that data is subject to the laws of the country in which it is collected or processed and must remain within its borders?

A.

data sovereignty

B.

data rationality

C.

data inheritance

D.

data replication

Full Access
Question # 64

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity what must be deployed?

A.

bridging

B.

service chaining

C.

linking

D.

daisy chaining

E.

switching

Full Access
Question # 65

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

A.

Enforce risk-based and adaptive access policies.

B.

Assess real-time security health of devices.

C.

Apply a context-based network access control policy for users.

D.

Ensure trustworthiness of devices.

Full Access
Question # 66

Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)

A.

workload

B.

work domain

C.

workplace

D.

workgroup

E.

workspace

Full Access
Question # 67

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?

A.

routed firewall

B.

VLAN ACLs on the switch

C.

transparent firewall

D.

zone-based firewall on the Layer 3 device

Full Access
Question # 68

Which tool automates network implementation activities and shortens the implementation lifecycle?

A.

LISP

B.

Java

C.

Conclusion

D.

Python

Full Access
Question # 69

Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two)

A.

Bandwidth utilization increases

B.

Traffic flows are suboptimal

C.

High-end routers are required to support NFV

D.

OpenFlow must be supported in the network

E.

An SDN orchestration layer is required to support NFV

Full Access
Question # 70

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network Which network threat is SNMPv3 effective against?

A.

man-in-the-middle attack

B.

masquerade threats

C.

DDoS attack

D.

brute force dictionary attack

Full Access
Question # 71

Company XYZ plans to run OSPF on a DMVPN network. They want to use spoke-to-spoke tunnels in the design What is a drawback or concern in this type of design?

A.

Additional host routes will be inserted into the routing tables

B.

Manual configuration of the spokes with the appropriate priority will be needed

C.

There will be split-horizon issue at the hub

D.

Manual configuration of the spoke IP address on the hub will be needed

Full Access
Question # 72

Which interface between the controller and the networking device enables the two to communicate and allows the controller to program the data plane forwarding tables of the networking device?

A.

controller interface

B.

southbound interface

C.

application programming interface

D.

northbound interface

Full Access
Question # 73

An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate this during the migration phase?

A.

Deploy controllers, deploy SD-WAN edge routers. In the data center, and migrate branch sites.

B.

Migrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers.

C.

Migrate branch sites, migrate data center WAN routers, and deploy controllers.

D.

Deploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites

Full Access
Question # 74

Refer to the exhibit.

This network is running OSPF as the routing protocol. The internal networks are being advertised in OSPF London and Rome are using the direct link to reach each other although the transfer rates are better via Barcelona Which OSPF design change allows OSPF to calculate the proper costs?

A.

Change the OSPF reference bandwidth to accommodate faster links.

B.

Filter the routes on the link between London and Rome

C.

Change the interface bandwidth on all the links.

D.

Implement OSPF summarisation to fix the issue

Full Access
Question # 75

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

A.

data governance

B.

additional latency

C.

security

D.

cloud connectivity

Full Access
Question # 76

The cloud like the Internet is a massive network of independent resources that are designed to be fault tolerant Software components that run in the cloud have no dependencies on the underlying infrastructure which may fail at any time Which two constraints of REST are important when building cloud-based solutions'? (Choose two )

A.

separation of resources from representation

B.

migration of resources by representations

C.

distribution of resources through platforms

D.

hyper-scale as the engine of application state

E.

self-descriptive messages

Full Access
Question # 77

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

A.

Control Plane Protection using queue thresholding on the transit subinterface

B.

Control Plane Protection using port filtering on the transit subinterface

C.

Control Plane Protection using port filtering on the main interface

D.

Control Plane Protection using queue thresholding on the host subinterface

E.

Control Plane Protection using port filtering on the host subinterface

Full Access
Question # 78

Backups and mirror-copies of data are an essential part of RPO solutions If a business wants to reduce their CAPEX for disaster recovery, which of the following solutions are applicable?

A.

Perform an annual cyber security assessment or penetration test

B.

Renew backup software annually to get the newest version of the console and stay protected

C.

Migrate parts of or all the infrastructure to the cloud

D.

Build a redundant infrastructure for business continuity / disaster recovery purposes at another location

Full Access
Question # 79

Which two design option are available to dynamically discover the RP in an IPv6 multicast network? (Choose

two)

A.

embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Full Access
Question # 80

What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?

A.

NPIV

B.

NFVIS

C.

NFV

D.

VNF

Full Access
Question # 81

Company XYZ wants to prevent switch loops caused by unidirectional point-point-link condition on Rapid FVST + and MST. Which technology can be used in the design to meet this requirement?

A.

STPBPDU guard

B.

STP bridge assurance

C.

MSTP

D.

TRILL

Full Access
Question # 82

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke 'J

A.

Configure all the sites as network type broadcast

B.

The network type on all sites should be point-to-multipoint

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Full Access
Question # 83

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

A.

geographically dispersed data centers with asynchronous replication

B.

a single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

geographically dispersed data centers with synchronous replication

D.

a single data center with duplicated infrastructure and dual PSUs

Full Access
Question # 84

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

A.

confidential

B.

serviceability

C.

reliability

D.

availability

E.

integrity

F.

scalability

Full Access
Question # 85

Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Full Access
Question # 86

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

A.

Control Plane Protection host subinterface

B.

Control Plane Protection main interface

C.

Control Plane Protection transit subinterface

D.

Control Plane Protection CEF-exception subinterface

Full Access
Question # 87

Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Full Access
Question # 88

The line between security and compliance is easily blurred and is, to a large extent, a moving target Drag and drop each of the requirements on the left to the appropriate section on the right

Full Access
Question # 89

A large enterprise customer has a single router that uses two active/active 10-Mbps internet links in one of its

offices. Each link currently handles approximately 7 Mbps of traffic, which is close to the full link capacity.

When a link fails, the failure leads to significantly degraded performance of all applications. Static routing is

used. The current ISP cannot deliver additional bandwidth capacity on the existing links. The customer needs

a network design that is resistant to failure, but does not increase CAPEX. Which solution should be proposed

to the customer?

A.

Implement quality of service on the current links.

B.

Add a third link to the current router.

C.

Add an additional edge router connected to a second ISP.

D.

Use dynamic routing for equal-cost multipath.

Full Access
Question # 90

Which methodology is the leading lifecycle approach to network design and implementation?

A.

PPDIOO

B.

Waterfall model

C.

Spiral model

D.

V model

Full Access
Question # 91

The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner However the company network does not support BFD Which other feature can be used to fulfill the design requirement?

A.

STP

B.

fast hello

C.

LFA

D.

DPD

Full Access
Question # 92

An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?

A.

Implement route reflectors on the two core routers

B.

Increase the memory on the core routers

C.

Implement e BGP between the core and distribution routers

D.

Increase the memory on the distribution routers

E.

Increase bandwidth between the core routers

Full Access
Question # 93

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Full Access
Question # 94

Which relationship between IBGP and the underlying physical topology is true?

A.

iBGP full mesh requirement does not dictate any specific network topology.

B.

iBGP can worn only on a ring network topology with a link-state protocol like OSPF or IS-IS

C.

iBGP full mesh requires an underlying fully meshed network topology.

D.

iBGP does not work on a ring network topology even with an underlying IGP.

Full Access
Question # 95

Company XYZ wants design recommendations for Layer 2 redundancy (using Layer 2 technologies) The company wants to prioritize flexibility and scalability elements in the new design Which two technologies help meet these requirements'? (Choose two)

A.

Avoid stretching VLANs across switches

B.

Use switch clustering at the distnbution layer where possible

C.

Configure DHCP snooping on the switches

D.

Use Unidirectional Link Detection

E.

Use root guard

Full Access
Question # 96

An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?

A.

class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

class-based traffic shaping

Full Access
Question # 97

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

Full Access
Question # 98

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

C.

Apply strong encryption for transmission of cardholder data across public networks.

D.

Protect all user systems against malware and frequently update antivirus software

E.

Maintain a policy that addresses information security for employees and third parties.

Full Access
Question # 99

Which two characteristics are associated with 802 1s? (Choose two)

A.

802.1s supports up to 1024 instances of 802.1

B.

802.1 s is a Cisco enhancement to 802.1w.

C.

802.1s provides for faster convergence over 802 1D and PVST+.

D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

E.

802.1s maps multiple VLANs to the same spanning-tree instance

Full Access
Question # 100

Refer to the exhibit.

The enterprise customer wants to stream one-way video from their head office to eight branch offices using multicast. Their current service provider provides a Layer3 VPN solution and manages the CE routers, but they do not currently support multicast. Which solution quickly allows this multicast traffic to go through while allowing for future scalability?

A.

Enable a GRE tunnel between nodes CE1 and CE2

B.

Enable a GRE tunnel between nodes C2 and C4

C.

Enable a GRE tunnel between nodes C1 and C4

D.

Implement hub and spoke MPLS VPN over DMVPN (also known as 2547o DMVPN) between CE1 and CE2

E.

The service provider must provide a Draft Rosen solution to enable a GRE tunnel between nodes PE1 and PE2

Full Access
Question # 101

You want to split an Ethernet domain in two.

Which parameter must be unique in this design to keep the two domains separated?

A.

VTP domain

B.

VTP password

C.

STP type

D.

VLAN ID

Full Access
Question # 102

Refer to the exhibit.

This network is running legacy STP 802.1 d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

A.

The transit_delay=5 and dpdu_delay=20 are recommended values, considering helto_timer=2 and specified

B.

Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802. to speed up STP convergence process C. The max_age and forward delay parameters can be adjusted to speed up STP convergence process.

C.

Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

Full Access
Question # 103

An organization is working on a design solution for a new Internet-based remote access virtual private network that has 1000 remote sites. A network administrator recommends GETVPN as the model What is a potential problem of using GETVPN in this situation?

A.

GETVPN is not scalable to a large number of remote sites

B.

GETVPN key servers would be on public hacker-reachable space and need higher security

C.

GETVPN and DMVPN do not interoperate

D.

GETVPN requires a high level of background traffic to maintain its IPsec SAs

Full Access
Question # 104

A customer migrates from a traditional Layer 2 data center network into a new SDN-based. spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2 Which activity should be completed each time a legacy network is migrated?

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Full Access
Question # 105

Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF However they also want to prevent excess flooding of LSAs if there is a constantly flapping link on the network Which timers can help prevent excess flooding of LSAs for OSPF?

A.

OSPF propagation timers

B.

OSPF throttling timers

C.

OSPF delay timers

D.

OSPF flooding timers

Full Access
Question # 106

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design. Which two technologies are recommended? (Choose two.)

A.

Design MLAG/MC-LAG into the network wherever possible.

B.

Configure DHCP snooping on the switches.

C.

Use root guard.

D.

Use BPDU guard.

E.

Use UniDirectional Link Detection.

Full Access
Question # 107

Company XYZ wants to implement an IPS device to detect and block well-known attacks against their network They want a design solution where all packets that are forwarded to the network are checked against a signature database before being allowed through This check must be done with the minimum effect on performance. Which design is recommended?

A.

Deploy an IPS behind the firewall in promiscuous mode

B.

Deploy an IPS in front of the firewall in promiscuous mode

C.

Deploy an IPS behind the firewall in in-line mode

D.

Deploy and IPS in front of the firewall in in-line mode

Full Access
Question # 108

What are two examples of business goals to be considered when a network design is built? (Choose two.)

A.

standardize resiliency

B.

minimize operational costs

C.

integrate endpoint posture

D.

ensure faster obsolescence

E.

reduce complexity

Full Access
Question # 109

Network changes because of mergers, acquisitions, and divestment can be very disruptive to the network if not carried out carefully. When an organization sells parts of its business, it must detach the affected parts of the network from the rest of the network. Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?

A.

redundant design

B.

modular design

C.

less complex design

D.

routed access design

Full Access
Question # 110

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

A.

It can limit network scalability

B.

It can create microloops during reconvergence

C.

It increases convergence time.

D.

It reduces convergence time.

Full Access
Question # 111

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN data center within the same location Its applications cannot be readdressed and the customer does not want to perform the migration in a single operation How should the legacy network and new network be connected?

A.

via Layer 3 links to border leaf switches

B.

via a Layer 2 trunk and Layer 3 routed links to border leaf switches

C.

via a Layer 2 trunk and Layer 3 routed links to spine switches

D.

via a Layer 2 trunk to border leaf switches

Full Access
Question # 112

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

A.

too many overlapping controls

B.

too many disparate solutions and technology silos

C.

an overabundance of manual processes

D.

a network security skills shortage

Full Access
Question # 113

An enterprise has identified these causes for inefficient CAPEX spending:

    CAPEX planning is driven by technology and not by business objectives.

    The CAPEX planning team lacks the data it needs to perform due diligence tasks.

    The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

B.

CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully.

C.

Adopt new organizational models that promote real accountability for ROI. not just revenue. EBITDA, and cash.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Full Access
Question # 114

An IT services company offers cloud services to a banking customer. The banking customer has raised a ticket about unauthorized access and data loss. They use an authentication token on a mobile phone for authenticating access to the cloud platform from their local applications. The security response team has determined that the attacker used a phishing scheme in an effort to replace the token allowing them to direct the banking data to which policy change can help prevent identical situations in the future ?

A.

Monitor connections to unknown cloud instances through the use of SSL decryption

B.

Monitor all API interfacing to the storage platform for suspicious activity

C.

Monitor any access from the outside except for expected operational areas of an organization

D.

Monitor the privileges for users that are making changes in the firewall configuration.

Full Access