Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

400-007 Questions and Answers

Question # 6

Company XYZ wants to implement an IPS device to detect and block well-known attacks against their network They want a design solution where all packets that are forwarded to the network are checked against a signature database before being allowed through This check must be done with the minimum effect on performance Which design is recommended?

A.

Deploy an IPS behind the firewall in in-line mode.

B.

Deploy an IPS in front of the firewall in in-line mode.

C.

Deploy an IPS behind the firewall in promiscuous mode.

D.

Deploy an IPS in front of the firewall in promiscuous mode.

Full Access
Question # 7

A communication network failure is usually defined as a situation where the network is unable to deliver communication services Thus a failure can be viewed as a disruption of service rather than degradation due to congestion One of the survivability techniques for improving network resilience is traffic management Which network-level traffic management and restoration technique can be used to achieve this?

A.

Multi-homing nodes for link level failure mitigations

B.

Prevention technique to improve component and system performance

C.

Provisioning backup power supplies for network equipment

D.

Pre-configured backup LSP paths in MPLS networks

Full Access
Question # 8

Refer to the exhibit A company has a hybrid cloud architecture with two on-premises data centers that connect to a public cloud service provider by using direct connect and eBGP routing. Encryption is unsupported by the cloud service provider, so the company plans to use an IPsec overlay network over its direct connects. Two virtual network appliances will be installed in the cloud infrastructure to establish tunnels and perform routing The company chose OSPF as the overlay routing protocol because the operations team is familiar with the protocol and because OSPF is the IGP on the on-premises network. The cloud network must be as isolated as possible from the on-premises network. What must be used for the OSPF overlay connectivity ?

A.

different OSPF area. NVA as the ABR

B.

different OSPF area. Cloud Edge as the ABR

C.

different OSPF instance. Cloud Edge as the ASBR

D.

different OSPF instance. NVA as the ASBR

Full Access
Question # 9

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Full Access
Question # 10

When constraint-based routing is under consideration to be added to a network design, what are two inherent characteristics or impacts that must be considered? (Choose two)

A.

better network utilization

B.

stability in the route table

C.

high computation overhead

D.

smaller routing table size

E.

less resources than the shortest path

Full Access
Question # 11

Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF However they also want to prevent excess flooding of ISAs if there is a constantly flapping link on the network Which timers can help prevent excess flooding of LSAs for OSPF?

A.

OSPF throttling timers

B.

OSPF delay timer

C.

MPS OSPF flooding timers

D.

OSPF propagation timers

Full Access
Question # 12

What are two descriptions of network optimization? (Choose two.)

A.

Maintain high availability

B.

Proactive network management

C.

Network redesign

D.

Network health maintenance

E.

Identify network requirements

Full Access
Question # 13

risk is a major determining factor in whether a company chooses to go with a public cloud, a private, or a hybrid of both. what are two factors that impact the decision on which cloud service placement model to use? (choose two)

A.

cross zone redundancy

B.

regulation

C.

organization skills

D.

legacy architectures

E.

data ownership

Full Access
Question # 14

Refer to the exhibit. As part of a redesign project, you must predict multicast behavior . What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated*?

A.

It is switched given that no RPF check is performed.

B.

It is dropped due to an unsuccessful RPF check against the multicast receiver.

C.

It is dropped due to an unsuccessful RPF check against the multicast source.

D.

It is switched due to a successful RPF check against the routing table

Full Access
Question # 15

A large enterprise cloud design team is evaluating different cloud consumption models What is an example of typical PaaS limitations or concerns that should be considered during service design?

A.

Vendor lock-in

B.

Runtime issues

C.

Lack of control

D.

Multi-tenant security

Full Access
Question # 16

A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. Recently, they added a new branch to their network. Due to physical security concerns, they want to extend their existing IP CCTV network of the head office to the new branch, without any routing changes in the network. They are also under some time constraints. What is the best approach to extend the existing IP CCTV network to the new branch, without incurring any IP address changes?

A.

GRE

B.

EoMPLS

C.

VXLAN

D.

L2TPv3

Full Access
Question # 17

Drag and drop the right functional descriptions from the left onto the corresponding protocols on the right.

Full Access
Question # 18

What are two advantages of the Agile project management methodology? (Choose two)

A.

brief but detailed feedback loops

B.

extensive documentation

C.

well-detailed and reliable budget estimates

D.

creation of shippable enhancements

E.

tight and rigid model

Full Access
Question # 19

which two actions must be taken when assessing an existing wireless network implementation for its readliness to support voice traffic? (choose two)

A.

Validate antenna settings on APs

B.

Verify that RX level are not above -6WBm.

C.

Analyze typical roaming delays.

D.

Identify frequent TX power changes.

E.

Check for high channel utilization

Full Access
Question # 20

Which hybrid cloud environment enables businesses to more readily stage data-intensive and time-sensitive tasks closer to the source, which reduces latency, eases networking requirements, and improves data protection?

A.

edge computing

B.

application migration

C.

digital transformation

D.

distributed data processing

Full Access
Question # 21

Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two )

A.

The group-pacing timer controls the interval that is used for group and individual LSA refreshment

B.

OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size

C.

OSPF retransmission-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF retransmission queue

D.

OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue

E.

OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue

Full Access
Question # 22

SDN is still maturing Throughout the evolution of SDN which two things will play a key role in enabling a successful deployment and avoiding performance visibility gaps in the infrastructure’ (Choose two.)

A.

peer-to-peer controller infrastructure

B.

failing back to old behaviours

C.

dynamic real-time change

D.

rapid on-demand growth

E.

integration of device context

Full Access
Question # 23

Refer to the diagram. Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

A.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

B.

Send packets without encapsulation to the anchor controller over the routed network.

C.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller.

D.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.

Full Access
Question # 24

Which interface between the controller and the networking device enables the two to communicate and allows the controller to program the data plane forwarding tables of the networking device?

A.

Controller interface

B.

Southbound interface

C.

Application programming interface

D.

Northbound interface

Full Access
Question # 25

As a service provider is implementing Strong Access Control Measures, which two of the following PCI Data Security Standard requirements must be met? (Choose two . )

A.

Assign a unique ID to each person with computer access

B.

Restrict access to cardholder data to on a need-to-know basis

C.

Encrypt transmission of cardholder data across open or public networks

D.

Each location must require validating PCI compliance if business has multiple locations

E.

Protect stored cardholder data

Full Access
Question # 26

Network operators have many options available from fully centralized to fully distributed control planes and each approach has its own set of characteristics Drag and drop the characteristics from the left onto the corresponding approach on the right

Full Access
Question # 27

The Enterprise Edge infrastructure modules aggregate the connectivity from the various elements outside the campus—using various services and WAN technologies as needed typicaly provisioned from service providers and route the traffic into the Campus Core layer The Enterprise Edge modules perform security functions when enterprise resources connect across public networks and the internet Drag and drop the network device types from the left onto the corresponding modules on the right Not all options are used

Full Access
Question # 28

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over geographically dispersed dual data centers via CWDM

B.

synchronous replication over dual data centers via Metro Ethernet

C.

asynchronous replication over dual data centers via DWDM

D.

synchronous replication over geographically dispersed dual data centers via MPLS

Full Access
Question # 29

Network designers often segment networks by creating modules for various reasons Sometimes however a network can be unintentionally segmented For instance, if the only way to connect a remote site to a headquarters or regional site is to connect them both to the public Internet the corporate network is now unintentionally segmented Which of the following option can be used to desegment the network in this situation?

A.

Build virtual networks that pass over the network

B.

Mark traffic for special handling through quality of service

C.

Configure little to no control data plane policy

D.

Block specific sources from reaching specific destinations

Full Access
Question # 30

A software-defined network can be defined as a network with an API that allows applications to understand and react to the state of the network in near real time A vendor is building an SDN solution that exposes an API to the RIB and potentially the forwarding engine directly The solution provides off-box processes with the capability to interact with the routing table in the same way as a distributed routing process Which SDN framework model does the solution use?

A.

replace

B.

augmented

C.

hybrid

D.

distributed

Full Access
Question # 31

A European government passport agency considers upgrading its IT systems to increase performance and workload flexibility in response to constantly changing requirements. The budget manager wants to reduce capital expenses and IT staff and must adopt the lowest-cost technology. Which technology choice is suitable?

A.

on premises

B.

private cloud

C.

public cloud

D.

hybrid cloud

Full Access
Question # 32

In implementing the CIA triad, an organization must follow a general set of best practices. Which best practice is applicable for availability?

A.

Ensure systems and applications stay updated

B.

Follow an organization ' s data-handling security policies.

C.

Use backup and recovery software and services.

D.

Keep access control lists and other file permissions up to date

Full Access
Question # 33

Scalability is a desirable attribute of a network, system, or process Poor scalability can result in poor system performance, necessitating the reengineering or duplication of systems Load scalability is the ability of a system to perform gracefully as traffic increases Which two problems can occur due to poor load scalability design? (Choose two )

A.

cannot fully take advantage of parallelism

B.

algorithmically intolerable

C.

limited size of a data structure

D.

repeatedly engaging in wasteful activity

E.

redundant message logging

Full Access
Question # 34

Security experts promote the security defense-m-depth principle which states that network security should be multilayered and modular and multiple methods should be designed and applied to different parts of the network Drag and drop the characteristics on the left to the matching enterprise network components on the right.

Full Access
Question # 35

Virtualization pose a special challenges for NAC because virtual servers can move around a data center, and the VLAN can change as the servers move. What is an option that can be used to improve security in this condition?

A.

role-based control

B.

in-band traffic control

C.

application-based security

D.

application-based security

Full Access
Question # 36

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration Which two statements describe a centralized SDN control path? (Choose two.)

A.

It significantly improves the latency when performing reactive handling of PACKETJN events

B.

A centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment

C.

Integrating smart NIC capabilities on the local host level is made easier through rest APIs

D.

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing

E.

It is highly-available by design with no single-point-of-failure risks present

Full Access
Question # 37

A global e-commerce company is expanding its operations and planning to migrate its entire infrastructure to a hybrid cloud solution. They are concerned about data governance and want to ensure that their customers ' data is treated with utmost respect to sovereignty and privacy. What is an appropriate approach?

A.

Replicate customer data across all data centers globally to ensure data redundancy and compliance with local data regulations.

B.

Utilize a cloud provider that offers region-specific data centers to store customer data within the same geographic region.

C.

Encrypt all customer data and store it in a public cloud environment to benefit from advanced security measures.

D.

Implement strict access controls for customer data and store it in a single central data center to maintain data sovereignty.

Full Access
Question # 38

In traditional network design, the network and data center are confined within a single building In this configuration, a router connects the internal and external networks Basic configuration of an access control list within the router controls the traffic that can pass through Which security technique defines the boundary between an internal/trusted network and an external/untrusted network?

A.

network segmentation

B.

security certifications

C.

encryption

D.

perimeter security

Full Access
Question # 39

In the wake of a security compromise incident where the internal networks were breached by an outside attacker at the perimeter of the infrastructure, an enterprise is now evaluating potential measures that can help protect against the same type of incident in the future. What are two design options that can be employed? (Choose two)

A.

microzoning

B.

segmentation

C.

domain fencing

D.

virtualization

E.

microperimeters

Full Access
Question # 40

Which design element is used to define network performance requirements?

A.

service level

B.

operating cost

C.

location dependency

D.

network size

Full Access
Question # 41

A business wants to centralize servies via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs Which consideration supports the new business requirement?

A.

VDI servers shared be centrally within a DMZ

B.

VDI servers should be contained within dedicated VLANs in each branch location

C.

The WAN should offer low latency and be resized

D.

The thin client traffic should be placed in a WAN QoS priority queue.

Full Access
Question # 42

A customer has a functional requirement that states HR systems within a data center must be segmented from other systems that reside in the same data center and same VLAN The systems run legacy applications by using hard-coded IP addresses with all HR systems dedicated to 129 to 254 of the 10 20.20 0/24 prefix Which segmentation method is optimal for the customer?

A.

transparent firewalling

B.

VACLs on data center switches

C.

routed firewalls

D.

data center perimeter firewalling

Full Access
Question # 43

The PaaS model provides customers with a virtualized application development platform without the need for them to furnish hardware or system administration using in-house resources All necessary infrastructure components and application development services are provided and managed by the cloud service provider. Which limitation should be considered when selecting PaaS model?

A.

loss of customer control

B.

limited customization options

C.

potential network latency

D.

compatibility with existing development environments

Full Access
Question # 44

Over the years, many solutions diveloped to limit control plane state which reduces the scope or the speed of control plane information propagation Which solution removes more specific information about a particular destination as topological distance is covered in the network?

A.

Aggregation

B.

Summarization

C.

Back-off timers

D.

Layering

Full Access
Question # 45

Two companies need to implement an extranet overlay network solution by using a VPN tunnel over the internet to use each other ' s HTTP REST APIs. The solution must only provide data integrity because data confidentiality will be covered at the application layer The existing firewall devices will be used as VPN endpoints for the tunnel but they have limited available resources Which type of VPN tunnel must be deployed for the extranet service?

A.

GRE olPsec

B.

GRE tunnel

C.

IPsec ESP

D.

IPsec AH

Full Access
Question # 46

The modular design model approach allows companies to have a network infrastructure that is better suited for scalable applications What is the benefit for companies that use this model?

A.

low communication with its employees through the intranet

B.

more flexible m the event of rapid market changes

C.

less efficient organizational ecosystem

D.

more in-house expertise and skilled resources

Full Access
Question # 47

A network architect is working on the baseline policies dealing with the use of Infrastructure-as-Code within an IT department, and has been requested to present the plan at the monthly management board meeting. What are two examples of operational aspects of Infrastructure-as-Code that can be highlighted during the presentation? (Choose two.)

A.

API for programmatic control

B.

automatic trouble ticketing

C.

automated workflows

D.

source code management repository

E.

telemetry and monitoring

Full Access
Question # 48

Company XYZ is running SNMPvl in their network and understands that it has some flaws They want to change the security design to implement SNMPv3 in the network Which network threat is SNMPv3 effective against?

A.

DDoS attack

B.

brute force dictionary attack

C.

masquerade threats

D.

man-in-the-middle attack

Full Access
Question # 49

When planning their cloud migration journey what is crucial for virtually all organizations to perform?

A.

SASE framework deployment

B.

optimizing the WAN environment

C.

assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Full Access
Question # 50

Refer to the exhibit Which two design options reduce the size of OSPF database in the shown topology? (Choose two.)

A.

Loop Free Alternate

B.

type 3 LSA filtering

C.

prefix suppression

D.

Layer 2 link aggregation between core switches

E.

incremental SPF

Full Access
Question # 51

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

A.

It can limit network scalability

B.

It can create microloops during reconvergence.

C.

It increases convergence time.

D.

It reduces convergence time.

Full Access
Question # 52

Which design method is achieved by layering the network control plane above a redundant physical infrastructure?

A.

scalability

B.

manageability

C.

resilience

D.

modulanty

Full Access
Question # 53

Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:

Securely transfer the corporate data over the private WAN

Use a centralized configuration model.

Minimize overhead on the tunneled traffic.

Which technology can be used in the new design to meet the company’s requirements?

A.

GET VPN

B.

MGRE

C.

DMVPN

D.

S-VTI

Full Access
Question # 54

When a traditional network is transformed to a hierarchical network, the state information in the control plane is reduced so that changes in one area of the network do not result in changes in the routing table on devices half-way around the globe What is a potential trade off in these cases?

A.

suboptimal use of available resources

B.

vertical split of failure domains

C.

horizontal split of failure domains

D.

increased routing table size

Full Access
Question # 55

A customer migrates from a traditional Layer 2 data center network Into a new SDN- based, spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. Which activity should be completed each time a legacy network is migrated?

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Full Access
Question # 56

Which undesired effect of increasing the jitter compensation buffer is true?

A.

The overall transport jitter decreases and quality improves

B.

The overall transport jitter increases and quality issues can occur.

C.

The overall transport delay increases and quality issues can occur.

D.

The overall transport delay decreases and quality improves.

Full Access
Question # 57

With virtualization being applied in many parts of the network, every physical link is likely to carry one or more virtual links, but what is a drawback in cases like this?

A.

unneeded tunneling

B.

fate sharing

C.

serialization delay

D.

bandwidth utilization

Full Access
Question # 58

A network uses an SDN architecture with switches and a centralized controller What should be on the switches but not on the controller?

A.

control plane functions

B.

data plane functions

C.

northbound interface

D.

a southbound interface

Full Access
Question # 59

Implementing a network automation architecture usually follows a phased approach that increases automation as the new technology and processes in the preceding phases are integrated and adopted. What provides a model that greatly simplifies the interaction with network devices?

A.

vendor specific configuration

B.

network device migration

C.

abstraction layer

D.

CI/CD framework

Full Access
Question # 60

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Sen/ice (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?

A.

tail drop

B.

traffic shaping

C.

WRED

D.

traffic policing

Full Access
Question # 61

PaaS provides a cloud-based platform for developing, running, managing applications. Users access the PaaS through a GUI, where development or DevOps teams can collaborate on all their work across the entire application lifecycle including coding, integration, testing, delivery, deployment, and feedback. Which benefit does an organization get by using PaaS?

A.

improved access

B.

comprehensive security

C.

improved responsiveness

D.

faster time to market

Full Access