Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

400-007 PDF

$139.65

$399

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

400-007 PDF + Testing Engine

$209.65

$599

3 Months Free Update

  • Exam Name: Cisco Certified Design Expert (CCDE v3.1)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 349
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

400-007 Engine

$157.15

$449

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

400-007 Practice Exam Questions with Answers Cisco Certified Design Expert (CCDE v3.1) Certification

Question # 6

The goal for any network designer is to strive to build a resilient network that adapts to changing conditions rapidly with minimal impact on the services running over the network. A resilient network can adapt to failures, but which soft failure can be harder to define and detect?

A.

A network with operational challenges due to lack of skills

B.

A network that is not running in an optimal way

C.

A network which does not solve complexity issues

D.

A network or service that experiences outages

Full Access
Question # 7

Refer to the exhibit.

400-007 question answer

An engineer is designing the network for a multihomed customer running in AS 111. The AS does not have any other ASs connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?

A.

Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.

B.

Use the local preference attribute to configure your AS as a non-transit AS.

C.

Include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.

D.

Include a prefix list to only receive routes from neighboring ASs.

Full Access
Question # 8

Refer to the exhibit.

400-007 question answer

The network 10.10.0.0/16 has been redistributed to OSPF processes and the best path to the destination from R1 has been chosen as R1–R2–R3. A failure occurred on the link between R2 and R3 and the path was changed to R1–R4–R5–R3. What happens when the link between R2 and R3 is restored?

A.

The path R1–R4–R5–R3 continues to be the best path because the metric is better

B.

The path reverts back to R1–R2–R3 because the route type is E1

C.

The path R1–R4–R5–R3 continues to be the best path because OSPF does not compare the metrics between two domains

D.

The path reverts to R1–R2–R3 because this was the previous best path

Full Access
Question # 9

Which design solution reduces the amount of IGMP state in the network?

A.

IGMP filtering

B.

IGMPv3 with PIM-SSM

C.

Multiple multicast domains

D.

One multicast group address throughout network regardless of IGMP version

Full Access
Question # 10

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The main requirements are ZTP support, end-to-end encryption, application awareness, and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

A.

SD-branch

B.

DMVPN with PfR

C.

Managed SD-WAN

D.

SD-WAN

Full Access
Question # 11

The line between security and compliance is easily blurred and is, to a large extent, a moving target Drag and drop each of the requirements on the left to the appropriate section on the right

400-007 question answer

Full Access
Question # 12

Which function is performed at the access layer of the three-layer hierarchical network design model?

A.

Fault isolation

B.

QoS classification and marking boundary

C.

Reliability

D.

Fast transport

E.

Redundancy and load balancing

Full Access
Question # 13

Which optimal use of interface dampening on a fast convergence network design is true?

A.

When occasional flaps of long duration occur

B.

When numerous adjacent flaps of very short duration occur

C.

When the router hardware is slower than the carrier delay down detection

D.

When the switch hardware is faster than the debounce timer down detection

Full Access
Question # 14

The CIA triad is foundational to information security, and one can be certain that one or more of the principles within the CIA triad has been violated when data is leaked or a system is attacked Drag and drop the countermeasures on the left to the appropriate principle section on the right in any order

400-007 question answer

Full Access
Question # 15

Customer XYZ network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozen MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Full Access
Question # 16

Company XYZ is in the process of identifying which transport mechanism(s) to use as their WAN technology. Their main two requirements are:

    A technology that could offer DPI, SLA, secure tunnels, privacy, QoS, scalability, reliability, and ease of management.

    A technology that is cost-effective.

Which WAN technology(ies) should be included in the design of company XYZ?

A.

Software-defined WAN should be the preferred choice because it complements both technologies, covers all the required features, and it is the most cost-effective solution.

B.

Internet should be the preferred option because it is cost-effective and supports BFD, IP SLA, and IPsec for secure transport over the public Internet.

C.

Both technologies should be used. Each should be used to back up the other one; where the primary links are MPLS, the Internet should be used as a backup link with IPsec (and vice versa).

D.

MPLS meets all these requirements and it is more reliable than using the Internet. It is widely used with defined best practices and an industry standard.

Full Access
Question # 17

Refer to the exhibit.

400-007 question answer

ACME Mining has four data centers in Santiago. Cape Town. Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN They want to deploy a new mission-critical application with these

requirements:

    clusterheartbeat2Mb/s continuous (250 KB/s)

    cluster heartbeat one-way maximum latency 100 ms

These are the current ping tests results between the four data centers:

400-007 question answer

Which hosting data center pair can host the new application?

A.

Mumbai and Beijing

B.

Santiago and Cape Town

C.

Santiago and Mumbai

D.

Cape Town and Mumbai

E.

Cape Town and Beijing

F.

Santiago and Beijing

Full Access
Question # 18

An attacker exploits application flaws to obtain data and credentials. What is the next step after application discovery in Zero Trust networking?

A.

Establish visibility and behavior modeling

B.

Enforce policies and microsegmentation

C.

Assess real-time security health

D.

Ensure trustworthiness of systems

Full Access
Question # 19

When a company network architect is working on a new network design, they are expected to ensure that business requirements and technical aspects are factored in, but often there are other factors that come into play as well. Which non-business constraint must also be considered throughout the design phase?

A.

Location

B.

Cost

C.

Time

D.

Compliance

Full Access
Question # 20

Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)

A.

The Reported Distance from a successor is lower than the local Feasible Distance.

B.

The Reported Distance from a successor is higher than the local Feasible Distance.

C.

The feasibility condition does not need to be met.

D.

The Feasible Distance from a successor is lower than the local Reported Distance.

E.

A feasible successor must be present.

Full Access
Question # 21

Two enterprise networks must be connected together. Both networks are using the same private IP addresses. The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload feature to save IP addresses from the NAT pools. Which design addresses this requirement using only one Cisco IOS NAT router for both directions?

A.

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT with overload in both directions

B.

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload option in both directions

C.

The overload feature is the default and does not have to be configured

D.

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands for the overload feature in both directions

E.

The NAT Virtual Interface must be used to achieve this requirement

Full Access
Question # 22

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

400-007 question answer

Full Access
Question # 23

What is a characteristic of a secure cloud architecture model?

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Full Access
Question # 24

Company XYZ is migrating their existing network to IPv6. Some access layer switches do not support IPv6, while core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used?

A.

The access layer switches must support IGMP snooping at a minimum. Any switches that do not support IGMP snooping must be replaced.

B.

Upgrade the non-supporting switches. Otherwise, it will cause an issue with the migration.

C.

Layer 2 switches will not affect the implementation of IPv6. They can be included in the design in their current state.

D.

The access layer switches must support DHCPv6. Any switches that do not support DHCPv6 must be replaced.

Full Access
Question # 25

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub-interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Full Access
Question # 26

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

A.

PortFast

B.

UDLD

C.

Root guard

D.

BPDU guard

Full Access
Question # 27

Which design principle improves network resiliency?

A.

Added load-balancing

B.

Added redundancy

C.

Added confidentiality

D.

Added reliability

Full Access
Question # 28

The network designer needs to use GLOP IP addresses in order to make them unique within their ASN. Which multicast address range should be used?

A.

232.0.0.0 to 232.255.255.255

B.

233.0.0.0 to 233.255.255.255

C.

239.0.0.0 to 239.255.255.255

D.

224.0.0.0 to 224.0.0.255

Full Access
Question # 29

Which Interconnectivity method offers the fastest convergence in the event of a unidirectional issue between three Layer 3 switches connected together with routed links in the same rack in a data center?

A.

Copper Ethernet connectivity with BFD enabled

B.

Copper Ethernet connectivity with UDLD enabled

C.

Fiber Ethernet connectivity with BFD enabled

D.

Fiber Ethernet connectivity with UDLD enabled

Full Access
Question # 30

Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Full Access
Question # 31

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Full Access
Question # 32

Over the years, many solutions have been developed to limit control plane state which reduces the scope or the speed of control plane information propagation. Which solution removes more specific information about a particular destination as topological distance is covered in the network?

A.

Aggregation

B.

Summarization

C.

Back-off timers

D.

Layering

Full Access
Question # 33

Which statement about hot-potato routing architecture design is true?

A.

Hot-potato routing is the preferred architecture when connecting to content providers

B.

Hot-potato keeps traffic under the control of the network administrator for longer

C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric

D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks

Full Access
Question # 34

Refer to the table.

400-007 question answer

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The solution must provide a single 10G connection between locations and be able to run its own varying QoS profiles without service provider interaction based on the migration stages. All connectivity methods are at 10 Gbps. Which transport technology costs the least if the connectivity is required for just one year?

A.

MPLS wires only

B.

CWDM over dark fiber

C.

DWDM over dark fiber

D.

Metro Ethernet

Full Access
Question # 35

Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbor relationships minimized on each segment and the LSDB size optimized. Which design can be used?

A.

Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area

B.

Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1

C.

Design the network so that all routers are Level 1 routers

D.

Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1

Full Access
Question # 36

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

A.

Wide area network

B.

Mobile network

C.

Metro network

D.

Application network

E.

Control network

Full Access
Question # 37

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

A.

Reduction in time to detect and respond to threats

B.

Integration with an incident response plan

C.

Adoption and improvement of threat-detection response

D.

Asset identification and grouping decisions

Full Access
Question # 38

An architect prepares a network design for a startup company. The design must meet business requirements while the business grows and divests due to rapidly changing markets. What is the highest priority in this design?

A.

The network should be hierarchical.

B.

The network should be modular.

C.

The network should be scalable.

D.

The network should have a dedicated core.

Full Access
Question # 39

Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

A.

Southbound APIs

B.

Northbound APIs

C.

Orchestration layer

D.

SDN controller

Full Access
Question # 40

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

A.

Local to global NAT translation is done after routing

B.

Global to local NAT translation is done before routing

C.

Local to global NAT translation is done before policy-based routing

D.

Global to local NAT translation is done after policy-based routing

Full Access
Question # 41

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. Which activity should be completed each time a legacy network is migrated?

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Full Access
Question # 42

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity, what must be deployed?

A.

Bridging

B.

Service Chaining

C.

Linking

D.

Daisy Chaining

E.

Switching

Full Access
Question # 43

An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?

A.

Implement route reflectors on the two core routers

B.

Increase the memory on the core routers

C.

Implement eBGP between the core and distribution routers

D.

Increase the memory on the distribution routers

E.

Increase bandwidth between the core routers

Full Access
Question # 44

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS Traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50 msec). In order to address both link failure and node failure within the lab topology network, which type of the MPLS TE tunnels must be considered for this demonstration?

A.

TE backup tunnel

B.

Next-hop (NHop) tunnel

C.

FRR Backup tunnel

D.

Next-next-hop (NNHop) tunnel

Full Access
Question # 45

A multinational enterprise integrates a cloud solution with these objectives:

• Achieve seamless connectivity across different countries and regions

• Extend data center and private clouds into public clouds and provider-hosted clouds

What are two outcomes of deploying data centers and fabrics that interconnect different cloud networks? (Choose two.)

A.

Enhanced security

B.

Data and network ownership

C.

Ability to place workloads across clouds

D.

Centralized visibility

E.

Unidirectional workload mobility across the cloud

Full Access
Question # 46

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)

A.

cost optimization approach

B.

strategic planning approach

C.

modular approach

D.

tactical planning approach

E.

business optimization approach

Full Access
Question # 47

What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?

A.

PaaS

B.

SaaS

C.

IaaS

D.

WaaS

Full Access
Question # 48

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two.)

A.

will only work with single-tier headend architecture

B.

hub sites must connect to both DMVPN clouds

C.

recommended for high availability

D.

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.

requires all sites to have dual Internet connections

Full Access
Question # 49

A large enterprise cloud design team is evaluating cloud consumption models. What is an example of a typical PaaS limitation or concern?

A.

Vendor lock-in

B.

Runtime issues

C.

Lack of control

D.

Multi-tenant security

Full Access
Question # 50

How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?

A.

5

B.

6

C.

7

D.

10

E.

20

Full Access
Question # 51

Which two statements describe network automation and network orchestration? (Choose two.)

A.

Network automation does not provide governance or policy management.

B.

Network automation spans multiple network services, vendors, and environments.

C.

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.

D.

Provisioning network services is an example of network automation.

E.

Network orchestration is used to run single, low-level tasks without human intervention.

Full Access
Question # 52

What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?

A.

NPIV

B.

NFVIS

C.

NFV

D.

VNF

Full Access
Question # 53

Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)

A.

workload

B.

work domain

C.

workplace

D.

workgroup

E.

workspace

Full Access
Question # 54

A service provider hires you to design its new managed CE offering to meet these requirements:

    The CEs cannot run a routing protocol with the PE.

    Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios.

    Provide support for IPv6 customer routes.

    Scale up to 250,000 CE devices per customer.

    Provide low operational management to scale customer growth.

    Utilize low-end (inexpensive) routing platforms for CE functionality.

Which tunneling technology do you recommend?

A.

FlexVPN

B.

point-to-point GRE

C.

DMVPN

D.

LISP

Full Access
Question # 55

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

A.

confidential

B.

serviceability

C.

reliability

D.

availability

E.

integrity

F.

scalability

Full Access
Question # 56

Refer to the table.

400-007 question answer

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The migration is estimated to take 20 months to complete but might extend an additional 10 months if issues arise. All connectivity options meet the requirements to migrate workloads. Which transport technology provides the best ROI based on cost and flexibility?

A.

CWDM over dark fiber

B.

MPLS

C.

DWDM over dark fiber

D.

Metro Ethernet

Full Access
Question # 57

Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever-increasing cybersecurity threats. To achieve this, federated identity services have been deployed to provide Single Sign-On and Multi-Factor Authentication. Which protocol can be used by Company XYZ to provide authentication and authorization services?

A.

OAuth2

B.

OpenID Connect

C.

OpenID

D.

SAML2.0

Full Access
Question # 58

Refer to the exhibit.

400-007 question answer

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500. Traffic destined to AS 111 network 91.7.0.0/16 should come in via AS 100, while traffic destined to all other networks in AS 111 should continue to use the existing path. Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 into the 91.7.0.0/16 network?

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91.7.0.0/16 network.

Full Access
Question # 59

The administrator of a small branch office wants to implement the Layer 2 network without running STP. The office has some redundant paths. Which mechanism can the administrator use to allow redundancy without creating Layer 2 loops?

A.

Use double-sided VPC on both switches

B.

Use two port channels as Flex links

C.

Use FabricPath with ECMP

D.

Use 802.3ad link bundling

Full Access
Question # 60

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

A.

Geographically dispersed data centers with asynchronous replication

B.

A single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

Geographically dispersed data centers with synchronous replication

D.

A single data center with duplicated infrastructure and dual PSUs

Full Access
Question # 61

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

A.

Partial mesh

B.

Full mesh

C.

Ring

D.

Squared

E.

Triangulated

Full Access
Question # 62

When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?

A.

QoE estimation

B.

Security

C.

Traffic patterns

D.

Flow forwarding

Full Access
Question # 63

What are two examples of business goals to be considered when a network design is built? (Choose two.)

A.

standardize resiliency

B.

minimize operational costs

C.

integrate endpoint posture

D.

ensure faster obsolescence

E.

reduce complexity

Full Access
Question # 64

Which encoding format does Cisco IOS XE software support for NETCONF?

A.

It supports HTML encoding for NETCONF

B.

It supports YAML encoding for NETCONF

C.

It supports XML encoding for NETCONF

D.

It supports JSON encoding for NETCONF

Full Access
Question # 65

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?

A.

Allow VoIP and the custom application to share the same priority queue.

B.

The custom application and VoIP must be assigned their own separate priority queue.

C.

Interleave the custom application with other TCP applications in the same CBWFQ.

D.

Avoid placing the custom application in a CBWFQ queue that contains other traffic.

Full Access
Question # 66

Company XYZ is designing the network for IPv6 security and they have these design requirements:

    A switch or router must deny access to traffic from sources with addresses that are correct but topologically incorrect.

    Devices must block Neighbor Discovery Protocol resolution for destination addresses not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Full Access
Question # 67

A network architect must redesign a service provider edge, where multiservice and multitenant PEs are currently present. Which design feature should be minimized in the new design to achieve reliability?

A.

bridging

B.

fate sharing

C.

redundancy

D.

unicast overlay routing

Full Access
Question # 68

Which undesired effect of increasing the jitter compensation buffer is true?

A.

The overall transport jitter decreases and quality improves.

B.

The overall transport jitter increases and quality issues can occur.

C.

The overall transport delay increases and quality issues can occur.

D.

The overall transport delay decreases and quality improves.

Full Access
Question # 69

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard (PCI DSS)? (Choose two.)

A.

Conduct risk analyses

B.

Install firewalls

C.

Use antivirus software

D.

Establish monitoring policies

E.

Establish risk management policies

Full Access
Question # 70

While computer networks and sophisticated applications have allowed individuals to be more productive the need to prepare for security threats has increased dramatically A six-step methodology on security incident handling has been adopted by many organizations including service providers enterprises, and government organizations to ensure that organizations are aware of significant security incidents and act quickly to stop the attacker, minimize damage caused, and prevent follow on attacks or similar incidents in the future Drag and drop the actions on the left to the targets on the right in the correct order.

400-007 question answer

Full Access
Question # 71

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Full Access
Question # 72

An enterprise wants to provide low-cost delivery of network systems that can be scaled on business demand, followed by an initiative to reduce capital expenses for new IT equipment. Which technology meets these goals?

A.

IaaS within a private cloud

B.

IaaS within an on-premises location

C.

PaaS within a public cloud

D.

SaaS within an on-premises location

Full Access
Question # 73

Which two design options are available to dynamically discover the RP in an IPv6 multicast network? (Choose two)

A.

Embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Full Access
Question # 74

Which option is a fate-sharing characteristic in regards to network design?

A.

A failure of a single element causes the entire service to fail

B.

It protects the network against failures in the distribution layer

C.

It acts as a stateful forwarding device

D.

It provides data sequencing and acknowledgment mechanisms

Full Access
Question # 75

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access based on their user role. Users must use a password that they are already using to access existing applications. A user may not always use the same device to access the VPN. Which two options combined meet the requirements? (Choose two)

A.

Use local usernames and passwords on the VPN device

B.

Deploy a central authentication directory that users can be authenticated and authorized against

C.

Deploy certificates that are unique to each user

D.

Deploy an IPsec VPN solution

E.

Deploy certificates that are unique to each device

F.

Deploy a SSL VPN solution

Full Access
Question # 76

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol. A spoke-to-spoke data propagation model must be set up. Which two design considerations must be taken into account? (Choose two)

A.

Configure all the sites as network type broadcast.

B.

The network type on all sites should be point-to-multipoint.

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Full Access
Question # 77

IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?

A.

performance monitoring

B.

security

C.

observation of critical links

D.

capacity planning

Full Access
Question # 78

Which two impacts of adding the IP event dampening feature to a network design are true? (Choose two.)

A.

It protects against routing loops.

B.

It switches traffic immediately after a link failure.

C.

It speeds up link failure detection.

D.

It reduces the utilization of system processing resources.

E.

It improves overall network stability.

Full Access
Question # 79

The major business applications of an enterprise are largely monolithic and hard-coded. As part of a major modernization and overhaul of the applications, the goal is to move to a modular and containerized application architecture model. At the same time, decoupling from the hardware is desired to move to an on-demand provisioning. However, the CyberOps team mandated that the final architecture must provide the same security levels as an air-gapped data center. Which cloud architecture meets these requirements?

A.

IaaS

B.

Private cloud

C.

PaaS

D.

Hybrid cloud

E.

Public cloud

Full Access
Question # 80

A business requirement is supplied to an architect from a car manufacturer stating their business model is changing to just-in-time manufacturing and a new network is required. The manufacturer does not produce all of the specific components in-house. Which area should the architect focus on initially?

A.

Automation

B.

Zero Trust Networking

C.

Low Latency Infrastructure

D.

Modularity

Full Access
Question # 81

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

400-007 question answer

Full Access
Question # 82

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

A.

fault management

B.

accounting management

C.

performance management

D.

security management

Full Access
Question # 83

A network architect is designing a policy where database applications access the internet directly, while other traffic routes through the data center, with dynamic path switching based on performance. Which solution meets these requirements?

A.

MPLS L3VPN with QoS

B.

Cloud OnRamp for IaaS

C.

Cloud OnRamp for SaaS

D.

MPLS Direct Connect

Full Access
Question # 84

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?

A.

PVRSTP

B.

MST

C.

STP

D.

PVSTP+

Full Access
Question # 85

Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?

A.

weighted fair queuing

B.

weighted random early detection

C.

low-latency queuing

D.

first-in first-out

Full Access
Question # 86

Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

A.

Transmit delay

B.

Throttle timer

C.

SPF hold time

D.

Interface dampening

Full Access
Question # 87

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

A.

PIM dense mode with RP located at the hub

B.

PIM sparse mode with RP located at each remote site

C.

PIM sparse mode with RP located at the hub

D.

PIM dense mode with RP located at each remote site

Full Access
Question # 88

Drag and drop the correct mitigation methods from the left onto the corresponding types of attack on the right

400-007 question answer

Full Access
Question # 89

Refer to the table.

400-007 question answer

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Full Access
Question # 90

Which technology supports antispoofing and does not have any impact on encryption performance regardless of packet size?

A.

MACsec

B.

IP source guard

C.

DHCP snooping with DAI

D.

IPsec

Full Access
Question # 91

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

A.

SaaS

B.

PaaS

C.

IaaS

D.

hybrid cloud

Full Access
Question # 92

What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)

A.

Monitoring capabilities

B.

Project time frame

C.

Staff experience

D.

Component availability

E.

Total cost

Full Access
Question # 93

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

A.

Device resiliency

B.

Device type

C.

Network type

D.

Network resiliency

E.

Network size

Full Access
Question # 94

You are designing the QoS policy for a company that is running many TCP-based applications. The company is experiencing tail drops for these applications. The company wants to use a congestion avoidance technique for these applications. Which QoS strategy can be used?

A.

Weighted fair queuing

B.

Weighted random early detection

C.

Low-latency queuing

D.

First-in first-out

Full Access
Question # 95

Network changes due to mergers, acquisitions, and divestitures can be highly disruptive if not carefully planned. When an organization sells part of its business, it must detach those parts of the network with minimal risk and downtime.

Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?

A.

Redundant design

B.

Modular design

C.

Less complex design

D.

Routed access design

Full Access
Question # 96

What is a disadvantage of the traditional three-tier architecture model when east-west traffic between different pods must go through the distribution and core layers?

A.

Low bandwidth

B.

Security

C.

Scalability

D.

High latency

Full Access
Question # 97

Refer to the exhibit.

400-007 question answer

Refer to the exhibit. Two data center sites (X and Y) connect to the Internet and each other using a backdoor link. Both advertise the same IP prefix (100.75.10.0/23) to the Internet. Firewalls are behind R1 and R2.

Problem: When users attempt to reach 100.75.10.0/23, the return traffic is routed to Site-Y, regardless of where the session originated. This results in asymmetric traffic and potentially broken sessions due to firewall behavior.

Which design resolves the issue?

A.

Use BGP MED to influence Site-X return traffic. Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration. Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X. Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers. Have Site-X advertise an IP pool with a longer prefix.

Full Access
Question # 98

Which service abstracts away the management of the operating system, middleware, and runtime?

A.

IaaS

B.

PaaS

C.

SaaS

D.

BMaaS

Full Access
Question # 99

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design, which two technologies are recommended? (Choose two.)

A.

Design MLAG/MC-LAG into the network wherever possible.

B.

Configure DHCP snooping on the switches.

C.

Use root guard.

D.

Use BPDU guard.

E.

Use UniDirectional Link Detection.

Full Access
Question # 100

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

A.

Cryptography

B.

Confidentiality

C.

Authorization

D.

Identification

E.

Integrity

F.

Availability

Full Access
Question # 101

Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?

A.

STP

B.

fate sharing

C.

OSPF LFA

D.

BFD

E.

flex links

Full Access
Question # 102

When a detection system for protecting a network from threats sourced from the Internet is designed there are two common deployment methods, where the system is placed differently relative to the perimeter firewall

•An unfiltered detection system examines the raw Internet data streams before it reaches the firewall

•A screened detection solution which monitors traffic that is allowed through the firewall Both have its advantages and disadvantages drag and drop the characteristics on the left to the corresponding category on the right in no particular order.

400-007 question answer

Full Access
Question # 103

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

A.

Routing protocol authentication

B.

SNMPv3

C.

Control Plane Policing

D.

Redundant AAA servers

E.

Warning banners

F.

To enable unused services

Full Access
Question # 104

Which best practice ensures data security in the private cloud?

A.

Use IPsec for communication between unsecured network connection

B.

Encrypt data at rest and in transition.

C.

Use the same vendor for consistent encryption.

D.

Anonymize data ownership to comply with privacy rules.

Full Access