ExamGecko
Home / Cisco / 400-007 / List of questions
Ask Question

Cisco 400-007 Practice Test - Questions Answers, Page 10

List of questions

Question 91

Report Export Collapse

Which three items do you recommend for control plane hardening of an infrastructure device?

(Choose three.)

redundant AAA servers

redundant AAA servers

Control Plane Policing

Control Plane Policing

warning banners

warning banners

to enable unused .services

to enable unused .services

SNMPv3

SNMPv3

routing protocol authentication

routing protocol authentication

Suggested answer: B, E, F
asked 10/10/2024
Gaston Cruz
47 questions

Question 92

Report Export Collapse

According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?

requirement for data-in-motion encryption and 2FA authentication

requirement for data-in-motion encryption and 2FA authentication

requirement for data-at-rest encryption foe user identification within the VPN termination hardware

requirement for data-at-rest encryption foe user identification within the VPN termination hardware

categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs

categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs

ensuring that authorized users have high-availability system access from defined zones to defined systems or zones

ensuring that authorized users have high-availability system access from defined zones to defined systems or zones

Suggested answer: B
asked 10/10/2024
Gaetano Vito Fraccalvieri
45 questions

Question 93

Report Export Collapse

Refer to the exhibit.

Cisco 400-007 image Question 93 118769 10102024233153000000

OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

Suggested answer: A
asked 10/10/2024
ABDOUL RAZAK TIENDREBEOGO
30 questions

Question 94

Report Export Collapse

Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)

Loop Guard

Loop Guard

PortFast

PortFast

DTF

DTF

Root Guard

Root Guard

BPDU Guard

BPDU Guard

Suggested answer: B, E
asked 10/10/2024
Jason Wang
43 questions

Question 95

Report Export Collapse

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

EIGRP

EIGRP

RPVST+

RPVST+

MST

MST

L2MP

L2MP

Suggested answer: A, B
asked 10/10/2024
Rehan r
45 questions

Question 96

Report Export Collapse

Which two characteristics apply to firewall transparent mode operations in a firewall solution design?

(Choose two.)

Changes in the existing IP addressing and subnets are required

Changes in the existing IP addressing and subnets are required

The firewall can participate actively on spanning tree.

The firewall can participate actively on spanning tree.

Multicast traffic can traverse the firewall.

Multicast traffic can traverse the firewall.

OSPF adjacencies can be established through the firewall

OSPF adjacencies can be established through the firewall

The firewall acts like a router hop in the network.

The firewall acts like a router hop in the network.

Suggested answer: C, D
asked 10/10/2024
ALAEDDINE BENMAKHLOUF
51 questions

Question 97

Report Export Collapse

Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops What do you answer?

VXLAN offers native loop avoidance mechanism

VXLAN offers native loop avoidance mechanism

Storm Control should be enabled on all ports

Storm Control should be enabled on all ports

VPC+ could prevent L2 loop on access ports

VPC+ could prevent L2 loop on access ports

BPDU Guard should be enabled on all VTEP access ports

BPDU Guard should be enabled on all VTEP access ports

Suggested answer: D
asked 10/10/2024
Adlian Akbar
39 questions

Question 98

Report Export Collapse

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Suggested answer: A, D
asked 10/10/2024
André Batista
48 questions

Question 99

Report Export Collapse

Refer to the exhibit.

Cisco 400-007 image Question 99 118775 10102024233153000000

Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)

BPDU guard on access ports

BPDU guard on access ports

BPDU guard on the aggregation switch downlinks toward access switches

BPDU guard on the aggregation switch downlinks toward access switches

root guard on the aggregation switch downlinks toward access switches

root guard on the aggregation switch downlinks toward access switches

root guard on access ports

root guard on access ports

edge port on access ports

edge port on access ports

access switch pairs explicitly determined to be root and backup root bridges

access switch pairs explicitly determined to be root and backup root bridges

Suggested answer: A, E
asked 10/10/2024
Edward Eric
40 questions

Question 100

Report Export Collapse

Refer to the exhibit.

Cisco 400-007 image Question 100 118776 10102024233153000000

There are multiple trees in the Cisco FabricPath All switches in the Layer 2 fabric share the same view of each tree. Which two concepts describe how the multicast traffic is load-balanced across this topology? (Choose two )

A specific (S.G) traffic is not load-balanced

A specific (S.G) traffic is not load-balanced

All trees are utilized at the same level of the traffic rate

All trees are utilized at the same level of the traffic rate

Every leaf node assigns the specific (S.G) to the same tree.

Every leaf node assigns the specific (S.G) to the same tree.

A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.

A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.

The multicast traffic is generally load-balanced across all trees

The multicast traffic is generally load-balanced across all trees

Suggested answer: B, D
asked 10/10/2024
Arturs Grigorjevs
48 questions
Total 382 questions
Go to page: of 39
Search

Related questions