ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Which three items do you recommend for control plane hardening of an infrastructure device?

(Choose three.)

A.

redundant AAA servers

A.

redundant AAA servers

Answers
B.

Control Plane Policing

B.

Control Plane Policing

Answers
C.

warning banners

C.

warning banners

Answers
D.

to enable unused .services

D.

to enable unused .services

Answers
E.

SNMPv3

E.

SNMPv3

Answers
F.

routing protocol authentication

F.

routing protocol authentication

Answers
Suggested answer: B, E, F

According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?

A.

requirement for data-in-motion encryption and 2FA authentication

A.

requirement for data-in-motion encryption and 2FA authentication

Answers
B.

requirement for data-at-rest encryption foe user identification within the VPN termination hardware

B.

requirement for data-at-rest encryption foe user identification within the VPN termination hardware

Answers
C.

categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs

C.

categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs

Answers
D.

ensuring that authorized users have high-availability system access from defined zones to defined systems or zones

D.

ensuring that authorized users have high-availability system access from defined zones to defined systems or zones

Answers
Suggested answer: B

Refer to the exhibit.

OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?

A.

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

A.

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

Answers
B.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

B.

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

Answers
C.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

C.

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

Answers
D.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

D.

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

Answers
Suggested answer: A

Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)

A.

Loop Guard

A.

Loop Guard

Answers
B.

PortFast

B.

PortFast

Answers
C.

DTF

C.

DTF

Answers
D.

Root Guard

D.

Root Guard

Answers
E.

BPDU Guard

E.

BPDU Guard

Answers
Suggested answer: B, E

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

A.

EIGRP

A.

EIGRP

Answers
B.

RPVST+

B.

RPVST+

Answers
C.

MST

C.

MST

Answers
D.

L2MP

D.

L2MP

Answers
Suggested answer: A, B

Which two characteristics apply to firewall transparent mode operations in a firewall solution design?

(Choose two.)

A.

Changes in the existing IP addressing and subnets are required

A.

Changes in the existing IP addressing and subnets are required

Answers
B.

The firewall can participate actively on spanning tree.

B.

The firewall can participate actively on spanning tree.

Answers
C.

Multicast traffic can traverse the firewall.

C.

Multicast traffic can traverse the firewall.

Answers
D.

OSPF adjacencies can be established through the firewall

D.

OSPF adjacencies can be established through the firewall

Answers
E.

The firewall acts like a router hop in the network.

E.

The firewall acts like a router hop in the network.

Answers
Suggested answer: C, D

Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops What do you answer?

A.

VXLAN offers native loop avoidance mechanism

A.

VXLAN offers native loop avoidance mechanism

Answers
B.

Storm Control should be enabled on all ports

B.

Storm Control should be enabled on all ports

Answers
C.

VPC+ could prevent L2 loop on access ports

C.

VPC+ could prevent L2 loop on access ports

Answers
D.

BPDU Guard should be enabled on all VTEP access ports

D.

BPDU Guard should be enabled on all VTEP access ports

Answers
Suggested answer: D

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )

A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

Answers
B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

Answers
C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

Answers
D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

Answers
E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Answers
Suggested answer: A, D

Refer to the exhibit.

Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)

A.

BPDU guard on access ports

A.

BPDU guard on access ports

Answers
B.

BPDU guard on the aggregation switch downlinks toward access switches

B.

BPDU guard on the aggregation switch downlinks toward access switches

Answers
C.

root guard on the aggregation switch downlinks toward access switches

C.

root guard on the aggregation switch downlinks toward access switches

Answers
D.

root guard on access ports

D.

root guard on access ports

Answers
E.

edge port on access ports

E.

edge port on access ports

Answers
F.

access switch pairs explicitly determined to be root and backup root bridges

F.

access switch pairs explicitly determined to be root and backup root bridges

Answers
Suggested answer: A, E

Refer to the exhibit.

There are multiple trees in the Cisco FabricPath All switches in the Layer 2 fabric share the same view of each tree. Which two concepts describe how the multicast traffic is load-balanced across this topology? (Choose two )

A.

A specific (S.G) traffic is not load-balanced

A.

A specific (S.G) traffic is not load-balanced

Answers
B.

All trees are utilized at the same level of the traffic rate

B.

All trees are utilized at the same level of the traffic rate

Answers
C.

Every leaf node assigns the specific (S.G) to the same tree.

C.

Every leaf node assigns the specific (S.G) to the same tree.

Answers
D.

A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.

D.

A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.

Answers
E.

The multicast traffic is generally load-balanced across all trees

E.

The multicast traffic is generally load-balanced across all trees

Answers
Suggested answer: B, D
Total 330 questions
Go to page: of 33