Cisco 400-007 Practice Test - Questions Answers, Page 10
List of questions
Related questions
Which three items do you recommend for control plane hardening of an infrastructure device?
(Choose three.)
redundant AAA servers
Control Plane Policing
warning banners
to enable unused .services
SNMPv3
routing protocol authentication
According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?
requirement for data-in-motion encryption and 2FA authentication
requirement for data-at-rest encryption foe user identification within the VPN termination hardware
categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs
ensuring that authorized users have high-availability system access from defined zones to defined systems or zones
Refer to the exhibit.
OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?
R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.
Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.
A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.
R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.
Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)
Loop Guard
PortFast
DTF
Root Guard
BPDU Guard
You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)
EIGRP
RPVST+
MST
L2MP
Which two characteristics apply to firewall transparent mode operations in a firewall solution design?
(Choose two.)
Changes in the existing IP addressing and subnets are required
The firewall can participate actively on spanning tree.
Multicast traffic can traverse the firewall.
OSPF adjacencies can be established through the firewall
The firewall acts like a router hop in the network.
Your company wants to deploy a new data center infrastructure Based on the requirements you have chosen VXLAN as encapsulation technology The customer is concerned about miss-configuration of Layer 2 devices and DC wide outages caused by Layer 2 loops What do you answer?
VXLAN offers native loop avoidance mechanism
Storm Control should be enabled on all ports
VPC+ could prevent L2 loop on access ports
BPDU Guard should be enabled on all VTEP access ports
Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )
lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic
It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.
It can be used to automatically synchronize the link-state database between Level 1 intermediate systems
It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.
It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems
Refer to the exhibit.
Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)
BPDU guard on access ports
BPDU guard on the aggregation switch downlinks toward access switches
root guard on the aggregation switch downlinks toward access switches
root guard on access ports
edge port on access ports
access switch pairs explicitly determined to be root and backup root bridges
Refer to the exhibit.
There are multiple trees in the Cisco FabricPath All switches in the Layer 2 fabric share the same view of each tree. Which two concepts describe how the multicast traffic is load-balanced across this topology? (Choose two )
A specific (S.G) traffic is not load-balanced
All trees are utilized at the same level of the traffic rate
Every leaf node assigns the specific (S.G) to the same tree.
A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.
The multicast traffic is generally load-balanced across all trees
Question