ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

A.

inside global

A.

inside global

Answers
B.

outside global

B.

outside global

Answers
C.

inside local

C.

inside local

Answers
D.

outside local

D.

outside local

Answers
Suggested answer: C

You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature Which four routing protocols can you use to facilitate this? (Choose four.)

A.

IS-IS

A.

IS-IS

Answers
B.

static

B.

static

Answers
C.

RIP

C.

RIP

Answers
D.

EIGRP

D.

EIGRP

Answers
E.

BGP

E.

BGP

Answers
Suggested answer: A, B, D, E

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)

A.

service provider agreement to support tuned timers

A.

service provider agreement to support tuned timers

Answers
B.

manual updates to the peer groups

B.

manual updates to the peer groups

Answers
C.

service provider scheduling of changes to the PE

C.

service provider scheduling of changes to the PE

Answers
D.

number of routes on the CE router

D.

number of routes on the CE router

Answers
E.

number of VRFs on the PE router

E.

number of VRFs on the PE router

Answers
Suggested answer: A, D

You were tasked to enhance the security of a network with these characteristics:

• A pool of servers is accessed by numerous data centers and remote sites

• The servers are accessed via a cluster of firewalls

• The firewalls are configured properly and are not dropping traffic

• The firewalls occasionally cause asymmetric routing of traffic within the server data center.

Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

A.

Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.

A.

Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.

Answers
B.

Deploy uRPF strict mode.

B.

Deploy uRPF strict mode.

Answers
C.

Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.

C.

Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.

Answers
D.

Deploy uRPF loose mode

D.

Deploy uRPF loose mode

Answers
Suggested answer: C

A network architect must redesign a service provider edge, where multiservice and multitenant PEs are currently present. Which design feature should be minimized in the new design to achieve reliability?

A.

bridging

A.

bridging

Answers
B.

fate sharing

B.

fate sharing

Answers
C.

redundancy

C.

redundancy

Answers
D.

unicast overlay routing

D.

unicast overlay routing

Answers
Suggested answer: B

DRAG DROP

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.


Question 126
Correct answer: Question 126

DRAG DROP

Drag and drop the multicast protocols from the left onto the current design situation on the right.


Question 127
Correct answer: Question 127

DRAG DROP

Drag and drop the end-to-end network virtualization elements from the left onto the correct network areas on the right.


Question 128
Correct answer: Question 128

DRAG DROP

Drag and drop the design use cases from the left onto the correct uRPF techniques used to prevent spoofing attacks Not all options are used.


Question 129
Correct answer: Question 129

DRAG DROP

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.


Question 130
Correct answer: Question 130
Total 330 questions
Go to page: of 33