Cisco 400-007 Practice Test - Questions Answers, Page 13

List of questions
Question 121

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?
Question 122

You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature Which four routing protocols can you use to facilitate this? (Choose four.)
Question 123

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)
Question 124

You were tasked to enhance the security of a network with these characteristics:
β’ A pool of servers is accessed by numerous data centers and remote sites
β’ The servers are accessed via a cluster of firewalls
β’ The firewalls are configured properly and are not dropping traffic
β’ The firewalls occasionally cause asymmetric routing of traffic within the server data center.
Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?
Question 125

A network architect must redesign a service provider edge, where multiservice and multitenant PEs are currently present. Which design feature should be minimized in the new design to achieve reliability?
Question 126

DRAG DROP
Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.
Question 127

DRAG DROP
Drag and drop the multicast protocols from the left onto the current design situation on the right.
Question 128

DRAG DROP
Drag and drop the end-to-end network virtualization elements from the left onto the correct network areas on the right.
Question 129

DRAG DROP
Drag and drop the design use cases from the left onto the correct uRPF techniques used to prevent spoofing attacks Not all options are used.
Question 130

DRAG DROP
Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.
Question