ExamGecko
Home / Cisco / 400-007 / List of questions
Ask Question

Cisco 400-007 Practice Test - Questions Answers, Page 19

List of questions

Question 181

Report
Export
Collapse

A business requirement stating that failure of WAN access for dual circuits into an MPLS provider for a Data Centre cannot happen due to related service credits that would need to be paid has led to diversely routed circuits to different points of presence on the providers network? What should a network designer also consider as part of the requirement?

Provision of an additional MPLS provider

Provision of an additional MPLS provider

Out of band access to the MPLS routers

Out of band access to the MPLS routers

Ensuring all related remote branches are dual homed to the MPLS network

Ensuring all related remote branches are dual homed to the MPLS network

Dual PSUs & Supervisors on each MPLS router

Dual PSUs & Supervisors on each MPLS router

Suggested answer: A
asked 10/10/2024
IOSSIF ZINGUER
46 questions

Question 182

Report
Export
Collapse

SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?

need for intelligent traffic monitoring

need for intelligent traffic monitoring

exponential growth of resource-intensive application

exponential growth of resource-intensive application

complex and distributed management flow

complex and distributed management flow

higher operating expense and capital expenditure

higher operating expense and capital expenditure

Suggested answer: B
asked 10/10/2024
Giulia Maggio
38 questions

Question 183

Report
Export
Collapse

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

PIM dense mode with RP located at the hub

PIM dense mode with RP located at the hub

PIM sparse mode with RP located at each remote site

PIM sparse mode with RP located at each remote site

PIM sparse mode with RP located at the hub

PIM sparse mode with RP located at the hub

PIM dense mode with RP located at each remote site

PIM dense mode with RP located at each remote site

Suggested answer: C

Explanation:

https://www.ccexpert.us/routing-switching-2/dynamic-multipoint-vpn.html

asked 10/10/2024
Francisco Julian Mota Fraile
41 questions

Question 184

Report
Export
Collapse

Which extensions to GRE tunneling provide session tracking and in-order packet delivery in exchange for additional state stored in tunnel endpoints?

GRE Protocol Type and Checksum extension fields.

GRE Protocol Type and Checksum extension fields.

GRE Version and Reserved0 extension fields.

GRE Version and Reserved0 extension fields.

No extension fields are available in the GRE header to track session data and packet sequences.

No extension fields are available in the GRE header to track session data and packet sequences.

GRE Key and Sequence number extensions.

GRE Key and Sequence number extensions.

Suggested answer: D
asked 10/10/2024
Venkatesh Ampolu
40 questions

Question 185

Report
Export
Collapse

Which methodology is the leading lifecycle approach to network design and implementation?

PPDIOO

PPDIOO

Waterfall model

Waterfall model

Spiral model

Spiral model

V model

V model

Suggested answer: A

Explanation:

Reference: https://www.ciscopress.com/articles/article.asp?p=1608131&seqNum=3

asked 10/10/2024
loveneel kataria
34 questions

Question 186

Report
Export
Collapse

A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded

IP addresses. Which segmentation method is suitable and scalable for the customer?

data center perimeter firewalling

data center perimeter firewalling

VACLs on data center switches

VACLs on data center switches

transparent firewalling

transparent firewalling

routed firewalls

routed firewalls

Suggested answer: B
asked 10/10/2024
Talal Elemam
51 questions

Question 187

Report
Export
Collapse

A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?

All device configurations are in read-only mode until the controller is restored.

All device configurations are in read-only mode until the controller is restored.

The control plane is unavailable until the controller is restored.

The control plane is unavailable until the controller is restored.

If a device fails, the configuration backup is unavailable-

If a device fails, the configuration backup is unavailable-

Manual changes are only possible until the controller is restored

Manual changes are only possible until the controller is restored

Suggested answer: A
asked 10/10/2024
G C
48 questions

Question 188

Report
Export
Collapse

A service provider recently migrated to an SD-WAN solution for delivering WAN connections to its customers. One of the main challenges with the SD-WAN deployment is that branch site volume increases every year, which causes management complexity. Which action resolves the issue?

Implement a scalable network management system to manage all sites.

Implement a scalable network management system to manage all sites.

Adopt a well-structured SD-WAN service management lifecycle model

Adopt a well-structured SD-WAN service management lifecycle model

Build a service orchestration platform on top of the network controller

Build a service orchestration platform on top of the network controller

Set up a dedicated team to monitor and provision new customers

Set up a dedicated team to monitor and provision new customers

Suggested answer: B
asked 10/10/2024
Jose Leston
41 questions

Question 189

Report
Export
Collapse

Which two statements describe network automation and network orchestration? (Choose two.)

Network automation does not provide governance or policy management.

Network automation does not provide governance or policy management.

Network automation spans multiple network services, vendors, and environments.

Network automation spans multiple network services, vendors, and environments.

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.

Provisioning network services is an example of network automation.

Provisioning network services is an example of network automation.

Network orchestration is used to run single, low-level tasks without human intervention

Network orchestration is used to run single, low-level tasks without human intervention

Suggested answer: A, C
asked 10/10/2024
Pavel Tylich
37 questions

Question 190

Report
Export
Collapse

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

Control Plane Protection using queue thresholding on the transit subinterface

Control Plane Protection using queue thresholding on the transit subinterface

Control Plane Protection using port filtering on the transit subinterface

Control Plane Protection using port filtering on the transit subinterface

Control Plane Protection using port filtering on the main interface

Control Plane Protection using port filtering on the main interface

Control Plane Protection using queue thresholding on the host subinterface

Control Plane Protection using queue thresholding on the host subinterface

Control Plane Protection using port filtering on the host subinterface

Control Plane Protection using port filtering on the host subinterface

Suggested answer: D, E

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_2sb/feature/guide/cpp.html

asked 10/10/2024
edoardo peraino
26 questions
Total 330 questions
Go to page: of 33
Search

Related questions