Cisco 400-007 Practice Test - Questions Answers, Page 19
List of questions
Related questions
A business requirement stating that failure of WAN access for dual circuits into an MPLS provider for a Data Centre cannot happen due to related service credits that would need to be paid has led to diversely routed circuits to different points of presence on the providers network? What should a network designer also consider as part of the requirement?
Provision of an additional MPLS provider
Out of band access to the MPLS routers
Ensuring all related remote branches are dual homed to the MPLS network
Dual PSUs & Supervisors on each MPLS router
SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?
need for intelligent traffic monitoring
exponential growth of resource-intensive application
complex and distributed management flow
higher operating expense and capital expenditure
Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?
PIM dense mode with RP located at the hub
PIM sparse mode with RP located at each remote site
PIM sparse mode with RP located at the hub
PIM dense mode with RP located at each remote site
Which extensions to GRE tunneling provide session tracking and in-order packet delivery in exchange for additional state stored in tunnel endpoints?
GRE Protocol Type and Checksum extension fields.
GRE Version and Reserved0 extension fields.
No extension fields are available in the GRE header to track session data and packet sequences.
GRE Key and Sequence number extensions.
Which methodology is the leading lifecycle approach to network design and implementation?
PPDIOO
Waterfall model
Spiral model
V model
A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded
IP addresses. Which segmentation method is suitable and scalable for the customer?
data center perimeter firewalling
VACLs on data center switches
transparent firewalling
routed firewalls
A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?
All device configurations are in read-only mode until the controller is restored.
The control plane is unavailable until the controller is restored.
If a device fails, the configuration backup is unavailable-
Manual changes are only possible until the controller is restored
A service provider recently migrated to an SD-WAN solution for delivering WAN connections to its customers. One of the main challenges with the SD-WAN deployment is that branch site volume increases every year, which causes management complexity. Which action resolves the issue?
Implement a scalable network management system to manage all sites.
Adopt a well-structured SD-WAN service management lifecycle model
Build a service orchestration platform on top of the network controller
Set up a dedicated team to monitor and provision new customers
Which two statements describe network automation and network orchestration? (Choose two.)
Network automation does not provide governance or policy management.
Network automation spans multiple network services, vendors, and environments.
Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.
Provisioning network services is an example of network automation.
Network orchestration is used to run single, low-level tasks without human intervention
Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)
Control Plane Protection using queue thresholding on the transit subinterface
Control Plane Protection using port filtering on the transit subinterface
Control Plane Protection using port filtering on the main interface
Control Plane Protection using queue thresholding on the host subinterface
Control Plane Protection using port filtering on the host subinterface
Question