ExamGecko
Home / Cisco / 400-007 / List of questions
Ask Question

Cisco 400-007 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report Export Collapse

An enterprise network has two core routers that connect to 200 distribution routers and uses fullmesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?

Implement route reflectors on the two core routers

Implement route reflectors on the two core routers

Increase the memory on the core routers

Increase the memory on the core routers

Implement e BGP between the core and distribution routers

Implement e BGP between the core and distribution routers

Increase the memory on the distribution routers

Increase the memory on the distribution routers

Increase bandwidth between the core routers

Increase bandwidth between the core routers

Suggested answer: A
asked 10/10/2024
Robbie Shen
40 questions

Question 12

Report Export Collapse

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

Root guard

Root guard

BPDU guard

BPDU guard

Loop guard

Loop guard

BPDU filtering

BPDU filtering

Suggested answer: C
asked 10/10/2024
B Erol
63 questions

Question 13

Report Export Collapse

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Use two phantom RP addresses

Use two phantom RP addresses

Manipulate the administration distance of the unicast routes to the two RPs

Manipulate the administration distance of the unicast routes to the two RPs

Manipulate the multicast routing table by creating static mroutes to the two RPs

Manipulate the multicast routing table by creating static mroutes to the two RPs

Advertise the two RP addresses in the routing protocol

Advertise the two RP addresses in the routing protocol

Use anycast RP based on MSDP peering between the two RPs

Use anycast RP based on MSDP peering between the two RPs

Control routing to the two RPs through a longest match prefix

Control routing to the two RPs through a longest match prefix

Suggested answer: A, F
asked 10/10/2024
Sarath Ganaparthi
48 questions

Question 14

Report Export Collapse

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

first-hop router registration to the RP

first-hop router registration to the RP

multicast client registration to the RP

multicast client registration to the RP

multicast source registration to the RP

multicast source registration to the RP

transport of all IPv6 multicast traffic

transport of all IPv6 multicast traffic

Suggested answer: A
asked 10/10/2024
Blavier Arnaud
48 questions

Question 15

Report Export Collapse

Refer to the exhibit.

Cisco 400-007 image Question 15 118691 10102024233153000000

ACME Mining has four data centers in Santiago. Cape Town. Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN They want to deploy a new mission-critical application with these requirements: cluster heartbeat 2 Mb/s continuous (250 KB/s) cluster heartbeat one-way maximum latency 100 ms

These are the current ping tests results between the four data centers:

Cisco 400-007 image Question 15 118691 10102024233153000000

Which hosting data center pair can host the new application?

Mumbai and Beijing

Mumbai and Beijing

Santiago and Cape Town

Santiago and Cape Town

Santiago and Mumbai

Santiago and Mumbai

Cape Town and Mumbai

Cape Town and Mumbai

Cape Town and Beijing

Cape Town and Beijing

Santiago and Beijing

Santiago and Beijing

Suggested answer: D
asked 10/10/2024
Srecka Kovacevic
43 questions

Question 16

Report Export Collapse

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-topoint link failure?

Limit the query domain by use of distribute lists.

Limit the query domain by use of distribute lists.

Build neighbor adjacencies in a triangulated fashion.

Build neighbor adjacencies in a triangulated fashion.

Build neighbor adjacencies in squared fashion.

Build neighbor adjacencies in squared fashion.

Limit the query domain by use of summarization.

Limit the query domain by use of summarization.

Limit the query domain by use of default routes.

Limit the query domain by use of default routes.

Suggested answer: D
asked 10/10/2024
Quintin van Rooyen
49 questions

Question 17

Report Export Collapse

Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?

It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger.

It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger.

It protects the network Infrastructure against spoofed DDoS attacks.

It protects the network Infrastructure against spoofed DDoS attacks.

It Classifies bogon traffic and remarks it with DSCP bulk.

It Classifies bogon traffic and remarks it with DSCP bulk.

It filters RFC 1918 IP addresses.

It filters RFC 1918 IP addresses.

Suggested answer: B
asked 10/10/2024
Farah Fauzi
46 questions

Question 18

Report Export Collapse

Which relationship between IBGP and the underlying physical topology is true?

iBGP full mesh requirement does not dictate any specific network topology.

iBGP full mesh requirement does not dictate any specific network topology.

iBGP can worn only on a ring network topology with a link-state protocol like OSPF or IS-IS

iBGP can worn only on a ring network topology with a link-state protocol like OSPF or IS-IS

iBGP full mesh requires an underlying fully meshed network topology.

iBGP full mesh requires an underlying fully meshed network topology.

iBGP does not work on a ring network topology even with an underlying IGP.

iBGP does not work on a ring network topology even with an underlying IGP.

Suggested answer: A
Explanation:

iBGP peers can be multiple hops away. not like eBGP that needs direct connection (or ebgp-multihop defined). thus, only IP connectivity between two peers is required for an adjacency to form

asked 10/10/2024
Jason Childers
42 questions

Question 19

Report Export Collapse

How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?

5

5

6

6

7

7

10

10

20

20

Suggested answer: C
Explanation:

Assuming routers R1-R5, R1 is elected DR, R2 BDR. Fully established neighborships only occur to DR and BDR, all other neighbors are in 2Way DR other state. DR|BDRFull relationships: R2-R1R3-R1R3-R2R4-R1R4-R2R5-R1R5-R2

asked 10/10/2024
Issam Boumlic
49 questions

Question 20

Report Export Collapse

Refer to the exhibit.

Cisco 400-007 image Question 20 118696 10102024233153000000

Traffic was equally balanced between Layer 3 links on core switches SW1 and SW2 before an introduction of the new video server in the network. This video server uses multicast to send video streams to hosts and now one of the links between core switches is over utilized Which design solution solves this issue?

Add more links between core switches.

Add more links between core switches.

Aggregate links Layer 2 link aggregation.

Aggregate links Layer 2 link aggregation.

Apply a more granular load- balancing method on SW1.

Apply a more granular load- balancing method on SW1.

Apply a more granular load-balancing method on SW2.

Apply a more granular load-balancing method on SW2.

Filter IGMP joins on an over -utilized link.

Filter IGMP joins on an over -utilized link.

Suggested answer: B
asked 10/10/2024
Pieter Louw
46 questions
Total 382 questions
Go to page: of 39
Search

Related questions