ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











A network attacker exploits application flaws to compromise critical systems in the organization with these objectives:

• Obtain sensitive data and export the data out of the network.

• Compromise developer and administrator credentials to potentially

What is the next step after application discovery is completed in Zero Trust networkings

A.

Establish visibility and behavior modeling

A.

Establish visibility and behavior modeling

Answers
B.

Enforce policies and microsegmentation.

B.

Enforce policies and microsegmentation.

Answers
C.

Assess real-time security health.

C.

Assess real-time security health.

Answers
D.

Ensure trustworthiness of systems.

D.

Ensure trustworthiness of systems.

Answers
Suggested answer: A

Explanation:


An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface.

Which requirement addresses this ability on a multicontroller platform?

A.

Deploy a root controller to gather a complete network-level view.

A.

Deploy a root controller to gather a complete network-level view.

Answers
B.

Use the East-West API to facilitate replication between controllers within a cluster.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

Answers
C.

Build direct physical connectivity between different controllers.

C.

Build direct physical connectivity between different controllers.

Answers
D.

Use OpenFlow to implement and adapt new protocols.

D.

Use OpenFlow to implement and adapt new protocols.

Answers
Suggested answer: D

An architect prepares a network design for a startup company. The design must be able to meet business requirements while the business grows and divests due to rapidly changing markets. What is the highest priority in this design?

A.

The network should be hierarchical

A.

The network should be hierarchical

Answers
B.

The network should be modular.

B.

The network should be modular.

Answers
C.

The network should be scalable.

C.

The network should be scalable.

Answers
D.

The network should have a dedicated core.

D.

The network should have a dedicated core.

Answers
Suggested answer: C

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?

A.

MSDP

A.

MSDP

Answers
B.

PIM SSM

B.

PIM SSM

Answers
C.

MPLS

C.

MPLS

Answers
D.

PIM sparse mode

D.

PIM sparse mode

Answers
Suggested answer: A

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/ios/ipmulti/configuration/guide/imc_msdp_im_pim_sm_12_2_50_SY.html

A business customer deploys workloads in the public cloud. Now the customer network faces governance issues with the flow of IT traffic and must ensure the security of data and intellectual property. Which action helps to identify the issue for further resolution?

A.

Set up a secure tunnel from customer routers to ensure that traffic is protected as it travels to the cloud service providers.

A.

Set up a secure tunnel from customer routers to ensure that traffic is protected as it travels to the cloud service providers.

Answers
B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud service providers

B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud service providers

Answers
C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic sent to cloud service providers

C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic sent to cloud service providers

Answers
D.

Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud.

D.

Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud.

Answers
Suggested answer: B

What are two descriptions of network optimization? (Choose two.)

A.

maintain high availability

A.

maintain high availability

Answers
B.

proactive network management

B.

proactive network management

Answers
C.

network redesign

C.

network redesign

Answers
D.

network health maintenance

D.

network health maintenance

Answers
E.

identify network requirements

E.

identify network requirements

Answers
Suggested answer: A, D

Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)

A.

Check for high roaming delay.

A.

Check for high roaming delay.

Answers
B.

Check for uniform radio coverage across the floors.

B.

Check for uniform radio coverage across the floors.

Answers
C.

Check for high channel utilization.

C.

Check for high channel utilization.

Answers
D.

Check for latency over wireless.

D.

Check for latency over wireless.

Answers
E.

Identify frequent TX power changes.

E.

Identify frequent TX power changes.

Answers
Suggested answer: A, C

Explanation:

https://community.cisco.com/t5/wireless/channel-utilization/td-p/2716667

What statement describes the application layer as defined in the software-defined networking architecture?

A.

This layer is responsible for collecting the network status such as network usage and topology.

A.

This layer is responsible for collecting the network status such as network usage and topology.

Answers
B.

This layer contains programs that communicate their desired network behavior to controllers.

B.

This layer contains programs that communicate their desired network behavior to controllers.

Answers
C.

This layer is responsible for handling packets based on the rules provided by the controller.

C.

This layer is responsible for handling packets based on the rules provided by the controller.

Answers
D.

This layer processes the instructions and requirements sent by networking components.

D.

This layer processes the instructions and requirements sent by networking components.

Answers
Suggested answer: B

Explanation:

Reference: https://www.sunnyvalley.io/docs/network-basics/what-is-software-defined-networkingsdn

The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)

A.

access control lists

A.

access control lists

Answers
B.

firewalls

B.

firewalls

Answers
C.

QoS policy propagation with BGP

C.

QoS policy propagation with BGP

Answers
D.

remote black-holing trigger

D.

remote black-holing trigger

Answers
E.

prefix lists

E.

prefix lists

Answers
Suggested answer: D, E

What are two design constraints in a standard spine and leaf architecture? (Choose two.)

A.

Spine switches can connect to each other.

A.

Spine switches can connect to each other.

Answers
B.

Each spine switch must connect to every leaf switch.

B.

Each spine switch must connect to every leaf switch.

Answers
C.

Leaf switches must connect to each other.

C.

Leaf switches must connect to each other.

Answers
D.

Endpoints connect only to the spine switches.

D.

Endpoints connect only to the spine switches.

Answers
E.

Each leaf switch must connect to every spine switch.

E.

Each leaf switch must connect to every spine switch.

Answers
Suggested answer: B, E
Total 330 questions
Go to page: of 33