Cisco 400-007 Practice Test - Questions Answers, Page 21
List of questions
Related questions
A network attacker exploits application flaws to compromise critical systems in the organization with these objectives:
• Obtain sensitive data and export the data out of the network.
• Compromise developer and administrator credentials to potentially
What is the next step after application discovery is completed in Zero Trust networkings
Establish visibility and behavior modeling
Enforce policies and microsegmentation.
Assess real-time security health.
Ensure trustworthiness of systems.
An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface.
Which requirement addresses this ability on a multicontroller platform?
Deploy a root controller to gather a complete network-level view.
Use the East-West API to facilitate replication between controllers within a cluster.
Build direct physical connectivity between different controllers.
Use OpenFlow to implement and adapt new protocols.
An architect prepares a network design for a startup company. The design must be able to meet business requirements while the business grows and divests due to rapidly changing markets. What is the highest priority in this design?
The network should be hierarchical
The network should be modular.
The network should be scalable.
The network should have a dedicated core.
Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?
MSDP
PIM SSM
MPLS
PIM sparse mode
A business customer deploys workloads in the public cloud. Now the customer network faces governance issues with the flow of IT traffic and must ensure the security of data and intellectual property. Which action helps to identify the issue for further resolution?
Set up a secure tunnel from customer routers to ensure that traffic is protected as it travels to the cloud service providers.
Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud service providers
Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic sent to cloud service providers
Apply workload policies that dictate the security requirements to the workloads that are placed in the cloud.
What are two descriptions of network optimization? (Choose two.)
maintain high availability
proactive network management
network redesign
network health maintenance
identify network requirements
Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)
Check for high roaming delay.
Check for uniform radio coverage across the floors.
Check for high channel utilization.
Check for latency over wireless.
Identify frequent TX power changes.
What statement describes the application layer as defined in the software-defined networking architecture?
This layer is responsible for collecting the network status such as network usage and topology.
This layer contains programs that communicate their desired network behavior to controllers.
This layer is responsible for handling packets based on the rules provided by the controller.
This layer processes the instructions and requirements sent by networking components.
The Layer 3 control plane is the intelligence over the network that steers traffic toward its intended destination. Which two techniques can be used in service provider-style networks to offer a more dynamic, flexible, controlled, and secure control plane design? (Choose two.)
access control lists
firewalls
QoS policy propagation with BGP
remote black-holing trigger
prefix lists
What are two design constraints in a standard spine and leaf architecture? (Choose two.)
Spine switches can connect to each other.
Each spine switch must connect to every leaf switch.
Leaf switches must connect to each other.
Endpoints connect only to the spine switches.
Each leaf switch must connect to every spine switch.
Question