Cisco 400-007 Practice Test - Questions Answers, Page 22
List of questions
Related questions
Which two statements explain the operation of BFD asynchronous mode? (Choose two )
BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.
BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.
BFD asynchronous mode with and without echo packets use control packets.
BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.
BFD asynchronous mode with echo packets uses separate control packets and echo packets.
Refer to the exhibit.
Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?
address family translation
dual stack
host-to-host tunneling
6rd tunneling
An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones.
Which workaround solution meets the requirement?
Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.
Enable phone VPN authentication based on end-user username and password.
Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.
Use authentication-based clear text password with no EAP-MD5 on the legacy phones.
Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?
Redistribute using metric type 2 into OSPF.
Redistribute using metric type 1 into OSPF.
Redistribute using metric type 1 into EIGRP.
Redistribute using metric type 2 into EIGRP.
Which tool automates network implementation activities and shortens the implementation lifecycle?
LISP
Java
Conclusion
Python
Which two factors provide multifactor authentication for secure access to applications and data, no matter where the users are or which devices they are on? (Choose two.)
persona-based
power-based
push-based
possession-based
pull-based
What are two advantages of controller-based networks versus traditional networks? (Choose two.)
the ability to have forwarding tables at each device
more flexible configuration per device
more consistent device configuration
programmatic APIs that are available per device
the ability to configure the features for the network rather than per device
What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?
PaaS
SaaS
laaS
WaaS
Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)
wide area network
mobile network
metro network
application network
control network
Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:
• Securely transfer the corporate data over the private WAN
• Use a centralized configuration model.
• Minimize overhead on the tunneled traffic.
Which technology can be used in the new design to meet the company's requirements?
S-VTI
DMVPN
MGRE
GET VPN
Question