ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











Which two statements explain the operation of BFD asynchronous mode? (Choose two )

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

Answers
B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

Answers
C.

BFD asynchronous mode with and without echo packets use control packets.

C.

BFD asynchronous mode with and without echo packets use control packets.

Answers
D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

Answers
E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Answers
Suggested answer: C, E

Refer to the exhibit.

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

A.

address family translation

A.

address family translation

Answers
B.

dual stack

B.

dual stack

Answers
C.

host-to-host tunneling

C.

host-to-host tunneling

Answers
D.

6rd tunneling

D.

6rd tunneling

Answers
Suggested answer: B

An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones.

Which workaround solution meets the requirement?

A.

Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.

A.

Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.

Answers
B.

Enable phone VPN authentication based on end-user username and password.

B.

Enable phone VPN authentication based on end-user username and password.

Answers
C.

Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.

C.

Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.

Answers
D.

Use authentication-based clear text password with no EAP-MD5 on the legacy phones.

D.

Use authentication-based clear text password with no EAP-MD5 on the legacy phones.

Answers
Suggested answer: B

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?

A.

Redistribute using metric type 2 into OSPF.

A.

Redistribute using metric type 2 into OSPF.

Answers
B.

Redistribute using metric type 1 into OSPF.

B.

Redistribute using metric type 1 into OSPF.

Answers
C.

Redistribute using metric type 1 into EIGRP.

C.

Redistribute using metric type 1 into EIGRP.

Answers
D.

Redistribute using metric type 2 into EIGRP.

D.

Redistribute using metric type 2 into EIGRP.

Answers
Suggested answer: B

Explanation:

https://www.ciscopress.com/articles/article.asp?p=27573&seqNum=4#:~:text=Routes%20are%20redistributed%20in%20OSPF,shown%20in%20Figure%2014%2D2.

Which tool automates network implementation activities and shortens the implementation lifecycle?

A.

LISP

A.

LISP

Answers
B.

Java

B.

Java

Answers
C.

Conclusion

C.

Conclusion

Answers
D.

Python

D.

Python

Answers
Suggested answer: D

Which two factors provide multifactor authentication for secure access to applications and data, no matter where the users are or which devices they are on? (Choose two.)

A.

persona-based

A.

persona-based

Answers
B.

power-based

B.

power-based

Answers
C.

push-based

C.

push-based

Answers
D.

possession-based

D.

possession-based

Answers
E.

pull-based

E.

pull-based

Answers
Suggested answer: C, D

What are two advantages of controller-based networks versus traditional networks? (Choose two.)

A.

the ability to have forwarding tables at each device

A.

the ability to have forwarding tables at each device

Answers
B.

more flexible configuration per device

B.

more flexible configuration per device

Answers
C.

more consistent device configuration

C.

more consistent device configuration

Answers
D.

programmatic APIs that are available per device

D.

programmatic APIs that are available per device

Answers
E.

the ability to configure the features for the network rather than per device

E.

the ability to configure the features for the network rather than per device

Answers
Suggested answer: C, E

What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?

A.

PaaS

A.

PaaS

Answers
B.

SaaS

B.

SaaS

Answers
C.

laaS

C.

laaS

Answers
D.

WaaS

D.

WaaS

Answers
Suggested answer: B

Explanation:

Reference: https://www.dynamicsfocus.com/practice-areas/cloud-saas/

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

A.

wide area network

A.

wide area network

Answers
B.

mobile network

B.

mobile network

Answers
C.

metro network

C.

metro network

Answers
D.

application network

D.

application network

Answers
E.

control network

E.

control network

Answers
Suggested answer: A, E

Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:

• Securely transfer the corporate data over the private WAN

• Use a centralized configuration model.

• Minimize overhead on the tunneled traffic.

Which technology can be used in the new design to meet the company's requirements?

A.

S-VTI

A.

S-VTI

Answers
B.

DMVPN

B.

DMVPN

Answers
C.

MGRE

C.

MGRE

Answers
D.

GET VPN

D.

GET VPN

Answers
Suggested answer: D
Total 330 questions
Go to page: of 33