Cisco 400-007 Practice Test - Questions Answers, Page 22

List of questions
Question 211

Which two statements explain the operation of BFD asynchronous mode? (Choose two )
Question 212

Refer to the exhibit.
Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?
Question 213

An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones.
Which workaround solution meets the requirement?
Question 214

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?
Question 215

Which tool automates network implementation activities and shortens the implementation lifecycle?
Question 216

Which two factors provide multifactor authentication for secure access to applications and data, no matter where the users are or which devices they are on? (Choose two.)
Question 217

What are two advantages of controller-based networks versus traditional networks? (Choose two.)
Question 218

What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?
Question 219

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)
Question 220

Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:
β’ Securely transfer the corporate data over the private WAN
β’ Use a centralized configuration model.
β’ Minimize overhead on the tunneled traffic.
Which technology can be used in the new design to meet the company's requirements?
Question