Cisco 400-007 Practice Test - Questions Answers, Page 23
List of questions
Related questions
An enterprise wants to provide low-cost delivery of network systems that can be scaled on business demand, followed by an initiative to reduce capital expenses for new IT equipment. Which technology meets these goals'?
laaS within a private cloud
laaS within an on-premises location
PaaS within a public cloud
SaaS within an on-premises location
Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?
access
core
collapsed core
distribution
Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?
working design over comprehensive documentation
contract negotiation over customer collaboration
following a plan over responding to change
processes and tools over individuals and interactions over time
Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbour relationships to be minimized on each network segment and want to optimize the size of the IS-IS LSDB on each router.
Which can design can be used to meet these requirements?
Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area
Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1
Design the network so that all routers are Level 1 routers
Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1
A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)
Ensure that strong cryptography is applied for users who have administrative access through networks
Apply strong cryptography and security protocols to safeguard sensitive cardholder data.
Apply strong encryption for transmission of cardholder data across public networks.
Protect all user systems against malware and frequently update antivirus software
Maintain a policy that addresses information security for employees and third parties.
Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network.
The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?
LDAP
EAP
TACACS+
RADIUS
Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?
It transmits packets that traverse over network devices like switches and routers
It encapsulates packets at source and destination, which incurs additional overhead
Packet delivery and reliability occurs at Layer 3 and Layer 4
It is responsible for the delivery of packets; NAT- or VRF-based segregation is required
In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?
Jenkins
Ansible
Perl
Chef
Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?
After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval
After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval
Timers renegotiate indefinitely, so the timer exchange phase never converges
R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set
Which feature is supported by NETCONF but is not supported by SNMP?
distinguishing between configuration data and operational data
taking administrative actions
collecting the status of specific fields
changing the configuration of specific fields
Question