ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











An enterprise wants to provide low-cost delivery of network systems that can be scaled on business demand, followed by an initiative to reduce capital expenses for new IT equipment. Which technology meets these goals'?

A.

laaS within a private cloud

A.

laaS within a private cloud

Answers
B.

laaS within an on-premises location

B.

laaS within an on-premises location

Answers
C.

PaaS within a public cloud

C.

PaaS within a public cloud

Answers
D.

SaaS within an on-premises location

D.

SaaS within an on-premises location

Answers
Suggested answer: C

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

A.

access

A.

access

Answers
B.

core

B.

core

Answers
C.

collapsed core

C.

collapsed core

Answers
D.

distribution

D.

distribution

Answers
Suggested answer: A

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?

A.

working design over comprehensive documentation

A.

working design over comprehensive documentation

Answers
B.

contract negotiation over customer collaboration

B.

contract negotiation over customer collaboration

Answers
C.

following a plan over responding to change

C.

following a plan over responding to change

Answers
D.

processes and tools over individuals and interactions over time

D.

processes and tools over individuals and interactions over time

Answers
Suggested answer: A

Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbour relationships to be minimized on each network segment and want to optimize the size of the IS-IS LSDB on each router.

Which can design can be used to meet these requirements?

A.

Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area

A.

Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area

Answers
B.

Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1

B.

Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1

Answers
C.

Design the network so that all routers are Level 1 routers

C.

Design the network so that all routers are Level 1 routers

Answers
D.

Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1

D.

Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1

Answers
Suggested answer: D

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

Answers
B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

Answers
C.

Apply strong encryption for transmission of cardholder data across public networks.

C.

Apply strong encryption for transmission of cardholder data across public networks.

Answers
D.

Protect all user systems against malware and frequently update antivirus software

D.

Protect all user systems against malware and frequently update antivirus software

Answers
E.

Maintain a policy that addresses information security for employees and third parties.

E.

Maintain a policy that addresses information security for employees and third parties.

Answers
Suggested answer: C, E

Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network.

The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?

A.

LDAP

A.

LDAP

Answers
B.

EAP

B.

EAP

Answers
C.

TACACS+

C.

TACACS+

Answers
D.

RADIUS

D.

RADIUS

Answers
Suggested answer: D

Explanation:

https://www.networkstraining.com/what-is-cisco-ise/

Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?

A.

It transmits packets that traverse over network devices like switches and routers

A.

It transmits packets that traverse over network devices like switches and routers

Answers
B.

It encapsulates packets at source and destination, which incurs additional overhead

B.

It encapsulates packets at source and destination, which incurs additional overhead

Answers
C.

Packet delivery and reliability occurs at Layer 3 and Layer 4

C.

Packet delivery and reliability occurs at Layer 3 and Layer 4

Answers
D.

It is responsible for the delivery of packets; NAT- or VRF-based segregation is required

D.

It is responsible for the delivery of packets; NAT- or VRF-based segregation is required

Answers
Suggested answer: B

In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?

A.

Jenkins

A.

Jenkins

Answers
B.

Ansible

B.

Ansible

Answers
C.

Perl

C.

Perl

Answers
D.

Chef

D.

Chef

Answers
Suggested answer: A

Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?

A.

After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval

A.

After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval

Answers
B.

After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval

B.

After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval

Answers
C.

Timers renegotiate indefinitely, so the timer exchange phase never converges

C.

Timers renegotiate indefinitely, so the timer exchange phase never converges

Answers
D.

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

D.

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

Answers
Suggested answer: B

Which feature is supported by NETCONF but is not supported by SNMP?

A.

distinguishing between configuration data and operational data

A.

distinguishing between configuration data and operational data

Answers
B.

taking administrative actions

B.

taking administrative actions

Answers
C.

collecting the status of specific fields

C.

collecting the status of specific fields

Answers
D.

changing the configuration of specific fields

D.

changing the configuration of specific fields

Answers
Suggested answer: A
Total 330 questions
Go to page: of 33