ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions












Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

A.

southbound APIs

A.

southbound APIs

Answers
B.

northbound APIs

B.

northbound APIs

Answers
C.

orchestration layer

C.

orchestration layer

Answers
D.

SDN controller

D.

SDN controller

Answers
Suggested answer: B

An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network.

The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate this during the migration phase?

A.

Deploy controllers, deploy SD-WAN edge routers. In the data center, and migrate branch sites.

A.

Deploy controllers, deploy SD-WAN edge routers. In the data center, and migrate branch sites.

Answers
B.

Migrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers.

B.

Migrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers.

Answers
C.

Migrate branch sites, migrate data center WAN routers, and deploy controllers.

C.

Migrate branch sites, migrate data center WAN routers, and deploy controllers.

Answers
D.

Deploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites

D.

Deploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites

Answers
Suggested answer: A

Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?

A.

OSPF fast hellos

A.

OSPF fast hellos

Answers
B.

BFDecho

B.

BFDecho

Answers
C.

Change the protocol to BGP

C.

Change the protocol to BGP

Answers
D.

Change the OSPF hello and dead intervals

D.

Change the OSPF hello and dead intervals

Answers
Suggested answer: B

Company XYZ wants to redesign the Layer 2 part of their network and wants to use all available uplinks for increased performance. They also want to have end host reachability supporting conversational learning. However, due to design constraints, they cannot implement port-channel on the uplinks. Which other technique can be used to make sure the uplinks are in active/active state?

A.

TRILL

A.

TRILL

Answers
B.

LISP

B.

LISP

Answers
C.

MSTP

C.

MSTP

Answers
D.

switch stack

D.

switch stack

Answers
Suggested answer: B

An engineer must design a network for a company that uses OSPF LFA to reduce loops. Which type of loop would be reduced by using this design?

A.

DTP

A.

DTP

Answers
B.

micro loops

B.

micro loops

Answers
C.

STP

C.

STP

Answers
D.

REP

D.

REP

Answers
Suggested answer: B

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

A.

Design in a way that expects outages and attacks on the network and its protected resources

A.

Design in a way that expects outages and attacks on the network and its protected resources

Answers
B.

The design approach should consider simple and centralized management aspect

B.

The design approach should consider simple and centralized management aspect

Answers
C.

Design in a way that it simplifies and improves ease of deployment

C.

Design in a way that it simplifies and improves ease of deployment

Answers
D.

Design automation tools wherever it is appropriate for greater visibility

D.

Design automation tools wherever it is appropriate for greater visibility

Answers
Suggested answer: A

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

A.

device resiliency

A.

device resiliency

Answers
B.

device type

B.

device type

Answers
C.

network type

C.

network type

Answers
D.

network resiliency

D.

network resiliency

Answers
E.

network size

E.

network size

Answers
Suggested answer: A, D

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

Answers
B.

separates infrastructure and policy

B.

separates infrastructure and policy

Answers
C.

uses policy-based forwarding of real-time traffic with less complexity

C.

uses policy-based forwarding of real-time traffic with less complexity

Answers
D.

unifies the WAN backbone

D.

unifies the WAN backbone

Answers
E.

manages failures through backup links

E.

manages failures through backup links

Answers
Suggested answer: C, D

What is an architectural framework created by ETSI that defines standards to decouple network functions from proprietary hardware-based appliances and have them run in software on standard x86 servers?

A.

NPIV

A.

NPIV

Answers
B.

NFVIS

B.

NFVIS

Answers
C.

NFV

C.

NFV

Answers
D.

VNF

D.

VNF

Answers
Suggested answer: C

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

A.

cryptography

A.

cryptography

Answers
B.

confidentiality

B.

confidentiality

Answers
C.

authorization

C.

authorization

Answers
D.

identification

D.

identification

Answers
E.

integrity

E.

integrity

Answers
F.

availability

F.

availability

Answers
Suggested answer: B, E, F
Total 330 questions
Go to page: of 33