ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Which two benefits can software defined networks provide to businesses? (Choose two.)

A.

provides additional redundancy

A.

provides additional redundancy

Answers
B.

decentralized management

B.

decentralized management

Answers
C.

reduced latency

C.

reduced latency

Answers
D.

enables innovation

D.

enables innovation

Answers
E.

reduction of OpEx/CapEx

E.

reduction of OpEx/CapEx

Answers
F.

meets high traffic demands

F.

meets high traffic demands

Answers
Suggested answer: D, E

Refer to the exhibit.

This network is running EIGRP as the routing protocol and the internal networks are being advertised in EIGRP. Based on the link speeds, all traffic between London and Rome is getting propagated via Barcelona and the direct link between

London and Rome is not being utilized under normal working circumstances. The EIGRP design should allow for efficiency in the routing table by minimizing the routes being exchanged. The link between London and Rome should be utilized for specific routes.

Which two steps accomplish this task? (Choose two.)

A.

Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes

A.

Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes

Answers
B.

Filter the routes on the link between London and Barcelona

B.

Filter the routes on the link between London and Barcelona

Answers
C.

Filter the routes on the link between London and Rome

C.

Filter the routes on the link between London and Rome

Answers
D.

Configure route leaking of summary routes on the link between London and Rome

D.

Configure route leaking of summary routes on the link between London and Rome

Answers
Suggested answer: A, D

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

A.

Evaluate bandwidth utilization and connection quality

A.

Evaluate bandwidth utilization and connection quality

Answers
B.

Enable special requirements such as direct DID lines on pickup

B.

Enable special requirements such as direct DID lines on pickup

Answers
C.

Make recommendations to limit the size of the half-open session table on routers

C.

Make recommendations to limit the size of the half-open session table on routers

Answers
D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

Answers
Suggested answer: A

An enterprise has identified these causes for inefficient CAPEX spending:

• CAPEX planning is driven by technology and not by business objectives.

• The CAPEX planning team lacks the data it needs to perform due diligence tasks.

• The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

Answers
B.

CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully.

B.

CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully.

Answers
C.

Adopt new organizational models that promote real accountability for ROI. not just revenue.

EBITDA, and cash.

C.

Adopt new organizational models that promote real accountability for ROI. not just revenue.

EBITDA, and cash.

Answers
D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Answers
Suggested answer: A

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

A.

reduction in time to detect and respond to threats

A.

reduction in time to detect and respond to threats

Answers
B.

integration with an incident response plan

B.

integration with an incident response plan

Answers
C.

adoption and improvement of threat-detection response

C.

adoption and improvement of threat-detection response

Answers
D.

asset identification and grouping decisions

D.

asset identification and grouping decisions

Answers
Suggested answer: B

Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever increasing cybersecurity threats. To achieve this, federated identity services have been deployed in the Company XYZ network to provide single sign-on and Multi-Factor Authentication for the applications and services. Which protocol can be used by Company XYZ to provide authentication and authorization services?

A.

OAuth2

A.

OAuth2

Answers
B.

OpenID Connect

B.

OpenID Connect

Answers
C.

OpenID

C.

OpenID

Answers
D.

SAML2.0

D.

SAML2.0

Answers
Suggested answer: D

A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches.

Recently, they added a new branch to their network. Due to physical security concerns, they want to extend their existing IP CCTV network of the head office to the new branch, without any routing changes in the network. They are also under some time constraints. What is the best approach to extend the existing IP CCTV network to the new branch, without incurring any IP address changes?

A.

GRE

A.

GRE

Answers
B.

L2TPv3

B.

L2TPv3

Answers
C.

VXLAN

C.

VXLAN

Answers
D.

EoMPLS

D.

EoMPLS

Answers
Suggested answer: B

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

A.

system-oriented architecture

A.

system-oriented architecture

Answers
B.

OSASE architecture

B.

OSASE architecture

Answers
C.

platform-oriented architecture

C.

platform-oriented architecture

Answers
D.

SASE architecture

D.

SASE architecture

Answers
Suggested answer: D

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)

A.

conduct risk analyses

A.

conduct risk analyses

Answers
B.

install firewalls

B.

install firewalls

Answers
C.

use antivirus software

C.

use antivirus software

Answers
D.

establish monitoring policies

D.

establish monitoring policies

Answers
E.

establish risk management policies

E.

establish risk management policies

Answers
Suggested answer: B, C

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

A.

low bandwidth

A.

low bandwidth

Answers
B.

security

C scalability

B.

security

C scalability

Answers
C.

high latency

C.

high latency

Answers
Suggested answer: A
Total 330 questions
Go to page: of 33