ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











Which two benefits can software-defined networks provide to businesses? (Choose two.)

A.

provides additional redundancy

A.

provides additional redundancy

Answers
B.

reduction of OpEx/CapEx

B.

reduction of OpEx/CapEx

Answers
C.

reduced latency

C.

reduced latency

Answers
D.

decentralized management

D.

decentralized management

Answers
E.

enables innovation

E.

enables innovation

Answers
F.

meets high traffic demands

F.

meets high traffic demands

Answers
Suggested answer: B, E

DRAG DROP

Drag and drop the QoS technologies from the left onto the correct capabilities on the right


Question 282
Correct answer: Question 282

Company XYZ plans to run OSPF on a DMVPN network. They want to use spoke-to-spoke tunnels in the design What is a drawback or concern in this type of design?

A.

Additional host routes will be inserted into the routing tables

A.

Additional host routes will be inserted into the routing tables

Answers
B.

Manual configuration of the spokes with the appropriate priority will be needed

B.

Manual configuration of the spokes with the appropriate priority will be needed

Answers
C.

There will be split-horizon issue at the hub

C.

There will be split-horizon issue at the hub

Answers
D.

Manual configuration of the spoke IP address on the hub will be needed

D.

Manual configuration of the spoke IP address on the hub will be needed

Answers
Suggested answer: B

SDN is still maturing Throughout the evolution of SDN which two things will play a key role in enabling a successful deployment and avoiding performance visibility gaps in the infrastructure? (Choose two.)

A.

rapid on-demand growth

A.

rapid on-demand growth

Answers
B.

dynamic real-time change

B.

dynamic real-time change

Answers
C.

falling back to old behaviors

C.

falling back to old behaviors

Answers
D.

peer-to-peer controller infrastructure

D.

peer-to-peer controller infrastructure

Answers
E.

integration of device context

E.

integration of device context

Answers
Suggested answer: B, E

Company XYZ, a global content provider, owns data centers on different continents Their data center design involves a standard three-layer design with a Layer 3-only core VRRP is used as the FHRP They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe in the absence of other business or technical constraints which termination point is optimal for the Layer 2 interconnection?

A.

at the core layer, to offer the possibility to isolate STP domains

A.

at the core layer, to offer the possibility to isolate STP domains

Answers
B.

at the access layer because the STP root bridge does not need to align with the VRRP active node

B.

at the access layer because the STP root bridge does not need to align with the VRRP active node

Answers
C.

at the core layer because all external connections must terminate there for security reasons

C.

at the core layer because all external connections must terminate there for security reasons

Answers
D.

at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

D.

at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

Answers
Suggested answer: D

The Agile Manifesto is a document that defines the key values and principles behind the Agile philosophy and helps development teams work more efficiently and sustainably Each of the four key values is split into two sections a left-hand side and a right-hand side In other words, though there is value in the items on the right we value the items on the left more What is one of the key values of the Agile Manifesto?

A.

comprehensive documentation over working software

A.

comprehensive documentation over working software

Answers
B.

contract negotiation over customer collaboration

B.

contract negotiation over customer collaboration

Answers
C.

individuals and interactions over processes and tools

C.

individuals and interactions over processes and tools

Answers
D.

following a plan over responding to change

D.

following a plan over responding to change

Answers
Suggested answer: C

Company XYZ wants to prevent switch loops caused by unidirectional point-point-link condition on Rapid FVST + and MST. Which technology can be used in the design to meet this requirement?

A.

STPBPDU guard

A.

STPBPDU guard

Answers
B.

STP bridge assurance

B.

STP bridge assurance

Answers
C.

MSTP

C.

MSTP

Answers
D.

TRILL

D.

TRILL

Answers
Suggested answer: B

A business requirement is supplied to an architect from a car manufacturer stating their business model is changing to just-in-time manufacturing and a new network is required, the manufacturer does not produce all of the specific components m-house. which area should the architect focus on initially?

A.

Automation

A.

Automation

Answers
B.

Zero Trust Networking

B.

Zero Trust Networking

Answers
C.

Low Latency Infrastructure

C.

Low Latency Infrastructure

Answers
D.

Modularity

D.

Modularity

Answers
Suggested answer: A

Which aspect of BGP-LS makes it scalable in large network when multiarea topology information must be gathered?

A.

transmit flow control

A.

transmit flow control

Answers
B.

open-loop flow control

B.

open-loop flow control

Answers
C.

hardware flow control

C.

hardware flow control

Answers
D.

TCP-based flow control

D.

TCP-based flow control

Answers
Suggested answer: A

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity what must be deployed?

A.

bridging

A.

bridging

Answers
B.

service chaining

B.

service chaining

Answers
C.

linking

C.

linking

Answers
D.

daisy chaining

D.

daisy chaining

Answers
E.

switching

E.

switching

Answers
Suggested answer: B

Explanation:

Service chaining is the technique of connecting virtual network functions together to provide different types of network service connectivity. Service chaining uses software-defined networking (SDN) programmability to create a chain of connected network services, such as firewalls, load balancers, NAT, and intrusion protection. Service chaining can automate the provisioning of network applications that have different characteristics and requirements, such as security, latency, or quality of service (QoS). Service chaining can also optimize the use of network resources and improve application performance by using SDN analytics and performance tools to select the best available network paths and avoid network congestion.Service chaining is being used in many SDN and network functions virtualization (NFV) use cases and deployments, such as data centers, carrier networks, and virtual customer edge123.Reference:

1: What is Network Service Chaining or Service Function Chaining - SDxCentral

2: On service chaining using Virtual Network Functions in Network-enabled Cloud systems | IEEE Conference Publication | IEEE Xplore

3: Service function chaining - Gini5

Total 330 questions
Go to page: of 33