Cisco 400-007 Practice Test - Questions Answers, Page 32
List of questions
Related questions
A large enterprise cloud design team is evaluating different cloud consumption models. What is an example of typical PaaS limitations or concerns that should be considered during service design?
vendor lock-in
runtime issues
lack of control
multi-tenant security
A network hacker is trying to interrupt the transport packet on IPSEC. A packet with duplicate sequence numbers is introduced. The customer sends high-priority traffic during this window. Which design parameter should be considered to mitigate this issue?
Classify and Mark duplicate sequence packets.
Apply anti-replay window 4096.
Restrict keywork in IPSEC Tunnel.
Increase QoS shape policy.
Network changes because of mergers, acquisitions, and divestment can be very disruptive to the network if not carried out carefully. When an organization sells parts of its business, it must detach the affected parts of the network from the rest of the network. Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?
redundant design
modular design
less complex design
routed access design
DRAG DROP
Network operators have many options available, from fully centralized to fully distributed control planes, and each approach has its own set of characteristics. Drag and drop the characteristics from the left onto the corresponding approach on the right.
Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the Layer 2 interconnection?
at the core layer, to otter the possibility to isolate STP domains
at me aggregation layer because it is the Layer 2 to Layer 3 demarcation point
at the access layer because the STP root bridge does not need to align with the HSRP active node.
at the core layer because all external connections must terminate there for security reasons
Which protocol does an SD-Access wireless Access Point use for its fabric data plane?
GRE
MPLS
VXLAN
LISP
CAPWAP
QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3. A high availability application is synchronizing data between host A and host B. To increase chance of delivery the same data is sent twice from host A on two different NICs toward the two NICs on host B.
Which solution must be deployed in the network to ensure that any failure in the network does not trigger data loss on host B?
EIGRP with feasible successors
BFD
IP Fast Reroute
Static routes
Which encoding format does cisco ios XE software support for NETCONF?
It supports HTML encoding for NETCONF
It supports YAML encoding for NETCONF
It supports XML encoding for NETCONF
It supports JSON encoding for NETCONF
Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network?
(Choose two)
BFD
Ti-LFA
minimal BGP scan time
MPLS-FRR
IGP fast hello
You want to split an Ethernet domain in two.
Which parameter must be unique in this design to keep the two domains separated?
VTP domain
VTP password
STP type
VLAN ID
Question