Cisco 400-007 Practice Test - Questions Answers, Page 33
List of questions
Related questions
Refer to the exhibit.
A new high availability DB sever cluster is installed in the network.
These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.
Which solution supports these requirements?
Add two new links between SW1 and SW2 configured as LACP trunk with STP
Add secondary links to REP segments 1 and 2
Add two new links between SW1 and SW2 configured as REP segment 3
Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively
VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to ensure successful deployment of VPLS?
Flooding is necessary to propagate MAC address reachability information
PE scalability
The underlying transport mechanism
VLAN scalability
As part of a new network design documentation, you are required to explain the reason for choosing cisco FabricPath for Layer 2 loop avoidance.
Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network?
(Choose two)
MAC tunneling
IS-IS multipath
RPF check
TTL header
Which design benefit of PortF ast is true?
PortFast does not generate a spanning tree topology change hen a station on a port is connected or disconnected
PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected
PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops
PortFast detects one-way communications on the physical port, which prevents switch loops
PortFast prevents switch loops that are caused by a unidirectional point to point link condition on Rapid PVST+ and MST
PortFast prevents switched traffic from traversing suboptimal paths on the network
You are a network designer and you must ensure that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source address?
ACL based forwarding
unicast RPF loose mode
unicast RPF strict mode
ACL filtering by destination
You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)
Use a multipoint Metro-E service for router connections
Use a single address per router for all P2P links
Use P2P links between routers in a hub-and-spoke design
Configure address aggregation at each site router
Determine which OSPF routers will be DR/BDR
Which two statements about MLD snooping are true? (Choose two)
When MLD snooping is enabled, QoS is automatically enabled.
A VLAN can support multiple active MLD snooping queries, as long as each one is associated to a different multicast group.
AN MLD snooping querier election occurs when any MLD snooping querier goes down or if there is an IP address change on the active querier.
When multiple MLD snooping queriers are enabled in a VLAN, the querier with the lowest IP address in the VLAN is elected as the active MLD snooping querier.
Which option is a fate-sharing characteristic in regards to network design?
A failure of a single element causes the entire service to fail
It protects the network against failures in the distribution layer
It acts as a stateful forwarding device
It provides data sequencing and acknowledgment mechanisms
Which statement about hot-potato routing architecture design is true?
Hot-potato routing is the preferred architecture when connecting to content providers
Hop-potato keeps traffic under the control of the network administrator for longer
OSPF uses hot-potato routing if all ASBRs use the same value for the external metric
Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks
Two enterprise networks must be connected together. Both networks are using the same private IP addresses.
The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload feature to save IF addresses from the NAT pools. Which design addresses this requirement using only one Cisco I OS NAT router for both directions?
This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT, with overload in both directions.
The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload option in both directions.
The overload feature is the default and does not have to be configured.
Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands for the overload feature in both directions.
The Nat Virtual interface must be used to achieve this requirement.
Question