Cisco 400-007 Practice Test - Questions Answers, Page 7
List of questions
Related questions
Refer to the exhibit.
For Company XYZ Bangkok is using ECMP to reach the 172 20 2 0/24 network The company wants a design that would allow them to forward traffic from 172 16 2 0/24 toward 172 20 2 0/24 via the Singapore router as the preferred route
The rest of the traffic should continue to use ECMP Which technology fulfills this design requirement?
policy-based routing
route summarization
unequal-cost load balancing using variance
LFA
Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?
Use switch clustering in the access layer.
Use switch clustering in the core/distribution layer.
Use spanning-tree PortFast.
Use BFD.
Refer to the exhibit.
This network is running legacy STP 802.1 d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?
The transit_delay=5 and dpdu_delay=20 are recommended values, considering helto_timer=2 and specified
Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802. to speed up STP convergence process
The max_age and forward delay parameters can be adjusted to speed up STP convergence process.
Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.
Which two control plane policer designs must be considered to achieve high availability? (Choose two.)
Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.
Control plane policers are really needed only on externally facing devices.
Control plane policers can cause the network management systems to create false alarms.
Control plane policers must be processed before a forwarding decision is made.
Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.
Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure
Which technique can be Implemented In the design to detect such a failure in a subsecond?
STP
fate sharing
OSPF LFA
BFD
flex links
Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicastbased network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?
PIM-DM
PIM-SM
PIM-SSM
BIDIR-PIM
Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)
confidential
serviceability
reliability
availability
integrity
scalability
Which network management framework can be used to develop a network architecture that contains business requirements analysis, gap analysis, and network diagrams as artifacts to be used for design and implementation later?
TOG
ITIL
FCAPS
Cobit
Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?
It can limit network scalability
It can create microloops during reconvergence
It increases convergence time.
It reduces convergence time.
What are two common approaches to analyzing and designing networks? (Choose two.)
bottom-up approach
high-low security approach
top-down approach
left-right approach
three-tier approach
Question