ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

For Company XYZ Bangkok is using ECMP to reach the 172 20 2 0/24 network The company wants a design that would allow them to forward traffic from 172 16 2 0/24 toward 172 20 2 0/24 via the Singapore router as the preferred route

The rest of the traffic should continue to use ECMP Which technology fulfills this design requirement?

A.

policy-based routing

A.

policy-based routing

Answers
B.

route summarization

B.

route summarization

Answers
C.

unequal-cost load balancing using variance

C.

unequal-cost load balancing using variance

Answers
D.

LFA

D.

LFA

Answers
Suggested answer: A

Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?

A.

Use switch clustering in the access layer.

A.

Use switch clustering in the access layer.

Answers
B.

Use switch clustering in the core/distribution layer.

B.

Use switch clustering in the core/distribution layer.

Answers
C.

Use spanning-tree PortFast.

C.

Use spanning-tree PortFast.

Answers
D.

Use BFD.

D.

Use BFD.

Answers
Suggested answer: B

Refer to the exhibit.

This network is running legacy STP 802.1 d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

A.

The transit_delay=5 and dpdu_delay=20 are recommended values, considering helto_timer=2 and specified

A.

The transit_delay=5 and dpdu_delay=20 are recommended values, considering helto_timer=2 and specified

Answers
B.

Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802. to speed up STP convergence process

B.

Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802. to speed up STP convergence process

Answers
C.

The max_age and forward delay parameters can be adjusted to speed up STP convergence process.

C.

The max_age and forward delay parameters can be adjusted to speed up STP convergence process.

Answers
D.

Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

D.

Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

Answers
Suggested answer: C

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.

Answers
B.

Control plane policers are really needed only on externally facing devices.

B.

Control plane policers are really needed only on externally facing devices.

Answers
C.

Control plane policers can cause the network management systems to create false alarms.

C.

Control plane policers can cause the network management systems to create false alarms.

Answers
D.

Control plane policers must be processed before a forwarding decision is made.

D.

Control plane policers must be processed before a forwarding decision is made.

Answers
E.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.

E.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.

Answers
Suggested answer: A, D

Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure

Which technique can be Implemented In the design to detect such a failure in a subsecond?

A.

STP

A.

STP

Answers
B.

fate sharing

B.

fate sharing

Answers
C.

OSPF LFA

C.

OSPF LFA

Answers
D.

BFD

D.

BFD

Answers
E.

flex links

E.

flex links

Answers
Suggested answer: E

Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicastbased network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

A.

PIM-DM

A.

PIM-DM

Answers
B.

PIM-SM

B.

PIM-SM

Answers
C.

PIM-SSM

C.

PIM-SSM

Answers
D.

BIDIR-PIM

D.

BIDIR-PIM

Answers
Suggested answer: C

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

A.

confidential

A.

confidential

Answers
B.

serviceability

B.

serviceability

Answers
C.

reliability

C.

reliability

Answers
D.

availability

D.

availability

Answers
E.

integrity

E.

integrity

Answers
F.

scalability

F.

scalability

Answers
Suggested answer: A, D, E

Which network management framework can be used to develop a network architecture that contains business requirements analysis, gap analysis, and network diagrams as artifacts to be used for design and implementation later?

A.

TOG

A.

TOG

Answers
B.

ITIL

B.

ITIL

Answers
C.

FCAPS

C.

FCAPS

Answers
D.

Cobit

D.

Cobit

Answers
Suggested answer: A

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

A.

It can limit network scalability

A.

It can limit network scalability

Answers
B.

It can create microloops during reconvergence

B.

It can create microloops during reconvergence

Answers
C.

It increases convergence time.

C.

It increases convergence time.

Answers
D.

It reduces convergence time.

D.

It reduces convergence time.

Answers
Suggested answer: B

What are two common approaches to analyzing and designing networks? (Choose two.)

A.

bottom-up approach

A.

bottom-up approach

Answers
B.

high-low security approach

B.

high-low security approach

Answers
C.

top-down approach

C.

top-down approach

Answers
D.

left-right approach

D.

left-right approach

Answers
E.

three-tier approach

E.

three-tier approach

Answers
Suggested answer: A, C
Total 330 questions
Go to page: of 33