Cisco 400-007 Practice Test - Questions Answers, Page 8

List of questions
Question 71

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?
Control Plane Protection host subinterface
Control Plane Protection main interface
Control Plane Protection transit subinterface
Control Plane Protection CEF-exception subinterface
Question 72

What is the most important operational driver in building a resilient and secure modular network design?
Dependencies on hardware or software that is difficult to scale
Minimize app downtime
Reduce the frequency of failures requiring human intervention
Increase time spent on developing new features
Question 73

Which BGP feature provides fast convergence?
BGP PIC |
BGP-EVPN
BGP FlowSpec
BGP-LS
Question 74

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloudbased services If one ISP suffers loss or latency?
Cloud onRamp gateway site
Cloud onRamp SWG
Cloud onRamp
Cloud onRamp SaaS
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/cloudonramp/vedge-20- x/cloud-onramp-book-vedge/cor-saas.html#common-scenarios-cor-saas-b
Question 75

Refer to the diagram.
Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?
Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite
Send packets without encapsulation to the anchor controller over the routed network.
Encapsulate packets into an EoIP tunnel and send them to the anchor controller.
Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.
Question 76

Refer to the exhibit.
An engineer is designing the network for a multihomed customer running in AS 111 does not have any other Ass connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?
Question 77

Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)
Question 78

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)
Question 79

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI dat a. Which type of security safeguard should be implemented to resolve this issue?
Question 80

Which two technologies enable multilayer segmentation? (Choose two.)
Question