ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

A.

Control Plane Protection host subinterface

A.

Control Plane Protection host subinterface

Answers
B.

Control Plane Protection main interface

B.

Control Plane Protection main interface

Answers
C.

Control Plane Protection transit subinterface

C.

Control Plane Protection transit subinterface

Answers
D.

Control Plane Protection CEF-exception subinterface

D.

Control Plane Protection CEF-exception subinterface

Answers
Suggested answer: A

What is the most important operational driver in building a resilient and secure modular network design?

A.

Dependencies on hardware or software that is difficult to scale

A.

Dependencies on hardware or software that is difficult to scale

Answers
B.

Minimize app downtime

B.

Minimize app downtime

Answers
C.

Reduce the frequency of failures requiring human intervention

C.

Reduce the frequency of failures requiring human intervention

Answers
D.

Increase time spent on developing new features

D.

Increase time spent on developing new features

Answers
Suggested answer: C

Which BGP feature provides fast convergence?

A.

BGP PIC |

A.

BGP PIC |

Answers
B.

BGP-EVPN

B.

BGP-EVPN

Answers
C.

BGP FlowSpec

C.

BGP FlowSpec

Answers
D.

BGP-LS

D.

BGP-LS

Answers
Suggested answer: A

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloudbased services If one ISP suffers loss or latency?

A.

Cloud onRamp gateway site

A.

Cloud onRamp gateway site

Answers
B.

Cloud onRamp SWG

B.

Cloud onRamp SWG

Answers
C.

Cloud onRamp

C.

Cloud onRamp

Answers
D.

Cloud onRamp SaaS

D.

Cloud onRamp SaaS

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/cloudonramp/vedge-20- x/cloud-onramp-book-vedge/cor-saas.html#common-scenarios-cor-saas-b

Refer to the diagram.

Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

A.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

A.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

Answers
B.

Send packets without encapsulation to the anchor controller over the routed network.

B.

Send packets without encapsulation to the anchor controller over the routed network.

Answers
C.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller.

C.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller.

Answers
D.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.

D.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.

Answers
Suggested answer: C

Refer to the exhibit.

An engineer is designing the network for a multihomed customer running in AS 111 does not have any other Ass connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?

A.

Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.

A.

Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.

Answers
B.

Use the local preference attribute to configure your AS as a non-transit'' AS.

B.

Use the local preference attribute to configure your AS as a non-transit'' AS.

Answers
C.

include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.

C.

include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.

Answers
D.

Include a prefix list to only receive routes from neighboring ASs.

D.

Include a prefix list to only receive routes from neighboring ASs.

Answers
Suggested answer: C

Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)

A.

workload

A.

workload

Answers
B.

work domain

B.

work domain

Answers
C.

workplace

C.

workplace

Answers
D.

workgroup

D.

workgroup

Answers
E.

workspace

E.

workspace

Answers
Suggested answer: A, C

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)

A.

cost optimization approach

A.

cost optimization approach

Answers
B.

strategic planning approach

B.

strategic planning approach

Answers
C.

modular approach

C.

modular approach

Answers
D.

tactical planning approach

D.

tactical planning approach

Answers
E.

business optimization approach

E.

business optimization approach

Answers
Suggested answer: B, D

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI dat a. Which type of security safeguard should be implemented to resolve this issue?

A.

technical and physical access control

A.

technical and physical access control

Answers
B.

administrative security management processes

B.

administrative security management processes

Answers
C.

physical device and media control

C.

physical device and media control

Answers
D.

technical integrity and transmission security

D.

technical integrity and transmission security

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/en/US/docs/solutions/Enterprise/Compliance/HIPAA/HIP_AppC.html#wp10 85353

Which two technologies enable multilayer segmentation? (Choose two.)

A.

policy-based routing

A.

policy-based routing

Answers
B.

segment routing

B.

segment routing

Answers
C.

data plane markings

C.

data plane markings

Answers
D.

firewalls

D.

firewalls

Answers
E.

filter lists

E.

filter lists

Answers
Suggested answer: A, D
Total 330 questions
Go to page: of 33