ExamGecko
Home / Cisco / 400-007 / List of questions
Ask Question

Cisco 400-007 Practice Test - Questions Answers, Page 9

List of questions

Question 81

Report Export Collapse

IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?\

performance monitoring

performance monitoring

security

security

observation of critical links

observation of critical links

capacity planning

capacity planning

Suggested answer: C
asked 10/10/2024
Amil Akhundzada
49 questions

Question 82

Report Export Collapse

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

fault management

fault management

accounting management

accounting management

performance management

performance management

security management

security management

Suggested answer: C
asked 10/10/2024
Andrea Trivisonno
35 questions

Question 83

Report Export Collapse

Refer to the exhibit.

Cisco 400-007 image Question 83 118759 10102024233153000000

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the existing path Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Into the 91.7.0.0/16 network?

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.

Suggested answer: A
asked 10/10/2024
Juned Kazi
42 questions

Question 84

Report Export Collapse

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

data governance

data governance

additional latency

additional latency

security

security

cloud connectivity

cloud connectivity

Suggested answer: A
asked 10/10/2024
Alexis Chacon
37 questions

Question 85

Report Export Collapse

Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :

Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.

Use the Internet as the underlay for the private WAN.

Securely transfer the corporate data over the private WAN.

Which two technologies should be Incorporated into the design of this network? (Choose two.)

S-VTI

S-VTI

IPsec

IPsec

DMVPN

DMVPN

GET VPN

GET VPN

PPTP

PPTP

Suggested answer: B, C
asked 10/10/2024
Srikrushna Patro
37 questions

Question 86

Report Export Collapse

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

MPP

MPP

CPPr

CPPr

CoPP

CoPP

DPP

DPP

Suggested answer: B
asked 10/10/2024
Marcelo Oliveira
42 questions

Question 87

Report Export Collapse

Which management category is not part of FCAPS framework?

Configuration

Configuration

Security

Security

Performance

Performance

Authentication

Authentication

Fault-management

Fault-management

Suggested answer: D
asked 10/10/2024
Heidar Heidari nia
41 questions

Question 88

Report Export Collapse

What is a characteristic of a secure cloud architecture model?

limited access to job function

limited access to job function

dedicated and restricted workstations

dedicated and restricted workstations

multi-factor authentication

multi-factor authentication

software-defined network segmentation

software-defined network segmentation

Suggested answer: C
asked 10/10/2024
chitranjan ranga
37 questions

Question 89

Report Export Collapse

Which best practice ensures data security in the private cloud?

Use IPsec for communication between unsecured network connection

Use IPsec for communication between unsecured network connection

Encrypt data at rest and in transition.

Encrypt data at rest and in transition.

Use the same vendor for consistent encryption.

Use the same vendor for consistent encryption.

Anonymize data ownership to comply with privacy rules.

Anonymize data ownership to comply with privacy rules.

Suggested answer: B
asked 10/10/2024
Anthony Agbale
49 questions

Question 90

Report Export Collapse

What are two examples of business goals to be considered when a network design is built? (Choose two.)

standardize resiliency

standardize resiliency

minimize operational costs

minimize operational costs

integrate endpoint posture

integrate endpoint posture

ensure faster obsolescence

ensure faster obsolescence

reduce complexity

reduce complexity

Suggested answer: B, E
asked 10/10/2024
ahmed kehli
36 questions
Total 382 questions
Go to page: of 39
Search

Related questions