ExamGecko
Home Home / Cisco / 400-007

Cisco 400-007 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?\

A.

performance monitoring

A.

performance monitoring

Answers
B.

security

B.

security

Answers
C.

observation of critical links

C.

observation of critical links

Answers
D.

capacity planning

D.

capacity planning

Answers
Suggested answer: C

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

A.

fault management

A.

fault management

Answers
B.

accounting management

B.

accounting management

Answers
C.

performance management

C.

performance management

Answers
D.

security management

D.

security management

Answers
Suggested answer: C

Refer to the exhibit.

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the existing path Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Into the 91.7.0.0/16 network?

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

Answers
B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

Answers
C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

Answers
D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.

D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.

Answers
Suggested answer: A

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

A.

data governance

A.

data governance

Answers
B.

additional latency

B.

additional latency

Answers
C.

security

C.

security

Answers
D.

cloud connectivity

D.

cloud connectivity

Answers
Suggested answer: A

Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :

Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.

Use the Internet as the underlay for the private WAN.

Securely transfer the corporate data over the private WAN.

Which two technologies should be Incorporated into the design of this network? (Choose two.)

A.

S-VTI

A.

S-VTI

Answers
B.

IPsec

B.

IPsec

Answers
C.

DMVPN

C.

DMVPN

Answers
D.

GET VPN

D.

GET VPN

Answers
E.

PPTP

E.

PPTP

Answers
Suggested answer: B, C

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

A.

MPP

A.

MPP

Answers
B.

CPPr

B.

CPPr

Answers
C.

CoPP

C.

CoPP

Answers
D.

DPP

D.

DPP

Answers
Suggested answer: B

Which management category is not part of FCAPS framework?

A.

Configuration

A.

Configuration

Answers
B.

Security

B.

Security

Answers
C.

Performance

C.

Performance

Answers
D.

Authentication

D.

Authentication

Answers
E.

Fault-management

E.

Fault-management

Answers
Suggested answer: D

What is a characteristic of a secure cloud architecture model?

A.

limited access to job function

A.

limited access to job function

Answers
B.

dedicated and restricted workstations

B.

dedicated and restricted workstations

Answers
C.

multi-factor authentication

C.

multi-factor authentication

Answers
D.

software-defined network segmentation

D.

software-defined network segmentation

Answers
Suggested answer: C

Which best practice ensures data security in the private cloud?

A.

Use IPsec for communication between unsecured network connection

A.

Use IPsec for communication between unsecured network connection

Answers
B.

Encrypt data at rest and in transition.

B.

Encrypt data at rest and in transition.

Answers
C.

Use the same vendor for consistent encryption.

C.

Use the same vendor for consistent encryption.

Answers
D.

Anonymize data ownership to comply with privacy rules.

D.

Anonymize data ownership to comply with privacy rules.

Answers
Suggested answer: B

What are two examples of business goals to be considered when a network design is built? (Choose two.)

A.

standardize resiliency

A.

standardize resiliency

Answers
B.

minimize operational costs

B.

minimize operational costs

Answers
C.

integrate endpoint posture

C.

integrate endpoint posture

Answers
D.

ensure faster obsolescence

D.

ensure faster obsolescence

Answers
E.

reduce complexity

E.

reduce complexity

Answers
Suggested answer: B, E
Total 330 questions
Go to page: of 33