Cisco 400-007 Practice Test - Questions Answers, Page 9
List of questions
Related questions
IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?\
performance monitoring
security
observation of critical links
capacity planning
Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?
fault management
accounting management
performance management
security management
Refer to the exhibit.
An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the existing path Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Into the 91.7.0.0/16 network?
Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.
Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.
Use local preference on R1 for the networks that AS 500 advertises to AS 111.
Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.
A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?
data governance
additional latency
security
cloud connectivity
Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :
Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.
Use the Internet as the underlay for the private WAN.
Securely transfer the corporate data over the private WAN.
Which two technologies should be Incorporated into the design of this network? (Choose two.)
S-VTI
IPsec
DMVPN
GET VPN
PPTP
Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?
MPP
CPPr
CoPP
DPP
Which management category is not part of FCAPS framework?
Configuration
Security
Performance
Authentication
Fault-management
What is a characteristic of a secure cloud architecture model?
limited access to job function
dedicated and restricted workstations
multi-factor authentication
software-defined network segmentation
Which best practice ensures data security in the private cloud?
Use IPsec for communication between unsecured network connection
Encrypt data at rest and in transition.
Use the same vendor for consistent encryption.
Anonymize data ownership to comply with privacy rules.
What are two examples of business goals to be considered when a network design is built? (Choose two.)
standardize resiliency
minimize operational costs
integrate endpoint posture
ensure faster obsolescence
reduce complexity
Question