Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 400-007 Cisco Certified Design Expert (CCDE v3.1) Exam Practice Test

Demo: 114 questions
Total 381 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 1

Which option is a fate-sharing characteristic in regards to network design?

Options:

A.

A failure of a single element causes the entire service to fail

B.

It protects the network against failures in the distribution layer

C.

It acts as a stateful forwarding device

D.

It provides data sequencing and acknowledgment mechanisms

Question 2

Which design consideration is valid when you contrast fabricPath and trill?

Options:

A.

FabricPath uses IS-IS, but TRILL uses VxLAN

B.

FabricPath permits active-active FHRP and TRILL support anycast gateway.

C.

FabricPath Permits ECMP, but TRILL does not

D.

FabricPath permits active-active mode, but TRILL supports only active-standby mode.

Question 3

What are two common approaches to analyzing and designing networks? (Choose two.)

Options:

A.

bottom-up approach

B.

high-low security approach

C.

top-down approach

D.

left-right approach

E.

three-tier approach

Question 4

Cost is often one of the motivators for a business to migrate from a traditional network to a software- defined network. Which design decision is directly influenced by CAPEX drivers?

Options:

A.

scalability

B.

stability

C.

complexity

D.

manageability

Question 5

Company XYZ plans to run OSPF on a DMVPN network. They want to use spoke-to-spoke tunnels in the design What is a drawback or concern in this type of design?

Options:

A.

Additional host routes will be inserted into the routing tables

B.

Manual configuration of the spokes with the appropriate priority will be needed

C.

There will be split-horizon issue at the hub

D.

Manual configuration of the spoke IP address on the hub will be needed

Question 6

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

Options:

A.

confidential

B.

serviceability

C.

reliability

D.

availability

E.

integrity

F.

scalability

Question 7

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?

Options:

A.

Focus on the solution instead of the problem, which helps to reduce downtime duration

B.

The location of the data collection

C.

What direction the data or flows should be metered

D.

Identify traffic types and top talkers over this link

Question 8

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Options:

Question 9

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

Options:

A.

Limit the query domain by use of distribute lists.

B.

Build neighbor adjacencies in a triangulated fashion.

C.

Build neighbor adjacencies in squared fashion.

D.

Limit the query domain by use of summarization.

E.

Limit the query domain by use of default routes.

Question 10

Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

Options:

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Question 11

Company XYZ has two offices connected to each other over unequal redundant paths and they are running OSPF as the routing protocol An external network architect recommends BFD for OSPF Which effect would BFD have in the case of a link failure?

Options:

A.

It would drop the dead per detection time to a single hello

B.

It would keep an alternate path ready in case of a link failure

C.

It would optimize the route summarization feature of OSPF

D.

It would detect that the neighbor is down in a subsecond manner

Question 12

Refer to the exhibit.

Two data center siles X and Y are connected with a direct backdoor link with these conditions •Site-specific firewalls are deployed behind the Internet edge routers R1 and R2 •Both sites are advertising the address pool 100 75 10 0/23 toward the internet Site-X finds that Internet traffic returning from user PCs comes back on the Site-Y link Which design resolves the issue?

Options:

A.

Use BGP MED to influence Site-X return traffic Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration.

Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X.

Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers.

Have Site-X advertise an IP pool with a longer prefix.

Question 13

According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?

Options:

A.

requirement for data-in-motion encryption and 2FA authentication

B.

requirement for data-at-rest encryption foe user identification within the VPN termination hardware

C.

categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs

D.

ensuring that authorized users have high-availability system access from defined zones to defined systems or zones

Question 14

Which two statements describe network automation and network orchestration? (Choose two.)

Options:

A.

Network automation does not provide governance or policy management.

B.

Network automation spans multiple network services, vendors, and environments.

C.

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.

D.

Provisioning network services is an example of network automation.

E.

Network orchestration is used to run single, low-level tasks without human intervention

Question 15

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

Options:

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

separates infrastructure and policy

C.

uses policy-based forwarding of real-time traffic with less complexity

D.

unifies the WAN backbone

E.

manages failures through backup links

Question 16

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization Which IETF standard technology can provide this requirement?

Options:

A.

data center bridging

B.

unified fabric

C.

Transparent Interconnection of Lots of Links

D.

fabric path

Question 17

Which function is performed at the access layer of the three-layer hierarchical network design model?

Options:

A.

fault isolation

B.

QoS classification and marking boundary

C.

reliability -

D.

fast transport

E.

redundancy and load balancing

Question 18

Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?

Options:

A.

local addresses

B.

private addresses

C.

link-local addresses

D.

unique local addresses

Question 19

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

Options:

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

BPDU filtering

Question 20

Which design solution reduces the amount of IGMP state in the network?

Options:

A.

IGMP filtering

B.

IGMPv3 with PIM-SSM

C.

multiple multicast domains

D.

one multicast group address thorough network regardless of IGMP version

Question 21

End users are moving swiftly toward a hybrid cloud model to support faster IT service delivery. To implement a hybrid cloud architecture, what are two critical requirements for broader cloud service provider and vendor interoperability in terms of cloud security and compliance? (Choose two.)

Options:

A.

cloud integration and data security

B.

tighter controls based on dynamic policy enforcement

C.

security event and data interoperability

D.

flexible controls based on policy application

E.

orchestration and cross cloud access security

Question 22

Company XYZ is designing the network for IPv6 security and they have these design requirements:

    A switch or router must deny access to traffic from sources with addresses that are correct, but are topologically incorrect

    Devices must block Neighbor Discovery Protocol resolution for destination addresses that are not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

Options:

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Question 23

Which optimal use of interface dampening on a fast convergence network design is true?

Options:

A.

When occasional flaps of long duration occur

B.

when numerous adjacent flaps of very short duration occur

C.

when the router hardware it slower than the carrier delay down detection

D.

when the switch hardware is faster than the debounce timer down detection

Question 24

Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

Options:

A.

Transmit delay

B.

Throttle timer

C.

SPF hold time

D.

Interface dampening

Question 25

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

Options:

A.

asynchronous replication over dual data centers via DWDM

B.

synchronous replication over geographically dispersed dual data centers via MPLS

C.

synchronous replication over dual data centers via Metro Ethernet

D.

asynchronous replication over geographically dispersed dual data centers via CWDM

Question 26

A private cloud is accessed over the private IT network infrastructure that is potentially vulnerable to violations, data leaks, and man-in- the-middle attacks. The security team is evaluating the following solutions to address the challenges:

•Encrypt data at rest and in transition.

•Use strong identity and access management (IAM) capabilities.

•Communicate the inherent data security risks to your customers and end-users.

Assuming that adoption of a hybrid cloud model is likely to occur within the next 12 months, which two solutions can also help provide protection in a hybrid cloud environment? (Choose two.)

Options:

A.

Avoid automating the scanning and remediation of security controls using open-source tooling

B.

Practice SSH network protocols for data communication between unsecured network connections

C.

Implement a common protective methodology for the same information at rest or motion at different points of time

D.

Provide distributed management and visibility across the infrastructure instead of centralized management

E.

Apply cryptographic protocols to secure data transmission over the network

Question 27

Which solution component helps to achieve rapid migration to the cloud for SaaS and public cloud leveraging SD-WAN capabilities?

Options:

A.

service-oriented cloud architecture

B.

Cloud onramp

C.

cloud registry

D.

microservices in the cloud

Question 28

Refer to the exhibit.

Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?

Options:

A.

The LA administrator should use route aggregation to summarize the 10 1 4.0/24, 10 1 5 0/24, 10.1.6.0/24, and 10 1 7 0/24 networks toward Chicago

B.

The LA administrator should use route dampening for the 10.1.5 0/24 network so that it does not get propagated when it flaps up and down.

C.

The LA administrator should use route filtering to block the 10.1.5.0/24 network from getting propagated toward Chicago and New York.

D.

The Chicago administrator should use route filtering to block the 10.1.5.0/24 network from coming in from the LA router.

Question 29

Which best practice ensures data security in the private cloud?

Options:

A.

Use IPsec for communication between unsecured network connection

B.

Encrypt data at rest and in transition.

C.

Use the same vendor for consistent encryption.

D.

Anonymize data ownership to comply with privacy rules.

Question 30

Which design benefit of PortF ast is true?

Options:

A.

PortFast does not generate a spanning tree topology change hen a station on a port is connected or disconnected

B.

PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

D.

PortFast detects one-way communications on the physical port, which prevents switch loops

E.

PortFast prevents switch loops that are caused by a unidirectional point to point link condition on Rapid PVST+ and MST

F.

PortFast prevents switched traffic from traversing suboptimal paths on the network

Question 31

In a redundant hub and spoke "wheel" design, all spokes are connected to the hub, and spokes are connected to other spokes as well. During failure on one spoke link, the traffic from that site can be sent to a neighboring site for it to be forwarded to the hub site. But during peak hours, a link is overloaded and traffic is re-routed to a neighbor, which subsequently becomes overloaded. This overload results in network traffic oscillation as the load varies at each spoke site. This design provides more redundancy but not more resiliency because the routing protocol must process many alternate paths to determine the lowest cost path. Which two design

changes help to improve resilience in this case? (Choose two.)

Options:

A.

Increase the number of redundant paths considered during the routing convergence calculation.

B.

Eliminate links between every spoke.

C.

Increase routing protocol convergence timers.

D.

Increase unequal-cost parallel paths.

E.

Use two links to each remote site instead of one.

Question 32

A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?

Options:

A.

Static Routes for Route Leaking

B.

Policy Based Routing

C.

OSPF per VRF Instance

D.

Multi-Protocol BGP

Question 33

A service provider recently migrated to an SD-WAN solution for delivering WAN connections to its customers. One of the main challenges with the SD-WAN deployment is that branch site volume increases every year, which causes management complexity. Which action resolves the issue?

Options:

A.

Implement a scalable network management system to manage all sites.

B.

Adopt a well-structured SD-WAN service management lifecycle model

C.

Build a service orchestration platform on top of the network controller

D.

Set up a dedicated team to monitor and provision new customers

Question 34

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

Options:

A.

first-hop router registration to the RP

B.

multicast client registration to the RP

C.

multicast source registration to the RP

D.

transport of all IPv6 multicast traffic

Question 35

A customer asks you to perform a high level review of their upcoming WAN refresh for remote sites The review is specially focused on their retail store operations consisting of 500+ locations connected via mutlipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

Options:

A.

EIGRP

B.

IS-IS

C.

OSPF

D.

BGP

Question 36

Refer to the exhibit.

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

Options:

A.

address family translation

B.

dual stack

C.

host-to-host tunneling

D.

6rd tunneling

Question 37

Customer XYZ network consists of an MPLS core. IS-IS running as IGP a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

Options:

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Question 38

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50MSEC). In order to address both link failure and node failure within the lab typology network, which type of the MPLS TE tunnels must be considered for this demonstration?

Options:

A.

TE backup tunnel

B.

Next-hop (NHop) tunnel

C.

FRR Backup tunnel

D.

next-next-hop (NNHop) tunnel

Question 39

An engineer must redesign the QoS strategy for Company XYZ The current network is experiencing many dropped packets due to oversubscription of the guaranteed bandwidth allocated by the service provider. Company XYZ wants a design with a QoS strategy that controls the traffic flow leaving the Edge router to minimize packet drops Which QoS technique can be recommended as a solution?

Options:

A.

LLQ

B.

traffic shaping

C.

rate-limiting

D.

policing

Question 40

Which two statements explain the operation of BFD asynchronous mode? (Choose two )

Options:

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

C.

BFD asynchronous mode with and without echo packets use control packets.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Question 41

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two )

Options:

A.

Serialization delays are invariable because they depend only on the line rate of the interface

B.

Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.

C.

Serialization delay is the time required to transmit the packet on the physical media.

D.

Serialization delays are variable because they depend only on the size of the packet being serialized

E.

Serialization delay depends not only on the line rate of the interface but also on the size of the packet

Question 42

Refer to the exhibit.

For Company XYZ Bangkok is using ECMP to reach the 172 20 2 0/24 network The company wants a design that would allow them to forward traffic from 172 16 2 0/24 toward 172 20 2 0/24 via the Singapore router as the preferred route The rest of the traffic should continue to use ECMP Which technology fulfills this design requirement?

Options:

A.

policy-based routing

B.

route summarization

C.

unequal-cost load balancing using variance

D.

LFA

Question 43

What are two key design principles when using a hierarchical core-distribution-access network model? (Choose two )

Options:

A.

A hierarchical network design model aids fault isolation

B.

The core layer is designed first, followed by the distribution layer and then the access layer

C.

The core layer provides server access in a small campus.

D.

A hierarchical network design facilitates changes

E.

The core layer controls access to resources for security

Question 44

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The solution must provide a single 10G connection between locations and be able to run its own varying QoS profiles without service provider interaction based on the migration stages. All connectivity methods are at 10 Gbps. Which transport technology costs the least if the connectivity is required for just one year?

Options:

A.

MPLS wires only

B.

CWDM over dark fiber

C.

DWDM over dark fiber

D.

Metro Ethernet

Question 45

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

Options:

A.

access

B.

core

C.

collapsed core

D.

distribution

Question 46

Which two factors must be considered while calculating the RTO? (Choose two )

Options:

A.

importance and priority of individual systems

B.

maximum tolerable amount of data loss that the organization can sustain

C.

cost of lost data and operations

D.

how often backups are taken and how quickly these can be restored

E.

steps needed to mitigate or recover from a disaster

Question 47

A business requirement stating that failure of WAN access for dual circuits into an MPLS provider for a Data Centre cannot happen due to related service credits that would need to be paid has led to diversely routed circuits to different points of presence on the providers network? What should a network designer also consider as part of the requirement?

Options:

A.

Provision of an additional MPLS provider

B.

Out of band access to the MPLS routers

C.

Ensuring all related remote branches are dual homed to the MPLS network

D.

Dual PSUs & Supervisors on each MPLS router

Question 48

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)

Options:

A.

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing.

B.

It is highly-available by design with no single-point-of-failure risks present.

C.

Integrating smart NIC capabilities on the local host level is made easier through rest APIs.

D.

It significantly improves the latency when performing reactive handling of PACKET_IN events.

E.

It centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment.

Question 49

Company XYZ is migrating their existing network to IPv6 and they must plan for Layer 2 and Layer 3 devices Some of the access layer switches do not support IPv6, however, core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used in the design?

Options:

A.

The access layer switches must support IGMP snooping at a minimum. Any switches that do not support IGM snooping must be replaced.

B.

Upgrade the nonsupporting switches Otherwise, it will cause an issue with the migration.

C.

Layer 2 switches will not affect the implementation of IPv6. They can be included in the design in their current state.

D.

The access layer switches must support DHCPv6. Any switches that do not support DHCPv6 must be replaced.

Question 50

What are two top cloud-native security challenges faced by today's cloud-oriented organizations? (Choose two.)

Options:

A.

establishing user roles

B.

polymorphism

C.

lack of visibility and tracking

D.

increased attack surface

E.

user credential validation

Question 51

Refer to the exhibit.

The network 10.10.0 .0/16 has been redistributed to OSPF processes and the best path to the destination from R1 has been chosen as R1-R2-R3 A failure occurred on the link between R2 and R3 and the path was changed to R1-R4-R5-R3 What happens when the link between R2 and R3 is restored'?

Options:

A.

The path R1-R4-R5-R3 continues to be the best path because the metric is better

B.

The path reverts back to R1-R2-R3 because the route type is E1

C.

The path R1-R4-R5-R3 continues to be the best path because OSPF does not compare the metrics between two domains

D.

The path reverts to R1-R2-R3 because this was the previous best path

Question 52

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

Options:

A.

Enforce risk-based and adaptive access policies.

B.

Assess real-time security health of devices.

C.

Apply a context-based network access control policy for users.

D.

Ensure trustworthiness of devices.

Question 53

Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two)

Options:

A.

Bandwidth utilization increases

B.

Traffic flows are suboptimal

C.

High-end routers are required to support NFV

D.

OpenFlow must be supported in the network

E.

An SDN orchestration layer is required to support NFV

Question 54

Company XYZ wants to deploy OSPF. The design plan requires that two OSPF networks be mutually redistributed at multiple locations and ensure end-to-end connectivity to all of the company's networks Which technology can be used to fulfill the requirements while avoiding the creation of routing loops?

Options:

A.

Create a virtual link between ASBRs.

B.

Change the router ID for both ASBRs.

C.

Redistribute routes as external type 2 routes.

D.

Use route maps on ASBRs to filter routes with tags so they are not redistributed.

Question 55

Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

Options:

A.

southbound APIs

B.

northbound APIs

C.

orchestration layer

D.

SDN controller

Question 56

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network Which network threat is SNMPv3 effective against?

Options:

A.

man-in-the-middle attack

B.

masquerade threats

C.

DDoS attack

D.

brute force dictionary attack

Question 57

Options:

A.

low bandwidth

B.

security

C scalability

C.

high latency

Question 58

The Agile release train workflow focuses on tasks which can be accomplished reliably and efficiently Scrum and Kanban are two of the most popular Agile frameworks, but both have a specific use case based on the implementation requirements In which two situations are Kanban the ideal framework to use”? (Choose two.)

Options:

A.

acquisition of automation tools

B.

carrier lead times

C.

network configuration design

D.

physical hardware deployment

E.

logical topology deployment

Question 59

Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :

    Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.

    Use the Internet as the underlay for the private WAN.

    Securely transfer the corporate data over the private WAN.

Which two technologies should be Incorporated into the design of this network? (Choose two.)

Options:

A.

S-VTI

B.

IPsec

C.

DMVPN

D.

GET VPN

E.

PPTP

Question 60

Company XYZ has multiple production units and marketing departments across the region The current network is a mixture of point-to-point links and MPLS Layer 3 VPN service from the provider. The Info-Sec team has suggested to isolate production traffic end-to-end with an encryption over the transport network to comply with the HIPAA standard Which solution must be used in their design if Company XYZ wants a quick roll out”?

Options:

A.

IPsec point-to-point tunnels over the MPLS and point-to-point links provide an isolated and encrypted packet end-to-end

B.

GETVPN can be implemented over the MPLS provider which provides a payload encryption without the overhead of the tunnelling

C.

A firewall can be placed centrally to filter out the traffic based on required ports

D.

VRF-Lite can be implemented toward the downstream network and VRF-based tunnels combined with IPsec can be implemented over the service provider

Question 61

Which two points must network designers consider when designing a new network design or when evaluating an existing network design to help them understand the high-level design direction with regards to the security aspects? (Choose two)

Options:

A.

Consider Business objectives and goals

B.

Consider organization’s security policy standards

C.

Consider for only multi-site networks

D.

Consider for only new network technologies and components

Question 62

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

Options:

A.

fault management

B.

accounting management

C.

performance management

D.

security management

Question 63

Company XYZ has implemented policy-based routing in their network. Which potential problem must be kept in mind about network reconvergence and PBR?

Options:

A.

It can limit network scalability

B.

It can create microloops during reconvergence

C.

It increases convergence time.

D.

It reduces convergence time.

Question 64

Which management category is not part of FCAPS framework?

Options:

A.

Configuration

B.

Security

C.

Performance

D.

Authentication

E.

Fault-management

Question 65

Scrum is a subset of Agile and is a lightweight process framework for Agile development Which role becomes the interface between the business the customers and their product-related needs on one side and the Team on the other?

Options:

A.

Product Owner

B.

Product Manager

C.

Scrum Master

D.

Program Manager

Question 66

Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

Options:

A.

GRE

B.

MPLS

C.

VXLAN

D.

LISP

E.

CAPWAP

Question 67

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

Options:

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Question 68

A network attacker exploits application flaws to compromise critical systems in the organization with these objectives:

• Obtain sensitive data and export the data out of the network.

• Compromise developer and administrator credentials to potentially

What is the next step after application discovery is completed in Zero Trust networkings

Options:

A.

Establish visibility and behavior modeling

B.

Enforce policies and microsegmentation.

C.

Assess real-time security health.

D.

Ensure trustworthiness of systems.

Question 69

Creating a network that functions as a strategic part of the business rather than simply being a cost center, starts with a good understanding of business requirements and processes What specific type of knowledge helps to create high-level LAN WAN. and data center designs that support and enable the business?

Options:

A.

risk assessment

B.

monitoring and management of data

C.

understanding of data flows

D.

recovery time of the system s functionality

Question 70

An enterprise service provider is designing the network for a customer who runs a video application in both a centralized and distributed fashion The team has looked at the following parameters

•The available bandwidth for branches and the associated cost

•Video resource cost

•Usage patterns at hub-and-spoke sites.

•Call agent bridge selection algorithm

Which key piece of information is missing and needs to be taken into consideration in order to determine the correct resource allocation model?

Options:

A.

video traffic jitter and delay

B.

type of video resources

C.

transport protocol and traffic engineering

D.

network management and monitoring

Question 71

Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?

Options:

A.

Ansible

B.

Contrail

C.

Java

D.

Jinja2

Question 72

During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward

• Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years

• Network bandwidth capacity requirements are dynamic and are expected to change over the next year

• If new technologies are to be introduced, operational expenses must be kept at a minimum. Which cloud strategy meets these requirements?

Options:

A.

private

B.

hybrid

C.

public

D.

multicloud

Question 73

An enterprise wants to provide low-cost delivery of network systems that can be scaled on business demand, followed by an initiative to reduce capital expenses for new IT equipment. Which technology meets these goals'?

Options:

A.

laaS within a private cloud

B.

laaS within an on-premises location

C.

PaaS within a public cloud

D.

SaaS within an on-premises location

Question 74

Retef to the exhibit.

This network is running OSPF and EIGRP as the routing protocols Mutual redistribution of the routing protocols has been contoured on the appropriate ASBRs The OSPF network must be designed so that flapping routes m EIGRP domains do not affect the SPF runs within OSPF The design solution must not affect the way EIGRP routes are propagated into the EIGRP domains Which technique accomplishes the requirement?

Options:

A.

route summarization the ASBR interfaces facing the OSPF domain

B.

route summarization on the appropriate ASBRS.

C.

route summarization on the appropriate ABRS.

D.

route summarization on EIDRP routers connecting toward the ASBR

Question 75

When planning their cloud migration journey what is crucial for virtually all organizations to perform?

Options:

A.

SASE framework deployment

B.

optimizing the WAN environment

C.

assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Question 76

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

Options:

A.

CPU and memory usage on the spoke routers

B.

memory usage on the hub router

C.

CPU usage on the hub router

D.

interface buffers on the hub and spoke routers

Question 77

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?

Options:

A.

Binary indexed explicit routing

B.

Binary intermediate enhanced routing

C.

Bit indexed explicit replication

D.

Bi-directional implicit replication

Question 78

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Options:

Question 79

How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?

Options:

A.

5

B.

6

C.

7

D.

10

E.

20

Question 80

An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

Options:

A.

Deploy a root controller to gather a complete network-level view.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

C.

Build direct physical connectivity between different controllers.

D.

Use OpenFlow to implement and adapt new protocols.

Question 81

An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?

Options:

A.

Implement route reflectors on the two core routers

B.

Increase the memory on the core routers

C.

Implement e BGP between the core and distribution routers

D.

Increase the memory on the distribution routers

E.

Increase bandwidth between the core routers

Question 82

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Options:

Question 83

An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?

Options:

A.

posture assessment with remediation VLAN

B.

quarantine SGTs

C.

dACLs with SGTs

D.

quarantine VLAN

Question 84

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

Options:

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

C.

Apply strong encryption for transmission of cardholder data across public networks.

D.

Protect all user systems against malware and frequently update antivirus software

E.

Maintain a policy that addresses information security for employees and third parties.

Question 85

Which two descriptions of CWDM are true? (Choose two)

Options:

A.

typically used over long distances, but requires optical amplification

B.

uses the 850nm band

C.

allows up to 32 optical earners to be multiplexed onto a single fiber

D.

shares the same transmission window as DWDM

E.

Passive CWDM devices require no electrical power

Question 86

Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever increasing cybersecurity threats. To achieve this, federated identity services have been deployed in the Company XYZ network to provide single sign-on and Multi-Factor Authentication for the applications and services. Which protocol can be used by Company XYZ to provide authentication and authorization services?

Options:

A.

OAuth2

B.

OpenID Connect

C.

OpenID

D.

SAML2.0

Question 87

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?

Options:

A.

MSDP

B.

PIM SSM

C.

MPLS

D.

PIM sparse mode

Question 88

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?

Options:

A.

working design over comprehensive documentation

B.

contract negotiation over customer collaboration

C.

following a plan over responding to change

D.

processes and tools over individuals and interactions over time

Question 89

An existing wireless network was designed to support data traffic only. You must now install context Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)

Options:

A.

Add access points along the perimeter of the coverage area.

B.

Increase the access point density to create an average inter-access point distance of less than 40 feet or 12.2 meters

C.

Use directional antennas to provide more cell overlapping

D.

Install additional access points in monitor mode where the co-channel interference would otherwise be affected

E.

Fine tune the radio configuration of the access point to have a higher average transmission power to achieve better coverage

Question 90

What advantage of placing the IS-IS layer 2 flooding domain boundary at the core Layer in a three-layer hierarchical network is true?

Options:

A.

The Layer 1 and Layer 2 domains can easily overlap

B.

It reduces the complexity of the Layer 1 domains

C.

It can be applied to any kind of topology

D.

The Layer 2 domain is contained and more stable

Question 91

Refer to the exhibit.

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

Options:

A.

community

B.

MED

C.

local preference

D.

As path

Question 92

Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?

Options:

A.

LDAP

B.

EAP

C.

TACACS+

D.

RADIUS

Question 93

What are two design constraints in a standard spine and leaf architecture? (Choose two.)

Options:

A.

Spine switches can connect to each other.

B.

Each spine switch must connect to every leaf switch.

C.

Leaf switches must connect to each other.

D.

Endpoints connect only to the spine switches.

E.

Each leaf switch must connect to every spine switch.

Question 94

You are designing a network running both IPv4 and IPv6 to deploy QoS Which consideration is correct about the QoS for IPv4 and IPv6?

Options:

A.

IPv4 and IPv6 traffic types can use use queuing mechanisms such as LLQ, PQ and CQ.

B.

IPv6 packet classification is only available with process switching, whereas IPv4 packet classification is available with both process switching and CEF.

C.

IPv6 and IB/4 traffic types can use a single QoS policy to match both protocols

D.

Different congestion management mechanisms need to be used for IPv4 and IPv6 traffic types

Question 95

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

Options:

A.

EIGRP

B.

RPVST+

C.

MST

D.

L2MP

Question 96

Two enterprise networks must be connected together. Both networks are using the same private IP addresses.

The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload

feature to save IF addresses from the NAT pools. Which design addresses this requirement using only one

Cisco I OS NAT router for both directions?

Options:

A.

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT, with overload in

both directions.

B.

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload

option in both directions.

C.

The overload feature is the default and does not have to be configured.

D.

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands

for the overload feature in both directions.

E.

The Nat Virtual interface must be used to achieve this requirement.

Question 97

Backups and mirror-copies of data are an essential part of RPO solutions If a business wants to reduce their CAPEX for disaster recovery, which of the following solutions are applicable?

Options:

A.

Perform an annual cyber security assessment or penetration test

B.

Renew backup software annually to get the newest version of the console and stay protected

C.

Migrate parts of or all the infrastructure to the cloud

D.

Build a redundant infrastructure for business continuity / disaster recovery purposes at another location

Question 98

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

Options:

A.

map IP CoS bits into the IP Precedence field

B.

map flow-label bits into the Exp field

C.

map IP precedence bits into the DSCP field

D.

map DSCP bits into the Exp field

Question 99

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?

Options:

A.

Assigning unique Route Distinguishers

B.

Assigning unique Route Target ID'S

C.

Assigning unique IP address space for the Enterprise NAT/Firewalls

D.

Assigning unique VRF ID's to each L3VPN

Question 100

In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?

Options:

A.

Jenkins

B.

Ansible

C.

Perl

D.

Chef

Question 101

Which aspect of BGP-LS makes it scalable in large network when multiarea topology information must be gathered?

Options:

A.

transmit flow control

B.

open-loop flow control

C.

hardware flow control

D.

TCP-based flow control

Question 102

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?

Options:

A.

fault management

B.

performance management

C.

security management

D.

accounting management

Question 103

Drag and drop the design use cases from the left onto the correct uRPF techniques used to prevent spoofing attacks Not all options are used.

Options:

Question 104

Which design benefit of bridge assurance is true?

Options:

A.

It supposes a spanning-tee topology change upon connecting and disconnecting a station on a port

B.

It prevents switched traffic from traversing suboptimal paths on the network.

C.

It allows small, unmanaged switches to be plugged into ports of access switches without the risk of switch loops.

D.

It prevents switch loops caused by unidirectional point-to-point link condition on Rapid PVST + and MST

Question 105

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

Options:

A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Question 106

Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two )

The group-pacing timer controls the interval that is used for group and individual LSA refreshment

Options:

A.

OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size

B.

OSPF retransmission-pacing timers allow control of interpacket spaang between consecutive link-state update packets in the OSPF retransmission queue.

C.

OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue.

D.

OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue

Question 107

Company XYZ, a global content provider, owns data centers on different continents Their data center design involves a standard three-layer design with a Layer 3-only core VRRP is used as the FHRP They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two of their data centers in Europe in the absence of other business or technical constraints which termination point is optimal for the Layer 2 interconnection?

Options:

A.

at the core layer, to offer the possibility to isolate STP domains

B.

at the access layer because the STP root bridge does not need to align with the VRRP active node

C.

at the core layer because all external connections must terminate there for security reasons

D.

at the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

Question 108

What is a characteristic of a secure cloud architecture model?

Options:

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Question 109

You are a network designer and you must ensure that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source address?

Options:

A.

ACL based forwarding

B.

unicast RPF loose mode

C.

unicast RPF strict mode

D.

ACL filtering by destination

Question 110

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)

Options:

A.

cost optimization approach

B.

strategic planning approach

C.

modular approach

D.

tactical planning approach

E.

business optimization approach

Question 111

An organization is working on a design solution for a new Internet-based remote access virtual private network that has 1000 remote sites. A network administrator recommends GETVPN as the model What is a potential problem of using GETVPN in this situation?

Options:

A.

GETVPN is not scalable to a large number of remote sites

B.

GETVPN key servers would be on public hacker-reachable space and need higher security

C.

GETVPN and DMVPN do not interoperate

D.

GETVPN requires a high level of background traffic to maintain its IPsec SAs

Question 112

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols. They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?

Options:

A.

Redistribute using metric type 2 into OSPF.

B.

Redistribute using metric type 1 into OSPF.

C.

Redistribute using metric type 1 into EIGRP.

D.

Redistribute using metric type 2 into EIGRP.

Question 113

Which Interconnectivity method offers the fastest convergence in the event of a unidirectional issue between three Layer 3 switches connected together with routed links in the same rack in a data center?

Options:

A.

Copper Ethernet connectivity with BFD enabled

B.

Copper Ethernet connectivity with UDLD enabled

C.

Fiber Ethernet connectivity with BFD enabled

D.

Fiber Ethernet connectivity with UDLD enabled

Question 114

A software-defined networking (SDN) controller teams network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers Each policy is represented as a RIB entry in the control plane of the router Which SDN model has been implemented?

Options:

A.

SDN centralized

B.

SDN traffic engineering

C.

SD-WAN

D.

SDN hybrid

Demo: 114 questions
Total 381 questions