Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Cisco Certified Design Expert (CCDE v3.1) Question and Answers

Cisco Certified Design Expert (CCDE v3.1)

Last Update Oct 2, 2025
Total Questions : 349

We are offering FREE 400-007 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 400-007 free exam questions and then go for complete pool of Cisco Certified Design Expert (CCDE v3.1) test questions that will help you more.

400-007 pdf

400-007 PDF

$159.6  $399
400-007 Engine

400-007 Testing Engine

$179.6  $449
400-007 PDF + Engine

400-007 PDF + Testing Engine

$239.6  $599
Questions 1

You are tasked with the design of a high available network. Which two features provide fail closed environments? (Choose two.)

Options:

A.  

EIGRP

B.  

RPVST+

C.  

MST

D.  

L2MP

Discussion 0
Questions 2

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Options:

Discussion 0
Questions 3

An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate this during the migration phase?

Options:

A.  

Deploy controllers, deploy SD-WAN edge routers in the data center, and migrate branch sites.

B.  

Migrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers.

C.  

Migrate branch sites, migrate data center WAN routers, and deploy controllers.

D.  

Deploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites.

Discussion 0
Questions 4

Refer to the exhibit.

Refer to the exhibit. A new high availability DB server cluster is installed in the network. These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.

Which solution supports these requirements?

Options:

A.  

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.  

Add secondary links to REP segments 1 and 2

C.  

Add two new links between SW1 and SW2 configured as REP segment 3

D.  

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Discussion 0
Questions 5

Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two)

Options:

A.  

DAI

B.  

IP Source Guard

C.  

BEEP

D.  

CPPr

E.  

MPP

Discussion 0
Questions 6

VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to ensure successful deployment of VPLS?

Options:

A.  

Flooding is necessary to propagate MAC address reachability information

B.  

PE scalability

C.  

The underlying transport mechanism

D.  

VLAN scalability

Discussion 0
Questions 7

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

Options:

A.  

Ensure that strong cryptography is applied for users who have administrative access through networks

B.  

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

C.  

Apply strong encryption for transmission of cardholder data across public networks.

D.  

Protect all user systems against malware and frequently update antivirus software

E.  

Maintain a policy that addresses information security for employees and third parties.

Discussion 0
Questions 8

The SD-WAN architecture is composed of separate orchestration, management, control, and data planes. Which activity happens at the orchestration plane?

Options:

A.  

Automatic onboarding of the SD-WAN routers into the SD-WAN overlay

B.  

Decision-making process on where traffic flows

C.  

Packet forwarding

D.  

Central configuration and monitoring

Discussion 0
Questions 9

Refer to the exhibit.

Which impact of using three or more ABRs between the backbone area and area 1 is true?

Options:

A.  

In a large-scale network LSA replication by all ABRs can cause serious scalability issues

B.  

Multiple ABRs reduce the CPU processing on each ABR due to splitting prefix advertisement

C.  

In a large-scale network multiple ABRs can create microloops

D.  

Prefixes from the non-backbone area are advertised by one ABR to the backbone

Discussion 0
Questions 10

Two enterprise networks must be connected together. Both networks are using the same private IP addresses. The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload feature to save IP addresses from the NAT pools. Which design addresses this requirement using only one Cisco IOS NAT router for both directions?

Options:

A.  

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT with overload in both directions

B.  

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload option in both directions

C.  

The overload feature is the default and does not have to be configured

D.  

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands for the overload feature in both directions

E.  

The NAT Virtual Interface must be used to achieve this requirement

Discussion 0
Questions 11

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. What is the final migration step after hosts have physically migrated to have traffic flowing through the new network without changing any host configuration?

Options:

A.  

Shut down legacy Layer 3 SVIs, clear ARP caches on all hosts being migrated, and then configure the legacy VRRP address onto new VXLAN core switches

B.  

Increase VRRP priorities on new infrastructure over legacy VRRP values, then shut down legacy SVIs

C.  

Shut down legacy infrastructure to allow VXLAN gateways to become active

D.  

Shut down legacy Layer 3 SVIs and activate new preconfigured Layer 3 SVIs on VXLAN

Discussion 0
Questions 12

An enterprise network has two core routers that connect to 200 distribution routers and uses full-mesh IBGP peering between these routers as its routing method. The distribution routers are experiencing high CPU utilization due to the BGP process. Which design solution is the most cost effective?

Options:

A.  

Implement route reflectors on the two core routers

B.  

Increase the memory on the core routers

C.  

Implement eBGP between the core and distribution routers

D.  

Increase the memory on the distribution routers

E.  

Increase bandwidth between the core routers

Discussion 0
Questions 13

You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

Options:

A.  

DWDM

B.  

EoMPLS

C.  

SONET/SDH

D.  

Multichassis EtherChannel over Pseudowire

E.  

VPLS

Discussion 0
Questions 14

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

Options:

A.  

Partial mesh

B.  

Full mesh

C.  

Ring

D.  

Squared

E.  

Triangulated

Discussion 0
Questions 15

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Options:

Discussion 0
Questions 16

An enterprise organization currently provides WAN connectivity to their branch sites using MPLS technology, and the enterprise network team is considering rolling out SD-WAN services for all sites.

With regards to the deployment planning, drag and drop the actions from the left onto the corresponding steps on the right.

Options:

Discussion 0
Questions 17

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

Options:

A.  

inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

B.  

ability to expand bandwidth over existing optical infrastructure

C.  

inherent topology flexibility with built-in service protection

D.  

inherent topology flexibility with intelligent chromatic dispersion

E.  

inherent topology flexibility with service protection provided through a direct integration with an upper layer protocol

Discussion 0
Questions 18

Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)

Options:

A.  

Increase WAN bandwidth

B.  

Increase memory branch switch.

C.  

Fragment data packets.

D.  

Replace any electrical links with optical links

E.  

Prioritize voice packets

Discussion 0
Questions 19

Refer to the exhibit.

As part of a redesign project, you must predict multicast behavior. What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated?

Options:

A.  

It is dropped due to an unsuccessful RPF check against the multicast source

B.  

It is switched given that no RPF check is performed

C.  

It is switched due to a successful RPF check against the routing table

D.  

It is dropped due to an unsuccessful RPF check against the multicast receiver.

Discussion 0
Questions 20

A Service Provider is designing a solution for a managed CE service to a number of local customers using a single CE platform and wants to have logical separation on the CE platform using Virtual Routing and Forwarding (VRF) based on IP address ranges or packet length. Which is the most scalable solution to provide this type of VRF Selection process on the CE edge device?

Options:

A.  

Static Routes for Route Leaking

B.  

Policy Based Routing

C.  

OSPF per VRF Instance

D.  

Multi-Protocol BGP

Discussion 0
Questions 21

A BGP route reflector in the network is taking longer than expected to converge during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?

Options:

A.  

Increase the size of the hold queue.

B.  

Increase the size of the large buffers.

C.  

Decrease the size of the small buffers.

D.  

Increase the keepalive timers for each BGP neighbor.

Discussion 0
Questions 22

Which design consideration is valid when you contrast FabricPath and TRILL?

Options:

A.  

FabricPath uses IS-IS, but TRILL uses VXLAN

B.  

FabricPath permits active-active FHRP and TRILL supports anycast gateway

C.  

FabricPath permits ECMP, but TRILL does not

D.  

FabricPath permits active-active mode, but TRILL supports only active-standby mode

Discussion 0
Questions 23

Refer to the exhibit.

This network is running OSPF and EIGRP as the routing protocols. Mutual redistribution of the routing protocols has been configured on the appropriate ASBRs. The OSPF network must be designed so that flapping routes in EIGRP domains do not affect the SPF runs within OSPF. The design solution must not affect the way EIGRP routes are propagated into the EIGRP domains. Which technique accomplishes the requirement?

Options:

A.  

route summarization at the ASBR interfaces facing the OSPF domain

B.  

route summarization on the appropriate ASBRs

C.  

route summarization on the appropriate ABRs

D.  

route summarization on EIGRP routers connecting toward the ASBR

Discussion 0
Questions 24

Refer to the exhibit.

An engineer is designing the network for a multihomed customer running in AS 111. The AS does not have any other ASs connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?

Options:

A.  

Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.

B.  

Use the local preference attribute to configure your AS as a non-transit AS.

C.  

Include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.

D.  

Include a prefix list to only receive routes from neighboring ASs.

Discussion 0
Questions 25

Company XYZ wants to redesign the Layer 2 part of their network to use all uplinks for increased performance, support host reachability with conversational learning, and avoid port-channels. Which other technique can be used?

Options:

A.  

TRILL

B.  

LISP

C.  

MSTP

D.  

Switch stack

Discussion 0
Questions 26

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

Options:

A.  

CPU and memory usage on the spoke routers

B.  

Memory usage on the hub router

C.  

CPU usage on the hub router

D.  

Interface buffers on the hub and spoke routers

Discussion 0
Questions 27

Company XYZ is migrating their existing network to IPv6. Some access layer switches do not support IPv6, while core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used?

Options:

A.  

The access layer switches must support IGMP snooping at a minimum. Any switches that do not support IGMP snooping must be replaced.

B.  

Upgrade the non-supporting switches. Otherwise, it will cause an issue with the migration.

C.  

Layer 2 switches will not affect the implementation of IPv6. They can be included in the design in their current state.

D.  

The access layer switches must support DHCPv6. Any switches that do not support DHCPv6 must be replaced.

Discussion 0
Questions 28

Which two characteristics are associated with 802.1s? (Choose two)

Options:

A.  

802.1s supports up to 1024 instances of 802.1

B.  

802.1s is a Cisco enhancement to 802.1w.

C.  

802.1s provides for faster convergence over 802.1D and PVST+.

D.  

CPU and memory requirements are the highest of all spanning-tree STP implementations.

E.  

802.1s maps multiple VLANs to the same spanning-tree instance.

Discussion 0
Questions 29

QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3. A high availability application is synchronizing data between host A and host B. To increase chance of delivery the same data is sent twice from host A on two different NICs toward the two NICs on host B.

Refer to the exhibit. All links are P2P Layer 3. A high availability application is synchronizing data between Host A and Host B. To increase the chance of delivery, the same data is sent twice from Host A on two different NICs toward the two NICs on Host B.

Which solution must be deployed in the network to ensure that any failure in the network does not trigger data loss on Host B?

Options:

A.  

EIGRP with feasible successors

B.  

BFD

C.  

IP Fast Reroute

D.  

Static routes

Discussion 0
Questions 30

Refer to the exhibit. A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP-SW2. Which two ways to design this solution are true? (Choose two)

Options:

A.  

Enable unicast heartbeat messages to be periodically exchanged between MEPs

B.  

Enable Connectivity Fault Management on the SP switches

C.  

Use upward maintenance endpoints on the SP switches

D.  

Forward E-LMI PDUs over VPLS

E.  

Forward LLDP PDUs over the VPLS

Discussion 0
Questions 31

SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?

Options:

A.  

Need for intelligent traffic monitoring

B.  

Exponential growth of resource-intensive applications

C.  

Complex and distributed management flow

D.  

Higher operating expense and capital expenditure

Discussion 0
Questions 32

Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high-speed connections. The company is now redesigning their network and must comply with these design requirements:

    Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.

    Use the Internet as the underlay for the private WAN.

    Securely transfer the corporate data over the private WAN.

Which two technologies should be incorporated into the design of this network? (Choose two.)

Options:

A.  

S-VTI

B.  

IPsec

C.  

DMVPN

D.  

GET VPN

E.  

PPTP

Discussion 0
Questions 33

An enterprise solution team is analyzing multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

Options:

A.  

Deploy a root controller to gather a complete network-level view.

B.  

Use the East-West API to facilitate replication between controllers within a cluster.

C.  

Build direct physical connectivity between different controllers.

D.  

Use OpenFlow to implement and adapt new protocols.

Discussion 0
Questions 34

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving. The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?

Options:

A.  

Assigning unique Route Distinguishers

B.  

Assigning unique Route Target IDs

C.  

Assigning unique IP address space for the Enterprise NAT/Firewalls

D.  

Assigning unique VRF IDs to each L3VPN

Discussion 0
Questions 35

Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

Options:

A.  

PIM-DM

B.  

PIM-SM

C.  

PIM-SSM

D.  

BIDIR-PIM

Discussion 0
Questions 36

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection. Which technology meets the updated requirements and can be incorporated into the design?

Options:

A.  

Routed firewall

B.  

VLAN ACLs on the switch

C.  

Transparent firewall

D.  

Zone-based firewall on the Layer 3 device

Discussion 0
Questions 37

Refer to the exhibit.

ACME Mining has four data centers in Santiago. Cape Town. Mumbai, and Beijing, full-mesh connected via a 400 Mb/s EVP-LAN They want to deploy a new mission-critical application with these

requirements:

    clusterheartbeat2Mb/s continuous (250 KB/s)

    cluster heartbeat one-way maximum latency 100 ms

These are the current ping tests results between the four data centers:

Which hosting data center pair can host the new application?

Options:

A.  

Mumbai and Beijing

B.  

Santiago and Cape Town

C.  

Santiago and Mumbai

D.  

Cape Town and Mumbai

E.  

Cape Town and Beijing

F.  

Santiago and Beijing

Discussion 0
Questions 38

Refer to the exhibit.

A customer runs OSPF with Area 5 between its aggregation router and an internal router. When a network change occurs in the backbone, Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5. You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area. How can you accomplish this task?

Options:

A.  

Increase the bandwidth on the connection between Router A and Router B

B.  

Implement LSA filtering on the ABR, allowing summary routes and preventing more specific routes into Area 5

C.  

Create a virtual link to Area 0 from Router B to the ABR

D.  

Turn on LSA throttling on all devices in Area 5

E.  

Set Area 5 to stubby at the ABR anyway

Discussion 0
Questions 39

A multicast network is using Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Options:

A.  

Use two phantom RP addresses

B.  

Manipulate the administration distance of the unicast routes to the two RPs

C.  

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.  

Advertise the two RP addresses in the routing protocol

E.  

Use anycast RP based on MSDP peering between the two RPs

F.  

Control routing to the two RPs through a longest match prefix

Discussion 0
Questions 40

Company XYZ wants to use the FCAPS ISO standard for network management design, focusing on minimizing outages through detection, isolation, and corrective actions. Which layer accomplishes this design requirement?

Options:

A.  

Fault management

B.  

Performance management

C.  

Security management

D.  

Accounting management

Discussion 0
Questions 41

You are designing a large-scale DMVPN network with more than 500 spokes using EIGRP as the IGP protocol. Which design option eliminates potential tunnel down events on the spoke routers due to the holding time expiration?

Options:

A.  

Increase the hold queue on the physical interface of the hub router

B.  

Increase the hold queue on the tunnel interface of the spoke routers

C.  

Increase the hold queue on the tunnel interface of the hub router

D.  

Apply QoS for pak_priority class

E.  

Increase the hold queue on the physical interface of the spoke routers

Discussion 0
Questions 42

A customer asks you to perform a high-level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via multipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

Options:

A.  

EIGRP

B.  

IS-IS

C.  

OSPF

D.  

BGP

Discussion 0
Questions 43

Company XYZ is in the process of identifying which transport mechanism(s) to use as their WAN technology. Their main two requirements are:

    A technology that could offer DPI, SLA, secure tunnels, privacy, QoS, scalability, reliability, and ease of management.

    A technology that is cost-effective.

Which WAN technology(ies) should be included in the design of company XYZ?

Options:

A.  

Software-defined WAN should be the preferred choice because it complements both technologies, covers all the required features, and it is the most cost-effective solution.

B.  

Internet should be the preferred option because it is cost-effective and supports BFD, IP SLA, and IPsec for secure transport over the public Internet.

C.  

Both technologies should be used. Each should be used to back up the other one; where the primary links are MPLS, the Internet should be used as a backup link with IPsec (and vice versa).

D.  

MPLS meets all these requirements and it is more reliable than using the Internet. It is widely used with defined best practices and an industry standard.

Discussion 0
Questions 44

Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)

Options:

A.  

Check for high roaming delay.

B.  

Check for uniform radio coverage across the floors.

C.  

Check for high channel utilization.

D.  

Check for latency over wireless.

E.  

Identify frequent TX power changes.

Discussion 0
Questions 45

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)

Options:

A.  

service provider agreement to support tuned timers

B.  

manual updates to the peer groups

C.  

service provider scheduling of changes to the PE

D.  

number of routes on the CE router

E.  

number of VRFs on the PE router

Discussion 0
Questions 46

Which design solution reduces the amount of IGMP state in the network?

Options:

A.  

IGMP filtering

B.  

IGMPv3 with PIM-SSM

C.  

Multiple multicast domains

D.  

One multicast group address throughout network regardless of IGMP version

Discussion 0
Questions 47

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

Options:

A.  

Reduction in time to detect and respond to threats

B.  

Integration with an incident response plan

C.  

Adoption and improvement of threat-detection response

D.  

Asset identification and grouping decisions

Discussion 0
Questions 48

Company XYZ wants to deploy OSPF. The design plan requires that two OSPF networks be mutually redistributed at multiple locations and ensure end-to-end connectivity to all of the company's networks. Which technology can be used to fulfill the requirements while avoiding the creation of routing loops?

Options:

A.  

Create a virtual link between ASBRs.

B.  

Change the router ID for both ASBRs.

C.  

Redistribute routes as external type 2 routes.

D.  

Use route maps on ASBRs to filter routes with tags so they are not redistributed.

Discussion 0
Questions 49

An Agile for Infrastructure transition often means dismantling traditional IT hierarchies and rebuilding it to align with business objectives and workflows. Organizations are seeing the benefits of using automation tools in the network such as faster, more efficient, and more effective delivery of products and services. Which two components help increase overall productivity and improve company culture? (Choose two.)

Options:

A.  

Agile code practices

B.  

Infrastructure-as-code

C.  

Controlled infrastructure

D.  

DevOps practices

E.  

Dedicated infrastructure

Discussion 0
Questions 50

A business customer deploys workloads in the public cloud but now faces governance issues related to IT traffic flow and data security. Which action helps identify the issue for further resolution?

Options:

A.  

Set up a secure tunnel from customer routers to protect traffic to cloud providers.

B.  

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud providers.

C.  

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic to cloud providers.

D.  

Apply workload policies that dictate security requirements for cloud workloads.

Discussion 0
Questions 51

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

Options:

A.  

Evaluate bandwidth utilization and connection quality

B.  

Enable special requirements such as direct DID lines on pickup

C.  

Make recommendations to limit the size of the half-open session table on routers

D.  

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

Discussion 0
Questions 52

A service provider recently migrated to an SD-WAN solution for delivering WAN connections to its customers. One of the main challenges with the SD-WAN deployment is that branch site volume increases every year, which causes management complexity. Which action resolves the issue?

Options:

A.  

Implement a scalable network management system to manage all sites.

B.  

Adopt a well-structured SD-WAN service management lifecycle model.

C.  

Build a service orchestration platform on top of the network controller.

D.  

Set up a dedicated team to monitor and provision new customers.

Discussion 0
Questions 53

The goal for any network designer is to strive to build a resilient network that adapts to changing conditions rapidly with minimal impact on the services running over the network. A resilient network can adapt to failures, but which soft failure can be harder to define and detect?

Options:

A.  

A network with operational challenges due to lack of skills

B.  

A network that is not running in an optimal way

C.  

A network which does not solve complexity issues

D.  

A network or service that experiences outages

Discussion 0
Questions 54

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)

Options:

A.  

cost optimization approach

B.  

strategic planning approach

C.  

modular approach

D.  

tactical planning approach

E.  

business optimization approach

Discussion 0
Questions 55

Which two pain points are the most common for container technology adoption? (Choose two)

Options:

A.  

Performance

B.  

Security

C.  

Cost

D.  

Container deployment

E.  

Skilled staff

F.  

Compliance

Discussion 0
Questions 56

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP Path MTU Discovery be enabled. Which effect will this have on the network?

Options:

A.  

It will enhance the performance of TCP-based applications.

B.  

It will increase the convergence time.

C.  

It will improve the convergence time.

D.  

It will create a loop free path.

Discussion 0
Questions 57

As part of a new network design documentation, you are required to explain the reason for choosing Cisco FabricPath for Layer 2 loop avoidance.

Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network? (Choose two)

Options:

A.  

MAC tunneling

B.  

IS-IS multipath

C.  

RPF check

D.  

TTL header

Discussion 0
Questions 58

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The main requirements are ZTP support, end-to-end encryption, application awareness, and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

Options:

A.  

SD-branch

B.  

DMVPN with PfR

C.  

Managed SD-WAN

D.  

SD-WAN

Discussion 0
Questions 59

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?

Options:

A.  

SNMPv3

B.  

Syslog

C.  

Syslog TLS

D.  

SNMPv2

E.  

SSH

Discussion 0
Questions 60

In outsourced IT services, the RTO is defined within the SLA. Which two support terms are often included in the SLA by IT and other service providers? (Choose two.)

Options:

A.  

Network size and cost

B.  

Support availability

C.  

Network sustainability

D.  

Network reliability

E.  

Resolution time

Discussion 0
Questions 61

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

Options:

A.  

Local to global NAT translation is done after routing

B.  

Global to local NAT translation is done before routing

C.  

Local to global NAT translation is done before policy-based routing

D.  

Global to local NAT translation is done after policy-based routing

Discussion 0
Questions 62

Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

Options:

A.  

GRE

B.  

MPLS

C.  

VXLAN

D.  

LISP

E.  

CAPWAP

Discussion 0
Questions 63

An architect designs a multi-controller network architecture with these requirements:

    Achieve fast failover to control traffic when controllers fail.

    Yield a short distance and high resiliency in the connection between the switches and the controller.

    Reduce connectivity loss and enable smart recovery to improve the SDN survivability.

    Improve connectivity by adding path diversity and capacity awareness for controllers.

Which control plane component of the multi-controller must be built to meet the requirements?

Options:

A.  

control node reliability

B.  

controller stale consistency

C.  

control path reliability

D.  

controller clustering

Discussion 0
Questions 64

A green data center is being deployed and a design requirement is to be able to readily scale server virtualization. Which IETF standard technology can provide this requirement?

Options:

A.  

data center bridging

B.  

unified fabric

C.  

Transparent Interconnection of Lots of Links

D.  

fabric path

Discussion 0
Questions 65

Which management category is not part of FCAPS framework?

Options:

A.  

Configuration

B.  

Security

C.  

Performance

D.  

Authentication

E.  

Fault-management

Discussion 0
Questions 66

What is a country-specific requirement that data is subject to the laws of the country in which it is collected or processed and must remain within its borders?

Options:

A.  

Data sovereignty

B.  

Data rationality

C.  

Data inheritance

D.  

Data replication

Discussion 0
Questions 67

Refer to the exhibit.

A customer has two eBGP internet links: one primary high-speed (10 Mbps) and one backup low-speed (1 Mbps). The requirement is to use the 10M link (ISP 1) for all inbound/outbound traffic and only use the 1M link (ISP 2) during failure.

What is the correct BGP-based design solution?

Options:

A.  

Advertise a higher local preference to ISP 2. Increase the AS PATH inbound from ISP 1

B.  

Advertise a longer AS PATH to ISP 2. Increase the MED to ISP 2

C.  

Advertise more specific routes to ISP 1. Increase the local preference attribute of inbound BGP from ISP1

D.  

Advertise less specific routes to ISP 2. Increase the AS PATH inbound from ISP 1

Discussion 0
Questions 68

What are two descriptions of network optimization? (Choose two.)

Options:

A.  

Maintain high availability

B.  

Proactive network management

C.  

Network redesign

D.  

Network health maintenance

E.  

Identify network requirements

Discussion 0
Questions 69

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

Options:

A.  

map IP CoS bits into the IP Precedence field

B.  

map flow-label bits into the Exp field

C.  

map IP precedence bits into the DSCP field

D.  

map DSCP bits into the Exp field

Discussion 0
Questions 70

Network changes due to mergers, acquisitions, and divestitures can be highly disruptive if not carefully planned. When an organization sells part of its business, it must detach those parts of the network with minimal risk and downtime.

Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?

Options:

A.  

Redundant design

B.  

Modular design

C.  

Less complex design

D.  

Routed access design

Discussion 0
Questions 71

You are designing a network running both IPv4 and IPv6 to deploy QoS. Which consideration is correct about the QoS for IPv4 and IPv6?

Options:

A.  

IPv4 and IPv6 traffic types can use queuing mechanisms such as LLQ, PQ, and CQ.

B.  

IPv6 packet classification is only available with process switching, whereas IPv4 packet classification is available with both process switching and CEF.

C.  

IPv6 and IPv4 traffic types can use a single QoS policy to match both protocols.

D.  

Different congestion management mechanisms need to be used for IPv4 and IPv6 traffic types.

Discussion 0
Questions 72

Over the years, many solutions have been developed to limit control plane state which reduces the scope or the speed of control plane information propagation. Which solution removes more specific information about a particular destination as topological distance is covered in the network?

Options:

A.  

Aggregation

B.  

Summarization

C.  

Back-off timers

D.  

Layering

Discussion 0
Questions 73

Company XYZ has two routing domains (EIGRP and OSPF). They want full reachability and need OSPF to see link costs added to external routes. How must redistribution be designed?

Options:

A.  

Redistribute using metric type 2 into OSPF.

B.  

Redistribute using metric type 1 into OSPF.

C.  

Redistribute using metric type 1 into EIGRP.

D.  

Redistribute using metric type 2 into EIGRP.

Discussion 0
Questions 74

As a network designer, you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications. Which of the following design considerations will not impact design decision?

Options:

A.  

Focus on the solution instead of the problem, which helps to reduce downtime duration

B.  

The location of the data collection

C.  

What direction the data or flows should be metered

D.  

Identify traffic types and top talkers over this link

Discussion 0
Questions 75

Which extensions to GRE tunneling provide session tracking and in-order packet delivery in exchange for additional state stored in tunnel endpoints?

Options:

A.  

GRE Protocol Type and Checksum extension fields.

B.  

GRE Version and Reserved0 extension fields.

C.  

No extension fields are available in the GRE header to track session data and packet sequences.

D.  

GRE Key and Sequence number extensions.

Discussion 0
Questions 76

What is a description of a control plane action?

Options:

A.  

De-encapsulating and re-encapsulating a packet in a data-link frame

B.  

Matching the destination MAC address of an Ethernet frame to the MAC address table

C.  

Matching the destination IP address of an IP packet to the IP routing table

D.  

Hosts locating routers that reside on attached links using the IPv6 Neighbor Discovery Protocol

Discussion 0
Questions 77

A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. They want to extend the existing IP CCTV network to a new branch without routing changes or IP address changes. What is the best approach?

Options:

A.  

GRE

B.  

L2TPv3

C.  

VXLAN

D.  

EoMPLS

Discussion 0
Questions 78

Hybrid cloud computing allows organizations to take advantage of public and private cloud models. Which best practice should organizations follow to ensure data security in the private cloud?

Options:

A.  

Use standard protocols for data transmission over the network.

B.  

Encrypt data when it is at rest and in motion.

C.  

Communicate all data security risks to customers and end users.

D.  

Use standard network protocols for data communication between unsecured network connections.

Discussion 0
Questions 79

Which two points must network designers consider when designing a new network design or when evaluating an existing network design to help them understand the high-level design direction with regards to the security aspects? (Choose two)

Options:

A.  

Consider Business objectives and goals

B.  

Consider organization’s security policy standards

C.  

Consider for only multi-site networks

D.  

Consider for only new network technologies and components

Discussion 0
Questions 80

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)

Options:

A.  

Changes in the existing IP addressing and subnets are required

B.  

The firewall can participate actively on spanning tree.

C.  

Multicast traffic can traverse the firewall.

D.  

OSPF adjacencies can be established through the firewall

E.  

The firewall acts like a router hop in the network.

Discussion 0
Questions 81

SD-WAN can be used to provide secure connectivity to remote offices, branch offices, campus networks, data centers, and the cloud over any type of IP-based underlay transport network. Which two statements describe SD-WAN solutions? (Choose two.)

Options:

A.  

SD-WAN networks are inherently protected against slow performance.

B.  

Control and data forwarding planes are kept separate.

C.  

Improved operational efficiencies result in cost savings.

D.  

Solutions include centralized orchestration, control, and zero-touch provisioning.

E.  

Solutions allow for variations of commodity and specialized switching hardware.

Discussion 0
Questions 82

Which two technologies enable multilayer segmentation? (Choose two.)

Options:

A.  

policy-based routing

B.  

segment routing

C.  

data plane markings

D.  

firewalls

E.  

filter lists

Discussion 0
Questions 83

When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?

Options:

A.  

QoE estimation

B.  

Security

C.  

Traffic patterns

D.  

Flow forwarding

Discussion 0
Questions 84

You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.)

Options:

A.  

IS-IS

B.  

static

C.  

RIP

D.  

EIGRP

E.  

BGP

Discussion 0
Questions 85

As technologies such as big data, cloud, and loT continue to grow, so will the demand for network bandwidth Business strategies must be flexible to accommodate these changes when it comes to priorities and direction and the network design strategy also must be agile and adaptable Drag and drop the benefits from the left onto the corresponding strategic approaches on the right as they relate to network design and management.

Options:

Discussion 0
Questions 86

Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries? (Choose two.)

Options:

A.  

AD manipulation

B.  

Matching OSPF external routes

C.  

Route tagging

D.  

Route filtering

E.  

Matching EIGRP process ID

Discussion 0
Questions 87

Which design principle improves network resiliency?

Options:

A.  

Added load-balancing

B.  

Added redundancy

C.  

Added confidentiality

D.  

Added reliability

Discussion 0
Questions 88

Refer to the exhibit.

The network 10.10.0.0/16 has been redistributed to OSPF processes and the best path to the destination from R1 has been chosen as R1–R2–R3. A failure occurred on the link between R2 and R3 and the path was changed to R1–R4–R5–R3. What happens when the link between R2 and R3 is restored?

Options:

A.  

The path R1–R4–R5–R3 continues to be the best path because the metric is better

B.  

The path reverts back to R1–R2–R3 because the route type is E1

C.  

The path R1–R4–R5–R3 continues to be the best path because OSPF does not compare the metrics between two domains

D.  

The path reverts to R1–R2–R3 because this was the previous best path

Discussion 0
Questions 89

SDN is still maturing. Throughout the evolution of SDN, which two things will play a key role in enabling a successful deployment and avoiding performance visibility gaps in the infrastructure? (Choose two.)

Options:

A.  

Rapid on-demand growth

B.  

Dynamic real-time change

C.  

Falling back to old behaviors

D.  

Peer-to-peer controller infrastructure

E.  

Integration of device context

Discussion 0
Questions 90

Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?

Options:

A.  

OSPF fast hellos

B.  

BFD echo

C.  

Change the protocol to BGP

D.  

Change the OSPF hello and dead intervals

Discussion 0
Questions 91

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

Options:

A.  

PortFast

B.  

UDLD

C.  

Root guard

D.  

BPDU guard

Discussion 0
Questions 92

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

Options:

A.  

PIM dense mode with RP located at the hub

B.  

PIM sparse mode with RP located at each remote site

C.  

PIM sparse mode with RP located at the hub

D.  

PIM dense mode with RP located at each remote site

Discussion 0
Questions 93

Refer to the exhibit.

This network is running EIGRP as the routing protocol and the internal networks are being advertised in EIGRP. Based on the link speeds, all traffic between London and Rome is getting propagated via Barcelona and the direct link between London and Rome is not being utilized under normal working circumstances. The EIGRP design should allow for efficiency in the routing table by minimizing the routes being exchanged. The link between London and Rome should be utilized for specific routes. Which two steps accomplish this task? (Choose two.)

Options:

A.  

Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes

B.  

Filter the routes on the link between London and Barcelona

C.  

Filter the routes on the link between London and Rome

D.  

Configure route leaking of summary routes on the link between London and Rome

Discussion 0
Questions 94

Refer to the exhibit.

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

Options:

A.  

Address family translation

B.  

Dual stack

C.  

Host-to-host tunneling

D.  

6rd tunneling

Discussion 0
Questions 95

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

Options:

A.  

asynchronous replication over dual data centers via DWDM

B.  

synchronous replication over geographically dispersed dual data centers via MPLS

C.  

synchronous replication over dual data centers via Metro Ethernet

D.  

asynchronous replication over geographically dispersed dual data centers via CWDM

Discussion 0
Questions 96

Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?

Options:

A.  

It transmits packets that traverse over network devices like switches and routers

B.  

It encapsulates packets at source and destination, which incurs additional overhead

C.  

Packet delivery and reliability occurs at Layer 3 and Layer 4

D.  

It is responsible for the delivery of packets; NAT- or VRF-based segregation is required

Discussion 0
Questions 97

What are two examples of components that are part of an SDN architecture? (Choose two.)

Options:

A.  

Software plane

B.  

Control plane

C.  

Application plane

D.  

Management plane

E.  

Network plane

Discussion 0
Questions 98

Refer to the exhibit.

Refer to the exhibit. Two data center sites (X and Y) connect to the Internet and each other using a backdoor link. Both advertise the same IP prefix (100.75.10.0/23) to the Internet. Firewalls are behind R1 and R2.

Problem: When users attempt to reach 100.75.10.0/23, the return traffic is routed to Site-Y, regardless of where the session originated. This results in asymmetric traffic and potentially broken sessions due to firewall behavior.

Which design resolves the issue?

Options:

A.  

Use BGP MED to influence Site-X return traffic. Change the IP address scheme of both sites.

B.  

Change the Site-Y firewall configuration to replicate the Site-X configuration. Advertise the low MED attribute on Site-X to the Internet.

C.  

Add a static route toward the Internet on Site-X. Change the DNS policy on Site-Y to block traffic.

D.  

Establish control plane peering between edge routers. Have Site-X advertise an IP pool with a longer prefix.

Discussion 0
Questions 99

Which statement about OSPF hub-and-spoke topology is true?

Options:

A.  

The DR election is a challenge unless a point-to-point network type is used

B.  

The DR and BDR election occurs regardless of the underlying OSPF network type

C.  

Traffic does not need to traverse the hub to reach the spokes.

D.  

The spoke routers can belong to different areas regardless of the underlying OSPF network type

Discussion 0
Questions 100

Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two.)

Options:

A.  

Bandwidth utilization increases

B.  

Traffic flows are suboptimal

C.  

High-end routers are required to support NFV

D.  

OpenFlow must be supported in the network

E.  

An SDN orchestration layer is required to support NFV

Discussion 0
Questions 101

An attacker exploits application flaws to obtain data and credentials. What is the next step after application discovery in Zero Trust networking?

Options:

A.  

Establish visibility and behavior modeling

B.  

Enforce policies and microsegmentation

C.  

Assess real-time security health

D.  

Ensure trustworthiness of systems

Discussion 0
Questions 102

Which relationship between IBGP and the underlying physical topology is true?

Options:

A.  

iBGP full mesh requirement does not dictate any specific network topology.

B.  

iBGP can work only on a ring network topology with a link-state protocol like OSPF or IS-IS.

C.  

iBGP full mesh requires an underlying fully meshed network topology.

D.  

iBGP does not work on a ring network topology even with an underlying IGP.

Discussion 0
Questions 103

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)

Options:

A.  

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing.

B.  

It is highly-available by design with no single-point-of-failure risks present.

C.  

Integrating smart NIC capabilities on the local host level is made easier through REST APIs.

D.  

It significantly improves the latency when performing reactive handling of PACKET_IN events.

E.  

The centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment.

Discussion 0
Questions 104

Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two.)

Options:

A.  

The group-pacing timer controls the interval that is used for group and individual LSA refreshment

B.  

OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size

C.  

OSPF retransmission-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF retransmission queue

D.  

OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue

E.  

OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue

Discussion 0