Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Cisco Certified Design Expert (CCDE v3.0) Written Exam Question and Answers

Cisco Certified Design Expert (CCDE v3.0) Written Exam

Last Update May 5, 2024
Total Questions : 329

We are offering FREE 400-007 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 400-007 free exam questions and then go for complete pool of Cisco Certified Design Expert (CCDE v3.0) Written Exam test questions that will help you more.

400-007 pdf

400-007 PDF

$139.65  $399
400-007 Engine

400-007 Testing Engine

$157.15  $449
400-007 PDF + Engine

400-007 PDF + Testing Engine

$209.65  $599
Questions 1

Which function is performed at the access layer of the three-layer hierarchical network design model?

Options:

A.  

fault isolation

B.  

QoS classification and marking boundary

C.  

reliability -

D.  

fast transport

E.  

redundancy and load balancing

Discussion 0
Questions 2

How many fully established neighbour relationships exist on an Ethernet with five routers running OSPF as network type broadcast?

Options:

A.  

5

B.  

6

C.  

7

D.  

10

E.  

20

Discussion 0
Questions 3

Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)

Options:

A.  

Loop Guard

B.  

PortFast

C.  

DTF

D.  

Root Guard

E.  

BPDU Guard

Discussion 0
Questions 4

Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?

Options:

A.  

Ansible

B.  

Contrail

C.  

Java

D.  

Jinja2

Discussion 0
Questions 5

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

Options:

A.  

Control Plane Protection using queue thresholding on the transit subinterface

B.  

Control Plane Protection using port filtering on the transit subinterface

C.  

Control Plane Protection using port filtering on the main interface

D.  

Control Plane Protection using queue thresholding on the host subinterface

E.  

Control Plane Protection using port filtering on the host subinterface

Discussion 0
Questions 6

An engineer must design a network for a company that uses OSPF LFA to reduce loops. Which type of loop would be reduced by using this design?

Options:

A.  

DTP

B.  

micro loops

C.  

STP

D.  

REP

Discussion 0
Questions 7

SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?

Options:

A.  

need for intelligent traffic monitoring

B.  

exponential growth of resource-intensive application

C.  

complex and distributed management flow

D.  

higher operating expense and capital expenditure

Discussion 0
Questions 8

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?

Options:

A.  

working design over comprehensive documentation

B.  

contract negotiation over customer collaboration

C.  

following a plan over responding to change

D.  

processes and tools over individuals and interactions over time

Discussion 0
Questions 9

Which optimal use of interface dampening on a fast convergence network design is true?

Options:

A.  

When occasional flaps of long duration occur

B.  

when numerous adjacent flaps of very short duration occur

C.  

when the router hardware it slower than the carrier delay down detection

D.  

when the switch hardware is faster than the debounce timer down detection

Discussion 0
Questions 10

Refer to the exhibit.

An engineer is designing the network for a multihomed customer running in AS 111 does not have any other Ass connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?

Options:

A.  

Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.

B.  

Use the local preference attribute to configure your AS as a non-transit'' AS.

C.  

include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.

D.  

Include a prefix list to only receive routes from neighboring ASs.

Discussion 0
Questions 11

A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. Recently, they added a new branch to their network. Due to physical security concerns, they want to extend their existing IP CCTV network of the head office to the new branch, without any routing changes in the network. They are also under some time constraints. What is the best approach to extend the existing IP CCTV network to the new branch, without incurring any IP address changes?

Options:

A.  

GRE

B.  

L2TPv3

C.  

VXLAN

D.  

EoMPLS

Discussion 0
Questions 12

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

Options:

A.  

cryptography

B.  

confidentiality

C.  

authorization

D.  

identification

E.  

integrity

F.  

availability

Discussion 0
Questions 13

You are designing an Out of Band Cisco Network Admission Control. Layer 3 Real-IP Gateway deployment for a customer Which VLAN must be trunked back to the Clean Access Server from the access switch?

Options:

A.  

authentication VLAN

B.  

user VLAN

C.  

untrusted VLAN

D.  

management VLAN

Discussion 0
Questions 14

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

Options:

A.  

PIM dense mode with RP located at the hub

B.  

PIM sparse mode with RP located at each remote site

C.  

PIM sparse mode with RP located at the hub

D.  

PIM dense mode with RP located at each remote site

Discussion 0
Questions 15

Which two impacts of adding the IP event dampening feature to a network design are true? (Choose two.)

Options:

A.  

It protects against routing loops.

B.  

It switches traffic immediately after a link failure.

C.  

lt speeds up link failure detection.

D.  

It reduces the utilization of system processing resources.

E.  

It improves overall network stability.

Discussion 0
Questions 16

Which design benefit of PortF ast is true?

Options:

A.  

PortFast does not generate a spanning tree topology change hen a station on a port is connected or disconnected

B.  

PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected

C.  

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

D.  

PortFast detects one-way communications on the physical port, which prevents switch loops

E.  

PortFast prevents switch loops that are caused by a unidirectional point to point link condition on Rapid PVST+ and MST

F.  

PortFast prevents switched traffic from traversing suboptimal paths on the network

Discussion 0
Questions 17

Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?

Options:

A.  

After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval

B.  

After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval

C.  

Timers renegotiate indefinitely, so the timer exchange phase never converges

D.  

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

Discussion 0
Questions 18

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

Options:

A.  

wide area network

B.  

mobile network

C.  

metro network

D.  

application network

E.  

control network

Discussion 0
Questions 19

Which two features control multicast traffic in a VLAN environment? (Choose two)

Options:

A.  

IGMP snooping

B.  

MLD snooping

C.  

RGMP

D.  

PIM snooping

E.  

pruning

Discussion 0
Questions 20

Which option is a fate-sharing characteristic in regards to network design?

Options:

A.  

A failure of a single element causes the entire service to fail

B.  

It protects the network against failures in the distribution layer

C.  

It acts as a stateful forwarding device

D.  

It provides data sequencing and acknowledgment mechanisms

Discussion 0
Questions 21

A large enterprise customer is planning a new WAN connection to its headquarters. The current architecture is

dual homed with static routing, but users complain when a specific link fails. Failure of the other link does not

affect any services or applications. The new WAN connection must provide the headquarters with a resilient

network design and increase the return on investment.

Which solution should be recommended to the customer?

Options:

A.  

Implement granular quality of service on the links.

B.  

Procure additional bandwidth.

C.  

Use dynamic routing toward the WAN.

D.  

Add an additional link to the WAN.

Discussion 0
Questions 22

A small organization of 20 employees is looking to deliver a network design service for modernizing customer networks to support advanced solutions.

  • Project scope and weekly progress should be visualized by the management.

  • Always consider feedback and make changes accordingly during the project.

  • Should consider flexibility to change scope at the point of time.

Which project methodology meets the requirements and have the least impact on the outcome?

Options:

A.  

Scrum

B.  

LEAN

C.  

Kanban

D.  

Six-Sigma

Discussion 0
Questions 23

Which two statements describe network automation and network orchestration? (Choose two.)

Options:

A.  

Network automation does not provide governance or policy management.

B.  

Network automation spans multiple network services, vendors, and environments.

C.  

Network orchestration is done through programmatic REST APIs enabling automation across devices and management platforms.

D.  

Provisioning network services is an example of network automation.

E.  

Network orchestration is used to run single, low-level tasks without human intervention

Discussion 0
Questions 24

An enterprise organization currently provides WAN connectivity to their branch sites using MPLS technology, and the enterprise network team is considering rolling out SD-WAN services for all sites.

With regards to the deployment planning, drag and drop the actions from the left onto the corresponding steps on the right.

Options:

Discussion 0
Questions 25

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

Options:

A.  

Metro Ethernet

B.  

DWDM

C.  

CWDM

D.  

MPLS

Discussion 0
Questions 26

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

Options:

A.  

SaaS

B.  

PaaS

C.  

laaS

D.  

hybrid cloud

Discussion 0
Questions 27

A software-defined networking (SDN) controller teams network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers Each policy is represented as a RIB entry in the control plane of the router Which SDN model has been implemented?

Options:

A.  

SDN centralized

B.  

SDN traffic engineering

C.  

SD-WAN

D.  

SDN hybrid

Discussion 0
Questions 28

The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner However the company network does not support BFD Which other feature can be used to fulfill the design requirement?

Options:

A.  

STP

B.  

fast hello

C.  

LFA

D.  

DPD

Discussion 0
Questions 29

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Options:

Discussion 0
Questions 30

A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs Which consideration supports the new business requirement?

Options:

A.  

VDI servers should be contained centrally within a DMZ

B.  

The thin client traffic should be placed in a WAN QoS priority queue

C.  

VDI servers should be contained within dedicated VLANs in each branch location

D.  

The WAN should offer low latency and be resized

Discussion 0
Questions 31

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two )

Options:

A.  

Serialization delays are invariable because they depend only on the line rate of the interface

B.  

Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.

C.  

Serialization delay is the time required to transmit the packet on the physical media.

D.  

Serialization delays are variable because they depend only on the size of the packet being serialized

E.  

Serialization delay depends not only on the line rate of the interface but also on the size of the packet

Discussion 0
Questions 32

Network changes because of mergers, acquisitions, and divestment can be very disruptive to the network if not carried out carefully. When an organization sells parts of its business, it must detach the affected parts of the network from the rest of the network. Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?

Options:

A.  

redundant design

B.  

modular design

C.  

less complex design

D.  

routed access design

Discussion 0
Questions 33

Which main IoT migration aspect should be reviewed for a manufacturing plant?

Options:

A.  

Sensors

B.  

Security

C.  

Applications

D.  

Wi-Fi Infrastructure

E.  

Ethernet Switches

Discussion 0
Questions 34

The Agile Manifesto is a document that defines the key values and principles behind the Agile philosophy and helps development teams work more efficiently and sustainably Each of the four key values is split into two sections a left-hand side and a right-hand side In other words, though there is value in the items on the right we value the items on the left more What is one of the key values of the Agile Manifesto?

Options:

A.  

comprehensive documentation over working software

B.  

contract negotiation over customer collaboration

C.  

individuals and interactions over processes and tools

D.  

following a plan over responding to change

Discussion 0
Questions 35

An enterprise solution team is performing an analysis of multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

Options:

A.  

Deploy a root controller to gather a complete network-level view.

B.  

Use the East-West API to facilitate replication between controllers within a cluster.

C.  

Build direct physical connectivity between different controllers.

D.  

Use OpenFlow to implement and adapt new protocols.

Discussion 0
Questions 36

What is a disadvantage of the traditional three-tier architecture model when east west traffic between different pods must go through the distribution and core layers?

Options:

A.  

low bandwidth

B.  

security

C.  

scalability

D.  

high latency

Discussion 0
Questions 37

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

Options:

A.  

Fate sharing

B.  

CPU resource allocation

C.  

Congestion control

D.  

Security

E.  

Bandwidth allocation

Discussion 0
Questions 38

Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.

Options:

Discussion 0
Questions 39

Which two actions must be taken when assessing an existing wireless network implementation for its readiness to support voice traffic? (Choose two.)

Options:

A.  

Check for high roaming delay.

B.  

Check for uniform radio coverage across the floors.

C.  

Check for high channel utilization.

D.  

Check for latency over wireless.

E.  

Identify frequent TX power changes.

Discussion 0
Questions 40

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

Options:

A.  

MPP

B.  

CPPr

C.  

CoPP

D.  

DPP

Discussion 0
Questions 41

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design. Which two technologies are recommended? (Choose two.)

Options:

A.  

Design MLAG/MC-LAG into the network wherever possible.

B.  

Configure DHCP snooping on the switches.

C.  

Use root guard.

D.  

Use BPDU guard.

E.  

Use UniDirectional Link Detection.

Discussion 0
Questions 42

An enterprise wants to provide low-cost delivery of network systems that can be scaled on business demand, followed by an initiative to reduce capital expenses for new IT equipment. Which technology meets these goals'?

Options:

A.  

laaS within a private cloud

B.  

laaS within an on-premises location

C.  

PaaS within a public cloud

D.  

SaaS within an on-premises location

Discussion 0
Questions 43

Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure Which technique can be Implemented In the design to detect such a failure in a subsecond?

Options:

A.  

STP

B.  

fate sharing

C.  

OSPF LFA

D.  

BFD

E.  

flex links

Discussion 0
Questions 44

Which two possible drawbacks should you consider when introducing Network Functions Virtualization in a network design? (Choose two)

Options:

A.  

Bandwidth utilization increases

B.  

Traffic flows are suboptimal

C.  

High-end routers are required to support NFV

D.  

OpenFlow must be supported in the network

E.  

An SDN orchestration layer is required to support NFV

Discussion 0
Questions 45

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

Options:

A.  

Design in a way that expects outages and attacks on the network and its protected resources

B.  

The design approach should consider simple and centralized management aspect

C.  

Design in a way that it simplifies and improves ease of deployment

D.  

Design automation tools wherever it is appropriate for greater visibility

Discussion 0
Questions 46

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

Options:

Discussion 0
Questions 47

Refer to the exhibit.

The network 10.10.0 .0/16 has been redistributed to OSPF processes and the best path to the destination from R1 has been chosen as R1-R2-R3 A failure occurred on the link between R2 and R3 and the path was changed to R1-R4-R5-R3 What happens when the link between R2 and R3 is restored'?

Options:

A.  

The path R1-R4-R5-R3 continues to be the best path because the metric is better

B.  

The path reverts back to R1-R2-R3 because the route type is E1

C.  

The path R1-R4-R5-R3 continues to be the best path because OSPF does not compare the metrics between two domains

D.  

The path reverts to R1-R2-R3 because this was the previous best path

Discussion 0
Questions 48

Sometimes SDN leverages various overlay networking technologies to create layer(s) of network abstraction. What describes an overlay network?

Options:

A.  

It transmits packets that traverse over network devices like switches and routers

B.  

It encapsulates packets at source and destination, which incurs additional overhead

C.  

Packet delivery and reliability occurs at Layer 3 and Layer 4

D.  

It is responsible for the delivery of packets; NAT- or VRF-based segregation is required

Discussion 0
Questions 49

Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?

Options:

A.  

inside global

B.  

outside global

C.  

inside local

D.  

outside local

Discussion 0
Questions 50

Which Interconnectivity method offers the fastest convergence in the event of a unidirectional issue between three Layer 3 switches connected together with routed links in the same rack in a data center?

Options:

A.  

Copper Ethernet connectivity with BFD enabled

B.  

Copper Ethernet connectivity with UDLD enabled

C.  

Fiber Ethernet connectivity with BFD enabled

D.  

Fiber Ethernet connectivity with UDLD enabled

Discussion 0
Questions 51

Cost is often one of the motivators for a business to migrate from a traditional network to a software- defined network. Which design decision is directly influenced by CAPEX drivers?

Options:

A.  

scalability

B.  

stability

C.  

complexity

D.  

manageability

Discussion 0
Questions 52

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?

Options:

A.  

fault management

B.  

performance management

C.  

security management

D.  

accounting management

Discussion 0
Questions 53

Refer to the exhibit.

Company XYZ BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10 1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can the network administrator use so that the rest of the network is not affected by the flapping issue?

Options:

A.  

The LA administrator should use route aggregation to summarize the 10 1 4.0/24, 10 1 5 0/24, 10.1.6.0/24, and 10 1 7 0/24 networks toward Chicago

B.  

The LA administrator should use route dampening for the 10.1.5 0/24 network so that it does not get propagated when it flaps up and down.

C.  

The LA administrator should use route filtering to block the 10.1.5.0/24 network from getting propagated toward Chicago and New York.

D.  

The Chicago administrator should use route filtering to block the 10.1.5.0/24 network from coming in from the LA router.

Discussion 0
Questions 54

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard? (Choose two.)

Options:

A.  

conduct risk analyses

B.  

install firewalls

C.  

use antivirus software

D.  

establish monitoring policies

E.  

establish risk management policies

Discussion 0
Questions 55

Which design consideration is valid when you contrast fabricPath and trill?

Options:

A.  

FabricPath uses IS-IS, but TRILL uses VxLAN

B.  

FabricPath permits active-active FHRP and TRILL support anycast gateway.

C.  

FabricPath Permits ECMP, but TRILL does not

D.  

FabricPath permits active-active mode, but TRILL supports only active-standby mode.

Discussion 0
Questions 56

Which two statements describe the functionality of OSPF packet-pacing timers? (Choose two )

The group-pacing timer controls the interval that is used for group and individual LSA refreshment

Options:

A.  

OSPF flood-pacing timers allow dynamic control of the OSPF transmission queue size

B.  

OSPF retransmission-pacing timers allow control of interpacket spaang between consecutive link-state update packets in the OSPF retransmission queue.

C.  

OSPF retransmission-pacing timers allow control of packet interleaving between nonconsecutive link-state update packets in the OSPF retransmission queue.

D.  

OSPF flood-pacing timers allow control of interpacket spacing between consecutive link-state update packets in the OSPF transmission queue

Discussion 0
Questions 57

Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever increasing cybersecurity threats. To achieve this, federated identity services have been deployed in the Company XYZ network to provide single sign-on and Multi-Factor Authentication for the applications and services. Which protocol can be used by Company XYZ to provide authentication and authorization services?

Options:

A.  

OAuth2

B.  

OpenID Connect

C.  

OpenID

D.  

SAML2.0

Discussion 0
Questions 58

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Options:

Discussion 0
Questions 59

An MPLS service provider is offering a standard EoMPLS-based VPLS service to Customer A. providing Layer 2 connectivity between a central site and approximately 100 remote sites. Customer A wants to use the VPLS network to carry its internal multicast video feeds which are sourced at the central site and consist of 20 groups at Mbps each. Which service provider recommendation offers the most scalability?

Options:

A.  

EoMPLS-based VPLS can carry multicast traffic in a scalable manner

B.  

Use a mesh of GRE tunnels to carry the streams between sites

C.  

Enable snooping mechanisms on the provider PE routers.

D.  

Replace VPLS with a Layer 3 MVPN solution to carry the streams between sites

Discussion 0
Questions 60

You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature Which four routing protocols can you use to facilitate this? (Choose four.)

Options:

A.  

IS-IS

B.  

static

C.  

RIP

D.  

EIGRP

E.  

BGP

Discussion 0
Questions 61

Refer to the exhibit.

OSPF is running as the IGP to provide reachability to all AS100 networks R3 and R4 are the current ABRs at the boundary of OSPF Area0 and Areal Now BGP must be deployed within AS 100 because it will be receiving Internet routes from its eBGP peers (the service provider) connected to R1 and R2 What is an optimal solution for this deployment to configure BGP relationships and redistribute BGP learned routes into OSPF?

Options:

A.  

R5 should be configured as a route reflector for R1, R2, R3 and R4. BGP routes must be redistributed at R1 and R2 into OSPF.

B.  

Configuration should be set up with R1 and R2, and R3 in one sub AS, with and R4 in another, and redistribution at R1 and R2.

C.  

A full mesh should be deployed between all the routers with mutual redistribution to take place at R1 and R2.

D.  

R1, R2, R3 and R4 must be set up with a neighbor relationship with R5 only must not be a route reflector.

Discussion 0
Questions 62

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP path MTU discovery be enabled. Which effect will this have on the network?

Options:

A.  

It will enhance the performance of TCP-based applications.

B.  

It will increase the convergence time.

C.  

It will improve the convergence time.

D.  

It will create a loop free path.

Discussion 0
Questions 63

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two )

Options:

A.  

will only work with single-tier headend architecture

B.  

hub sites must connect to both DMVPN clouds

C.  

recommended for high availability

D.  

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.  

requires all sites to have dual Internet connections

Discussion 0
Questions 64

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

Options:

A.  

first-hop router registration to the RP

B.  

multicast client registration to the RP

C.  

multicast source registration to the RP

D.  

transport of all IPv6 multicast traffic

Discussion 0
Questions 65

Refer to the exhibit.

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

Options:

A.  

community

B.  

MED

C.  

local preference

D.  

As path

Discussion 0
Questions 66

You have been tasked with designing a data center interconnect to provide business continuity You want to encrypt the traffic over the DCI using IEEE 802 1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

Options:

A.  

EoMPLS

B.  

MPLS Layer 3 VPN

C.  

DMVPN

D.  

GET VPN

E.  

KVPLS

Discussion 0
Questions 67

A BGP route reflector in the network is taking longer than expected to coverage during large network changes. Troubleshooting shows that the router cannot handle all the TCP acknowledgements during route updates. Which action can be performed to tune the device performance?

Options:

A.  

Increase the size of the hold queue.

B.  

Increase the size of the large buffers.

C.  

Decrease the size of the small buffers.

D.  

Increase the keepalive timers for each BGP neighbor.

Discussion 0
Questions 68

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

Options:

A.  

Enforce risk-based and adaptive access policies.

B.  

Assess real-time security health of devices.

C.  

Apply a context-based network access control policy for users.

D.  

Ensure trustworthiness of devices.

Discussion 0
Questions 69

Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?

Options:

A.  

LDAP

B.  

EAP

C.  

TACACS+

D.  

RADIUS

Discussion 0
Questions 70

Company XYZ has 30 sites running a legacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :

  • Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.
  • Use the Internet as the underlay for the private WAN.
  • Securely transfer the corporate data over the private WAN.

Which two technologies should be Incorporated into the design of this network? (Choose two.)

Options:

A.  

S-VTI

B.  

IPsec

C.  

DMVPN

D.  

GET VPN

E.  

PPTP

Discussion 0
Questions 71

Refer to the exhibit.

This network is running OSPF as the routing protocol. The internal networks are being advertised in OSPF London and Rome are using the direct link to reach each other although the transfer rates are better via Barcelona Which OSPF design change allows OSPF to calculate the proper costs?

Options:

A.  

Change the OSPF reference bandwidth to accommodate faster links.

B.  

Filter the routes on the link between London and Rome

C.  

Change the interface bandwidth on all the links.

D.  

Implement OSPF summarisation to fix the issue

Discussion 0
Questions 72

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Options:

Discussion 0
Questions 73

Which BGP feature provides fast convergence?

Options:

A.  

BGP PIC |

B.  

BGP-EVPN

C.  

BGP FlowSpec

D.  

BGP-LS

Discussion 0
Questions 74

Which three Cisco products are used in conjunction with Red Hat to provide an NFVi solution? (Choose three.)

Options:

A.  

Cisco Prime Service Catalog

B.  

Cisco Open Virtual Switch

C.  

Cisco Nexus switches

D.  

Cisco UCS

E.  

Cisco Open Container Platform

F.  

Cisco Virtual Network Function

Discussion 0
Questions 75

You were tasked to enhance the security of a network with these characteristics:

• A pool of servers is accessed by numerous data centers and remote sites

• The servers are accessed via a cluster of firewalls

• The firewalls are configured properly and are not dropping traffic

• The firewalls occasionally cause asymmetric routing of traffic within the server data center.

Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

Options:

A.  

Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.

B.  

Deploy uRPF strict mode.

C.  

Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.

D.  

Deploy uRPF loose mode

Discussion 0
Questions 76

During evaluation of migrating current on premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward

• Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years

• Network bandwidth capacity requirements are dynamic and are expected to change over the next year

• If new technologies are to be introduced, operational expenses must be kept at a minimum. Which cloud strategy meets these requirements?

Options:

A.  

private

B.  

hybrid

C.  

public

D.  

multicloud

Discussion 0
Questions 77

An enterprise campus is adopting a network virtualization design solution with these requirements

  • It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs
  • It must maintain end-to-end logical path transport separation across the network
  • resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

Options:

A.  

Path isolation

B.  

Session isolation

C.  

Group virtualization

D.  

Services virtualization

E.  

Edge isolation

Discussion 0
Questions 78

What is the most important operational driver in building a resilient and secure modular network design?

Options:

A.  

Dependencies on hardware or software that is difficult to scale

B.  

Minimize app downtime

C.  

Reduce the frequency of failures requiring human intervention

D.  

Increase time spent on developing new features

Discussion 0
Questions 79

Drag and drop the design use cases from the left onto the correct uRPF techniques used to prevent spoofing attacks Not all options are used.

Options:

Discussion 0
Questions 80

Options:

A.  

low bandwidth

B.  

security

C scalability

C.  

high latency

Discussion 0
Questions 81

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

Options:

A.  

reduction in time to detect and respond to threats

B.  

integration with an incident response plan

C.  

adoption and improvement of threat-detection response

D.  

asset identification and grouping decisions

Discussion 0
Questions 82

Which SDN architecture component is used by the application layer to communicate with the control plane layer to provide instructions about the resources required by applications?

Options:

A.  

southbound APIs

B.  

northbound APIs

C.  

orchestration layer

D.  

SDN controller

Discussion 0
Questions 83

Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

Options:

A.  

GRE

B.  

MPLS

C.  

VXLAN

D.  

LISP

E.  

CAPWAP

Discussion 0
Questions 84

Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

Options:

A.  

PIM-DM

B.  

PIM-SM

C.  

PIM-SSM

D.  

BIDIR-PIM

Discussion 0
Questions 85

In search of a system capable of hosting, monitoring compiling. and testing code in an automated way, what can be recommended to the organization?

Options:

A.  

Jenkins

B.  

Ansible

C.  

Perl

D.  

Chef

Discussion 0
Questions 86

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Options:

A.  

Use two phantom RP addresses

B.  

Manipulate the administration distance of the unicast routes to the two RPs

C.  

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.  

Advertise the two RP addresses in the routing protocol

E.  

Use anycast RP based on MSDP peering between the two RPs

F.  

Control routing to the two RPs through a longest match prefix

Discussion 0
Questions 87

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

Options:

A.  

threat-centric protection

B.  

integrated actionable intelligence

C.  

distributed enforcement

D.  

central command and control

Discussion 0
Questions 88

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

Options:

A.  

Limit the query domain by use of distribute lists.

B.  

Build neighbor adjacencies in a triangulated fashion.

C.  

Build neighbor adjacencies in squared fashion.

D.  

Limit the query domain by use of summarization.

E.  

Limit the query domain by use of default routes.

Discussion 0
Questions 89

Which two descriptions of CWDM are true? (Choose two)

Options:

A.  

typically used over long distances, but requires optical amplification

B.  

uses the 850nm band

C.  

allows up to 32 optical earners to be multiplexed onto a single fiber

D.  

shares the same transmission window as DWDM

E.  

Passive CWDM devices require no electrical power

Discussion 0
Questions 90

Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network?

(Choose two)

Options:

A.  

BFD

B.  

Ti-LFA

C.  

minimal BGP scan time

D.  

MPLS-FRR

E.  

IGP fast hello

Discussion 0
Questions 91

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Options:

Discussion 0
Questions 92

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

Options:

A.  

Root guard

B.  

BPDU guard

C.  

Loop guard

D.  

BPDU filtering

Discussion 0
Questions 93

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services If one ISP suffers loss or latency?

Options:

A.  

Cloud onRamp gateway site

B.  

Cloud onRamp SWG

C.  

Cloud onRamp

D.  

Cloud onRamp SaaS

Discussion 0
Questions 94

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

Options:

A.  

fault management

B.  

accounting management

C.  

performance management

D.  

security management

Discussion 0
Questions 95

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection Which technology meets the updated requirements and can be incorporated into the design?

Options:

A.  

routed firewall

B.  

VLAN ACLs on the switch

C.  

transparent firewall

D.  

zone-based firewall on the Layer 3 device

Discussion 0
Questions 96

Which two design option are available to dynamically discover the RP in an IPv6 multicast network? (Choose

two)

Options:

A.  

embedded RP

B.  

MSDP

C.  

BSR

D.  

Auto-RP

E.  

MLD

Discussion 0
Questions 97

The network designer needs to use GLOP IP addresses in order to make them unique within their ASN Which multicast address range should be used?

Options:

A.  

232.0.0.0 to 232 255.255.255

B.  

H233.0.0 0 to 233.255.255 255

C.  

239000 to 239255255.255

D.  

224000 to 2240.0 255

Discussion 0
Questions 98

The General Bank of Greece plans to upgrade its legacy end-of-life WAN network with a new flexible, manageable, and scalable solution. The mam requirements are ZTP support, end-to-end encryption application awareness and segmentation. The CTO states that the main goal of the bank is CAPEX reduction. Which WAN technology should be used for the solution?

Options:

A.  

SD-branch

B.  

DMVPN with PfR

C.  

managed SD-WAN

D.  

SD-WAN

Discussion 0