cisco 400-007 practice test

cisco certified design expert v3.0

Last exam update: Dec 15 ,2024
Page 1 out of 24. Viewing questions 1-10 out of 240

Question 1

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two.)

  • A. strategic planning approach
  • B. business optimization approach
  • C. tactical planning approach
  • D. modular approach
  • E. cost optimization approach
Answer:

ac


Reference:
https://community.cisco.com/legacyfs/online/ccde_9781587144615_chapter1.pdf page 18

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

Which two characteristics are associated with 802.1s? (Choose two.)

  • A. 802.1s provides for faster convergence over 802.1D and PVST+
  • B. 802.1s is a Cisco enhancement to 802.1w
  • C. 802.1s supports up to 1024 instances of 802.1w
  • D. 802.1s maps multiple VLANs to the same spanning-tree instance
  • E. CPU and memory requirements are the highest of all spanning-tree STP implementations
Answer:

ad

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 3

Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?

  • A. fate sharing
  • B. OSPF LFA
  • C. flex links
  • D. STP
  • E. BFD
Answer:

e

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

A large enterprise cloud design team is evaluating different cloud consumption models. What is an example of typical PaaS limitations or concerns that should be considered during service design?

  • A. vendor lock-in
  • B. runtime issues
  • C. lack of control
  • D. multi-tenant security
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two.)

  • A. BEEP
  • B. MPP
  • C. DAI
  • D. IP Source Guard
  • E. CPPr
Answer:

cd


Reference:
https://www.ciscopress.com/articles/article.asp?p=2928193&seqNum=4

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 6

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?

  • A. fault management
  • B. accounting management
  • C. security management
  • D. performance management
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs. Which consideration supports the new business requirement?

  • A. VDI servers should be contained centrally within a DMZ.
  • B. VDI servers should be contained within dedicated VLANs in each branch location.
  • C. The WAN should offer low latency and be resized.
  • D. The thin client traffic should be placed in a WAN QoS priority queue.
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which parameter is the most important factor to consider when deciding service placement in a cloud solution?

  • A. data replication cost
  • B. security framework Implementation time
  • C. application structure
  • D. data confidentiality rules
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?

  • A. LDAP
  • B. EAP
  • C. TACACS+
  • D. RADIUS
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Data replication is being designed as part of a data protection setup to be run over the network. Which replication strategy is best suited when the primary and secondary systems are physically close to each other?

  • A. synchronous replication
  • B. snapshot replication
  • C. transactional replication
  • D. direct replication
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2