cisco 400-007 practice test

cisco certified design expert v3.0

Last exam update: Sep 01 ,2024
Page 1 out of 24. Viewing questions 1-10 out of 240

Question 1

Company XYZ has a new network based on IPv6. Some of the subnets that they are planning to use will be confidential and need an addressing scheme that confines them to the local campus network. Which type of IPv6 addresses can be used for these networks in the IPv6 addressing design?

  • A. link-local addresses
  • B. private addresses
  • C. unique local addresses
  • D. local addresses
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%

Reference:
https://study-ccna.com/ipv6-unique-local-addresses/

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Your company implemented LFA in the network to help with fast convergence in case a failure occurs on the network. However, while the network is being tested to confirm that LFA is working properly, the test set starts receiving TTL expired in transit messages for a limited amount of time. What is the cause of these messages?

  • A. recursion
  • B. flooding of packets
  • C. microloops
  • D. interface dampening
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Data replication is being designed as part of a data protection setup to be run over the network. Which replication strategy is best suited when the primary and secondary systems are physically close to each other?

  • A. synchronous replication
  • B. snapshot replication
  • C. transactional replication
  • D. direct replication
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?

  • A. Manual changes are only possible until the controller is restored
  • B. All device configurations are in read-only mode until the controller is restored
  • C. The control plane is unavailable until the controller is restored
  • D. If a device fails, the configuration backup is unavailable
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

DRAG DROP Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.
Select and Place:

Answer:

Discussions
0 / 1000

Question 6

A multicast network is using Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two.)

  • A. Advertise the two RP addresses in the routing protocol.
  • B. Use two phantom RP addresses.
  • C. Manipulate the multicast routing table by creating static mroutes to the two RPs.
  • D. Control routing to the two RPs through a longest match prefix.
  • E. Use Anycast RP based on MSDP peering between the two RPs.
  • F. Manipulate the administrative distance of the unicast routes to the two RPs.
Answer:

bc

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%

None

Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 7

Which two technologies enable multilayer segmentation? (Choose two.)

  • A. firewalls
  • B. data plane markings
  • C. filter lists
  • D. segment routing
  • E. policy-based routing
Answer:

bd

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%

None

Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

  • A. Evaluate bandwidth utilization and connection quality
  • B. Enable special requirements such as direct DID lines on pickup
  • C. Make recommendations to limit the size of the half-open session table on routers
  • D. Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A customer migrates from a traditional Layer 2 data center network into a new SDN-based, spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. What is the final migration step, after hosts have physically migrated, to have traffic flowing through the new network without changing any host configuration?

  • A. Increase VRRP priorities on new infrastructure over legacy VRRP values, then shut down legacy SVIs.
  • B. Shut down legacy Layer 3 SVIs and activate new preconfigured Layer 3 SVIs on VXLAN.
  • C. Shut down legacy infrastructure to allow VXLAN gateways to become active.
  • D. Shut down legacy Layer 3 SVIs, clear ARP caches on all hosts being migrated, and then configure the legacy VRRP address onto new VXLAN core switches.
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which parameter is the most important factor to consider when deciding service placement in a cloud solution?

  • A. data replication cost
  • B. security framework Implementation time
  • C. application structure
  • D. data confidentiality rules
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%

None

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2