Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 400-007 Cisco Certified Design Expert (CCDE v3.1) Exam Practice Test

Page: 1 / 21
Total 206 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 1

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

Options:

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Question 2

Which service abstracts away the management of the operating system, middleware, and runtime?

Options:

A.

PaaS

B.

MaaS

C.

laaS

D.

SaaS

Question 3

While positive feedback loops generally don ' t last long enough to bring down a network completely, they can still last long enough to disrupt traffic flows or to cause the network to converge more slowly than it should.

What are two examples of cases where a positive feedback loop can be long-lived and devastating to the network ' s control plane? (Choose two)

Options:

A.

During redistribution of reachability information between multiple control planes

B.

Modifying the flow of traffic through the network by steering traffic based on QoS attributes

C.

When input traffic volumes on an interfaces causes the interface queue to overflow.

D.

The rate at which the information earned in the various control plane protocols changes

E.

When more paths available in any given routing process than are installed in the routing table

Question 4

A customer has a functional requirement that states HR systems within a data center must be segmented from other systems that reside in the same data center and same VLAN The systems run legacy applications by using hard-coded IP addresses with all HR systems dedicated to 129 to 254 of the 10 20.20 0/24 prefix Which segmentation method is optimal for the customer?

Options:

A.

transparent firewalling

B.

VACLs on data center switches

C.

routed firewalls

D.

data center perimeter firewalling

Question 5

PaaS provides a cloud-based platform for developing, running, managing applications. Users access the PaaS through a GUI, where development or DevOps teams can collaborate on all their work across the entire application lifecycle including coding, integration, testing, delivery, deployment, and feedback. Which benefit does an organization get by using PaaS?

Options:

A.

improved access

B.

comprehensive security

C.

improved responsiveness

D.

faster time to market

Question 6

Which two compliance audit functions are useful to meet business requirements? (Choose two.)

Options:

A.

risk prevention

B.

advise auditing

C.

audit monitoring

D.

risk identification audit resolution

Question 7

The SD-WAN architecture is composed of separate orchestration management, control, and data planes Which activity happens at the orchestration plane?

Options:

A.

packet forwarding

B.

central configuration and monitoring

C.

automatic onboarding of the SD-WAN routers into the SD-WAN overlay

D.

decision-making process on where traffic flows

Question 8

A large defense organization is planning their cloud migration journey, but they have high data sovereignty concerns, major regulation or compliance requirements, and very restrictive SLAs. Which cloud architecture model can be adopted?

Options:

A.

public cloud

B.

hybrid cloud

C.

private cloud

D.

PaaS

E.

laaS

Question 9

As a service provider is implementing Strong Access Control Measures, which two of the following PCI Data Security Standard requirements must be met? (Choose two . )

Options:

A.

Assign a unique ID to each person with computer access

B.

Restrict access to cardholder data to on a need-to-know basis

C.

Encrypt transmission of cardholder data across open or public networks

D.

Each location must require validating PCI compliance if business has multiple locations

E.

Protect stored cardholder data

Question 10

A customer migrates from a traditional Layer 2 data center network Into a new SDN- based, spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. Which activity should be completed each time a legacy network is migrated?

Options:

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Question 11

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Question # 11

Options:

Question 12

As more links are added to the network, information and attributes related to the link is added to the control plane, meaning every link that gets added will slow down the convergence of the control plane by some measurable amount of time As a result when additional redundancy is built or added the MTTR will increase too Which risk increases along with the increased MTTR?

Options:

A.

management visibility

B.

slower data plane convergence

C.

overlapping outages

D.

topology change detection

Question 13

Company XYZ was not satisfied with the reconvergence time OSPF is taking BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge Which technology will improve the design?

Options:

A.

OSPF fast hellos

B.

BFD echo

C.

Change the protocol to BGP

D.

Change the OSPF hello and dead intervals

Question 14

monitoring solution, an organization wants to ensure they can collect feedback from network devices, particularly with a focus on being able to perform anomaly detection and automatically react to these events as they come m A key requirement is that the resources required to collect the data must be distributed Which data reporting approach is good fit for this use case?

Options:

A.

model-driven monitoring

B.

pull-based methodology

C.

data-flow monitoring

D.

streaming tele

Question 15

Which development model is closely associated with Agile project management?

Options:

A.

static model

B.

evolutionary delivery model

C.

lifecycle model

D.

starfish model

Question 16

In a distributed cloud-native environment, calls to services and cloud resources can fail caused by unanticipated events that will require longer periods of time to resolve. These faults can range in severity from a partial loss of connectivity to the complete failure of a service. In these situations, it ' s pointless for an application to continually retry an operation that is unlikely to succeed. Which pattern can prevent an application from repeatedly trying to execute an operation that ' s likely to fail?

Options:

A.

circuit breaker

B.

bulkhead

C.

fallback

D.

timeout

Question 17

Following a series of security incidents, where hackers have been able to successfully gain access to the network with varying levels of access, the CTO of a large corporation has launched an initiative to ensure that there is end-to-end visibility inside the corporate network Which two technologies are relevant to include in the analysis that is started as part of the initiative? (Choose two.)

Options:

A.

NETCONF

B.

Openflow

C.

RSPAN

D.

Floodlight

E.

IPFIX

Question 18

A bank recently had their security compromised during an initial key exchange between devices using a symmetric cryptography algorithm, and as a result the key was revealed/leaked. Going forward, they want to ensure that key exchanges are performed using asymmetric cryptography algorithms. Which algorithm offers the desired functionality?

Options:

A.

AES

B.

RSA

C.

RC4

D.

Diffie-Hellman

Question 19

Company XYZ network runs IPv4 and IPv6 and they want to Introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

Options:

A.

BIDIR-PIM

B.

PIM-SM

C.

PIM-SSM

D.

PIM-DM

Question 20

A business wants to refresh its legacy Frame Relay WAN It currently has product specialists in each of its 200 branches but plans to reduce and consolidate resources. The goal is to have product specialists available via video link when customers visit the nationwide branch offices Which technology should be used to meet this objective?

Options:

A.

DMVPN phase 1 network over the Internet

B.

Layer 3 MPLS VPN hub and spoke

C.

Layer 2 VPLS

D.

Layer 3 MPLS VPN full mesh

Question 21

Drag and drop the high-level descriptions of network automation and network orchestration on the left to the corresponding category on the right in no particular order.

Question # 21

Options:

Question 22

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Question # 22

Options:

Question 23

Question # 23

Refer to the exhibit. A company is running their data center based on VXLAN and BGP EVPN with stretched subnets for servers attaching to the edge devices being an important feature. The security team has defined a requirement where server group A must not be able to communicate with each other but is allowed to communicate with server group B. while servers in Group B must be able to communicate with all servers. Which scalable solution can be deployed to support these requirements?

Options:

A.

VACL

B.

VRF with route leaking

C.

private VLAN

D.

transparent firewall

Question 24

Company XYZ wants to implement an IPS device to detect and block well-known attacks against their network They want a design solution where all packets that are forwarded to the network are checked against a signature database before being allowed through This check must be done with the minimum effect on performance Which design is recommended?

Options:

A.

Deploy an IPS behind the firewall in in-line mode.

B.

Deploy an IPS in front of the firewall in in-line mode.

C.

Deploy an IPS behind the firewall in promiscuous mode.

D.

Deploy an IPS in front of the firewall in promiscuous mode.

Question 25

To provide network resilience organizations need to adopt a holistic approach that includes several key practices and technologies What are two effective ways to enhance network resilience by providing backup and alternative options to maintain network functionality?

Options:

A.

scalability

B.

flexibility

C.

recovery

D.

diversity

E.

redundancy

Question 26

In the wake of a security compromise incident where the internal networks were breached by an outside attacker at the perimeter of the infrastructure, an enterprise is now evaluating potential measures that can help protect against the same type of incident in the future. What are two design options that can be employed? (Choose two)

Options:

A.

microzoning

B.

segmentation

C.

domain fencing

D.

virtualization

E.

microperimeters

Question 27

Compared to data plane traffic, control plane traffic is relatively small in volume, but these flows are critical to the overall functioning of the network infrastructure and to voice and video endpoint well. When designing a QoS policy for a network, which two actions for the network control service-class is recommended? (Choose two)

Options:

A.

A moderately provisioned guaranteed-bandwidth queue can be assigned

B.

Traffic in this class needs to carry a CS6 DSCP marking.

C.

Place the traffic in the same queue as other signalling traffic.

D.

Network control traffic may be assigned a moderately provisioned shared queue

E.

WRED must be enabled on the class to avoid traffic being dropped

Question 28

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

Options:

A.

integrated actionable intelligence

B.

distributed enforcement

C.

threat-centric protection

D.

central command and control

Question 29

What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)

Options:

A.

monitoring capabilities

B.

project time frame

C.

staff experience

D.

component availability

E.

total cost

Question 30

A company with an existing multivendor network is moving from 1 G dark fiber to an ISP virtual leased-line solution The company ' s internal security policy states that any traffic traversing a network that is not owned by the company must be encrypted What must be used to meet the requirements?

Options:

A.

IPsec AH

B.

Dynamic Multipoint VPN tunnel

C.

IPsec ESP

D.

GETVPN tunnel

Question 31

An enterprise SDWAN customer based in the US has several branches in Europe Currently branches use the HQ in the US to access both internal and external services over an MPLS arcuit The design team has been tasked to suggest a solution allowing branches to access their cloud-based office productivity tools and services directly Since all their applications and services are hosted in the cloud, the design team has also been asked to come up with a solution, so branches can connect to the cloud directly from the branch as well Which two cost-effective and optimized solutions can be suggested? (Choose two)

cloud onRamp (SaaS)

Options:

A.

DIA

B.

software-defined cloud interconnects

C.

cloud SSO broker

D.

cloud hubs

Question 32

What are two advantages of the Agile project management methodology? (Choose two)

Options:

A.

brief but detailed feedback loops

B.

extensive documentation

C.

well-detailed and reliable budget estimates

D.

creation of shippable enhancements

E.

tight and rigid model

Question 33

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

Options:

A.

asynchronous replication over geographically dispersed dual data centers via CWDM

B.

synchronous replication over dual data centers via Metro Ethernet

C.

asynchronous replication over dual data centers via DWDM

D.

synchronous replication over geographically dispersed dual data centers via MPLS

Question 34

risk is a major determining factor in whether a company chooses to go with a public cloud, a private, or a hybrid of both. what are two factors that impact the decision on which cloud service placement model to use? (choose two)

Options:

A.

cross zone redundancy

B.

regulation

C.

organization skills

D.

legacy architectures

E.

data ownership

Question 35

The Enterprise Edge infrastructure modules aggregate the connectivity from the various elements outside the campus—using various services and WAN technologies as needed typicaly provisioned from service providers and route the traffic into the Campus Core layer The Enterprise Edge modules perform security functions when enterprise resources connect across public networks and the internet Drag and drop the network device types from the left onto the corresponding modules on the right Not all options are used

Question # 35

Options:

Question 36

A multinational enterprise integrates a cloud solution with these objectives

Achieve seamless connectivity across different countries and regions

Extend data center and private clouds into public clouds and provider-hosted clouds

What are two outcomes of deploying data centers and fabrics that interconnect different cloud networks? (Choose two)

Options:

A.

Enhanced security

B.

Data and network ownership

C.

Ability to place workloads across clouds

D.

Centralized visibility

E.

Unidirectional workload mobility across the cloud

Question 37

Which two elements are key in strategic network design and planning?

Options:

A.

customer requirements

B.

network distribution

C.

business strategy

D.

production delivery

E.

demand and supply ratio

Question 38

A consultant needs to explain different project management methodologies to a customer.

Drag and drop the characteristics from the left onto the corresponding methodologies on the right in no particular order.

Question # 38

Options:

Question 39

Enterprise XYZ wants to implement fast convergence on their network and optimize timers for OSPF However they also want to prevent excess flooding of ISAs if there is a constantly flapping link on the network Which timers can help prevent excess flooding of LSAs for OSPF?

Options:

A.

OSPF throttling timers

B.

OSPF delay timer

C.

MPS OSPF flooding timers

D.

OSPF propagation timers

Question 40

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Options:

A.

Advertise the two RP addresses in the routing protocol.

B.

Use two phantom RP addresses.

C.

Control routing to the two RPs through a longest match prefix.

D.

Manipulate the administrative distance of the unicast routes to the two RPs.

E.

Manipulate the multicast routing table by creating static mroutes to the two RPs.

F.

Use Anycast RP based on MSDP peering between the two RPs.

Question 41

Question # 41

Refer to the exhibit. An architect has been tasked to design an ISIS solution for a medium-size financial customer. The resulting design must meet these requirements:

Question # 41

Which two ISIS design aspects must be included? (Choose two.)

Options:

A.

Region-A and Region-B major routers establish passive ISIS peering with HQ router.

B.

Branch site routers and major site routers establish L2 adjacency.

C.

Region-A and Region-B major routers advertise a default route toward the other region.

D.

Different ISIS instances on HQ router to separate Region-A and Region-B.

E.

Branch site routers establish L1 adjacencies and major site routers establish L1/L2 adjacencies.

Question 42

Drag and drop the right functional descriptions from the left onto the corresponding protocols on the right.

Question # 42

Options:

Question 43

Refer to the table. A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

Options:

A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Question 44

Refer to the exhibit. This network is running legacy STP 802.1 d. Assuming " hello_timer " is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

Options:

A.

The transit_delay = 5 and bpdu_delay = 20 are recommended values, considering hello_timer = 2 and specified diameter.

B.

Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802.1d to speed up STP convergence process.

C.

The max_age and forward_delay parameters can be adjusted to speed up STP convergence process.

D.

Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

Question 45

Scalability is a desirable attribute of a network, system, or process Poor scalability can result in poor system performance, necessitating the reengineering or duplication of systems Load scalability is the ability of a system to perform gracefully as traffic increases Which two problems can occur due to poor load scalability design? (Choose two )

Options:

A.

cannot fully take advantage of parallelism

B.

algorithmically intolerable

C.

limited size of a data structure

D.

repeatedly engaging in wasteful activity

E.

redundant message logging

Question 46

By monitoring the effects of the design variations, you can characterize the relative resilience of the design. Which method involves disturbing the network by removing an active interface and monitoring how the change is handled by the network?

Options:

A.

randomized configuration

B.

nondeterministic analysis

C.

failover testing

D.

passive monitoring

Question 47

Company XYZ has two routing domains in their network, EIGRP and OSPF. The company wants to provide full reachability between the two domains by implementing redistribution on a router running both protocols They need to design the redistribution in a way that the OSPF routers will see link costs added to external routes. How must the redistribution strategy be designed for this network?

Options:

A.

Redistributed using metric type 2 into OSPF

B.

Redistribute using metric type 1 into EIGRP

C.

Redistribute using metric type 1 into OSPF

D.

Redistribute using metric type 2 into EIGRP

Question 48

Drag t he components that are part of the CIA triad to the correct target on the right. Not all components are used.

Question # 48

Options:

Question 49

Implementing a network automation architecture usually follows a phased approach that increases automation as the new technology and processes in the preceding phases are integrated and adopted. What provides a model that greatly simplifies the interaction with network devices?

Options:

A.

vendor specific configuration

B.

network device migration

C.

abstraction layer

D.

CI/CD framework

Question 50

A product manufacturing organization is integrating cloud services into their IT solution The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step This step defines the scope of IT. the application, and the service. What is one topic that should be considered in the Define Strategy step?

Options:

A.

due diligence and financial scenarios

B.

innovate and align with business according to volume

C.

financial and governance models

D.

contingency exit strategy steps

Question 51

Most security monitoring systems use a signature-based approach to detect threats. In which two instances are systems based on Network Behavior Anomaly Detection better than signature-based systems when it comes to detecting security threat vectors? (Choose two.)

Options:

A.

encrypted threat traffic

B.

spyware detection

C.

malware detection

D.

new zero-day attacks

E.

intrusion threat detection

Question 52

Question # 52

Refer to the exhibit A customer network design team is planning a migration from a legacy TDM-based L2VPN to an MPLS-based L3VPN Migration is planned in a phased approach:

•OSPF backbone Link between HUB A and HUB B sites to be migrated to eBGP

•Spoke A2 and Spoke B1 will be migrated to the L3VPN

Which solution design can be considered to avoid routing loops during backbone link migration

Options:

A.

Enable route-filtering on OSPF backbone routers for spoke traffic

B.

Advertise low AD value for transit traffic on hub sites

C.

OSPF backbone area advertises summarized routes to hub.

D.

Redistribute EIGRP 200 and 300 with low cost into BGP

Question 53

Flexibility, scalability, resiliency, and security are all chrematistics of a services-ready network An architecture featuring a modular design enables technologies and services to be added when the organization is ready to deploy. Drag and drop the design considerations on the left to the to type of service on the right Not all options are used

Question # 53

Options:

Question 54

What is the most important operational driver when building a resilient and secure modular network design?

Options:

A.

Reduce the frequency of failures requiring human intervention

B.

Minimize app downtime

C.

Increase time spent on developing new features

D.

Dependencies on hardware or software that is difficult to scale

Question 55

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

Options:

A.

control network

B.

mobile network

C.

metro network

D.

application network

E.

wide area network

Question 56

A well-executed network design provides improved performance and efficiency, increased security, and reduced downtime and support costs Which feature helps to achieve resilience in the network?

Options:

A.

automatically reroute traffic or restart services

B.

implementing layers of protection

C.

optimizing your network traffic

D.

setting up adequate user permissions

Question 57

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

Options:

A.

multicast source registration to the RP

B.

multicast client registration to the RP

C.

first-hop router registration to the RP

D.

transport of all IPv6 multicast traffic

Question 58

Which two network design considerations improve the maximum link utilization? (Choose two)

Options:

A.

centralizing the decision-making process

B.

channelizing the traffic at the receivers

C.

decentralizing the classes of traffic

D.

programmatically rate-limiting traffic at the senders

E.

differentiating the path calculation

Question 59

Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure Which technique can be Implemented In the design to detect such a failure in a subsecond?

Options:

A.

STP

B.

fate sharing

C.

OSPF BFD

D.

flex links

Question 60

As part of a design solution a consultant needs to describe the trade-offs between different SDN models Drag the characteristics on the left to the correct controller-based network designs on the right in no particular order.

Question # 60

Options:

Question 61

Software-defined network and traditional networks might appear the same to the end-user, but behind the scenes, each has unique sets of characteristics. Drag and drop these characteristic found on the left to the corresponding category on the right in no particular order?

Question # 61

Options:

Page: 1 / 21
Total 206 questions