Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 400-007 Practice Exam with Questions & Answers | Set: 11

Questions 101

A network hacker introduces a packet with duplicate sequence numbers to disrupt an IPsec session. During this, high-priority traffic is transmitted. What design parameter helps mitigate this?

Options:
A.

Classify and mark duplicate sequence packets

B.

Apply anti-replay window 4096

C.

Restrict keyword in IPsec tunnel

D.

Increase QoS shape policy

Cisco 400-007 Premium Access
Questions 102

An Agile for Infrastructure transition often means dismantling traditional IT hierarchies and rebuilding it to align with business objectives and workflows. Organizations are seeing the benefits of using automation tools in the network such as faster, more efficient, and more effective delivery of products and services. Which two components help increase overall productivity and improve company culture? (Choose two.)

Options:
A.

Agile code practices

B.

Infrastructure-as-code

C.

Controlled infrastructure

D.

DevOps practices

E.

Dedicated infrastructure

Questions 103

An enterprise requires MPLS-connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services if one ISP suffers loss or latency?

Options:
A.

Cloud onRamp gateway site

B.

Cloud onRamp SWG

C.

Cloud onRamp

D.

Cloud onRamp SaaS

Questions 104

What are two key design principles when using a hierarchical core-distribution-access network model? (Choose two.)

Options:
A.

A hierarchical network design model aids fault isolation

B.

The core layer is designed first, followed by the distribution layer and then the access layer

C.

The core layer provides server access in a small campus

D.

A hierarchical network design facilitates changes

E.

The core layer controls access to resources for security