Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 400-007 Practice Exam with Questions & Answers | Set: 3

Questions 21

When a traditional network is transformed to a hierarchical network, the state information in the control plane is reduced so that changes in one area of the network do not result in changes in the routing table on devices half-way around the globe What is a potential trade off in these cases?

Options:
A.

suboptimal use of available resources

B.

vertical split of failure domains

C.

horizontal split of failure domains

D.

increased routing table size

Cisco 400-007 Premium Access
Questions 22

400-007 Question 22

Refer to the exhibit After a network audit a network engineer must optimize the current network convergence time The proposed solution must consider link layer and control plane failures Which solution meets the requirements?

Options:
A.

Configure denounce timers

B.

Increase fast hello timers.

C.

Implement BFD

D.

Enable LSP fast flood

Questions 23

Network designers often segment networks by creating modules for various reasons Sometimes however a network can be unintentionally segmented For instance, if the only way to connect a remote site to a headquarters or regional site is to connect them both to the public Internet the corporate network is now unintentionally segmented Which of the following option can be used to desegment the network in this situation?

Options:
A.

Build virtual networks that pass over the network

B.

Mark traffic for special handling through quality of service

C.

Configure little to no control data plane policy

D.

Block specific sources from reaching specific destinations

Questions 24

During initial preparations to deploy 802 1x for wired access to their network, a company must ensure that the solution complies with existing internal security policies These policies mandate that every Auth C/Auth Z request must be protected by a tunnel which authenticates both server and clients using their PKI AI the same time, the user authentication phase must be independent of the tunnel Which scheme meets the requirements?

Options:
A.

EAP-MDS

B.

EAP-Fast

C.

EAP-MSCHAPv2

D.

PEAP

Questions 25

Which undesired effect of increasing the jitter compensation buffer is true?

Options:
A.

The overall transport jitter decreases and quality improves

B.

The overall transport jitter increases and quality issues can occur.

C.

The overall transport delay increases and quality issues can occur.

D.

The overall transport delay decreases and quality improves.

Questions 26

Which two factors must be considered while calculating the RTO? (Choose two . )

Options:
A.

Cost of lost data and operations

B.

how often backups are taken and how quickly these can be restored

C.

importance and priority of individual systems

D.

maximum tolerable amount of data loss that the organization can sustain

E.

steps needed to mitigate or recover from a disaster

Questions 27

What are three examples of solution components of the network infrastructure that help enforce security policy compliance on all devices as they seek to access the network and computing resources, thereby limiting damage from emerging security threats such as viruses, worms, and spyware? (Choose three)

Options:
A.

posture agent

B.

network access devices

C.

endpoint security application

D.

management and reporting tools

E.

web filtering devices

F.

audit and decision point servers

Questions 28

Company XYZ Is running a redundant private WAN network using OSPF as the underlay protocol The current design accommodates for redundancy In the network, but it Is taking over 30 seconds for the network to reconverge upon failure Which technique can be Implemented In the design to detect such a failure in a subsecond?

Options:
A.

STP

B.

fate sharing

C.

OSPF BFD

D.

flex links

Questions 29

As part of a design solution a consultant needs to describe the trade-offs between different SDN models Drag the characteristics on the left to the correct controller-based network designs on the right in no particular order.

400-007 Question 29

Options:
Questions 30

A networking team needs to prevent spoofing attacks They are describing the different uRPF design use cases so they can identify and deploy the optimal mode in various parts of their network

Drag and drop the use cases from the left onto the corresponding uRPF technique on the right Not all options are used

400-007 Question 30

Options:
Exam Code: 400-007
Certification Provider: Cisco
Exam Name: Cisco Certified Design Expert (CCDE v3.1)
Last Update: Apr 7, 2026
Questions: 206