Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 400-007 Practice Exam with Questions & Answers | Set: 8

Questions 71

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two.)

Options:
A.

If overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic. However, the intermediate system can still forward Level 1 traffic.

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems.

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems.

Cisco 400-007 Premium Access
Questions 72

Drag and drop the characteristics from the left onto the corresponding network management options on the right.

400-007 Question 72

Options:
Questions 73

In a redundant hub-and-spoke design with inter-spoke links, load oscillation and routing instability occur due to overload conditions. Which two design changes improve resiliency? (Choose two)

Options:
A.

Increase the number of redundant paths considered during the routing convergence calculation

B.

Eliminate links between every spoke

C.

Increase routing protocol convergence timers

D.

Increase unequal-cost parallel paths

E.

Use two links to each remote site instead of one

Questions 74

Refer to the table.

400-007 Question 74

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

Options:
A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Questions 75

Which methodology is the leading lifecycle approach to network design and implementation?

Options:
A.

PPDIOO

B.

Waterfall model

C.

Spiral model

D.

V model

Questions 76

What is a web-based model in which a third-party provider hosts applications that are available to customers over the Internet?

Options:
A.

PaaS

B.

SaaS

C.

IaaS

D.

WaaS

Questions 77

You are a network designer and you must ensure that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?

Options:
A.

ACL-based forwarding

B.

Unicast RPF loose mode

C.

Unicast RPF strict mode

D.

ACL filtering by destination

Questions 78

Refer to the exhibit.

400-007 Question 78

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

Options:
A.

community

B.

MED

C.

local preference

D.

AS path

Questions 79

What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)

Options:
A.

Monitoring capabilities

B.

Project time frame

C.

Staff experience

D.

Component availability

E.

Total cost

Questions 80

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

Options:
A.

Control Plane Protection host subinterface

B.

Control Plane Protection main interface

C.

Control Plane Protection transit subinterface

D.

Control Plane Protection CEF-exception subinterface