Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

400-007 Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Questions 4

A customer asks you to perform a high-level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via multipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

Options:

A.

EIGRP

B.

IS-IS

C.

OSPF

D.

BGP

Buy Now
Questions 5

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

Options:

A.

PortFast

B.

UDLD

C.

Root guard

D.

BPDU guard

Buy Now
Questions 6

Cost is often one of the motivators for a business to migrate from a traditional network to a software-defined network. Which design decision is directly influenced by CAPEX drivers?

Options:

A.

Scalability

B.

Stability

C.

Complexity

D.

Manageability

Buy Now
Questions 7

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP Path MTU Discovery be enabled. Which effect will this have on the network?

Options:

A.

It will enhance the performance of TCP-based applications.

B.

It will increase the convergence time.

C.

It will improve the convergence time.

D.

It will create a loop free path.

Buy Now
Questions 8

As a network designer, you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications. Which of the following design considerations will not impact design decision?

Options:

A.

Focus on the solution instead of the problem, which helps to reduce downtime duration

B.

The location of the data collection

C.

What direction the data or flows should be metered

D.

Identify traffic types and top talkers over this link

Buy Now
Questions 9

Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop-free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

Options:

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Buy Now
Questions 10

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

Options:

A.

Flow-based analysis to measure bandwidth mix of applications and their flows

B.

Call management analysis to identify network convergence-related failures

C.

Call management analysis to identify CAC failures and call quality issues

D.

Active monitoring via synthetic probes to measure loss, latency, and jitter

E.

Passive monitoring via synthetic probes to measure loss, latency, and jitter

F.

Flow-based analysis with PTP time-stamping to measure loss, latency, and jitter

Buy Now
Questions 11

What is a characteristic of a secure cloud architecture model?

Options:

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Buy Now
Questions 12

Network operators have many options available, from fully centralized to fully distributed control planes, and each approach has its own set of characteristics. Drag and drop the characteristics from the left onto the corresponding approach on the right.

Options:

Buy Now
Questions 13

What are two examples of components that are part of an SDN architecture? (Choose two.)

Options:

A.

Software plane

B.

Control plane

C.

Application plane

D.

Management plane

E.

Network plane

Buy Now
Questions 14

A business customer deploys workloads in the public cloud but now faces governance issues related to IT traffic flow and data security. Which action helps identify the issue for further resolution?

Options:

A.

Set up a secure tunnel from customer routers to protect traffic to cloud providers.

B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud providers.

C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic to cloud providers.

D.

Apply workload policies that dictate security requirements for cloud workloads.

Buy Now
Questions 15

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

Options:

Buy Now
Questions 16

A product manufacturing organization is integrating cloud services into their IT solution. The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step. This step defines the scope of IT, the application, and the service. What is one topic that should be considered in the Define Strategy step?

Options:

A.

Financial and governance models

B.

Innovate and align with business according to volume

C.

Due diligence and financial scenarios

D.

Contingency exit strategy steps

Buy Now
Questions 17

Drag and drop the multicast protocols from the left onto the current design situation on the right.

Options:

Buy Now
Questions 18

Which encoding format does Cisco IOS XE software support for NETCONF?

Options:

A.

It supports HTML encoding for NETCONF

B.

It supports YAML encoding for NETCONF

C.

It supports XML encoding for NETCONF

D.

It supports JSON encoding for NETCONF

Buy Now
Questions 19

Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?

Options:

A.

STP

B.

fate sharing

C.

OSPF LFA

D.

BFD

E.

flex links

Buy Now
Questions 20

Which aspect of BGP-LS makes it scalable in large networks when multiarea topology information must be gathered?

Options:

A.

Transmit flow control

B.

Open-loop flow control

C.

Hardware flow control

D.

TCP-based flow control

Buy Now
Questions 21

What best describes the difference between Automation and Orchestration?

Options:

A.

Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions.

B.

Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that require the network administrator to coordinate.

C.

Automation refers to an automatic process for completing multiple tasks with conditions and Orchestration refers to executing tasks in parallel.

D.

Automation refers to scripting languages (Python, Ansible etc.) and Orchestration refers to commercial products that control configuration deployment.

Buy Now
Questions 22

QUESTION 69 Refer to the exhibit. AJI links are P2P Layer 3. A high availability application is synchronizing data between host A and host B. To increase chance of delivery the same data is sent twice from host A on two different NICs toward the two NICs on host B.

Refer to the exhibit. All links are P2P Layer 3. A high availability application is synchronizing data between Host A and Host B. To increase the chance of delivery, the same data is sent twice from Host A on two different NICs toward the two NICs on Host B.

Which solution must be deployed in the network to ensure that any failure in the network does not trigger data loss on Host B?

Options:

A.

EIGRP with feasible successors

B.

BFD

C.

IP Fast Reroute

D.

Static routes

Buy Now
Questions 23

Which development model is closely associated with traditional project management?

Options:

A.

Static model

B.

Agile model

C.

Evolutionary delivery model

D.

Lifecycle model

Buy Now
Questions 24

Which two statements explain the operation of BFD asynchronous mode? (Choose two.)

Options:

A.

BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.

B.

BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.

C.

BFD asynchronous mode with and without echo packets use control packets.

D.

BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.

E.

BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Buy Now
Questions 25

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

Options:

A.

Control Plane Protection using queue thresholding on the transit subinterface

B.

Control Plane Protection using port filtering on the transit subinterface

C.

Control Plane Protection using port filtering on the main interface

D.

Control Plane Protection using queue thresholding on the host subinterface

E.

Control Plane Protection using port filtering on the host subinterface

Buy Now
Questions 26

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

Options:

A.

Threat-centric protection

B.

Integrated actionable intelligence

C.

Distributed enforcement

D.

Central command and control

Buy Now
Questions 27

Refer to the exhibit.

Refer to the exhibit. Two data center sites (X and Y) connect to the Internet and each other using a backdoor link. Both advertise the same IP prefix (100.75.10.0/23) to the Internet. Firewalls are behind R1 and R2.

Problem: When users attempt to reach 100.75.10.0/23, the return traffic is routed to Site-Y, regardless of where the session originated. This results in asymmetric traffic and potentially broken sessions due to firewall behavior.

Which design resolves the issue?

Options:

A.

Use BGP MED to influence Site-X return traffic. Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration. Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X. Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers. Have Site-X advertise an IP pool with a longer prefix.

Buy Now
Questions 28

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

Options:

A.

System-oriented architecture

B.

OSASE architecture

C.

Platform-oriented architecture

D.

SASE architecture

Buy Now
Questions 29

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network. Which network threat is SNMPv3 effective against?

Options:

A.

Man-in-the-middle attack

B.

Masquerade threats

C.

DDoS attack

D.

Brute force dictionary attack

Buy Now
Questions 30

Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two.)

Options:

A.

Small transactions (HTTP-like behavior)

B.

WRED drop treatment

C.

Tolerance to packet loss

D.

Intolerance to jitter

E.

TCP-based application

Buy Now
Questions 31

Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?

Options:

A.

Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value.

B.

Redistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the ext value and the value is the same in all ASBRs.

C.

Enable OSPF load-balancing over unequal cost path.

D.

Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external internal values.

Buy Now
Questions 32

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?

Options:

A.

Allow VoIP and the custom application to share the same priority queue.

B.

The custom application and VoIP must be assigned their own separate priority queue.

C.

Interleave the custom application with other TCP applications in the same CBWFQ.

D.

Avoid placing the custom application in a CBWFQ queue that contains other traffic.

Buy Now
Questions 33

A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?

Options:

A.

Fragmented packet with the do-not-fragment bit set

B.

IP packets with broadcast IP source addresses

C.

IP packets with the multicast IP source address

D.

IP packet with the multicast IP destination address

E.

IP packets with identical source and destination IP addresses

F.

IP packets with the destination IP address 0.0.0.0.

Buy Now
Questions 34

SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?

Options:

A.

TLS

B.

DTLS

C.

IPsec

D.

GRE

Buy Now
Questions 35

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

Options:

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

C.

Apply strong encryption for transmission of cardholder data across public networks.

D.

Protect all user systems against malware and frequently update antivirus software

E.

Maintain a policy that addresses information security for employees and third parties.

Buy Now
Questions 36

SDN emerged as a technology trend that attracted many industries to move from traditional networks to SDN. Which challenge is solved by SDN for cloud service providers?

Options:

A.

Need for intelligent traffic monitoring

B.

Exponential growth of resource-intensive applications

C.

Complex and distributed management flow

D.

Higher operating expense and capital expenditure

Buy Now
Questions 37

An Agile for Infrastructure transition often means dismantling traditional IT hierarchies and rebuilding it to align with business objectives and workflows. Organizations are seeing the benefits of using automation tools in the network such as faster, more efficient, and more effective delivery of products and services. Which two components help increase overall productivity and improve company culture? (Choose two.)

Options:

A.

Agile code practices

B.

Infrastructure-as-code

C.

Controlled infrastructure

D.

DevOps practices

E.

Dedicated infrastructure

Buy Now
Questions 38

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. Which activity should be completed each time a legacy network is migrated?

Options:

A.

The migrated VLAN should be pruned from the Layer 2 interconnects.

B.

The migrated network should have a VXLAN VNID configured within the new network.

C.

The migrated network should be advertised to the EVPN network as a Type 2 network.

D.

The migrated network should be added to the EVPN BGP routing.

Buy Now
Questions 39

Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever-increasing cybersecurity threats. To achieve this, federated identity services have been deployed to provide Single Sign-On and Multi-Factor Authentication. Which protocol can be used by Company XYZ to provide authentication and authorization services?

Options:

A.

OAuth2

B.

OpenID Connect

C.

OpenID

D.

SAML2.0

Buy Now
Questions 40

Company XYZ wants to prevent switch loops caused by unidirectional point-to-point link conditions on Rapid PVST+ and MST. Which technology can be used in the design to meet this requirement?

Options:

A.

STP BPDU Guard

B.

STP Bridge Assurance

C.

MSTP

D.

TRILL

Buy Now
Questions 41

Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

Options:

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Buy Now
Questions 42

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

Options:

A.

Partial mesh

B.

Full mesh

C.

Ring

D.

Squared

E.

Triangulated

Buy Now
Questions 43

If the desire is to connect virtual network functions together to accommodate different types of network service connectivity, what must be deployed?

Options:

A.

Bridging

B.

Service Chaining

C.

Linking

D.

Daisy Chaining

E.

Switching

Buy Now
Questions 44

What is the most important operational driver in building a resilient and secure modular network design?

Options:

A.

Dependencies on hardware or software that is difficult to scale

B.

Minimize app downtime

C.

Reduce the frequency of failures requiring human intervention

D.

Increase time spent on developing new features

Buy Now
Questions 45

Which statement about hot-potato routing architecture design is true?

Options:

A.

Hot-potato routing is the preferred architecture when connecting to content providers

B.

Hot-potato keeps traffic under the control of the network administrator for longer

C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric

D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks

Buy Now
Questions 46

You are designing the QoS policy for a company that is running many TCP-based applications. The company is experiencing tail drops for these applications. The company wants to use a congestion avoidance technique for these applications. Which QoS strategy can be used?

Options:

A.

Weighted fair queuing

B.

Weighted random early detection

C.

Low-latency queuing

D.

First-in first-out

Buy Now
Questions 47

What are two primary design constraints when a robust infrastructure solution is created? (Choose two.)

Options:

A.

Monitoring capabilities

B.

Project time frame

C.

Staff experience

D.

Component availability

E.

Total cost

Buy Now
Questions 48

Refer to the exhibit.

This network is running EIGRP as the routing protocol and the internal networks are being advertised in EIGRP. Based on the link speeds, all traffic between London and Rome is getting propagated via Barcelona and the direct link between London and Rome is not being utilized under normal working circumstances. The EIGRP design should allow for efficiency in the routing table by minimizing the routes being exchanged. The link between London and Rome should be utilized for specific routes. Which two steps accomplish this task? (Choose two.)

Options:

A.

Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes

B.

Filter the routes on the link between London and Barcelona

C.

Filter the routes on the link between London and Rome

D.

Configure route leaking of summary routes on the link between London and Rome

Buy Now
Questions 49

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. What is the final migration step after hosts have physically migrated to have traffic flowing through the new network without changing any host configuration?

Options:

A.

Shut down legacy Layer 3 SVIs, clear ARP caches on all hosts being migrated, and then configure the legacy VRRP address onto new VXLAN core switches

B.

Increase VRRP priorities on new infrastructure over legacy VRRP values, then shut down legacy SVIs

C.

Shut down legacy infrastructure to allow VXLAN gateways to become active

D.

Shut down legacy Layer 3 SVIs and activate new preconfigured Layer 3 SVIs on VXLAN

Buy Now
Questions 50

Which two mechanisms avoid suboptimal routing in a network with dynamic mutual redistribution between multiple OSPFv2 and EIGRP boundaries? (Choose two.)

Options:

A.

AD manipulation

B.

Matching OSPF external routes

C.

Route tagging

D.

Route filtering

E.

Matching EIGRP process ID

Buy Now
Questions 51

An architect prepares a network design for a startup company. The design must meet business requirements while the business grows and divests due to rapidly changing markets. What is the highest priority in this design?

Options:

A.

The network should be hierarchical.

B.

The network should be modular.

C.

The network should be scalable.

D.

The network should have a dedicated core.

Buy Now
Questions 52

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

Options:

A.

Geographically dispersed data centers with asynchronous replication

B.

A single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

Geographically dispersed data centers with synchronous replication

D.

A single data center with duplicated infrastructure and dual PSUs

Buy Now
Questions 53

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

Options:

A.

Wide area network

B.

Mobile network

C.

Metro network

D.

Application network

E.

Control network

Buy Now
Questions 54

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

Options:

A.

Local to global NAT translation is done after routing

B.

Global to local NAT translation is done before routing

C.

Local to global NAT translation is done before policy-based routing

D.

Global to local NAT translation is done after policy-based routing

Buy Now
Questions 55

Which two data plane hardening techniques are true? (Choose two)

Options:

A.

warning banners

B.

redundant AAA servers

C.

Control Plane Policing

D.

SNMPv3

E.

infrastructure ACLs

F.

disable unused services

G.

routing protocol authentication

Buy Now
Questions 56

Hybrid cloud computing allows organizations to take advantage of public and private cloud models. Which best practice should organizations follow to ensure data security in the private cloud?

Options:

A.

Use standard protocols for data transmission over the network.

B.

Encrypt data when it is at rest and in motion.

C.

Communicate all data security risks to customers and end users.

D.

Use standard network protocols for data communication between unsecured network connections.

Buy Now
Questions 57

What is a country-specific requirement that data is subject to the laws of the country in which it is collected or processed and must remain within its borders?

Options:

A.

Data sovereignty

B.

Data rationality

C.

Data inheritance

D.

Data replication

Buy Now
Questions 58

Refer to the exhibit.

A customer runs OSPF with Area 5 between its aggregation router and an internal router. When a network change occurs in the backbone, Area 5 starts having connectivity issues due to the SPF algorithm recalculating an abnormal number of times in Area 5. You are tasked to redesign this network to increase resiliency on the customer network with the caveat that Router B does not support the stub area. How can you accomplish this task?

Options:

A.

Increase the bandwidth on the connection between Router A and Router B

B.

Implement LSA filtering on the ABR, allowing summary routes and preventing more specific routes into Area 5

C.

Create a virtual link to Area 0 from Router B to the ABR

D.

Turn on LSA throttling on all devices in Area 5

E.

Set Area 5 to stubby at the ABR anyway

Buy Now
Questions 59

A multicast network is using Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Options:

A.

Use two phantom RP addresses

B.

Manipulate the administration distance of the unicast routes to the two RPs

C.

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.

Advertise the two RP addresses in the routing protocol

E.

Use anycast RP based on MSDP peering between the two RPs

F.

Control routing to the two RPs through a longest match prefix

Buy Now
Questions 60

Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?

Options:

A.

OSPF fast hellos

B.

BFD echo

C.

Change the protocol to BGP

D.

Change the OSPF hello and dead intervals

Buy Now
Questions 61

What are two examples of business goals to be considered when a network design is built? (Choose two.)

Options:

A.

standardize resiliency

B.

minimize operational costs

C.

integrate endpoint posture

D.

ensure faster obsolescence

E.

reduce complexity

Buy Now
Questions 62

Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?

Options:

A.

Use switch clustering in the access layer.

B.

Use switch clustering in the core/distribution layer.

C.

Use spanning-tree PortFast.

D.

Use BFD.

Buy Now
Questions 63

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two.)

Options:

A.

will only work with single-tier headend architecture

B.

hub sites must connect to both DMVPN clouds

C.

recommended for high availability

D.

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.

requires all sites to have dual Internet connections

Buy Now
Questions 64

What is a disadvantage of the traditional three-tier architecture model when east-west traffic between different pods must go through the distribution and core layers?

Options:

A.

Low bandwidth

B.

Security

C.

Scalability

D.

High latency

Buy Now
Questions 65

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

Options:

A.

Limit the query domain by use of distribute lists.

B.

Build neighbor adjacencies in a triangulated fashion.

C.

Build neighbor adjacencies in squared fashion.

D.

Limit the query domain by use of summarization.

E.

Limit the query domain by use of default routes.

Buy Now
Questions 66

Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two)

Options:

A.

DAI

B.

IP Source Guard

C.

BEEP

D.

CPPr

E.

MPP

Buy Now
Questions 67

What is a disadvantage of the traditional three-tier architecture model when east-west traffic between different pods must go through the distribution and core layers?

Options:

A.

Low bandwidth

B.

Security

C.

Scalability

D.

High latency

Buy Now
Questions 68

You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city. OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)

Options:

A.

Use a multipoint Metro-E service for router connections

B.

Use a single address per router for all P2P links

C.

Use P2P links between routers in a hub-and-spoke design

D.

Configure address aggregation at each site router

E.

Determine which OSPF routers will be DR/BDR

Buy Now
Questions 69

When planning their cloud migration journey, what is crucial for virtually all organizations to perform?

Options:

A.

SASE framework deployment

B.

Optimizing the WAN environment

C.

Assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Buy Now
Questions 70

Refer to the exhibit.

Company XYZ’s BGP topology is as shown in the diagram. The interface on the LA router connected toward the 10.1.5.0/24 network is faulty and is going up and down, which affects the entire routing domain. Which routing technique can be used in the routing policy design so that the rest of the network is not affected by the flapping issue?

Options:

A.

Use route dampening on LA router for the 10.1.5.0/24 network so that it does not get propagated when it flaps up and down

B.

Use route filtering on Chicago router to block the 10.1.5.0/24 network from coming in from the LA router

C.

Use route filtering on LA router to block the 10.1.5.0/24 network from getting propagated toward Chicago and New York

D.

Use route aggregation on LA router to summarize the 10.1.4.0/24, 10.1.5.0/24, 10.1.6.0/24, and 10.1.7.0/24 networks toward Chicago

Buy Now
Questions 71

A network engineering team is in the process of designing a lab network for a customer demonstration. The design engineer wants to show that the resiliency of the MPLS Traffic Engineering Fast Reroute solution has the same failover/failback times as a traditional SONET/SDH network (around 50 msec). In order to address both link failure and node failure within the lab topology network, which type of the MPLS TE tunnels must be considered for this demonstration?

Options:

A.

TE backup tunnel

B.

Next-hop (NHop) tunnel

C.

FRR Backup tunnel

D.

Next-next-hop (NNHop) tunnel

Buy Now
Questions 72

Which three Cisco products are used in conjunction with Red Hat to provide an NFVi solution? (Choose three.)

Options:

A.

Cisco Prime Service Catalog

B.

Cisco Open Virtual Switch

C.

Cisco Nexus switches

D.

Cisco UCS

E.

Cisco Open Container Platform

F.

Cisco Virtual Network Function

Buy Now
Questions 73

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

Options:

A.

data governance

B.

additional latency

C.

security

D.

cloud connectivity

Buy Now
Questions 74

Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbor relationships minimized on each segment and the LSDB size optimized. Which design can be used?

Options:

A.

Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area

B.

Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1

C.

Design the network so that all routers are Level 1 routers

D.

Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1

Buy Now
Questions 75

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection. Which technology meets the updated requirements and can be incorporated into the design?

Options:

A.

Routed firewall

B.

VLAN ACLs on the switch

C.

Transparent firewall

D.

Zone-based firewall on the Layer 3 device

Buy Now
Questions 76

An enterprise has identified these causes for inefficient CAPEX spending:

    CAPEX planning is driven by technology and not by business objectives.

    The CAPEX planning team lacks the data it needs to perform due diligence tasks.

    The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

Options:

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

B.

CxO-level staff must have a full technical understanding but they should not trust their technical leaders fully.

C.

Adopt new organizational models that promote real accountability for ROI, not just revenue, EBITDA, and cash.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Buy Now
Questions 77

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI data. Which type of security safeguard should be implemented to resolve this issue?

Options:

A.

technical and physical access control

B.

administrative security management processes

C.

physical device and media control

D.

technical integrity and transmission security

Buy Now
Questions 78

Which issue poses a challenge for security architects who want end-to-end visibility of their networks?

Options:

A.

Too many overlapping controls

B.

Too many disparate solutions and technology silos

C.

An overabundance of manual processes

D.

A network security skills shortage

Buy Now
Questions 79

When a company network architect is working on a new network design, they are expected to ensure that business requirements and technical aspects are factored in, but often there are other factors that come into play as well. Which non-business constraint must also be considered throughout the design phase?

Options:

A.

Location

B.

Cost

C.

Time

D.

Compliance

Buy Now
Questions 80

A network architect is designing a policy where database applications access the internet directly, while other traffic routes through the data center, with dynamic path switching based on performance. Which solution meets these requirements?

Options:

A.

MPLS L3VPN with QoS

B.

Cloud OnRamp for IaaS

C.

Cloud OnRamp for SaaS

D.

MPLS Direct Connect

Buy Now
Questions 81

The network designer needs to use GLOP IP addresses to make them unique within their ASN. Which multicast address range will be considered?

Options:

A.

239.0.0.0 to 239.255.255.255

B.

224.0.0.0 to 224.0.0.255

C.

233.0.0.0 to 233.255.255.255

D.

232.0.0.0 to 232.255.255.255

Buy Now
Questions 82

Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

Options:

A.

GRE

B.

MPLS

C.

VXLAN

D.

LISP

E.

CAPWAP

Buy Now
Questions 83

Which main IoT migration aspect should be reviewed for a manufacturing plant?

Options:

A.

Sensors

B.

Security

C.

Applications

D.

Wi-Fi Infrastructure

E.

Ethernet Switches

Buy Now
Questions 84

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

Options:

A.

confidential

B.

serviceability

C.

reliability

D.

availability

E.

integrity

F.

scalability

Buy Now
Questions 85

Refer to the exhibit.

Which impact of using three or more ABRs between the backbone area and area 1 is true?

Options:

A.

In a large-scale network LSA replication by all ABRs can cause serious scalability issues

B.

Multiple ABRs reduce the CPU processing on each ABR due to splitting prefix advertisement

C.

In a large-scale network multiple ABRs can create microloops

D.

Prefixes from the non-backbone area are advertised by one ABR to the backbone

Buy Now
Questions 86

A legacy enterprise is using a Service Provider MPLS network to connect its head office and branches. They want to extend the existing IP CCTV network to a new branch without routing changes or IP address changes. What is the best approach?

Options:

A.

GRE

B.

L2TPv3

C.

VXLAN

D.

EoMPLS

Buy Now
Questions 87

Which architecture does not require an explicit multicast signaling protocol, such as PIM or P2MP, to signal the multicast state hop-by-hop, but instead uses a link state protocol to advertise the multicast forwarding state?

Options:

A.

Binary indexed explicit routing

B.

Binary intermediate enhanced routing

C.

Bit indexed explicit replication

D.

Bi-directional implicit replication

Buy Now
Questions 88

Company XYZ wants to deploy OSPF. The design plan requires that two OSPF networks be mutually redistributed at multiple locations and ensure end-to-end connectivity to all of the company's networks. Which technology can be used to fulfill the requirements while avoiding the creation of routing loops?

Options:

A.

Create a virtual link between ASBRs.

B.

Change the router ID for both ASBRs.

C.

Redistribute routes as external type 2 routes.

D.

Use route maps on ASBRs to filter routes with tags so they are not redistributed.

Buy Now
Questions 89

A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?

Options:

A.

All device configurations are in read-only mode until the controller is restored.

B.

The control plane is unavailable until the controller is restored.

C.

If a device fails, the configuration backup is unavailable.

D.

Manual changes are only possible until the controller is restored.

Buy Now
Questions 90

You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

Options:

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Buy Now
Questions 91

VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to ensure successful deployment of VPLS?

Options:

A.

Flooding is necessary to propagate MAC address reachability information

B.

PE scalability

C.

The underlying transport mechanism

D.

VLAN scalability

Buy Now
Questions 92

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

Options:

A.

Device resiliency

B.

Device type

C.

Network type

D.

Network resiliency

E.

Network size

Buy Now
Questions 93

Company XYZ wants to redesign the Layer 2 part of their network to use all uplinks for increased performance, support host reachability with conversational learning, and avoid port-channels. Which other technique can be used?

Options:

A.

TRILL

B.

LISP

C.

MSTP

D.

Switch stack

Buy Now
Questions 94

You want to split an Ethernet domain in two.

Which parameter must be unique in this design to keep the two domains separated?

Options:

A.

VTP domain

B.

VTP password

C.

STP type

D.

VLAN ID

Buy Now
Questions 95

Which two foundational aspects of IoT are still evolving and being worked on by the industry at large? (Choose two)

Options:

A.

WiFi protocols

B.

Regulatory domains

C.

Low energy Bluetooth sensors

D.

IoT consortia

E.

Standards

Buy Now
Questions 96

Which two design options are available to dynamically discover the RP in an IPv6 multicast network? (Choose two)

Options:

A.

Embedded RP

B.

MSDP

C.

BSR

D.

Auto-RP

E.

MLD

Buy Now
Questions 97

Refer to the exhibit.

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

Options:

A.

community

B.

MED

C.

local preference

D.

AS path

Buy Now
Questions 98

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two.)

Options:

A.

If overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic. However, the intermediate system can still forward Level 1 traffic.

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems.

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems.

Buy Now
Questions 99

Router R1 is a BGP speaker with one peering neighbor over link "A". When link "A" fails, routing announcements are terminated, which results in the tearing down of the state for all BGP routes at each end of the link. What is this a good example of?

Options:

A.

Fault isolation

B.

Resiliency

C.

Redundancy

D.

Fate sharing

Buy Now
Questions 100

Company XYZ branch offices connect to headquarters using two links, MPLS and Internet. The company wants to design traffic flow so voice traffic uses MPLS and all other traffic uses either link, avoiding process switching. Which technique can be used?

Options:

A.

Policy-based routing

B.

Virtual links

C.

Visualization

D.

Floating static route

Buy Now
Questions 101

A software-defined networking (SDN) controller learns network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers. Each policy is represented as a RIB entry in the control plane of the router. Which SDN model has been implemented?

Options:

A.

SDN centralized

B.

SDN traffic engineering

C.

SD-WAN

D.

SDN hybrid

Buy Now
Questions 102

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers to aid a large-scale migration project. The migration is estimated to take 20 months to complete but might extend an additional 10 months if issues arise. All connectivity options meet the requirements to migrate workloads. Which transport technology provides the best ROI based on cost and flexibility?

Options:

A.

CWDM over dark fiber

B.

MPLS

C.

DWDM over dark fiber

D.

Metro Ethernet

Buy Now
Questions 103

What are two design constraints in a standard spine and leaf architecture? (Choose two.)

Options:

A.

Spine switches can connect to each other.

B.

Each spine switch must connect to every leaf switch.

C.

Leaf switches must connect to each other.

D.

Endpoints connect only to the spine switches.

E.

Each leaf switch must connect to every spine switch.

Buy Now
Questions 104

Company XYZ has two routing domains (EIGRP and OSPF). They want full reachability and need OSPF to see link costs added to external routes. How must redistribution be designed?

Options:

A.

Redistribute using metric type 2 into OSPF.

B.

Redistribute using metric type 1 into OSPF.

C.

Redistribute using metric type 1 into EIGRP.

D.

Redistribute using metric type 2 into EIGRP.

Buy Now
Exam Code: 400-007
Exam Name: Cisco Certified Design Expert (CCDE v3.1)
Last Update: Aug 17, 2025
Questions: 349
400-007 pdf

400-007 PDF

$139.65  $399
400-007 Engine

400-007 Testing Engine

$157.15  $449
400-007 PDF + Engine

400-007 PDF + Testing Engine

$209.65  $599