Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

400-007 Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Questions 4

Refer to the exhibit.

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500.Traffic destined to AS 111 network 91 7 0.0/16 should come in via AS 100. while traffic destined to all other networks in AS 111 should continue to use the existing path Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 Into the 91.7.0.0/16 network?

Options:

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.

B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.

C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.

D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91. 7.0.0/16 network.

Buy Now
Questions 5

Which two features describe controller-based networking solutions compared to traditional networking solutions? (Choose two.)

Options:

A.

inflate licensing costs

B.

reduce network configuration complexity

C.

provide centralization of primary IT functions

D.

allow for fewer network failures

E.

increase network bandwidth usage

Buy Now
Questions 6

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

Options:

A.

Local to global NAT translation is done after routing

B.

Global to local NAT translation is done before routing.

C.

Local to global NAT translation is done before policy-based routing

D.

Global to local NAT translation is done after policy-based routing.

Buy Now
Questions 7

The Agile release train workflow focuses on tasks which can be accomplished reliably and efficiently Scrum and Kanban are two of the most popular Agile frameworks, but both have a specific use case based on the implementation requirements In which two situations are Kanban the ideal framework to use”? (Choose two.)

Options:

A.

acquisition of automation tools

B.

carrier lead times

C.

network configuration design

D.

physical hardware deployment

E.

logical topology deployment

Buy Now
Questions 8

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol A spoke-to-spoke 'J

Options:

A.

Configure all the sites as network type broadcast

B.

The network type on all sites should be point-to-multipoint

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Buy Now
Questions 9

An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?

Options:

A.

class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

class-based traffic shaping

Buy Now
Questions 10

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)

Options:

A.

cost optimization approach

B.

strategic planning approach

C.

modular approach

D.

tactical planning approach

E.

business optimization approach

Buy Now
Questions 11

While designing a switched topology, in which two options is UplinkFast recommended? (Choose two )

Options:

A.

when switches of different spanning-tree types are connected (for example. 802.1d connecting to 802.1w)

B.

on distribution layer switches

C.

when hello timers are changed to more aggressive values

D.

on access layer switches

E.

on the core switches

Buy Now
Questions 12

Which relationship between IBGP and the underlying physical topology is true?

Options:

A.

iBGP full mesh requirement does not dictate any specific network topology.

B.

iBGP can worn only on a ring network topology with a link-state protocol like OSPF or IS-IS

C.

iBGP full mesh requires an underlying fully meshed network topology.

D.

iBGP does not work on a ring network topology even with an underlying IGP.

Buy Now
Questions 13

Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:

• hardware sizing and power consumption

• Layer 2 and layer 3 services parameters

• configuration of all control plane protocols

Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?

Options:

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Buy Now
Questions 14

A large enterprise customer has a single router that uses two active/active 10-Mbps internet links in one of its

offices. Each link currently handles approximately 7 Mbps of traffic, which is close to the full link capacity.

When a link fails, the failure leads to significantly degraded performance of all applications. Static routing is

used. The current ISP cannot deliver additional bandwidth capacity on the existing links. The customer needs

a network design that is resistant to failure, but does not increase CAPEX. Which solution should be proposed

to the customer?

Options:

A.

Implement quality of service on the current links.

B.

Add a third link to the current router.

C.

Add an additional edge router connected to a second ISP.

D.

Use dynamic routing for equal-cost multipath.

Buy Now
Questions 15

Company XYZis redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?

Options:

A.

weighted fair queuing

B.

weighted random early detection

C.

low-latency queuing

D.

first-in first-out

Buy Now
Questions 16

Which tool automates network implementation activities and shortens the implementation lifecycle?

Options:

A.

LISP

B.

Java

C.

Conclusion

D.

Python

Buy Now
Questions 17

Which mechanism enables small, unmanaged switches to plug into ports of access switches without risking switch loops?

Options:

A.

PortFast

B.

UDLD

C.

Root guard

D.

BPDU guard

Buy Now
Questions 18

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

Options:

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.

B.

Control plane policers are really needed only on externally facing devices.

C.

Control plane policers can cause the network management systems to create false alarms.

D.

Control plane policers must be processed before a forwarding decision is made.

E.

Control plane policers require that adequate protocols overhead are factored in to allow protocol convergence.

Buy Now
Questions 19

Cost is often one of the motivators for a business to migrate from a traditional network to a software- defined network. Which design decision is directly influenced by CAPEX drivers?

Options:

A.

scalability

B.

stability

C.

complexity

D.

manageability

Buy Now
Questions 20

Which parameter is the most important factor to consider when deciding service placement in a cloud solution?

Options:

A.

data replication cost

B.

application structure

C.

security framework Implementation time

D.

data confidentiality rules

Buy Now
Questions 21

Refer to the exhibit.

An engineer is designing the traffic flow for AS 111. Traffic from AS 111 should be preferred via AS 100 for all external routes. A method must be used that only affects AS 111. Which BGP attributes are best suited to control outbound traffic?

Options:

A.

community

B.

MED

C.

local preference

D.

As path

Buy Now
Questions 22

Company XYZwants tousetheFCAPS ISO standardfor network management design. The focus of the design should be to monitor and keep track of any performance issues by continuously collecting and analyzing statistical information to monitor, correct, and optimize any reduced responsiveness across the network. Which layer accomplishes this design requirement?

Options:

A.

fault management

B.

accounting management

C.

performance management

D.

security management

Buy Now
Questions 23

The goal for any network designer is to strive to build a resilient network that adapts to changing conditions rapidly with minimal impact on the services running over the network A resilient network can adapt to failures but which soft failure can be harder to define and detect?

Options:

A.

a network with operational challenges due to lack of skills

B.

a network that is not running in an optimal way

C.

a network which does not solve complexity issues

D.

a network or service that experiences outages

Buy Now
Questions 24

Which protocol does an SD-Access wireless Access Point use for its fabric data plane?

Options:

A.

GRE

B.

MPLS

C.

VXLAN

D.

LISP

E.

CAPWAP

Buy Now
Questions 25

What is a country-specific requirement that data is subject to the laws of the country in which it is collected or processed and must remain within its borders?

Options:

A.

data sovereignty

B.

data rationality

C.

data inheritance

D.

data replication

Buy Now
Questions 26

Network changes because of mergers, acquisitions, and divestment can be very disruptive to the network if not carried out carefully. When an organization sells parts of its business, it must detach the affected parts of the network from the rest of the network. Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?

Options:

A.

redundant design

B.

modular design

C.

less complex design

D.

routed access design

Buy Now
Questions 27

One of the approaches used in cloud bursting scenarios is distributed load-balanced, which operate the workloads in tandem between a public cloud and a data center In which way can the characteristics of distributed load-balancing be described?

Options:

A.

Simultaneously provisions cloud resources

B.

Usually uses cloud APIs for communication.

C.

Useful for testing and proof-of-concept projects

D.

Useful for large but temporary cloud deployments

Buy Now
Questions 28

As technologies such as big data, cloud, and loT continue to grow, so will the demand for network bandwidth Business strategies must be flexible to accommodate these changes when it comes to priorities and direction and the network design strategy also must be agile and adaptable Drag and drop the benefits from the left onto the corresponding strategic approaches on the right as they relate to network design and management.

Options:

Buy Now
Questions 29

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

Options:

A.

cryptography

B.

confidentiality

C.

authorization

D.

identification

E.

integrity

F.

availability

Buy Now
Questions 30

An engineer must redesign the QoS strategy for Company XYZ The current network is experiencing many dropped packets due to oversubscription of the guaranteed bandwidth allocated by the service provider. Company XYZ wants a design with a QoS strategy that controls the traffic flow leaving the Edge router to minimize packet drops Which QoS technique can be recommended as a solution?

Options:

A.

LLQ

B.

traffic shaping

C.

rate-limiting

D.

policing

Buy Now
Questions 31

Two enterprise networks must be connected together. Both networks are using the same private IP addresses.

The client requests from both sides should be translated using hide NAT (dynamic NAT) with the overload

feature to save IF addresses from the NAT pools. Which design addresses this requirement using only one

Cisco I OS NAT router for both directions?

Options:

A.

This is not possible, because two Cisco IOS NAT routers are required to do dynamic NAT, with overload in

both directions.

B.

The ip nat inside and ip nat outside commands must be configured at the interfaces with the overload

option in both directions.

C.

The overload feature is the default and does not have to be configured.

D.

Two different NAT pools must be used for the ip nat inside source and the ip nat outside source commands

for the overload feature in both directions.

E.

The Nat Virtual interface must be used to achieve this requirement.

Buy Now
Questions 32

Creating a network that functions as a strategic part of the business rather than simply being a cost center, starts with a good understanding of business requirements and processes What specific type of knowledge helps to create high-level LAN WAN. and data center designs that support and enable the business?

Options:

A.

risk assessment

B.

monitoring and management of data

C.

understanding of data flows

D.

recovery time of the system s functionality

Buy Now
Questions 33

As a service provider is implementing Strong Access Control Measures, which two ofthefollowingPCIDataSecurityStandardrequirementsmustbemet’(Choosetwo.)

Options:

A.

Assign a unique ID each person with computer access

B.

Restrict access to cardholder data to on a need-to-know basis

C.

Encrypt transmission of cardholder data across open or public networks

D.

Each location must require validating PCI compliance if business has multiple locations

E.

Protect stored cardholder data

Buy Now
Questions 34

Customer XYZ network consists of an MPLS core. IS-IS running as IGP a pair of BGP route reflectors for route propagation, and a few dozens of MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

Options:

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Buy Now
Questions 35

Company XYZ is running BGP as their routing protocol. An external design consultant recommends that TCP path MTU discovery be enabled. Which effect will this have on the network?

Options:

A.

It will enhance the performance of TCP-based applications.

B.

It will increase the convergence time.

C.

It will improve the convergence time.

D.

It will create a loop free path.

Buy Now
Questions 36

When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?

Options:

A.

QoE estimation

B.

security

C.

traffic patterns

D.

flow forwarding

Buy Now
Questions 37

Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?

Options:

A.

After the initial timer exchange. R2 sets its transmission rate to the R1 Desired Min TX interval

B.

After the initial timer exchange. R1 sets its transmission rate to the R2 Required Min RX interval

C.

Timers renegotiate indefinitely, so the timer exchange phase never converges

D.

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

Buy Now
Questions 38

An existing wireless network was designed to support data traffic only. You must now install context Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)

Options:

A.

Add access points along the perimeter of the coverage area.

B.

Increase the access point density to create an average inter-access point distance of less than 40 feet or 12.2 meters

C.

Use directional antennas to provide more cell overlapping

D.

Install additional access points in monitor mode where the co-channel interference would otherwise be affected

E.

Fine tune the radio configuration of the access point to have a higher average transmission power to achieve better coverage

Buy Now
Questions 39

What best describes the difference between Automation and Orchestration?

Options:

A.

Automation refers to an automatic process for completing a single task and Orchestration refers to assembling and coordinating a set of tasks and conditions.

B.

Automation describes a hands-off configuration process while Orchestration refers to sets of automation tasks that require the network administrator to coordinate

C.

Automation refers to an automatic process for completing multiple tasks with conditions and Orchestration refers to executing tasks in parallel.

D.

Automation refers to scripting languages (Python. Ansible etc.) and Orchestration refers to commercial products that control configuration deployment

Buy Now
Questions 40

Company ABC wants to minimize the risk of users plugging unauthorized switches and hubs into the network Which two features can be used on the LAN access ports to support this design requirement? (Choose two.)

Options:

A.

Loop Guard

B.

PortFast

C.

DTF

D.

Root Guard

E.

BPDU Guard

Buy Now
Questions 41

A network uses an SDN architecture with switches and a centralized controller What should be on the switches but not on the controller?

Options:

A.

control plane functions

B.

a southbound interface

C.

data plane functions

D.

a northbound interface

Buy Now
Questions 42

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access Is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services If one ISP suffers loss or latency?

Options:

A.

Cloud onRamp gateway site

B.

Cloud onRamp SWG

C.

Cloud onRamp

D.

Cloud onRamp SaaS

Buy Now
Questions 43

A company is reviewing their technology roadmap ahead of their cloud journey The as-is assessment found that a large inventory (5000+) of servers sees less than 50% capacity utilization Which cloud architecture model supports the company to optimize the resource utilization'?

Options:

A.

homogenous cloud

B.

heterogenous cloud

C.

hybrid-private cloud

D.

public cloud

Buy Now
Questions 44

A business wants to centralize services via VDI technology and to replace remote WAN desktop PCs with thin client-type machines to reduce operating costs Which consideration supports the new business requirement?

Options:

A.

VDI servers should be contained centrally within a DMZ

B.

The thin client traffic should be placed in a WAN QoS priority queue

C.

VDI servers should be contained within dedicated VLANs in each branch location

D.

The WAN should offer low latency and be resized

Buy Now
Questions 45

As a network designer you need to support an enterprise with hundreds of remote sites connected over a single WAN network that carries different types of traffic, including VoIP, video, and data applications which of following design considerations will not impact design decision?

Options:

A.

Focus on the solution instead of the problem, which helps to reduce downtime duration

B.

The location of the data collection

C.

What direction the data or flows should be metered

D.

Identify traffic types and top talkers over this link

Buy Now
Questions 46

Which development model is closely associated with traditional project management?

Options:

A.

static model

B.

Agile model

C.

evolutionary delivery model

D.

lifecycle model

Buy Now
Questions 47

Company XYZis runningOSPFin their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

Options:

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Buy Now
Questions 48

An architect designs a multi-controller network architecture with these requirements:

    Achieve fast failover to control traffic when controllers fail.

    Yield a short distance and high resiliency in the connection between the switches and the controller.

    Reduce connectivity loss and enable smart recovery to improve the SDN survivability.

    Improve connectivity by adding path diversity and capacity awareness for controllers.

Which control plane component of the multi-controller must be built to meet the requirements?

Options:

A.

control node reliability

B.

controller stale consistency

C.

control path reliability

D.

controller clustering

Buy Now
Questions 49

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two )

Options:

A.

lf overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic However, the intermediate system can still forward Level 1 traffic

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems

Buy Now
Questions 50

As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?

Options:

A.

Fate sharing

B.

CPU resource allocation

C.

Congestion control

D.

Security

E.

Bandwidth allocation

Buy Now
Questions 51

When planning their cloud migration journey what is crucial for virtually all organizations to perform?

Options:

A.

SASE framework deployment

B.

optimizing the WAN environment

C.

assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Buy Now
Questions 52

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

Options:

Buy Now
Questions 53

Network operators have many options available, from fully centralized to fully distributed control planes, and each approach has its own set of characteristics. Drag and drop the characteristics from the left onto the corresponding approach on the right.

Options:

Buy Now
Questions 54

Company XYZ wants to use the FCAPS ISO standard for network management design. The focus of the design should be to minimize network outages by employing a set of procedures and activities to detect and isolate network issues and the appropriate corrective actions to overcome current issues and prevent them from occurring again. Which layer accomplishes this design requirement?

Options:

A.

fault management

B.

performance management

C.

security management

D.

accounting management

Buy Now
Questions 55

An enterprise has identified these causes for inefficient CAPEX spending:

    CAPEX planning is driven by technology and not by business objectives.

    The CAPEX planning team lacks the data it needs to perform due diligence tasks.

    The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

Options:

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

B.

CxO-level staff must have a full technical understanding but the should not trust their technical leaders fully.

C.

Adopt new organizational models that promote real accountability for ROI. not just revenue. EBITDA, and cash.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Buy Now
Questions 56

Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.)

Options:

A.

The Reported Distance from a successor is lower than the local Feasible Distance.

B.

The Reported Distance from a successor is higher than the local Feasible Distance.

C.

The feasibility condition does not need to be met.

D.

The Feasible Distance from a successor is lower than the local Reported Distance.

E.

A feasible successor must be present.

Buy Now
Questions 57

Which methodology is the leading lifecycle approach to network design and implementation?

Options:

A.

PPDIOO

B.

Waterfall model

C.

Spiral model

D.

V model

Buy Now
Questions 58

Refer to the exhibit.

There are multiple trees in the Cisco FabricPath All switches in the Layer 2 fabric share the same view of each tree. Which two concepts describe how the multicast traffic is load-balanced across this topology? (Choose two )

Options:

A.

A specific (S.G) traffic is not load-balanced

B.

All trees are utilized at the same level of the traffic rate

C.

Every leaf node assigns the specific (S.G) to the same tree.

D.

A specific (S.G) multicast traffic is load-balanced across all trees due to better link utilization efficiency.

E.

The multicast traffic is generally load-balanced across all trees

Buy Now
Questions 59

An enterprise campus is adopting a networkvirtualization design solution with these requirements

    It must include the ability to virtualize the data plane and control plane by using VLANs and VRFs

    It mustmaintain end-to-end logical path transport separation across the network

    resources available grouped at the access edge

Which two primary models can this network virtualization design be categorized? (Choose two)

Options:

A.

Path isolation

B.

Session isolation

C.

Group virtualization

D.

Services virtualization

E.

Edge isolation

Buy Now
Questions 60

Whichprojectmanagementmethodologyischaracterizedbyahavingalowclient

involvement?

Options:

A.

Traditional project management

B.

LEAN project management

C.

Kanban project management

D.

Agile project management

Buy Now
Questions 61

Which mechanism provides Layer 2 fault isolation between data centers?

Options:

A.

fabric path

B.

OTV

C.

advanced VPLS

D.

LISP

E.

TRILL

Buy Now
Questions 62

During a pre-sales meeting with a potential customer the customer CTO asks a question about advantages of controller-based networks versus a traditional network What are two advantages to mention? (Choose two)

Options:

A.

per device forwarding tables

B.

programmatic APIs available per device

C.

abstraction of individual network devices

D.

distributed control plane

E.

consistent device configuration

Buy Now
Questions 63

A business invests in SDN and develops its own SDN controller that, due to budget constraints, runs on a single controller. The controller actively places an exclusive lock on the configuration of the devices to ensure it is the only source of changes to the environment. What is the result if the controller fails?

Options:

A.

All device configurations are in read-only mode until the controller is restored.

B.

The control plane is unavailable until the controller is restored.

C.

If a device fails, the configuration backup is unavailable-

D.

Manual changes are only possible until the controller is restored

Buy Now
Questions 64

Company XYZneeds advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?

Options:

A.

Use switch clustering in the access layer.

B.

Use switch clustering in the core/distribution layer.

C.

Use spanning-tree PortFast.

D.

Use BFD.

Buy Now
Questions 65

The CIA triad is foundational to information security, and one can be certain that one or more of the principles within the CIA triad has been violated when data is leaked or a system is attacked Drag and drop the countermeasures on the left to the appropriate principle section on the right in any order

Options:

Buy Now
Questions 66

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Options:

Buy Now
Questions 67

The Agile Manifesto is a document that defines the key values and principles behind the Agile philosophy and helps development teams work more efficiently and sustainably Each of the four key values is split into two sections a left-hand side and a right-hand side In other words, though there is value in the items on the right we value the items on the left more What is one of the key values of the Agile Manifesto?

Options:

A.

comprehensive documentation over working software

B.

contract negotiation over customer collaboration

C.

individuals and interactions over processes and tools

D.

following a plan over responding to change

Buy Now
Questions 68

Refer to the exhibit.

A customer needs to implement a connectivity model by using one active link for inbound and outbound traffic and a second link for backup The backup link is low speed and is required only during outages of the primary link. Which design solution should be implemented?

Options:

A.

Advertise a higher local preference to ISP 2 Increase the AS PATH inbound from ISP 1

B.

Advertise a longer AS PATH to ISP 2 Increase the MED to ISP 2.

C.

Advertise more specific routes to ISP 1 Increase the local preference attribute of inbound BGP from ISP1

D.

Advertise less specific routes to ISP 2 Increase the AS PATH inbound from ISP 1

Buy Now
Questions 69

A consultant needs to evaluate project management methodologies for a new service deployment on the existing network of a customer. The customer wants to be involved in the end-to-end project progress and be provided with frequent updates. The customer also wants the ability to change the requirements if needed, as the project progresses. Which project management methodology should be used?

Options:

A.

three principles

B.

phased

C.

Agile

D.

Waterfall

Buy Now
Questions 70

Refer to the table.

A customer investigates connectivity options for a DCI between two production data centers. The solution must provide dual 10G connections between locations with no single points of failure for Day 1 operations. It must also include an option to scale for up to 20 resilient connections in the second year to accommodate isolated SAN over IP and isolated, dedicated replication IP circuits. All connectivity methods are duplex 10 Gbps. Which transport technology costs the least over two years, in the scenario?

Options:

A.

Metro Ethernet

B.

DWDM

C.

CWDM

D.

MPLS

Buy Now
Questions 71

Which two descriptions of CWDM are true? (Choose two)

Options:

A.

typically used over long distances, but requires optical amplification

B.

uses the 850nm band

C.

allows up to 32 optical earners to be multiplexed onto a single fiber

D.

shares the same transmission window as DWDM

E.

Passive CWDM devices require no electrical power

Buy Now
Questions 72

You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password that they are already using to access existing applications . A user may not always use the same device to access the VPN. Which two options combined meet the requirements? (Choose two)

Options:

A.

Use local usernames and passwords on the VPN device

B.

Deploy a central authentication directory that users can be authenticated and authorized against

C.

Deploy certificates that are unique to each user

D.

Deploy an IPsec VPN solution

E.

Deploy certificates that are unique to each device

F.

Deploy a SSL VPN solution

Buy Now
Questions 73

VPLS is implemented in a Layer 2 network with 2000 VLANs. What is the primary concern to ensure successful deployment of VPLS?

Options:

A.

Flooding is necessary to propagate MAC address reachability information

B.

PE scalability

C.

The underlying transport mechanism

D.

VLAN scalability

Buy Now
Questions 74

Company XYZhas30 sitesrunningalegacy private WAN architecture that connects to the Internet via multiple high- speed connections The company is now redesigning their network and must comply with these design requirements :

    Use a private WAN strategy that allows the sites to connect to each other directly and caters for future expansion.

    Use the Internet as the underlay for the private WAN.

    Securely transfer the corporate data over the private WAN.

Which two technologies should be Incorporated into the design of this network? (Choose two.)

Options:

A.

S-VTI

B.

IPsec

C.

DMVPN

D.

GET VPN

E.

PPTP

Buy Now
Questions 75

Company XYZhasmultipleproduction units and marketing departments across the region The current network is a mixture of point-to-point links and MPLS Layer 3 VPN service from the provider. The Info-Sec team has suggested to isolate production traffic end-to-end with an encryption over the transport network to comply with the HIPAA standard Which solution must be used in their design if Company XYZ wants a quick roll out”?

Options:

A.

IPsec point-to-point tunnels over the MPLS and point-to-point links provide an isolated and encrypted packet end-to-end

B.

GETVPN can be implemented over the MPLS provider which provides a payload encryption without the overhead of the tunnelling

C.

A firewall can be placed centrally to filter out the traffic based on required ports

D.

VRF-Lite can be implemented toward the downstream network and VRF-based tunnels combined with IPsec can be implemented over the service provider

Buy Now
Questions 76

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

Options:

A.

Design in a way that expects outages and attacks on the network and its protected resources

B.

The design approach should consider simple and centralized management aspect

C.

Design in a way that it simplifies and improves ease of deployment

D.

Design automation tools wherever it is appropriate for greater visibility

Buy Now
Questions 77

Refer to the exhibit.

Two data center siles X and Y are connected with a direct backdoor link with these conditions •Site-specific firewalls are deployed behind the Internet edge routers R1 and R2 •Both sites are advertising the address pool 100 75 10 0/23 toward the internet Site-X finds that Internet traffic returning from user PCs comes back on the Site-Y link Which design resolves the issue?

Options:

A.

Use BGP MED to influence Site-X return traffic Change the IP address scheme of both sites.

B.

Change the Site-Y firewall configuration to replicate the Site-X configuration.

Advertise the low MED attribute on Site-X to the Internet.

C.

Add a static route toward the Internet on Site-X.

Change the DNS policy on Site-Y to block traffic.

D.

Establish control plane peering between edge routers.

Have Site-X advertise an IP pool with a longer prefix.

Buy Now
Questions 78

You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature Which four routing protocols can you use to facilitate this? (Choose four.)

Options:

A.

IS-IS

B.

static

C.

RIP

D.

EIGRP

E.

BGP

Buy Now
Questions 79

How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure?

Options:

A.

Limit the query domain by use of distribute lists.

B.

Build neighbor adjacencies in a triangulated fashion.

C.

Build neighbor adjacencies in squared fashion.

D.

Limit the query domain by use of summarization.

E.

Limit the query domain by use of default routes.

Buy Now
Questions 80

Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?

Options:

A.

OSPF fast hellos

B.

BFD echo

C.

Change the protocol to BGP

D.

Change the OSPF hello and dead intervals

Buy Now
Questions 81

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)

Options:

A.

Changes in the existing IP addressing and subnets are required

B.

The firewall can participate actively on spanning tree.

C.

Multicast traffic can traverse the firewall.

D.

OSPF adjacencies can be established through the firewall

E.

The firewall acts like a router hop in the network.

Buy Now
Questions 82

Which MPLS TE design consideration is true?

Options:

A.

MPLS TE replaces LDP and the dependency of the IGP to identify the best path.

B.

MPLS TE provides link and node protection

C.

MPLS TE optimizes the routing of IP traffic, given the constraints imposed by backbone capacity and

application requirements.

D.

MPLS TE requires Layer 3 VPN full-mesh topology deployment

Buy Now
Questions 83

The cloud like the Internet is a massive network of independent resources that are designed to be fault tolerant Software components that run in the cloud have no dependencies on the underlying infrastructure which may fail at any time Which two constraints of REST are important when building cloud-based solutions'? (Choose two )

Options:

A.

separation of resources from representation

B.

migration of resources by representations

C.

distribution of resources through platforms

D.

hyper-scale as the engine of application state

E.

self-descriptive messages

Buy Now
Questions 84

A multinational enterprise integrates a cloud solution with these objectives

• Achieve seamless connectivity across different countries and regions

• Extend data center and private clouds into public clouds and provider-hosted clouds

What are two outcomes of deploying data centers and fabrics that interconnect different cloud networks? (Choose two.)

Options:

A.

enhanced security

B.

data and network ownership

C.

ability to place workloads across clouds

D.

centralized visibility

E.

unidirectional workload mobility across the cloud

Buy Now
Questions 85

An Agile for Infrastructure transition often means dismantling traditional IT hierarchies and rebuilding it to align with business objectives and workflows Organizations are seeing the benefits of using automation tools in the network such as faster more efficient more effective delivery of products and services. Which two components help increasing overall productivity and improve company culture? (Choose two.)

dedicated infrastructure

Options:

A.

Agile code practices

B.

infra structure-as-code

C.

controlled infrastructure

D.

DevOps practices

Buy Now
Questions 86

Scrum is a subset of Agile and is a lightweight process framework for Agile development Which role becomes the interface between the business the customers and their product-related needs on one side and the Team on the other?

Options:

A.

Product Owner

B.

Product Manager

C.

Scrum Master

D.

Program Manager

Buy Now
Questions 87

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two )

Options:

A.

Serialization delays are invariable because they depend only on the line rate of the interface

B.

Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.

C.

Serialization delay is the time required to transmit the packet on the physical media.

D.

Serialization delays are variable because they depend only on the size of the packet being serialized

E.

Serialization delay depends not only on the line rate of the interface but also on the size of the packet

Buy Now
Questions 88

Which two features are advantages of SD-WAN compared to MPLS-based connectivity? (Choose two.)

Options:

A.

uses FEC constructs for traffic forwarding, thereby improving efficiency

B.

separates infrastructure and policy

C.

uses policy-based forwarding of real-time traffic with less complexity

D.

unifies the WAN backbone

E.

manages failures through backup links

Buy Now
Questions 89

A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service. Which protocol must be enabled?

Options:

A.

SNMPv3

B.

Syslog

C.

Syslog TLS

D.

SNMPv2

E.

SSH

Buy Now
Questions 90

Which two factors must be considered while calculating the RTO? (Choose two )

Options:

A.

importance and priority of individual systems

B.

maximum tolerable amount of data loss that the organization can sustain

C.

cost of lost data and operations

D.

how often backups are taken and how quickly these can be restored

E.

steps needed to mitigate or recover from a disaster

Buy Now
Questions 91

Traditionally, infrastructure is not managed using code, but instead it is managed and provisioned manually which can cause potential issues On the other side, infrastructure as code brings several advantages What is a benefit of infrastructure as code?

Options:

A.

declarative pipelines

B.

configuration drift

C.

agent monitoring

D.

repeatable deployments

Buy Now
Questions 92

What is the most important operational driver when building a resilient and secure modular network design?

Options:

A.

Reduce the frequency of failures requiring human intervention

B.

Minimize app downtime

C.

Increase time spent on developing new features

D.

Dependencies on hardware or software that is difficult to scale

Buy Now
Questions 93

Which solution component helps to achieve rapid migration to the cloud for SaaS and public cloud leveraging SD-WAN capabilities?

Options:

A.

service-oriented cloud architecture

B.

Cloud onramp

C.

cloud registry

D.

microservices in the cloud

Buy Now
Questions 94

Which purpose of a dynamically created tunnel interface on the design of IPv6 multicast services Is true?

Options:

A.

first-hop router registration to the RP

B.

multicast client registration to the RP

C.

multicast source registration to the RP

D.

transport of all IPv6 multicast traffic

Buy Now
Questions 95

Refer to the exhibit.

A new high availability DB sever cluster is installed in the network.

These two servers require high bandwidth and low latency Layer 2 connectivity for database replication.

Which solution supports these requirements?

Options:

A.

Add two new links between SW1 and SW2 configured as LACP trunk with STP

B.

Add secondary links to REP segments 1 and 2

C.

Add two new links between SW1 and SW2 configured as REP segment 3

D.

Add two new links between SW1 and SW2 configured as REP segments 1 and 2 respectively

Buy Now
Questions 96

Retef to the exhibit.

An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain EIGRP routes are getting redistributed into OSPF ,OSPF area 20 has routers with limited memory and CPU resources The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222 routes to How in Which OSPF area type fulfills this design requirement?

Options:

A.

area 20 as a stub area

B.

type 5 LSA filtering on the ASBR between EIGRP 111 and area a

C.

area 20 as a NSSA area

D.

type 3 LSA filtering on the ABR between area 0 area 20

Buy Now
Questions 97

Which layer of the SDN architecture orchestrates how the applications are given the resources available in the network?

Options:

A.

orchestration layer

B.

southbound API

C.

northbound API

D.

control layer

Buy Now
Questions 98

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration. Which two statements describe a centralized SDN control path? (Choose two.)

Options:

A.

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing.

B.

It is highly-available by design with no single-point-of-failure risks present.

C.

Integrating smart NIC capabilities on the local host level is made easier through rest APIs.

D.

It significantly improves the latency when performing reactive handling of PACKET_IN events.

E.

It centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment.

Buy Now
Questions 99

Software-defined networking architecture is used for cost-effective, adaptable, and easily manageable applications. In which two software-defined networks is SDN commonly used? (Choose two.)

Options:

A.

wide area network

B.

mobile network

C.

metro network

D.

application network

E.

control network

Buy Now
Questions 100

A senior network designer suggests that you should improve network convergence times by reducing BGP timers between your CE router and the PE router of the service provider. Which two factors should you consider to adjust the timer values? (Choose two.)

Options:

A.

service provider agreement to support tuned timers

B.

manual updates to the peer groups

C.

service provider scheduling of changes to the PE

D.

number of routes on the CE router

E.

number of VRFs on the PE router

Buy Now
Questions 101

Company XYZ wants to redesign the Layer 2 part of their network and wants to use all available uplinks for increased performance. They also want to have end host reachability supporting conversational learning. However, due to design constraints, they cannot implement port-channel on the uplinks. Which other technique can be used to make sure the uplinks are in active/active state?

Options:

A.

TRILL

B.

LISP

C.

MSTP

D.

switch stack

Buy Now
Questions 102

You have been tasked with designing a data center interconnect as part of business continuity You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

Options:

A.

DWDM

B.

EoMPLS

C.

SONET/SDH

D.

Multichassis EtherChannel over Pseudowire

E.

VPLS

Buy Now
Questions 103

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

Options:

Buy Now
Questions 104

Company XYZwants to implement an IPS device to detect and block well-known attacks against their network They want a design solution where all packets that are forwarded to the network are checked against a signature database before being allowed through This check must be done with the minimum effect on performance. Which design is recommended?

Options:

A.

Deploy an IPS behind the firewall in promiscuous mode

B.

Deploy an IPS in front of the firewall in promiscuous mode

C.

Deploy an IPS behind the firewall in in-line mode

D.

Deploy and IPS in front of the firewall in in-line mode

Buy Now
Questions 105

A private cloud is accessed over the private IT network infrastructure that is potentially vulnerable to violations, data leaks, and man-in- the-middle attacks. The security team is evaluating the following solutions to address the challenges:

•Encrypt data at rest and in transition.

•Use strong identity and access management (IAM) capabilities.

•Communicate the inherent data security risks to your customers and end-users.

Assuming that adoption of a hybrid cloud model is likely to occur within the next 12 months, which two solutions can also help provide protection in a hybrid cloud environment? (Choose two.)

Options:

A.

Avoid automating the scanning and remediation of security controls using open-source tooling

B.

Practice SSH network protocols for data communication between unsecured network connections

C.

Implement a common protective methodology for the same information at rest or motion at different points of time

D.

Provide distributed management and visibility across the infrastructure instead of centralized management

E.

Apply cryptographic protocols to secure data transmission over the network

Buy Now
Questions 106

An enterprise organization currently provides WAN connectivity to their branch sites using MPLS technology, and the enterprise network team is considering rolling out SD-WAN services for all sites.

With regards to the deployment planning, drag and drop the actions from the left onto the corresponding steps on the right.

Options:

Buy Now
Questions 107

An architect prepares a network design for a startup company. The design must be able to meet business requirements while the business grows and divests due to rapidly changing markets. What is the highest priority in this design?

Options:

A.

The network should be hierarchical

B.

The network should be modular.

C.

The network should be scalable.

D.

The network should have a dedicated core.

Buy Now
Questions 108

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two )

Options:

A.

will only work with single-tier headend architecture

B.

hub sites must connect to both DMVPN clouds

C.

recommended for high availability

D.

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.

requires all sites to have dual Internet connections

Buy Now
Questions 109

Which design principal improves network resiliency?

Options:

A.

Added load-balancing

B.

Added redundancy

C.

Added confidentiality

D.

Added reliability

Buy Now
Questions 110

Refer to the diagram.

Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

Options:

A.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

B.

Send packets without encapsulation to the anchor controller over the routed network.

C.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller.

D.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.

Buy Now
Questions 111

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

Options:

A.

SaaS

B.

PaaS

C.

laaS

D.

hybrid cloud

Buy Now
Questions 112

An external edge router provides connectivity from a service provider to an enterprise Which two Internet edge best practices meet compliance regulations'? (Choose two )

Options:

A.

Implement filtering to control traffic that is sourced from the infrastructure IP space.

B.

Enable and use only secure protocols.

C.

Send logs to a centralized logging collection server.

D.

Implement EBGP to advertise all owned IP blocks.

E.

Use login banners and interface access lists to restrict administrative access to the system

Buy Now
Questions 113

Which two design solutions ensure sub 50 msec of the convergence time after a link failure in the network?

(Choose two)

Options:

A.

BFD

B.

Ti-LFA

C.

minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Buy Now
Questions 114

A network architect in an enterprise is designing a network policy for certain database applications. The goal of the policy is to allow these applications to access the internet directly, whereas other user and network applications that communicate with systems or users outside their own network must be routed through the data center. The focus is on achieving higher availability and a better user experience for the database applications, but switching between different network paths based on performance characteristics must be supported.

Which solution meets these requirements?

Options:

A.

MPLS L3VPN with QoS

B.

Cloud onRamp for laaS

C.

Cloud onRamp for SaaS

D.

MPLS direct connect

Buy Now
Questions 115

A multicast network is sing Bidirectional PIM. Which two combined actions achieve high availability so that two RPs within the same network can act in a redundant manner? (Choose two)

Options:

A.

Use two phantom RP addresses

B.

Manipulate the administration distance of the unicast routes to the two RPs

C.

Manipulate the multicast routing table by creating static mroutes to the two RPs

D.

Advertise the two RP addresses in the routing protocol

E.

Use anycast RP based on MSDP peering between the two RPs

F.

Control routing to the two RPs through a longest match prefix

Buy Now
Questions 116

Drag and drop the design use cases from the left onto the correct uRPF techniques used to prevent spoofing attacks Not all options are used.

Options:

Buy Now
Questions 117

Which feature is supported by NETCONF but is not supported by SNMP?

Options:

A.

distinguishing between configuration data and operational data

B.

taking administrative actions

C.

collecting the status of specific fields

D.

changing the configuration of specific fields

Buy Now
Questions 118

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

Options:

A.

data governance

B.

additional latency

C.

security

D.

cloud connectivity

Buy Now
Exam Code: 400-007
Exam Name: Cisco Certified Design Expert (CCDE v3.1)
Last Update: Jun 16, 2025
Questions: 396
400-007 pdf

400-007 PDF

$139.65  $399
400-007 Engine

400-007 Testing Engine

$157.15  $449
400-007 PDF + Engine

400-007 PDF + Testing Engine

$209.65  $599