Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

400-007 Exam Dumps - Cisco Certified Design Expert (CCDE v3.1)

Go to page:
Question # 81

Refer to the exhibit A service provider has a requirement to use Ethernet OAM to detect end-to-end connectivity failures between SP-SW1 and SP- SW2 Which two ways to design this solution are true? (Choose two)

A.

Enable unicast heartbeat messages to be periodically exchanged between MEPs

B.

Enable Connectivity Fault Management on the SP switches

C.

Use upward maintenance endpoints on the SP switches

D.

Forward E-LMI PDUs over VPLS

E.

Forward LLD PDUs over the VPLS

Full Access
Question # 82

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

A.

device resiliency

B.

device type

C.

network type

D.

network resiliency

E.

network size

Full Access
Question # 83

Whileaccess lists are generally associated with routers and firewalls, they can also be applied on layer 2 interfaces and to VLANs to provide granular security. Which are two benefits of using layer 2 access lists for segmentation? (Choose two.)

A.

traffic filtering

B.

contextual filtering

C.

containing lateral attacks

D.

reduced load at layer 2

E.

VLAN intercept

Full Access
Question # 84

Retef to the exhibit.

An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain EIGRP routes are getting redistributed into OSPF ,OSPF area 20 has routers with limited memory and CPU resources The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222 routes to How in Which OSPF area type fulfills this design requirement?

A.

area 20 as a stub area

B.

type 5 LSA filtering on the ASBR between EIGRP 111 and area a

C.

area 20 as a NSSA area

D.

type 3 LSA filtering on the ABR between area 0 area 20

Full Access
Question # 85

Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:

• hardware sizing and power consumption

• Layer 2 and layer 3 services parameters

• configuration of all control plane protocols

Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above. What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?

A.

This provides more opportunity to think outside the box.

B.

Rework is expected before the delivery.

C.

Significant effort and time are required.

D.

This provides a flexible approach to incorporate changes.

Full Access
Question # 86

The CIA triad is foundational to information security, and one can be certain that one or more of the principles within the CIA triad has been violated when data is leaked or a system is attacked Drag and drop the countermeasures on the left to the appropriate principle section on the right in any order

Full Access
Question # 87

Company XYZ is connecting its sites over a private WAN The company is planningon implementing multicast routing on the network. The company has a mixture ofroutersfromdifferentvendorsWhichtechniquecanbeusedinthemulticastroutingdesigntominimize PIMsparsemodeconfigurations?

A.

PIM dense mode with RP using Auto-RP to announce itself

B.

PIM sparse mode with RP using Auto-RP to announce itself

C.

PIM dense mode with RP using BSR to announce itself

D.

PIM sparse mode with RP using BSR to announce itself

Full Access
Question # 88

Company XYZis runningOSPFin their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Full Access
Go to page: