Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

400-007 Exam Dumps - Cisco Certified Design Expert (CCDE v3.1)

Go to page:
Question # 89

Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?

A.

Source Guard and Prefix Guard

B.

Router Advertisement Guard

C.

Prefix Guard

D.

Secure Neighbor Discovery

Full Access
Question # 90

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

A.

Cryptography

B.

Confidentiality

C.

Authorization

D.

Identification

E.

Integrity

F.

Availability

Full Access
Question # 91

You have been tasked with designing a data center interconnect to provide business continuity. You want to encrypt the traffic over the DCI using IEEE 802.1AE MACsec to prevent the deployment of any firewall or IPS. Which two interconnect technologies support MACsec? (Choose two.)

A.

EoMPLS

B.

MPLS Layer 3 VPN

C.

DMVPN

D.

GET VPN

E.

KVPLS

Full Access
Question # 92

Which design consideration is valid when you contrast FabricPath and TRILL?

A.

FabricPath uses IS-IS, but TRILL uses VXLAN

B.

FabricPath permits active-active FHRP and TRILL supports anycast gateway

C.

FabricPath permits ECMP, but TRILL does not

D.

FabricPath permits active-active mode, but TRILL supports only active-standby mode

Full Access
Question # 93

Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor?

A.

Threat-centric protection

B.

Integrated actionable intelligence

C.

Distributed enforcement

D.

Central command and control

Full Access
Question # 94

Identity and access management between multiple users and multiple applications has become a mandatory requirement for Company XYZ to fight against ever-increasing cybersecurity threats. To achieve this, federated identity services have been deployed to provide Single Sign-On and Multi-Factor Authentication. Which protocol can be used by Company XYZ to provide authentication and authorization services?

A.

OAuth2

B.

OpenID Connect

C.

OpenID

D.

SAML2.0

Full Access
Question # 95

Which MPLS TE design consideration is true?

A.

MPLS TE replaces LDP and the dependency of the IGP to identify the best path

B.

MPLS TE provides link and node protection

C.

MPLS TE optimizes the routing of IP traffic, given the constraints imposed by backbone capacity and application requirements

D.

MPLS TE requires Layer 3 VPN full-mesh topology deployment

Full Access
Question # 96

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving. The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?

A.

Assigning unique Route Distinguishers

B.

Assigning unique Route Target IDs

C.

Assigning unique IP address space for the Enterprise NAT/Firewalls

D.

Assigning unique VRF IDs to each L3VPN

Full Access
Go to page: