Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

400-007 Exam Dumps - Cisco Certified Design Expert (CCDE v3.1)

Go to page:
Question # 105

What are two design constraints in a standard spine and leaf architecture? (Choose two.)

A.

Spine switches can connect to each other.

B.

Each spine switch must connect to every leaf switch.

C.

Leaf switches must connect to each other.

D.

Endpoints connect only to the spine switches.

E.

Each leaf switch must connect to every spine switch.

Full Access
Question # 106

Which two pain points are the most common for container technology adoption? (Choose two)

A.

Performance

B.

Security

C.

Cost

D.

Container deployment

E.

Skilled staff

F.

Compliance

Full Access
Question # 107

When designing a WAN that will be carrying real-time traffic, what are two important reasons to consider serialization delay? (Choose two )

A.

Serialization delays are invariable because they depend only on the line rate of the interface

B.

Serialization delays are variable because they depend on the line rate of the interface and on the type of the packet being serialized.

C.

Serialization delay is the time required to transmit the packet on the physical media.

D.

Serialization delays are variable because they depend only on the size of the packet being serialized

E.

Serialization delay depends not only on the line rate of the interface but also on the size of the packet

Full Access
Question # 108

A multinational enterprise integrates a cloud solution with these objectives

• Achieve seamless connectivity across different countries and regions

• Extend data center and private clouds into public clouds and provider-hosted clouds

What are two outcomes of deploying data centers and fabrics that interconnect different cloud networks? (Choose two.)

A.

enhanced security

B.

data and network ownership

C.

ability to place workloads across clouds

D.

centralized visibility

E.

unidirectional workload mobility across the cloud

Full Access
Question # 109

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

A.

reduction in time to detect and respond to threats

B.

integration with an incident response plan

C.

adoption and improvement of threat-detection response

D.

asset identification and grouping decisions

Full Access
Question # 110

As a service provider is implementing Strong Access Control Measures, which two ofthefollowingPCIDataSecurityStandardrequirementsmustbemet’(Choosetwo.)

A.

Assign a unique ID each person with computer access

B.

Restrict access to cardholder data to on a need-to-know basis

C.

Encrypt transmission of cardholder data across open or public networks

D.

Each location must require validating PCI compliance if business has multiple locations

E.

Protect stored cardholder data

Full Access
Question # 111

As more links are added to the network, information and attributes related to the link is added to the control plane meaning every link that gets added will slow down the convergence of the control plane by some measurable amount of time. As a result when additional redundancy is built or added the MTTR will increase too Which risk increases along with the increased MTTR?

A.

management visibility

B.

slower data plane convergence

C.

overlapping outages

D.

topology change detection

Full Access
Question # 112

An architect receives a business requirement from a CTO that states the RTO and RPO for a new system should be as close as possible to zero. Which replication method and data center technology should be used?

A.

asynchronous replication over dual data centers via DWDM

B.

synchronous replication over geographically dispersed dual data centers via MPLS

C.

synchronous replication over dual data centers via Metro Ethernet

D.

asynchronous replication over geographically dispersed dual data centers via CWDM

Full Access
Go to page: