Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

400-007 Exam Dumps - Cisco Certified Design Expert (CCDE v3.1)

Go to page:
Question # 17

Company XYZ branch offices connect to the headquarter sites using two links, MPLS and Internet. The company wants to design the traffic flow so that voice traffic goes through the MPLS link and all other traffic uses either the MPLS link or the Internet link. Which technique can the company use in their design to ensure that the traffic is not process switched?

A.

policy-based routing

B.

virtual links

C.

visualization

D.

floating static route

Full Access
Question # 18

Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two)

A.

DAI

B.

IP Source Guard

C.

BEEP

D.

CPPr

E.

MPP

Full Access
Question # 19

SD-WAN can be used to provide secure connectivity to remote offices, branch offices, campus networks, data centers, and the cloud over any type of IP-based underlay transport network. Which two statements describe SD WAN solutions? (Choose two.)

A.

SD-WAN networks are inherently protected against slow performance.

B.

Control and data forwarding planes are kept separate.

C.

Improved operational efficiencies result In cost savings.

D.

Solutions include centralized orchestration, control, and zero-touch provisioning.

E.

Solutions allow for variations of commodity and specialized switching hardware.

Full Access
Question # 20

Most security monitoring systems use a signature-based approach to detect threats In which two instances are systems based on Network Behavior Anomaly Detection better than signature-based systems when it comes to detecting security threat vectors'? (Choose two.)

A.

malware detection

B.

encrypted threat traffic

C.

spyware detection

D.

intrusion threat detection

E.

new zero-day attacks

Full Access
Question # 21

Which extensions to GRE tunneling provide session tracking and in-order packet delivery in exchange for additional state stored in tunnel endpoints?

A.

GRE Protocol Type and Checksum extension fields.

B.

GRE Version and Reserved0 extension fields.

C.

No extension fields are available in the GRE header to track session data and packet sequences.

D.

GRE Key and Sequence number extensions.

Full Access
Question # 22

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

A.

SaaS

B.

PaaS

C.

laaS

D.

hybrid cloud

Full Access
Question # 23

The administrator of a small branch office wants to implement the Layer 2 network without running STP The office has some redundant paths Which mechanism can the administrator use to allow redundancy without creating Layer 2 loops?

A.

Use double-sided VPC on both switches

B.

Use two port channels as Flex links

C.

Use fabric path with ECMP

D.

Use 802.3ad link bundling.

Full Access
Question # 24

A service provider hires you to design its new managed CE offering to meet these requirements

• The CEs cannot run a routing protocol with the PE

• Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios.

• Provide support for IPv6 customer routes

• Scale up to 250.000 CE devices per customer.

• Provide low operational management to scale customer growth.

• Utilize low-end (inexpensive) routing platforms for CE functionality.

Which tunneling technology do you recommend?

A.

FlexVPN

B.

point-to-point GRE

C.

DMVPN

D.

LISP

Full Access
Go to page: