Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

400-007 Exam Dumps - Cisco Certified Design Expert (CCDE v3.1)

Go to page:
Question # 49

Company XYZ is in the process of identifying which transport mechanism(s) to use as their WAN technology. Their main two requirements are:

    A technology that could offer DPI, SLA, secure tunnels, privacy, QoS, scalability, reliability, and ease of management.

    A technology that is cost-effective.

Which WAN technology(ies) should be included in the design of company XYZ?

A.

Software-defined WAN should be the preferred choice because it complements both technologies, covers all the required features, and it is the most cost-effective solution.

B.

Internet should be the preferred option because it is cost-effective and supports BFD, IP SLA, and IPsec for secure transport over the public Internet.

C.

Both technologies should be used. Each should be used to back up the other one; where the primary links are MPLS, the Internet should be used as a backup link with IPsec (and vice versa).

D.

MPLS meets all these requirements and it is more reliable than using the Internet. It is widely used with defined best practices and an industry standard.

Full Access
Question # 50

An enterprise has identified these causes for inefficient CAPEX spending:

    CAPEX planning is driven by technology and not by business objectives.

    The CAPEX planning team lacks the data it needs to perform due diligence tasks.

    The organizational structure lacks sufficient accountability and incentives.

Which corporate cultural change contributes to improving the effectiveness of CAPEX spending?

A.

Build a financial control function that delivers high-quality reports on operational expenses for business insight and financial reporting.

B.

CxO-level staff must have a full technical understanding but they should not trust their technical leaders fully.

C.

Adopt new organizational models that promote real accountability for ROI, not just revenue, EBITDA, and cash.

D.

Marketing and product management divisions must reduce their CAPEX budgets significantly to drive the change.

Full Access
Question # 51

You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city. OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)

A.

Use a multipoint Metro-E service for router connections

B.

Use a single address per router for all P2P links

C.

Use P2P links between routers in a hub-and-spoke design

D.

Configure address aggregation at each site router

E.

Determine which OSPF routers will be DR/BDR

Full Access
Question # 52

Which two statements about MLD snooping are true? (Choose two)

A.

When MLD snooping is enabled, QoS is automatically enabled

B.

A VLAN can support multiple active MLD snooping queriers, as long as each one is associated to a different multicast group

C.

An MLD snooping querier election occurs when any MLD snooping querier goes down or if there is an IP address change on the active querier

D.

When multiple MLD snooping queriers are enabled in a VLAN, the querier with the lowest IP address in the VLAN is elected as the active MLD snooping querier

Full Access
Question # 53

Refer to the exhibit.

Traffic was equally balanced between Layer 3 links on core switches SW1 and SW2 before an introduction of the new video server in the network. This video server uses multicast to send video streams to hosts and now one of the links between core switches is overutilized. Which design solution solves this issue?

A.

Add more links between core switches.

B.

Aggregate links Layer 2 link aggregation.

C.

Apply a more granular load-balancing method on SW1.

D.

Apply a more granular load-balancing method on SW2.

E.

Filter IGMP joins on an overutilized link.

Full Access
Question # 54

Two routers R1 and R2 are directly connected through an Ethernet link. Both routers are running OSPF over the Ethernet link and OSPF has been registered with BFD. R1 has been set up to transmit BFD at a 50 ms interval, but R2 can receive only at a 100 ms rate due to platform limitations. What does this mean?

A.

After the initial timer exchange, R2 sets its transmission rate to the R1 Desired Min TX interval

B.

After the initial timer exchange, R1 sets its transmission rate to the R2 Required Min RX interval

C.

Timers renegotiate indefinitely, so the timer exchange phase never converges

D.

R2 sets the P-bit on all BFD control packets until R2 sends a packet with the F-bit set

Full Access
Question # 55

Over the years, many solutions have been developed to limit control plane state which reduces the scope or the speed of control plane information propagation. Which solution removes more specific information about a particular destination as topological distance is covered in the network?

A.

Aggregation

B.

Summarization

C.

Back-off timers

D.

Layering

Full Access
Question # 56

While computer networks and sophisticated applications have allowed individuals to be more productive the need to prepare for security threats has increased dramatically A six-step methodology on security incident handling has been adopted by many organizations including service providers enterprises, and government organizations to ensure that organizations are aware of significant security incidents and act quickly to stop the attacker, minimize damage caused, and prevent follow on attacks or similar incidents in the future Drag and drop the actions on the left to the targets on the right in the correct order.

Full Access
Go to page: