Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

400-007 Exam Dumps - Cisco Certified Design Expert (CCDE v3.1)

Go to page:
Question # 65

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

A.

access

B.

core

C.

collapsed core

D.

distribution

Full Access
Question # 66

Company XYZ is migrating their existing network to IPv6 and they must plan for Layer 2 and Layer 3 devices Some of the access layer switches do not support IPv6, however, core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used in the design?

A.

The access layer switches must support IGMP snooping at a minimum. Any switches that do not support IGM snooping must be replaced.

B.

Upgrade the nonsupporting switches Otherwise, it will cause an issue with the migration.

C.

Layer 2 switches will not affect the implementation of IPv6. They can be included in the design in their current state.

D.

The access layer switches must support DHCPv6. Any switches that do not support DHCPv6 must be replaced.

Full Access
Question # 67

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

A.

map IP CoS bits into the IP Precedence field

B.

map flow-label bits into the Exp field

C.

map IP precedence bits into the DSCP field

D.

map DSCP bits into the Exp field

Full Access
Question # 68

Company XYZis redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?

A.

weighted fair queuing

B.

weighted random early detection

C.

low-latency queuing

D.

first-in first-out

Full Access
Question # 69

One of the approaches used in cloud bursting scenarios is distributed load-balanced, which operate the workloads in tandem between a public cloud and a data center In which way can the characteristics of distributed load-balancing be described?

A.

Simultaneously provisions cloud resources

B.

Usually uses cloud APIs for communication.

C.

Useful for testing and proof-of-concept projects

D.

Useful for large but temporary cloud deployments

Full Access
Question # 70

A company created an IPv6 adoption plan for its campus network that requires dual-stack connectivity on the network Campus users must have IPv6 connectivity to an HR management application which is the first IPv6-only application hosted in the company s data center. Which two security mechanisms can be used to prevent a malicious user from masquerading as the IPv6 gateway? (Choose two)

A.

IPv6 RA guard

B.

IPv6 snooping

C.

IPv6 device tracking

D.

IPv6 address glean

E.

port ACLs

Full Access
Question # 71

Company XYZ was not satisfied with the reconvergence time OSPF is taking. BFD was implemented to try to reduce the reconvergence time, but the network is still experiencing delays when having to reconverge. Which technology will improve the design?

A.

OSPF fast hellos

B.

BFD echo

C.

Change the protocol to BGP

D.

Change the OSPF hello and dead intervals

Full Access
Question # 72

Refer to the exhibit.

As part of a redesign project, you must predict multicast behavior What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated*?

A.

It is dropped due to an unsuccessful RPF check against the multicast source

B.

It is switched give that no RPF check is performed

C.

It is switched due to a successful RPF check against the routing table

D.

It is dropped due to an unsuccessful RPk8t8ck against the multicast receiver.

Full Access
Go to page: