Pass the Cisco CCDE v3.0 400-007 Questions and answers with CertsForce

Viewing page 10 out of 11 pages
Viewing questions 91-100 out of questions
Questions # 91:

Company XYZ is designing the network for IPv6 security and they have these design requirements:

    A switch or router must deny access to traffic from sources with addresses that are correct but topologically incorrect.

    Devices must block Neighbor Discovery Protocol resolution for destination addresses not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

Options:

A.

IPv6 DHCP Guard


B.

IPv6 Source Guard


C.

IPv6 Destination Guard


D.

IPv6 Prefix Guard


E.

IPv6 RA Guard


Expert Solution
Questions # 92:

Company XYZ is revisiting the security design for their data center because they now have a requirement to control traffic within a subnet and implement deep packet inspection. Which technology meets the updated requirements and can be incorporated into the design?

Options:

A.

Routed firewall


B.

VLAN ACLs on the switch


C.

Transparent firewall


D.

Zone-based firewall on the Layer 3 device


Expert Solution
Questions # 93:

Refer to the exhibit.

Question # 93

Which impact of using three or more ABRs between the backbone area and area 1 is true?

Options:

A.

In a large-scale network LSA replication by all ABRs can cause serious scalability issues


B.

Multiple ABRs reduce the CPU processing on each ABR due to splitting prefix advertisement


C.

In a large-scale network multiple ABRs can create microloops


D.

Prefixes from the non-backbone area are advertised by one ABR to the backbone


Expert Solution
Questions # 94:

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?

Options:

A.

tail drop


B.

traffic shaping


C.

WRED


D.

traffic policing


Expert Solution
Questions # 95:

Refer to the exhibit.

Question # 95

There are multiple trees in the Cisco FabricPath. All switches in the Layer 2 fabric share the same view of each tree. Which two concepts describe how the multicast traffic is load-balanced across this topology? (Choose two.)

Options:

A.

A specific (S,G) traffic is not load-balanced


B.

All trees are utilized at the same level of the traffic rate


C.

Every leaf node assigns the specific (S,G) to the same tree


D.

A specific (S,G) multicast traffic is load-balanced across all trees due to better link utilization efficiency


E.

The multicast traffic is generally load-balanced across all trees


Expert Solution
Questions # 96:

Network changes due to mergers, acquisitions, and divestitures can be highly disruptive if not carefully planned. When an organization sells part of its business, it must detach those parts of the network with minimal risk and downtime.

Which network design approach is appropriate to minimize the impact and risks as the divested parts of the network are detached?

Options:

A.

Redundant design


B.

Modular design


C.

Less complex design


D.

Routed access design


Expert Solution
Questions # 97:

Refer to the exhibit.

Question # 97

This network is running EIGRP as the routing protocol and the internal networks are being advertised in EIGRP. Based on the link speeds, all traffic between London and Rome is getting propagated via Barcelona and the direct link between London and Rome is not being utilized under normal working circumstances. The EIGRP design should allow for efficiency in the routing table by minimizing the routes being exchanged. The link between London and Rome should be utilized for specific routes. Which two steps accomplish this task? (Choose two.)

Options:

A.

Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes


B.

Filter the routes on the link between London and Barcelona


C.

Filter the routes on the link between London and Rome


D.

Configure route leaking of summary routes on the link between London and Rome


Expert Solution
Questions # 98:

IPFIX data collection via standalone IPFIX probes is an alternative to flow collection from routers and switches. Which use case is suitable for using IPFIX probes?

Options:

A.

performance monitoring


B.

security


C.

observation of critical links


D.

capacity planning


Expert Solution
Questions # 99:

Which service abstracts away the management of the operating system, middleware, and runtime?

Options:

A.

IaaS


B.

PaaS


C.

SaaS


D.

BMaaS


Expert Solution
Questions # 100:

Which two factors provide multifactor authentication for secure access to applications and data? (Choose two.)

Options:

A.

Persona-based


B.

Power-based


C.

Push-based


D.

Possession-based


E.

Pull-based


Expert Solution
Viewing page 10 out of 11 pages
Viewing questions 91-100 out of questions