Pass the Cisco CCDE v3.0 400-007 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?

Options:

A.

Ansible


B.

Contrail


C.

Java


D.

Jinja2


Expert Solution
Questions # 22:

Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?

Options:

A.

weighted fair queuing


B.

weighted random early detection


C.

low-latency queuing


D.

first-in first-out


Expert Solution
Questions # 23:

Which statement about hot-potato routing architecture design is true?

Options:

A.

Hot-potato routing is the preferred architecture when connecting to content providers


B.

Hot-potato keeps traffic under the control of the network administrator for longer


C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric


D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks


Expert Solution
Questions # 24:

You are a network designer and you must ensure that the network you design is secure. How do you plan to prevent infected devices on your network from sourcing random DDoS attacks using forged source addresses?

Options:

A.

ACL-based forwarding


B.

Unicast RPF loose mode


C.

Unicast RPF strict mode


D.

ACL filtering by destination


Expert Solution
Questions # 25:

Refer to the exhibit.

Question # 25

An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500. Traffic destined to AS 111 network 91.7.0.0/16 should come in via AS 100, while traffic destined to all other networks in AS 111 should continue to use the existing path. Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 into the 91.7.0.0/16 network?

Options:

A.

Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200.


B.

Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer.


C.

Use local preference on R1 for the networks that AS 500 advertises to AS 111.


D.

Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91.7.0.0/16 network.


Expert Solution
Questions # 26:

The line between security and compliance is easily blurred and is, to a large extent, a moving target Drag and drop each of the requirements on the left to the appropriate section on the right

Question # 26


Expert Solution
Questions # 27:

Which two control plane policer designs must be considered to achieve high availability? (Choose two.)

Options:

A.

Control plane policers are enforced in hardware to protect the software path, but they are hardware platform dependent in terms of classification ability.


B.

Control plane policers are really needed only on externally facing devices.


C.

Control plane policers can cause the network management systems to create false alarms.


D.

Control plane policers must be processed before a forwarding decision is made.


E.

Control plane policers require that adequate protocol overheads are factored in to allow protocol convergence.


Expert Solution
Questions # 28:

You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication. Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)

Options:

A.

DWDM


B.

EoMPLS


C.

SONET/SDH


D.

Multichassis EtherChannel over Pseudowire


E.

VPLS


Expert Solution
Questions # 29:

An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones. Which workaround solution meets the requirement?

Options:

A.

Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.


B.

Enable phone VPN authentication based on end-user username and password.


C.

Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.


D.

Use authentication-based clear text password with no EAP-MD5 on the legacy phones.


Expert Solution
Questions # 30:

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

Question # 30


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions