Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Cisco CCDE v3.0 400-007 Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

What is a characteristic of a secure cloud architecture model?

Options:

A.

limited access to job function


B.

dedicated and restricted workstations


C.

multi-factor authentication


D.

software-defined network segmentation


Expert Solution
Questions # 32:

Which three tools are used for ongoing monitoring and maintenance of a voice and video environment? (Choose three.)

Options:

A.

flow-based analysis to measure bandwidth mix of applications and their flows


B.

call management analysis to identify network convergence-related failures


C.

call management analysis to identify CAC failures and call quality issues


D.

active monitoring via synthetic probes to measure loss, latency, and jitter


E.

passive monitoring via synthetic probes to measure loss, latency, and jitter


F.

flow-based analysis with PTP time-stamping to measure loss, latency, and jitter


Expert Solution
Questions # 33:

An engineer must redesign the QoS strategy for Company XYZ The current network is experiencing many dropped packets due to oversubscription of the guaranteed bandwidth allocated by the service provider Company XYZ wants a design with a QoS strategy that controls the traffic flow leaving the Edge router to minimize packet drops Which QoS technique can be recommended as a solution?

Options:

A.

LLQ


B.

rate-Limiting


C.

policing


D.

traffic shaping


Expert Solution
Questions # 34:

Most security monitoring systems use a signature-based approach to detect threats. In which two instances are systems based on Network Behavior Anomaly Detection better than signature-based systems when it comes to detecting security threat vectors? (Choose two.)

Options:

A.

encrypted threat traffic


B.

spyware detection


C.

malware detection


D.

new zero-day attacks


E.

intrusion threat detection


Expert Solution
Questions # 35:

A centralized control plane generally means one or more controllers gather the reachability and topology information from each switching device and calculate some part of the forwarding information at some place. How can a centralized control plane be defined or described?

Options:

A.

ability to detect and react to changes remotely at each device


B.

set of processes running in a virtual or physical machine


C.

protocol running on each device


D.

set of algorithms implemented on all devices


Expert Solution
Questions # 36:

A large enterprise cloud design team is evaluating different cloud consumption models What is an example of typical PaaS limitations or concerns that should be considered during service design?

Options:

A.

Vendor lock-in


B.

Runtime issues


C.

Lack of control


D.

Multi-tenant security


Expert Solution
Questions # 37:

The controller has a global view of the network, and it can easily ensure that the network is in a consistent and optimal configuration Which two statements describe a centralized SDN control path? (Choose two.)

Options:

A.

It significantly improves the latency when performing reactive handling of PACKETJN events


B.

A centralized controller can support all southbound APIs, which allows for easy integration with legacy equipment


C.

Integrating smart NIC capabilities on the local host level is made easier through rest APIs


D.

Scaling of the centralized controller cluster is challenging for services like DHCP and load-balancing


E.

It is highly-available by design with no single-point-of-failure risks present


Expert Solution
Questions # 38:

The PaaS model provides customers with a virtualized application development platform without the need for them to furnish hardware or system administration using in-house resources All necessary infrastructure components and application development services are provided and managed by the cloud service provider. Which limitation should be considered when selecting PaaS model?

Options:

A.

loss of customer control


B.

limited customization options


C.

potential network latency


D.

compatibility with existing development environments


Expert Solution
Questions # 39:

Software-defined network and traditional networks might appear the same to the end-user, but behind the scenes, each has unique sets of characteristics. Drag and drop these characteristic found on the left to the corresponding category on the right in no particular order?

Question # 39


Expert Solution
Questions # 40:

An organization is looking to perform a major overhaul on their data center storage infrastructure with a focus on high availability and fault tolerance Which approach will accomplish this?

Options:

A.

Implementing a single storage array with RAID 0 configuration for maximum storage capacity.


B.

Using a clustered storage setup with active-active controllers for load balancing.


C.

Utilizing a distributed storage system with multiple geographically dispersed nodes.


D.

Deploying a storage virtualization solution to aggregate multiple storage devices


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions