Pass the Cisco CCDE v3.0 400-007 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

Question # 31


Expert Solution
Questions # 32:

A company plans to use BFD between its routers to detect a connectivity problem inside the switched network. An IPS is transparently installed between the switches. Which packets should the IPS forward for BFD to work under all circumstances?

Options:

A.

Fragmented packet with the do-not-fragment bit set


B.

IP packets with broadcast IP source addresses


C.

IP packets with the multicast IP source address


D.

IP packet with the multicast IP destination address


E.

IP packets with identical source and destination IP addresses


F.

IP packets with the destination IP address 0.0.0.0.


Expert Solution
Questions # 33:

Which two design solutions ensure sub-50 msec of the convergence time after a link failure in the network? (Choose two)

Options:

A.

BFD


B.

Ti-LFA


C.

Minimal BGP scan time


D.

MPLS-FRR


E.

IGP fast hello


Expert Solution
Questions # 34:

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

Options:

A.

Evaluate bandwidth utilization and connection quality


B.

Enable special requirements such as direct DID lines on pickup


C.

Make recommendations to limit the size of the half-open session table on routers


D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices


Expert Solution
Questions # 35:

Company XYZ is running SNMPv1 in their network and understands that it has some flaws. They want to change the security design to implement SNMPv3 in the network. Which network threat is SNMPv3 effective against?

Options:

A.

Man-in-the-middle attack


B.

Masquerade threats


C.

DDoS attack


D.

Brute force dictionary attack


Expert Solution
Questions # 36:

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

Options:

A.

PIM dense mode with RP located at the hub


B.

PIM sparse mode with RP located at each remote site


C.

PIM sparse mode with RP located at the hub


D.

PIM dense mode with RP located at each remote site


Expert Solution
Questions # 37:

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub-interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

Options:

A.

MPP


B.

CPPr


C.

CoPP


D.

DPP


Expert Solution
Questions # 38:

A European national bank considers migrating its on-premises systems to a private cloud offering in a non-European location to significantly reduce IT costs. What is a primary factor prior to migration?

Options:

A.

data governance


B.

additional latency


C.

security


D.

cloud connectivity


Expert Solution
Questions # 39:

An architect designs a multi-controller network architecture with these requirements:

    Achieve fast failover to control traffic when controllers fail.

    Yield a short distance and high resiliency in the connection between the switches and the controller.

    Reduce connectivity loss and enable smart recovery to improve the SDN survivability.

    Improve connectivity by adding path diversity and capacity awareness for controllers.

Which control plane component of the multi-controller must be built to meet the requirements?

Options:

A.

control node reliability


B.

controller stale consistency


C.

control path reliability


D.

controller clustering


Expert Solution
Questions # 40:

When consumers that leverage IaaS reach 100% resource capacity, what can be used to redirect the overflow of traffic to the public cloud so there is no disruption to service?

Options:

A.

Cloud policing


B.

Cloud spill


C.

Cloud bursting


D.

Cloud shaping


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions