Exams > Cisco > 400-007: Cisco Certified Design Expert v3.0
400-007: Cisco Certified Design Expert v3.0
Page 3 out of 14 pages Questions 21-30 out of 137 questions
Question#21


Refer to the exhibit. As part of a redesign project, you must predict multicast behavior. What happens to the multicast traffic received on the shared tree (*, G), if it is received on the LHR interface indicated?

  • A. It is switched due to a successful RPF check against the routing table.
  • B. It is switched given that no RPF check is performed.
  • C. It is dropped due to an unsuccessful RPF check against the multicast receiver.
  • D. It is dropped due to an unsuccessful RPF check against the multicast source.
Discover Answer Hide Answer

B

Question#22


Refer to the exhibit. This network is running legacy STP 802.1d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

  • A. Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802.1d to speed up STP convergence process.
  • B. The max_age and forward delay parameters can be adjusted to speed up STP convergence process.
  • C. The transit_delay=5 and bpdu_delay=20 are recommended values, considering hello_timer=2 and specified diameter.
  • D. Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html

Question#23

Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?

  • A. fate sharing
  • B. OSPF LFA
  • C. flex links
  • D. STP
  • E. BFD
Discover Answer Hide Answer

E

Question#24

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

  • A. scalability
  • B. availability
  • C. serviceability
  • D. integrity
  • E. confidentiality
  • F. reliability
Discover Answer Hide Answer

BDE

Question#25

Which relationship between iBGP and the underlying physical topology is true?

  • A. iBGP full mesh requires an underlying fully meshed network topology.
  • B. iBGP full mesh requirement does not dictate any specific network topology.
  • C. iBGP does not work on a ring network topology even with an underlying IGP.
  • D. iBGP can work only on a ring network topology with a link-state protocol like OSPF or IS-IS.
Discover Answer Hide Answer

A

Question#26

Which two statements describe the hierarchical LAN design model? (Choose two.)

  • A. It is a well-understood architecture that provides scalability.
  • B. It is the best design for modem data centers.
  • C. Changes, upgrades, and new services can be introduced in a controlled and staged manner.
  • D. It is the most optimal design but is highly complex.
  • E. It provides a simplified design.
Discover Answer Hide Answer

AC

Question#27


Refer to the exhibit. An engineer has been asked to redesign the traffic flow toward AS 111 coming from AS 500. Traffic destined to AS 111 network 91.7.0.0/16 should come in via AS 100, while traffic destined to all other networks in AS 111 should continue to use the existing path. Which BGP attributes are best suited to control this inbound traffic coming from BGP AS 500 into the 91.7.0.0/16 network?

  • A. Use local preference on R1 for the networks that AS 500 advertises to AS 111
  • B. Prepend AS path for the 91.7.0.0/16 network and set it for neighbor in AS 200
  • C. Use extended community for the 91.7.0.0/16 network, not advertising it to the bi-lateral peer
  • D. Set higher MED for neighbor in AS 100 to influence incoming traffic for the 91.7.0.0/16 network
Discover Answer Hide Answer

B

Question#28

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

  • A. SaaS
  • B. PaaS
  • C. IaaS
  • D. hybrid cloud
Discover Answer Hide Answer

C

Question#29

How must the queue sizes be designed to ensure that an application functions correctly?

  • A. The default queue sizes are good for any deployment as it compensates the serialization delay.
  • B. The queuing delay on every device in the chain must be exactly the same to the application required delay.
  • C. Each individual device queuing delay in the chain must be less than or equal to the application required delay.
  • D. The sum of the queuing delay of all devices plus serialization delay in the chain must be less than or equal to the application required delay.
Discover Answer Hide Answer

D

Question#30

An enterprise requires MPLS connected branches to access cloud-based Microsoft 365 services over an SD-WAN solution. Internet access is available only at dual regional hub sites that are connected to the MPLS network. Which connectivity method provides an optimum access method to the cloud-based services if one ISP suffers loss or latency?

  • A. Cloud onRamp SWG
  • B. Cloud onRamp
  • C. Cloud onRamp gateway site
  • D. Cloud onRamp SaaS
Discover Answer Hide Answer

C
Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/sd-wan/white_paper-c11-741353.html

chevron rightPrevious Nextchevron right