Exams > Cisco > 400-007: Cisco Certified Design Expert v3.0
400-007: Cisco Certified Design Expert v3.0
Page 5 out of 14 pages Questions 41-50 out of 137 questions
Question#41

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements in the design.
Which two technologies are recommended? (Choose two.)

  • A. Use BPDU guard.
  • B. Use UniDirectional Link Detection.
  • C. Use root guard.
  • D. Configure DHCP snooping on the switches.
  • E. Design MLAG/MC-LAG into the network wherever possible.
Discover Answer Hide Answer

BE

Question#42

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

  • A. CPU and memory usage on the spoke routers
  • B. memory usage on the hub router
  • C. CPU usage on the hub router
  • D. interface buffers on the hub and spoke routers
Discover Answer Hide Answer

C

Question#43

Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two.)

  • A. small transactions (HTTP-like behavior)
  • B. intolerance to jitter
  • C. tolerance to packet loss
  • D. WRED drop treatment
  • E. TCP-based application
Discover Answer Hide Answer

AB

Question#44

Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?

  • A. weighted random early detection
  • B. weighted fair queuing
  • C. first-in first-out
  • D. low-latency queuing
Discover Answer Hide Answer

D

Question#45

According to the CIA triad principles for network security design, which principle should be priority for a Zero Trust network?

  • A. requirement for data-in-motion encryption and 2FA authentication
  • B. categorization of systems, data, and enterprise BYOD assets that are connected to network zones based on individual privacy needs
  • C. ensuring that authorized users have high-availability system access from defined zones to defined systems or zones
  • D. requirement for data-at-rest encryption for user identification within the VPN termination hardware
Discover Answer Hide Answer

A

Question#46

Company XYZ wants to secure the data plane of their network. Which two technologies can be included in the security design? (Choose two.)

  • A. BEEP
  • B. MPP
  • C. DAI
  • D. IP Source Guard
  • E. CPPr
Discover Answer Hide Answer

CD
Reference:
https://www.ciscopress.com/articles/article.asp?p=2928193&seqNum=4

Question#47

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI data. Which type of security safeguard should be implemented to resolve this issue?

  • A. technical and physical access control
  • B. physical device and media control
  • C. administrative security management processes
  • D. technical integrity and transmission security
Discover Answer Hide Answer

D

Question#48

Which three items do you recommend for control plane hardening of an infrastructure device? (Choose three.)

  • A. SNMPv3
  • B. warning banners
  • C. routing protocol authentication
  • D. redundant AAA servers
  • E. to enable unused services
  • F. Control Plane Policing
Discover Answer Hide Answer

BCF
Reference:
https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc54

Question#49

What is a characteristic of a secure cloud architecture model?

  • A. multi-factor authentication
  • B. limited access to job function
  • C. dedicated and restricted workstations
  • D. software-defined network segmentation
Discover Answer Hide Answer

A

Question#50

DRAG DROP -
Drag and drop the design characteristics from the left onto the correct network filter techniques on the right. Not all options are used.
Select and Place:

Discover Answer Hide Answer


chevron rightPrevious Nextchevron right