Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

400-007 Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Questions 4

Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)

Options:

A.

Fast transport

B.

Reliability

C.

QoS classification and marking boundary

D.

Fault isolation

E.

Redundancy and load balancing

Buy Now
Questions 5

Which statement about hot-potato routing architecture design is true?

Options:

A.

Hot-potato routing is the preferred architecture when connecting to content providers

B.

Hot-potato keeps traffic under the control of the network administrator for longer

C.

OSPF uses hot-potato routing if all ASBRs use the same value for the external metric

D.

Hot-potato routing is prone to misconfiguration as well as poor coordination between two networks

Buy Now
Questions 6

A customer with two 10 Mbps Internet links (active-active) experiences degraded performance when one fails. Static routing is used, and bandwidth upgrades aren't possible. The design must be failure-resistant without increasing CAPEX.

Which solution should be proposed?

Options:

A.

Implement quality of service on the current links

B.

Add a third link to the current router

C.

Add an additional edge router connected to a second ISP

D.

Use dynamic routing for equal-cost multipath

Buy Now
Questions 7

In an OSPF network with routers connected together with Ethernet cabling, which topology typically takes the longest to converge?

Options:

A.

Partial mesh

B.

Full mesh

C.

Ring

D.

Squared

E.

Triangulated

Buy Now
Questions 8

An enterprise wants to migrate an on-premises network to a cloud network, and the design team is finalizing the overall migration process. Drag and drop the options from the left into the correct order on the right.

400-007 Question 8

Options:

Buy Now
Questions 9

You are designing a large-scale DMVPN network with more than 500 spokes using EIGRP as the IGP protocol. Which design option eliminates potential tunnel down events on the spoke routers due to the holding time expiration?

Options:

A.

Increase the hold queue on the physical interface of the hub router

B.

Increase the hold queue on the tunnel interface of the spoke routers

C.

Increase the hold queue on the tunnel interface of the hub router

D.

Apply QoS for pak_priority class

E.

Increase the hold queue on the physical interface of the spoke routers

Buy Now
Questions 10

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

Options:

A.

Reduction in time to detect and respond to threats

B.

Integration with an incident response plan

C.

Adoption and improvement of threat-detection response

D.

Asset identification and grouping decisions

Buy Now
Questions 11

Which mechanism provides Layer 2 fault isolation between data centers?

Options:

A.

FabricPath

B.

OTV

C.

Advanced VPLS

D.

LISP

E.

TRILL

Buy Now
Questions 12

Which solution component helps to achieve comprehensive threat protection and compliance for migration to multicloud SDX architectures?

Options:

A.

System-oriented architecture

B.

OSASE architecture

C.

Platform-oriented architecture

D.

SASE architecture

Buy Now
Questions 13

You are designing a network running both IPv4 and IPv6 to deploy QoS. Which consideration is correct about the QoS for IPv4 and IPv6?

Options:

A.

IPv4 and IPv6 traffic types can use queuing mechanisms such as LLQ, PQ, and CQ.

B.

IPv6 packet classification is only available with process switching, whereas IPv4 packet classification is available with both process switching and CEF.

C.

IPv6 and IPv4 traffic types can use a single QoS policy to match both protocols.

D.

Different congestion management mechanisms need to be used for IPv4 and IPv6 traffic types.

Buy Now
Questions 14

Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?

Options:

A.

Use switch clustering in the access layer.

B.

Use switch clustering in the core/distribution layer.

C.

Use spanning-tree PortFast.

D.

Use BFD.

Buy Now
Questions 15

Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. VRRP is used as the FHRP. They require VLAN extension across access switches in all data centers and plan to purchase a Layer 2 interconnection between two of their data centers in Europe. In the absence of other business or technical constraints, which termination point is optimal for the Layer 2 interconnection?

Options:

A.

At the core layer, to offer the possibility to isolate STP domains

B.

At the access layer because the STP root bridge does not need to align with the VRRP active node

C.

At the core layer because all external connections must terminate there for security reasons

D.

At the aggregation layer because it is the Layer 2 to Layer 3 demarcation point

Buy Now
Questions 16

A customer migrates from a traditional Layer 2 data center network into a new SDN-based spine-and-leaf VXLAN EVPN data center within the same location. The networks are joined to enable host migration at Layer 2. What is the final migration step after hosts have physically migrated to have traffic flowing through the new network without changing any host configuration?

Options:

A.

Shut down legacy Layer 3 SVIs, clear ARP caches on all hosts being migrated, and then configure the legacy VRRP address onto new VXLAN core switches

B.

Increase VRRP priorities on new infrastructure over legacy VRRP values, then shut down legacy SVIs

C.

Shut down legacy infrastructure to allow VXLAN gateways to become active

D.

Shut down legacy Layer 3 SVIs and activate new preconfigured Layer 3 SVIs on VXLAN

Buy Now
Questions 17

In outsourced IT services, the RTO is defined within the SLA. Which two support terms are often included in the SLA by IT and other service providers? (Choose two.)

Options:

A.

Network size and cost

B.

Support availability

C.

Network sustainability

D.

Network reliability

E.

Resolution time

Buy Now
Questions 18

Company XYZ wants to redesign the Layer 2 part of their network to use all uplinks for increased performance, support host reachability with conversational learning, and avoid port-channels. Which other technique can be used?

Options:

A.

TRILL

B.

LISP

C.

MSTP

D.

Switch stack

Buy Now
Questions 19

Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop-free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?

Options:

A.

multipoint route-redistribution with route filtering using ACLs

B.

DUMP multipoint route-redistribution with route filtering using route tags

C.

DUMPS single point route-redistribution with route filtering using route tags

D.

DUMPS single point route-redistribution with route filtering using ACLs

Buy Now
Questions 20

The Company XYZ network is experiencing attacks against their router. Which type of Control Plane Protection must be used on the router to protect all control plane IP traffic that is destined directly for one of the router interfaces?

Options:

A.

Control Plane Protection host subinterface

B.

Control Plane Protection main interface

C.

Control Plane Protection transit subinterface

D.

Control Plane Protection CEF-exception subinterface

Buy Now
Questions 21

Company XYZ is designing the network for IPv6 security and they have these design requirements:

    A switch or router must deny access to traffic from sources with addresses that are correct but topologically incorrect.

    Devices must block Neighbor Discovery Protocol resolution for destination addresses not found in the binding table.

Which two IPv4 security features are recommended for this company? (Choose two)

Options:

A.

IPv6 DHCP Guard

B.

IPv6 Source Guard

C.

IPv6 Destination Guard

D.

IPv6 Prefix Guard

E.

IPv6 RA Guard

Buy Now
Questions 22

You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network. If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?

Options:

A.

map IP CoS bits into the IP Precedence field

B.

map flow-label bits into the Exp field

C.

map IP precedence bits into the DSCP field

D.

map DSCP bits into the Exp field

Buy Now
Questions 23

Drag and drop the QoS technologies from the left onto the correct capabilities on the right

400-007 Question 23

Options:

Buy Now
Questions 24

Company XYZ runs OSPF in their network. A design engineer decides to implement hot-potato routing architecture. How can this implementation be achieved?

Options:

A.

Enable iBGP and apply prepend to ensure all prefixes will have the same length of the AS path attribute value.

B.

Redistribute the external prefixes onto OSPF and ensure the total metric calculation includes only the ext value and the value is the same in all ASBRs.

C.

Enable OSPF load-balancing over unequal cost path.

D.

Redistribute the external prefixes onto OSPF and ensure that the total metric calculation includes external internal values.

Buy Now
Questions 25

You were tasked to enhance the security of a network with these characteristics:

    A pool of servers is accessed by numerous data centers and remote sites

    The servers are accessed via a cluster of firewalls

    The firewalls are configured properly and are not dropping traffic

    The firewalls occasionally cause asymmetric routing of traffic within the server data center.

Which technology should you recommend to enhance security by limiting traffic that could originate from a hacker compromising a workstation and redirecting flows at the servers?

Options:

A.

Poison certain subnets by adding static routes to Null0 on the core switches connected to the pool of servers.

B.

Deploy uRPF strict mode.

C.

Limit sources of traffic that exit the server-facing interface of the firewall cluster with ACLs.

D.

Deploy uRPF loose mode.

Buy Now
Questions 26

An IT service provider is upgrading network infrastructure to comply with PCI security standards. The network team finds that 802.1X and VPN authentication based on locally-significant certificates are not available on some legacy phones. Which workaround solution meets the requirement?

Options:

A.

Replace legacy phones with new phones because the legacy phones will lose trust if the certificate is renewed.

B.

Enable phone VPN authentication based on end-user username and password.

C.

Temporarily allow fallback to TLS 1.0 when using certificates and then upgrade the software on legacy phones.

D.

Use authentication-based clear text password with no EAP-MD5 on the legacy phones.

Buy Now
Questions 27

As part of workspace digitization, a large enterprise has migrated all their users to Desktop as a Service (DaaS), by hosting the backend system in their on-premises data center. Some of the branches have started to experience disconnections to the DaaS at periodic intervals, however, local users in the data center and head office do not experience this behavior. Which technology can be used to mitigate this issue?

Options:

A.

tail drop

B.

traffic shaping

C.

WRED

D.

traffic policing

Buy Now
Questions 28

A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)

Options:

A.

Ensure that strong cryptography is applied for users who have administrative access through networks

B.

Apply strong cryptography and security protocols to safeguard sensitive cardholder data.

C.

Apply strong encryption for transmission of cardholder data across public networks.

D.

Protect all user systems against malware and frequently update antivirus software

E.

Maintain a policy that addresses information security for employees and third parties.

Buy Now
Questions 29

When planning their cloud migration journey, what is crucial for virtually all organizations to perform?

Options:

A.

SASE framework deployment

B.

Optimizing the WAN environment

C.

Assessment of current infrastructure

D.

RPO and RTO calculations duration planning

Buy Now
Questions 30

Which solution component helps to achieve rapid migration to the cloud for SaaS and public cloud leveraging SD-WAN capabilities?

Options:

A.

Service-oriented cloud architecture

B.

Cloud OnRamp

C.

Cloud registry

D.

Microservices in the cloud

Buy Now
Questions 31

Customer XYZ network consists of an MPLS core, IS-IS running as IGP, a pair of BGP route reflectors for route propagation, and a few dozen MPLS-TE tunnels for specific tactical traffic engineering requirements. The customer's engineering department has some questions about the use of the Overload Bit in the IS-IS networks and how it could be used to improve their current network design. Which two concepts about the Overload Bit are true? (Choose two.)

Options:

A.

It can be set on a router during the startup process for a fixed period of time

B.

Networks advertised within the LSPs of the respective node will become unreachable

C.

It forces the midpoint MPLS-TE node to reoptimize the primary tunnels going through the OL node.

D.

It can be set on a router until other interacting protocols have signaled convergence.

E.

It is not recommended on BGP Route Reflectors

Buy Now
Questions 32

Which two design solutions ensure sub-50 msec of the convergence time after a link failure in the network? (Choose two)

Options:

A.

BFD

B.

Ti-LFA

C.

Minimal BGP scan time

D.

MPLS-FRR

E.

IGP fast hello

Buy Now
Questions 33

What is a characteristic of a secure cloud architecture model?

Options:

A.

limited access to job function

B.

dedicated and restricted workstations

C.

multi-factor authentication

D.

software-defined network segmentation

Buy Now
Questions 34

Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)

Options:

A.

Device resiliency

B.

Device type

C.

Network type

D.

Network resiliency

E.

Network size

Buy Now
Questions 35

A business customer deploys workloads in the public cloud but now faces governance issues related to IT traffic flow and data security. Which action helps identify the issue for further resolution?

Options:

A.

Set up a secure tunnel from customer routers to protect traffic to cloud providers.

B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud providers.

C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic to cloud providers.

D.

Apply workload policies that dictate security requirements for cloud workloads.

Buy Now
Questions 36

An enterprise organization currently provides WAN connectivity to their branch sites using MPLS technology, and the enterprise network team is considering rolling out SD-WAN services for all sites.

With regards to the deployment planning, drag and drop the actions from the left onto the corresponding steps on the right.

400-007 Question 36

Options:

Buy Now
Questions 37

A company requires an RPO of less than 10 seconds to ensure business continuity. Which technology should be deployed?

Options:

A.

Geographically dispersed data centers with asynchronous replication

B.

A single data center with duplicated infrastructure, dual PSUs, and a UPS

C.

Geographically dispersed data centers with synchronous replication

D.

A single data center with duplicated infrastructure and dual PSUs

Buy Now
Questions 38

Company XYZ branch offices connect to headquarters using two links, MPLS and Internet. The company wants to design traffic flow so voice traffic uses MPLS and all other traffic uses either link, avoiding process switching. Which technique can be used?

Options:

A.

Policy-based routing

B.

Virtual links

C.

Visualization

D.

Floating static route

Buy Now
Questions 39

An external edge router provides connectivity from a service provider to an enterprise. Which two Internet edge best practices meet compliance regulations? (Choose two)

Options:

A.

Implement filtering to control traffic that is sourced from the infrastructure IP space.

B.

Enable and use only secure protocols.

C.

Send logs to a centralized logging collection server.

D.

Implement EBGP to advertise all owned IP blocks.

E.

Use login banners and interface access lists to restrict administrative access to the system.

Buy Now
Questions 40

Refer to the exhibit.

400-007 Question 40

This network is running EIGRP as the routing protocol and the internal networks are being advertised in EIGRP. Based on the link speeds, all traffic between London and Rome is getting propagated via Barcelona and the direct link between London and Rome is not being utilized under normal working circumstances. The EIGRP design should allow for efficiency in the routing table by minimizing the routes being exchanged. The link between London and Rome should be utilized for specific routes. Which two steps accomplish this task? (Choose two.)

Options:

A.

Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes

B.

Filter the routes on the link between London and Barcelona

C.

Filter the routes on the link between London and Rome

D.

Configure route leaking of summary routes on the link between London and Rome

Buy Now
Questions 41

A financial company requires that a custom TCP-based stock-trading application be prioritized over all other traffic for the business due to the associated revenue. The company also requires that VoIP be prioritized for manual trades. Which directive should be followed when a QoS strategy is developed for the business?

Options:

A.

Allow VoIP and the custom application to share the same priority queue.

B.

The custom application and VoIP must be assigned their own separate priority queue.

C.

Interleave the custom application with other TCP applications in the same CBWFQ.

D.

Avoid placing the custom application in a CBWFQ queue that contains other traffic.

Buy Now
Questions 42

A business requirement stating that failure of WAN access for dual circuits into an MPLS provider for a Data Centre cannot happen due to related service credits that would need to be paid has led to diversely routed circuits to different points of presence on the provider’s network. What should a network designer also consider as part of the requirement?

Options:

A.

Provision of an additional MPLS provider

B.

Out of band access to the MPLS routers

C.

Ensuring all related remote branches are dual-homed to the MPLS network

D.

Dual PSUs & Supervisors on each MPLS router

Buy Now
Questions 43

In a redundant hub-and-spoke design with inter-spoke links, load oscillation and routing instability occur due to overload conditions. Which two design changes improve resiliency? (Choose two)

Options:

A.

Increase the number of redundant paths considered during the routing convergence calculation

B.

Eliminate links between every spoke

C.

Increase routing protocol convergence timers

D.

Increase unequal-cost parallel paths

E.

Use two links to each remote site instead of one

Buy Now
Questions 44

An engineer is designing a DMVPN network where OSPF has been chosen as the routing protocol. A spoke-to-spoke data propagation model must be set up. Which two design considerations must be taken into account? (Choose two)

Options:

A.

Configure all the sites as network type broadcast.

B.

The network type on all sites should be point-to-multipoint.

C.

The network type should be point-to-multipoint for the hub and point-to-point for the spokes.

D.

The hub should be set as the DR by specifying the priority to 255.

E.

The hub should be the DR by changing the priority of the spokes to 0.

Buy Now
Questions 45

A Tier-3 Service Provider is evolving into a Tier-2 Service Provider due to the amount of Enterprise business it is receiving. The network engineers are re-evaluating their IP/MPLS design considerations in order to support duplicate/overlapping IP addressing from their Enterprise customers within each Layer3 VPN. Which concept would need to be reviewed to ensure stability in their network?

Options:

A.

Assigning unique Route Distinguishers

B.

Assigning unique Route Target IDs

C.

Assigning unique IP address space for the Enterprise NAT/Firewalls

D.

Assigning unique VRF IDs to each L3VPN

Buy Now
Questions 46

Drag and drop the correct mitigation methods from the left onto the corresponding types of attack on the right

400-007 Question 46

Options:

Buy Now
Questions 47

Backups and mirror copies of data are part of RPO (Recovery Point Objective) strategies. If a business wants to reduce their CAPEX for disaster recovery, which solution is most applicable?

Options:

A.

Perform an annual cybersecurity assessment or penetration test

B.

Renew backup software annually to get the newest version

C.

Migrate parts of or all the infrastructure to the cloud

D.

Build a redundant infrastructure at another location

Buy Now
Questions 48

An enterprise that runs numerous proprietary applications has major issues with its on-premises server estate hardware, to the point where business-critical functions are compromised. The enterprise accelerates plans to migrate services to the cloud. Which cloud service should be used if the enterprise wants to avoid hardware issues yet have control of its applications and operating system?

Options:

A.

SaaS

B.

PaaS

C.

IaaS

D.

hybrid cloud

Buy Now
Questions 49

Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?

Options:

A.

Ansible

B.

Contrail

C.

Java

D.

Jinja2

Buy Now
Questions 50

A healthcare provider discovers that protected health information of patients was altered without patient consent. The healthcare provider is subject to HIPAA compliance and is required to protect PHI data. Which type of security safeguard should be implemented to resolve this issue?

Options:

A.

technical and physical access control

B.

administrative security management processes

C.

physical device and media control

D.

technical integrity and transmission security

Buy Now
Questions 51

You are using iSCSI to transfer files between a 10 Gigabit Ethernet storage system and a 1 Gigabit Ethernet server. The performance is only approximately 700 Mbps and output drops are occurring on the server switch port. Which action will improve performance in a cost-effective manner?

Options:

A.

Change the protocol to CIFS.

B.

Increase the queue to at least 1 GB

C.

Use a WRED random drop policy

D.

Enable the TCP Nagle algorithm on the receiver

Buy Now
Questions 52

Refer to the exhibit.

400-007 Question 52

An engineer is designing the network for a multihomed customer running in AS 111. The AS does not have any other ASs connected to it. Which technology is more comprehensive to use in the design to make sure that the AS is not being used as a transit AS?

Options:

A.

Configure the AS-set attribute to allow only routes from AS 111 to be propagated to the neighbor ASs.

B.

Use the local preference attribute to configure your AS as a non-transit AS.

C.

Include an AS path access list to send routes to the neighboring ASs that only have AS 111 in the AS path field.

D.

Include a prefix list to only receive routes from neighboring ASs.

Buy Now
Questions 53

When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?

Options:

A.

QoE estimation

B.

Security

C.

Traffic patterns

D.

Flow forwarding

Buy Now
Questions 54

Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network. What should be used in the multicast routing design?

Options:

A.

PIM dense mode with RP located at the hub

B.

PIM sparse mode with RP located at each remote site

C.

PIM sparse mode with RP located at the hub

D.

PIM dense mode with RP located at each remote site

Buy Now
Questions 55

Which design principle improves network resiliency?

Options:

A.

Added load-balancing

B.

Added redundancy

C.

Added confidentiality

D.

Added reliability

Buy Now
Questions 56

What are two descriptions of network optimization? (Choose two.)

Options:

A.

Maintain high availability

B.

Proactive network management

C.

Network redesign

D.

Network health maintenance

E.

Identify network requirements

Buy Now
Questions 57

Refer to the exhibit.

400-007 Question 57

A customer has two eBGP internet links: one primary high-speed (10 Mbps) and one backup low-speed (1 Mbps). The requirement is to use the 10M link (ISP 1) for all inbound/outbound traffic and only use the 1M link (ISP 2) during failure.

What is the correct BGP-based design solution?

Options:

A.

Advertise a higher local preference to ISP 2. Increase the AS PATH inbound from ISP 1

B.

Advertise a longer AS PATH to ISP 2. Increase the MED to ISP 2

C.

Advertise more specific routes to ISP 1. Increase the local preference attribute of inbound BGP from ISP1

D.

Advertise less specific routes to ISP 2. Increase the AS PATH inbound from ISP 1

Buy Now
Questions 58

Refer to the exhibit.

400-007 Question 58

Company XYZ is currently running IPv4 but has decided to start the transition into IPv6. The initial objective is to allow communication based on IPv6 wherever possible, and there should still be support in place for devices that only support IPv4. These devices must be able to communicate to IPv6 devices as well. Which solution must be part of the design?

Options:

A.

Address family translation

B.

Dual stack

C.

Host-to-host tunneling

D.

6rd tunneling

Buy Now
Questions 59

The SD-WAN architecture is composed of separate orchestration, management, control, and data planes. Which activity happens at the orchestration plane?

Options:

A.

Automatic onboarding of the SD-WAN routers into the SD-WAN overlay

B.

Decision-making process on where traffic flows

C.

Packet forwarding

D.

Central configuration and monitoring

Buy Now
Questions 60

You are designing the routing design for two merging companies that have overlapping IP address space. Which of these must you consider when developing the routing and NAT design?

Options:

A.

Local to global NAT translation is done after routing

B.

Global to local NAT translation is done before routing

C.

Local to global NAT translation is done before policy-based routing

D.

Global to local NAT translation is done after policy-based routing

Buy Now
Questions 61

A business requirement is supplied to an architect from a car manufacturer stating their business model is changing to just-in-time manufacturing and a new network is required. The manufacturer does not produce all of the specific components in-house. Which area should the architect focus on initially?

Options:

A.

Automation

B.

Zero Trust Networking

C.

Low Latency Infrastructure

D.

Modularity

Buy Now
Questions 62

Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

Options:

A.

CPU and memory usage on the spoke routers

B.

Memory usage on the hub router

C.

CPU usage on the hub router

D.

Interface buffers on the hub and spoke routers

Buy Now
Questions 63

A key to maintaining a highly available network is building in the appropriate redundancy to protect against failure. This redundancy is carefully balanced with the inherent complexity of redundant systems. Which design consideration is relevant for enterprise WAN use cases when it comes to resiliency?

Options:

A.

Design in a way that expects outages and attacks on the network and its protected resources

B.

The design approach should consider simple and centralized management aspect

C.

Design in a way that it simplifies and improves ease of deployment

D.

Design automation tools wherever it is appropriate for greater visibility

Buy Now
Questions 64

An enterprise plans to evolve from a traditional WAN network to a software-defined WAN network. The existing devices have limited capability when it comes to virtualization. As the migration is carried out, enterprise applications and services must not experience any traffic impact. Which implementation plan can be used to accommodate this during the migration phase?

Options:

A.

Deploy controllers, deploy SD-WAN edge routers in the data center, and migrate branch sites.

B.

Migrate data center WAN routers, migrate branch sites, and deploy SD-WAN edge routers.

C.

Migrate branch sites, migrate data center WAN routers, and deploy controllers.

D.

Deploy SD-WAN edge routers in the data center, deploy controllers, and migrate branch sites.

Buy Now
Questions 65

A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses. Which segmentation method is suitable and scalable for the customer?

Options:

A.

Data center perimeter firewalling

B.

VACLs on data center switches

C.

Transparent firewalling

D.

Routed firewalls

Buy Now
Questions 66

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

Options:

A.

inherent topology flexibility and service protection provided without penalty through intelligent oversubscription of bandwidth reservation

B.

ability to expand bandwidth over existing optical infrastructure

C.

inherent topology flexibility with built-in service protection

D.

inherent topology flexibility with intelligent chromatic dispersion

E.

inherent topology flexibility with service protection provided through a direct integration with an upper layer protocol

Buy Now
Questions 67

Which feature must be part of the network design to wait a predetermined amount of time before notifying the routing protocol of a change in the path in the network?

Options:

A.

Transmit delay

B.

Throttle timer

C.

SPF hold time

D.

Interface dampening

Buy Now
Questions 68

The Layer 3 control plane steers traffic toward destinations. Which two techniques offer a more dynamic, flexible, controlled, and secure control plane design in service provider networks? (Choose two.)

Options:

A.

Access control lists

B.

Firewalls

C.

QoS policy propagation with BGP

D.

Remote black-holing trigger

E.

Prefix lists

Buy Now
Questions 69

With virtualization applied throughout the network, every physical link may carry one or more virtual links. What is a key drawback of this?

Options:

A.

Unneeded tunneling

B.

Fate sharing

C.

Bandwidth utilization

D.

Serialization delay

Buy Now
Questions 70

An architect designs a multi-controller network architecture with these requirements:

    Achieve fast failover to control traffic when controllers fail.

    Yield a short distance and high resiliency in the connection between the switches and the controller.

    Reduce connectivity loss and enable smart recovery to improve the SDN survivability.

    Improve connectivity by adding path diversity and capacity awareness for controllers.

Which control plane component of the multi-controller must be built to meet the requirements?

Options:

A.

control node reliability

B.

controller stale consistency

C.

control path reliability

D.

controller clustering

Buy Now
Questions 71

During a pre-sales meeting with a potential customer, the customer CTO asks a question about advantages of controller-based networks versus a traditional network. What are two advantages to mention? (Choose two)

Options:

A.

Per device forwarding tables

B.

Programmatic APIs available per device

C.

Abstraction of individual network devices

D.

Distributed control plane

E.

Consistent device configuration

Buy Now
Questions 72

Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants a simplified and controlled approach to interconnecting multicast domains. Which technology is the best fit?

Options:

A.

MSDP

B.

PIM SSM

C.

MPLS

D.

PIM sparse mode

Buy Now
Questions 73

Which option is a fate-sharing characteristic in regards to network design?

Options:

A.

A failure of a single element causes the entire service to fail

B.

It protects the network against failures in the distribution layer

C.

It acts as a stateful forwarding device

D.

It provides data sequencing and acknowledgment mechanisms

Buy Now
Questions 74

An enterprise solution team is analyzing multilayer architecture and multicontroller SDN solutions for multisite deployments. The analysis focuses on the ability to run tasks on any controller via a standardized interface. Which requirement addresses this ability on a multicontroller platform?

Options:

A.

Deploy a root controller to gather a complete network-level view.

B.

Use the East-West API to facilitate replication between controllers within a cluster.

C.

Build direct physical connectivity between different controllers.

D.

Use OpenFlow to implement and adapt new protocols.

Buy Now
Questions 75

An engineer is designing the QoS strategy for Company XYZ. A lot of scavenger traffic is traversing the 20Mb Internet link. The new design must limit scavenger traffic to 2 Mbps to avoid oversubscription during congestion. Which QoS technique can be used?

Options:

A.

Class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

Class-based traffic shaping

Buy Now
Questions 76

A software-defined networking (SDN) controller learns network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers. Each policy is represented as a RIB entry in the control plane of the router. Which SDN model has been implemented?

Options:

A.

SDN centralized

B.

SDN traffic engineering

C.

SD-WAN

D.

SDN hybrid

Buy Now
Questions 77

The network team in XYZ Corp wants to modernize their infrastructure and is evaluating an implementation and migration plan to allow integration MPLS-based, Layer 2 Ethernet services managed by a service provider to connect branches and remote offices. To decrease OpEx and improve

response times when network components fail, XYZ Corp decided to acquire and deploy new routers. The network currently is operated over E1 leased lines (2 Mbps) with a managed CE service provided by the telco.

Drag and drop the implementation steps from the left onto the corresponding targets on the right in the correct order.

400-007 Question 77

Options:

Buy Now
Questions 78

Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)

Options:

A.

Cryptography

B.

Confidentiality

C.

Authorization

D.

Identification

E.

Integrity

F.

Availability

Buy Now
Questions 79

An existing wireless network was designed to support data traffic only. You must now install context-aware services for location tracking. What changes must be applied to the existing wireless network to increase the location accuracy? (Choose two)

Options:

A.

Add access points along the perimeter of the coverage area.

B.

Increase the access point density to create an average inter-access point distance of less than 40 feet or 12.2 meters.

C.

Use directional antennas to provide more cell overlapping.

D.

Install additional access points in monitor mode where the co-channel interference would otherwise be affected.

E.

Fine tune the radio configuration of the access point to have a higher average transmission power to achieve better coverage.

Buy Now
Questions 80

Which parameter is the most important factor to consider when deciding service placement in a cloud solution?

Options:

A.

Data replication cost

B.

Application structure

C.

Security framework implementation time

D.

Data confidentiality rules

Buy Now
Questions 81

Agile and Waterfall are two popular methods for organizing projects. What describes any Agile network design development process?

Options:

A.

Working design over comprehensive documentation

B.

Contract negotiation over customer collaboration

C.

Following a plan over responding to change

D.

Processes and tools over individuals and interactions over time

Buy Now
Questions 82

Which action must be taken before new VoIP systems are implemented on a network to ensure that the network is ready to handle the traffic?

Options:

A.

Evaluate bandwidth utilization and connection quality

B.

Enable special requirements such as direct DID lines on pickup

C.

Make recommendations to limit the size of the half-open session table on routers

D.

Check if anomaly detection is enabled for SIP and H.323 on Layer 3 devices

Buy Now
Questions 83

Which two data plane hardening techniques are true? (Choose two)

Options:

A.

warning banners

B.

redundant AAA servers

C.

Control Plane Policing

D.

SNMPv3

E.

infrastructure ACLs

F.

disable unused services

G.

routing protocol authentication

Buy Now
Questions 84

Drag and drop the FCAPS network management reference models from the left onto the correct definitions on the right.

400-007 Question 84

Options:

Buy Now
Questions 85

You have been asked to design a high-density wireless network for a university campus. Which two principles would you apply in order to maximize the wireless network capacity? (Choose two.)

Options:

A.

Implement a four-channel design on 2.4 GHz to increase the number of available channels

B.

Choose a high minimum data rate to reduce the duty cycle.

C.

Increases the number of SSIDs to load-balance the client traffic.

D.

Make use of the 5-GHz band to reduce the spectrum utilization on 2.4 GHz when dual-band clients are used.

E.

Enable 802.11n channel bonding on both 2.4 GHz and 5 GHz to increase the maximum aggregated cell throughput.

Buy Now
Questions 86

Which two protocols are used by SDN controllers to communicate with switches and routers? (Choose two.)

Options:

A.

OpenFlash

B.

OpenFlow

C.

NetFlash

D.

Open vSwitch Database

E.

NetFlow

Buy Now
Questions 87

You are designing a network for a branch office. In order to improve convergence time, you are required to use the BFD feature. Which four routing protocols can you use to facilitate this? (Choose four.)

Options:

A.

IS-IS

B.

static

C.

RIP

D.

EIGRP

E.

BGP

Buy Now
Questions 88

Refer to the exhibit.

400-007 Question 88

A company named XYZ needs to apply security policies for end-user browsing by installing a secure web proxy appliance. All the web traffic must be inspected by the appliance, and the remaining traffic must be inspected by an NGFW that has been upgraded with intrusion prevention system functionality. In which two ways must the routing be performed? (Choose two)

Options:

A.

Policy-based routing on the collapsed core

B.

Policy-based routing on the internet edge

C.

Policy-based routing on firewalls

D.

Static routing on the appliance

Buy Now
Questions 89

400-007 Question 89

Refer to the exhibit. An architect must design an enterprise WAN that connects the headquarters with 22 branch offices. The number of remote sites is expected to triple in the next three years. The final solution must comply with these requirements:

    Only the loopback address of each of the enterprise CE X and Y routers must be advertised to the interconnecting service provider cloud network.

    The transport layer must carry the VPNv4 label and VPN payload over the MP-BGP control plane.

    The transport layer must not be under service provider control.

Which enterprise WAN transport virtualization technique meets the requirements?

Options:

A.

EIGRP Over the Top

B.

MPLS over BGP over multipoint GRE

C.

DMVPN per VRF

D.

Point-to-point GRE per VRF

Buy Now
Questions 90

Which two aspects are considered when designing a dual hub dual DMVPN cloud topology? (Choose two.)

Options:

A.

will only work with single-tier headend architecture

B.

hub sites must connect to both DMVPN clouds

C.

recommended for high availability

D.

spoke-to-spoke traffic will transit the hub unless spokes exchange dynamic routing directly

E.

requires all sites to have dual Internet connections

Buy Now
Questions 91

You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?

Options:

A.

Root guard

B.

BPDU guard

C.

Loop guard

D.

BPDU filtering

Buy Now
Questions 92

Which two actions must merchants do to be compliant with the Payment Card Industry Data Security Standard (PCI DSS)? (Choose two.)

Options:

A.

Conduct risk analyses

B.

Install firewalls

C.

Use antivirus software

D.

Establish monitoring policies

E.

Establish risk management policies

Buy Now
Questions 93

You are designing a new Ethernet-based metro-area network for an enterprise customer to connect 50 sites within the same city. OSPF will be the routing protocol used. The customer is primarily concerned with IPv4 address conservation and convergence time. Which two combined actions do you recommend? (Choose two)

Options:

A.

Use a multipoint Metro-E service for router connections

B.

Use a single address per router for all P2P links

C.

Use P2P links between routers in a hub-and-spoke design

D.

Configure address aggregation at each site router

E.

Determine which OSPF routers will be DR/BDR

Buy Now
Questions 94

Which design benefit of PortFast is true?

Options:

A.

PortFast does not generate a spanning tree topology change when a station on a port is connected or disconnected

B.

PortFast disables spanning tree on the port, which puts the port into the forwarding state immediately after it is connected

C.

PortFast allows small, unmanaged switches to be plugged into ports of access switches without risking switch loops

D.

PortFast detects one-way communications on the physical port, which prevents switch loops

E.

PortFast prevents switch loops that are caused by a unidirectional point-to-point link condition on Rapid PVST+ and MST

F.

PortFast prevents switched traffic from traversing suboptimal paths on the network

Buy Now
Questions 95

Which two characteristics are associated with 802.1s? (Choose two)

Options:

A.

802.1s supports up to 1024 instances of 802.1

B.

802.1s is a Cisco enhancement to 802.1w.

C.

802.1s provides for faster convergence over 802.1D and PVST+.

D.

CPU and memory requirements are the highest of all spanning-tree STP implementations.

E.

802.1s maps multiple VLANs to the same spanning-tree instance.

Buy Now
Questions 96

A product manufacturing organization is integrating cloud services into their IT solution. The IT team is working on the preparation phase of the implementation approach, which includes the Define Strategy step. This step defines the scope of IT, the application, and the service. What is one topic that should be considered in the Define Strategy step?

Options:

A.

Financial and governance models

B.

Innovate and align with business according to volume

C.

Due diligence and financial scenarios

D.

Contingency exit strategy steps

Buy Now
Questions 97

Which best practice ensures data security in the private cloud?

Options:

A.

Use IPsec for communication between unsecured network connection

B.

Encrypt data at rest and in transition.

C.

Use the same vendor for consistent encryption.

D.

Anonymize data ownership to comply with privacy rules.

Buy Now
Questions 98

A customer asks you to perform a high-level review of their upcoming WAN refresh for remote sites. The review is specially focused on their retail store operations consisting of 500+ locations connected via multipoint IPsec VPN solution. Which routing protocol would be valid but would also be the most restrictive for the expansion of this deployment model?

Options:

A.

EIGRP

B.

IS-IS

C.

OSPF

D.

BGP

Buy Now
Questions 99

Which development model is closely associated with traditional project management?

Options:

A.

Static model

B.

Agile model

C.

Evolutionary delivery model

D.

Lifecycle model

Buy Now
Questions 100

Which technology supports antispoofing and does not have any impact on encryption performance regardless of packet size?

Options:

A.

MACsec

B.

IP source guard

C.

DHCP snooping with DAI

D.

IPsec

Buy Now
Questions 101

Which two characteristics apply to firewall transparent mode operations in a firewall solution design? (Choose two.)

Options:

A.

Changes in the existing IP addressing and subnets are required

B.

The firewall can participate actively on spanning tree.

C.

Multicast traffic can traverse the firewall.

D.

OSPF adjacencies can be established through the firewall

E.

The firewall acts like a router hop in the network.

Buy Now
Questions 102

Company XYZ network runs IPv4 and IPv6 and they want to introduce a multidomain, multicast-based network. The new design should use a flavor of PIM that forwards traffic using SPT. Which technology meets this requirement?

Options:

A.

PIM-DM

B.

PIM-SM

C.

PIM-SSM

D.

BIDIR-PIM

Buy Now
Questions 103

Which relationship between IBGP and the underlying physical topology is true?

Options:

A.

iBGP full mesh requirement does not dictate any specific network topology.

B.

iBGP can work only on a ring network topology with a link-state protocol like OSPF or IS-IS.

C.

iBGP full mesh requires an underlying fully meshed network topology.

D.

iBGP does not work on a ring network topology even with an underlying IGP.

Buy Now
Questions 104

What is a disadvantage of the traditional three-tier architecture model when east-west traffic between different pods must go through the distribution and core layers?

Options:

A.

Low bandwidth

B.

Security

C.

Scalability

D.

High latency

Buy Now
Exam Code: 400-007
Exam Name: Cisco Certified Design Expert (CCDE v3.1)
Last Update: Oct 15, 2025
Questions: 349

PDF + Testing Engine

$599

Testing Engine

$449

PDF (Q&A)

$399