Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Changed 400-007 Exam Questions

Page: 8 / 30
Total 396 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 29

An engineer is designing the QoS strategy for Company XYZ. Based on initial analysis, a lot of scavenger type of traffic is traversing the network's 20Mb Internet link toward the service provider. The new design must use a QoS technique that limits scavenger traffic to 2 Mbps, which helps avoid oversubscription of the link during times of congestion. Which QoS technique can be used to facilitate this requirement?

Options:

A.

class-based traffic policing

B.

LLQ

C.

CBWFQ

D.

class-based traffic shaping

Question 30

Which two application requirements are mandatory tor traffic to receive proper treatment when placed in the priority queue? (Choose two.)

Options:

A.

small transactions (HTTP-like behavior)

B.

WRED drop treatment

C.

tolerance to packet loss

D.

intolerance to jitter

E.

TCP-based application

Question 31

An Agile for Infrastructure transition often means dismantling traditional IT hierarchies and rebuilding it to align with business objectives and workflows Organizations are seeing the benefits of using automation tools in the network such as faster more efficient more effective delivery of products and services. Which two components help increasing overall productivity and improve company culture? (Choose two.)

dedicated infrastructure

Options:

A.

Agile code practices

B.

infra structure-as-code

C.

controlled infrastructure

D.

DevOps practices

Question 32

An IT services company offers cloud services to a banking customer. The banking customer has raised a ticket about unauthorized access and data loss. They use an authentication token on a mobile phone for authenticating access to the cloud platform from their local applications. The security response team has determined that the attacker used a phishing scheme in an effort to replace the token allowing them to direct the banking data to which policy change can help prevent identical situations in the future ?

Options:

A.

Monitor connections to unknown cloud instances through the use of SSL decryption

B.

Monitor all API interfacing to the storage platform for suspicious activity

C.

Monitor any access from the outside except for expected operational areas of an organization

D.

Monitor the privileges for users that are making changes in the firewall configuration.

Page: 8 / 30
Total 396 questions