Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Changed 400-007 Exam Questions

Page: 8 / 25
Total 349 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 29

A service provider recently migrated to an SD-WAN solution for delivering WAN connections to its customers. One of the main challenges with the SD-WAN deployment is that branch site volume increases every year, which causes management complexity. Which action resolves the issue?

Options:

A.

Implement a scalable network management system to manage all sites.

B.

Adopt a well-structured SD-WAN service management lifecycle model.

C.

Build a service orchestration platform on top of the network controller.

D.

Set up a dedicated team to monitor and provision new customers.

Question 30

Retef to the exhibit.

An engineer is designing a multiarea OSPF network for a client who also has a large EIGRP domain. EIGRP routes are getting redistributed into OSPF. OSPF area 20 has routers with limited memory and CPU resources. The engineer wants to block routes from EIGRP 111 from propagating into area 20 and allow EIGRP 222 routes to flow in. Which OSPF area type fulfills this design requirement?

Options:

A.

area 20 as a stub area

B.

type 5 LSA filtering on the ASBR between EIGRP 111 and area 0

C.

area 20 as a NSSA area

D.

type 3 LSA filtering on the ABR between area 0 and area 20

Question 31

Which two statements describe the usage of the IS-IS overload bit technique? (Choose two.)

Options:

A.

If overload-bit is set on a Level 2 intermediate system, the other Level 2 intermediate systems in the topology will stop using the overloaded IS to forward Level 2 traffic. However, the intermediate system can still forward Level 1 traffic.

B.

It can be set in intermediate systems (IS-IS routers) to prioritize control plane CSNP packets.

C.

It can be used to automatically synchronize the link-state database between Level 1 intermediate systems.

D.

It can be set in intermediate systems (IS-IS routers) to avoid traffic black holes until routing protocols are fully converged after a reload operation.

E.

It can be set in intermediate systems (IS-IS routers) to attract transit traffic from other intermediate systems.

Question 32

A network security team uses a purpose-built tool to actively monitor the campus network, applications, and user activity. The team also analyzes enterprise telemetry data from IPFIX data records that are received from devices in the campus network. Which action can be taken based on the augmented data?

Options:

A.

Reduction in time to detect and respond to threats

B.

Integration with an incident response plan

C.

Adoption and improvement of threat-detection response

D.

Asset identification and grouping decisions

Page: 8 / 25
Total 349 questions