Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Newly Released Cisco 400-007 Exam PDF

Page: 4 / 25
Total 349 questions

Cisco Certified Design Expert (CCDE v3.1) Questions and Answers

Question 13

As part of a new network design documentation, you are required to explain the reason for choosing Cisco FabricPath for Layer 2 loop avoidance.

Which two elements help Cisco FabricPath mitigate Layer 2 loops if they happen in the Layer 2 MP network? (Choose two)

Options:

A.

MAC tunneling

B.

IS-IS multipath

C.

RPF check

D.

TTL header

Question 14

A business customer deploys workloads in the public cloud but now faces governance issues related to IT traffic flow and data security. Which action helps identify the issue for further resolution?

Options:

A.

Set up a secure tunnel from customer routers to protect traffic to cloud providers.

B.

Send IPFIX telemetry data from customer routers to a centralized collector to identify traffic to cloud providers.

C.

Build a zone-based firewall policy on Internet edge firewalls that collects statistics on traffic to cloud providers.

D.

Apply workload policies that dictate security requirements for cloud workloads.

Question 15

Refer to the diagram.

Which solution must be used to send traffic from the foreign wireless LAN controller to the anchor wireless LAN controller?

Options:

A.

Send packets from the foreign controller to the anchor controller via Layer 3 MPLS VPN or VRF-Lite

B.

Send packets without encapsulation to the anchor controller over the routed network.

C.

Encapsulate packets into an EoIP tunnel and send them to the anchor controller.

D.

Send packets from the foreign controller to the anchor controller via IPinIP or IPsec tunnel.

Question 16

An external edge router provides connectivity from a service provider to an enterprise. Which two Internet edge best practices meet compliance regulations? (Choose two)

Options:

A.

Implement filtering to control traffic that is sourced from the infrastructure IP space.

B.

Enable and use only secure protocols.

C.

Send logs to a centralized logging collection server.

D.

Implement EBGP to advertise all owned IP blocks.

E.

Use login banners and interface access lists to restrict administrative access to the system.

Page: 4 / 25
Total 349 questions