Cisco 400-007 Real Exam Questions
The questions for 400-007 were last updated at Dec 08,2024.
- Exam Code: 400-007
- Exam Name: Cisco Certified Design Expert
- Certification Provider: Cisco
- Latest update: Dec 08,2024
When an SDN-based model is used to transmit multimedia traffic, which aspect should an architect consider while designing the network?
- A . QoE estimation
- B . security
- C . traffic patterns
- D . flow forwarding
While reviewing an existing network design, you are discussing the characteristics of different STP versions.
Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?
- A . PVRSTP
- B . MST
- C . STP
- D . PVSTP+
As network designer, which option is your main concern with regards to virtualizing multiple network zones into a single hardware device?
- A . Fate sharing
- B . CPU resource allocation
- C . Congestion control
- D . Security
- E . Bandwidth allocation
DRAG DROP
Drag and drop the multicast protocols from the left onto the current design situation on the right.
An existing wireless network was designed to support data traffic only. You must now install context.
Aware services for location tracking changes must be applied to the existing wireless network to increase the location accuracy? (Chose two)
- A . Add access points along the perimeter of the coverage area.
- B . Increase the access point density to create an average inter-access point distance of less than 40 feet or 12.2 meters
- C . Use directional antennas to provide more cell overlapping
- D . Install additional access points in monitor mode where the co-channel interference would otherwise be affected
- E . Fine tune the radio configuration of the access point to have a higher average transmission power to achieve better coverage
Which three components are part of the foundational information security principles of the CIA triad? (Choose three.)
- A . cryptography
- B . confidentiality
- C . C. authorization
- D . identification
- E . integrity
- F . availability
You have been asked to design a remote access VPN solution to support up to 2000 devices. You must ensure that only corporate assets are allowed to connect to the VPN, and users must authenticate to gain access of their based on their user role. Users must use a password that they are already using to access existing applications. A user may not always use the same device to access the VPN.
Which two options combined meet the requirements? (Choose two)
- A . Use local usernames and passwords on the VPN device
- B . Deploy a central authentication directory that users can be authenticated and authorized against
- C . Deploy certificates that are unique to each user
- D . Deploy an IPsec VPN solution
- E . Deploy certificates that are unique to each device
- F . Deploy a SSL VPN solution
Hybrid cloud computing allows organizations to like advantage of public and private cloud models.
Which best practice should organizations follow to ensure data security in the private cloud?
- A . Use standard protocols for data transmission over the network.
- B . Encrypt data when it is at rest and in motion
- C . Communicate all data security risks to customers and end users.
- D . Use standard network protocols for data communication between unsecured network connections.
An international media provider is an early adopter of Docker and micro services and is using an open-source homegrown container orchestration system. A few years ago, they migrated from on-premises data centers to the cloud Now they are faced with challenges related to management of the deployed services with their current homegrown orchestration system.
Which platform is well-suited as a state-aware orchestration system?
- A . Puppet
- B . Kubemetes
- C . Ansible
- D . Terraform
Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides simplified and controlled approach to interconnecting the multicast domains.
Which technology is the best fit for this purpose?
- A . MSDP
- B . PIM SSM
- C . MPLS
- D . PIM sparse mode