Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

400-007 Exam Dumps - Cisco Certified Design Expert (CCDE v3.1)

Go to page:
Question # 73

Which two descriptions of CWDM are true? (Choose two)

A.

typically used over long distances, but requires optical amplification

B.

uses the 850nm band

C.

allows up to 32 optical earners to be multiplexed onto a single fiber

D.

shares the same transmission window as DWDM

E.

Passive CWDM devices require no electrical power

Full Access
Question # 74

Company XYZ is designing their network using the three-layer hierarchical model. At which layer must the QoS design classify or mark the traffic?

A.

access

B.

core

C.

collapsed core

D.

distribution

Full Access
Question # 75

Refer to the exhibit.

Your company designed a network to allow server VLANs to span all access switches in a data center In the design, Layer 3 VLAN interfaces and HSRP are configured on the aggregation switches Which two features improve STP stability within the network design? (Choose two.)

A.

BPDU guard on access ports

B.

BPDU guard on the aggregation switch downlinks toward access switches

C.

root guard on the aggregation switch downlinks toward access switches

D.

root guard on access ports

E.

edge port on access ports

F.

access switch pairs explicitly determined to be root and backup root bridges

Full Access
Question # 76

Company XYZ wants to improve the security design of their network to include protection from reconnaissance and DoS attacks on their sub interfaces destined toward next hop routers. Which technology can be used to prevent these types of attacks?

A.

MPP

B.

CPPr

C.

CoPP

D.

DPP

Full Access
Question # 77

Company XYZ is migrating their existing network to IPv6 and they must plan for Layer 2 and Layer 3 devices Some of the access layer switches do not support IPv6, however, core and distribution switches fully support unicast and multicast routing. The company wants to minimize cost of the migration. Which migration strategy should be used in the design?

A.

The access layer switches must support IGMP snooping at a minimum. Any switches that do not support IGM snooping must be replaced.

B.

Upgrade the nonsupporting switches Otherwise, it will cause an issue with the migration.

C.

Layer 2 switches will not affect the implementation of IPv6. They can be included in the design in their current state.

D.

The access layer switches must support DHCPv6. Any switches that do not support DHCPv6 must be replaced.

Full Access
Question # 78

A multinational enterprise integrates a cloud solution with these objectives

• Achieve seamless connectivity across different countries and regions

• Extend data center and private clouds into public clouds and provider-hosted clouds

What are two outcomes of deploying data centers and fabrics that interconnect different cloud networks? (Choose two.)

A.

enhanced security

B.

data and network ownership

C.

ability to place workloads across clouds

D.

centralized visibility

E.

unidirectional workload mobility across the cloud

Full Access
Question # 79

Which effect of using ingress filtering to prevent spoofed addresses on a network design is true?

A.

It reduces the effectiveness of DDoS attacks when associated with DSCP remarking to Scavenger.

B.

It protects the network Infrastructure against spoofed DDoS attacks.

C.

It Classifies bogon traffic and remarks it with DSCP bulk.

D.

It filters RFC 1918 IP addresses.

Full Access
Question # 80

Which technology is an open-source infrastructure automation tool that automates repetitive tasks for users who work in networks such as cloud provisioning and intraservice orchestration?

A.

Ansible

B.

Contrail

C.

Java

D.

Jinja2

Full Access
Go to page: