Company XYZ wants to redesign the Layer 2 part of their network and wants to use all available uplinks for increased performance. They also want to have end host reachability supporting conversational learning. However, due to design constraints, they cannot implement port-channel on the uplinks. Which other technique can be used to make sure the uplinks are in active/active state?
A. TRILL
B. LISP
C. MSTP
D. switch stack
What is a description of a control plane action?
A. de-encapsulating and re-encapsulating a packet in a data-link frame
B. matching the destination MAC address of an Ethernet frame to the MAC address table
C. matching the destination IP address of an IP packet to the IP routing table
D. hosts locating routers that reside on attached links using the IPv6 Neighbor Discover Protocol
Company ABC uses IPv4-only. Recently they started deploying new endpoint devices. For operational reasons, IPv6 cannot be disabled on these new endpoint devices. Which security measure prevents the new endpoint from learning an IPv6 prefix from an attacker?
A. Source Guard and Prefix Guard
B. Router Advertisement Guard
C. Prefix Guard
D. Secure Neighbor Discovery
Company XYZ needs advice in redesigning their legacy Layer 2 infrastructure. Which technology should be included in the design to minimize or avoid convergence delays due to STP or FHRP and provide a loop-free topology?
A. Use switch clustering in the access layer.
B. Use switch clustering in the core/distribution layer.
C. Use spanning-tree PortFast.
D. Use BFD.
Various teams in different organizations within an enterprise are preparing low-level design documents to capture network parameters using a Waterfall project model:
hardware sizing and power consumption
Layer 2 and layer 3 services parameters
configuration of all control plane protocols
Input from relevant stakeholders was captured at the start of the project, and the project scope has been defined based on the parameters above.
What impact will it have on documentation and project deliverables if the stakeholders ask to have changes carried out in the network before the information has been captured?
A. This provides more opportunity to think outside the box.
B. Rework is expected before the delivery.
C. Significant effort and time are required.
D. This provides a flexible approach to incorporate changes.
The network designer needs to use GLOP IP addresses in order to make them unique within their ASN. Which multicast address range should be used?
A. 232.0.0.0 to 232 255.255.255
B. H233.0.0 0 to 233.255.255 255
C. 239000 to 239255255.255
D. 224000 to 2240.0 255
Your network operations team is deploying Access Control Lists (ACLs) across your Internet gateways They wish to place an ACL inbound on the Internet gateway interface facing the core network (the "trusted" interface). Which IP address would the ACL need for traffic sourced from the inside interface, to match the source address of the traffic?
A. inside global
B. outside global
C. inside local
D. outside local
Which two factors provide multifactor authentication for secure access to applications and data, no matter where the users are or which devices they are on? (Choose two.)
A. persona-based
B. power-based
C. push-based
D. possession-based
E. pull-based
Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements. In the design. Which two technologies are recommended? (Choose two.)
A. Design MLAG/MC-LAG into the network wherever possible.
B. Configure DHCP snooping on the switches.
C. Use root guard.
D. Use BPDU guard.
E. Use UniDirectional Link Detection.
You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs. Which mechanism do you use along with UDLD?
A. Root guard
B. BPDU guard
C. Loop guard
D. BPDU filtering
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 400-007 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.