Looking for more? Click here to get the full PDF with 222+ practice questions for $10 for offline study and deeper preparation.
Question 1
Company XYZ has a multicast domain that spans across multiple autonomous systems. The company wants to choose a technology that provides a simplified and controlled approach to interconnecting the multicast domains. Which technology is the best fit for this purpose?
A. PIM SSM
B. MSDP
C. PIM sparse mode
D. MPLS
Show Answer
Correct Answer:
B. MSDP
Question 2
An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design?
A. posture assessment with remediation VLAN
B. quarantine SGTs
C. dACLs with SGTs
D. quarantine VLAN
Show Answer
Correct Answer:
A. posture assessment with remediation VLAN
Question 3
The Company XYZ network requires OSPF dead neighbor detection in a subsecond manner. However, the company network does not support BFD. Which other feature can be used to fulfill the design requirement?
A. fast hello
B. DPD
C. STP
D. LFA
Show Answer
Correct Answer:
A. fast hello
Question 4
Which two features control multicast traffic in a VLAN environment? (Choose two.)
A. RGMP
B. PIM snooping
C. MLD snooping
D. pruning
E. IGMP snooping
Show Answer
Correct Answer:
C. MLD snooping
E. IGMP snooping
Question 5
Company XYZ is running OSPF in their network. They have merged with another company that is running EIGRP as the routing protocol. Company XYZ now needs the two domains to talk to each other with redundancy, while maintaining a loop free environment. The solution must scale when new networks are added into the network in the near future. Which technology can be used to meet these requirements?
A. single point route-redistribution with route filtering using route tags
B. multipoint route-redistribution with route filtering using ACLs
C. multipoint route-redistribution with route filtering using route tags
D. single point route-redistribution with route filtering using ACLs
Show Answer
Correct Answer:
C. multipoint route-redistribution with route filtering using route tags
Question 6
Company XYZ wants design recommendations for Layer 2 redundancy (using Layer 2 technologies). The company wants to prioritize flexibility and scalability elements in the new design. Which two technologies help meet these requirements? (Choose two.)
A. Configure DHCP snooping on the switches
B. Use switch clustering at the distribution layer where possible
C. Use Unidirectional Link Detection
D. Avoid stretching VLANs across switches
E. Use root guard
Show Answer
Correct Answer:
B. Use switch clustering at the distribution layer where possible
E. Use root guard
Question 7
Which two features describe controller-based networking solutions compared to traditional networking solutions? (Choose two.)
A. inflate licensing costs
B. reduce network configuration complexity
C. provide centralization of primary IT functions
D. allow for fewer network failures
E. increase network bandwidth usage
Show Answer
Correct Answer:
B. reduce network configuration complexity
C. provide centralization of primary IT functions
Question 8
A software-defined networking (SDN) controller learns network topology information by using BGP link-state sessions with the route reflectors of an MPLS-enabled network. The controller then uses the topology information to apply on-demand traffic policies to the network through a protocol that is supported from all Layer 3 routers. Each policy is represented as a RIB entry in the control plane of the router. Which SDN model has been implemented?
A. SDN centralized
B. SDN traffic engineering
C. SD-WAN
D. SDN hybrid
Show Answer
Correct Answer:
D. SDN hybrid
Question 9
Company XYZ is designing the IS-IS deployment strategy for their multiarea IS-IS domain. They want IS-IS neighbor relationships to be minimized on each network segment and want to optimize the size of the IS-IS LSDB on each router. Which can design can be used to meet these requirements?
A. Design all routers as Level 2 routers. Set the links between the routers as Level 1 with the area
B. Design the network so that the routers connecting to other areas are Level 2 routers and internal routers are Level 1
C. Design the network so that all routers are Level 1 routers
D. Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1
Show Answer
Correct Answer:
D. Design the network so that the routers connecting to other areas are Level 1/Level 2 routers and internal routers are Level 1
Question 10
Which relationship between iBGP and the underlying physical topology is true?
A. iBGP full mesh requires an underlying fully meshed network topology
B. iBGP full mesh requirement does not dictate any specific network topology
C. iBGP does not work on a ring network topology even with an underlying IGP
D. iBGP can work only on a ring network topology with a link-state protocol like OSPF or IS-IS
Show Answer
Correct Answer:
B. iBGP full mesh requirement does not dictate any specific network topology
Question 11
Which two actions ensure voice quality in a branch location with a low-speed, high-latency WAN connection? (Choose two.)
A. Prioritize voice packets
B. Replace any electrical links with optical links
C. Increase memory on the branch switch
D. Fragment data packets
E. Increase WAN bandwidth
Show Answer
Correct Answer:
A. Prioritize voice packets
D. Fragment data packets
Question 12
Which two factors must be considered while calculating the RTO? (Choose two.)
A. importance and priority of individual systems
B. steps needed to mitigate or recover from a disaster
C. cost of lost data and operations
D. how often backups are taken and how quickly these can be restored
E. maximum tolerable amount of data loss that the organization can sustain
Show Answer
Correct Answer:
B. steps needed to mitigate or recover from a disaster
D. how often backups are taken and how quickly these can be restored
Question 13
An external edge router provides connectivity from a service provider to an enterprise. Which two Internet edge best practices meet compliance regulations? (Choose two.)
A. Send logs to a centralized logging collection server
B. Implement EBGP to advertise all owned IP blocks
C. Enable and use only secure protocols
D. Implement filtering to control traffic that is sourced from the infrastructure IP space
E. Use login banners and interface access lists to restrict administrative access to the system
Show Answer
Correct Answer:
C. Enable and use only secure protocols
E. Use login banners and interface access lists to restrict administrative access to the system
Question 14
During evaluation of migrating current on-premises infrastructure to add cloud-based infrastructure, a network planning team must meet three core requirements as they make recommendations on which cloud strategy to adopt going forward. • Technology is changing rapidly, therefore the enterprise must be open to adopting new ways of doing things, and be ready to invest CapEx-funds in the next three years. • Network bandwidth capacity requirements are dynamic and are expected to change over the next year. • If new technologies are to be introduced operational expenses must be kept at a minimum. Which cloud strategy meets these requirements?
A. private
B. hybrid
C. public
D. multicloud
Show Answer
Correct Answer:
B. hybrid
Question 15
A banking customer determines that it is operating POS and POI terminals that are noncompliant with PCI DSS requirements, as it is running TLSv1.0. The customer plans to migrate the terminals to TLSv1.2. What are two requirements to complete the migration? (Choose two.)
A. Ensure that strong cryptography is applied for users who have administrative access through networks
B. Apply strong cryptography and security protocols to safeguard sensitive cardholder data
C. Apply strong encryption for transmission of cardholder data across public networks
D. Protect all user systems against malware and frequently update antivirus software
E. Maintain a policy that addresses information security for employees and third parties
Show Answer
Correct Answer:
B. Apply strong cryptography and security protocols to safeguard sensitive cardholder data
C. Apply strong encryption for transmission of cardholder data across public networks
Question 16
What are two descriptions of network optimization? (Choose two.)
A. identify network requirements
B. network redesign
C. proactive network management
D. network health maintenance
E. maintain high availability
Show Answer
Correct Answer:
B. network redesign
C. proactive network management
Question 17
Company XYZ is operating several data centers across the globe to cater to a highly mobile workforce and dynamic workloads. Consider the cost of the connections QoS and latency requirements and the global spread of users. Which cloud connectivity mechanism is the preferred mode of connectivity to public clouds?
A. internet-based direct connect circuits
B. IPsec over internet
C. cloud on-ramp
D. MPLS direct connect
Show Answer
Correct Answer:
C. cloud on-ramp
Question 18
Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?
A. fate sharing
B. OSPF LFA
C. flex links
D. STP
E. BFD
Show Answer
Correct Answer:
B. OSPF LFA
Question 19
Which two technologies enable multilayer segmentation? (Choose two.)
A. firewalls
B. data plane markings
C. filter lists
D. segment routing
E. policy-based routing
Show Answer
Correct Answer:
A. firewalls
B. data plane markings
Question 20
Which project management methodology is characterized by a having a low client involvement?
A. LEAN project management
B. Agile project management
C. traditional project management
D. Kanban project management
Show Answer
Correct Answer:
C. traditional project management
Aced these? Get the Full Exam
Download the complete 400-007 study bundle with 222+ questions in a single printable PDF.