Free 400-007 Exam Braindumps

Pass your Cisco Certified Design Expert (CCDE v3.0) Written Exam exam with these free Questions and Answers

Page 14 of 54
QUESTION 61

Company XYZ has 30 sites using MPLS L3 VPN and the company is now concerned about data integrity. The company wants to redesign the security aspect of their network based on these requirements:
• Securely transfer the corporate data over the private WAN
• Use a centralized configuration model.
• Minimize overhead on the tunneled traffic.
Which technology can be used in the new design to meet the company's requirements?

  1. A. S-VTI
  2. B. DMVPN
  3. C. MGRE
  4. D. GET VPN

Correct Answer: D

QUESTION 62

Company XYZ must design a strategy to protect their routers from DoS attacks, such as traffic destined to the router's own route processor, using separate control plane categories. Which two capabilities can be used to achieve this requirement? (Choose two.)

  1. A. Control Plane Protection using queue thresholding on the transit subinterface
  2. B. Control Plane Protection using port filtering on the transit subinterface
  3. C. Control Plane Protection using port filtering on the main interface
  4. D. Control Plane Protection using queue thresholding on the host subinterface
  5. E. Control Plane Protection using port filtering on the host subinterface

Correct Answer: DE

QUESTION 63

Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

  1. A. confidential
  2. B. serviceability
  3. C. reliability
  4. D. availability
  5. E. integrity
  6. F. scalability

Correct Answer: ADE

QUESTION 64

SDWAN networks capitalize the usage of broadband Internet links over traditional MPLS links to offer more cost benefits to enterprise customers. However, due to the insecure nature of the public Internet, it is mandatory to use encryption of traffic between any two SDWAN edge devices installed behind NAT gateways. Which overlay method can provide optimal transport over unreliable underlay networks that are behind NAT gateways?

  1. A. TLS
  2. B. DTLS
  3. C. IPsec
  4. D. GRE

Correct Answer: C

QUESTION 65

Which two statements explain the operation of BFD asynchronous mode? (Choose two )

  1. A. BFD asynchronous mode with echo packets combines the control packets and echo packets into a single packet.
  2. B. BFD asynchronous mode without echo packets uses control packets, and BFD asynchronous mode with echo packets does not.
  3. C. BFD asynchronous mode with and without echo packets use control packets.
  4. D. BFD asynchronous without echo packets has control packets sent back to the originating router, which echoes the control packet to detect failures.
  5. E. BFD asynchronous mode with echo packets uses separate control packets and echo packets.

Correct Answer: CE

Page 14 of 54

Post your Comments and Discuss Cisco 400-007 exam with other Community members: