Free 400-007 Exam Braindumps (page: 16)

Page 16 of 73



Refer to the exhibit. As part of a redesign project, you must predict multicast behavior. What happens to the multicast traffic received on the shared tree (*, G), if it is received on the LHR interface indicated?

  1. It is switched due to a successful RPF check against the routing table.
  2. It is switched given that no RPF check is performed.
  3. It is dropped due to an unsuccessful RPF check against the multicast receiver.
  4. It is dropped due to an unsuccessful RPF check against the multicast source.

Answer(s): B





Refer to the exhibit. This network is running legacy STP 802.1d. Assuming "hello_timer" is fixed to 2 seconds, which parameters can be modified to speed up convergence times after single link/node failure?

  1. Only the maximum_transmission_halt_delay and diameter parameters are configurable parameters in 802.1d to speed up STP convergence process.
  2. The max_age and forward delay parameters can be adjusted to speed up STP convergence process.
  3. The transit_delay=5 and bpdu_delay=20 are recommended values, considering hello_timer=2 and specified diameter.
  4. Only the transit_delay and bpdu_delay timers are configurable parameters in 802.1d to speed up STP convergence process.

Answer(s): B


Reference:

https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html



Company XYZ is running a redundant private WAN network using OSPF as the underlay protocol. The current design accommodates for redundancy in the network, but it is taking over 30 seconds for the network to reconverge upon failure. Which technique can be implemented in the design to detect such a failure in a subsecond?

  1. fate sharing
  2. OSPF LFA
  3. flex links
  4. STP
  5. BFD

Answer(s): E

Explanation:

BFD (Bidirectional Forwarding Detection) is a protocol that can be used to detect link failures in a subsecond. BFD works by sending periodic hello packets between two devices. If a device does not receive a hello packet from its neighbor within a predetermined time period, it will declare the link down.

The other options are not as effective for detecting link failures in a subsecond. Option A, fate sharing, is a technique that can be used to improve the reliability of a network by ensuring that two devices share the same fate. However, fate sharing does not help to detect link failures in a subsecond. Option B, OSPF LFA, is a technique that can be used to provide loop-free alternate paths in OSPF networks. However, OSPF LFA does not help to detect link failures in a subsecond. Option C, flex links, is a technique that can be used to increase the flexibility of a network by allowing links to be used for multiple purposes. However, flex links do not help to detect link failures in a subsecond. Option D, STP, is a protocol that can be used to prevent loops in Layer 2 networks. However, STP does not help to detect link failures in a subsecond.

Therefore, the best technique for detecting link failures in a subsecond in a redundant private WAN network using OSPF as the underlay protocol is BFD.

Here are some additional reasons why BFD is a good choice:

-BFD is a simple protocol that is easy to configure and manage.
-BFD is supported by most major operating systems and network devices.
-BFD can be used to detect link failures in a subsecond, which can help to improve the reliability of the network.
-



Which three elements help network designers to construct secure systems that protect information and resources (such as devices, communication, and data) from unauthorized access, modification, inspection, or destruction? (Choose three.)

  1. scalability
  2. availability
  3. serviceability
  4. integrity
  5. confidentiality
  6. reliability

Answer(s): B,D,E

Explanation:

-Confidentiality refers to the protection of information from unauthorized access. This can be achieved through the use of encryption, access control lists, and other security measures.
-Integrity refers to the protection of information from unauthorized modification. This can be achieved through the use of checksums, digital signatures, and other security measures.
-Availability refers to the assurance that information and resources are available to authorized users when they need them. This can be achieved through the use of fault-tolerant systems, load balancing, and other security measures.
-



Page 16 of 73



Post your Comments and Discuss Cisco® 400-007 exam with other Community members:

RLCCIRCUIT commented on July 15, 2024
I passed the exam with 848 on 12th July. This dump covers most of the questions, I only met 4 new ones. Thanks very much. I will get other exam dumps here.
UNITED STATES
upvote