Free 400-007 Exam Braindumps (page: 22)

Page 21 of 74

Company XYZ asks for design recommendations for Layer 2 redundancy. The company wants to prioritize fast convergence and resiliency elements in the design. Which two technologies are recommended? (Choose two.)

  1. Use BPDU guard.
  2. Use UniDirectional Link Detection.
  3. Use root guard.
  4. Configure DHCP snooping on the switches.
  5. Design MLAG/MC-LAG into the network wherever possible.

Answer(s): B,E

Explanation:

MLAG/MC-LAG is a Layer 2 redundancy mechanism that allows two or more switches to be paired together to form a single logical switch. This provides redundancy in the event that one of the switches fails. MLAG/MC-LAG also provides fast convergence, as traffic can be quickly rerouted to the remaining switch in the pair.
UDLD is a Layer 2 protocol that can be used to detect unidirectional links. A unidirectional link is a link where traffic can only be transmitted in one direction. If a unidirectional link is detected, UDLD can be used to shut down the link to prevent traffic from looping. This can help to improve network convergence and resiliency.
The other options are not as effective for Layer 2 redundancy in this scenario.

BPDU guard and root guard are Layer 2 security features that can be used to prevent unauthorized switches from becoming the root bridge in a spanning tree network. However, they do not provide redundancy in the event of a switch failure.
DHCP snooping is a Layer 2 security feature that can be used to prevent unauthorized DHCP servers from providing DHCP addresses to devices on the network. However, it does not provide redundancy in the event of a switch failure.
Therefore, the correct answers are E and B.

Here are some additional reasons why these two technologies are effective:

-MLAG/MC-LAG is a scalable and efficient redundancy mechanism.
-UDLD is a simple and effective way to detect unidirectional links.
-



Company XYZ has a hub-and-spoke topology over an SP-managed infrastructure. To measure traffic performance metrics, they implemented IP SLA senders on all spoke CE routers and an IP SLA responder on the hub CE router. What must they monitor to have visibility on the potential performance impact due to the constantly increasing number of spoke sites?

  1. CPU and memory usage on the spoke routers
  2. memory usage on the hub router
  3. CPU usage on the hub router
  4. interface buffers on the hub and spoke routers

Answer(s): C

Explanation:

As the number of spoke sites increases, the amount of traffic flowing through the hub router will also increase. This can put a strain on the CPU of the hub router, which could lead to performance degradation. Therefore, it is important to monitor the CPU usage of the hub router to ensure that it does not exceed acceptable levels.

The other options are not as important as CPU usage. The CPU usage of the spoke routers is less likely to be affected by the increasing number of spoke sites, and the memory usage of both the hub and spoke routers is less likely to be a bottleneck. The interface buffers on the hub and spoke routers are also less likely to be a problem, as they are typically sized to accommodate the expected traffic load.



Which two application requirements are mandatory for traffic to receive proper treatment when placed in the priority queue? (Choose two.)

  1. small transactions (HTTP-like behavior)
  2. intolerance to jitter
  3. tolerance to packet loss
  4. WRED drop treatment
  5. TCP-based application

Answer(s): A,B

Explanation:

Priority queues are used to prioritize traffic that is intolerant to jitter and latency. This type of traffic typically consists of small transactions, such as HTTP requests. HTTP requests are typically very short, and they are not tolerant to delays or jitter. If these requests are not prioritized, they can experience significant delays, which can lead to a poor user experience.

The other options are not mandatory for traffic to receive proper treatment when placed in the priority queue. TCP-based applications are typically tolerant to packet loss, and they can be affected by WRED drop treatment. However, these factors are not as important as intolerance to jitter and the size of the transactions.



Company XYZ is redesigning their QoS policy. Some of the applications used by the company are real-time applications. The QoS design must give these applications preference in terms of transmission. Which QoS strategy can be used to fulfill the requirement?

  1. weighted random early detection
  2. weighted fair queuing
  3. first-in first-out
  4. low-latency queuing

Answer(s): D






Post your Comments and Discuss Cisco® 400-007 exam with other Community members:

400-007 Discussions & Posts