Free 400-007 Exam Braindumps (page: 30)

Page 29 of 74

DRAG DROP (Drag and Drop is not supported)
Drag and drop the characteristics from the left onto the corresponding network management options on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:





Refer to the exhibit. This network is running EIGRP as the routing protocol and the internal networks are being advertised in EIGRP. Based on the link speeds, all traffic between London and Rome is getting propagated via Barcelona and the direct link between London and Rome is not being utilized under normal working circumstances. The EIGRP design should allow for efficiency in the routing table by minimizing the routes being exchanged. The link between London and Rome should be utilized for specific routes. Which two steps accomplish this task? (Choose two.)

  1. Configure EIGRP route summarization on all the interfaces to summarize the internal LAN routes
  2. Filter the routes on the link between London and Barcelona
  3. Filter the routes on the link between London and Rome
  4. Configure route leaking of summary routes on the link between London and Rome

Answer(s): A,D



What are two top cloud-native security challenges faced by today’s cloud-oriented organizations? (Choose two.)

  1. polymorphism
  2. lack of visibility and tracking
  3. establishing user roles
  4. increased attack surface
  5. user credential validation

Answer(s): B,D

Explanation:

-Increased attack surface: Cloud-native applications are often more complex and distributed than traditional applications, which means that they have a larger attack surface. This makes them more vulnerable to attack.
-Lack of visibility and tracking: It can be difficult to get visibility into cloud-native applications, which makes it difficult to track and monitor them for security threats. This can make it difficult to detect and respond to attacks.
The other options are also security challenges faced by cloud-oriented organizations, but they are not as top as the two mentioned above.

-Polymorphism is a technique used by attackers to evade security measures by changing the appearance of their malware. This can make it difficult to detect and block malware that uses polymorphism.
-Establishing user roles is a security best practice that helps to ensure that users have the appropriate level of access to resources. However, it can be difficult to implement and manage user roles in cloud-native environments.
-User credential validation is important for ensuring that users are who they say they are. However, it can be difficult to implement and manage user credential validation in cloud-native environments.
-



In the case of outsourced IT services, the RTO is defined within the SLA. Which two support terms are often included in the SLA by IT and other service providers? (Choose two.)

  1. resolution time
  2. network reliability
  3. network size and cost
  4. network sustainability
  5. support availability

Answer(s): A,E

Explanation:

-Resolution time refers to the amount of time it takes for a service provider to resolve an issue. This is usually measured in hours or days.
-Support availability refers to the hours and days that support is available. This is usually specified as 24/7 or M-F, 8am-5pm.
The other options are also important, but they are not as commonly included in SLAs.

-Network reliability is the likelihood that a network will be available and functioning properly. This is usually measured as a percentage.
-Network size and cost are important factors to consider when selecting a service provider, but they are not typically included in SLAs.
-Network sustainability refers to the ability of a network to withstand changes and disruptions. This is not typically included in SLAs, but it is an important consideration for organizations that rely on their networks for critical business functions.
-






Post your Comments and Discuss Cisco® 400-007 exam with other Community members:

400-007 Discussions & Posts