Questions for the 400-007 were updated on : Dec 07 ,2025
Company XYZ, a global content provider, owns data centers on different continents. Their data center
design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP.
They require VLAN extension across access switches in all data centers, and they plan to purchase a
Layer 2 interconnection between two of their data centers in Europe. In the absence of other
business or technical constraints, which termination point is optimal for the Layer 2 interconnection?
B
When a company network architect is working on a new network design, they are expected to
ensure that business requirements and technical aspects are factored in, but often there are other
factors that comes into play as well Which non-business constraint must also be considered
throughout the design phase?
D
During a pre-sales meeting with a potential customer the customer CTO asks a question about
advantages of controller-based networks versus a traditional network What are two advantages to
mention? (Choose two)
C, E
An Agile for Infrastructure transition often means dismantling traditional IT hierarchies and
rebuilding it to align with business objectives and workflows Organizations are seeing the benefits of
using automation tools in the network such as faster more efficient more effective delivery of
products and services. Which two components help increasing overall productivity and improve
company culture? (Choose two.)
dedicated infrastructure
B, D
DRAG DROP
As technologies such as big data, cloud, and loT continue to grow, so will the demand for network
bandwidth Business strategies must be flexible to accommodate these changes when it comes to
priorities and direction and the network design strategy also must be agile and adaptable Drag and
drop the benefits from the left onto the corresponding strategic approaches on the right as they
relate to network design and management.
None
Explanation:
Over the years, many solutions have been developed to limit control plane state which reduces the
scope or the speed of control plane information propagation Which solution removes more specific
information about a particular destination as topological distance is covered in the network?
B
The goal for any network designer is to strive to build a resilient network that adapts to changing
conditions rapidly with minimal impact on the services running over the network A resilient network
can adapt to failures but which soft failure can be harder to define and detect?
B
Refer to the exhibit.
A company named XYZ needs to apply security policies for end-user browsing by installing a secure
web proxy appliance All the web traffic must be inspected by the appliance, and the remaining traffic
must be inspected by an NGFW that has been upgraded with intrusion prevention system
functionality In which two ways must the routing be performed? (Choose two )
constraint-based OSPF routing
B, D
A company is reviewing their technology roadmap ahead of their cloud journey The as-is assessment
found that a large inventory (5000+) of servers sees less than 50% capacity utilization Which cloud
architecture model supports the company to optimize the resource utilization'?
B
Feature-rich networks are complex network models that provide one or more features in addition to
the network topology In attributed networks, attributes are assigned to the nodes to describe the
corresponding entities For example, in a friendship network the actors can be described by their
genre and their age Which two alternative network models can be used to model interaction over
time or to model each attribute by a specific relationship?
D, F
DRAG DROP
While computer networks and sophisticated applications have allowed individuals to be more
productive the need to prepare for security threats has increased dramatically A six-step
methodology on security incident handling has been adopted by many organizations including
service providers enterprises, and government organizations to ensure that organizations are aware
of significant security incidents and act quickly to stop the attacker, minimize damage caused, and
prevent follow on attacks or similar incidents in the future Drag and drop the actions on the left to
the targets on the right in the correct order.
None
Explanation:
A company created an IPv6 adoption plan for its campus network that requires dual-stack
connectivity on the network Campus users must have IPv6 connectivity to an HR management
application which is the first IPv6-only application hosted in the company s data center. Which two
security mechanisms can be used to prevent a malicious user from masquerading as the IPv6
gateway? (Choose two)
A, D
Most security monitoring systems use a signature-based approach to detect threats In which two
instances are systems based on Network Behavior Anomaly Detection better than signature-based
systems when it comes to detecting security threat vectors'? (Choose two.)
B, E
What are three examples of solution components of the network infrastructure that help enforce
security policy compliance on all devices as they seek to access the network and computing
resources, thereby limiting damage from emerging security threats such as viruses worms and
spyware? (Choose three.)
A, B, E
Refer to the exhibit.
A customer needs to implement a connectivity model by using one active link for inbound and
outbound traffic and a second link for backup The backup link is low speed and is required only
during outages of the primary link. Which design solution should be implemented?
B