Cisco 400-007 Cisco Certified Design Expert Online Training
Cisco 400-007 Online Training
The questions for 400-007 were last updated at Oct 18,2025.
- Exam Code: 400-007
- Exam Name: Cisco Certified Design Expert
- Certification Provider: Cisco
- Latest update: Oct 18,2025
A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication.
What is the next step to control such events after the security team verifies all users in Zero Trust modeling?
- A . Enforce risk-based and adaptive access policies.
- B . Assess real-time security health of devices.
- C . Apply a context-based network access control policy for users.
- D . Ensure trustworthiness of devices.
You want to mitigate failures that are caused by STP loops that occur before UDLD detects the failure or that are caused by a device that is no longer sending BPDUs.
Which mechanism do you use along with UDLD?
- A . Root guard
- B . BPDU guard
- C . Loop guard
- D . BPDU filtering
You are tasked to design a QoS policy for a service provider so they can include it in the design of their MPLS core network.
If the design must support an MPLS network with six classes, and CEs will be managed by the service provider, which QoS policy should be recommended?
- A . map IP CoS bits into the IP Precedence field
- B . map flow-label bits into the Exp field
- C . map IP precedence bits into the DSCP field
- D . map DSCP bits into the Exp field
Company XYZ connects its sites over a private WAN. Their overlay network is running a DMVPN setup where the headquarters site is the hub. The company is planning on implementing multicast routing on the network.
What should be used in the multicast routing design?
- A . PIM dense mode with RP located at the hub
- B . PIM sparse mode with RP located at each remote site
- C . PIM sparse mode with RP located at the hub
- D . PIM dense mode with RP located at each remote site
A healthcare customer requested that SNMP traps must be sent over the MPLS Layer 3 VPN service.
Which protocol must be enabled?
- A . SNMPv3
- B . Syslog
- C . Syslog TLS
- D . SNMPv2
- E . SSH
A service provider hires you to design its new managed CE offering to meet these requirements
• The CEs cannot run a routing protocol with the PE
• Provide the ability for equal or unequal ingress load balancing in dual-homed CE scenarios.
• Provide support for IPv6 customer routes
• Scale up to 250.000 CE devices per customer.
• Provide low operational management to scale customer growth.
• Utilize low-end (inexpensive) routing platforms for CE functionality.
Which tunneling technology do you recommend?
- A . FlexVPN
- B . point-to-point GRE
- C . DMVPN
- D . LISP
A customer has a functional requirement that states HR systems within a data center should be segmented from other systems that reside in the same data center and same VLAN. The systems run legacy applications by using hard-coded IP addresses.
Which segmentation method is suitable and scalable for the customer?
- A . data center perimeter firewalling
- B . VACLs on data center switches
- C . transparent firewalling
- D . routed firewalls
You have been tasked with designing a data center interconnect as part of business continuity. You want to use FCoE over this DCI to support synchronous replication.
Which two technologies allow for FCoE via lossless Ethernet or data center bridging? (Choose two.)
- A . DWDM
- B . EoMPLS
- C . SONET/SDH
- D . Multichassis EtherChannel over Pseudowire
- E . VPLS
Which actions are performed at the distribution layer of the three-layer hierarchical network design model? (Choose two)
- A . Fast transport
- B . Reliability
- C . QoS classification and marking boundary
- D . Fault isolation
- E . Redundancy and load balancing
Which two factors must be considered for high availability in campus LAN designs to mitigate concerns about unavailability of network resources? (Choose two.)
- A . device resiliency
- B . device type
- C . network type
- D . network resiliency
- E . network size