00:00

QUESTION 36

Refer to the exhibit.
400-007 dumps exhibit
As part of a redesign project, you must predict multicast behavior What happens to the multicast traffic received on the shared tree (*,G), if it is received on the LHR interface indicated*?

Correct Answer: C
https://www.cisco.com/c/en/us/support/docs/ip/ip-multicast/16450-mcastguide0.html
When a multicast packet arrives on an interface, the RPF process checks to ensure that this incoming interface is the outgoing interface used by unicast routing in order to reach the source of the multicast packet. This RPF check process prevents loops. Multicast routing does not forward a packet unless the source of the packet passes a RPF check. Once a packet passes this RPF check, multicast routing forwards the packet based only upon the destination address.

QUESTION 37

A network attacker exploits application flaws to compromise critical systems in the organization with these objectives:
• Obtain sensitive data and export the data out of the network.
• Compromise developer and administrator credentials to potentially
What is the next step after application discovery is completed in Zero Trust networkings

Correct Answer: B
https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zone-security/zt-arch-guide.html

QUESTION 38

Which two advantages of using DWDM over traditional optical networks are true? (Choose two.)

Correct Answer: BC

QUESTION 39

Organizations that embrace Zero Trust initiatives ranging from business policies to technology infrastructure can reap business and security benefits. Which two domains should be covered under Zero Trust initiatives? (Choose two)

Correct Answer: AC

QUESTION 40

Which two types of planning approaches are used to develop business-driven network designs and to facilitate the design decisions? (Choose two)

Correct Answer: BD