aiotestking uk

300-320 Exam Questions - Online Test


300-320 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Verified 300-320 practice are available on Google Drive, GET MORE: https://drive.google.com/open?id=1SQGq0NTfhdguTL9XdbFHLLvvUxs-dPOs


New Cisco 300-320 Exam Dumps Collection (Question 11 - Question 20)

Question No: 11

In which OSI layer does IS-IS operate?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

Answer: B


Question No: 12

Which option is a method of restricting access for users based on user roles and locales?

A. RBAC

B. ACE

C. LDAP

D. RADIUS

Answer: A


Question No: 13

Which of the following is a recommended practice of a data center core?

A. Server-to-server traffic always remains in the core layer.

B. The core infrastructure should be in Layer 3.

C. Core layer should run BGP along with an IGP because iBGP has a lower administrative distance than any IGP

D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port

Answer: B


Question No: 14

A large-scale IP SLA deployment is causing memory and CPU shortages on the router in an enterprise network. Which solution can be implemented to mitigate

these issues? (E)

A. An offline router for disaster recovery

B. CPE device that is managed by the network provider

C. A shadow router

D. A standby router for failover operation

Answer: C


Question No: 15

Which option does best practice dictate for the maximum number of areas that an OSPF router should belong to for optimal performance?

A. 1

B. 2

C. 3

D. 4

E. 5

Answer: C


Question No: 16

Which VRF component ensures control plane separation between the different Layer 3 VPNs?

A. FIB

B. routing protocol instance

C. RIB

D. a subset of the router interfaces

Answer: B


Question No: 17

A Layer 2 switch in the network has recently started broadcasting traffic out of every port and is impacting network performance. The engineering department determines that a MAC overflow attack is the cause. Which two features can protect and mitigate the damage of the attacks? (Choose two.)

A. Storm Control

B. Port Security

C. SPAN

D. BPDU Filters

E. IP Source Guard

F. VACLs

Answer: A,B


Question No: 18

Out of band management. What is the best practice Cisco design?

A. Data traffic should never pass or enter the management network

B. In-band management as backup

C. Enforce QoS

D. Enable dynamic routing

Answer: A

Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg/c hap9.html#wp1054521

"An OOB management network should be deployed using the following best practices:

u2022Provide network isolation

u2022Enforce access control

u2022Prevent data traffic from transiting the management network"


Question No: 19

A company uses BGP to connect with the ISP on the enterprise network and wants to improve performance due to the increasing number of iBGP peers. Which two design solutions address the iBGP full mesh requirement? (Choose two.)

A. Route reflectors

B. condeferations

C. AS path prepending

D. communities

E. conditional advertising

Answer: A,B


Question No: 20

Which virtualization technology uses Layer 3 BFD to detect network failure between Network devices?

A. Cisco Fabric path

B. VXLAN

C. VSAN

D. VLAN

Answer: A


100% Update Cisco 300-320 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/300-320-dumps.html (New 406 Q&As)