P.S. Verified 300-320 practice are available on Google Drive, GET MORE: https://drive.google.com/open?id=1SQGq0NTfhdguTL9XdbFHLLvvUxs-dPOs
Question No: 11
In which OSI layer does IS-IS operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: B
Question No: 12
Which option is a method of restricting access for users based on user roles and locales?
A. RBAC
B. ACE
C. LDAP
D. RADIUS
Answer: A
Question No: 13
Which of the following is a recommended practice of a data center core?
A. Server-to-server traffic always remains in the core layer.
B. The core infrastructure should be in Layer 3.
C. Core layer should run BGP along with an IGP because iBGP has a lower administrative distance than any IGP
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port
Answer: B
Question No: 14
A large-scale IP SLA deployment is causing memory and CPU shortages on the router in an enterprise network. Which solution can be implemented to mitigate
these issues? (E)
A. An offline router for disaster recovery
B. CPE device that is managed by the network provider
C. A shadow router
D. A standby router for failover operation
Answer: C
Question No: 15
Which option does best practice dictate for the maximum number of areas that an OSPF router should belong to for optimal performance?
A. 1
B. 2
C. 3
D. 4
E. 5
Answer: C
Question No: 16
Which VRF component ensures control plane separation between the different Layer 3 VPNs?
A. FIB
B. routing protocol instance
C. RIB
D. a subset of the router interfaces
Answer: B
Question No: 17
A Layer 2 switch in the network has recently started broadcasting traffic out of every port and is impacting network performance. The engineering department determines that a MAC overflow attack is the cause. Which two features can protect and mitigate the damage of the attacks? (Choose two.)
A. Storm Control
B. Port Security
C. SPAN
D. BPDU Filters
E. IP Source Guard
F. VACLs
Answer: A,B
Question No: 18
Out of band management. What is the best practice Cisco design?
A. Data traffic should never pass or enter the management network
B. In-band management as backup
C. Enforce QoS
D. Enable dynamic routing
Answer: A
Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg/c hap9.html#wp1054521
"An OOB management network should be deployed using the following best practices:
u2022Provide network isolation
u2022Enforce access control
u2022Prevent data traffic from transiting the management network"
Question No: 19
A company uses BGP to connect with the ISP on the enterprise network and wants to improve performance due to the increasing number of iBGP peers. Which two design solutions address the iBGP full mesh requirement? (Choose two.)
A. Route reflectors
B. condeferations
C. AS path prepending
D. communities
E. conditional advertising
Answer: A,B
Question No: 20
Which virtualization technology uses Layer 3 BFD to detect network failure between Network devices?
A. Cisco Fabric path
B. VXLAN
C. VSAN
D. VLAN
Answer: A
100% Update Cisco 300-320 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/300-320-dumps.html (New 406 Q&As)