aiotestking uk

300-320 Exam Questions - Online Test


300-320 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

P.S. Printable 300-320 interactive bootcamp are available on Google Drive, GET MORE: https://drive.google.com/open?id=1miQ7hAp4YwfZw6TPfPZd2zoXwVl9zI9i


New Cisco 300-320 Exam Dumps Collection (Question 15 - Question 24)

Q15. Which authentication framework is used in wireless networks and point-to-point connections?

A. EAP

B. L2TP

C. TKIP

D. PPP

Answer: A


Q16. Which of these Layer 2 access designs does not support VLAN extensions?

A. FlexLinks

B. loop-free U

C. looped square

D. looped triangle

E. loop-free inverted U

Answer: B


Q17. A network engineer must create a backup network connection between two corporate sites over the Internet using the existing ASA firewalls. Which VPN technology best satisfies this corporate need? (E)

A. VPLS

B. DMVPN

C. GETVPN

D. IPSec

E. MPLS

F. OTV

Answer: D


Q18. Which three statements about 802.1X are true? (Choose three)

A. It is IEEE standard

B. It can allow and deny port access based on device identity

C. It works only with wired devices

D. It can allow and deny port access based on user identity

Answer: A,B,D


Q19. Exhibit:

Which two practices will avoid Cisco Express Forwarding polarization?(Choose two.)

A. The core layer should use default Layer 3 hash information.

B. The core layer should use default Layer 4 hash information.

C. The distribution layer should use default Layer 3 hash information.

D. The distribution layer should use default Layer 4 hash information.

E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.

F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing

Forwarding hashing algorithm.

Answer: A,F


Q20. DCI: simple extend layer 2 data center less than 4000 VLAN ? (Choose Two)

A. OTV

B. VXLAN

C. LISP

D. MPLS

E. L2TP

Answer: A,D

Explanation:

MPLS using AToM or VPLS I guess..

VXLAN could do it but I think they would have not specified "<4000 vlans" if they wanted us to answer that.

In fact, we could even think of L2TPv3...

Even if it's really dirty, it's possible (https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/l2tpv30s.html#wp1027175 "For L2TPv3, an Ethernet subinterface configured to support VLAN switching may be bound to an Xconnect service so that all Ethernet traffic, tagged with a VID specified on the subinterface, is tunneled to another PE.")


Q21. What is an advantage of using the vPC feature in a data center environment?

A. VSS is a requirement.

B. Multiple instances of control plane are formed.

C. The control plane and management plane remain separate.

D. Cisco FabricPath technology does not have to be configured.

Answer: C


Q22. Which two technologies provide web and URL filtering and mitigate zero-day malware? (Choose two)

A. Cisco CWS

B. Cisco WSA

C. Cisco GETVPN

D. Cisco ESA

E. NAT/PAT

Answer: A,B

Explanation:

Cisco CWS: Cisco Cloud Web Security https://www.cisco.com/c/en/us/products/collateral/security/cloud-web-security/data_sheet_c78-729637.html

Cisco WSA: Cisco Web Security Appliance https://www.cisco.com/c/en/us/products/collateral/security/content-security-management-appliance/datasheetc78-729630.html

Cisco ESA: Email Security Appliance


Q23. Which two values does EIGRP use to calculate the metric of a route in a converged EIGRP topology (choose two):

A. redundancy

B. bandwidth

C. cost

D. delay

E. hops

Answer: B,D


Q24. In what situation must spanning-tree be implemented?

A. when first hop redundancy protocol exists with redundant Layer 2 links between distribution switches

B. when a VLAN spans access layer switches to support business applications

C. when trunks need to extend multiple VLANs across access switches

D. when it is necessary to speed up network convergence in case of link failure

Answer: A

Explanation:

STP (L2 loop prevention mechanism) should be implemented in topologies where possible loops may occur and redundant L2 links between distribution switches is a very good example as long as the links are not channelled (PC, vPC, MEC).


100% Avant-garde Cisco 300-320 Questions & Answers shared by Examcollectionplus, Get HERE: https://www.examcollectionplus.net/vce-300-320/ (New 406 Q&As)