aiotestking uk

300-320 Exam Questions - Online Test


300-320 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. What is an advantage of using the Cisco FabricPath feature in a data center environment? 

A. VSS does not have to be configured. 

B. Transparent Interconnection of Lots of Links can be configured simultaneously. 

C. Equal-Cost Multipath can be used to choose the forwarding path. 

D. The control plane and management plane remain separate. 

Answer:

Q2. Which technology can block interfaces and provide a loop-free topology? 

A. STP 

B. VSS 

C. VLAN 

D. vPC 

Answer:

Q3. When considering the design of the E-Commerce topology which of the following are true? 

A. One-armed SLB design with multiple security contexts removes the need for a separate firewall in the core layer 

B. Two-firewall-layer SLB design considers the aggregation and access layers to be trusted zones, requiring no security between the web, application, and database zones 

C. One-armed SLB design with two firewall layers ensures that non load-balanced traffic still traverses the ACE so that the health and performance of the servers is still being monitored 

D. In all cases there will be configuration requirements for direct access to any servers or for nonload-balanced sessions initiated by the servers 

Answer:

Q4. A network manager wants to securely connect a new remote site to the existing headquarters site using a VPN technology that meets security requirements. Which VPN technology should be used? 

A. GRE 

B. IPsec 

C. remote-access VPN 

D. L2TP VPN 

Answer:

Q5. What is the maximum number of routers that each OSPF area (including the backbone) should contain? 

A. 30 

B. 10 

C. 50 

D. 100 

Answer:

Q6. Which of the following two are effective and simple means of employing route summarization within the Enterprise Campus network? (Choose two) 

A. A default route (0.0.0.0 /0) advertised dynamically into the rest of the network 

B. Route filtering to manage traffic flows in the network, avoid inappropriate transit traffic through remote nodes, and provide a defense against inaccurate or inappropriate routing updates 

C. Use manual split horizon 

D. Use a structured hierarchical topology to control the propagation of EIGRP queries 

E. Open Shortest Path First (OSPF) stub areas 

Answer: A,E 

Q7. Which VPN technology supports dynamic creation of spoke-to-spoke VPN tunnels to provide a scalable design? 

A. IPsec 

B. GRE over IPsec 

C. DMVPN 

D. GRE 

Answer:

Q8. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address? 

A. The IGPs should utilize authentication to avoid being the most vulnerable component 

B. With SSM source or receiver attacks are not possible 

C. With Shared Trees access control is always applied at the RP 

D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network 

Answer:

Q9. What are three primary components in IS-IS fast convergence? (Choose three.) 

A. event propagation 

B. LSP flooding 

C. fast hellos 

D. matching MTUs 

E. updating RIB and FIB 

F. SPF calculation 

Answer: A,E,F