300-320 Premium Bundle

300-320 Premium Bundle

Designing Cisco Network Service Architectures Certification Exam

4.5 
(36900 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 18, 2024Last update

Cisco 300-320 Free Practice Questions

Q1. Summary address blocks can be used to support which network application? 

A. QoS 

B. IPsec tunneling 

C. Cisco TrustSec 

D. NAT 

E. DiffServ 

Answer:

Q2. When an enterprise network is designed, which protocol provides redundancy for edge devices in the event of a first-hop failure? 

A. ICMP 

B. HSRP 

C. STP 

D. HTTP 

Answer:

Q3. When a Cisco ASA adaptive security appliance is configured for active/standby failover, which MAC address is used for the active unit? 

A. the MAC address of the primary unit 

B. the MAC address of the secondary unit 

C. the virtual MAC address 

D. the standby MAC address 

Answer:

Q4. Which virtualization technology allows for HSRP protocol to be used in the active/active configuration where both HSRP Layer 3 devices can forward network traffic? 

A. OTV 

B. VSS 

C. vPC 

D. VDC 

Answer:

Q5. Which mechanism is enabled by default in the OTV technology to conserve bandwidth? 

A. Automatic unicast flooding is suppressed over the OTV link. 

B. BPDUs are allowed to traverse the OTV link. 

C. Control plane traffic is prevented from traversing the OTV link. 

D. Data plane traffic is prevented from traversing the OTV link. 

Answer:

Q6. Which of the following features might be used by the Enterprise Campus network designer as a means of route filtering? 

A. IPv4 static routes 

B. Route tagging using a route map in an ACL 

C. Tagging routes using the BGP MED 

D. EIGRP stub networks 

Answer:

Q7. Which statement is the most accurate regarding IPsec VPN design for an Enterprise Campus environment? 

A. VPN device IP addressing must align with the existing Campus addressing scheme. 

B. The choice of a hub-and-spoke or meshed topology ultimately depends on the number of remotes. 

C. Sizing and selection of the IPsec VPN headend devices is most affected by the throughput bandwidth requirements for the remote offices and home worker 

D. Scaling considerations such as headend configuration, routing protocol choice, and topology have the broadest impact on the design. 

Answer:

Q8. Which of the following is true concerning best design practices at the switched Access layer of the traditional layer2 Enterprise Campus Network? 

A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access layer 

B. Provide host-level redundancy by connecting each end device to 2 separate Access switches 

C. Offer default gateway redundancy by using dual connections from Access switches to redundant Distribution layer switches using a FHRP 

D. Include a link between two Access switches to support summarization of routing information from the Access to the Distribution layer 

Answer:

Q9. Which option is the Cisco preferred, most versatile, and highest-performance way to deploy IPv6 in existing IPv4 environments? 

A. dual stack 

B. hybrid 

C. service block 

D. dual service 

Answer:

Q10. Which authentication framework is used in wireless networks and point-to-point connections? 

A. EAP 

B. L2TP 

C. TKIP 

D. PPP 

Answer:

Q11. A network engineer is implementing virtualization into the enterprise network. Which system should be used to address policy enforcement at the distribution layer? 

A. Cisco IOS based firewall 

B. multilayer switches 

C. integrated firewall services 

D. identity services engine 

E. intrusion protection systems 

Answer:

Q12. A customer with a single Cisco Adaptive Security Appliance wants to separate multiple segments of the e-commerce network to allow for different security policies. What firewall technology accommodates these design requirements? 

A. virtual contexts 

B. private VLANs 

C. admission control 

D. virtual private network 

Answer:

Q13. Which option lists the EIGRP minimum timer settings for hello and dead timers in seconds? 

A. 4 and 6 

B. 2 and 4 

C. 2 and 6 

D. both 6 

Answer:

Q14. Which two statements about both FCIP and iSCSI are correct? (Choose two.) 

A. They support file-level storage for remote devices. 

B. They require high throughput with low latency and low jitter. 

C. Their purpose is to provide connectivity between host and storage. 

D. They support block-level storage for remote devices. 

E. Their purpose is to provide connectivity between separate wide-area SANs. 

Answer: B,D 

Q15. Which protocol will not adhere to the design requirement of the control plane being either separated or combined within a virtualization technology? 

A. FHRP 

B. STP 

C. CEF 

D. NSF with SSO 

Answer:

START 300-320 EXAM