Cisco - Selftestengine.300 320.study - Guide.v2019 May 25.by - Devin.221q.vce
Cisco - Selftestengine.300 320.study - Guide.v2019 May 25.by - Devin.221q.vce
Cisco - Selftestengine.300 320.study - Guide.v2019 May 25.by - Devin.221q.vce
Cisco
Exam Questions 300-320
Designing Cisco Network Service Architectures
NEW QUESTION 1
Refer to the exhibit.
An engineering team is analyzing the WAN connection for a site that has a 50 Mbps Ethernet circuit. Which technology should be uses to keep the router from
overrunning the carrier's 50 Mbps rate?
A. shaping
B. Access Control List
C. Committed Information Rate
D. Rate-Limit
E. Policing
Answer: C
NEW QUESTION 2
Which option lists the EIGRP minimum timer settings for hello and dead timers in seconds?
A. 4 and 6
B. 2 and 4
C. 2 and 6
D. Both 6
Answer: C
NEW QUESTION 3
You need to design a network with a summary segment that supports up to 15 IP segments and all segments must be /24?
A. /20
B. /21
C. /18
D. /19
Answer: A
NEW QUESTION 4
What are two benefits of using 6to4 as an IPv6 transition method? (Choose two.)
A. 6to4 tunnels allow isolated IPv6 domains to be remotely connected over IPv4 networks.
B. Manual configuration (scalability) is easier.
C. Point-to-multipoint automatic tunneling (automatic 6to4) is available.
D. An infinite number of address spaces are allocated to an IPv6 subnet.
E. Globally unique IPv4 addresses are not required.
Answer: AC
NEW QUESTION 5
What QoS technology allows traffic to pass even though it has exceeded the bandwidth limit but will be
queued later?
A. Shaping
B. Policing
C. Weighted Fair Queuing
D. Low Latency Queuing
Answer: A
NEW QUESTION 6
Which action should be taken when implementing a preferred IPS design?
Answer: A
NEW QUESTION 7
NAC: Simple access control at user and device contextual level. Which features are needed ? (Choose Two)
Answer: CD
NEW QUESTION 8
While configuring a QoS policy, analysis of the switching infrastructure indicates that the switches support 1P3Q3T egress queuing. Which option describes the
egress queuing in the infrastructure?
Answer: B
NEW QUESTION 9
Which two technologies provide web and URL filtering and mitigate zero-day malware? (Choose two)
A. Cisco CWS
B. Cisco WSA
C. Cisco GETVPN
D. Cisco ESA
E. NAT/PAT
Answer: AB
NEW QUESTION 10
What is one limitation of MPLS Layer 3 VPN networks?
Answer: C
NEW QUESTION 10
An engineer is working on an OSPF network design and wants to minimize the failure detection time and the impact on the router CPU. Witch technology
accomplishes this goal?
A. LSA pacing
B. LSA delay interval
C. BFD
D. Fast hellos
Answer: C
NEW QUESTION 14
HSRP has been implemented on distribution switches but no priority has been defined. Which one of the two switches will be active ?
Answer: A
NEW QUESTION 18
An engineer is designing a QoS architecture for a small organization and must meet these requirements:
*Guarantees resources for a new traffic flow prior to sending
*Polices traffic when the flow does not conform
Which QoS architecture model will accomplish this?
Answer: D
NEW QUESTION 21
Design QoS (traffic regulation mechanisms ? )(Choose Two)
A. Classification
B. Shaping
C. Policing
D. Queuing
Answer: BC
NEW QUESTION 23
Uplink floating state ( up and down ) .what you can do to solve this problem ?
A. route summary
B. Cisco Express Forwarding
C. BFD
D. UDLD
Answer: A
NEW QUESTION 25
Which two metric are used by EIGRP by default to calculate its cost ? (Choose two)
A. Bandwidth
B. Latency
C. MTU
D. Load
Answer: AB
NEW QUESTION 26
Two company want to merge their OSPF networks , but they run different OSPF domains , Which is option must be created to accomplished this requirement?
A. OSPF virtual link to bridge the backbone areas of the two company together
B. Route Summarization
C. Static OSPF
D. Redistribute routes between domains
Answer: A
NEW QUESTION 31
You need to use source specific multicast, which addressing should you use ?
A. 224.0.0.0/8
B. 232.0.0.0/8
C. 248.0.0.0/8
D. 254.0.0.0/8
E. 242.0.0.0/8
Answer: B
NEW QUESTION 36
To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
Answer: D
NEW QUESTION 37
In which OSI layer does IS-IS operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: B
NEW QUESTION 40
An engineer is designing an IP addressing scheme for a local company that requires multicast for its applications. For security reasons, only explicitly configured
devices can be permitted to transmit across the network. Which multicast technology and address range must the engineer select?
A. PIM-SM; 232.0.0.0/8
B. ASM; 232.0.0.0/8
C. SSM; 232.0.0.0/8
D. SSM; 224.0.0.0/8
Answer: D
NEW QUESTION 42
Which option can be implemented to manipulate the election of PIM DR to force multicast traffic to a certain path?
Answer: C
NEW QUESTION 47
Which one of these could you implement to sustain a large DDoS attack?
A. Stateful firewall
B. uRPF
C. Connections limits and timeouts
D. Access-lists
Answer: C
NEW QUESTION 52
An engineering team must design a firewall solution with shared hardware resources but separation of features such as ACLs, NATs, and management between
the external business partners of the organization. Which ASA deployment mode meets these requirements?
A. clustering mode
B. multicontext mode
C. transparent mode
D. routed mode
Answer: B
NEW QUESTION 53
In what situation must spanning-tree be implemented?
A. When redundant Layer 2 links, that are not part of a single EtherChannel or bundle, exist between distribution switches
B. When redundant Layer 3 links, that are not part of a single EtherChannel or bundle, exist between distribution switches
C. Between Distribution and Core switches when interfaces are configured with "no switchport"
D. Between Distribution and Core switches when VSS is configured
Answer: A
NEW QUESTION 56
Transition to Named EIGRP without causing an outage?
Answer: C
NEW QUESTION 59
Port Security supports which type of port?
Answer: A
NEW QUESTION 64
An engineer is redesigning the infrastructure for a campus environment. The engineer must maximize the use of the links between the core and distribution layers.
By which two methods can this usage be maximized? (Choose two.)
A. Design the links between the core and distribution layers to use RPVSTP+
B. Design with multiple unequal-cost links between the core and distribution layers.
C. Design the links between the core and distribution layers to use an IGP
D. Design the links between the core and distribution layers to use HSRP.
E. Design with multiple equal-cost links between the core and distribution layers.
Answer: AD
NEW QUESTION 65
A network engineer wants to connect two sites via a WAN technology and to securely pass multicast traffic over this WAN technology. Which WAN technology
should be configured?
A. IPsec
B. GRE
C. Pure MPLS
D. GRE over IPsec
Answer: D
NEW QUESTION 66
Which interface characteristic is used to calculate cost of an interface in OSPF?
A. Bandwidth
B. Latency
C. Load
D. Reliability
Answer: A
NEW QUESTION 69
Which Cisco feature can be run on a Cisco router that terminates a WAN connection, to gather and provide WAN circuit information that helps switchover to
dynamically back up the WAN circuit?
Answer: B
NEW QUESTION 71
For which engine an IPS can use its reputation awareness? (Choose two)
A. Reputation filtering
B. Reputation subscriptions
C. Correlation rules
D. Global correlation inspection
Answer: AC
NEW QUESTION 76
Which two characteristics of the 802.1X standard are true? (Choose two.)
Answer: BC
NEW QUESTION 80
Which two features can you implement to control which networks are advertised by a BGP router? (Choose two.)
A. prefix lists
B. route maps
C. policy maps
D. router SNMP statements
E. crypto maps
Answer: AB
NEW QUESTION 83
Which design technology allows two Cisco Catalyst chassis to use SSO and NSF to provide nonstop communication even if one of the member chassis fails?
A. peer gateway
B. VSS
C. vPC
D. auto chassis detect
Answer: B
NEW QUESTION 86
Which two options are storage topologies? (Choose two.)
A. WAS
B. DAS
C. CAS
D. NAS
Answer: BD
NEW QUESTION 88
An engineer is designing a new data center network so that the topology maintains fewer uplinks to the aggregation layer to reduce STP processing requirements.
What data center topology meets the RFP requirements?
A. mesh
B. top of rack
C. star
D. end of row
Answer: D
NEW QUESTION 90
Which QoS mechanism uses PHBs?
A. DiffServ
B. IntServ
C. CoS
D. ToS
Answer: A
NEW QUESTION 93
A company has hired an entry-level network administrator for its new data center. The company CIO wants to give the administrator limited access on the newly
configured Cisco Nexus 7000. Which feature should be used to allow limited access?
A. NAC
B. VDC
C. RBAC
D. vPC
Answer: C
NEW QUESTION 98
If your enterprise is connected to 2 ISP, which method could you use to prevent being used as a transit network? (Choose Two)
A. filter outbound
B. filter inbound
C. throw both ISP
D. choose only one ISP
E. Allow every routes inbound
Answer: AE
Explanation: https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/23675-27.html
NEW QUESTION 99
You are given the 192.168.2.0/24 network and you should divide it in 4 subnets. Which statements are true regarding the first subnet? (Choose tree)
A. 62 hosts in subnet
B. 255.255.255.192 mask
C. 192.168.2.62 last host
D. 255.255.255.128 mask
E. 126 hosts in subnet
F. 192.168.2.126 last host
Answer: ABC
Answer: AB
A. 1
B. 2
C. 4
Answer: A
Answer: AB
A. MSTP
B. Rapid PVST
C. STP
D. RSTP
Answer: A
A. VSAN provides a means of restricting visibility and connectivity among devices connected to a zone
B. VSANs have their own set of services and address space, which prevents an issue in one VSAN from affecting others
C. Zones provide the ability to create many logical SAN fabrics on a single Cisco MDS 9100 family switch
D. VSANs and zones use separate fabrics
E. Zones allow an administrator to control which initiators can see which targets
Answer: DE
A. Policy map
B. ACL
C. Control plane policy
D. Used zoned firewall on router
Answer: C
Answer: A
A. IPsec
B. GRE over IPsec
C. DMVPN
D. GRE
Answer: C
Answer: BC
A. 80
B. 60
C. 100
D. 50
Answer: B
Answer: AB
Answer: D
A. Route reflectors
B. condeferations
C. AS path prepending
D. communities
E. conditional advertising
Answer: AB
A. Level 1 router
B. Level 1 router interface
C. Level 2 router interface
D. Level 2 router
Answer: D
Answer: A
A. ECMP
B. BFD
C. IP SLA
D. ASR groups
Answer: D
A. Virtual Links
B. Backup Links
C. Inter-backbone Links
D. Point-to-point Links
Answer: A
A. Layer 2 out-of-band
B. Layer 2 in-band
C. Layer 3 out-of-band
D. Layer 3 in-band
Answer: B
A. distribution links
B. end user links
C. transit links
D. core links
Answer: CD
Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html#wp110
A. PortFast
B. BPDU Guard
C. BPDU Filter
D. UplinkFast
Answer: A
Answer: D
Answer: C
Answer: D
Answer: C
A. performance routing
B. static routing
C. on demand routing
D. policy based routing
Answer: A
Answer: B
A. interface ACL
B. stub area
C. passive interface
D. route filtering
E. route summary
Answer: E
Answer: C
A. Track 50
B. Track 50 decrement 20
C. ip tracking 50 interface f0/1 reachability
D. ip tracking 50 Interface f0/1 ip routing (or line protocol)
Answer: BD
Answer: AB
Explanation: https://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a3e6f.shtml "Backbone IS-IS does not have a backbone area like
the OSPF area 0. The IS-IS backbone is a contiguous
collection of Level 2-capable routers, each of which can be in a different area"
http://www.ciscopress.com/articles/article.asp?p=26850&seqNum=3
"In most designs with routing hierarchy, the Level 2 routers are also Level 1 routers by virtue of their identification with a certain area. Therefore, in IS-IS, a router
can function as Level 1-only or Level 2-only and possibly as both Level 1 and Level 2 (Level 1-2). Level 1-2 routers act as border routers to their respective areas,
providing connectivity to other areas. The Level 2 backbone is essentially a virtual IS-IS area consisting of routers engaged in Level 2 routing"
A. VRRP
B. GLBP
C. IRDP
D. HSRP
E. GSLB
Answer: C
• Restrict certain networks from being advertised to remote branches connected via eBGP.
• Prohibit advertisement of the specific prefix to external peers only. Which BGP community must be configured to meet these requirements?
A. no-advertise
B. no-export
C. internet
D. gshut
E. local-as
Answer: B
A. Cryptographic authentication
B. Access-lists
C. Route-maps
D. Passive interfaces
Answer: A
A. MEC
B. NSF
C. BFD
D. UDLD
Answer: B
Answer: D
Answer: A
A. VTP
B. STP
C. LACP
D. CDP
Answer: A
A. AS-PATH
B. weight
C. origin
D. local preference
E. MED
Answer: AE
A. PaGP
B. LACP
C. VSL
D. EVPC
E. VSS
F. ECMP
Answer: E
A. OTV
B. VXLAN
C. FabricPath
D. IS-IS
Answer: AC
A. Pim bidirectional
B. Pim Sparse
C. Pim Dense
D. Pim-SSM
Answer: D
A. OTV
B. VXLAN
C. Fabric Path
D. IS-IS
Answer: AB
A. IPX
B. microsoft Netbios
C. IPv6
D. IPv4
Answer: C
Answer:
Explanation:
Answer: AD
Answer: B
Answer:
A. GET VPN
B. MPLS VPN
C. IPsec VPN
D. CISCO Easy VPN
E. GRE
Answer: A
Answer: B
A. 3 to 1
B. 4 to 1
C. 6 to 1
D. 8 to 1
Answer: B
Answer: A
A. leaf
B. spine
C. APIC
D. endpoint
Answer: C
Answer: C
Answer: BC
Answer:
Explanation:
A. IPX
B. Microsoft NetBIOS
C. IPv6
D. IPv4
Answer: C
A. Taboo contract entries are looked up with higher priority than entries in regular contracts
B. Taboo contract entries are looked up with lower priority than entries in regular contracts.
C. They are not associated with one EPG
D. They are not associated with EPGs
E. Taboo contract entries are looked up based on administrator configured priority
F. They are associated with pair of EPGs
Answer: AF
Explanation: There may be times when the ACI administrator might need to deny traffic that is allowed by another contract. Taboos are a special type of contract
that an ACI administrator can use to deny specific traffic that would otherwise be allowed by another contract. Taboos can be used to drop traffic matching a
pattern (any EPG, a specific EPG, matching a filter, and so forth). Taboo rules are applied in the hardware before the rules of regular contracts are applied. Taboo
contracts are not recommended as part of the ACI best practices but they can be used to transition from traditional networking to ACI. To imitate the traditional
networking concepts, an "allow-all-traffic" contract can be applied, with taboo contracts configured to restrict certain types of traffic."
Answer: D
A. GRE
B. NHRP
C. SSH
D. ARP
Answer: B
Answer: D
A. VSL
B. LCAP
C. PaGP
D. ISL
Answer: A
A. convergence time
B. low operating expense (OpEx)
C. low latency
D. dynamic fault-tolerance
Answer: B
A. Virtual Context
B. VRF
Answer: A
Answer:
Answer: B
A. RSTP and STP choose the protocol with the best performance.
B. RSTP and STP interoperate and fast convergence is achieved.
C. RSTP and STP are not compatible and legacy ports error disable.
D. RSTP and STP interoperate, but the fast convergence is not used.
Answer: D
A. DMVPN
B. GRE over IPSec
C. IPSec direct encapsulation
D. GETVPN
Answer: B
Answer: A
A. DMVPN
B. IPSec VPN
C. VPN Router
D. VPN hub
Answer: A
A. Static route...
B. EIGRP stub...
Answer: B
A. leaf
B. spine
C. core
D. distribution
Answer: A
Answer: A
A. routed
B. active/standby
C. transparent
D. virtual
E. active/active
F. zone based
Answer: C
A. ToR
B. EoR
C. …
D. …
Answer: A
Answer: DE
A. Core
B. Distribution
C. Data Center Distribution WAN Edge
D. WAN Edge
E. Campus access distribution layer
Answer: B
Explanation: Summarize at Service Distribution. It is important to force summarization at the distribution towards WAN Edge and towards campus & data center
A. Assign a unique IS-IS NET value for each campus and configure internal campus routers with level 1 routing.
B. Designate two IS-IS routers from each campus to act as a Layer 1/Layer 2 backbone routers at the edge of each campus network.
C. Designate two IS-IS routers as BDR routers at the edge of each campus.
D. Assign similar router IDs to all routers within each campus.
E. Change the MTU sizes of the interface of each campus network router with a different value
Answer: AB
A. redundancy
B. bandwidth
C. cost
D. delay
E. hops
Answer: BD
A. It is assigned by the Cisco ISE to the user or endpoint session upon login
B. Best practice dictates it should be statically created on the switch
C. It is removed by the Cisco ISE before reaching the endpoint.
D. Best Practice dictates that deployments should include a guest group allowing access to minimal services
E. Best Practice dictates that deployments should include a security group for common services such as DNS and DHCP
Answer: AE
A. Site-to-Site VPN
B. dynamic routing protocols
C. multicast routing
D. threat detection
E. quality of service
F. unified communications
Answer:
AE
Answer:
Explanation:
Answer: BE
A. redundancy
B. bandwidth
C. cost
D. delay
E. hops
Answer: BD
A. Enable backbone fast on the two distribution switches and create a port channel between each access layer switch and both distribution switches
B. Configure HSRP for all VLANs and adjust the hello timer for faster convergence
C. Configure Rapid PVST+ and adjust the timers for fast convergence
D. Create a VSS between the two distribution switches and also create a MEC between the VSS and each access layer switch.
Answer: D
Answer: C
Which two technologies can be used to interconnect data centers over an IP network and provide Layer 2 LAN extension? (Choose two.)
A. IS-IS
B. VXLAN
C. TRILL
D. Fabric Path
E. OTV
Answer: BE
Answer: AC
Answer:
Explanation:
Answer: C
Answer: CE
A. Application profile
B. L4-L7 services
Answer: B
A. Data networks must be limited to SSH, NTP, FTP, SNMP and TaCACS+ protocols
B. Data networks must never traverse the management network
C. Data networks and management networks must be in the routing table
D. Data networks must traverse the management network as a backup path
Answer: B
Answer: A
Refer to the exhibit. An engineer must provide a redesign for the distribution and access layers of the network. Which correction allows for a more efficient design?
A. Change the link between Distribution Switch A and Distribution Switch B to be a routed link.
B. Reconfigure the Distribution Switch A to become the HSRP Active.
C. Create an EtherChannel link between Distribution Switch A and Distribution Switch B.
D. Add a link between Access Switch A and Access Switch B.
Answer: B
A. marking traffic at the access layer with DSCP to support the traffic flow
B. marking traffic at the access layer with CoS to support the traffic flow
C. RSTP mdoel with PHB to support the traffic flows
D. IntServ model with RSVP to support the traffic flows
Answer: D
A. Portfast
B. UplinkFast
C. RPVST +
D. Multichassis EtherChannel
Answer: D
Answer: B
Explanation: The Cisco NAC Appliance (formerly Cisco Clean Access) is a product that allows network administrators to authenticate, authorize, evaluate, and
remediate wired, wireless, and remote users and their machines prior to allowing users onto the network. It identifies whether networked devices such as laptops,
IP phones, personal digital assistants, or printers are compliant with an organization's security policies, and repairs any vulnerabilities before permitting access to
the network. NAC Appliance lets you block access or quarantine users who do not comply with your security requirements, NAC Appliance enforces security
policies by blocking, isolating, and repairing noncompliant machines in a quarantine area without needing administrator attention. Quarantining allows remediation
servers to provide operating system patches and updates, virus definition files, or endpoint security solutions to compromised or vulnerable devices. Since there is
no any word regarding quarantine in option B, denying access to clients would be the next action by NAC Appliance.
A. A cisco ASA uses an IPS module to inspect HTTP and HTTPS traffic.
B. ACisco ASA redirects HTTP and HTTPS traffic to the WSA using WCCP.
C. ACisco ASA connects to the web security appliance via TLS to monitor HTTP and HTTPS traffic.
D. ACisco ASA redirects HTTP and HTTPS traffic to CWS with a Web Security Connector.
Answer: B
Answer: D
A. Core
B. Distribution
C. Access-layer within campus
D. Distribution in data center
E. WAN edge
Answer: A
Answer: B
Explanation: The best-practice recommendation for VSL link resiliency is to bundle two 10-Gbps ports from different sources. Doing this might require having one
port from the supervisor and other from a Cisco 6708 line card.
When configuring the VSL, note the following guidelines and restrictions:
For line redundancy, we recommend configuring at least two ports per switch for the VSL. For module redundancy, the two ports can be on different switching
modules in each chassis.
A. Ospf
B. Eigrp
C. ISIS
D. BGP
E. RIP
Answer: B
A. PaGP
B. LACP
C. VSL
D. EVPC
E. VSS
F. ECMP
Answer: E
A. 100
B. 80
C. 60
D. 50
Answer: C
Answer: C
Explanation: Key server is responsible for maintaining security policies, authenticating the GMs and providing the session key for encrypting traffic. KS
authenticates the individual GMs at the time of registration. Only after successful registration the GMs can participate in group SA.
https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transportvpn/deployment_guide_c0
Answer: CD
A. Create a distribute list that filters all routes except the default route and applies to both BGP neighbour interfaces in the inbound direction
B. Create a distribute list that filters all routes except the default route and applies to a single BGP neighbour in the outbound direction
C. Create prefix list that matches the company prefixes and applies to both BGP neighbour definitions in the outbound direction.
D. Create a route map that matches the provider BGP communities and networks and applies to both BGP neighbour interfaces in the outbound direction.
Answer: C
Answer: BE
A. The packet is dropped because it arrived on the interface used to route traffic back to the source address.
B. The packet is forwarded because it arrived on the interface used to route traffic back to the source address.
C. The packet is forwarded because it arrived on the interface used to route traffic to the destination address.
D. The packet is dropped because it arrived on the interface used to route traffic to the destination address.
Answer: A
A. route summarization
B. a virtual link
C. an NSSA
D. a static OSPF neighbor
Answer: B
A. ISL
B. VSL
C. VSS
Answer: B
A. ACisco ASA redirects HTTP and HTTPS traffic to the WSA using WCCP
B. ACisco ASA uses an IPS module to inspect HTTP and HTTPS traffic
C. ACisco ASA redirects HTTPS and HTTPS traffic to CWS with a Web Security Connector
D. ACisco ASA connects to the web Security Appliance via TLS to monitor HTTP and HTTPS traffic
Answer: A
A. VPLS
B. DMVPN
C. GETVPN
D. IPSec
E. MPLS
F. OTV
Answer: D
Answer:
Explanation:
A. bandwidth capabilities
B. packets per second processing capability
C. CPU capabilities
D. number of tunnels that can be aggregated
E. memory capabilities
Answer: BD
What should be implemented to prevent exceeding the 50mb allowable bandwidth of internet circuit?
A. policing
B. shaping
C. CIR
D. rate-limit
Answer: B
A. It is assigned by the Cisco ISE to the user or endpoint session upon login.
B. Best practice dictates it should be statically created on the switch.
C. It is removed by the Cisco ISE before reaching the endpoint.
D. Best Practice dictates that deployments should include a guest group allowing access to minimal services.
E. Best Practice dictates that deployments should include a security group for common services such as DNS and DHCP
Answer: AE
A. route weighting
B. route tagging
C. route filtering
D. route leaking
Answer: C
A. ToR
B. EoR
Answer: A
A. GRE Tunnel
B. HTTPS
C. Root Certificate
D. AAA Server
Answer: A
Answer: B
Explanation: The best-practice recommendation for VSL link resiliency is to bundle two 10-Gbps ports from different sources. Doing this might require having one
port from the supervisor and other from a Cisco 6708 line card. When configuring the VSL, note the following guidelines and restrictions:
For line redundancy, we recommend configuring at least two ports per switch for the VSL. For module redundancy, the two ports can be on different switching
modules in each chassis.
A. GRE
B. NHRP
C. SSH
D. ARP
Answer: B
A. Cisco FabricPath relies on OSPF to support Layer 2 forwarding between switches, which allows load balancing between redundant paths.
B. Cisco FabricPath provides MAC address scalability with conversational learning.
C. Loop mitigation is provided by the TTL field in the frame.
D. Cisco FabricPath is IETF-standard and is not used with Cisco products.
E. Cisco FabricPath technology is supported in all Cisco platforms and can replace legacy Ethernet in all campus networks.
Answer: BC
Answer: A
A. Transparent
B. Multicontext
C. Routed
D. IPS
Answer: B
A. Pim bidirectional
B. Pim Sparse
C. Pim Dense
D. Pim-SSM
Answer: D
A. Convergence time
B. Low operating expense (OpEx)
C. Low latency
D. Dynamic fault-tolerance
Answer: B
A. Configure different Autonomous System number per each branch office and HQ and redistribute routes between autonomous systems.
B. Configure all routers at branch offices as EIGRP stub and allow only directly connected networks atBranch offices to be advertised to HQ
C. Configure all routers at branch offices as EIGRP stub
D. Configure all routers at HQ and branch offices as EIGRP stub
Answer: C
A. Police the traffic to 5 mbps and allow excess traffic to be remarked to the default queue
B. Configure congestion avoidance mechanism WRED within the priority queue
C. Policy the traffic to 3.3 mbps and allow excess traffic to be remarked to the default queue
Answer: AE
A. OTV
B. VXLAN
C. FabricPath
D. IS-IS
Answer: A
A. urpf
B. arp inspection
C. vlan acl
D. …
Answer: A
A. PAgP
B. IVR
C. ISL
D. VSL
E. ...
Answer: D
A. AS path
B. MED
C. local preference
D. weight
E. origin code
Answer: AB
Explanation: Note : local pref and weight are for the other direction .
A. It is assigned by the Cisco ISE to the user or endpoint session upon login
B. Best practice dictates it should be statically created on the switch
C. It is removed by the Cisco ISE before reaching the endpoint.
D. Best Practice dictates that deployments should include a guest group allowing access to minimal services
E. Best Practice dictates that deployments should include a security group for common services such as DNS and DHCP
Answer: AE
A. Clients from all clusters should peer with all Route Reflectors
B. All Route Reflectors should be non-client peers in a partially meshed topology
C. All Route Reflectors must be non-client peers in a fully meshed topology
D. Clients must not peer with iBGP speakers outside the client router
E. Clients should peer with at least one other client outside it’s cluster
Answer: CD
A. IPS
B. Native Deny
C. EPG to EPG ...
D. ACL
Answer: B
Explanation: All the traffic between servers is denied (micro segmentation), to allow the traffic between EPGs we need to configure contracts.
A. Layer 2 out-of-band
B. Layer 2 in-band
C. Layer 3 out-of-band
D. Layer 3 in-band
Answer: B
Answer: AB
A. Multi-exit discriminator
B. AS path
C. Local Preference
D. Weight
Answer: AB
A. Equal-cost links
B. Unequal-cost links
C. HSRP
D. IGP
E. PVRSTP+
Answer: AD
Answer: CE
Answer: BC
Explanation: When connecting to multiple exit points from your AS and peering with multiple ISPs, there is a danger that by misconfiguration, you advertise routes
that are received from one ISP to the other ISP. Your AS can become a transit area for Internet traffic of other networks, which can cost you money and resources.
You can easily avoid this situation by advertising only your assigned address space to all adjacent ISPs (also, you can advertise only your local AS and filter out
the other ASs using BGP AS-path filter).
From a design point of view, this model (Multi-homing with Two ISPs) requires careful design consideration.
For example, to avoid making the enterprise network as a transit AS/path for the two external ISPs (for example, ISP1 and ISP2), it is recommended that you
always announce only your PI address space to the ISPs you are directly connected to. If, by mistake, you advertise routes that are received from ISP1 to ISP2,
and ISP2’s policy is not restrictive enough, your AS will start to participate in the Internet traffic exchange (become a transit AS).
In addition, if AS X, as shown in Figure 5-23, decided that the path to ISP1 from AS X is shorter through your network (via ISP2), it will start sending traffic that is
destined for ISP1 to your router. Your router will happily route the traffic to ISP1, but the problem is that this extra traffic might leave your users with no bandwidth
for themselves and, as a result, it will impact the overall user experience. Also, this situation raises a high security concern, because external traffic from an
unknown network, traffic that could be malicious, will be using your corporate network as a transit path. Therefore, you, as the network designer, need to ensure
that only the enterprise-owned PI address range is announced, combined with AS PATH filtering to permit only routes originating from the enterprise local AS to be
advertised.
To prevent your network from becoming a transit AS, make sure that you advertise only your own PI address space to both ISPs by using outbound route filtering,
BGP AS-PATH filtering, or a combination of both.
Answer: CD
Answer: D
A. VSAN provides a means of restricting visibility and connectivity among devices connected to a zone
B. VSANs have their own set of services and address space, which prevents an issue in one VSAN fromaffecting others
C. Zones provide the ability to create many logical SAN fabrics on a single Cisco MDS 9100 family switch
D. VSANs and zones use separate fabrics
E. Zones allow an administrator to control which initiators can see which targets
Answer: BE
A. 80
B. 50
C. 60
D. 100
Answer: C
A. Packet is dropped because it arrived on the interface that used to forward the packet back to source.
B. Packet is dropped because it arrived on the interface that used to forward the packet back to destination.
C. Packet is forwarded because it arrived on the interface that used to forward the packet back to destination
D. Packet is forwarded because it arrived on the interface that used to forward the packet back to source
Answer: D
Explanation: Routers perform a reverse path forwarding (RPF) check to ensure that arriving multicast packets were received through the interface that is on the
most direct path to the source that sent the packets. An RPF check is
always performed regarding the incoming interface, which is considered to be the RPF interface. The RPF
check will succeed if the incoming interface is the shortest path to the source. The router
determines the RPF interface by the underlying unicast routing protocol or the dedicated multicast routing protocol in cases where one exists. An example of a
dedicated multicast routing protocol is MP-BGP. It is important to note that the multicast routing protocol relies on the underlying unicast routing table. Any change
in the unicast routing table immediately triggers an RPF recheck on most modern routers.
A. OTV
B. VPN
C. HSRP
D. NAT
E. VRF
Answer: DE
A. VRRP
B. BGP
C. IPsec
D. SSL
Answer: B
Answer: ABE
Answer: AE
A. vxlan
B. OTV
C. VRF
D. vpn
E. HSRP
Answer:
AB
A. IGMP snooping
B. Filter at Boundaries
C. PIM Dense-Mode
D. MSDP
Answer: A
Explanation: I think solution for this one was to move STP root
Answer:
Explanation:
Answer: D
A. when first hop redundancy protocol exists with redundant Layer 2 links between distribution switches
B. when a VLAN spans access layer switches to support business applications
C. when trunks need to extend multiple VLANs across access switches
D. when it is necessary to speed up network convergence in case of link failure
Answer: A
Explanation: Previous answer was “B” but that has now been changed to “A”.
STP (L2 loop prevention mechanism) should be implemented in topologies where possible loops may occur
and redundant L2 links between distribution switches is a very good example as long as the links are not channelled (PC, vPC, MEC). If the redundant L2 links
between distribution switches are channelled, the topology is loop free so no STP is required but the doesn’t say anything about that.
With regards to answer “A”, VLAN can be stretched between multiple access switches via distribution layer and still be loop free so (know from experience).
A. HSRP
B. MEC
C. EIGRP
D. GLBP
Answer: B
A. Lower MED
B. Higher Local Preference
C. Higher Weight
D. Lower Router ID
Answer: C
Explanation: The BGP golden rule is that nobody can say me what is have to do with my routes Weight is the only attribute which is not transmitted – weight can
NOT be used by any neighbor to influence me. Within my AS i can also be influenced by Loc pref.
Weight is also the first in the list. I think it is weight is the right answer – because it is local significant where nobody only me have influence on.
A. GLBP
B. HSRP
C. VRRP
D. VSS
Answer: A
A. Layer 2 in-band
B. Layer 2 out-of-band
C. Layer 3 in-band
D. Layer 3 out-of-band
Answer: C
Answer: B
A. Shaping
B. Policing
Answer: A
A. Site-to-Site VPN
B. dynamic routing protocols
C. multicast routing
D. threat detection
E. quality of service
F. unified communications
Answer: AB
Explanation: This one is a little bit trickier, separate management access means the multi-context mode
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/hacontex pdf
Page 14 of Guidelines for Multiple Context Mode lists unsupported features, after you cross the unsupported features out - you are left with what works on a multi-
context mode firewall
Answer: B
Answer: B
Answer: C
Explanation: This answer is an example that show that the designer did not clearly defined his needs because the SP gave a L3 service when L2 was needed. In
other dumps from Internet answer is B and I think it is right, because designer must be sure that SP provides secure routing service with needed performance, but
how control protocols works inside SP net designer.
A. Core
B. Distribution
C. Data Center Distribution WAN Edge
D. WAN Edge
E. Campus access distribution layer
Answer: B
Explanation: Summarize at Service Distribution. It is important to force summarization at the distribution towards WAN Edge and towards campus & data centre
Answer: A
Answer: D
A customer wants to use HSRP as a First Hop Redundancy Protocol. Both routers are currently running and all interfaces are active. Which factor determines
which router becomes the active HSRP device?
A. the router with the highest MAC address for the respective group
B. the router with the highest interface bandwidth for the respective group
C. the router that boots up last
D. the router with the highest IP address for the respective group
Answer: D
A. Conforming
B. Violating
C. Bursting
D. Peak information rate
E. Committed information rate
F. Exceeding
G. Shaping rate
Answer: CDE
Answer: A
Answer: B
Answer: A
Answer: D
Explanation: The Data Center Bridging (DCB) architecture is based on a collection of open standards Ethernet extensions developed through the IEEE 802.1
working group to improve and expand
Ethernet networking and management capabilities in the data center. https**://**www.cisco.com/c/dam/en/us/solutions/collateral/data-center-
virtualization/ieee-802-1-data-centerbri at_a_glance_c45-460907.pdf
TRILL (“Transparent Interconnection of Lots of Links”) is an IETF Standard[1] implemented by devices called RBridges (routing bridges) or TRILL Switches.
https**://en.wikipedia.org/wiki/TRILL_(computing)
Answer: C
Explanation: Key server is responsible for maintaining security policies, authenticating the GMs and providing the session key for encrypting traffic. KS
authenticates the individual GMs at the time of registration. Only after
successful registration the GMs can participate in group SA. https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-
transportvpn/deployment_guide_c07_554713.html
Answer: EF
A. Cisco FabricPath
B. VTP
C. encryption
D. vPC
E. VRF
Answer: AD
A. OSPF
B. RIP
C. EIGRP
D. BGP
E. IS-IS
Answer: C
A. RSTP and STP choose the protocol with the best performance.
B. RSTP and STP interoperate and fast convergence is achieved.
C. RSTP and STP are not compatible and legacy ports error disable.
D. RSTP and STP interoperate but the fast convergence is not used.
Answer: D
A. OTV
B. FabricPath
C. vPC
D. MST
Answer: C
A. VTEP
B. VRRP
C. VLSM
D. VPLS
E. VRF
Answer: A
Answer: CD
A. 1
B. 2
C. 3
D. 4
E. 5
Answer: C
Answer: A
Answer: C
A. …
B. IS-IS
C. …
D. …
Answer: B
Explanation: - Cisco added multitopolgy support for IS-IS to increase flexibility within dual-stack environment.
- Two TLVs added:
• IPv6 reachability TLV
• IPv6 interface address TLV
- Multi topology IS-IS:
• A separate topology is kept for both IPv4 and IPv6 (some links may not be able to carry IPv6 --> Avoid traffic black-holed)
• This mode removes the restriction that all interfaces on which IS-IS is configured must support the identical set of network address families.
• A separate SFP per address family.
• Wide metric must be used.
- Single-topology IS-IS:
• One SPF instance for both IPv4 and IPv6.
• Easier to administer but network must be homogeneous.
• Due to consistency checks, a router running IS-IS for both IPv4 and IPv6 does notform an adjacency with a router running IS-IS for IPv4 or IPv6 only. Disable
consistency checks to maintain adjacencies active in heterogeneous environments. ForL1 links, this is primarily done during transition.
• As in any IS-IS design, L2 routers must be contiguous. IPv6 adjacency checks are notdone on L2 links.
A. IS-IS
B. VXLAN
C. TRILL
D. Fabric Path
E. OTV
Answer: BE
A. Marketing
B. Detection
C. Propagation
D. Prioitization
Answer: C
Explanation: Cisco TrustSec is defined in three phases: classification, propagation, and enforcement
A. No RP is required
B. There is reduced congestion in the network
C. IGMP is not required
D. It floods all multicast traffic throughout the network
Answer: B
A. VRF
B. Cisco virtual router
C. Instanced virtuer router
D. IS-IS
Answer: A
Answer: B
Answer: A
Explanation: Chapter 2 of CiscoPress CCDP fourth edition clearly says (there is even a test at the end of the chapter) that introducing additional ASes won’t
reduce the volume of EIGRP queries as these will be forwarded across the ASes.
A. PIM-SM; 232.0.0.0/8
B. ASM; 232.0.0.0/8
C. SSM; 224.0.0.0/8
D. SSM; 232.0.0.0/8
Answer: D
A. ISL
B. VSL
C. VSS
Answer: B
A. VPC
B. VXLAN
C. VRF
D. VDC
Answer: C
A. route redistribution
B. route redundancy
C. route filtering
D. route summarization
Answer: D
A. cascade
B. low-impact
C. open
D. high availability
E. monitor
Answer: BE
Answer: A
A. Taboo contract entries are looked up with higher priority than entries in regular contracts
B. Taboo contract entries are looked up with lower priority than entries in regular contracts.
C. They are not associated with one EPG
D. They are associated with one EPG
E. Taboo contract entries are looked up based on administrator configured priority
F. They are associated with pair of EPGs
Answer: AF
Explanation: There may be times when the ACI administrator might need to deny traffic that is allowed by another contract. Taboos are a special type of contract
that an ACI administrator can use to deny specific traffic that would otherwise be allowed by another contract. Taboos can be used to drop traffic matching a
pattern (any EPG, a specific EPG, matching a filter, and so forth). Taboo rules are applied in the hardware before the rules of regular contracts are applied. Taboo
contracts are not recommended as part of the ACI best practices but they can be used to transition from traditional networking to ACI. To imitate the traditional
networking concepts, an "allow-all-traffic" contract can be applied, with taboo contracts configured to restrict certain types of traffic." EPG – End-Point Groups
A. active/standby
B. active/active
C. zone based
D. virtual
E. routed
F. transparent
Answer: F
Answer: AC
Explanation: The router determines the RPF interface by the underlying unicast routing protocol or the dedicated multicast routing protocol in cases where one
exists. An example of a dedicated multicast routing protocol is MP-BGP.
It is important to note that the multicast routing protocol relies on the underlying unicast routing table. Any change in the unicast routing table immediately triggers
an RPF recheck on most modern routers. Having OSPF routing protocol in place won’t really ensure that the RPF check passes.
Let’s say we have implemented OSPF routing protocol within the topology below (have a look at the URL below), “R3” knows the best path to 1.1.1.0/24 is via
interface F0/0 but “R3” receives multicast packet from source server (1.1.1.1/24) on interface S0/0. The RPF will fail. We can get this fixed by implementing static
mroutes (static multicast-routes) to force multicast traffic to go back via interface S0/0 (ip mroute 0.0.0.0 0.0.0.0 s0/0)
Having unicast routing protocol (OSPF, EIGRP, BGP, RIP, IGRP, IS-IS etc) won't necessarily mean the RPF will succeed but having a multicast routing protocol
(Multipoint BGP) or dedicated multicast static routes (mroutes) will. The only which I still have is that if the multicast
routing protocol relies on the underlying unicast routing table (OSPF) how does it ensure that the RPF check passes.
https://supportforums.cisco.com/t5/network-infrastructure-documents/multicast-rpf-recovery-using-staticmultica routing/ta-p/3139007
Answer: A
A. VTEP
B. vxlan ?
Answer: A
A. fiberpath
B. TRILL
C. OTV
D. Vxlan
Answer: C
Answer: AB
Answer: C
A. OTV
B. VSS
C. vPC
D. VLAN
Answer: A
A. Looped
B. Ring
C. Hybrid
D. Star
Answer: D
A. AS path prepending
B. local preference
C. floating static route
D. HSRP
E. MED
F. weight
Answer: AB
A. no-advertise
B. no-export
C. local-as
D. internet
Answer: B
A. PfR
B. ATM
C. CEF
D. MLPPP
Answer: AD
A. SCP
B. ICMP
C. RADIUS
D. HTTPS
E. SSH
Answer: DE
A. a spine and leaf design with Layer 2/3 termination on the leaf nodes
B. a two-tier design with the Layer 2 termination on data center core
C. a three user design with a Layer 3 termination on the data center core
D. a spine and leaf design with Layer 2/3 termination on the some nodes
Answer: B
Answer: D
Answer: AE
A. It permits VLANs to extend across access switches that connect to a common aggregation module
B. All of the uplinks are in active state.
C. The aggregation layer is aware of FlexLinks.
D. It optimizes the access switch density.
Answer: A
A. Contract
B. Subject
C. Label
D. Filter
Answer: A
A. marking
B. detection
C. prioritization
D. propagation
Answer: D
A. 1
B. 128
C. 16
D. 32
Answer: D
A. StackWise
B. FEX
C. VSS
D. VPC
Answer: D
* 300-320 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 300-320 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year