2017 November Cisco Official New Released 300-320 Dumps in Lead2pass.com!
100% Free Download! 100% Pass Guaranteed!
I have studied the 300-320 study guide and all questions were very authentic. I passed my 300-320 exam with good grades. I am very happy now. I will definitely back for more exams dumps. I settled well in my career with the help of Lead2pass.com. Thank also guys Hurry!!!!
Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/300-320.html
Which two of these are recommended practices with trunks? (Choose two.)
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
As a recommended practice, when configuring switch-to-switch interconnections to carry multiple VLANs,set Dynamic Trunking Protocol (DTP) to Desirable and Desirable with Encapsulation Negotiate to support DTP negotiation.
Which security feature can help prevent spoofed packets on the network?
D. DHCP spoofing
A company requires redundancy for its multihomed BGP external connections. What two features can be configured on the WAN routers to automate failover for both outbound and inbound traffic? (Choose two.)
A. AS path prepending
B. local preference
C. floating static route
A network design engineer has been asked to reduce the size of the SPT on an IS-IS broadcast network. Which option should the engineer recommend to accomplish this task?
A. Configure the links as point-to-multipoint.
B. Configure QoS in all links.
C. Configure a new NET address.
D. Configure the links as point-to-point.
An organization is designing the IP allocation of a new site. It currently has 12 separate IP segments. Each segment must be /24, accommodate 25% of growth, and be easily summarized.
Which summarized IP block can be subnetted to meet these requirements?
What are the two methods of ensuring that the RPF check passes? (Choose two.)
A. implementing static mroutes
B. implementing OSPF routing protocol
C. implementing MBGP
D. disabling the interface of the router back to the multicast source
E. disabling BGP routing protocol
RPF is checking does the multicast traffic comes from shortest path, due to avoid loop. It checks it according to routing table and underlying IGP. So if it is needed to send traffic between subnets you can use static routes or OSPF as underlying protocol.
A BGP network is having difficulty scaling with the full mesh peer requirement. What two iBGP alternates can scale BGP appropriately? (Choose two.)
B. route reflectors
D. peer groups
E. peer templates
A designer should have which three technologies in the network before configuring MPLS Layer 3 VPNs? (Choose three.)
C. Cisco Express Forwarding
When a Cisco ASA adaptive security appliance is configured for active/standby failover, which MAC address is used for the active unit?
A. the MAC address of the primary unit
B. the MAC address of the secondary unit
C. the virtual MAC address
D. the standby MAC address
Which statement about the ToR design model is true?
A. It can shorten cable runs and simplify rack connectivity.
B. Each ToR switch must be individually managed.
C. Multiple ToR switches can be interconnected to provide a loop-free spanning-tree infrastructure.
D. It can connect servers that are located in separate racks.
Voice and video-conferencing applications that support multistreaming use which protocol?
C. Multipath TCP
SCTP : Stream Control Transmission Protocol
Drag and Drop Question
Drag the rule on the left to match the appropriate activity on the right.
Which two features can you implement to control which networks are advertised by a BGP router? (Choose two.)
A. prefix lists
B. route maps
C. policy maps
D. router SNMP statements
E. crypto maps
Which three authentication services are supported by Cisco NAC Appliance? (Choose three.)
Working with Existing Backend Authentication Servers When working with existing backend authentication servers, Cisco supports the following authentication protocol types:
·RADIUS (Remote Authentication Dial-In User Service)
·Windows NT (NTLM Auth Server)
·LDAP (Lightweight Directory Access Protocol)
In what situation must spanning-tree be implemented?
A. when first hop redundancy protocol exists with redundant Layer 2 links between distribution switches
B. when a VLAN spans access layer switches to support business applications
C. when trunks need to extend multiple VLANs across access switches
D. when it is necessary to speed up network convergence in case of link failure
You may need to implement STP for several reasons:
·When a VLAN spans access layer switches to support business applications;
What is an advantage of using the Cisco FabricPath feature in a data center environment?
A. VSS does not have to be configured.
B. Transparent Interconnection of Lots of Links can be configured simultaneously.
C. Equal-Cost Multipath can be used to choose the forwarding path.
D. The control plane and management plane remain separate.
Which two features provide resiliency in a data center? (Choose two.)
A. Cisco FabricPath
Which two options correct when using VSS to combine two physical switches into one logical switch? (Choose two)
A. Both data planes forward traffic simultaneously.
B. Only one data plane forwards traffic, while the other data plane is on standby.
C. Both control planes forward traffic simultaneously.
D. Control planes are combined into one virtual control plane.
Why is QoS important for in-band management?
A. It supports remote management when traffic volume is high.
B. It supports proper routing.
C. It supports network security against DoS attacks and worm outbreaks.
D. It supports network redundancy.
Which VPN technology supports dynamic creation of spoke-to-spoke VPN tunnels to provide a scalable design?
B. GRE over IPsec
Which statement best describes Cisco OTV internal interfaces?
A. They are Layer 2 interfaces that are configured as either access or trunk interfaces on the switch.
B. They are interfaces that perform Layer 3 forwarding with aggregation switches.
C. They are the interfaces that connect to the ISP.
D. They are tunnel interfaces that are configured with GRE encapsulation.
“Internal Interfaces To perform OTV functionality, the edge device must receive the Layer 2 traffic for all VLANs that need to be extended to remote locations. The Layer 2 interfaces, where the Layer 2 traffic is usually received, are named internal interfaces”
Which option is a method of restricting access for users based on user roles and locales?
Which option does best practice dictate for the maximum number of areas that an OSPF router should belong to for optimal performance?
Which ISP technology can be implemented as a service when designing a topology to perform extranet connectivity via multitenant segmentation from within a corporate intranet?
A. Cisco Easy VPN
B. GRE over IPsec
What are two advantages of using Cisco FEX devices in the data center design? (Choose two.)
A. Traffic-forwarding decisions are made by the Cisco FEX device.
B. Cisco FEX devices must be upgraded when the parent switch is upgraded.
C. Traffic-forwarding decisions are made by the parent switch, resulting in easier troubleshooting and centralized management.
D. Cisco FEX devices do not have to be upgraded when the parent switch is upgraded, resulting in cost savings.
E. Cisco FEX devices can be part of two different VDCs.
All the 300-320 exam questions are 100% verified by their experts team. So there is no chances of errors. So you can prepare your 300-320 exam without any hesitation.
More 300-320 new questions (with images) on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDUGlzdWdZNHUwZ28
2017 Cisco 300-320 exam dumps (All 425 Q&As) from Lead2pass:
https://www.lead2pass.com/300-320.html [100% Exam Pass Guaranteed]