web analytics

PassLeader Valid 300-320 Dumps with VCE and PDF (Question 181 – Question 205)

New 300-320 exam questions from PassLeader 300-320 dumps! Welcome to download the newest PassLeader 300-320 VCE and PDF dumps: http://www.passleader.com/300-320.html (605 Q&As –> 628 Q&As –> 709 Q&As –> 724 Q&As)

P.S. Free 300-320 dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=0B-ob6L_QjGLpUjVQcjU5aFFtWVU

An engineer is designing an address plan. Which IPv6 prefix removes any consideration regarding the number of hosts per subnet?

A.    /32
B.    /48
C.    /64
D.    /96

Answer: C

Two recently merged companies are using EIGRP and RIP. Which two strategies can facilitate a smooth migration? (Choose two.)

A.    Create an OSPF instance between EIGRP and RIP routing domains.
B.    Redistribute routing information between the RIP and EIGRP protocols.
C.    Add EIGRP and then remove RIP on the acquired company network.
D.    Use the EIGRP administrative distance to migrate one site at a time.
E.    Use static routes in place of dynamic routing between companies.

Answer: BC

Two companies recently merged and want to integrate their networks. Both utilize EIGRP to support their complex enterprise networks. Which action can improve the performance of these two separate EIGRP domains?

A.    Enable route summarization at redistribution points.
B.    Adjust the administrative distance to prefer the best routes to each destination.
C.    Remove EIGRP and utilize OSPF instead.
D.    Utilize EIGRP stub routing between the network boundaries of the companies.

Answer: A

Which IPv4 multicast technical component measure provides architectural security?

A.    IGMP max groups
B.    access lists
C.    scoped addresses
D.    state limit

Answer: C

Which option is the primary reason to implement security in a multicast network?

A.    maintain network operations
B.    allow multicast to continue to function
C.    optimize multicast utilization
D.    ensure data streams are sent to the intended receivers

Answer: A

Refer to the exhibit. Which Layer 2 feature detects a link failure between the switch and router B that decreases OSPF reconvergence to approximately 50 milliseconds?

A.    BFD
B.    UDLD
C.    RSTP
D.    PVST+

Answer: A

Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network?

A.    Because the IP phone is a three-port switch, IP telephony extends the network edge, impacting the Distribution layer.
B.    Video and voice are alike in being bursty and bandwidth intensive, and thus impose requirements to be lossless, and have minimized delay and jitter.
C.    IP phones have no voice and data VLAN separation, so security policies must be based on upper layer traffic characteristics.
D.    Though multi-VLAN access ports are set to dot1q and carry more than two VLANs they are not trunk ports.

Answer: D

Addressing QoS design in the Enterprise Campus network for IP Telephony applications means what?

A.    It is critical to identify aggregation and rate transition points in the network, where preferred traffic and congestion QoS policies should be enforced
B.    Suspect traffic should be dropped closest to the source, to minimize wasting network resources
C.    An Edge traffic classification scheme should be mapped to the downstream queue configuration
D.    Applications and Traffic flows should be classified, marked and policed within the Enterprise Edge of the Enterprise Campus network

Answer: A

The requirement for high availability within the Data Center network may cause the designer to consider which one of the following solutions?

A.    Construct a hierarchical network design using EtherChannel between a server and two VDCs from the same physical switch
B.    Utilize Cisco NSF with SSO to provide intrachassis SSO at Layers 2 to 4
C.    Define the Data Center as an OSPF NSSA area, advertising a default route into the DC and summarizing the routes out of the NSSA to the Campus Core
D.    Implement network services for the Data Center as a separate services layer using an active/active model that is more predictable in failure conditions

Answer: B

When designing remote access to the Enterprise Campus network for teleworkers and mobile workers, which of the following should the designer consider?

A.    It is recommended to place the VPN termination device in line with the Enterprise Edge firewall, with ingress traffic limited to SSL only
B.    Maintaining access rules, based on the source IP of the client, on an internal firewall drawn from a headend RADIUS server is the most secure deployment
C.    VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
D.    Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick), including at Layer7

Answer: D

Which three statements about firewall modes are correct? (Choose three.)

A.    A firewall in routed mode has one IP address.
B.    A firewall in transparent mode has one IP address.
C.    In routed mode, the firewall is considered to be a Layer 2 device.
D.    In routed mode, the firewall is considered to be a Layer 3 device.
E.    In transparent mode, the firewall is considered to be a Layer 2 device.
F.    In transparent mode, the firewall is considered to be a Layer 3 device.

Answer: BDE

Which two of these correctly describe asymmetric routing and firewalls? (Choose two.)

A.    only operational in routed mode
B.    only operational in transparent mode
C.    only eight interfaces can belong to an asymmetric routing group
D.    operational in both failover and non-failover configurations
E.    only operational when the firewall has been configured for failover

Answer: CD

Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.)

A.    You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.
B.    SSO and NSF each require the devices to either be graceful restart-capable or graceful restart-aware.
C.    In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence times than single supervisors with tuned IGP timers.
D.    The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E.    Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers.

Answer: AC

Refer to the exhibit. Which of the following two are advantages of Server virtualization using VMware vSphere? (Choose two)

A.    Retains the one-to-one relationship between switch ports and functional servers
B.    Enables the live migration of a virtual server from one physical server to another without disruption to users or loss of services
C.    The access layer of the network moves into the vSphere ESX servers, providing streamlined vSphere management
D.    Provides management functions including the ability to run scripts and to install third-party agents for hardware monitoring, backup, or systems management
E.    New functional servers can be deployed with minimal physical changes on the network

Answer: BD

Which of the following two are effective and simple means of employing route summarization within the Enterprise Campus network? (Choose two)

A.    A default route ( /0) advertised dynamically into the rest of the network
B.    Route filtering to manage traffic flows in the network, avoid inappropriate transit traffic through remote nodes, and provide a defense against inaccurate or inappropriate routing updates
C.    Use manual split horizon
D.    Use a structured hierarchical topology to control the propagation of EIGRP queries
E.    Open Shortest Path First (OSPF) stub areas

Answer: AE

From a design perspective which two of the following OSPF statements are most relevant? (Choose two)

A.    OSPF stub areas can be thought of as a simple form of summarization
B.    OSPF cannot filter intra-area routes
C.    An ABR can only exist in two areas – the backbone and one adjacent area
D.    Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area
E.    The size of an area (the LSDB) will be constrained by the size of the IP MTU

Answer: AB

OSPF stub areas are an important tool for the Network designer; which of the following two should be considered when utilizing OSPF stub areas? (Choose two)

A.    OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B.    OSPF not so stubby areas are particularly useful as a simpler form of summarization
C.    OSPF stub areas are always insulated from external changes
D.    OSPF totally stubby areas cannot distinguish among ABRs for the best route to destinations outside the area
E.    OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPF domain

Answer: CD

Which two protocol characteristics should be most considered when designing a single unified fabric for the Data Center? (Choose two.)

A.    FCIP or FCoE allow for easier integration by using the Fibre Channel Protocol (FCP) and Fibre Channel framing
B.    iSCSI uses a special EtherType and an additional header containing additional control information
C.    FCIP and iSCSI has higher overhead than FCoE owing to TCP/IP
D.    FCoE was initially developed to be used as a switch-to-switch protocol, while FCIP is primarily meant to be used as an access layer protocol to connect hosts and storage to a Fibre Channel SAN
E.    FCoE requires gateway functionality to integrate into an existing Fibre Channel network

Answer: AC

Drag and Drop Question
Drag the best practice recommendation for an Enterprise Campus network on the left to the technology to which it most applies on the right.


Drag and Drop Question


Drag and Drop Question


Which of these Layer 2 access designs does not support VLAN extensions?

A.    FlexLinks
B.    loop-free U
C.    looped square
D.    looped triangle
E.    loop-free inverted U

Answer: B

Which statement about Fibre Channel communications is correct?

A.    N_Port to N_Port connections use logical node connection points.
B.    Flow control is only provided by QoS.
C.    It must be implemented in an arbitrated loop.
D.    Communication methods are similar to those of an Ethernet bus.

Answer: A

In base e-Commerce module designs, where should firewall perimeters be placed?

A.    core layer
B.    Internet boundary
C.    aggregation layer
D.    aggregation and core layers
E.    access and aggregation layers

Answer: A

The Cisco Nexus 1000V is intended to address which disadvantage of the VMware vSphere solution?

A.    Inability to deploy new functional servers without requiring physical changes on the network
B.    Complexity added by the requirement for an ESX host for each virtual machine
C.    Network administrators lack control of the access layer of the network
D.    To increase the number of physical infrastructure and the virtual machines that can be managed

Answer: C

New 300-320 exam questions from PassLeader 300-320 dumps! Welcome to download the newest PassLeader 300-320 VCE and PDF dumps: http://www.passleader.com/300-320.html (605 Q&As –> 628 Q&As –> 709 Q&As –> 724 Q&As)

P.S. Free 300-320 dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=0B-ob6L_QjGLpUjVQcjU5aFFtWVU