P.S. Realistic 300-320 training tools are available on Google Drive, GET MORE: https://drive.google.com/open?id=1m2hy4cRc4wvEGEt6al4pag1GuO4GSG6M
New Questions 16
With respect to address summarization, which of the following statements concerning IPv4 and IPv6 is true?
A. The potential size of the IPv6 address blocks suggests that address summarization favors IPv6 over IPv4.
B. Role based addressing using wildcard masks to match multiple subnets is suitable for IPv4, but unsuitable for IPv6.
C. In order to summarize, the number of subnets in the IPv4 address block should be a power of 2 while the number of subnets in the IPv6 address block should be a power of 64.
D. WAN link addressing best supports summarization with a /31 subnet for IPv4 and a /126 for IPv6.
Answer: B
Explanation:
http://www.ciscopress.com/articles/article.asp?p=1763921
"For IPv6 access lists, the wildcard masks are not usually used. All source and destination addresses are notated in the form of prefixes. Therefore, it is important that subnets that are to be grouped in an access list falling within a summarized address range."
New Questions 17
What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?
A. denies the client network resource access
B. repairs the effected devices
C. generates a Syslog message
D. permits the client but limits to guest access
Answer: A
Explanation: https://www.cisco.com/c/en/us/td/docs/security/nac/appliance/configuration_guide/47/cam/ 47cam-book/m_intro.html
"Cisco NAC Appliance compliance policies reduce the threat of computer viruses, worms, and other malicious code on your network. Cisco NAC Appliance is a powerful tool that enables you to enforce network access requirements, detect security threats and vulnerabilities on clients, and distribute patches, antivirus and antispyware software. It lets you block access or quarantine users who do not comply with your security requirements, thereby stopping viruses and worms at the edge of the network, before
they can do harm."
New Questions 18
What network technology provides Layer 2 high availability between the access and distribution layers?
A. HSRP
B. MEC
C. EIGRP
D. GLBP
Answer: B
New Questions 19
here are 3 steps to confirm whether a range of IP addresses can be summarized. Which of the following is used in each of these 3 steps?
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
Answer: C
New Questions 20
What network storage protocol uses a connection standard incompatible with shared 10Gb Ethernet physical connection?
A. SMB
B. iSCSI
C. FC
D. NFS
E. CIFS
Answer: C
New Questions 21
Which option describes the purpose of the auto-cost reference bandwidth 10000 command under the OSPF process?
A. Recognize redundant 10 Megabit links.
B. Differentiate cost on a 10 Gigabit Ethernet trunk link.
C. Change the default bandwidth for a 100 Megabit link.
D. Adjust the link bandwidth for routing protocols.
Answer: B
New Questions 22
Refer to the exhibit.
A network engineer manually reconfigures the BGP configuration on newly upgraded router R1. However, the BGP neighbor relationship does not come up with the directly connected neighbor router.
What is causing the failure of the BGP neighbor relationship between routers R1 and R2?
A. An incorrect neighbor IP address for router R2 is configured on router R1.
B. An incorrect neighbor AS number is configured on router R1 for router R2.
C. The wrong BGP authentication password is configured on router R1.
D. Router R1 must configure the R2 loopback address as the neighbor IP address.
Answer: C
New Questions 23
Which statement about Fibre Channel communications is correct?
A. N_Port to N_Port connections use logical node connection points.
B. Flow control is only provided by QoS.
C. It must be implemented in an arbitrated loop.
D. Communication methods are similar to those of an Ethernet bus.
Answer: A
Explanation:
Fibre Channel supports a logical node connection point between node ports (N_ports). This is similar to TCP and UDP sockets.
New Questions 24
CoS is applied for Layer 2 markings in an Ethernet environment. Which protocol must be configured on the Layer 2 switch port for CoS to work?
A. MPLS
B. IEEE 802.1W
C. IEEE 802.1Q
D. IEEE 802.1S
Answer: C
100% Leading Cisco 300-320 Questions & Answers shared by Certleader, Get HERE: https://www.certleader.com/300-320-dumps.html (New 482 Q&As)