P.S. Printable 300-320 ebook are available on Google Drive, GET MORE: https://drive.google.com/open?id=1TZUl5jRVJZQtESeD-xlDpBtcsGdXlmfH
New Questions 8
A company uses BGP to connect with the ISP on the enterprise network and wants to improve performance due to the increasing number of iBGP peers. Which two design solutions address the iBGP full mesh requirement? (Choose two.)
A. Route reflectors
B. condeferations
C. AS path prepending
D. communities
E. conditional advertising
Answer: A,B
New Questions 9
Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.)
A. SHA-1
B. MD5
C. SHA-256
D. plaintext authentication
E. PEAP
Answer: B,D
New Questions 10
An engineer has an implemented a QOS architecture that requires a signaling protocol to tell routers which flows of packets require special treatment. Which two mechanisms are important to establish and maintaining QOS architecture? (choose two)
A. classification
B. tagging
C. packet scheduling
D. admission control
E. resource reservation
Answer: D,E
New Questions 11
Which one of these could you implement to sustain a large DDoS attack?
A. Stateful firewall
B. uRPF
C. Connections limits and timeouts
D. Access-lists
Answer: C
New Questions 12
Which two design principles should be followed to scale EIGRP properly? (Choose two.)
A. Ensure that the network design follows a structured hierarchical topology.
B. Utilize route summarization on edge devices.
C. Implement multiple autonomous systems, regardless of the size of the network.
D. Tune EIGRP delay metric on all core devices.
E. Configure offset lists on the network border.
Answer: A,B
New Questions 13
Uplink floating state ( up and down ) .what you can do to solve this problem ?
A. route summary
B. Cisco Express Forwarding
C. BFD
D. UDLD
Answer: A
New Questions 14
Summary address blocks can be used to support which network application?
A. QoS
B. IPsec tunneling
C. Cisco TrustSec
D. NAT
E. DiffServ
Answer: D
Explanation:
http://www.ciscopress.com/articles/article.asp?p=1763921
Summary address blocks can be used to support several network applications:
Separate VLANs for voice and data, and even role-based addressing Bit splitting for route summarization
Addressing for virtual private network (VPN) clients Network Address Translation (NAT)
New Questions 15
A client security policy requires separate management control planes for different divisions with the company, which technology can be used to achieve this requirement while minimizing physical devices?
A. Virtual routing and forwarding
B. Virtual device contexts
C. Virtual Switching System
D. Virtual Local Area Networks
E. Virtual port channels
Answer: B
New Questions 16
Which of the following is a recommended practice of a data center core?
A. Server-to-server traffic always remains in the core layer.
B. The core infrastructure should be in Layer 3.
C. Core layer should run BGP along with an IGP because iBGP has a lower administrative distance than any IGP
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port
Answer: B
New Questions 17
A network engineer is designing a network that must incorporate seamless failover when a link failure occurs between the core and distribution layer. What two technologies will allow this? (Choose two)
A. ECMP
B. RSTP
C. MEC
D. GLBP
E. HSRP
Answer: A,C
Recommend!! Get the Printable 300-320 dumps in VCE and PDF From Examcollection, Welcome to download: http://www.examcollectionuk.com/300-320-vce-download.html (New 482 Q&As Version)