300-320 Exam - ARCH Designing Cisco Network Service Architectures

certleader.com

P.S. Realistic 300-320 testing material are available on Google Drive, GET MORE: https://drive.google.com/open?id=1afo0MmXuiyo51N3kJairqV6Z-TIJb1W4


New Cisco 300-320 Exam Dumps Collection (Question 8 - Question 17)

New Questions 8

Which two protocols are used for high availability in enterprise networks? (Choose two.)

A. BGP

B. GLBP

C. RSTP

D. VRRP

E. OSPF

Answer: B,D


New Questions 9

Which protocol will not adhere to the design requirement of the control plane being either separated or combined within a virtualization technology?

A. FHRP

B. STP

C. CEF

D. NSF with SSO

Answer: B


New Questions 10

In a base e-Commerce module design, which routing statement is correct?

A. Routing is mostly static.

B. Hardcoded IP addresses are used to support failover.

C. Inbound servers use the CSM or ACE as the default gateway.

D. VLANs between the access layer switches are used for FHRP protocols.

Answer: A

Explanation: https://www.safaribooksonline.com/library/view/foundation-learning-guide/9780132652933/ch07.html

"Base Design Routing Logic Routing in this e-commerce module design is mostly static, using VIP addresses to support failover."


New Questions 11

Which feature can be used in the Cisco Nexus 7000 to create a snapshot of the current configuration?

A. Cisco FabricPath

B. HSRP

C. Rollback

D. vPC

Answer: C


New Questions 12

Which option is the primary reason to implement security in a multicast network?

A. maintain network operations

B. allow multicast to continue to function

C. optimize multicast utilization

D. ensure data streams are sent to the intended receivers

Answer: A


New Questions 13

Refer to the exhibit.

Based on the configuration, why are routers R1 and R2 not exchanging OSPF routes?

A. The OSPF process numbers are different.

B. There is no backbone area configured.

C. The router IDs are different.

D. OSPF is not enabled on the interfaces.

Answer: B


New Questions 14

The network engineering team is interested in deploying NAC within the enterprise network to enhance security. What deployment model should be used if the team requests that the NAC be logically inline with clients?

A. Layer 2 in-band

B. Layer 2 out-of-band

C. Layer 3 in-band

D. Layer 3 out-of-band

Answer: C

Explanation:

https://www.cisco.com/c/en/us/products/collateral/security/nac-appliance-clean-access/product_data_sheet0900aecd802da1b5.html

Passing traffic mode

u2022 Virtual gateway (bridged mode)

u2022 Real IP gateway (routed mode)

Client access mode

u2022 Layer 2 (client is adjacent to the Cisco NAC Server)

u2022 Layer 3 (client is multiple hops from the Cisco NAC Server)

Traffic flow model

u2022 In-band (Cisco NAC Server is always in-line with user traffic)

u2022 Out-of-band (Cisco NAC Server is in-line only during authentication, posture assessment, andremediation)

https://www.cisco.com/c/en/us/products/collateral/security/nac-appliance-clean-access/prod_qas0900aecd802da200.html

Q. Does an in-band deployment require the placement of multiple Cisco NAC Servers at the access layer?

A. No. The Server is logically in-line, not physically. This permits the placement of the Server at the core.

So, logically = layer 3 and inline = in-band


New Questions 15

Port security supports which type of port?

A. SPAN destination port

B. EtherChannel port-channel port

C. Nonnegotiating trunk port

D. DTP-enabled trunk port

Answer: C


New Questions 16

Which option does the FabricPath technology use to create loop-free Layer 2 networks?

A. STP

B. TTL

C. fabric tags

D. FSTP

Answer: C

Explanation:

Well, the dump said "TTL" and I think that's not entirely true. TTL ends up a looping packet but the loop can still be there. Fabric path uses IS-IS and the concept of "switch-ids" which could refer to "fabric tags"...

There are also the FTag (Forwarding Tag) which specifies which path the packet traverses...

Not very clear.

If the Q was something like: "Which option does the FabricPath technology use to mitigate Layer 2loops?"

I would have answered TTL.


New Questions 17

EIGRP uses which algorithm to build a routing table?

A. Dijkstra's algorithm

B. Floyd-Warshall algorithm

C. Diffusing Update Algorithm

D. Johnson's algorithm

Answer: C


Recommend!! Get the Realistic 300-320 dumps in VCE and PDF From Certifytools, Welcome to download: https://www.certifytools.com/300-320-exam.html (New 406 Q&As Version)