300-320 Exam - Designing Cisco Network Service Architectures

certleader.com

Q1. What is the recommended subnet between two sites that have a point-to-point connection to conserve IP addresses? 

A. 255.255.255.0 

B. 255.255.252.0 

C. 255.255.255.252 

D. 255.255.255.240 

Answer:

Q2. Which two types of authentication mechanisms can be used by VRRP for security? (Choose two.) 

A. SHA-1 

B. MD5 

C. SHA-256 

D. plaintext authentication 

E. PEAP 

Answer: B,D 

Q3. Which two options improve BGP scalability in a large autonomous system? (Choose two.) 

A. route reflectors 

B. route redistribution 

C. confederations 

D. communities 

Answer: A,C 

Q4. Addressing QoS design in the Enterprise Campus network for IP Telephony applications means what? 

A. It is critical to identify aggregation and rate transition points in the network, where preferred traffic and congestion QoS policies should be enforced 

B. Suspect traffic should be dropped closest to the source, to minimize wasting network resources 

C. An Edge traffic classification scheme should be mapped to the downstream queue configuration 

D. Applications and Traffic flows should be classified, marked and policed within the Enterprise Edge of the Enterprise Campus network 

Answer:

Q5. Which protocol should be configured if a network administrator has the following requirements? 

. Multiple physical gateways participating simultaneously in packet forwarding. 

. All hosts in the VLAN configured with the same default gateway address. 

A. HSRP 

B. VRRP 

C. VTP 

D. GLBP 

Answer:

Q6. With respect to address summarization, which of the following statements concerning IPv4 and IPv6 is true? 

A. The potential size of the IPv6 address blocks suggests that address summarization favors IPv6 over IPv4. 

B. Role based addressing using wildcard masks to match multiple subnets is suitable for IPv4, but unsuitable for IPv6. 

C. In order to summarize, the number of subnets in the IPv4 address block should be a power of 2 while the number of subnets in the IPv6 address block should be a power of 64. 

D. WAN link addressing best supports summarization with a /126 subnet for IPv4 and a /31 for IPv6. 

Answer:

Q7. Which security feature can help prevent spoofed packets on the network? 

A. uRPF 

B. ACLs 

C. DAI 

D. DHCP spoofing 

Answer:

Q8. DRAG DROP 

Drag the rule on the left to match the appropriate activity on the right. 

Answer:  

Q9. Which route summarization most efficiently reduces perceived network complexity that is composed of subnetworks ranging from 172.16.20.0/24 to 172.16.36.0/24? 

A. 172.16.8.0/21 

B. 172.16.8.0/19 

C. 172.16.20.0/20 

D. 172.16.0.0/18 

E. 172.16.20.0/19 

Answer:

Q10. Refer to the exhibit. A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario? 

A. transparent mode with the servers on the same subnet 

B. routed mode with three security zones 

C. transparent mode with three security zones 

D. routed mode with two security zones 

Answer: