This page was exported from Lead2pass New Updated Exam Questions [ https://www.getfreevce.com ] Export date:Sun Dec 22 8:32:59 2024 / +0000 GMT ___________________________________________________ Title: [2017 New] Ensure Pass 300-320 Exam With Lead2pass New 300-320 Brain Dumps (26-50) --------------------------------------------------- 2017 July Cisco Official New Released 300-320 Dumps in Lead2pass.com! 100% Free Download! 100% Pass Guaranteed! Are you struggling for the 300-320 exam? Good news, Lead2pass Cisco technical experts have collected all the questions and answers which are updated to cover the knowledge points and enhance candidates' abilities. We offer the latest 300-320 PDF and VCE dumps with new version VCE player for free download, and the new 300-320 dump ensures your 300-320 exam 100% pass. Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/300-320.html QUESTION 26CoS is applied for Layer 2 markings in an Ethernet environment. Which protocol must be configured on the Layer 2 switch port for CoS to work? A.    MPLSB.    IEEE 802.1WC.    IEEE 802.1QD.    IEEE 802.1SAnswer: C QUESTION 27Which protocol is used in an in-band network and why? A.    UDP, because it is connectionlessB.    SSH, because the username and password are encryptedC.    Telnet, because the username and password are sent in clearD.    MSDP, because it uses TCP as its transport protocol Answer: B QUESTION 28What is an advantage of having an out-of-band management? A.    It is less expensive to have an out-of-band management.B.    Network devices can still be managed, even in case of network outage.C.    There is no separation between the production network and the management network.D.    SSH protocol must be used to manage network devices. Answer: B QUESTION 29The direction of the flow of multicast traffic is based on which protocol? A.    PIMB.    IGMPC.    underlying IGPD.    MSDP Answer: CExplanation:https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/mcst_ovr.html"Reverse Path Forwarding (RPF) PIM uses the unicast routing information to create a distribution tree along the reverse path from the receivers towards the source. The multicast routers then forward packets along the distribution tree from the source to the receivers. RPF is a key concept in multicast forwarding. It enables routers to correctly forward multicast traffic down the distribution tree. RPF makes use of the existing unicast routing table to determine the upstream and downstream neighbors. A router will forward a multicast packet only if it is received on the upstream interface. This RPF check helps to guarantee that the distribution tree will be loopfree." QUESTION 30Which option can be implemented to manipulate the election of PIM DR to force multicast traffic to a certain path? A.    Assign a lower PIM DR priority to the PIM DR interface.B.    Assign a lower IP address to the PIM DR interface.C.    Assign a higher PIM DR priority to the PIM DR interface.D.    Increase the cost on the PIM DR interface. Answer: C QUESTION 31What network technology provides Layer 2 high availability between the access and distribution layers? A.    HSRPB.    MECC.    EIGRPD.    GLBP Answer: B QUESTION 32On which two types of links should routing protocol peerings be established according to best practice? (Choose two.) A.    distribution linksB.    end user linksC.    transit linksD.    core links Answer: CDExplanation:https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html#wp1107923 QUESTION 33An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic? A.    50 secondsB.    100 secondsC.    150 secondsD.    200 seconds Answer: DExplanation:https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/ hacampusdg.html#wp1107923The recommended best practice is to measure the system boot time, and set the HSRP preempt delaystatement to 50 percent greater than this value. This ensures that the HSRP primary distribution node hasestablished full connectivity to all parts of the network before HSRP preemption is allowed to occur"-> We can't choose 450 secondes so we take the higher delay available.. QUESTION 34What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device? A.    denies the client network resource accessB.    repairs the effected devicesC.    generates a Syslog messageD.    permits the client but limits to guest access Answer: AExplanation:https://www.cisco.com/c/en/us/td/docs/security/nac/appliance/configuration_guide/47/cam/47cam-book/m_intro.html"Cisco NAC Appliance compliance policies reduce the threat of computer viruses, worms, and other malicious code on your network. Cisco NAC Appliance is a powerful tool that enables you to enforce network access requirements, detect security threats and vulnerabilities on clients, and distribute patches, antivirus and antispyware software. It lets you block access or quarantine users who do not comply with your security requirements, thereby stopping viruses and worms at the edge of the network, before they can do harm." QUESTION 35Refer to the exhibit. A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario?   A.    transparent mode with the servers on the same subnetB.    routed mode with three security zonesC.    transparent mode with three security zonesD.    routed mode with two security zones Answer: B QUESTION 36Which route summarization most efficiently reduces perceived network complexity that is composed of subnetworks ranging from 172.16.20.0/24 to 172.16.36.0/24? A.    172.16.8.0/21B.    172.16.8.0/19C.    172.16.20.0/20D.    172.16.0.0/18E.    172.16.20.0/19 Answer: D QUESTION 37What is the recommended subnet between two sites that have a point-to-point connection to conserve IP addresses? A.    255.255.255.0B.    255.255.252.0C.    255.255.255.252D.    255.255.255.240 Answer: C QUESTION 38In which OSI layer does IS-IS operate? A.    Layer 1B.    Layer 2C.    Layer 3D.    Layer 4 Answer: B QUESTION 39Which algorithm does IS-IS use to determine the shortest path through a network? A.    Bellman-Ford routing algorithmB.    Johnson's algorithmC.    Dijkstra's algorithmD.    Floyd-Warshall algorithm Answer: C QUESTION 40Which unique EIGRP feature allows for faster Layer 3 convergence? A.    fast EIGRP timersB.    feasible successorsC.    hybrid routing protocolD.    Cisco proprietary protocol Answer: B QUESTION 41EIGRP uses which algorithm to build a routing table? A.    Dijkstra's algorithmB.    Floyd-Warshall algorithmC.    Diffusing Update AlgorithmD.    Johnson's algorithm Answer: C QUESTION 42A network engineer has implemented a looped triangle switch block design. What element must be included in the design? A.    first hop redundancy protocolB.    Layer 2 links between access switchesC.    single uplinks between access and distribution switchesD.    VLANs that span access switchesE.    Layer 3 links between distribution switches Answer: A QUESTION 43Refer to the exhibit. Which two features can enable high availability for first-hop Layer 3 redundancy? (Choose two.)   A.    VPCB.    IGMP V2C.    VRRPD.    PIME.    HSRP Answer: CE QUESTION 44To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions? A.    Layer 1B.    Layer 2C.    Layer 3D.    Layer 4E.    Layer 5F.    Layer 6G.    Layer 7 Answer: D QUESTION 45A Layer 2 switch in the network has recently started broadcasting traffic out of every port and is impacting network performance. The engineering department determines that a MAC overflow attack is the cause. Which two features can protect and mitigate the damage of the attacks? (Choose two.) A.    Storm ControlB.    Port SecurityC.    SPAND.    BPDU FiltersE.    IP Source GuardF.    VACLs Answer: AB QUESTION 46Refer to the exhibit. Based on the configuration, why are routers R1 and R2 not exchanging OSPF routes?   A.    The OSPF process numbers are different.B.    There is no backbone area configured.C.    The router IDs are different.D.    OSPF is not enabled on the interfaces. Answer: B QUESTION 47An engineer notices that many BGP peers utilize the same configuration parameters. What can the engineer configure to simplify BGP neighbor statements and generate more efficient BGP peer updates? A.    peer groupsB.    policy templatesC.    session templatesD.    peer address families Answer: A QUESTION 48What is the correct state between two BGP peers that are neighbors? A.    activeB.    operationalC.    establishedD.    up Answer: C QUESTION 49Refer to the exhibit. A network engineer manually reconfigures the BGP configuration on newly upgraded router R1. However, the BGP neighbor relationship does not come up with the directly connected neighbor router. What is causing the failure of the BGP neighbor relationship between routers R1 and R2?  A.    An incorrect neighbor IP address for router R2 is configured on router R1.B.    An incorrect neighbor AS number is configured on router R1 for router R2.C.    The wrong BGP authentication password is configured on router R1.D.    Router R1 must configure the R2 loopback address as the neighbor IP address. Answer: C QUESTION 50Which option is a primary requirement for the deployment of an IPv6-enabled network via the native method (dual-stack model) within the enterprise campus environment? A.    hardware-based switching support for IPv6 forwarding on all campus switchesB.    restriction of IPv6-enabled devices to the core layerC.    manual implementation of tunneling between IPv6-incompatible devices in an IPv4-over-IPv6 tunnelD.    disabling of multicast in the distribution layer prior to implementation of IPv6 Answer: A We ensure our new version 300-320 PDF and VCE dumps are 100% valid for passing exam, because Lead2pass is the top IT certification study training materials vendor. Many candidates have passed exam with the help of Lead2pass's VCE or PDF dumps. Lead2pass will update the study materials timely to make them be consistent with the current exam. Download the free demo on Lead2pass, you can pass the exam easily. 300-320 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDRmZpUHB2VDNvdTg 2017 Cisco 300-320 exam dumps (All 398 Q&As) from Lead2pass: https://www.lead2pass.com/300-320.html [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-07-13 07:48:22 Post date GMT: 2017-07-13 07:48:22 Post modified date: 2017-07-13 07:48:22 Post modified date GMT: 2017-07-13 07:48:22 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com