♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-320 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-320 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/300-320-exam-dumps.html

Q81. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address? 

A. The IGPs should utilize authentication to avoid being the most vulnerable component 

B. With SSM source or receiver attacks are not possible 

C. With Shared Trees access control is always applied at the RP 

D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network 


Q82. Which option is used as a top-of-rack device that is managed by its parent device, providing ease of management? 

A. Cisco Nexus 2000 

B. Cisco Nexus 5000 

C. Cisco Nexus 7000 

D. Cisco Nexus 9000 


Q83. Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.) 

A. You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment. 

B. SSO and NSF each require the devices to either be graceful restart-capable or graceful restart-aware. 

C. In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence times than single supervisors with tuned IGP timers 

D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers. 

E. Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers 

Answer: A,C 

Q84. OSPF stub areas are an important tool for the Network designer; which of the following two should be considered when utilizing OSPF stub areas? (Choose two) 

A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs 

B. OSPF not so stubby areas are particularly useful as a simpler form of summarization 

C. OSPF stub areas are always insulated from external changes 

D. OSPF totally stubby areas cannot distinguish among ABRs for the best route to destinations outside the area 

E. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPF domain 

Answer: C,D 

Q85. Which protocol will not adhere to the design requirement of the control plane being either separated or combined within a virtualization technology? 




D. NSF with SSO 


Q86. Which technology is an example of the need for a designer to clearly define features and desired performance when designing advanced WAN services with a service provider? 

A. FHRP to remote branches 

B. Layer 3 MPLS VPNs secure routing 

C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service 

D. Intrusion prevention, QoS, and stateful firewall support network wide 


Q87. In which multicast configuration is MSDP most useful? 

A. interdomain 

B. intradomain 

C. data center 

D. campus 


Q88. Which option describes the effect of using softphones instead of VoIP handsets on QoS implementation for the voice traffic? 

A. It provides a Layer 2 CoS marking in the frames that can be used for QoS implementation. 

B. Using softphones means that 802.1Q tagging must be configured between the PC and the switch. 

C. The voice traffic of softphones is mixed with data traffic of PC on the access VLAN. 

D. By using softphones, the implementation of a QoS depends only on trusting DSCP markings set by the PC. 


Q89. Which mechanism is enabled by default in the OTV technology to conserve bandwidth? 

A. Automatic unicast flooding is suppressed over the OTV link. 

B. BPDUs are allowed to traverse the OTV link. 

C. Control plane traffic is prevented from traversing the OTV link. 

D. Data plane traffic is prevented from traversing the OTV link. 


Q90. Which statement about Fibre Channel communications is correct? 

A. N_Port to N_Port connections use logical node connection points. 

B. Flow control is only provided by QoS. 

C. It must be implemented in an arbitrated loop. 

D. Communication methods are similar to those of an Ethernet bus.