300-320 Exams Study Guides

by David Milan IT Certification

Question: 1


What is the purpose of an OTV edge device?


A. connect to other data centers

B. connect to the access layer

C. connect to the end users

D. connect to mobile devices


Answer: A

"Edge Device

The edge device (Figure 1-1) performs OTV functions: it receives the Layer 2 traffic for all VLANs that need to be extended to remote locations and dynamically encapsulates the Ethernet frames into IP packets that are then sent across the transport infrastructure.


Finally, the OTV edge device can be positioned in different parts of the data center. "


Question: 2


Which architecture provides a way to deliver end-to-end QoS as required by real-time voice and video business



A. IntServ

B. DiffServ


D. ToS



Answer: A   


DiffServ is known as "Hop-by-Hop" and not "End-to-End"


Question: 3


CoS is applied for Layer 2 markings in an Ethernet environment. Which protocol must be configured on the Layer 2 switch port for CoS to work?



B. IEEE 802.1W

C. IEEE 802.1Q

D. IEEE 802.1S


Answer: C   


Question: 4


Which protocol is used in an in-band network and why?


A. UDP, because it is connectionless

B. SSH, because the username and password are encrypted

C. Telnet, because the username and password are sent in clear

D. MSDP, because it uses TCP as its transport protocol


Answer: B   


Question: 5


What is an advantage of having an out-of-band management?


A. It is less expensive to have an out-of-band management.

B. Network devices can still be managed, even in case of network outage.

C. There is no separation between the production network and the management network.

D. SSH protocol must be used to manage network devices.


Answer: B   


Question: 6


The direction of the flow of multicast traffic is based on which protocol?




C. underlying IGP



Answer: C

"Reverse Path Forwarding (RPF) PIM uses the unicast routing information to create a distribution tree along the reverse path from the receivers towards the source. The multicast routers then forward packets along the distribution tree from the source to the receivers. RPF is a key concept in multicast forwarding. It enables routers to correctly forward multicast traffic down the distribution tree. RPF makes use of the existing unicast routing table to determine the upstream and downstream neighbors. A router will forward a multicast packet only if it is received on the upstream interface. This RPF check helps to guarantee that the distribution tree will be loopfree."


Question: 7


What network technology provides Layer 2 high availability between the access and distribution layers?







Answer: B   


Question: 8


An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic?


A. 50 seconds

B. 100 seconds

C. 150 seconds

D. 200 seconds


Answer: D


"The recommended best practice is to measure the system boot time, and set the HSRP preempt delay

statement to 50 percent greater than this value. This ensures that the HSRP primary distribution node has

established full connectivity to all parts of the network before HSRP preemption is allowed to occur"-> We can't choose 450 secondes so we take the higher delay available..


Question: 9


What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?


A. denies the client network resource access

B. repairs the effected devices

C. generates a Syslog message

D. permits the client but limits to guest access


Answer: A


"Cisco NAC Appliance compliance policies reduce the threat of computer viruses, worms, and other malicious code on your network. Cisco NAC Appliance is a powerful tool that enables you to enforce network access requirements, detect security threats and vulnerabilities on clients, and distribute patches, antivirus and antispyware software. It lets you block access or quarantine users who do not comply with your security requirements, thereby stopping viruses and worms at the edge of the network, before

they can do harm."


Question: 10


Refer to the exhibit.

A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario?


A. transparent mode with the servers on the same subnet

B. routed mode with three security zones

C. transparent mode with three security zones

D. routed mode with two security zones


Answer: B   


Question: 11


Which route summarization most efficiently reduces perceived network complexity that is composed of

subnetworks ranging from to








Answer: D   


Question: 12


What is the recommended subnet between two sites that have a point-to-point connection to conserve IP addresses?







Answer: C   


Question: 13


Which algorithm does IS-IS use to determine the shortest path through a network?


A. Bellman-Ford routing algorithm

B. Johnson's algorithm

C. Dijkstra's algorithm

D. Floyd-Warshall algorithm


Answer: C   


Question: 14


EIGRP uses which algorithm to build a routing table?


A. Dijkstra's algorithm

B. Floyd-Warshall algorithm

C. Diffusing Update Algorithm

D. Johnson's algorithm


Answer: C   


Question: 15


A network engineer has implemented a looped triangle switch block design. What element must be included in the design?

Sponsor Ads

About David Milan Freshman   IT Certification

16 connections, 0 recommendations, 47 honor points.
Joined APSense since, July 28th, 2017, From Bhrmingum, United Kingdom.

Created on Aug 28th 2017 05:20. Viewed 564 times.


No comment, be the first to comment.
Please sign in before you comment.