[Free] 2019(Nov) EnsurePass Cisco 300-320 Dumps with VCE and PDF 101-110

Get Full Version of the Exam
http://www.EnsurePass.com/300-320.html

Question No.101

DRAG DROP

image

Correct Answer:

image

Question No.102

OTV relies on which underlying protocol?

  1. EIGRP

  2. IS-IS

  3. OSPF

  4. BGP

Correct Answer: B

Question No.103

An CSPF router should have a maximum of how many adjacent neighbors?

A.

80

B.

60

C.

100

D.

50

Correct Answer: B

Question No.104

A Layer 2 switch in the network has recently started broadcasting traffic out of every port and is impacting network performance. The engineering department determines that a MAC overflow attack is the cause. Which two features can protect and mitigate the damage of the attacks? (Choose two.)

  1. Storm Control

  2. Port Security

  3. SPAN

  4. BPDU Filters

  5. IP Source Guard

  6. VACLs

Correct Answer: AB

Question No.105

Two Cisco switches with 1 SUP and many 10G line-card ports for each switch, run in VSS mode. In which case or for what reason you don#39;t connect all VSL to SUP?

  1. The need for hardware diversity

  2. Bandwidth congestion at SUP

  3. In case the sup fail

  4. Qos must be configured on both

Correct Answer: A

Question No.106

On which two types of links should routing protocol peerings be established according to best practice? (Choose two.)

  1. distribution links

  2. end user links

  3. transit links

  4. core links

Correct Answer: CD

Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusd g.html#wp1107923

Question No.107

Multicast has been configured and enabled within an Enterprise network. PIM spare-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?

  1. Multicast boundary filter

  2. PIM Dense-Mode

  3. IGMP snooping

  4. Dynamic ARP inspection

Correct Answer: C

Explanation:

Cisco Group Management Protocol (CGMP), Router Group Management Protocol (RGMP), and IGMP snooping efficiently constrain IP multicast in a Layer 2 switching environment.

Question No.108

Which one of these could you implement to sustain a large DDoS attack?

  1. Stateful firewall

  2. uRPF

  3. Connections limits and timeouts

  4. Access-lists

Correct Answer: C

Question No.109

Which ISP technology can be implemented as a service when designing a topology to perform extranet connectivity via multitenant segmentation from within a corporate intranet?

  1. Cisco Easy VPN

  2. GRE over IPsec

  3. MPLS

  4. VTI

  5. VPNaaS

Correct Answer: C

Question No.110

Which Cisco NAC Appliance design is the most scalable in large Layer 2-to-distribution implementation?

  1. Layer 2 out-of-band

  2. Layer 2 in-band

  3. Layer 3 out-of-band

  4. Layer 3 in-band

    Correct Answer: B

    Explanation:

    https://www.safaribooksonline.com/library/view/foundation-learning- guide/9780132652933/ch08.html

    Layer 2 In-Band Designs The Layer 2 in-band topology is the most common deployment option. […]

    This is the most scalable design in large L2-to-distribution environments, because this design can be transparently implemented in the existing network supporting multiple access layer switches. It supports all network infrastructure equipment. The Cisco NAS supports per-user ACLs.

    Get Full Version of the Exam
    300-320 Dumps
    300-320 VCE and PDF