320 300 : Jul 2021 Edition

Proper study guides for Most recent Cisco Designing Cisco Network Service Architectures certified begins with Cisco cisco 300 320 preparation products which designed to deliver the Refined cisco 300 320 dumps questions by making you pass the 300 320 arch pdf test at your first time. Try the free 320 300 demo right now.


♥♥ 2021 NEW RECOMMEND ♥♥

Free VCE & PDF File for Cisco 300-320 Real Exam (Full Version!)

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 300-320 Exam Dumps (PDF & VCE):
Available on: http://www.surepassexam.com/300-320-exam-dumps.html

Q31. When designing remote access to the Enterprise Campus network for teleworkers and mobile workers, which of the following should the designer consider? 

A. It is recommended to place the VPN termination device in line with the Enterprise Edge firewall, with ingress traffic limited to SSL only 

B. Maintaining access rules, based on the source IP of the client, on an internal firewall drawn from a headend RADIUS server is the most secure deployment 

C. VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place 

D. Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick), including at Layer7 

Answer:


Q32. An organization is deploying a new load balancing environment to support sensitive applications. The security requirements include discrete IP segments used for VIPs and for the application hosts. What load balancer mode meets the requirements? 

A. router 

B. bridge 

C. transparent 

D. pass-through 

Answer:


Q33. Source traffic is sent to a VIP on an SLB device, which in turn is routed to the destination server. Return traffic is policy-based routed back to the SLB. 

Which SLB design has been implemented? 

A. router mode 

B. inline bridge mode 

C. one-armed mode 

D. two-armed mode 

Answer:


Q34. Which option does the FabricPath technology use to create loop-free Layer 2 networks? 

A. STP 

B. TTL 

C. fabric tags 

D. FSTP 

Answer:


Q35. Which four options are network virtualization technologies that are employed in the data center? (Choose four.) 

A. VLAN 

B. VSAN 

C. VRF 

D. VRP 

E. VLC 

F. VPC 

Answer: A,B,C,F 


Q36. Addressing QoS design in the Enterprise Campus network for IP Telephony applications means what? 

A. It is critical to identify aggregation and rate transition points in the network, where preferred traffic and congestion QoS policies should be enforced 

B. Suspect traffic should be dropped closest to the source, to minimize wasting network resources 

C. An Edge traffic classification scheme should be mapped to the downstream queue configuration 

D. Applications and Traffic flows should be classified, marked and policed within the Enterprise Edge of the Enterprise Campus network 

Answer:


Q37. Which three options are benefits of using VRFs within an enterprise network? (Choose three.) 

A. simplifies configuration and troubleshooting 

B. enables partitioning of network resources 

C. enhances security between user groups 

D. provides additional redundancy at Layer 3 

E. allows for routing and forwarding separation 

F. improves routing protocol convergence 

Answer: B,C,E 


Q38. Which two protocol characteristics should be most considered when designing a single unified fabric for the Data Center? (Choose two.) 

A. FCIP or FCoE allow for easier integration by using the Fibre Channel Protocol (FCP) and Fibre Channel framing 

B. iSCSI uses a special EtherType and an additional header containing additional control information 

C. FCIP and iSCSI has higher overhead than FCoE owing to TCP/IP 

D. FCoE was initially developed to be used as a switch-to-switch protocol, while FCIP is primarily meant to be used as an access layer protocol to connect hosts and storage to a Fibre Channel SAN 

E. FCoE requires gateway functionality to integrate into an existing Fibre Channel network 

Answer: A,C 


Q39. Two recently merged companies are using EIGRP and RIP. Which two strategies can facilitate a smooth migration? (Choose two.) 

A. Create an OSPF instance between EIGRP and RIP routing domains. 

B. Redistribute routing information between the RIP and EIGRP protocols. 

C. Add EIGRP and then remove RIP on the acquired company network. 

D. Use the EIGRP administrative distance to migrate one site at a time. 

E. Use static routes in place of dynamic routing between companies. 

Answer: B,C 


Q40. When considering the design of the E-Commerce topology which of the following are true? 

A. One-armed SLB design with multiple security contexts removes the need for a separate firewall in the core layer 

B. Two-firewall-layer SLB design considers the aggregation and access layers to be trusted zones, requiring no security between the web, application, and database zones 

C. One-armed SLB design with two firewall layers ensures that non load-balanced traffic still traverses the ACE so that the health and performance of the servers is still being monitored 

D. In all cases there will be configuration requirements for direct access to any servers or for nonload-balanced sessions initiated by the servers 

Answer: