ExamGecko
Home Home / Cisco / 300-420

Cisco 300-420 Practice Test - Questions Answers, Page 23

Question list
Search
Search

Related questions











DRAG DROP

Drag and drop the types of WAN connectivity from the left onto the connectivity use cases on the right.


Question 221
Correct answer: Question 221

Refer to Exhibit.

Refer to the exhibit. A network engineer must design a BGP solution based on:

The route reflector must have one or more direct physical connections to the core routers (R3 and R4).

The route reflector must have full redundancy and avoid a single point of failure.

R2 to R1 link utilization is 90%. and the remaining links are less than 50% utilized.

Which two solutions must the design Include? (Choose two.)

A.

Configure R1 to be a client of R2 and R4.

A.

Configure R1 to be a client of R2 and R4.

Answers
B.

Configure R2 to be a client of R1 and R4.

B.

Configure R2 to be a client of R1 and R4.

Answers
C.

Configure R3 to be a client of R2 and R4.

C.

Configure R3 to be a client of R2 and R4.

Answers
D.

Configure R4 to be a client of R1 and R3.

D.

Configure R4 to be a client of R1 and R3.

Answers
E.

Configure R5 to be a client of R3 and R4.

E.

Configure R5 to be a client of R3 and R4.

Answers
Suggested answer: B, E

Which function does the Cisco SD-Access intermediate node perform?

A.

Act as LISP proxy tunnel router.

A.

Act as LISP proxy tunnel router.

Answers
B.

Route and transport IP traffic.

B.

Route and transport IP traffic.

Answers
C.

Act as an anycast Layer 3 gateway.

C.

Act as an anycast Layer 3 gateway.

Answers
D.

Map users to a virtual network.

D.

Map users to a virtual network.

Answers
Suggested answer: B

In a Cisco SD-Access fabric, which node facilities connectivity between the fabric and networks external to the fabric?

A.

intermediate

A.

intermediate

Answers
B.

edge

B.

edge

Answers
C.

control plane

C.

control plane

Answers
D.

border

Answer: D

D.

border

Answer: D

Answers
Suggested answer: D

Explanation:

In a multicast network, which condition must be met for an RPF check to be performed on the RP address'?

A.

The PIM DM device receives a multicast packet and has no directly connected members

A.

The PIM DM device receives a multicast packet and has no directly connected members

Answers
B.

The PIM router or multilayer switch has a shared-tree state

B.

The PIM router or multilayer switch has a shared-tree state

Answers
C.

The PIM router or multilayer switch has a source-tree state

C.

The PIM router or multilayer switch has a source-tree state

Answers
D.

The PIM DM device receives a multicast packet and has no directly connected PIM neighbor

D.

The PIM DM device receives a multicast packet and has no directly connected PIM neighbor

Answers
Suggested answer: B

Which feature provides the capability for intra-VN traffic filtering and control within the Cisco SO- Access architecture?

A.

scalable groups

A.

scalable groups

Answers
B.

MAC ACL

B.

MAC ACL

Answers
C.

prefix list

C.

prefix list

Answers
D.

service policy

D.

service policy

Answers
Suggested answer: A

How does a model-driven telemetry dial-out approach function?

A.

The device initiates a session to the collector based on the subscription.

A.

The device initiates a session to the collector based on the subscription.

Answers
B.

The collector initiates a session to the device and subscribes to data to be streamed.

B.

The collector initiates a session to the device and subscribes to data to be streamed.

Answers
C.

The collector Initiates a session to the device and gets the data of a previously defined subscription.

C.

The collector Initiates a session to the device and gets the data of a previously defined subscription.

Answers
D.

The device initiates a session to the collector and negotiates a subscription.

D.

The device initiates a session to the collector and negotiates a subscription.

Answers
Suggested answer: D

Prior to establishing full-mesh iPsec tunnels in a typical Cisco SD-WAN deployment, which mechanism do WAN Edge routers use to exchange Key information for data plane encryption?

A.

They use vSmart controllers as key exchange servers.

A.

They use vSmart controllers as key exchange servers.

Answers
B.

They use vManage as a key exchange server.

B.

They use vManage as a key exchange server.

Answers
C.

They use IKEv2 when exchanging keys with each other.

C.

They use IKEv2 when exchanging keys with each other.

Answers
D.

They use vBond as a key exchange server.

D.

They use vBond as a key exchange server.

Answers
Suggested answer: A

Which control plane protocol is responsible for ElD-to-RLOC mapping concerning SO-Access Architecture?

A.

GBAC

A.

GBAC

Answers
B.

LISP

B.

LISP

Answers
C.

CEF

C.

CEF

Answers
D.

VXLAN

D.

VXLAN

Answers
Suggested answer: B

Which feature minimizes HOC connections and reduces strain on the vSmart controller m an SO-WAN architecture?

A.

control-connections

A.

control-connections

Answers
B.

corrtroWirection

B.

corrtroWirection

Answers
C.

color

C.

color

Answers
D.

affinity

D.

affinity

Answers
Suggested answer: D
Total 240 questions
Go to page: of 24