ExamGecko
Home Home / Cisco / 300-420

Cisco 300-420 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











When designing interdomain multicast, which two protocols are deployed to achieve communication between multicast sources and receivers? (Choose two.)

A.

IGMPv2

A.

IGMPv2

Answers
B.

BIDIR-PIM

B.

BIDIR-PIM

Answers
C.

MP-BGP

C.

MP-BGP

Answers
D.

MSDP

D.

MSDP

Answers
E.

MLD

E.

MLD

Answers
Suggested answer: C, D

A branch office has a primary L3VPN MPLS connection back to the main office and an IPSEC VPN tunnel that serves as backup. Which design ensures that data is sent over the backup connection only if the primary MPLS circuit is down?

A.

Use EIGRP to establish a neighbor relationship with the main office via L3VPN MPLS and the IPSEC VPN tunnel.

A.

Use EIGRP to establish a neighbor relationship with the main office via L3VPN MPLS and the IPSEC VPN tunnel.

Answers
B.

Use BGP with the multipath feature enabled to force traffic via the primary path when available.

B.

Use BGP with the multipath feature enabled to force traffic via the primary path when available.

Answers
C.

Use static routes tied to an IP SLA to prefer the primary path while a floating static route points to the backup connection.

C.

Use static routes tied to an IP SLA to prefer the primary path while a floating static route points to the backup connection.

Answers
D.

Use OSPF with a passive-interface command on the backup connection.

D.

Use OSPF with a passive-interface command on the backup connection.

Answers
Suggested answer: D

Company A recently acquired another company. Users of the newly acquired company must be able to access a server that exists on Company A’s network, both companies use overlapping IP address ranges. Which action conserves IP address space and provides access to the server?

A.

Use a single IP address to create overload NAT

A.

Use a single IP address to create overload NAT

Answers
B.

Use a single IP address to create a static NAT entry

B.

Use a single IP address to create a static NAT entry

Answers
C.

Build one-to-one NAT translation for every user that needs access

C.

Build one-to-one NAT translation for every user that needs access

Answers
D.

Re-IP overlapping address space in the acquired company

D.

Re-IP overlapping address space in the acquired company

Answers
Suggested answer: A

In an SD-WAN architecture, which methods are used to bootstrap a vEdge router?

A.

DHCP options or manual configuration

A.

DHCP options or manual configuration

Answers
B.

vManage or DNS records

B.

vManage or DNS records

Answers
C.

ZTP or manual configuration

C.

ZTP or manual configuration

Answers
D.

DNS records or DHCP options

D.

DNS records or DHCP options

Answers
Suggested answer: C

An engineer must propose a QoS architecture model that allows an application to inform the network of its traffic profile and to request a particular type of service to support its bandwidth and delay requirements. The application requires consistent and dedicated bandwidth end to end. Which QoS architecture model meets these requirements?

A.

DiffServ

A.

DiffServ

Answers
B.

LLQ

B.

LLQ

Answers
C.

WRED

C.

WRED

Answers
D.

IntServ

D.

IntServ

Answers
Suggested answer: D

Which two statements about VRRP advertisements are true? (Choose two.)

A.

They are sent from the master router and standby routers.

A.

They are sent from the master router and standby routers.

Answers
B.

They include VRRP timer information.

B.

They include VRRP timer information.

Answers
C.

They are sent only from the master router.

C.

They are sent only from the master router.

Answers
D.

They include priority information.

D.

They include priority information.

Answers
E.

They are sent every three seconds by default.

E.

They are sent every three seconds by default.

Answers
Suggested answer: C, D

Which two statements about VRRP object tracking are true? (Choose two)

A.

The priority of a VRRP device can change in accordance with the up or down status of a VRRP object

A.

The priority of a VRRP device can change in accordance with the up or down status of a VRRP object

Answers
B.

The VRRP interface priority must be manually configured by the administrator

B.

The VRRP interface priority must be manually configured by the administrator

Answers
C.

A VRRP group can track only one object at a time

C.

A VRRP group can track only one object at a time

Answers
D.

VRRP can track the status of interfaces and routes

D.

VRRP can track the status of interfaces and routes

Answers
E.

VRRP supports only interface tracking

E.

VRRP supports only interface tracking

Answers
Suggested answer: A, D

Explanation:

https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2019/pdf/BRKCRS-2821.pdf

Which common issue causes intermittent DMVPN tunnel flaps?

A.

a routing neighbor reachability issue

A.

a routing neighbor reachability issue

Answers
B.

a suboptimal routing table

B.

a suboptimal routing table

Answers
C.

interface bandwidth congestion

C.

interface bandwidth congestion

Answers
D.

that the GRE tunnel to hub router is not encrypted

D.

that the GRE tunnel to hub router is not encrypted

Answers
Suggested answer: A

Which two best practices must be followed when designing an out-of-band management network?

(Choose two.)

A.

Enforce access control

A.

Enforce access control

Answers
B.

Facilitate network integration

B.

Facilitate network integration

Answers
C.

Back up data using the management network

C.

Back up data using the management network

Answers
D.

Ensure that the management network is a backup to the data network

D.

Ensure that the management network is a backup to the data network

Answers
E.

Ensure network isolation

E.

Ensure network isolation

Answers
Suggested answer: A, E

Explanation:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/SAFE_rg/chap9.ht ml

A network administrator is troubleshooting a DMVPN setup between the hub and the spoke. Which action should the administrator take before troubleshooting the IPsec configuration?

A.

Verify the GRE tunnels.

A.

Verify the GRE tunnels.

Answers
B.

Verify ISAKMP.

B.

Verify ISAKMP.

Answers
C.

Verify NHRP.

C.

Verify NHRP.

Answers
D.

Verify crypto maps.

D.

Verify crypto maps.

Answers
Suggested answer: A
Total 240 questions
Go to page: of 24