2017 Dec New Cisco 300-320 Exam Dumps with PDF and VCE Free Updated Today! Following are some new added 300-320 Exam Questions: QUESTION 182 Two recently merged companies are using EIGRP and RIP. Which two strategies can facilitate a smooth migration? (Choose two.) A. Create an OSPF instance between EIGRP and RIP routing domains. B. Redistribute routing information between the RIP and EIGRP protocols. C. Add EIGRP and then remove RIP on the acquired company network. D. Use the EIGRP administrative distance to migrate one site at a time. E. Use static routes in place of dynamic routing between companies. Answer: BC QUESTION 183 Two companies recently merged and want to integrate their networks. Both utilize EIGRP to support their complex enterprise networks. Which action can improve the performance of these two separate EIGRP domains? A. Enable route summarization at redistribution points. B. Adjust the administrative distance to prefer the best routes to each destination. C. Remove EIGRP and utilize OSPF instead. D. Utilize EIGRP stub routing between the network boundaries of the companies. Answer: A QUESTION 184 Which IPv4 multicast technical component measure provides architectural security? A. IGMP max groups B. access lists C. scoped addresses D. state limit Answer: C QUESTION 185 Which option is the primary reason to implement security in a multicast network? A. maintain network operations B. allow multicast to continue to function C. optimize multicast utilization D. ensure data streams are sent to the intended receivers Answer: A QUESTION 186 Refer to the exhibit. Which Layer 2 feature detects a link failure between the switch and router B that decreases OSPF reconvergence to approximately 50 milliseconds? A. BFD B. UDLD C. RSTP D. PVST+ Answer: A QUESTION 187 Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network? A. Because the IP phone is a three-port switch, IP telephony extends the network edge, impacting the Distribution layer. B. Video and voice are alike in being bursty and bandwidth intensive, and thus impose requirements to be lossless, and have minimized delay and jitter. C. IP phones have no voice and data VLAN separation, so security policies must be based on upper layer traffic characteristics. D. Though multi-VLAN access ports are set to dot1q and carry more than two VLANs they are not trunk ports. Answer: D QUESTION 188 Addressing QoS design in the Enterprise Campus network for IP Telephony applications means what? A. It is critical to identify aggregation and rate transition points in the network, where preferred traffic and congestion QoS policies should be enforced B. Suspect traffic should be dropped closest to the source, to minimize wasting network resources C. An Edge traffic classification scheme should be mapped to the downstream queue configuration D. Applications and Traffic flows should be classified, marked and policed within the Enterprise Edge of the Enterprise Campus network Answer: A QUESTION 189 The requirement for high availability within the Data Center network may cause the designer to consider which one of the following solutions? A. Construct a hierarchical network design using EtherChannel between a server and two VDCs from the same physical switch B. Utilize Cisco NSF with SSO to provide intrachassis SSO at Layers 2 to 4 C. Define the Data Center as an OSPF NSSA area, advertising a default route into the DC and summarizing the routes out of the NSSA to the Campus Core D. Implement network services for the Data Center as a separate services layer using an active/active model that is more predictable in failure conditions Answer: B QUESTION 190 When designing remote access to the Enterprise Campus network for teleworkers and mobile workers, which of the following should the designer consider? A. It is recommended to place the VPN termination device in line with the Enterprise Edge firewall, with ingress traffic limited to SSL only B. Maintaining access rules, based on the source IP of the client, on an internal firewall drawn from a headend RADIUS server is the most secure deployment C. VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place D. Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick), including at Layer7 Answer: D QUESTION 191 Which three statements about firewall modes are correct? (Choose three.) A. A firewall in routed mode has one IP address. B. A firewall in transparent mode has one IP address. C. In routed mode, the firewall is considered to be a Layer 2 device. D. In routed mode, the firewall is considered to be a Layer 3 device. E. In transparent mode, the firewall is considered to be a Layer 2 device. F. In transparent mode, the firewall is considered to be a Layer 3 device. Answer: BDE QUESTION 192 Which two of these correctly describe asymmetric routing and firewalls? (Choose two.) A. only operational in routed mode B. only operational in transparent mode C. only eight interfaces can belong to an asymmetric routing group D. operational in both failover and non-failover configurations E. only operational when the firewall has been configured for failover Answer: CD 2017 New Added 300-320 Exam Questions & Answers: Dear visitor, you need to Register or Login to view links on Certify Chat.