QUESTION 51
Which two options are storage topologies? (Choose two.)
A. |
WAS |
B. |
DAS |
C. |
CAS |
D. |
NAS |
Correct Answer: BD
QUESTION 52
On which two types of links should routing protocol peerings be established according to best practice? (Choose two.)
A. |
distribution links |
B. |
end user links |
C. |
transit links |
D. |
core links |
Correct Answer: CD
QUESTION 53
Which STP feature allows an access port to bypass the learning and listening states?
A. |
BPDU Guard |
B. |
PortFast |
C. |
Root Guard |
D. |
Loop Guard |
Correct Answer: B
QUESTION 54
When designing remote access to the Enterprise Campus network for teleworkers and mobile workers, which of the following should the designer consider?
A. |
It is recommended to place the VPN termination device in line with the Enterprise Edge firewall, with ingress traffic limited to SSL only |
B. |
Maintaining access rules, based on the source IP of the client, on an internal firewall drawn from a headend RADIUS server is the most secure deployment |
C. |
VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place |
D. |
Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick), including at Layer7 |
Correct Answer: D
QUESTION 55
Which authentication framework is used in wireless networks and point-to-point connections?
A. |
EAP |
B. |
L2TP |
C. |
TKIP |
D. |
PPP |
Correct Answer: A
QUESTION 56
Which statement about IPS and IDS solutions is true?
A. |
IDS and IPS read traffic only in inline mode. |
B. |
IDS and IPS read traffic only in promiscuous mode. |
C. |
An IDS reads traffic in inline mode, and an IPS reads traffic in promiscuous mode. |
D. |
An IDS reads traffic in promiscuous mode, and an IPS reads traffic in inline mode. |
Correct Answer: D
QUESTION 57
Which four primary attributes define a WAN service? (Choose four.)
A. |
bandwidth |
B. |
bursting capacity |
C. |
memory |
D. |
CPU |
E. |
QoS classes and policies |
F. |
latency |
G. |
multicast support |
Correct Answer: ABEG
QUESTION 58
Which three statements about 802.1X are true? (Choose three.)
A. |
It is a Cisco proprietary standard. |
B. |
It can allow and deny port access based on device identity. |
C. |
It is an IEEE standard. |
D. |
It can allow and deny port access based on user identity. |
E. |
By default, it allows devices that lack 802.1 support. |
F. |
It works only with wired devices. |
Correct Answer: BCD
QUESTION 59
Which two options are two benefits of a Layer 2 looped model? (Choose two.)
A. |
extends VLANs between switches that are connected to a common aggregation module |
B. |
prevents uplink ports from entering the spanning-tree blocking state |
C. |
provides quick convergence with Rapid Spanning Tree Protocol |
D. |
increases performance to end hosts using directly connected, bonded Layer 2 links |
Correct Answer: AC
QUESTION 60
Which technology allows multiple instances of a routing table to coexist on the same router simultaneously?
A. |
VRF |
B. |
Cisco virtual router |
C. |
instanced virtual router |
D. |
IS-IS |
Correct Answer: A
Free VCE & PDF File for Cisco 300-320 Real Exam
Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …