Ensurepass

Designing Cisco Network Service Architectures (ARCH)

 

QUESTION 51

Which two options are storage topologies? (Choose two.)

 

A.

WAS

B.

DAS

C.

CAS

D.

NAS

 

Correct Answer: BD

 

 

QUESTION 52

On which two types of links should routing protocol peerings be established according to best practic
e? (Choose two.)

 

A.

distribution links

B.

end user links

C.

transit links

D.

core links

 

Correct Answer: CD

 

 

QUESTION 53

Which STP feature allows an access port to bypass the learning and listening states?

 

A.

BPDU Guard

B.

PortFast

C.

Root Guard

D.

Loop Guard

 

Correct Answer: B

 

 

QUESTION 54

When designing remote access to the Enterprise Campus network for teleworkers and mobile workers, which of the following should the designer consider?

 

A.

It is recommended to place the VPN termination device in line with the Enterprise Edge firewall, with ingress traffic limited to SSL only

B.

Maintaining access rules, based on the source IP of the client, on an internal firewall drawn from a headend RADIUS server is the most secure deployment

C.

VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place

D.

Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick), including at Layer7

 

Correct Answer: D

 

 

QUESTION 55

Which authentication framework is used in wireless networks and point-to-point connections?

 

A.

EAP

B.

L2TP

C.

TKIP

D.

PPP

 

Correct Answer: A

 

 

QUESTION 56

Which statement about IPS and IDS solutions is true?

 

A.

IDS and IPS read traffic only in inline mode.

B.

IDS and IPS read traffic only in promiscuous mode.

C.

An IDS reads traffic in inline mode, and an IPS reads traffic in promiscuous mode.

D.

An IDS reads traffic in promiscuous mode, and an IPS reads traffic in inline mode.

 

Correct Answer: D

 

 

QUESTION 57

Which four primary attributes define a WAN service? (Choose four.)

 

A.

bandwidth

B.

bursting capacity

C.

memory

D.

CPU

E.

QoS classes and policies

F.

latency

G.

multicast support

 

Correct Answer: ABEG

 

 

QUESTION 58

Which three statements about 802.1X are true? (Choose three.)

 

A.

It is a Cisco proprietary standard.

B.

It can allow and deny port access based on device identity.

C.

It is an IEEE standard.

D.

It can allow and deny port access based on user identity.

E.

By default, it allows devices that lack 802.1 support.

F.

It works only with wired devices.

 

Correct Answer: BCD

 

 

 

QUESTION 59

Which two options are two benefits of a Layer 2 looped model? (Choose two.)

 

A.

extends VLANs between switches that are connected to a common aggregation module

B.

prevents uplink ports from entering the spanning-tree blocking state

C.

provides quick convergence with Rapid Spanning Tree Protocol

D.

increases performance to end hosts using directly connected, bonded Layer 2 links

 

Correct Answer: AC

 

 

QUESTION 60

Which technology allows multiple instances of a routing table to coexist on the same router simultaneously?

 

A.

VRF

B.

Cisco virtual router

C.

instanced virtual router

D.

IS-IS

 

Correct Answer: A

 

Free VCE & PDF File for Cisco 300-320 Actual Tests

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …

Comments are closed.