P.S. Tested 300-320 free demo are available on Google Drive, GET MORE: https://drive.google.com/open?id=1miQ7hAp4YwfZw6TPfPZd2zoXwVl9zI9i
Question No: 6
An engineer wants to implement a network with the RSTP+ but the majority of the equipment is running STP. What will be the outcome when running STP and RSTP+ simultaneously?
A. RSTP and STP will not work and the interface will be in error disabled
B. RSTP and STP will work and fast convergence will happen
C. RSTP and STP will work and fast convergence will not happen
D. RSTP and STP will choose the best convergence protocol
Answer: C
Question No: 7
A network engineer must use an Internet connection to provide backup connectivity between two sites. The backup connection must be encrypted and support multicast. Which technology must be used?
A. GRE over IPsec
B. GETVPN
C. IPsec direct encapsulation
D. DMVPN
Answer: A
Question No: 8
To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
Answer: D
Question No: 9
What command essentially turns on auto summarization for EIGRP?
A. area 0 range 10.0.0.0 255.0.0.0.0
B. router eigrp 1
C. ip summary-address eigrp 1 10.0.0.0 255.0.0.0
D. ip summary-address 10.0.0.0 255.0.0.0
E. eigrp stub
Answer: C
Question No: 10
Which option is correct when using Virtual Switching System?
A. Both control planes forward traffic simultaneously
B. Only the active switch forward traffic
C. Both data planes forward traffic simultaneously
D. Only the active switch handle the control plane
Answer: C
Question No: 11
Which option must be included in the design when implementing a triangle looped access layer design?
A. first hop redundancy protocol.
B. Single uplinks between access and distribution switches.
C. Layer 2 links between access switches.
D. Layer 3 links between distribution switches.
Answer: A
Question No: 12
Which security mechanism can you implement to protect the OSPF" information that a router receives?
A. privilege 15 credentials
B. administrator username and password authentication
C. RADIUS authentication
D. cryptographic authentication
Answer: D
Question No: 13
A customer would like to implement a firewall to secure an enterprise network. However, the customer is unable to allocate any new subnets. What type of firewall mode must be implemented?
A. routed
B. active/standby
C. transparent
D. virtual
E. active/active
F. zone based
Answer: C
Question No: 14
An engineer is designing a multitenant network that requires giving appropriate permission to limit access
Which policy you choose?
A. vty base policy
B. role base policy
C. Route map
D. RBAC
Answer: A
Question No: 15
What protocol is used for connectivity between VSS layers?
A. PAgP
B. IVR
C. ISL
D. VSL
Answer: D
Recommend!! Get the Tested 300-320 dumps in VCE and PDF From Dumpscollection, Welcome to download: http://www.dumpscollection.net/dumps/300-320/ (New 406 Q&As Version)