Want to know Actualtests ccdp 300 320 Exam practice test features? Want to lear more about Cisco Designing Cisco Network Service Architectures certification experience? Study Downloadable Cisco 300 320 arch pdf answers to Refresh 320 300 questions at Actualtests. Gat a success with an absolute guarantee to pass Cisco 300 320 vce (Designing Cisco Network Service Architectures) test on your first attempt.

Q121. What are two characteristics of Cisco Global Site Selector? (Choose two.) 

A. It helps verify end-to-end path availability. 

B. It provides traffic rerouting in case of disaster. 

C. HSRP, GLBP, and VRRP can be clients of GSS. 

D. BGP must be the routing protocol between the distributed data centers. 

E. DNS responsiveness is improved by providing centralized domain management. 

Answer: B,E 


Q122. In what situation must spanning-tree be implemented? 

A. when first hop redundancy protocol exists with redundant Layer 2 links between distribution switches 

B. when a VLAN spans access layer switches to support business applications 

C. when trunks need to extend multiple VLANs across access switches 

D. when it is necessary to speed up network convergence in case of link failure 

Answer:


Q123. A network team must provide a redundant secure connection between two entities using OSPF. The primary connection will be an Ethernet Private Line and the secondary connection will be a site-to-site VPN. What needs to be configured in order to support routing requirements for over the VPN connection? 

A. GRE Tunnel 

B. HTTPS 

C. Root Certificate 

D. AAA Server 

Answer:


Q124. Which of the following facts must be considered when designing for IP telephony within an Enterprise Campus network? 

A. Because the IP phone is a three-port switch, IP telephony extends the network edge, impacting the Distribution layer. 

B. Video and voice are alike in being bursty and bandwidth intensive, and thus impose requirements to be lossless, and have minimized delay and jitter. 

C. IP phones have no voice and data VLAN separation, so security policies must be based on upper layer traffic characteristics. 

D. Though multi-VLAN access ports are set to dot1q and carry more than two VLANs they are not trunk ports. 

Answer:


Q125. Refer to the exhibit. A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario? 

A. transparent mode with the servers on the same subnet 

B. routed mode with three security zones 

C. transparent mode with three security zones 

D. routed mode with two security zones 

Answer:


Q126. A e-commerce network has many devices that often need to be upgraded on a regular basis. What technology will ensure IP packets continue to be forwarded even during a device failover? 

A. stateful switchover 

B. nonstop forwarding 

C. route processor redundancy 

D. optimized edge routing 

E. enhanced object tracking 

Answer:


Q127. Which two protocol characteristics should be most considered when designing a single unified fabric for the Data Center? (Choose two.) 

A. FCIP or FCoE allow for easier integration by using the Fibre Channel Protocol (FCP) and Fibre Channel framing 

B. iSCSI uses a special EtherType and an additional header containing additional control information 

C. FCIP and iSCSI has higher overhead than FCoE owing to TCP/IP 

D. FCoE was initially developed to be used as a switch-to-switch protocol, while FCIP is primarily meant to be used as an access layer protocol to connect hosts and storage to a Fibre Channel SAN 

E. FCoE requires gateway functionality to integrate into an existing Fibre Channel network 

Answer: A,C 


Q128. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address? 

A. The IGPs should utilize authentication to avoid being the most vulnerable component 

B. With SSM source or receiver attacks are not possible 

C. With Shared Trees access control is always applied at the RP 

D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network 

Answer: