Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

300-420 Questions and Answers

Question # 6

Which function does the Cisco SD-Access intermediate node perform?

A.

Act as LISP proxy tunnel router.

B.

Route and transport IP traffic.

C.

Act as an anycast Layer 3 gateway.

D.

Map users to a virtual network.

Full Access
Question # 7

An engineer must connect a new remote site to an existing OSPF network. The new site consists of two low-end routers, one for WAN, and one for LAN. There is no demand for traffic to pass through this area. Which area type does the engineer choose to provide minimal router resources utilization, while still allowing for full connectivity to the rest of the network?

A.

not so stubby

B.

totally not so stubby

C.

totally stubby area

D.

stubby area

Full Access
Question # 8

Refer to the exhibit. AS65533 and AS65530 are announcing a partial Internet routing table as well as their IP subnets. An architect must create a design that ensures AS64512 become a transit AS. Which filtering solution must the architect choose?

A.

Maximum-prefix

B.

No-advertise

C.

Next-hop

D.

No Export

Full Access
Question # 9

How is internet access provided to a WAN edge router that is connected to a MPLS transport link?

A.

OMP advertises a default route from a WAN Edge router that is connected to the MPLS and internet transport networks

B.

Internet access must be provided at the WAN Edge router through either a 4G/5G link or local Internet circuit

C.

An extranet must be provided in the MPLS transport network to allow private traffic to reach the public internet

D.

TLOC extensions are used to route traffic to a WAN Edge router that is connected to the Internet transport network

Full Access
Question # 10

Which two statements about VRRP object tracking are true? (Choose two)

A.

The priority of a VRRP device can change in accordance with the up or down status of a VRRP object

B.

The VRRP interface priority must be manually configured by the administrator

C.

A VRRP group can track only one object at a time

D.

VRRP can track the status of interfaces and routes

E.

VRRP supports only interface tracking

Full Access
Question # 11

A company is running BGP on a single router, which has two connections to the same ISP. Which BGP

feature ensures traffic is load balanced across the two links to the ISP?

A.

Multihop

B.

Multipath Load Sharing

C.

Next-Hop Address Tracking

D.

AS-Path Prepending

Full Access
Question # 12

Drag and drop the descriptions from the left onto the corresponding VPN types on the rights.

Full Access
Question # 13

Which consideration must be taken into account when using the DHCP relay feature in a Cisco SD-Access Architecture?

A.

DHCP-relay must be enabled on fabric edge nodes to provide the correct mapping of DHCP scope to the local anycast gateway.

B.

A DHCP server must be enabled on the border nodes to allow subnets to span multiple fabric edges.

C.

DHCP servers must support Cisco SD-Access extensions to correctly assign IPs to endpoints in an SD-Access fabric with anycast gateway.

D.

DHCP Option-82 must be enabled to map the circuit IP option to the access fabric node where the DHCP discover originated.

Full Access
Question # 14

Which feature must be incorporated into the campus LAN design to enable Wake on LAN?

A.

dynamic ARP Inspection Snooping on layer 2 devices

B.

directed broadcasts on layer 3 devices

C.

proxy ARP on layer 3 devices

D.

DHCP Snooping on layer 2 devices

Full Access
Question # 15

How is end-to-end microsegmentation enforced in a Cisco SD-Access architecture?

A.

VLANs are used to segment traffic at Layer 2.

B.

5-tuples and ACLs are used to permit or deny traffic.

C.

SGTs and SGTACLs are used to control access to various resources.

D.

VRFs are used to segment traffic at Layer 3.

Full Access
Question # 16

Company A recently acquired another company. Users of the newly acquired company must be able to access a server that exists on Company A’s network, both companies use overlapping IP address ranges. Which action conserves IP address space and provides access to the server?

A.

Use a single IP address to create overload NAT

B.

Use a single IP address to create a static NAT entry

C.

Build one-to-one NAT translation for every user that needs access

D.

Re-IP overlapping address space in the acquired company

Full Access
Question # 17

An infrastructure team is concerned about the shared memory utilization of a device, and for this reason, they need to monitor the device state. Which solution limits impact on the device and provides the required data?

A.

IPFIX

B.

static telemetry

C.

on-change subscription

D.

periodic subscription

Full Access
Question # 18

What is the role of a control-plane node in a Cisco SD-Access architecture?

A.

fabric device that connects wired endpoints to the SD-Access fabric

B.

map system that manages endpoint to device relationships

C.

fabric device that connects APs and wireless endpoints to the SD-Access fabric

D.

map system that manages External Layer 3 networks

Full Access
Question # 19

A company uses cloud-based applications for voice and video calls, file sharing, content sharing, and messaging. During business hours, these applications randomly become slow and unresponsive. However, other applications work smoothly with the current applied QoS polices. Which solution must the company choose to resolve the issue?

A.

Identify the applications with NBAR2 and allocate the required bandwidth accordingly.

B.

Identify the port used by each application and apply a minimum bandwidth guarantee.

C.

Identify the applications and reserve the required bandwidth on the perimeter routers.

D.

Identify the application ports, create groupings, and rate-limit the required bandwidth.

Full Access
Question # 20

Which two statements describe source trees in a multicast environment? (Choose two.)

A.

Source trees guarantee the minimum amount of network latency for forwarding multicast traffic

B.

Source trees create an optimal path between the source and the receivers

C.

Source trees use a single common root placed at some chosen point in the network

D.

Source trees can introduce latency in packet delivery

E.

Source trees can create suboptimal paths between the source and the receivers

Full Access
Question # 21

Drag and drop the components in a Cisco SD-Access architecture from the left onto their descriptions on the right.

Full Access
Question # 22

Refer to the exhibit. An architect is developing a solution to consolidate networks while retaining device redundancy. The routing protocol for the WAN routers must be open standard, ensure high availability, and provide the fastest convergence time. Which solution must the design include?

A.

both routers running EIGRP

B.

one router running OSPFv2 and other OSPF v3

C.

one router running ISIS and other OSPF v3

D.

both routers running OSPFv2

Full Access
Question # 23

Which method does Cisco SD-WAN use to avoid fragmentation issues?

A.

PMTUD is used.

B.

Traffic is marked with the DF bit set.

C.

Jumbo frames are enabled.

D.

Access circuits are configured with 1600 byte MTU settings.

Full Access
Question # 24

When a network is designed using IS-IS protocol, which two circuit types are supported? (Choose two.)

A.

nonbroadcast multiaccess

B.

multiaccess

C.

point-to-multipoint

D.

nonbroadcast

E.

point-to-point

Full Access
Question # 25

What is the purpose of an edge node in an SD-Access network fabric?

A.

Edge nodes identify and authenticate endpoints and register endpoint information with control plane nodes.

B.

Edge nodes track endpoint IDs to location mappings, along with IPv4, IPv6, or MAC addresses.

C.

Edge nodes are the gateway between the fabric domain and network outside of the fabric.

D.

Edge nodes resolve lookup requests from edge and border nodes to locate destination endpoint IDs.

Full Access
Question # 26

A network administrator is troubleshooting a DMVPN setup between the hub and the spoke. Which action should the administrator take before troubleshooting the IPsec configuration?

A.

    Verify the GRE tunnels.

B.

    Verify ISAKMP.

C.

    Verify NHRP.

D.

    Verify crypto maps.

Full Access
Question # 27

Refer to the exhibit.

An engineer must design a WAN solution so that ISP-1 is always preferred over ISP-2. The path via ISP-2 is

considered as a backup and must be used only when the path to ISP-1 is down. Which

solution must the engineer choose?

A.

R1:

- Routes advertised to ISP-1: 0x AS-path prepend

- Routes received from ISP-1: HIGH local-preference

- Routes advertised to R2: no action

- Routes received from R2: community NO-EXPORT

R2:

- Routes advertised to ISP-2:5x AS-path prepend

- Routes received from ISP-2: LOW local-preference

- Routes advertised to R1: community NO-ADVERTISE

- Routes received from R1: no action

B.

R1:

- Routes advertised to ISP-1: 0x AS-path prepend

- Routes received from ISP-1: HIGH local-preference

- Routes advertised to R2: community NO-EXPORT

- Routes received from R2: no action

R2:

- Routes advertised to ISP-2: 5x AS-path prepend

- Routes received from ISP-2: LOW local-preference

- Routes advertised to R1: no action

- Routes received from R1: no action

C.

R1:

- Routes advertised to ISP-1: 0x AS-path prepend

- Routes received from ISP-1: LOW local-preference

- Routes advertised to R2: community NO-ADVERTISE

- Routes received from R2: no action

R2:

- Routes advertised to ISP-2: 5x AS-path prepend

- Routes received from ISP-2: HIGH local-preference

- Routes advertised to R1: no action

- Routes received from R1: community NO-ADVERTISE

D.

R1:

- Routes advertised to ISP-1: 5x AS-path prepend

- Routes received from ISP-1: LOW local-preference

- Routes advertised to R2: community NO-ADVERTISE

- Routes received from R2: no action

R2:

- Routes advertised to ISP-2: 0x AS-path prepend

- Routes received from ISP-2: HIGH local-preference

- Routes advertised to R1: community NO-EXPORT

- Routes received from R1: no action

Full Access
Question # 28

Refer to the exhibit.

Which solution decreases the EIGRP convergence time?

A.

Enable subsecond timers

B.

Increase the hold time value

C.

Increase the dead timer value

D.

Enable stub routing on the spokes

Full Access
Question # 29

In an SD-WAN architecture, which methods are used to bootstrap a vEdge router?

A.

DHCP options or manual configuration

B.

vManage or DNS records

C.

ZTP or manual configuration

D.

DNS records or DHCP options

Full Access
Question # 30

An engineer must peer with an ISP for internet connectivity using BGP, initially, the engineer wants to receive only specific prefixes from the ISP and a default route. However, the solution must provide the flexibility to add prefixes in the future at short notice. The ISP has a two-week change process in place. Which route filtering solution must the engineer employ?

A.

Request a limited internet routing table and a default route from the ISP and configure the BGP max-limit to 1 with an access list that permits only the specific internet prefixes and blocked networks

B.

Request only the required prefixes and default route be advertised from the ISO with whitelisted networks

C.

Request a full internet routing table and a default route from the ISP and configure inbound route filtering with a prefix list that permits the default route and required prefixes

D.

Configure outbound route filtering on the enterprise and ISP so that the enterprise tell the ISP which prefixes are required

Full Access
Question # 31

An organization plans to deploy multicast across two different autonomous systems. Their solution must allow RPs to:

•discover active sources outside their domain

•use the underlying routing information for connectivity with other RPs

•announce sources joining the group

Which solution supports these requirements?

A.

MSDP

B.

SSM

C.

PIM-SM

D.

PIM-DM

Full Access
Question # 32

An engineer is designing an IPv4 addressing plan for an enterprise with 1000 branches. Each branch requires a prefix for data and a prefix for voice. Each prefix must accommodate up to 128 hosts, and prefixes must facilitate summarization at aggregation points in the network. The security team requires a simple method for identifying voce prefixes. Which allocation does the engineer recommend from the RFC1918 address space?

A.

/24 prefixes for data from 10.0.0.0/15 and /24 prefixes for voice from 172.16.0.0/15

B.

/24 prefixes for data from 10.0.0.0/8 and /24 prefixes for voice from the next contiguous /24 prefix per site

C.

/25 prefixes for data from 10.0.0.0/8 end /25 prefixes for voice from the next contiguous /25 prefix per branch

D.

/24 prefixes for data from 10.0.0.0/8 and /24 prefixes for voice from 172.16.0.0/12

Full Access
Question # 33

An engineer is designing an enterprise campus network. The LAN infrastructure consists of switches from multiple vendors, and Spanning Tree must be used as a Layer 2 loop prevention mechanism. All configured

VLANs must be grouped in two SIP instances. Which standards-based Spanning Tree technology supports this design solution?

A.

MSTP

B.

RSTP

C.

Rapid PVST

D.

STP

Full Access
Question # 34

Refer to the exhibit.

The failover time of ISP-2 is significantly shorter than ISP-1 when an interface on the ISP router toward the campus network fails. Which solution minimizes the downtime to the sub-second?

A.

Aggressive timers

B.

Next-hop address tracking

C.

Graceful-restart

D.

BFD

Full Access
Question # 35

An architect must design an IPv6 migration solution for a corporation with remote offices to support:

* The customer has IPv4 peering with their service provider.

* IPv6 users need access to IPv4 and IPv6 resources.

* Existing content providers will migrate to IPv6 in the next two years.

* Users will be migrated in a phase-by-phase approach.

Which migration solution must the architect choose?

A.

NAT46

B.

tunneling

C.

NAT64

D.

dual-stack

Full Access
Question # 36

Refer to the exhibit.

EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?

A.

R1 has no route to R2 and drops the traffic

B.

R1 load-balances across the paths through R3 and R4 to reach R2

C.

R1 forwards the traffic to R3, but R3 drops the traffic

D.

R1 forwards the traffic to R3 in order to reach R2

Full Access