This page was exported from Up-To-Date And Reliable MCPD Exam Questions For 100 Percent Pass [ ] Export date:Fri Nov 22 1:52:46 2019 / +0000 GMT ___________________________________________________ Title: [Feb-2016 Update] Exercise PassLeader 251q 300-320 Exam Dumps Collection To 100 Percent Pass Exam (21-40) --------------------------------------------------- Free Download 100% Pass Ensure 251q New 300-320 Exam Dumps! The new 300-320 vce dumps from PassLeader cover all new 300-320 exam questions, which will ensure your 300-320 exam 100% pass! Now the free new version VCE Player along with the 300-320 VCE braindumps, and the 300-320 PDF dumps are all available now! keywords: 300-320 exam,251q 300-320 exam dumps,251q 300-320 exam questions,300-320 pdf dumps,300-320 vce dumps,300-320 study guide,300-320 practice test,CCDP -- Designing Cisco Network Service Architectures Exam QUESTION 21Which virtualization technology allows for HSRP protocol to be used in the active/active configuration where both HSRP Layer 3 devices can forward network traffic? A.    OTVB.    VSSC.    vPCD.    VDC Answer: C QUESTION 22Which technology extends Layer 2 LANs over any network that supports IP? A.    OTVB.    VSSC.    vPCD.    VLAN Answer: A QUESTION 23What is the purpose of an OTV edge device? A.    connect to other data centersB.    connect to the access layerC.    connect to the end usersD.    connect to mobile devices Answer: A QUESTION 24Which QoS architecture provides scalability of implementation? A.    IntServB.    DiffServC.    LLQD.    RSVP Answer: B QUESTION 25Which architecture provides a way to deliver end-to-end QoS as required by real-time voice and video business applications? A.    IntServB.    DiffServC.    LLQD.    ToSE.    DSCP Answer: A QUESTION 26CoS is applied for Layer 2 markings in an Ethernet environment. Which protocol must be configured on the Layer 2 switch port for CoS to work? A.    MPLSB.    IEEE 802.1WC.    IEEE 802.1QD.    IEEE 802.1S Answer: C QUESTION 27Which protocol is used in an in-band network and why? A.    UDP, because it is connectionlessB.    SSH, because the username and password are encryptedC.    Telnet, because the username and password are sent in clearD.    MSDP, because it uses TCP as its transport protocol Answer: B QUESTION 28What is an advantage of having an out-of-band management? A.    It is less expensive to have an out-of-band management.B.    Network devices can still be managed, even in case of network outage.C.    There is no separation between the production network and the management network.D.    SSH protocol must be used to manage network devices. Answer: B QUESTION 29The direction of the flow of multicast traffic is based on which protocol? A.    PIMB.    IGMPC.    underlying IGPD.    MSDP Answer: C QUESTION 30Which option can be implemented to manipulate the election of PIM DR to force multicast traffic to a certain path? A.    Assign a lower PIM DR priority to the PIM DR interface.B.    Assign a lower IP address to the PIM DR interface.C.    Assign a higher PIM DR priority to the PIM DR interface.D.    Increase the cost on the PIM DR interface. Answer: C QUESTION 31What network technology provides Layer 2 high availability between the access and distribution layers? A.    HSRPB.    MECC.    EIGRPD.    GLBP Answer: B QUESTION 32On which two types of links should routing protocol peerings be established according to best practice? (Choose two.) A.    distribution linksB.    end user linksC.    transit linksD.    core links Answer: CD QUESTION 33An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic? A.    50 secondsB.    100 secondsC.    150 secondsD.    200 seconds Answer: C QUESTION 34What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device? A.    denies the client network resource accessB.    repairs the effected devicesC.    generates a Syslog messageD.    permits the client but limits to guest access Answer: B QUESTION 35Refer to the exhibit. A customer requires a web application implementation, but the web server has communication only to the application server and users, and the database server has communication only to the application server. What firewall design is the best fit for this scenario? A.    transparent mode with the servers on the same subnetB.    routed mode with three security zonesC.    transparent mode with three security zonesD.    routed mode with two security zones Answer: B QUESTION 36Which route summarization most efficiently reduces perceived network complexity that is composed of subnetworks ranging from to A. Answer: D QUESTION 37What is the recommended subnet between two sites that have a point-to-point connection to conserve IP addresses? A. Answer: C QUESTION 38In which OSI layer does IS-IS operate? A.    Layer 1B.    Layer 2C.    Layer 3D.    Layer 4 Answer: C QUESTION 39Which algorithm does IS-IS use to determine the shortest path through a network? A.    Bellman-Ford routing algorithmB.    Johnson's algorithmC.    Dijkstra's algorithmD.    Floyd-Warshall algorithm Answer: C QUESTION 40Which unique EIGRP feature allows for faster Layer 3 convergence? A.    fast EIGRP timersB.    feasible successorsC.    hybrid routing protocolD.    Cisco proprietary protocol Answer: B --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2016-02-16 10:07:09 Post date GMT: 2016-02-16 10:07:09 Post modified date: 2016-02-16 10:07:09 Post modified date GMT: 2016-02-16 10:07:09 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from