Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

300-420 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-420 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Designing Cisco Enterprise Networks (ENSLD)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 339
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-420 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

300-420 Practice Exam Questions with Answers Designing Cisco Enterprise Networks (ENSLD) Certification

Question # 6

Which design element should an engineer consider when multicast is included in a Cisco SD-Access architecture?

A.

PIM SSM must run in the underlay.

B.

Multicast clients reside in the underlay, and the multicast source is outside the fabric or

in the overlay.

C.

Rendezvous points must be used in a PIM SSM deployment.

D.

Multicast traffic is transported in the overlay and the EID space for wired and wireless clients.

Full Access
Question # 7

An engineer must design a scalable QoS architecture that allows the separation of the traffic into classes on predefined business requirements. The design must also utilize the differentiated services code points as the QoS priority descriptor value and support at least 10 levels of classification. Which QoS technology should the engineer include in the design?

A.

RSVP

B.

Diffserv

C.

Best effort

D.

Interserv

Full Access
Question # 8

What is the purpose of the fabric control plane in a Cisco SD-Access architecture?

A.

create, propagate, and enforce G6AC policies in the fabric

B.

create a transit node with BGP route reflector functionality

C.

extend multiple subnets to one RLOC

D.

create and resolve endpoint-to-location mapping

Full Access
Question # 9

An engineer is designing a multicast network for a financial application Most of the multicast sources also receive multicast traffic (many-to-many deployment model). To better routing tables, the design must not use source trees. Which multicast protocol satisfies these requirements?

A.

BIRDIR-PIM

B.

PIM-SM

C.

MSDP

D.

PIM-SSM

Full Access
Question # 10

A customer requested that a guaranteed service line be enabled for a manufacturing business in different countries. On the customer side, the QoS-aware application is used to process large data chunks. The application cannot tolerate drops and latency should be as low as possible. Which QoS model must an engineer employ to use the minimum required resources on the ISP network nodes?

A.

Implement a group-based QoS strategy with FECs enabled

B.

Enable a flow-based QoS strategy with queuing elements.

C.

Implement an end-to-end QoS strategy with SLA.

D.

Configure a domain-based QoS strategy with PHB behavior.

Full Access
Question # 11

An engineer must design a VPN solution for a company that has multiple branches connecting to a main office. What are two advantages of using DMVPN instead of IPsec tunnels to accomplish this task? (Choose

two.)

A.

support for AES 256-bit encryption

B.

greater scalability

C.

support for anycast gateway

D.

lower traffic overhead

E.

dynamic spoke-to-spoke tunnels

Full Access
Question # 12

Which feature minimizes HOC connections and reduces strain on the vSmart controller m an SO-WAN architecture?

A.

control-connections

B.

corrtroWirection

C.

color

D.

affinity

Full Access
Question # 13

What is the purpose of a border node in a Cisco SD-Access fabric?

A.

connect devices to a network

B.

perform traffic encapsulation and de-encapsulation

C.

perform network virtualization

D.

expand a network

Full Access
Question # 14

In the SD-WAN underlay network, which WAN Edge VPN ID is defined as the transport VPN and is used to

carry control traffic?

A.

VPN 0

B.

VPN 512

C.

VPN 128

D.

VPN 256

Full Access
Question # 15

Which function do reverse path forwarding mechanisms perform in a multicast deployment?

A.

They notify the upstream router of multicast traffic.

B.

They send PIM prune message toward multicast sources.

C.

They eliminate overlapping multicast addresses

D.

They prevent loops and duplicate packets.

Full Access
Question # 16

An architect must address sustained congestion on the access and distribution uplink of network. QoS has already been implemented and optimized, but it is no longer effective in ensuring optimal network performance. Which two solutions should the architect use to improver network performance? (Choose two)

A.

Reconfigure QoS based on the IntServ model

B.

Utilize random early detection to manage queues

C.

Implement higher-speed uplink interfaces

D.

Bundle additional uplinks into logical EtherChannels

E.

Configure selective packet discard to drop noncritical network traffic.

Full Access
Question # 17

Drag and drop the descriptions from the left onto the Cisco SD-WAN component they describe on the right.

300-420 question answer

Full Access
Question # 18

300-420 question answer

Refer to the exhibit A network administrator plans to announce the site subnets to the WAN using route summarization instead of announcing every subnet. What is the smallest summary route that should be used to encompass all subnets at the site?

A.

2001:DB8:ABCD:0003::/60

B.

2001:DB8::732

C.

2001:DB8:ABCD::760

D.

2001 DB8 ABCD /64

Full Access
Question # 19

Which two steps can be taken to improve convergence in an OSPF network? (Choose two.)

A.

Use Bidirectional Forwarding Detection

B.

Merge all the areas into one backbone area

C.

Tune OSPF parameters

D.

Make all non-backbone areas stub areas

E.

Span the same IP network across multiple areas.

Full Access
Question # 20

An engineer is designing a WAN solution for a customer with teams in different branch locations that need to communicate The teams also need to access enterprise applications hosted in the data center and the cloud The customer also must provide guests with connectivity to the internet only, and the internet gateway is located in the data center Which solution must the engineer choose?

A.

WAN connectivity from a different service provider for guests

B.

firewall placed in data center that fitters any traffic from guests

C.

MPLS Layer 3 VPN with one VRF for corporate access and a separate VRF for guests

D.

MPLS Layer 3 VPN with a separate VRF for each branch location

Full Access
Question # 21

Which nonproprietary mechanism can be used to automate rendezvous point distribution in a large PIM domain?

A.

Embedded RP

B.

BSR

C.

Auto-RP

D.

Static RP

Full Access
Question # 22

300-420 question answer

Refer to the exhibit. A company has some offices that are connected via dark fiber in New York. A network architect must optimize the network design based on the EIGRP routing protocol. The network has hierarchical addressing between 10 and 12 routers in each office. Routing convergence time must be at the minimum. What must the network architect do to reduce the query range?

A.

Configure stub areas on non-edge routers.

B.

Implement network summarization on edge routers.

C.

Use different EIGRP processes on edge routers.

D.

Configure route filtering on non-edge routers.

Full Access
Question # 23

An engineer must propose a solution for a campus network that includes the capability to create multiple Layer 3 virtual networks. Each network must have its own addressing structure and routing table for data forwarding. The solution must be scalable to support hundreds of virtual networks and allow simple configuration and management with minimal administrative overhead. Which solution does the engineer recommend?

A.

hop-by-hop EVN

B.

multihop MPLS core

C.

multihop IPsec tunneling

D.

hop-by-hop VRF-Lite

Full Access
Question # 24

A customer is discussing QoS requirements with a network consultant. The customer has specified that end-to-end path verification is a requirement. Which QoS solution meets this requirement?

A.

IntServ model with RSVP to support the traffic flows

B.

DiffServ model with PHB to support the traffic flows

C.

marking traffic at the access layer with DSCP to support the traffic flows

D.

marking traffic at the access layer with CoS to support the traffic flows

Full Access
Question # 25

300-420 question answer

Refer to the exhibit. An architect is designing a Layer 2 network for a customer. The network will use the spanning-tree protocol. During a link failure between SW1 and SW2, the fastest possible convergence time is desired. Which solution must the architect select?

A.

Loop Guard

B.

UplinkFast

C.

PortFast

D.

BackboneFast

Full Access
Question # 26

An architect is working on a design to connect a company's main site to several small to medium-sized remote branches. The solution must include redundant WAN links, but the customer has a limited budget and wants the ability to increase the link speed easily in the future. QoS will not on the branch routers so there is no need for consistent end-to-end QoS. Which solution does the architect propose?

A.

dual-homed WAN MPLS with single edge router

B.

dual-homed Internet with a single edge router running a site-to-site VPN topology

C.

dual-homed WAN MPLS and Internet links via dual edge routers

D.

dual-homed Internet with dual edge routers running a hub-and-spoke VPN topology

Full Access
Question # 27

What are two advantages of the Cisco SD-WAN technology9 (Choose two)

A.

Improved application experience

B.

Easier deployment

C.

Optimized cloud connectivity

D.

Proactive network management

E.

Consistent connectivity

Full Access
Question # 28

Which solution allows overlay VNs to communicate with each other in an SD-WAN Architecture?

A.

External fusion routers can be used to map VNs to VRFs and selectively route traffic between VRFs.

B.

GRE tunneling can be configured between fabric edges to connect one VN to another.

C.

SGTs can be used to permit traffic from one VN to another.

D.

Route leaking can be used on the fabric border nodes to inject routes from one VN to another.

Full Access
Question # 29

An engineer is designing a campus network with Cisco Catalyst 95CO switches in the aggression layer. The design requires running nonblocking Layer 2 MEC from the aggregation layer to the access layer. The Catalyst switches are located on different campus floors for availability reasons, and each access switch veil contam a single VLAN. Which technology must the engineer choose for the aggregation switches in the design?

A.

VPC

B.

VSS

C.

StackWise Virtual

D.

StackWise-180

Full Access
Question # 30

300-420 question answer

Refer to the exhibit. Customers report low video quality and delays when having point-to-point telepresence video calls between the two locations. An architect must optimize a design so that traffic follows the same path for egress and ingress traffic flows. Which technique optimizes the design?

A.

Configure route leaking on the router in area 2.

B.

Configure route leaking on the router in area 1.

C.

Configure the high metric on the router in area 4.

D.

Configure route filter on the router in area 4.

Full Access
Question # 31

A customer has several remote sites connected with their headquarters through microwave links. An engineer must propose a backup WAN solution based on these conditions:

300-420 question answer

Which backup WAN link type the engineer recommend?

A.

LTE

B.

802.16 WiMAX

C.

Laser link

D.

802.15.1 Bluetooth

Full Access
Question # 32

An engineer must design a solution to provide backup connectivity between two sites. The engineer plans to use an Internet connection but company policy requires the connection to be encrypted. Additionally, there are several applications that utilize multicast to deliver video streams between the sites. Which technology should the design include?

A.

GRE over IPsec

B.

IPsec direct encapsulation

C.

GETVPN

D.

DMVPN

Full Access
Question # 33

300-420 question answer

Refer to the exhibit. A network engineer working for a private service provider with an employee ID: 4670:71:451 must design a BGP solution based on:

    All traffic originating from AS100 must pass through AS200 to reach the NTP and DHCP server

    When a link failure occurs between R3 and R4, traffic must follow the R2-R9 link to reach the NTP and DHCP server.

Which solution must the design include?

A.

Routers R3 and R10 advertise an IGP metric into BGP during redistribution in both directions.

B.

Router R6 influences the paths of R9 and R11 to the DC with a higher AS-PATH value.

C.

Routers R3 and R10 advertise a lower local preference for outgoing traffic and a higher AS-PATH value for incoming traffic.

D.

Router R3 applies a local preference of 200 for R1. R2. R9. and R11 routers to reach the data center.

Full Access
Question # 34

An engineer is designing a networking solution to allow two hosts to communicate—one host located within the company A network and the other within the company B network. The two companies have no other plans for future additional connections. Both companies want to use a single secure and encrypted internet connection, and the configuration must be as simple as possible. Which network solution must the engineer choose?

A.

single DMVPN with EIGRP routing

B.

routed IPsec tunnel with OSPF routing

C.

policy-based IPsec tunnel with static routing

D.

MPLS VPN provided service with BGP routing

Full Access
Question # 35

Refer to the exhibit. A network engineer is designing an OSPF solution to connect a company's remote to a newly provisioned MPLS VPN backbone. Some of the branches have a direct dark fiber connection between each other. The engineer wants to ensure that the dark fibers are used only when the MPLS core is unavailable. Which solution must the engineer choose?

A.

Stub area

B.

Sham link

C.

Virtual link

D.

NSSA

Full Access
Question # 36

An engineer uses Postman and YANG to configure a router with:

300-420 question answer

Which get-config replay verifies that the model set was designed correctly?

300-420 question answer

300-420 question answer

300-420 question answer

300-420 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 37

Prior to establishing full-mesh iPsec tunnels in a typical Cisco SD-WAN deployment, which mechanism do WAN Edge routers use to exchange Key information for data plane encryption?

A.

They use vSmart controllers as key exchange servers.

B.

They use vManage as a key exchange server.

C.

They use IKEv2 when exchanging keys with each other.

D.

They use vBond as a key exchange server.

Full Access
Question # 38

Drag and drop the characteristics from the left onto the Yang model they describe on the right.

Select and Place:

300-420 question answer

Full Access
Question # 39

A network engineer must optimize a campus OSPF deployment Currently each time a type 1 or type 2 LSA is generated within an area, the OSPF process must recompute the entire SPT Which solution improves the recomputation process?

A.

iSPF

B.

BFD

C.

SPF

D.

PRC

Full Access
Question # 40

A company wants to deploy IPv6 within its existing network infrastructure. All current infrastructure equipment supports IPv6, and the company wants a migration strategy that must not require purchasing additional equipment The plan must keep operational management costs low. support IPv6 multicast, and allow applications to migrate using DNS. Which strategy must the company choose?

A.

hybrid ISATAP tunnel model

B.

hybrid manual tunnel model

C.

service block model

D.

dual-stack model

Full Access
Question # 41

300-420 question answer

Refer to the exhibit. An architect is designing a network that requires route redistribution. The design must prevent route feedback and the creation of routing loops. The OSPF domain is using default metrics, and the IS-IS domain is using narrow metrics. Which solution must the architect select?

A.

Change the IS-IS administrative distance to 105.

B.

Change the OSPF area to a nonbackbone stub area

C.

Use route filtering with an ACL or prefix list.

D.

Use route tagging with a route map.

Full Access
Question # 42

Refer to the exhibit.

300-420 question answer

The failover time of ISP-2 is significantly shorter than ISP-1 when an interface on the ISP router toward the campus network fails. Which solution minimizes the downtime to the sub-second?

A.

Aggressive timers

B.

Next-hop address tracking

C.

Graceful-restart

D.

BFD

Full Access
Question # 43

Which two techniques improve the application experience in a Cisco SD-WAN design? (Choose two.)

A.

utilizing forward error correction

B.

implementing a stateful application firewall

C.

implementing AMP

D.

utilizing quality of service

E.

implementing Cisco Umbrella

Full Access
Question # 44

An engineer must use YANG with an XML representation to configure a Cisco IOS XE switch with these specifications:

    IP address 10.10.10.10/27 configured on the interface GigabitEthernet2/1/0

    connectivity from a directly connected host 10.10.10.1/27

Which YANG data model set must the engineer choose?

A.

300-420 question answerText, letter Description automatically generated

B.

300-420 question answerText, email Description automatically generated

C.

300-420 question answerText, letter Description automatically generated

D.

300-420 question answerText, letter Description automatically generated

Full Access
Question # 45

300-420 question answer

Refer to the exhibit An engineer is designing an OSPF solution with these requirements:

    NMS server will manage R5 and R6.

    Upon failure of R1. all NMS traffic should be routed through R4.

    Upon failure of the link between R5 and R6. all traffic destined for 10.6.6.6 should be routed through R4

Which solution must the engineer choose?

A.

Advertise 172.16.1.1 into OSPF process 1 with high cost on R1.

B.

Apply static routes on R2 and R3 with IP SLA tracking toward R5 and R6.

C.

Enable the default-Information originate command with a higher metric on R2 to R1.

D.

Redistribute OSPF process 1 into process 2 on R1 and R4.

Full Access
Question # 46

300-420 question answer

Refer to the exhibit An engineer with an employee ID: 1234 56:789 must design a WoL deployment for a client, and the design must ensure that the Windows PCs are responsive to the WoL magic packets with no delays when the server-side initiates the instruction Which action must the engineer choose?

A.

Spanning-tree PortFast must be enabled on all interfaces where clients reside.

B.

WoL must be enabled on the networking card and disabled in the Windows PCs BIOS.

C.

IP-directed broadcast must be disabled on all interfaces where clients reside.

D.

IP forward protocol must be disabled on all interfaces where clients reside

Full Access
Question # 47

An engineer is designing a BGP network for a large customer. To permit efficient scaling, the BGP domain is split into clusters. Which peering solution should be used between the route reflectors in different clusters for the BGP routes to be propagated appropriately?

A.

The route reflectors should be made dents of each other.

B.

The route reflectors should be nonclients with regards to each other.

C.

The route reflectors should not have any kind of BGP peering.

D.

The route reflectors should have peering through another nonclient router.

Full Access
Question # 48

Drag and drop the characteristics from the left onto the configuration protocols they describe on the right.

300-420 question answer

Full Access
Question # 49

A customer requests a VPN solution to connect multiple sites with the company headquarters. All the sites use the same IP subnet. The engineer plans to use VPLS. Which solutions must the engineer include in the design?

A.

802.1Q connectivity on the LAN side of the CE

B.

route exchange with the service provider

C.

address translation to hide overlapping subnets

D.

different VLANs on each site

Full Access
Question # 50

Since installing a cisco TelePresence system, the company is experiencing other application having response issues when the system in use. As a result, the company asked an architect to recommend a QoS solution. The customer is currently using a CBWFQ policy to manage traffic on an internet connection with a speed of 100 Mbps. Which link-capacity limit must the architect choose for strict-priority for the real-time traffic?

A.

25 Mbps

B.

50 Mbps

C.

33 Mbps

D.

75 Mbps

Full Access
Question # 51

An architect is creating a migration strategy for a large organization in which the choice made by the application between IPv6 and IPv4 is based on the DNS request. Which migration strategy does the architect choose?

A.

AFT for public web presence

B.

host-initiated tunnels

C.

dual stack

D.

site-to-site IPv6 over IPv4 tunnels

Full Access
Question # 52

300-420 question answer

Refer to the exhibit. An engineer is planning an IPv4 to IPv6 migration solution for a customer. The routers in the network can support IPv4 and IPv6, except for the DWDM routers. The DWDM routers provide a Layer 2 link in which the routers peer directly with each other across a DWDM circuit. The circuit also provides connectivity between the mail servers. Which IPv6 migration technique must the engineer deploy?

A.

dual-stack

B.

6to4

C.

ISATAP

D.

6rd

Full Access
Question # 53

In a Cisco SD-Access fabric, switch node Is equivalent to an access layer switch In a traditional three-tier campus network design?

A.

edge node

B.

border node

C.

intermediate node

D.

control plane node

Full Access
Question # 54

When IPsec VPNs are designed, what is a unique requirement if support for IP Multicast is required?

A.

encapsulation of traffic with GRE or VTI

B.

IPsec forwarding using transport mode

C.

additional bandwidth for headend

D.

IPsec forwarding using tunnel mode

Full Access
Question # 55

Which two considerations must be made regarding the overlay network for a Cisco SD-Access architecture? (Choose two.)

A.

Virtual networks should be used for microsegmentation

B.

SGTs should be used for data plane isolation and microsegmentation

C.

Virtual networks should be used for data plane isolation only

D.

Overlapping IP addresses across different overlay networks should be used to conserve IP addresses

E.

Overlapping IP addresses across different overlay networks should be avoided for operational simplicity

Full Access
Question # 56

What is the purpose of Cisco vBond as a Session Traversal Utilities for NAT server?

A.

allow Cisco Catalyst SD-WAN routers to locate their own mapped IP addresses

B.

integrate Cisco SD-Access Wireless into the fabric

C.

secure data traffic between Cisco Catalyst SD-WAN edge routers that use IPsec

D.

provide Zero-Touch Provisioning to Cisco Catalyst SD-WAN vEdge devices

Full Access
Question # 57

300-420 question answer

Refer to the exhibit. An architect working for a service provider with an employee ID: 4763:44:876 must design a Layer 2 VPN solution that supports:

    transparency of service provider devices

    direct communication between CE routers attached to the same VLAN

Which solution must the design include?

A.

multiple VPWS

B.

single VPLS

C.

single VPWS

D.

multiple VPLS

Full Access
Question # 58

When expanding an existing Cisco SD-Access network, in addition to the control plane, which two device roles are needed to create an additional fabric site? (Choose two.)

A.

leaf

B.

cEdge

C.

WLC

D.

edge

E.

border

Full Access
Question # 59

300-420 question answer

Refer to the exhibit. An architect with an employee ID: 4542:60:170 is designing a campus Layer 2 infrastructure. The design requires a PoE power budget that varies from 30-60 W. In addition, power must be provided continuously to some endpoints and must be supported even during the reloading of edge switches. Which solution must the architect select?

A.

PoE Plus

B.

Fast PoE

C.

Universal PoE

D.

Perpetual PoE

Full Access
Question # 60

300-420 question answer

Refer to the exhibit. An engineer is designing an OSPF network for a client. Requirements dictate that the routers in Area 1 should receive all routes belonging to the network, including EIGRP, except the ones originated in the RIP domain. Which action should the engineer take?

A.

Make area 1 a NSSA.

B.

Make area 1 a stub.

C.

Make area 1 a standard OSPF area.

D.

Make the area 1 routers part of area 0.

Full Access
Question # 61

Which feature is used to optimize WAN bandwidth of IGMP network traffic among WAN Edge routers in the

same VPN?

A.

IGMPv2

B.

multicast RP

C.

multicast-replicator

D.

multicast service routes

Full Access
Question # 62

Which element in a Cisco SD-WAN architecture maintains a centralized routing table?

A.

WAN Edge router

B.

vSmart Controller

C.

vManage NMS

D.

vBond Orchestrator

Full Access
Question # 63

Which two statements about VRRP object tracking are true? (Choose two)

A.

The priority of a VRRP device can change in accordance with the up or down status of a VRRP object

B.

The VRRP interface priority must be manually configured by the administrator

C.

A VRRP group can track only one object at a time

D.

VRRP can track the status of interfaces and routes

E.

VRRP supports only interface tracking

Full Access
Question # 64

When vEdge router redundancy is designed, which FHRP is supported?

A.

HSRP

B.

OMP

C.

GLBP

D.

VRRP

Full Access
Question # 65

Drag and drop the elements from the left onto the YANG models where they and used on the right.

300-420 question answer

Full Access
Question # 66

Drag and drop the elements from the left onto the functions they perform in the Cisco SD-WAN architecture on the right.

300-420 question answer

Full Access
Question # 67

Which QoS feature responds to network congestion by dropping lower priority packets?

A.

CBWFQ

B.

tail drop

C.

WRED

D.

strict priority

Full Access
Question # 68

Which consideration must be made when designing a Cisco SD-Access fabric underlay?

A.

Subnets must be reduced to decrease latency.

B.

Up to six control planes are supported.

C.

The default MTU should be increased.

D.

A unified policy must be used.

Full Access
Question # 69

In a Cisco SD-Access fabric, which node facilities connectivity between the fabric and networks external to the fabric?

A.

intermediate

B.

edge

C.

control plane

D.

border

Full Access
Question # 70

300-420 question answer

Refer to the exhibit. The full EIGRP routing table is advertised throughout the network. Currently, users experience data loss when any one link in the network fails. An architect optimizes the network to reduce the impact when a link fails. Which solution should the architect include in the design?

A.

Run BFD on the inter links between EIGRP neighbors.

B.

Summarize the access layer networks from each access layer switch toward the aggregation layer.

C.

Reduce the default EIGRP hello interval and hold time.

D.

Summarize the access layer networks from the aggregation layer toward the core layer.

Full Access
Question # 71

A company plans to transition to IPv6. They will link their IPv4 addresses to the lowest significant bits of the new Ipv6 addresses. A network administrator with an employee id: 4264:42:116 is preparing a mapping schema for the new IPv6 addresses. Which address does the 172.16.10.0/24 network translate to?

A.

2001:db8:abcd::ac10:a00/120

B.

2001:db8:abcd:172:16:10::/96

C.

2001:db8:abcd:11d8:a00/120

D.

2001:db8:ac10:0a00::/64

Full Access
Question # 72

Refer to the exhibit.

300-420 question answer

A customer is running HSRP on the core routers. Over time the company has grown and requires more

network capacity. In the current environment, some of the downstream interfaces are almost fully utilized, but

others are not. Which solution improves the situation?

A.

Make router R2 active for half of the VLANs.

B.

Add more interfaces to R1 and R2.

C.

Configure port channel toward downstream switches.

D.

Enable RSTP on the downstream switches.

Full Access
Question # 73

What is a feature of the SaaS subscription model?

A.

web connection not required

B.

access to industrial-strength storage and computing power

C.

autonomy and control over hardware

D.

tower initial costs

Full Access
Question # 74

What does the fabric data plane leverage in SD-Access Architecture?

A.

LISP protocol to resolve endpoint-to-location mapping

B.

IS-IS protocol to exchange link-state routing information

C.

MAC-in-IP encapsulation method to transport of the Layer 2 frame

D.

BGP protocol to advertise endpoint prefixes outside of the fabric

Full Access
Question # 75

Which feature of Cisco SD-WAN Secure Direct Cloud Access divides user traffic into different zones and VPNs or VRFs?

A.

centralized data policy

B.

secure segmentation

C.

perimeter control

D.

application-awareness routing

Full Access
Question # 76

A network solution is being designed for a company that connects to multiple Internet service providers. Which Cisco proprietary BGP path attribute will influence outbound traffic flow?

A.

Local Preference

B.

MED

C.

Weight

D.

AS Path

E.

Community

Full Access
Question # 77

An architect is designing a multicast solution for a network that contains over 100 routers. The architect plans to create several multicast domains and balance the PIM-SM traffic within the network. Which technology should the architect include in the design?

A.

DVMRP

B.

IGMP

C.

MOSPF

D.

MSDP

Full Access
Question # 78

A company wants to switch from static to dynamic routing. The branches use DMVPN back to the hub using two internet connections. One internet connection speed is 10 Mbps, and the other is 100 Mbps. All locations use Cisco routers; however, the branch routers have limited memory and CPU resources. Which routing protocol and design solution must the company choose for optimal traffic forwarding during peak traffic times?

A.

iBGP with the hub routers set up as route reflectors

B.

OSPF deployed in area 0 with branch routers connected back via virtual links

C.

EIGRP with branch routers as stub routers and variance enabled

D.

ISIS with the hub and spoke routers configured in two different areas

Full Access
Question # 79

When designing interdomain multicast, which two protocols are deployed to achieve communication between multicast sources and receivers? (Choose two.)

A.

IGMPv2

B.

BIDIR-PIM

C.

MP-BGP

D.

MSDP

E.

MLD

Full Access
Question # 80

Which security functionality does gRPC provide?

A.

implementing secure server-client tunnels with RSA 20*8 cipher encryption

B.

mandatory encryption of data at rest using the AES and RSA protocols

C.

enabling RC6 data-level encryption with CRC check

D.

supporting secure communication between network devices and control systems using TLS

Full Access
Question # 81

300-420 question answer

Refer to the exhibit. The distribution switches serve as the layer 3 boundary. HSRP preemption is enabled. When the primary switch comes back after a failure, traffic is initially dropped. Which solution must be implemented to improve the design?

A.

Increase the hello timers on both HSRP devices

B.

Use the preempt delay feature on the primary HSRP device.

C.

Use the preempt delay feature on the backup HSRP device

D.

Configure a higher mac-refresh interval on both HSRP devices

Full Access
Question # 82

An engineer working for a service provider with an employee ID: 4863:43:939 must design a solution to provide remote connectivity over the public internet. The design must:

    securely connect multiple remote sites to the central site

    provide redundant paths to the central site

    allow auto path selection based on failure and connection quality

    support IP multicast

    minimal configuration at remote sites

Which solution must the engineer choose?

A.

MPLS provided service with BGP

B.

dual DMVPN with EIGRP routing

C.

full mesh OSPF with IPsec tunnels

D.

full mesh ISIS with GRE tunnels and IPsec

Full Access
Question # 83

Which function are fabric intermediate nodes responsible for in an SD-Access Architecture?

A.

mapping EIDs to RLOCs

B.

encapsulating user traffic in a VXLAN header including the SGT

C.

registering new endpoints in the HTDB

D.

transporting IP packets between edge nodes and border nodes

Full Access
Question # 84

Refer to the exhibit.

C0FD9F48 300-420 question answerC9ACDC725EA850EC2476EE1E

A network engineer is designing a network for AS100. The design should ensure that all traffic enters AS100

via link 1 unless there is a network failure. In the event of a failure, link 2 should function as the path for

incoming traffic. Which solution should the design include?

A.

Modify the next-hop attribute on R3.

B.

Use AS-Path prepending on R3.

C.

Modify the next-hop attribute on R4.

D.

Use AS-Path prepending on R4.

Full Access
Question # 85

300-420 question answer

Refer to the exhibit. Area 10 is a regular OSPF area and networks 10.1.1.0/24 and 172.16.1.0/24 are internal. Which design provides optimal routing between both networks when the link between routers C and E fails?

A.

Move the link between routers C and D to area 10.

B.

Create an OSPF virtual link between routers E and F.

C.

Create a tunnel between routers E and F in area 10.

D.

Make area 10 a not-so-stubby area.

Full Access
Question # 86

An engineer must design a QoS solution for a customer that is connected to an ISP over a 1Gbps link with a 100Mbps CIR. The ISP aggressively drops all traffic received over which is causing numerous TCP retransmissions. The customer is not using any RTP applications but wants to maximize bandwidth usage up to the CIR. Which QoS solution engineer choose?

A.

Policing

B.

Traffic shaping

C.

Policer with markdown

D.

Queuing

Full Access
Question # 87

A large chain of stores currently uses MPLS-based T1 lines to connect their stores to their data center. An architect must design a new solution to improve availability and reduce costs while keeping these considerations in mind:

» The company uses multicast to deliver training to the stores.

» The company uses dynamic routing protocols and has implemented QoS.

» To simplify deployments, tunnels should be created dynamically on the hub when additional stores open.

Which solution should be included in this design?

A.

VPLS

B.

GET VPN

C.

DMVPN

D.

IPsec

Full Access
Question # 88

In Cisco SD-Access. virtual networks create segmentation that allows for separation of users and resources. How is this type of segmentation described?

A.

macro

B.

inter-VN

C.

micro

D.

stretctied

Full Access
Question # 89

A customer's current Layer 2 infrastructure is running Spanning Tree 802.1d, and all configuration changes are manually implemented on each switch. An architect must redesign the Layer 2 domain to achieve these goals:

    reduce the impact of topology changes

    reduce the time spent on network administration

    reduce manual configuration errors

Which two solutions should the architect include in the new design? (Choose two.)

A.

Implement Rapid PVST+ instead of STP.

B.

Implement MST instead of STP.

C.

Use VTP to propagate VLAN information and to prune unused VLANs.

D.

Configure broadcast and multicast storm control on all switches.

E.

Configure dynamic trunking protocol to propagate VLAN information.

Full Access
Question # 90

An ISP provides Layer 3 VPN service over MPLS to a customer with four branches and multiple CE routers at

each branch. To exchange the routes that are learned from the CE routers, which BGP address family should

the ISP activate among the PE routers?

A.

address-family multicast

B.

L2VPN EVPN

C.

VPNv4 unicast

D.

IPv4 unicast

Full Access
Question # 91

How are wireless endpoints registered in the HTDB in a Cisco SD-Access architecture?

A.

Fabric edge nodes update the HTDB based on CAPPWAP messaging from the AP

B.

Fabric WLCs update the HTDB as new clients connect to the wireless network

C.

Border nodes first register endpoints and then update the HTDB

D.

Fabric APs update the HTDB with the clients' ElD and RLOC

Full Access
Question # 92

300-420 question answer

Refer to the exhibit An engineer working for a telecommunication company with an employee ID 4449:30 959 Is calculating STP scalability for switches to ensure that the numbers are below the maximum supported value for STP logical ports How many logical interfaces are active for switch A?

A.

4

B.

307

C.

202

D.

100

Full Access
Question # 93

300-420 question answer

Refer to the exhibit. Which method must an architect use to provide connectivity between the mail servers?

A.

ISATAP

B.

6to4

C.

IPv4 compaliDie

D.

6rd

Full Access
Question # 94

300-420 question answer

Refer to the exhibit. A network engineer must design a BGP solution based on:

    The route reflector must have one or more direct physical connections to the core routers (R3 and R4).

    The route reflector must have full redundancy and avoid a single point of failure.

    R2 to R1 link utilization is 90%. and the remaining links are less than 50% utilized.

Which two solutions must the design Include? (Choose two.)

A.

Configure R1 to be a client of R2 and R4.

B.

Configure R2 to be a client of R1 and R4.

C.

Configure R3 to be a client of R2 and R4.

D.

Configure R4 to be a client of R1 and R3.

E.

Configure R5 to be a client of R3 and R4.

Full Access
Question # 95

Refer to the exhibit.

300-420 question answer

An engineer is designing a routing solution for a customer. The design must ensure that a failure of network

10.1.0.0/24, 10.1.2.0/24, 10.2.1.0/24, or 10.2.3.0/24 does not impact the core. It also requires fast convergence

time during any link failover in the core or access networks. Which solution must the engineer select?

A.

Add aggregation layer between core and access networks.

B.

Enable graceful restart on routers A and C.

C.

Enable FRR for the connected networks of routers A and C.

D.

Enable summarization on routers A and C.

Full Access
Question # 96

An engineer is designing an enterprise campus network. The LAN infrastructure consists of switches from multiple vendors, and Spanning Tree must be used as a Layer 2 loop prevention mechanism. All configured

VLANs must be grouped in two SIP instances. Which standards-based Spanning Tree technology supports this design solution?

A.

MSTP

B.

RSTP

C.

Rapid PVST

D.

STP

Full Access
Question # 97

At which layer does Cisco Express Forwarding use adjacency tables to populate addressing information?

A.

    Layer4

B.

    Layer 2

C.

    Layer 1

D.

    Layer 3

Full Access
Question # 98

Refer to the exhibit.

300-420 question answer

EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?

A.

R1 has no route to R2 and drops the traffic

B.

R1 load-balances across the paths through R3 and R4 to reach R2

C.

R1 forwards the traffic to R3, but R3 drops the traffic

D.

R1 forwards the traffic to R3 in order to reach R2

Full Access
Question # 99

What is the purpose of a control plane node in a Cisco SD-Access network fabric?

A.

to maintain the endpoint database and mapping between endpoints and edge nodes

B.

to detect endpoints in the fabric and inform the host tracking database of EID-to-fabric-edge node bindings

C.

to identify and authenticate endpoints within the network fabric

D.

to act as the network gateway between the network fabric and outside networks

Full Access
Question # 100

An engineer must propose a QoS architecture model that allows an application to inform the network of its traffic profile and to request a particular type of service to support its bandwidth and delay requirements. The application requires consistent and dedicated bandwidth end to end. Which QoS architecture model meets these requirements?

A.

DiffServ

B.

LLQ

C.

WRED

D.

IntServ

Full Access
Question # 101

300-420 question answer

Refer to the exhibit. A network architect is preparing a network design based on the EIGRR Routers are connected using a cat6a cable type and the inter-router connection speed is limited to 10 Mbps due to distance. During the pilot phase, a DUAL-3-SIA error message is visible. Which action must the engineer take to create a stable design?

A.

Enable poison reverse on R4.

B.

Configure STUB area on R4.

C.

Create a summary route on R2.

D.

Disable split horizon on R1.

Full Access