Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-420 - Designing Cisco Enterprise Networks (ENSLD)

Page: 4 / 11
Total 339 questions

A company requested that an architect propose a new IPv4 and IPv6 deployment strategy. The company wants a solution that is straightforward, with no information hiding or forwarding overhead. Which solution meets these requirements?

A.

LISP

B.

NAT64

C.

dual-stack

D.

GRE tunnels

Which consideration must be taken into account when using the DHCP relay feature in a Cisco SD-Access Architecture?

A.

DHCP-relay must be enabled on fabric edge nodes to provide the correct mapping of DHCP scope to the local anycast gateway.

B.

A DHCP server must be enabled on the border nodes to allow subnets to span multiple fabric edges.

C.

DHCP servers must support Cisco SD-Access extensions to correctly assign IPs to endpoints in an SD-Access fabric with anycast gateway.

D.

DHCP Option-82 must be enabled to map the circuit IP option to the access fabric node where the DHCP discover originated.

How does a model-driven telemetry dial-out approach function?

A.

The device initiates a session to the collector based on the subscription.

B.

The collector initiates a session to the device and subscribes to data to be streamed.

C.

The collector Initiates a session to the device and gets the data of a previously defined subscription.

D.

The device initiates a session to the collector and negotiates a subscription.

In a multicast network, which condition must be met for an RPF check to be performed on the RP address'?

A.

The PIM DM device receives a multicast packet and has no directly connected members

B.

The PIM router or multilayer switch has a shared-tree state

C.

The PIM router or multilayer switch has a source-tree state

D.

The PIM DM device receives a multicast packet and has no directly connected PIM neighbor

A company requires a private WAN design that allows remote sites to connect to HQ. The design must ensure that:

    traffic is always encrypted

    forwarding overhead is reduced

    management of security Is centralized

    multicast traffic is supported

Which technology must the company select?

A.

iPiac P2P

B.

GET VPN

C.

DMVPN Phase 3

D.

mGRE

Which feature of Cisco SD-WAN Secure Direct Cloud Access divides user traffic into different zones and VPNs or VRFs?

A.

centralized data policy

B.

secure segmentation

C.

perimeter control

D.

application-awareness routing

An engineer is looking for a standards-driven YANG model to manage a multivendor network environment. Which model must the engineer choose?

A.

Native

B.

OpenConfig

C.

IETF

D.

IEEE NETCONF

Which component is part of the Cisco SD-Access overlay architecture?

A.

border node

B.

spine node

C.

leaf node

D.

Cisco DNA Center

Which design consideration must be made when dual WAN Edge routers are deployed at a branch site?

A.

Use BGP AS-path prepending to influence egress traffic and use MED to influence ingress traffic from the branch.

B.

HSRP priorities must match the OMP routing policy to prefer one WAN Edge over the other.

C.

Traffic must be symmetrical as it egresses the WAN Edges and returns from remote sites for DPI to function properly.

D.

Configure BFD between WAN Edge routers to detect sub-second link failures.

A company has many spoke sites with two data centers. The company wants to exchange the routing information between the data centers and the spoke sites using EIGRP. All locations belong to a single AS. and auto-summarization Is disabled. Which two actions must the company choose? (Choose two.)

A.

Exchange all routes between locations

B.

Summarize the routes between the hubs.

C.

Make each spoke site router a stub router

D.

Summarize the routes from spokes to the hubs.

E.

Split the network into two separate ASs