Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-420 - Designing Cisco Enterprise Networks (ENSLD)

Page: 5 / 11
Total 339 questions

Refer to the exhibit. The connection between SW2 and SW3 is fiber and occasionally experiences unidirectional link failure. An architect must optimize the network to reduce the change of layer2 forwarding loops when the link fails. Which solution should the architect include?

A.

Utilize 8PDU filter on SW3.

B.

Utilize loop guard on SW2

C.

Utilize BPDU guard on SW1

D.

Utilize root guard on SW1.

In an SD-WAN architecture, which methods are used to bootstrap a vEdge router?

A.

DHCP options or manual configuration

B.

vManage or DNS records

C.

ZTP or manual configuration

D.

DNS records or DHCP options

How are wireless endpoints registered in the HTDB in a Cisco SD-Access architecture?

A.

Fabric edge nodes update the HTDB based on CAPPWAP messaging from the AP

B.

Fabric WLCs update the HTDB as new clients connect to the wireless network

C.

Border nodes first register endpoints and then update the HTDB

D.

Fabric APs update the HTDB with the clients' ElD and RLOC

Which two LISP components are required in the Cisco SD-Access fabric control plane node? (Choose two.)

A.

Engross Tunnel Router

B.

Ingres Tunnel Router

C.

Map-Resolver

D.

Map-Server Proxy

E.

ETR

Which two functions is the Cisco SD-Access Edge Node responsible for? (Choose two.)

A.

Act as anycast layer 3 gateway

B.

Advertise EID subnets

C.

Map users to virtual network

D.

Act as LISP proxy tunnel router

E.

Route and transport IP traffic

Refer to the exhibit. An architect working for a service provider with an employee ID: 4763:44:876 must design a Layer 2 VPN solution that supports:

    transparency of service provider devices

    direct communication between CE routers attached to the same VLAN

Which solution must the design include?

A.

multiple VPWS

B.

single VPLS

C.

single VPWS

D.

multiple VPLS

Which feature minimizes TLOC connections and reduces strain on the vSmart controller in an SD-WAN architecture?

A.

control-direction

B.

affinity

C.

color

D.

control-connections

A company uses cloud-based applications for voice and video calls, file sharing, content sharing, and messaging. During business hours, these applications randomly become slow and unresponsive. However, other applications work smoothly with the current applied QoS polices. Which solution must the company choose to resolve the issue?

A.

Identify the applications with NBAR2 and allocate the required bandwidth accordingly.

B.

Identify the port used by each application and apply a minimum bandwidth guarantee.

C.

Identify the applications and reserve the required bandwidth on the perimeter routers.

D.

Identify the application ports, create groupings, and rate-limit the required bandwidth.

When a network is designed using IS-IS protocol, which two circuit types are supported? (Choose two.)

A.

nonbroadcast multiaccess

B.

multiaccess

C.

point-to-multipoint

D.

nonbroadcast

E.

point-to-point

Refer to the exhibit An engineer is designing an OSPF solution with these requirements:

    NMS server will manage R5 and R6.

    Upon failure of R1. all NMS traffic should be routed through R4.

    Upon failure of the link between R5 and R6. all traffic destined for 10.6.6.6 should be routed through R4

Which solution must the engineer choose?

A.

Advertise 172.16.1.1 into OSPF process 1 with high cost on R1.

B.

Apply static routes on R2 and R3 with IP SLA tracking toward R5 and R6.

C.

Enable the default-Information originate command with a higher metric on R2 to R1.

D.

Redistribute OSPF process 1 into process 2 on R1 and R4.