Your success in Cisco cisco 300 320 dumps is our sole target and we develop all our cisco 300 320 braindumps in a way that facilitates the attainment of this target. Not only is our 300 320 arch pdf study material the best you can find, it is also the most detailed and the most updated. 300 320 vce Practice Exams for Cisco CCDP cisco 300 320 are written to the highest standards of technical accuracy.
Q11. When a Cisco ASA adaptive security appliance is configured for active/standby failover, which MAC address is used for the active unit?
A. the MAC address of the primary unit
B. the MAC address of the secondary unit
C. the virtual MAC address
D. the standby MAC address
Answer: A
Q12. Refer to the exhibit.
The Cisco Nexus 1000V in the VMware vSphere solution effectively creates an additional access layer in the virtualized data center network; which of the following 1000V characteristics can the designer take advantage of?
A. Offloads the STP requirement from the external Access layer switches
B. If upstream access switches do not support vPC or VSS the dual-homed ESX host traffic can still be distributed using virtual port channel host mode using subgroups automatically discovered through CDP
C. Allows transit traffic to be forwarded through the ESX host between VMNICs
D. Can be divided into multiple virtual device contexts for service integration, enhanced
security, administrative boundaries, and flexibility of deployment
Answer: B
Q13. Which two modes does LACP support? (Choose two.)
A. on
B. passive
C. associated
D. link
Answer: A,B
Q14. Which security feature can help prevent spoofed packets on the network?
A. uRPF
B. ACLs
C. DAI
D. DHCP spoofing
Answer: A
Q15. What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?
A. denies the client network resource access
B. repairs the effected devices
C. generates a Syslog message
D. permits the client but limits to guest access
Answer: B
Q16. The network designer needs to consider the number of multicast applications and sources in the network to provide the most robust network possible. Which of the following is a consideration the designer must also address?
A. The IGPs should utilize authentication to avoid being the most vulnerable component
B. With SSM source or receiver attacks are not possible
C. With Shared Trees access control is always applied at the RP
D. Limit the rate of Register messages to the RP to prevent specific hosts from being attacked on a PIM-SM network
Answer: B
Q17. Which Cisco feature can be run on a Cisco router that terminates a WAN connection, to gather and provide WAN circuit information that helps switchover to dynamically back up the WAN circuit?
A. Cisco Express Forwarding
B. IP SLA
C. passive interface
D. traffic shaping
Answer: B
Q18. What two sensor types exist in an IDS/IPS solution? (Choose two.)
A. host
B. anomaly based
C. policy based
D. network based
E. signature
Answer: A,D
Q19. Which feature set enables the full OSPF routing process when using a Cisco Catalyst 3750X Switch?
A. LAN base
B. IP base
C. IP services
D. enterprise access
Answer: C
Q20. Which action can be taken on a multiaccess segment with OSPF speakers to reduce the performance impact during widespread convergence events?
A. Separate the network into multiple areas for each new multiaccess segment.
B. Enable LSA throttling in the core to slow link state advertisement updates during times of network instability.
C. Ensure that the elected DR or BDR router can support high-volume convergence events.
D. Verify that fewer than 50 OSPF speakers are on the segment.
Answer: C