Exams > Cisco > 300-420: Designing Cisco Enterprise Networks (ENSLD)
300-420: Designing Cisco Enterprise Networks (ENSLD)
Page 3 out of 20 pages Questions 21-30 out of 196 questions
Question#21

Which component of Cisco SD-Access integrates with Cisco DNA Center to perform policy segmentation and enforcement through the use of security group access control lists and security group tags?

  • A. Cisco Application Policy Infrastructure Controller Enterprise Module
  • B. Cisco Network Data Platform
  • C. Cisco Identity Services Engine
  • D. Cisco TrustSec
Discover Answer Hide Answer

D

Question#22

Which design element should an engineer consider when multicast is included in a Cisco SD-Access architecture?

  • A. PIM SSM must run in the underlay.
  • B. Multicast clients reside in the underlay, and the multicast source is outside the fabric or in the overlay.
  • C. Rendezvous points must be used in a PIM SSM deployment.
  • D. Multicast traffic is transported in the overlay and the EID space for wired and wireless clients.
Discover Answer Hide Answer

D
Reference:
https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2018/pdf/BRKEWN-2020.pdf
Slide 113

Question#23

What is the role of a control-plane node in a Cisco SD-Access architecture?

  • A. fabric device that connects wired endpoints to the SD-Access fabric
  • B. map system that manages endpoint to device relationships
  • C. fabric device that connects APs and wireless endpoints to the SD-Access fabric
  • D. map system that manages External Layer 3 networks
Discover Answer Hide Answer

B
Reference:
https://netaavi.com/my-blog-1/f/overview-of-sda-fabric-solution

Question#24

How is end-to-end microsegmentation enforced in a Cisco SD-Access architecture?

  • A. VLANs are used to segment traffic at Layer 2.
  • B. 5-tuples and ACLs are used to permit or deny traffic.
  • C. SGTs and SGTACLs are used to control access to various resources.
  • D. VRFs are used to segment traffic at Layer 3.
Discover Answer Hide Answer

C

Question#25

Which two border nodes are available in the Cisco SD-Access architecture? (Choose two.)

  • A. extended border
  • B. edge border
  • C. internal border
  • D. anywhere border
  • E. intermediate border
Discover Answer Hide Answer

AD

Question#26

Which control-plane protocol is used to map an endpoint to a location in a Cisco SD-Access network?

  • A. FabricPath
  • B. IS-IS
  • C. LISP
  • D. MP-BGP
Discover Answer Hide Answer

C

Question#27

Which feature is required for graceful restart to recover from a processor failure?

  • A. Cisco Express Forwarding
  • B. Virtual Switch System
  • C. Stateful Switchover
  • D. Bidirectional Forwarding Detection
Discover Answer Hide Answer

A

Question#28

An architect is designing a network that will utilize the spanning tree protocol to ensure a loop-free topology. The network will support an engineering environment where it is necessary for end-users to connect their own network switches for testing purposes. Which feature should the architect include in the design to ensure the spanning-tree topology is not affected by these rogue switches?

  • A. BPDU Skew Detection
  • B. BPDU guard
  • C. loop guard
  • D. root guard
Discover Answer Hide Answer

D

Question#29

An engineer is designing a Layer 3 campus network running EIGRP between the core, aggregation, and access layers. The access layer switches will be connected to the aggregation layer using Layer 3 copper connections. The engineer wants to improve the convergence time for access layer switch failures.
Which technique must the design include?

  • A. enabling BFD for EIGRP on the access layer uplinks
  • B. reducing the EIGRP Hello / Hold timer values
  • C. EIGRP summarization from core to aggregation layer
  • D. EIGRP summarization from access to aggregation layer
Discover Answer Hide Answer

A

Question#30

An existing network solution is using BFD in echo mode. Several network devices are experiencing high CPU utilization, which an engineer has determined is related to the BFD feature. Which solution should the engineer leverage to reduce the CPU load?

  • A. Implement slow timers between peers with low CPU resources.
  • B. Implement BFD asynchronous mode between peers with low CPU resources.
  • C. Enable BFD multi-hop on the devices with low CPU resources.
  • D. Utilize carrier delay on all routers in the network.
Discover Answer Hide Answer

A

chevron rightPrevious Nextchevron right