Exams > Cisco > 300-420: Designing Cisco Enterprise Networks (ENSLD)
300-420: Designing Cisco Enterprise Networks (ENSLD)
Page 4 out of 20 pages Questions 31-40 out of 196 questions
Question#31

How is a sub-second failure of a transport link detected in a Cisco SD-WAN network?

  • A. Hellos are sent between the WAN Edge routers and the vSmart controller.
  • B. BFD runs on the IPsec tunnels between WAN Edge routers.
  • C. BGP is used between WAN Edge routers and the vSmart controller.
  • D. Link state change messages are sent between vSmart controllers.
Discover Answer Hide Answer

B

Question#32


Refer to the exhibit. Which two solutions maximize the use of the links between the core and distribution layers? (Choose two.)

  • A. use multiple equal-cost links
  • B. use an IGP
  • C. use HSRP
  • D. use RPVSTP+
  • E. use multiple unequal-cost links
Discover Answer Hide Answer

AB

Question#33

A customer's current Layer 2 infrastructure is running Spanning Tree 802.1d, and all configuration changes are manually implemented on each switch. An architect must redesign the Layer 2 domain to achieve these goals:
* reduce the impact of topology changes
* reduce the time spent on network administration
* reduce manual configuration errors
Which two solutions should the architect include in the new design? (Choose two.)

  • A. Implement Rapid PVST+ instead of STP.
  • B. Implement MST instead of STP.
  • C. Use VTP to propagate VLAN information and to prune unused VLANs.
  • D. Configure broadcast and multicast storm control on all switches.
  • E. Configure dynamic trunking protocol to propagate VLAN information.
Discover Answer Hide Answer

CD

Question#34

Which component is part of the Cisco SD-Access overlay architecture?

  • A. border node
  • B. spine node
  • C. leaf node
  • D. Cisco DNA Center
Discover Answer Hide Answer

D

Question#35

How are wireless endpoints registered in the HTDB in a Cisco SD-Access architecture?

  • A. Border nodes first register endpoints and then update the HTDB.
  • B. Fabric WLCs update the HTDB as new clients connect to the wireless network.
  • C. Fabric APs update the HTDB with the clients' EID and RLOC.
  • D. Fabric edge nodes update the HTDB based on CAPPWAP messaging from the AP.
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html

Question#36

What is the purpose of a Cisco SD-Access underlay network?

  • A. to abstract IP-based connectivity from physical connectivity
  • B. to emulate LAN segments to transport Layer 2 frames over a Layer 3 network
  • C. to establish physical connectivity between switches and routers
  • D. to provide virtualization by encapsulating network traffic over IP tunnels
Discover Answer Hide Answer

C

Question#37

DRAG DROP -
Drag and drop the components in a Cisco SD-Access architecture from the left onto their descriptions on the right.
Select and Place:

Discover Answer Hide Answer


Question#38


Refer to the exhibit. The distribution switches serve as the Layer 3 boundary. HSRP preemption is enabled. When the primary switch comes back after a failure, traffic is initially dropped. Which solution must be implemented to improve the design?

  • A. Increase the hello timers on both HSRP devices.
  • B. Use the preempt delay feature on the backup HSRP device.
  • C. Use the preempt delay feature on the primary HSRP device.
  • D. Configure a higher mac-refresh interval on both HSRP devices.
Discover Answer Hide Answer

C

Question#39


Refer to the exhibit. Where must an architect plan for route summarization for the topology?

  • A. from the core toward the aggregation and the access toward the aggregation
  • B. from the core toward the aggregation and the aggregation toward the core
  • C. from the aggregation toward the access and the access toward the aggregation
  • D. from the aggregation toward the core and the aggregation toward the access
Discover Answer Hide Answer

D

Question#40


Refer to the exhibit. The connection between SW2 and SW3 is fiber and occasionally experiences unidirectional link failure. An architect must optimize the network to reduce the change of Layer 2 forwarding loops when the link fails. Which solution should the architect include?

  • A. Utilize BPDU filter on SW3.
  • B. Utilize root guard on SW1.
  • C. Utilize BPDU guard on SW1.
  • D. Utilize loop guard on SW2.
Discover Answer Hide Answer

D

chevron rightPrevious Nextchevron right