Exams > Cisco > 300-420: Designing Cisco Enterprise Networks (ENSLD)
300-420: Designing Cisco Enterprise Networks (ENSLD)
Page 9 out of 20 pages Questions 81-90 out of 196 questions
Question#81

Which method does Cisco SD-WAN use to avoid fragmentation issues?

  • A. PMTUD is used.
  • B. Access circuits are configured with 1600 byte MTU settings.
  • C. Jumbo frames are enabled.
  • D. Traffic is marked with the DF bit set.
Discover Answer Hide Answer

A

Question#82

DRAG DROP -
Drag and drop the descriptions from the left onto the corresponding WAN connectivity types and categories on the right.
Select and Place:

Discover Answer Hide Answer


Question#83

A global organization with several branches hired a network architect to design an overlay VPN solution. The branches communicate with each other frequently.
The customer expects to add more branches in the future. To meet the customer's security requirements, the architect plans to provide traffic protection using dynamic IPsec tunnels. Which solution should the architect choose?

  • A. DMVPN
  • B. EasyVPN
  • C. L2TP
  • D. GETVPN
Discover Answer Hide Answer

A

Question#84

DRAG DROP -
Drag and drop the descriptions from the left onto the corresponding VPN types on the right.
Select and Place:

Discover Answer Hide Answer


Question#85

A customer requests a VPN solution to connect multiple sites with the company headquarters. All the sites use the same IP subnet. The engineer plans to use
VPLS. Which solution must the engineer include in the design?

  • A. different VLANs on each site
  • B. address translation to hide overlapping subnets
  • C. 802.1Q connectivity on the LAN side of the CE
  • D. route exchange with the service provider
Discover Answer Hide Answer

C

Question#86

An ISP provides Layer 3 VPN service over MPLS to a customer with four branches and multiple CE routers at each branch. To exchange the routes that are learned from the CE routers, which BGP address family should the ISP activate among the PE routers?

  • A. address-family multicast
  • B. L2VPN EVPN
  • C. VPNv4 unicast
  • D. IPv4 unicast
Discover Answer Hide Answer

C

Question#87

In the SD-WAN underlay network, which WAN Edge VPN ID is defined as the transport VPN and is used to carry control traffic?

  • A. VPN 0
  • B. VPN 512
  • C. VPN 128
  • D. VPN 256
Discover Answer Hide Answer

A

Question#88

A company's security policy requires that all connections between sites be encrypted in a manner that does not require maintenance of permanent tunnels. The sites are connected through a private MPLS-based service that uses a dynamically changing key and spoke-to-spoke communication. Which type of transport encryption must be used in this environment?

  • A. GETVPN
  • B. DMVPN
  • C. GRE VPN
  • D. standard IPsec VPN
Discover Answer Hide Answer

A

Question#89

A network solution is being designed for a company that connects to multiple Internet service providers. Which Cisco proprietary BGP path attribute will influence outbound traffic flow?

  • A. Local Preference
  • B. MED
  • C. Weight
  • D. AS Path
  • E. Community
Discover Answer Hide Answer

C

Question#90


Refer to the exhibit. EIGRP has been configured on all links. The spoke nodes have been configured as EIGRP stubs, and the WAN links to R3 have higher bandwidth and lower delay than the WAN links to R4. When a link failure occurs at the R1-R2 link, what happens to traffic on R1 that is destined for a subnet attached to R2?

  • A. R1 has no route to R2 and drops the traffic
  • B. R1 load-balances across the paths through R3 and R4 to reach R2
  • C. R1 forwards the traffic to R3, but R3 drops the traffic
  • D. R1 forwards the traffic to R3 in order to reach R2
Discover Answer Hide Answer

D

chevron rightPrevious Nextchevron right