Win IT Exam with Last Dumps 2024


Cisco 300-420 Exam

Page 6/18
Viewing Questions 51 60 out of 173 Questions
33.33%

Question 51
When vEdge router redundancy is designed, which FHRP is supported?
A. HSRP
B. OMP
C. GLBP
D. VRRP

Question 52
What is the purpose of an edge node in an SD-Access network fabric?
A. Edge nodes identify and authenticate endpoints and register endpoint information with control plane nodes.
B. Edge nodes track endpoint IDs to __cpLocation mappings, along with IPv4, IPv6, or MAC addresses.
C. Edge nodes are the gateway between the fabric domain and network outside of the fabric.
D. Edge nodes resolve lookup requests from edge and border nodes to locate destination endpoint IDs.

Question 53
Which component of Cisco SD-Access integrates with Cisco DNA Center to perform policy segmentation and enforcement through the use of security group access control lists and security group tags?
A. Cisco Application Policy Infrastructure Controller Enterprise Module
B. Cisco Network Data Platform
C. Cisco Identity Services Engine
D. Cisco TrustSec

Question 54
Which design element should an engineer consider when multicast is included in a Cisco SD-Access architecture?
A. PIM SSM must run in the underlay.
B. Multicast clients reside in the underlay, and the multicast source is outside the fabric or in the overlay.
C. Rendezvous points must be used in a PIM SSM deployment.
D. Multicast traffic is transported in the overlay and the EID space for wired and wireless clients.

Question 55
What is the role of a control-plane node in a Cisco SD-Access architecture?
A. fabric device that connects wired endpoints to the SD-Access fabric
B. map system that manages endpoint to device relationships
C. fabric device that connects APs and wireless endpoints to the SD-Access fabric
D. map system that manages External Layer 3 networks


Question 56
How is end-to-end microsegmentation enforced in a Cisco SD-Access architecture?
A. VLANs are used to segment traffic at Layer 2.
B. 5-tuples and ACLs are used to permit or deny traffic.
C. SGTs and SGTACLs are used to control access to various resources.
D. VRFs are used to segment traffic at Layer 3.

Question 57
Which two border nodes are available in the Cisco SD-Access architecture? (Choose two.)
A. extended border
B. edge border
C. internal border
D. anywhere border
E. intermediate border

Question 58
Which control-plane protocol is used to map an endpoint to a __cpLocation in a Cisco SD-Access network?
A. FabricPath
B. IS-IS
C. LISP
D. MP-BGP

Question 59
Which feature is required for graceful restart to recover from a processor failure?
A. Cisco Express Forwarding
B. Virtual Switch System
C. Stateful Switchover Most Voted
D. Bidirectional Forwarding Detection

Question 60
An architect is designing a network that will utilize the spanning tree protocol to ensure a loop-free topology. The network will support an engineering environment where it is necessary for end-users to connect their own network switches for testing purposes. Which feature should the architect include in the design to ensure the spanning-tree topology is not affected by these rogue switches?
A. BPDU Skew Detection
B. BPDU guard
C. loop guard
D. root guard



Premium Version