Certification Exam Prep Questions For
(300-320) Designing Cisco Network Service Architectures (ARCH)
QuickStart is now offering assessment questions for Designing Cisco Network Service Architectures (ARCH) (300-320). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for Designing Cisco Network Service Architectures (ARCH) (300-320).
The network of 192.168.l.O/24 is assigned to you. You want the network to split into four subnets that are all the same size. About the first subnet that you create which three statements are true? (Choose three.)
- A. The subnet mask is 255.255.255.192.
-
Correct!
- B. The last host IP address is 192.168.1.64.
-
Incorrect.
- C. The subnet mask is 255.255.255.224.
-
Incorrect.
- D. The subnet has up to 64 hosts.
-
Incorrect.
- E. The last host IP address is 192.168.l.62
-
Correct!
- F. The subnet has up to 62 hosts.
-
Correct!
MSDP is most useful in which multicast configuration?
- A. intradomain IPv4 PIM SSM
-
Incorrect.
- B. PIM Dense-Mode
-
Incorrect.
- C. IPv6 multicast
-
Incorrect.
- D. interdomain IPv4 PIM Sparse-Mode
-
Correct!
To bypass the learning and listening states which STP feature allows an access port?
VLAN configuration consistency is maintain by which Layer 2 messaging protocol?
With Layer 3 FHRP when designing a layer 2 STP-based LAN, which design recommendation should be followed?
- A. Modifying of default STP and FHRP timers is avoid.
-
Incorrect.
- B. To the lowest number in use assign the native VLAN.
-
Incorrect.
- C. Avoid configuring router preemption.
-
Incorrect.
- D. With the active FH RP device align the STP root.
-
Correct!
To detect network failures, which virtualization technology uses Layer 3 BFD between network devices?
For tunneling Ethernet frames VPLS uses which transport protocol?
A network that must incorporate active-active redundancy is being designed by a network engineer to eliminate disruption when a link failure occurs between the core and distribution layer. This is allowed by which two technologies? (Choose two.)
- A. Equal Cost Multi-Path (ECMP)
-
Incorrect.
- B. Rapid Spanning Tree Protocol Plus (RSTP+)
-
Incorrect.
- C. Hot Standby Routing Protocol (HSRP)
-
Correct!
- D. Rapid Spanning Tree Protocol (RSTP)
-
Incorrect.
- E. Multichassis EtherChannel (MEC)
-
Correct!
About 802.1X which three statements are true? (Choose three.)
- A. It is a Cisco proprietary standard.
-
Incorrect.
- C. It is an IEEE standard.
-
Correct!
When implementing a triangle looped access layer design which option must be included in the design?
- A. A first hop redundancy protocol.
-
Correct!
- B. Single uplinks between access and distribution switches.
-
Incorrect.
- C. Layer 2 links between access switches.
-
Incorrect.
- D. Layer 3 links between distribution switches.
-
Incorrect.
To connect two parts of a partitioned backbone through a non-backbone area which OSPF option can you configure?
- A. route summarization
-
Incorrect.
- B. a virtual link
-
Correct!
- C. an NSSA
-
Incorrect.
- D. a static OSPF neighbor
-
Incorrect.
To manipulate inbound traffic which two G attributes can be set with outbound policy, if by the remote autonomous system is honored? (Choose two.)
- A. next hop
-
Incorrect.
- B. AS path
-
Correct!
- C. local preference
-
Incorrect.
- D. multi-exit discriminator
-
Correct!
In transitioning to IPv6 what are two point-to-multipoint overlay tunneling strategies that are used? (Choose two.)
To an active directory domain for authentication to connect a Cisco IOS device which two methods are available? (Choose two.)
- A. Lightweight Directory Access Protocol
-
Correct!
- B. DNS Based Authentication of Named Entities
-
Incorrect.
- C. Microsoft Challenge-Handshake Authentication Protocol
-
Incorrect.
- D. RADIUS server
-
Correct!
A network designer needs to explain to a client the advantages of route summarization. Which two options in the explanation are advantages that should be included? (Choose two.)
- A. By advertising fake networks increase security
-
Incorrect.
- B. Reduces routing table size
-
Correct!
- C. Advertises detailed routing tables
-
Incorrect.
- D. Utilizes the routers full CPU capacity
-
Incorrect.
Which technology to provide a loop-free topology and does not contain a port state named”listening” can block ports?
To calculate the cost of an interface in OSPF when the cost is not configured which interface characteristic is used?
On the network from becoming the root switch which STP feature can prevent other switches, but still allow that interface to participate in STP otherwise?
To protect the OSPF information that a router receives which security mechanism can you implement?
- A. privilege 15 credentials
-
Incorrect.
- B. administrator username and password authentication
-
Incorrect.
- C. RADIUS authentication
-
Incorrect.
- D. cryptographic authentication
-
Correct!
A network designer should combine which technology with VSS to ensure a loop free topology with optimal convergence time?
- A. Portfast
-
Incorrect.
- B. UplinkFast
-
Incorrect.
- C. RPVST+
-
Incorrect.
- D. Multichassis EtherChannel
-
Correct!
The IP allocation an organization is designing of a new site. Currently it has 12 separate IP segments . Each segment must be /24, be easily summarized, and accommodate 25% of growth. To meet these requirements which summarized IP block can be subnetted?
To reduce the size of the SPT on an IS-IS broadcast network, a network design engineer has been asked. The engineer should recommend which option to accomplish this task?
- A. As point-to-multipoint configure the links.
-
Incorrect.
- B. Configure Q08 in all links.
-
Incorrect.
- C. Configure a new NET address.
-
Incorrect.
- D. As point-to-point configure the links.
-
Correct!
In IS-IS fast convergence what are three primary components? (Choose three.)
- A. event propagation
-
Correct!
- B. LSP flooding
-
Incorrect.
- C. fast hellos
-
Incorrect.
- D. matching MTUs
-
Incorrect.
- E. updating RIB and FIB
-
Correct!
- F. SPF calculation
-
Correct!
To scale EIGRP properly which two design principles should be followed? (Choose two.)
- B. On edge devices utilize route summarization.
-
Correct!
- D. On all core devices tune EIGRP delay metric.
-
Incorrect.
- Home
- Practice Exam - Designing Cisco Network Service Architectures
Practice Exam - Designing Cisco Network Service Architectures
More Information:
- Learning Style: On Demand
- Learning Style: Practice Exam
- Difficulty: Beginner
- Course Duration: 1 Hour
- Course Info: Download PDF
- Certificate: See Sample
Contact a Learning Consultant
Need Training for 5 or More People?
Customized to your team's need:
- Annual Subscriptions
- Private Training
- Flexible Pricing
- Enterprise LMS
- Dedicated Customer Success Manager
Course Information