Category Archives: 300-420 Designing Cisco Enterprise Networks (ENSLD)

300-420 Designing Cisco Enterprise Networks (ENSLD) Question and Answers

What are two valid scaling techniques when an EIGRP network is designed that consists of more than 1000 routers? (Choose two.)

A. Use structured hierarchical topology with route summarization B. Used sub-second timers C. Use the distribute-list command to filter routes D. Modify delay parameters on the links E. Implement multiple EIGRP autonomous systems Answer: Option A, E. Explanation:  No answer description available for this question. Show AnswerDiscussion The post What are two valid scaling techniques when an EIGRP… Read More »

Which two steps can be taken to improve convergence in an OSPF network? (Choose two.)

A. Use Bidirectional Forwarding Detection B. Merge all the areas into one backbone area C. Tune OSPF parameters D. Make all non-backbone areas stub areas E. Span the same IP network across multiple areas. Answer: Option C, D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post Which two steps can be taken to improve… Read More »

A network engineer must segregate three interconnected campus networks using IS-IS routing. A two-layer hierarchy must be used to support large routing domains and to avoid more specific routes from each campus network being advertised to other campus network routers automatically. Which two actions does the engineer take to accomplish this segregation? (Choose two.)

A. Designate two IS-IS routers as BDR routers at the edge of each campus, and configure one BDR for all Level 1 routers and one BDR for all Level 2 routers. B. Designate two IS-IS routers from each campus to act as Level 1/Level 2 backbone routers at the edge of each campus network. C. Assign the same… Read More »

How do endpoints inside an SD-Access network reach resources outside the fabric?

A. a VRF fusion router is used to map resources in one VN to another VN B. Fabric borders use VRFs to map VNs to VRFs C. SD-Access transit links are used to transport encapsulated traffic from one fabric to another D. A fabric edge is used to de-encapsulate VXLAN traffic to normal IP traffic then transported over… Read More »

Which function are fabric intermediate nodes responsible for in an SD-Access Architecture?

A. mapping EIDs to RLOCs B. encapsulating user traffic in a VXLAN header including the SGT C. registering new endpoints in the HTDB D. transporting IP packets between edge nodes and border nodes Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post Which function are fabric intermediate nodes responsible for in an… Read More »

An engineer must optimize the traffic flow of the network. Which change provides a more efficient design between the access and the distribution layer?

Refer to the exhibit. An engineer must optimize the traffic flow of the network. Which change provides a more efficient design between the access and the distribution layer? A. Add a link between access switch A and access switch B B. Reconfigure the distribution switch A to become the HSRP Active C. Change the link between distribution switch… Read More »

What is the purpose of an edge node in an SD-Access network fabric?

A. Edge nodes identify and authenticate endpoints and register endpoint information with control plane nodes. B. Edge nodes track endpoint IDs to location mappings, along with IPv4, IPv6, or MAC addresses. C. Edge nodes are the gateway between the fabric domain and network outside of the fabric. D. Edge nodes resolve lookup requests from edge and border nodes… Read More »

An engineer must design a VPN solution for a company that has multiple branches connecting to a main office. What are two advantages of using DMVPN instead of IPsec tunnels to accomplish this task? (Choose two.)

A. support for AES 256-bit encryption B. greater scalability C. support for anycast gateway D. lower traffic overhead E. dynamic spoke-to-spoke tunnels Answer: Option B, E. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An engineer must design a VPN solution for a company that has multiple branches connecting to a main office. What… Read More »

Which solution allows overlay VNs to communicate with each other in an SD-WAN Architecture?

A. External fusion routers can be used to map VNs to VRFs and selectively route traffic between VRFs. B. GRE tunneling can be configured between fabric edges to connect one VN to another. C. SGTs can be used to permit traffic from one VN to another. D. Route leaking can be used on the fabric border nodes to… Read More »

An enterprise customer has these requirements: end-to-end QoS for the business-critical applications and VoIP services based on CoS marking. flexibility to offer services such as IPv6 and multicast without any reliance on the service provider. support for full-mesh connectivity at Layer 2. Which WAN connectivity option meets these requirements?

A. VPWS B. MPLS VPN C. DMVPN D. VPLS Answer: Option D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post An enterprise customer has these requirements:<br> end-to-end QoS for the business-critical applications and VoIP services based on CoS marking. flexibility to offer services such as IPv6 and multicast without any reliance on the service… Read More »