Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Free IT Exam Dumps

300-320 Dump Free

Table of Contents

Toggle
  • 300-320 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.
  • Access Full 300-320 Dump Free

300-320 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.

Looking for a reliable way to prepare for your 300-320 certification? Our 300-320 Dump Free includes 50 exam-style practice questions designed to reflect real test scenarios—helping you study smarter and pass with confidence.

Using an 300-320 dump free set of questions can give you an edge in your exam prep by helping you:

  • Understand the format and types of questions you’ll face
  • Pinpoint weak areas and focus your study efforts
  • Boost your confidence with realistic question practice

Below, you will find 50 free questions from our 300-320 Dump Free collection. These cover key topics and are structured to simulate the difficulty level of the real exam, making them a valuable tool for review or final prep.

Question 1

What is the maximum number of routers that each OSPF area (including the backbone) should contain?

A. 30

B. 10

C. 50

D. 100

 


Suggested Answer: C

 

Question 2

Refer to the exhibit.
 Image
An engineering team is analyzing the WAN connection for a site that has a 50 Mbps Ethernet circuit. Which technology should be used to keep the router from overrunning the carriers 50 Mbps rate?

A. Access Control List

B. Shaping

C. Policing

D. Rate-Limit

 


Suggested Answer: B

 

Question 3

An engineer is designing a Layer 3-enabled access layer.
Which design recommendation must the engineer consider when deploying EIGRP routing within the access layer?

A. Configure all edge access layer switches to use a stub routing feature.

B. Implement floating static routes on access switches for redundant links.

C. Use the First Hop Redundancy Protocol on access layer switches.

D. Enable multiple uplinks from each access switch stack to the distribution switches.

 


Suggested Answer: D

 

Question 4

Image
Refer to the exhibit. Based on the configuration, why are routers R1 and R2 not exchanging OSPF routes?

A. The OSPF process numbers are different.

B. There is no backbone area configured.

C. The router IDs are different.

D. OSPF is not enabled on the interfaces.

 


Suggested Answer: B

 

Question 5

An organization is acquiring another company and merging the two company networks. No subnets overlap, but the engineer must limit the networks advertised to the new organization. Which feature implements this requirement?

A. route filtering

B. stub area

C. passive interface

D. interface ACL

 


Suggested Answer: A

 

Question 6

An engineer is designing a multitenant network that requires separate management access and must share a single physical firewall.
Which two features support this design? (Choose two.)

A. multicast routing

B. dynamic routing protocols

C. site-to-site VPN

D. quality of service

E. threat detection

F. unified communications

 


Suggested Answer: BC

 

Question 7

Which technology can block interfaces and provide a loop-free topology?

A. STP

B. VSS

C. VLAN

D. vPC

 


Suggested Answer: A

 

Question 8

Summary address blocks can be used to support which network application?

A. QoS

B. IPsec tunneling

C. Cisco TrustSec

D. NAT

E. DiffServ

 


Suggested Answer: D

 

Question 9

An engineer is redesigning the infrastructure for a campus environment. The engineer must maximize the use of the links between the core and distribution layers.
By which two methods can this usage be maximized? (Choose two.)

A. Design with multiple unequal-cost links between the core and distribution layers.

B. Design the links between the core and distribution layers to use an IGP.

C. Design with multiple equal-cost links between the core and distribution layers.

D. Design the links between the core and distribution layers to use HSRP.

E. Design the links between the core and distribution layers to use RPVSTP+.

 


Suggested Answer: BC

 

Question 10

An engineer is attempting to improve OSPF network performance and discovers that the entire SPT recomputes whenever a type 1 or type 2 LSA is received within an area.
Which action can optimize SPT operations?

A. Tune LSA throttling thresholds.

B. Enable incremental SPF.

C. Configure totally stubby areas throughout the domain.

D. Summarize networks on all ABRs.

 


Suggested Answer: B

 

Question 11

An engineer must ensure Layer 2 extension capabilities over any transport infrastructure. Which interconnective data center functionality satisfies this requirement?

A. Private line

B. OTV

C. VPLS

D. EoMPLS

 


Suggested Answer: B

 

Question 12

Which virtulization technology uses Layer 3 BFD to detect network failure between entwork devices?

A. Cisco Fabricpath

 


Suggested Answer: A

 

Question 13

A network engineer must use an Internet connection to provide backup connectivity between two sites. The backup connection must be encrypted and support multicast.
Which technology must be used?

A. GETVPN

B. IPsec direct encapsulation

C. DMVPN

D. GRE over IPsec

 


Suggested Answer: A

 

Question 14

Which two design concerns must be addressed when designing a multicast implementation? (Choose two.)

A. only the low-order 23 bits of the MAC address are used to map IP addresses

B. only the low-order 24 bits of the MAC address are used to map IP addresses

C. only the high-order 23 bits of the MAC address are used to map IP addresses

D. only the low-order 23 bits of the IP address are used to map MAC addresses

E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses

F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

 


Suggested Answer: AF

 

Question 15

What is an advantage of using the vPC feature in a data center environment?

A. VSS is a requirement.

B. Multiple instances of control plane are formed.

C. The control plane and management plane remain separate.

D. Cisco FabricPath technology does not have to be configured.

 


Suggested Answer: C

 

Question 16

To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

E. Layer 5

F. Layer 6

G. Layer 7

 


Suggested Answer: D

 

Question 17

While troubleshooting an Application Centric network cluster, an engineer sees that an APIC has gone offline.
What is the minimum number of APICs required for a production ACI fabric to continue to operate?

A. 1

B. 2

C. 3

D. 4

 


Suggested Answer: C

 

Question 18

Which option is correct when using Virtual Switching System to combine two physical switches into one logical switch?

A. Both control planes forward traffic simultaneously.

B. Only one control plane is active, while the other control plane is in standby.

C. Only one data plane forwards traffic, while the other data plane is in standby.

D. Control planes are combined into one virtual control plane.

 


Suggested Answer: D

 

Question 19

Multicast has been enabled and configured in the Enterprise, and PIM Sparse-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?

A. Multicast boundary filter

B. PIM dense-mode

C. IGMP snooping

D. Dynamic ARP inspection

 


Suggested Answer: C

 

Question 20

Which two protocols support simple plaintext and MD5 authentication? (Choose two.)

A. EIGRP

B. BGP

C. RIP

D. OSPF

E. IPv6

 


Suggested Answer: AD

 

Question 21

A customer has several remote sites connected with the HQ via microwave links. An engineer has been asked to propose a backup WAN connectivity for these sites with these requirements:
✑ Physical WAN connectivity is not available for most of these sites.
✑ A low-cost and fast-to-implement backup solution must be deployed.
✑ Bandwidth needs for the backup link are low.
✑ Users can tolerate a WAN outage of up to 2 hours.
Which backup WAN link type does the engineer recommend?

A. LTE

B. 802.16 WiMAX

C. laser link

D. 802.15.1 Bluetooth

 


Suggested Answer: A

 

Question 22

When a site has Internet connectivity with two different ISP’s, which two strategies are recommended to avoid becoming a BGP transit site? (Choose two.)

A. Advertise all routes to both ISPs.

B. Filter routes outbound to the ISPs.

C. Accept all inbound routes from the ISPs.

D. Filter routes inbound from the ISPs.

E. Use a single service provider.

 


Suggested Answer: BD

 

Question 23

An engineer is working on an OSPF network design and wants to minimize the failure detection time and the impact on the router CPU. Which technology accomplishes this goal?

A. fast hellos

B. BFD

C. LSA pacing

D. LSA delay interval

 


Suggested Answer: C

 

Question 24

A company requires a simple network access control solution that allows for software defined segmentation based on user and device contextual information.
Which two technologies must be implemented to meet these requirements? (Choose two.)

A. Clean Access

B. Identity Service Engine

C. TrustSec

D. Secure Access Control System

E. NAC Agent

 


Suggested Answer: BC

References:

Question 25

The network engineering team is interested in deploying NAC within the enterprise network to enhance security. What deployment model should be used if the team requests that the NAC be logically inline with clients?

A. Layer 2 in-band

B. Layer 2 out-of-band

C. Layer 3 in-band

D. Layer 3 out-of-band

 


Suggested Answer: B

 

Question 26

In what situation must spanning-tree be implemented?

A. when fast convergence is required for link failures

B. when redundant Layer 2 links, that are not part of a single EtherChannel or bundle, exist between distribution switches

C. when trunks need to extend multiple VLANs across access switches

D. when a VLAN spans access layer switches

 


Suggested Answer: B

 

Question 27

A company requires redundancy for its multihomed BGP external connections. What two features can be configured on the WAN routers to automate failover for both outbound and inbound traffic? (Choose two.)

A. AS path prepending

B. local preference

C. floating static route

D. HSRP

E. MED

F. weight

 


Suggested Answer: AD

 

Question 28

Which routing protocol provides the fastest convergence and greatest flexibility within a campus environment?

A. OSPF

B. IS-IS

C. BGP

D. EIGRP

 


Suggested Answer: D

 

Question 29

An engineer wants to ensure that common services communicate to several applications in various EPGs. Which two features within Cisco ACI accomplish this goal? (Choose two.)

A. filter

B. contract

C. application profile

D. bridge domain

E. tenant

 


Suggested Answer: BC

 

Question 30

An engineer wants to assure that hosts can locate routers that can be used as a gateway to reach IP-based devices on other networks. Which first hop redundancy protocol accomplishes this goal?

A. VRRP

B. IRDP

C. HSRP

D. GSLB

 


Suggested Answer: B

Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-irdp.html

Question 31

Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.)

A. You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.

B. SSO and NSF each require the devices to either be graceful restart-capable or graceful restart- aware.

C. In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence times than single supervisors with tuned IGP timers

D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.

E. Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers

 


Suggested Answer: AC

 

Question 32

Two companies want to merge their OSPF networks, but they run different OSPF domains. Which option must be created to accomplish this requirement?

A. OSPF virtual link to bridge the backboneareas of the two companies together

B. Area on the ASBR of each company with the same area ID to bridge the networks together

C. redistribute routes between domains

D. NSSA on the ASBR of each company

 


Suggested Answer: C

 

Question 33

A network engineer is designing an access layer that requires all uplinks to be active. Furthermore, VLANs must span across the entire switch block. What design fulfills this requirement?

A. Layer 2 looped triangle

B. Layer 2 looped square

C. Layer 2 loop-free U

D. Layer 2 loop-free inverted U

 


Suggested Answer: D

 

Question 34

A company has a regulatory requirement that all connections between their sites must be encrypted in a manner that does not require maintenance of permanent tunnels. The remote offices are connected by a private MPLS-based service that requires a dynamically changing key, spoke-to-spoke communication, and reuse of the existing IP header. Which type of transport encryption must be used?

A. GRE VPN

B. DMVPN

C. GETVPN

D. standard IPsec VPN

 


Suggested Answer: B

 

Question 35

An engineer has implemented a QoS architecture that requires a signaling protocol to tell routers which flows of packets require special treatment.
Which two mechanisms are important building blocks to establishing and maintaining QoS in this architecture? (Choose two.)

A. policing

B. classification

C. admission control

D. tagging

E. low-latency queuing

F. resource reservation

G. packetscheduling

 


Suggested Answer: BF

 

Question 36

While designing a QoS policy for an organization, a network engineer is determining the method to limit the output rate of traffic within the real-time queue. How must the limiting of traffic within the real-time queue occur?

A. The traffic must be policed and not allowed to pass.

B. The traffic must be shaped to allow for it to be transmitted after the tokens have been replenished.

C. The traffic within the real-time queue must not be limited.

D. The traffic must be remarked to a lower priority to and allowed to pass.

 


Suggested Answer: B

 

Question 37

An organization is using a link state routing protocol that is not dependent on IP addressing. Which action should be taken to enable routing across area boundaries in this environment?

A. Assign Level 1 router interfaces to different areas

B. Assign Level 2 routers to different areas

C. Assign Level 1 routers to different areas

D. Assign Level 2 router interfaces to different areas

E. Assign Level 2 router interfaceto the backbone area

F. Assign Level 1 router interface to the backbone area AE

 


Suggested Answer: Explanation

 

Question 38

What is the maximum number of neighbors that a router should have in an OSPF area?

A. 5

B. 30

C. 60

D. 99

 


Suggested Answer: C

 

Question 39

In which OSI layer does IS-IS operate?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

 


Suggested Answer: C

 

Question 40

Which algorithm does IS-IS use to determine the shortest path through a network?

A. Bellman-Ford routing algorithm

B. Johnson’s algorithm

C. Dijkstra’s algorithm

D. Floyd-Warshall algorithm

 


Suggested Answer: C

 

Question 41

An engineer notices that many BGP peers utilize the same configuration parameters. What can the engineer configure to simplify BGP neighbor statements and generate more efficient BGP peer updates?

A. peer groups

B. policy templates

C. session templates

D. peer address families

 


Suggested Answer: A

 

Question 42

From a design perspective which two of the following OSPF statements are most relevant? (Choose two)

A. OSPF stub areas can be thought of as a simple form of summarization

B. OSPF cannot filter intra-area routes

C. An ABR can only exist in two areas – the backbone and one adjacent area

D. Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area

E. The size of an area (the LSDB) will be constrained by the size of the IP MTU

 


Suggested Answer: AB

 

Question 43

Which option is correct when using VSS to combine two physical switches into one logical switch?

A. Both data planes forward traffic simultaneously.

B. Only one data plane forwards traffic, while the other data plane is on standby.

C. Both control planes forward traffic simultaneously.

D. Control planes are combined into one virtual control plane.

 


Suggested Answer: D

 

Question 44

WHich option is correct when using Virtual Switching System

A. Both control planes forward traffic simultaneously

 


Suggested Answer: A

 

Question 45

What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?

A. denies the client network resource access

B. repairs the effected devices

C. generates a Syslog message

D. permits the client but limits to guest access

 


Suggested Answer: B

 

Question 46

Refer to the exhibit. A customer discovers router R1 remains active even when the R1 uplink (F0/1) is down. Which two comments can be applied to R1 to allow
R2 to take over as the HSRP active? (Choose two.)
 Image

A. standby 10 track 50 shutdown

B. standby 10 track 50 decrement 20

C. track 50 ip route 10.10.10.0/24 reachability

D. standby 10 track 50

E. track 50 interface Fa0/1 ip routing

 


Suggested Answer: DE

 

Question 47

When designing a Data Center Interconnect solution, which two statements describe benefits of utilizing A-VPLS for Layer 2 extension? (Choose two.)

A. Redundancy is addressed without enabling Spanning Tree Protocol in the core.

B. The overlay of the Layer 2 connection on the Layer 3 transport hides any physical convergence.

C. Integrated Layer 3 technology responds upon failure.

D. A-VPLS utilizes the Cisco Catalyst 6500 Series VSS feature to provide native dual-homing.

E. A-VPLS provides flow-based load balancing over equal-cost multipath paths.

 


Suggested Answer: DE

Reference:
http://www.voidcn.com/article/p-ufkdbtov-bem.html

Question 48

During an upgrade of an existing data center, a network team must design segmentation into existing networks. Due to legacy applications, the IP addresses cannot change. Which firewall deployment model meets these requirements?

A. Routed mode

B. Multicontext mode

C. Transparent mode

D. Cluster mode

 


Suggested Answer: B

 

Question 49

An engineer is working on a design solution for a large hub-and-spoke EIGRP network. Which feature helps to make this design more stable while also reducing resource utilization?

A. QoS

B. network summarization

C. stub routing

D. route filtering C

 


Suggested Answer: Explanation

Reference:
https://www.cisco.com/en/US/technologies/tk648/tk365/technologies_white_paper0900aecd8023df6f.html

Question 50

What added enforcement feature is available on IDS-based devices to terminate active malicious traffic?

A. Signature detection

B. SNMP alert

C. TCP reset

D. Layer 4 filtering

 


Suggested Answer: A

 

Access Full 300-320 Dump Free

Looking for even more practice questions? Click here to access the complete 300-320 Dump Free collection, offering hundreds of questions across all exam objectives.

We regularly update our content to ensure accuracy and relevance—so be sure to check back for new material.

Begin your certification journey today with our 300-320 dump free questions — and get one step closer to exam success!

Share18Tweet11
Previous Post

300-160 Dump Free

Next Post

300-410 Dump Free

Next Post

300-410 Dump Free

300-415 Dump Free

300-420 Dump Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.