300-320 Dump Free – 50 Practice Questions to Sharpen Your Exam Readiness.
Looking for a reliable way to prepare for your 300-320 certification? Our 300-320 Dump Free includes 50 exam-style practice questions designed to reflect real test scenarios—helping you study smarter and pass with confidence.
Using an 300-320 dump free set of questions can give you an edge in your exam prep by helping you:
- Understand the format and types of questions you’ll face
- Pinpoint weak areas and focus your study efforts
- Boost your confidence with realistic question practice
Below, you will find 50 free questions from our 300-320 Dump Free collection. These cover key topics and are structured to simulate the difficulty level of the real exam, making them a valuable tool for review or final prep.
What is the maximum number of routers that each OSPF area (including the backbone) should contain?
A. 30
B. 10
C. 50
D. 100
Refer to the exhibit.An engineering team is analyzing the WAN connection for a site that has a 50 Mbps Ethernet circuit. Which technology should be used to keep the router from overrunning the carriers 50 Mbps rate?
A. Access Control List
B. Shaping
C. Policing
D. Rate-Limit
An engineer is designing a Layer 3-enabled access layer. Which design recommendation must the engineer consider when deploying EIGRP routing within the access layer?
A. Configure all edge access layer switches to use a stub routing feature.
B. Implement floating static routes on access switches for redundant links.
C. Use the First Hop Redundancy Protocol on access layer switches.
D. Enable multiple uplinks from each access switch stack to the distribution switches.
Refer to the exhibit. Based on the configuration, why are routers R1 and R2 not exchanging OSPF routes?
A. The OSPF process numbers are different.
B. There is no backbone area configured.
C. The router IDs are different.
D. OSPF is not enabled on the interfaces.
An organization is acquiring another company and merging the two company networks. No subnets overlap, but the engineer must limit the networks advertised to the new organization. Which feature implements this requirement?
A. route filtering
B. stub area
C. passive interface
D. interface ACL
An engineer is designing a multitenant network that requires separate management access and must share a single physical firewall. Which two features support this design? (Choose two.)
A. multicast routing
B. dynamic routing protocols
C. site-to-site VPN
D. quality of service
E. threat detection
F. unified communications
Which technology can block interfaces and provide a loop-free topology?
A. STP
B. VSS
C. VLAN
D. vPC
Summary address blocks can be used to support which network application?
A. QoS
B. IPsec tunneling
C. Cisco TrustSec
D. NAT
E. DiffServ
An engineer is redesigning the infrastructure for a campus environment. The engineer must maximize the use of the links between the core and distribution layers. By which two methods can this usage be maximized? (Choose two.)
A. Design with multiple unequal-cost links between the core and distribution layers.
B. Design the links between the core and distribution layers to use an IGP.
C. Design with multiple equal-cost links between the core and distribution layers.
D. Design the links between the core and distribution layers to use HSRP.
E. Design the links between the core and distribution layers to use RPVSTP+.
An engineer is attempting to improve OSPF network performance and discovers that the entire SPT recomputes whenever a type 1 or type 2 LSA is received within an area. Which action can optimize SPT operations?
A. Tune LSA throttling thresholds.
B. Enable incremental SPF.
C. Configure totally stubby areas throughout the domain.
D. Summarize networks on all ABRs.
An engineer must ensure Layer 2 extension capabilities over any transport infrastructure. Which interconnective data center functionality satisfies this requirement?
A. Private line
B. OTV
C. VPLS
D. EoMPLS
Which virtulization technology uses Layer 3 BFD to detect network failure between entwork devices?
A. Cisco Fabricpath
A network engineer must use an Internet connection to provide backup connectivity between two sites. The backup connection must be encrypted and support multicast. Which technology must be used?
A. GETVPN
B. IPsec direct encapsulation
C. DMVPN
D. GRE over IPsec
Which two design concerns must be addressed when designing a multicast implementation? (Choose two.)
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
What is an advantage of using the vPC feature in a data center environment?
A. VSS is a requirement.
B. Multiple instances of control plane are formed.
C. The control plane and management plane remain separate.
D. Cisco FabricPath technology does not have to be configured.
To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
While troubleshooting an Application Centric network cluster, an engineer sees that an APIC has gone offline. What is the minimum number of APICs required for a production ACI fabric to continue to operate?
A. 1
B. 2
C. 3
D. 4
Which option is correct when using Virtual Switching System to combine two physical switches into one logical switch?
A. Both control planes forward traffic simultaneously.
B. Only one control plane is active, while the other control plane is in standby.
C. Only one data plane forwards traffic, while the other data plane is in standby.
D. Control planes are combined into one virtual control plane.
Multicast has been enabled and configured in the Enterprise, and PIM Sparse-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?
A. Multicast boundary filter
B. PIM dense-mode
C. IGMP snooping
D. Dynamic ARP inspection
Which two protocols support simple plaintext and MD5 authentication? (Choose two.)
A. EIGRP
B. BGP
C. RIP
D. OSPF
E. IPv6
A customer has several remote sites connected with the HQ via microwave links. An engineer has been asked to propose a backup WAN connectivity for these sites with these requirements: ✑ Physical WAN connectivity is not available for most of these sites. ✑ A low-cost and fast-to-implement backup solution must be deployed. ✑ Bandwidth needs for the backup link are low. ✑ Users can tolerate a WAN outage of up to 2 hours. Which backup WAN link type does the engineer recommend?
A. LTE
B. 802.16 WiMAX
C. laser link
D. 802.15.1 Bluetooth
When a site has Internet connectivity with two different ISP’s, which two strategies are recommended to avoid becoming a BGP transit site? (Choose two.)
A. Advertise all routes to both ISPs.
B. Filter routes outbound to the ISPs.
C. Accept all inbound routes from the ISPs.
D. Filter routes inbound from the ISPs.
E. Use a single service provider.
An engineer is working on an OSPF network design and wants to minimize the failure detection time and the impact on the router CPU. Which technology accomplishes this goal?
A. fast hellos
B. BFD
C. LSA pacing
D. LSA delay interval
A company requires a simple network access control solution that allows for software defined segmentation based on user and device contextual information. Which two technologies must be implemented to meet these requirements? (Choose two.)
A. Clean Access
B. Identity Service Engine
C. TrustSec
D. Secure Access Control System
E. NAC Agent
The network engineering team is interested in deploying NAC within the enterprise network to enhance security. What deployment model should be used if the team requests that the NAC be logically inline with clients?
A. Layer 2 in-band
B. Layer 2 out-of-band
C. Layer 3 in-band
D. Layer 3 out-of-band
In what situation must spanning-tree be implemented?
A. when fast convergence is required for link failures
B. when redundant Layer 2 links, that are not part of a single EtherChannel or bundle, exist between distribution switches
C. when trunks need to extend multiple VLANs across access switches
D. when a VLAN spans access layer switches
A company requires redundancy for its multihomed BGP external connections. What two features can be configured on the WAN routers to automate failover for both outbound and inbound traffic? (Choose two.)
A. AS path prepending
B. local preference
C. floating static route
D. HSRP
E. MED
F. weight
Which routing protocol provides the fastest convergence and greatest flexibility within a campus environment?
A. OSPF
B. IS-IS
C. BGP
D. EIGRP
An engineer wants to ensure that common services communicate to several applications in various EPGs. Which two features within Cisco ACI accomplish this goal? (Choose two.)
A. filter
B. contract
C. application profile
D. bridge domain
E. tenant
An engineer wants to assure that hosts can locate routers that can be used as a gateway to reach IP-based devices on other networks. Which first hop redundancy protocol accomplishes this goal?
A. VRRP
B. IRDP
C. HSRP
D. GSLB
Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.)
A. You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.
B. SSO and NSF each require the devices to either be graceful restart-capable or graceful restart- aware.
C. In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence times than single supervisors with tuned IGP timers
D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E. Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers
Two companies want to merge their OSPF networks, but they run different OSPF domains. Which option must be created to accomplish this requirement?
A. OSPF virtual link to bridge the backboneareas of the two companies together
B. Area on the ASBR of each company with the same area ID to bridge the networks together
C. redistribute routes between domains
D. NSSA on the ASBR of each company
A network engineer is designing an access layer that requires all uplinks to be active. Furthermore, VLANs must span across the entire switch block. What design fulfills this requirement?
A. Layer 2 looped triangle
B. Layer 2 looped square
C. Layer 2 loop-free U
D. Layer 2 loop-free inverted U
A company has a regulatory requirement that all connections between their sites must be encrypted in a manner that does not require maintenance of permanent tunnels. The remote offices are connected by a private MPLS-based service that requires a dynamically changing key, spoke-to-spoke communication, and reuse of the existing IP header. Which type of transport encryption must be used?
A. GRE VPN
B. DMVPN
C. GETVPN
D. standard IPsec VPN
An engineer has implemented a QoS architecture that requires a signaling protocol to tell routers which flows of packets require special treatment. Which two mechanisms are important building blocks to establishing and maintaining QoS in this architecture? (Choose two.)
A. policing
B. classification
C. admission control
D. tagging
E. low-latency queuing
F. resource reservation
G. packetscheduling
While designing a QoS policy for an organization, a network engineer is determining the method to limit the output rate of traffic within the real-time queue. How must the limiting of traffic within the real-time queue occur?
A. The traffic must be policed and not allowed to pass.
B. The traffic must be shaped to allow for it to be transmitted after the tokens have been replenished.
C. The traffic within the real-time queue must not be limited.
D. The traffic must be remarked to a lower priority to and allowed to pass.
An organization is using a link state routing protocol that is not dependent on IP addressing. Which action should be taken to enable routing across area boundaries in this environment?
A. Assign Level 1 router interfaces to different areas
B. Assign Level 2 routers to different areas
C. Assign Level 1 routers to different areas
D. Assign Level 2 router interfaces to different areas
E. Assign Level 2 router interfaceto the backbone area
F. Assign Level 1 router interface to the backbone area AE
What is the maximum number of neighbors that a router should have in an OSPF area?
A. 5
B. 30
C. 60
D. 99
In which OSI layer does IS-IS operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Which algorithm does IS-IS use to determine the shortest path through a network?
A. Bellman-Ford routing algorithm
B. Johnson’s algorithm
C. Dijkstra’s algorithm
D. Floyd-Warshall algorithm
An engineer notices that many BGP peers utilize the same configuration parameters. What can the engineer configure to simplify BGP neighbor statements and generate more efficient BGP peer updates?
A. peer groups
B. policy templates
C. session templates
D. peer address families
From a design perspective which two of the following OSPF statements are most relevant? (Choose two)
A. OSPF stub areas can be thought of as a simple form of summarization
B. OSPF cannot filter intra-area routes
C. An ABR can only exist in two areas – the backbone and one adjacent area
D. Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area
E. The size of an area (the LSDB) will be constrained by the size of the IP MTU
Which option is correct when using VSS to combine two physical switches into one logical switch?
A. Both data planes forward traffic simultaneously.
B. Only one data plane forwards traffic, while the other data plane is on standby.
C. Both control planes forward traffic simultaneously.
D. Control planes are combined into one virtual control plane.
WHich option is correct when using Virtual Switching System
A. Both control planes forward traffic simultaneously
What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?
A. denies the client network resource access
B. repairs the effected devices
C. generates a Syslog message
D. permits the client but limits to guest access
Refer to the exhibit. A customer discovers router R1 remains active even when the R1 uplink (F0/1) is down. Which two comments can be applied to R1 to allow R2 to take over as the HSRP active? (Choose two.)
A. standby 10 track 50 shutdown
B. standby 10 track 50 decrement 20
C. track 50 ip route 10.10.10.0/24 reachability
D. standby 10 track 50
E. track 50 interface Fa0/1 ip routing
When designing a Data Center Interconnect solution, which two statements describe benefits of utilizing A-VPLS for Layer 2 extension? (Choose two.)
A. Redundancy is addressed without enabling Spanning Tree Protocol in the core.
B. The overlay of the Layer 2 connection on the Layer 3 transport hides any physical convergence.
C. Integrated Layer 3 technology responds upon failure.
D. A-VPLS utilizes the Cisco Catalyst 6500 Series VSS feature to provide native dual-homing.
E. A-VPLS provides flow-based load balancing over equal-cost multipath paths.
During an upgrade of an existing data center, a network team must design segmentation into existing networks. Due to legacy applications, the IP addresses cannot change. Which firewall deployment model meets these requirements?
A. Routed mode
B. Multicontext mode
C. Transparent mode
D. Cluster mode
An engineer is working on a design solution for a large hub-and-spoke EIGRP network. Which feature helps to make this design more stable while also reducing resource utilization?
A. QoS
B. network summarization
C. stub routing
D. route filtering C
What added enforcement feature is available on IDS-based devices to terminate active malicious traffic?
A. Signature detection
B. SNMP alert
C. TCP reset
D. Layer 4 filtering
Access Full 300-320 Dump Free
Looking for even more practice questions? Click here to access the complete 300-320 Dump Free collection, offering hundreds of questions across all exam objectives.
We regularly update our content to ensure accuracy and relevance—so be sure to check back for new material.
Begin your certification journey today with our 300-320 dump free questions — and get one step closer to exam success!