300-320 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
Getting ready for the 300-320 certification? Our 300-320 Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day
Effective 300-320 exam prep free is the key to success. With our free practice questions, you can:
- Get familiar with exam format and question style
- Identify which topics you’ve mastered—and which need more review
- Boost your confidence and reduce exam anxiety
Below, you will find 50 realistic 300-320 Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.
Which two statements about 802.1X are true? (Choose two.)
A. It can allow and deny port access based on device identity.
B. It is a Cisco proprietary standard.
C. It works only with wired devices.
D. By default, it allows devices that lack 802.1 support.
E. It can allow and deny port access based on user identity.
You are designing a scalable cluster that contains a combination of Cisco APIC-M and APIC-L controllers. Which controller provides the scalability used in the cluster?
A. APIC-M
B. APIC-EM
C. combination of APIC-M and APIC -I
D. APIC-L
An organization is acquiring another company and merging the two company networks. No subnets overlap, but the engineer must limit the networks advertised to the new organization. Which feature implements this requirement?
A. route filtering
B. stub area
C. passive interface
D. interface ACL
Multicast has been enabled and configured in the Enterprise, and PIM Sparse-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?
A. Multicast boundary filter
B. PIM dense-mode
C. IGMP snooping
D. Dynamic ARP inspection
Which two technologies provide web and URL filtering and mitigate zero-day malware? (Choose two.)
A. Cisco CWS
B. Cisco WSA
C. Cisco GETVPN
D. Cisco ESA
E. NAT/PAT AB
An engineer is working on an OSPF network design and wants to minimize the failure detection time and the impact on the router CPU. Which technology accomplishes this goal?
A. fast hellos
B. BFD
C. LSA pacing
D. LSA delay interval
While designing a backup BGP solution, a network engineer wants to ensure that a single router with multiple connections prefers the routes from a specific connection over all others. Which BGP path selection attribute is considered first when selecting a route?
A. AS-LENGTH
B. MED
C. link bandwidth
D. WEIGHT
An engineer is implementing VXLAN to extend layer 2 traffic at three geographically diverse data centers. Which feature is required at each data center to extend this traffic?
A. VTEP
B. VRRP
C. VLSM
D. VPLS
While designing quality of service policies, which two types of traffic must be prioritized as management traffic? (Choose two.)
A. RADIUS
B. SSH
C. SCP
D. HTTPS
E. ICMP
An engineer notices that many BGP peers utilize the same configuration parameters. What can the engineer configure to simplify BGP neighbor statements and generate more efficient BGP peer updates?
A. peer groups
B. policy templates
C. session templates
D. peer address families
A network engineer must select a network technology to simplify the extension of Layer 2 networks between data centers with a requirement of less than 4,000 VLANs. Which two network technologies accomplish this requirement? (Choose two.)
A. MPLS
B. L2TP
C. VXLAN
D. LISP
Which technology can block interfaces and provide a loop-free topology?
A. STP
B. VSS
C. VLAN
D. vPC
An engineer must ensure Layer 2 extension capabilities over any transport infrastructure. Which interconnective data center functionality satisfies this requirement?
A. Private line
B. OTV
C. VPLS
D. EoMPLS
An OSPF router should have a maximum of how many adjacent neighbors?
A. 100
B. 80
C. 60
D. 50
An ISP is offering two MPLS circuits to an office when one of the links fails. Which routing feature provides the fastest possible convergence to the failover link?
A. BFD
B. UDLD
C. TTL
D. multipath A
A network engineer is designing a network that must incorporate active-active redundancy to eliminate disruption when a link failure occurs between the core and distribution layer. What two technologies will allow this? (Choose two.)
A. Equal Cost Multi-Path (ECMP)
B. Rapid Spanning Tree Protocol Plus (RSTP+)
C. Hot Standby Routing Protocol (HSRP)
D. Rapid Spanning Tree Protocol (RSTP)
E. Multichassis EtherChannel (MEC)
An engineer is designing a Layer 3-enabled access layer. Which design recommendation must the engineer consider when deploying EIGRP routing within the access layer?
A. Configure all edge access layer switches to use a stub routing feature.
B. Implement floating static routes on access switches for redundant links.
C. Use the First Hop Redundancy Protocol on access layer switches.
D. Enable multiple uplinks from each access switch stack to the distribution switches.
When designing data centers for multitenancy, which two benefits are provided by the implementation of VSANs and zoning? (Choose two.)
A. Zones provide the ability to create many logical SAN fabrics on a single Cisco MDS 9100 family switch.
B. VSANs have their own set of services and address space, which prevents an issue in one VSAN from affecting others.
C. VSANs and zones use separate fabrics.
D. Zones allow an administrator to control which initiators can see which targets.
E. VSAN provides a means of restricting visibility and connectivity among devices connected to a zone.
A network engineer must propose a scalable enterprise campus access-distribution design model. Which two scaling factors are the most important to be considered for the Virtual Switching System model? (Choose two.)
A. VSS stops VLAN spanning to the access switches.
B. Both VSS nodes are active from control-plane perspective.
C. STP must be implemented as a loop-avoidance mechanism.
D. VSS eliminates the need to implement FHRP for each VLAN.
E. STP root and FHRP primary must be tuned at the same node.
An engineer set up a multicast design using all three Cisco supported PIM modes. Which two characteristics of Bidirectional PIM in this situation are true? (Choose two.)
A. Membership to a bidirectional group is signaled via explicit join messages.
B. In Bidirectional PIM, the RP IP address can be shared with any other router interface.
C. Bidirectional PIM is designed to be used for one-to-many applications.
D. A Cisco router cannot support all three PIM modes simultaneously.
E. In Bidirectional PIM, the RP IP address does not need to be a router.
During an upgrade of an existing data center, a network team must design segmentation into existing networks. Due to legacy applications, the IP addresses cannot change. Which firewall deployment model meets these requirements?
A. Routed mode
B. Multicontext mode
C. Transparent mode
D. Cluster mode
Which Nexus feature enables you to support server connectivity with one topology and address requirement for both high availability and high bandwidth?
A. vPC
B. vPC+
C. Stackwise
D. EvPC
Which three authentication services are supported by Cisco NAC Appliance? (Choose three.)
A. RADIUS
B. LDAP
C. Kerberos
D. TACACS+
E. local
F. SNMP
An engineer has been requested to utilize a method in an ACI network that will ensure only permitted communications are transmitted between each End Point Group tier in a three tier application. Which element would be utilized to accomplish this within the fabric?
A. Filter
B. Contract
C. Label
D. Subject
Which two security measures must an engineer follow when implementing Layer 2 and Layer 3 network design? (Choose two.)
A. Utilize DHCP snooping on a per VLAN basis and apply ip dhcp snooping untrusted on all ports.
B. Utilize the native VLAN only on trunk ports to reduce the risk of a Double-Tagged 802.1q VLAN hopping attack.
C. Utilize an access list to prevent the use of ARP to modify entries to the table.
D. Utilize private VLANs and ensure that all ports are part of the isolated port group.
E. Utilize the ARP inspection feature to help prevent the misuse of gARP.
What added enforcement feature is available on IDS-based devices to terminate active malicious traffic?
A. Signature detection
B. SNMP alert
C. TCP reset
D. Layer 4 filtering
When designing a Data Center Interconnect solution, which two statements describe benefits of utilizing A-VPLS for Layer 2 extension? (Choose two.)
A. Redundancy is addressed without enabling Spanning Tree Protocol in the core.
B. The overlay of the Layer 2 connection on the Layer 3 transport hides any physical convergence.
C. Integrated Layer 3 technology responds upon failure.
D. A-VPLS utilizes the Cisco Catalyst 6500 Series VSS feature to provide native dual-homing.
E. A-VPLS provides flow-based load balancing over equal-cost multipath paths.
What is the maximum number of routers that each OSPF area (including the backbone) should contain?
A. 30
B. 10
C. 50
D. 100
An organization is acquiring another company and merging the two company networks. No subnets overlap, but the engineer must limit the networks advertised to the new organization. Which feature implements this requirement?
A. Stub area
B. Interface ACL
C. Route filtering
D. Passive interface
Which QoS mechanism uses RSVP?
A. IntServ
B. DiffServ
C. CoS
D. ToS
Which two protocols support simple plaintext and MD5 authentication? (Choose two.)
A. EIGRP
B. BGP
C. RIP
D. OSPF
E. IPv6
Which two features are from a scalable cluster design utilizing Cisco ASA firewalls? (Choose two.)
A. Each cluster supports up to 10 ASA devices.
B. Each member of the cluster can forward every traffic flow.
C. The ASA cluster actively load balances traffic flows.
D. The design supports up to 1 Terabyte of aggregate traffic.
E. The design supports up to 100 Gbps of aggregate traffic.
An organization is creating a detailed QoS plan that limits bandwidth to specific rates. Which three parameters can be configured when attempting to police traffic within the network? (Choose three.)
A. Violating
B. Committed information rate
C. Peak information rate
D. Shaping rate
E. Bursting
F. Conforming
G. Exceeding
An engineer has proposed the deployment of a Cisco ACI fabric solution to introduce automation and zero-touch operation experience to a DC network. Which type of virtualization technology is utilized by the Cisco ACI to encapsulate the traffic inside the fabric and to virtualize the physical infrastructure?
A. IPsec
B. NSX
C. STP
D. VXLAN
While designing a QoS policy for an organization, a network engineer is determining the method to limit the output rate of traffic within the real-time queue. How must the limiting of traffic within the real-time queue occur?
A. The traffic must be policed and not allowed to pass.
B. The traffic must be shaped to allow for it to be transmitted after the tokens have been replenished.
C. The traffic within the real-time queue must not be limited.
D. The traffic must be remarked to a lower priority to and allowed to pass.
Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.)
A. You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.
B. SSO and NSF each require the devices to either be graceful restart-capable or graceful restart- aware.
C. In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence times than single supervisors with tuned IGP timers
D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E. Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers
To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
Refer to the exhibit. Based on the configuration, why are routers R1 and R2 not exchanging OSPF routes?
A. The OSPF process numbers are different.
B. There is no backbone area configured.
C. The router IDs are different.
D. OSPF is not enabled on the interfaces.
An engineer is working on a design solution for a large hub-and-spoke EIGRP network. Which feature helps to make this design more stable while also reducing resource utilization?
A. QoS
B. network summarization
C. stub routing
D. route filtering C
A network engineer is designing an access layer that requires all uplinks to be active. Furthermore, VLANs must span across the entire switch block. What design fulfills this requirement?
A. Layer 2 looped triangle
B. Layer 2 looped square
C. Layer 2 loop-free U
D. Layer 2 loop-free inverted U
Management has chosen to implement a top-of-the-rack data center design. Which two benefits of moving to this model are true? (Choose two.)
A. easier per rack upgrades
B. fewer ports required in the aggregation
C. fewer switches to manage
D. directly connected racks in the row
E. decreased cabling costs AE
Which unique EIGRP feature allows for faster Layer 3 convergence?
A. fast EIGRP timers
B. feasible successors
C. hybrid routing protocol
D. Cisco proprietary protocol
Two companies want to merge their OSPF networks, but they run different OSPF domains. Which option must be created to accomplish this requirement?
A. OSPF virtual link to bridge the backboneareas of the two companies together
B. Area on the ASBR of each company with the same area ID to bridge the networks together
C. redistribute routes between domains
D. NSSA on the ASBR of each company
A network engineer designing an access layer that requires all uplinks to be active,Furthermore, VLANs must span accross the entire switch block.Which two design fulfill this requirement?
A. Layer 2 FlexLinks
B. Layer 2 loop-free inverted U
A company requires redundancy for its multihomed BGP external connections. What two features can be configured on the WAN routers to automate failover for both outbound and inbound traffic? (Choose two.)
A. AS path prepending
B. local preference
C. floating static route
D. HSRP
E. MED
F. weight
An engineer is attempting to improve OSPF network performance and discovers that the entire SPT recomputes whenever a type 1 or type 2 LSA is received within an area. Which action can optimize SPT operations?
A. Tune LSA throttling thresholds.
B. Enable incremental SPF.
C. Configure totally stubby areas throughout the domain.
D. Summarize networks on all ABRs.
Which virtulization technology uses Layer 3 BFD to detect network failure between entwork devices?
A. Cisco Fabricpath
Which option is correct when using VSS to combine two physical switches into one logical switch?
A. Both data planes forward traffic simultaneously.
B. Only one data plane forwards traffic, while the other data plane is on standby.
C. Both control planes forward traffic simultaneously.
D. Control planes are combined into one virtual control plane.
A network engineer must use an Internet connection to provide backup connectivity between two sites. The backup connection must be encrypted and support multicast. Which technology must be used?
A. GETVPN
B. IPsec direct encapsulation
C. DMVPN
D. GRE over IPsec
Access Full 300-320 Exam Prep Free
Want to go beyond these 50 questions? Click here to unlock a full set of 300-320 exam prep free questions covering every domain tested on the exam.
We continuously update our content to ensure you have the most current and effective prep materials.
Good luck with your 300-320 certification journey!