300-320 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence
Preparing for the 300-320 exam? Start with our 300-320 Practice Test Free – a set of 50 high-quality, exam-style questions crafted to help you assess your knowledge and improve your chances of passing on the first try.
Taking a 300-320 practice test free is one of the smartest ways to:
- Get familiar with the real exam format and question types
- Evaluate your strengths and spot knowledge gaps
- Gain the confidence you need to succeed on exam day
Below, you will find 50 free 300-320 practice questions to help you prepare for the exam. These questions are designed to reflect the real exam structure and difficulty level. You can click on each Question to explore the details.
Management has chosen to implement a top-of-the-rack data center design. Which two benefits of moving to this model are true? (Choose two.)
A. easier per rack upgrades
B. fewer ports required in the aggregation
C. fewer switches to manage
D. directly connected racks in the row
E. decreased cabling costs AE
Which action can be taken on a multiaccess segment with OSPF speakers to reduce the performance impact during widespread convergence events?
A. Separate the network into multiple areas for each new multiaccess segment.
B. Enable LSA throttling in the core to slow link state advertisement updates during times of network instability.
C. Ensure that the elected DR or BDR router can support high-volume convergence events.
D. Verify that fewer than 50 OSPF speakers are on the segment.
Which statement about the ToR design model is true?
A. It can shorten cable runs and simplify rack connectivity.
B. Each ToR switch must be individually managed.
C. Multiple ToR switches can be interconnected to provide a loop-free spanning-tree infrastructure.
D. It can connect servers that are located in separate racks.
The network engineering team is interested in deploying NAC within the enterprise network to enhance security. What deployment model should be used if the team requests that the NAC be logically inline with clients?
A. Layer 2 in-band
B. Layer 2 out-of-band
C. Layer 3 in-band
D. Layer 3 out-of-band
In which OSI layer does IS-IS operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Which Nexus feature enables you to support server connectivity with one topology and address requirement for both high availability and high bandwidth?
A. vPC
B. vPC+
C. Stackwise
D. EvPC
A network consultant must propose a scalable access-distribution model where an alternative to STP technology is used to prevent Layer 2 loops. The proposed model must include these features: ✑ VLANs that span across the access switches ✑ eliminate the need for a FHRP protocol ✑ multichassis Ethernet technology to provide fast convergence in case of link failure Which design model does the consultant propose?
A. multitier looped square access model
B. virtual switch model
C. multitier looped triangle access model
D. routed access model B
What is an advantage of using the vPC feature in a data center environment?
A. supports FHRP
B. The two switches form a single control plane
C. All available uplink bandwidth is utilized
D. A single IP is used for management of both devices
While designing a backup BGP solution, a network engineer wants to ensure that a single router with multiple connections prefers the routes from a specific connection over all others. Which BGP path selection attribute is considered first when selecting a route?
A. AS-LENGTH
B. MED
C. link bandwidth
D. WEIGHT
A network engineer is evaluating an architecture that utilizes VSS for the data center module. Which two advantages of using VSS technology are true? (Choose two.)
A. It removes the need to configure redundant switches with identical policies.
B. It removes the need for Hot Standby Router Protocol.
C. It adds arbitrary forwarding topologies on top of a fixed routed underlay topology.
D. Each switch has a separate control plane.
E. It is capable of supporting live migration of virtual machines as they move from one physical server to another. AB
An OSPF router should participate in maximum of how many areas?
A. 3
B. 2
C. 1
D. 4
How does OTV provide STP isolation?
A. by using STP root optimization
B. by using BPDU filtering
C. by dropping BPDU packets
D. by using BPDU guard C
To which network layer should Cisco Express Forwarding be tuned to support load balancing and to make more informed forwarding decisions?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
During the design of a new data center, a company requires that access switches be placed near servers without requiring a one-to-one ratio of switches to network racks. Which switch layout must be used?
A. end ofrow
B. top of rack
C. integrated
D. centralized
In what situation must spanning-tree be implemented?
A. when first hop redundancy protocol exists with redundant Layer 2 links between distribution switches
B. when a VLAN spans access layer switches to support business applications
C. when trunks need to extend multiple VLANs across access switches
D. when it is necessary to speed up network convergence in case of link failure
Which unique EIGRP feature allows for faster Layer 3 convergence?
A. fast EIGRP timers
B. feasible successors
C. hybrid routing protocol
D. Cisco proprietary protocol
Which description of how virtual MAC addresses are assigned to the members of a GLBP group is true?
A. Each device assigns its own address
B. The AVG assigns the addresses
C. The AVF assigns the addresses
D. The device that has the highest IP address assigns the addresses B
Which two protocols support simple plaintext and MD5 authentication? (Choose two.)
A. EIGRP
B. BGP
C. RIP
D. OSPF
E. IPv6
An organization is acquiring another company and merging the two company networks. No subnets overlap, but the engineer must limit the networks advertised to the new organization. Which feature implements this requirement?
A. route filtering
B. stub area
C. passive interface
D. interface ACL
An HSRP design requirement states that preemption must be enabled for the active switch, which is a Cisco 4507R. Assume a boot time of 300 seconds. Which setting of the preemption delay timer minimizes the loss of traffic?
A. 50 seconds
B. 100 seconds
C. 150 seconds
D. 200 seconds
An organization is using a link state routing protocol that is not dependent on IP addressing. Which action should be taken to enable routing across area boundaries in this environment?
A. Assign Level 1 router interfaces to different areas
B. Assign Level 2 routers to different areas
C. Assign Level 1 routers to different areas
D. Assign Level 2 router interfaces to different areas
E. Assign Level 2 router interfaceto the backbone area
F. Assign Level 1 router interface to the backbone area AE
Which option is correct when using VSS to combine two physical switches into one logical switch?
A. Both data planes forward traffic simultaneously.
B. Only one data plane forwards traffic, while the other data plane is on standby.
C. Both control planes forward traffic simultaneously.
D. Control planes are combined into one virtual control plane.
Which of the following two statements about Cisco NSF and SSO are the most relevant to the network designer? (Choose two.)
A. You can reduce outages to 1 to 3 seconds by using SSO in a Layer 2 environment or Cisco NSF with SSO in a Layer 3 environment.
B. SSO and NSF each require the devices to either be graceful restart-capable or graceful restart- aware.
C. In a fully redundant topology adding redundant supervisors with NSF and SSO may cause longer convergence times than single supervisors with tuned IGP timers
D. The primary deployment scenario for Cisco NSF with SSO is in the Distribution and Core layers.
E. Cisco NSF-aware neighbor relationships are independent of any tuned IGP timers
An engineer notices that many BGP peers utilize the same configuration parameters. What can the engineer configure to simplify BGP neighbor statements and generate more efficient BGP peer updates?
A. peer groups
B. policy templates
C. session templates
D. peer address families
What are the two main elements used by RBAC to provide secure access within an Enterprise? (Choose two.)
A. User privileges
B. User roles
C. User profile
D. User locales
E. User domains
When designing a Data Center Interconnect solution, which two statements describe benefits of utilizing A-VPLS for Layer 2 extension? (Choose two.)
A. Redundancy is addressed without enabling Spanning Tree Protocol in the core.
B. The overlay of the Layer 2 connection on the Layer 3 transport hides any physical convergence.
C. Integrated Layer 3 technology responds upon failure.
D. A-VPLS utilizes the Cisco Catalyst 6500 Series VSS feature to provide native dual-homing.
E. A-VPLS provides flow-based load balancing over equal-cost multipath paths.
Which two features are from a scalable cluster design utilizing Cisco ASA firewalls? (Choose two.)
A. Each cluster supports up to 10 ASA devices.
B. Each member of the cluster can forward every traffic flow.
C. The ASA cluster actively load balances traffic flows.
D. The design supports up to 1 Terabyte of aggregate traffic.
E. The design supports up to 100 Gbps of aggregate traffic.
Which virtualization technology uses Layer 3 BFD to detect network failures between network devices?
A. VTP
B. VSS
C. vPC
D. Cisco Fabric Path
Which three statements about 802.1X are true
A. it is IEEE standard
B. It works only with wired devices
C. It can allow and deny port access based on device identity
What added enforcement feature is available on IDS-based devices to terminate active malicious traffic?
A. Signature detection
B. SNMP alert
C. TCP reset
D. Layer 4 filtering
You are designing a scalable cluster that contains a combination of Cisco APIC-M and APIC-L controllers. Which controller provides the scalability used in the cluster?
A. APIC-M
B. APIC-EM
C. combination of APIC-M and APIC -I
D. APIC-L
Which two security measures must an engineer follow when implementing Layer 2 and Layer 3 network design? (Choose two.)
A. Utilize DHCP snooping on a per VLAN basis and apply ip dhcp snooping untrusted on all ports.
B. Utilize the native VLAN only on trunk ports to reduce the risk of a Double-Tagged 802.1q VLAN hopping attack.
C. Utilize an access list to prevent the use of ARP to modify entries to the table.
D. Utilize private VLANs and ensure that all ports are part of the isolated port group.
E. Utilize the ARP inspection feature to help prevent the misuse of gARP.
Which algorithm does IS-IS use to determine the shortest path through a network?
A. Bellman-Ford routing algorithm
B. Johnson’s algorithm
C. Dijkstra’s algorithm
D. Floyd-Warshall algorithm
During an upgrade of an existing data center, a network team must design segmentation into existing networks. Due to legacy applications, the IP addresses cannot change. Which firewall deployment model meets these requirements?
A. Routed mode
B. Multicontext mode
C. Transparent mode
D. Cluster mode
Refer to the exhibit. A customer discovers router R1 remains active even when the R1 uplink (F0/1) is down. Which two comments can be applied to R1 to allow R2 to take over as the HSRP active? (Choose two.)
A. standby 10 track 50 shutdown
B. standby 10 track 50 decrement 20
C. track 50 ip route 10.10.10.0/24 reachability
D. standby 10 track 50
E. track 50 interface Fa0/1 ip routing
Which technology guarantees loop free network and does not contain the state "listening"?
A. RPVST+
B. STP
C. VSS
An engineer is implementing VXLAN to extend layer 2 traffic at three geographically diverse data centers. Which feature is required at each data center to extend this traffic?
A. VTEP
B. VRRP
C. VLSM
D. VPLS
Two companies want to merge their OSPF networks, but they run different OSPF domains. Which option must be created to accomplish this requirement?
A. OSPF virtual link to bridge the backboneareas of the two companies together
B. Area on the ASBR of each company with the same area ID to bridge the networks together
C. redistribute routes between domains
D. NSSA on the ASBR of each company
An engineer wants to ensure that common services communicate to several applications in various EPGs. Which two features within Cisco ACI accomplish this goal? (Choose two.)
A. filter
B. contract
C. application profile
D. bridge domain
E. tenant
A network engineer must propose a scalable enterprise campus access-distribution design model. Which two scaling factors are the most important to be considered for the Virtual Switching System model? (Choose two.)
A. VSS stops VLAN spanning to the access switches.
B. Both VSS nodes are active from control-plane perspective.
C. STP must be implemented as a loop-avoidance mechanism.
D. VSS eliminates the need to implement FHRP for each VLAN.
E. STP root and FHRP primary must be tuned at the same node.
What is the maximum number of routers that each OSPF area (including the backbone) should contain?
A. 30
B. 10
C. 50
D. 100
Refer to the exhibit.An engineering team is analyzing the WAN connection for a site that has a 50 Mbps Ethernet circuit. Which technology should be used to keep the router from overrunning the carriers 50 Mbps rate?
A. Access Control List
B. Shaping
C. Policing
D. Rate-Limit
A customer has several remote sites connected with the HQ via microwave links. An engineer has been asked to propose a backup WAN connectivity for these sites with these requirements: ✑ Physical WAN connectivity is not available for most of these sites. ✑ A low-cost and fast-to-implement backup solution must be deployed. ✑ Bandwidth needs for the backup link are low. ✑ Users can tolerate a WAN outage of up to 2 hours. Which backup WAN link type does the engineer recommend?
A. LTE
B. 802.16 WiMAX
C. laser link
D. 802.15.1 Bluetooth
Which virtulization technology uses Layer 3 BFD to detect network failure between entwork devices?
A. Cisco Fabricpath
Which of the following is true concerning best design practices at the switched Access layer of the traditional layer2 Enterprise Campus Network?
A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access layer
B. Provide host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections from Access switches to redundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information from the Access to the Distribution layer
While designing quality of service policies, which two types of traffic must be prioritized as management traffic? (Choose two.)
A. RADIUS
B. SSH
C. SCP
D. HTTPS
E. ICMP
Summary address blocks can be used to support which network application?
A. QoS
B. IPsec tunneling
C. Cisco TrustSec
D. NAT
E. DiffServ
An engineer set up a multicast design using all three Cisco supported PIM modes. Which two characteristics of Bidirectional PIM in this situation are true? (Choose two.)
A. Membership to a bidirectional group is signaled via explicit join messages.
B. In Bidirectional PIM, the RP IP address can be shared with any other router interface.
C. Bidirectional PIM is designed to be used for one-to-many applications.
D. A Cisco router cannot support all three PIM modes simultaneously.
E. In Bidirectional PIM, the RP IP address does not need to be a router.
An enterprise EIGRP network has been growing rapidly. After several recent outages, the network must be redesigned to facilitate further growth and address scalability concerns. Which two actions must be performed to accomplish this redesign? (Choose two.)
A. Replace the routers with newer models.
B. Increase bandwidth capacity between the peers.
C. Break down routing domain into multiple autonomous systems
D. Implement route summarization
E. Utilize authentication between the peers. AD
EIGRP uses which algorithm to build a routing table?
A. Dijkstra’s algorithm
B. Floyd-Warshall algorithm
C. Diffusing Update Algorithm
D. Johnson’s algorithm
Free Access Full 300-320 Practice Test Free Questions
If you’re looking for more 300-320 practice test free questions, click here to access the full 300-320 practice test.
We regularly update this page with new practice questions, so be sure to check back frequently.
Good luck with your 300-320 certification journey!