300-320 Practice Exam Free – 50 Questions to Simulate the Real Exam
Are you getting ready for the 300-320 certification? Take your preparation to the next level with our 300-320 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.
Using a 300-320 practice exam free is one of the best ways to:
- Experience the format and difficulty of the real exam
- Identify your strengths and focus on weak areas
- Improve your test-taking speed and accuracy
Below, you will find 50 realistic 300-320 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.
An OSPF router should participate in maximum of how many areas?
A. 3
B. 2
C. 1
D. 4
Which two protocols support simple plaintext and MD5 authentication? (Choose two.)
A. EIGRP
B. BGP
C. RIP
D. OSPF
E. IPv6
An organization is creating a detailed QoS plan that limits bandwidth to specific rates. Which three parameters can be configured when attempting to police traffic within the network? (Choose three.)
A. Violating
B. Committed information rate
C. Peak information rate
D. Shaping rate
E. Bursting
F. Conforming
G. Exceeding
From a design perspective which two of the following OSPF statements are most relevant? (Choose two)
A. OSPF stub areas can be thought of as a simple form of summarization
B. OSPF cannot filter intra-area routes
C. An ABR can only exist in two areas – the backbone and one adjacent area
D. Performance issues in the Backbone area can be offset by allowing some traffic to transit a non-backbone area
E. The size of an area (the LSDB) will be constrained by the size of the IP MTU
While designing a QoS policy for an organization, a network engineer is determining the method to limit the output rate of traffic within the real-time queue. How must the limiting of traffic within the real-time queue occur?
A. The traffic must be policed and not allowed to pass.
B. The traffic must be shaped to allow for it to be transmitted after the tokens have been replenished.
C. The traffic within the real-time queue must not be limited.
D. The traffic must be remarked to a lower priority to and allowed to pass.
An engineer must ensure Layer 2 extension capabilities over any transport infrastructure. Which interconnective data center functionality satisfies this requirement?
A. Private line
B. OTV
C. VPLS
D. EoMPLS
A network consultant is designing an enterprise network that includes an IPsec headed termination device. Which two capabilities are the most important to consider when assessing the headend devices scalability? (Choose two.)
A. Bandwidth capabilities
B. Packets per second processing capability
C. CPU capabilities
D. Number of tunnels that can be aggregated
E. Memory capabilities
Which two technologies provide web and URL filtering and mitigate zero-day malware? (Choose two.)
A. Cisco CWS
B. Cisco WSA
C. Cisco GETVPN
D. Cisco ESA
E. NAT/PAT AB
When designing a Data Center Interconnect solution, which two statements describe benefits of utilizing A-VPLS for Layer 2 extension? (Choose two.)
A. Redundancy is addressed without enabling Spanning Tree Protocol in the core.
B. The overlay of the Layer 2 connection on the Layer 3 transport hides any physical convergence.
C. Integrated Layer 3 technology responds upon failure.
D. A-VPLS utilizes the Cisco Catalyst 6500 Series VSS feature to provide native dual-homing.
E. A-VPLS provides flow-based load balancing over equal-cost multipath paths.
Which of the following is true concerning best design practices at the switched Access layer of the traditional layer2 Enterprise Campus Network?
A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in the Access layer
B. Provide host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections from Access switches to redundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information from the Access to the Distribution layer
Which virtulization technology uses Layer 3 BFD to detect network failure between entwork devices?
A. Cisco Fabricpath
At which layer in the ACI fabric are policies enforced?
A. endpoint
B. spine
C. APIC
D. leaf
A company wants to configure BGP on a router so that other BGP neighbors cannot influence the path of a particular route. Which action must be taken to accomplish this configuration?
A. Configure a low router ID for the route.
B. Configure a high local preference for the route.
C. Configure a high weight for the route.
D. Configure a low MED for the route.
What is the maximum number of routers that each OSPF area (including the backbone) should contain?
A. 30
B. 10
C. 50
D. 100
What is an advantage of using the vPC feature in a data center environment?
A. supports FHRP
B. The two switches form a single control plane
C. All available uplink bandwidth is utilized
D. A single IP is used for management of both devices
An engineer is attempting to improve OSPF network performance and discovers that the entire SPT recomputes whenever a type 1 or type 2 LSA is received within an area. Which action can optimize SPT operations?
A. Tune LSA throttling thresholds.
B. Enable incremental SPF.
C. Configure totally stubby areas throughout the domain.
D. Summarize networks on all ABRs.
What added enforcement feature is available on IDS-based devices to terminate active malicious traffic?
A. Signature detection
B. SNMP alert
C. TCP reset
D. Layer 4 filtering
An engineer is redesigning the infrastructure for a campus environment. The engineer must maximize the use of the links between the core and distribution layers. By which two methods can this usage be maximized? (Choose two.)
A. Design with multiple unequal-cost links between the core and distribution layers.
B. Design the links between the core and distribution layers to use an IGP.
C. Design with multiple equal-cost links between the core and distribution layers.
D. Design the links between the core and distribution layers to use HSRP.
E. Design the links between the core and distribution layers to use RPVSTP+.
How does stub routing affect transit routes in EIGRP?
A. Transit routes are passed from a stub network to a hub network.
B. It is designed to prevent the distribution of external routes.
C. It prevents the hub router from advertising networks learned from the spokes.
D. Transit routes are filtered from stub networks to the network hub.
Which description of how virtual MAC addresses are assigned to the members of a GLBP group is true?
A. Each device assigns its own address
B. The AVG assigns the addresses
C. The AVF assigns the addresses
D. The device that has the highest IP address assigns the addresses B
A customer has several remote sites connected with the HQ via microwave links. An engineer has been asked to propose a backup WAN connectivity for these sites with these requirements: ✑ Physical WAN connectivity is not available for most of these sites. ✑ A low-cost and fast-to-implement backup solution must be deployed. ✑ Bandwidth needs for the backup link are low. ✑ Users can tolerate a WAN outage of up to 2 hours. Which backup WAN link type does the engineer recommend?
A. LTE
B. 802.16 WiMAX
C. laser link
D. 802.15.1 Bluetooth
An engineer notices that many BGP peers utilize the same configuration parameters. What can the engineer configure to simplify BGP neighbor statements and generate more efficient BGP peer updates?
A. peer groups
B. policy templates
C. session templates
D. peer address families
An engineer has implemented a QoS architecture that requires a signaling protocol to tell routers which flows of packets require special treatment. Which two mechanisms are important building blocks to establishing and maintaining QoS in this architecture? (Choose two.)
A. policing
B. classification
C. admission control
D. tagging
E. low-latency queuing
F. resource reservation
G. packetscheduling
Refer to the exhibit. A customer discovers router R1 remains active even when the R1 uplink (F0/1) is down. Which two comments can be applied to R1 to allow R2 to take over as the HSRP active? (Choose two.)
A. standby 10 track 50 shutdown
B. standby 10 track 50 decrement 20
C. track 50 ip route 10.10.10.0/24 reachability
D. standby 10 track 50
E. track 50 interface Fa0/1 ip routing
Which option is correct when using VSS to combine two physical switches into one logical switch?
A. Both data planes forward traffic simultaneously.
B. Only one data plane forwards traffic, while the other data plane is on standby.
C. Both control planes forward traffic simultaneously.
D. Control planes are combined into one virtual control plane.
When designing data centers for multitenancy, which two benefits are provided by the implementation of VSANs and zoning? (Choose two.)
A. Zones provide the ability to create many logical SAN fabrics on a single Cisco MDS 9100 family switch.
B. VSANs have their own set of services and address space, which prevents an issue in one VSAN from affecting others.
C. VSANs and zones use separate fabrics.
D. Zones allow an administrator to control which initiators can see which targets.
E. VSAN provides a means of restricting visibility and connectivity among devices connected to a zone.
Refer to the exhibit. Based on the configuration, why are routers R1 and R2 not exchanging OSPF routes?
A. The OSPF process numbers are different.
B. There is no backbone area configured.
C. The router IDs are different.
D. OSPF is not enabled on the interfaces.
An engineer has proposed the deployment of a Cisco ACI fabric solution to introduce automation and zero-touch operation experience to a DC network. Which type of virtualization technology is utilized by the Cisco ACI to encapsulate the traffic inside the fabric and to virtualize the physical infrastructure?
A. IPsec
B. NSX
C. STP
D. VXLAN
While designing quality of service policies, which two types of traffic must be prioritized as management traffic? (Choose two.)
A. RADIUS
B. SSH
C. SCP
D. HTTPS
E. ICMP
Which two statements about 802.1X are true? (Choose two.)
A. It can allow and deny port access based on device identity.
B. It is a Cisco proprietary standard.
C. It works only with wired devices.
D. By default, it allows devices that lack 802.1 support.
E. It can allow and deny port access based on user identity.
An engineer wants to ensure that common services communicate to several applications in various EPGs. Which two features within Cisco ACI accomplish this goal? (Choose two.)
A. filter
B. contract
C. application profile
D. bridge domain
E. tenant
A company requires a simple network access control solution that allows for software defined segmentation based on user and device contextual information. Which two technologies must be implemented to meet these requirements? (Choose two.)
A. Clean Access
B. Identity Service Engine
C. TrustSec
D. Secure Access Control System
E. NAC Agent
An engineer set up a multicast design using all three Cisco supported PIM modes. Which two characteristics of Bidirectional PIM in this situation are true? (Choose two.)
A. Membership to a bidirectional group is signaled via explicit join messages.
B. In Bidirectional PIM, the RP IP address can be shared with any other router interface.
C. Bidirectional PIM is designed to be used for one-to-many applications.
D. A Cisco router cannot support all three PIM modes simultaneously.
E. In Bidirectional PIM, the RP IP address does not need to be a router.
Which three authentication services are supported by Cisco NAC Appliance? (Choose three.)
A. RADIUS
B. LDAP
C. Kerberos
D. TACACS+
E. local
F. SNMP
What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?
A. denies the client network resource access
B. repairs the effected devices
C. generates a Syslog message
D. permits the client but limits to guest access
Which two of these are correct regarding the recommended practice for distribution layer design? (Choose two.)
A. use a redundant link to the core
B. use a Layer 2 link between distribution switches
C. never use a redundant link to the core because of convergence issues
D. use a Layer 3 link between distribution switches with route summarization
E. use a Layer 3 link between distribution switches without route summarization
While designing a backup BGP solution, a network engineer wants to ensure that a single router with multiple connections prefers the routes from a specific connection over all others. Which BGP path selection attribute is considered first when selecting a route?
A. AS-LENGTH
B. MED
C. link bandwidth
D. WEIGHT
In what situation must spanning-tree be implemented?
A. when fast convergence is required for link failures
B. when redundant Layer 2 links, that are not part of a single EtherChannel or bundle, exist between distribution switches
C. when trunks need to extend multiple VLANs across access switches
D. when a VLAN spans access layer switches
Which three statements about 802.1X are true
A. it is IEEE standard
B. It works only with wired devices
C. It can allow and deny port access based on device identity
Which Cisco NX-OS feature can be used to build highly scalable Layer 2 multipath networks without utilizing the Spanning Tree Protocol?
A. vPC
B. FabricPath
C. MST
D. OTV B
When designing remote access to the Enterprise Campus network for teleworkers and mobile workers, which of the following should the designer consider?
A. It is recommended to place the VPN termination device in line with the Enterprise Edge firewall, with ingress traffic limited to SSL only
B. Maintaining access rules, based on the source IP of the client, on an internal firewall drawn from a headend RADIUS server is the most secure deployment
C. VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
D. Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick), including at Layer7
A network engineer is designing a network that must incorporate active-active redundancy to eliminate disruption when a link failure occurs between the core and distribution layer. What two technologies will allow this? (Choose two.)
A. Equal Cost Multi-Path (ECMP)
B. Rapid Spanning Tree Protocol Plus (RSTP+)
C. Hot Standby Routing Protocol (HSRP)
D. Rapid Spanning Tree Protocol (RSTP)
E. Multichassis EtherChannel (MEC)
During the design of a new data center, a company requires that access switches be placed near servers without requiring a one-to-one ratio of switches to network racks. Which switch layout must be used?
A. end ofrow
B. top of rack
C. integrated
D. centralized
An engineer is designing a Layer 3-enabled access layer. Which design recommendation must the engineer consider when deploying EIGRP routing within the access layer?
A. Configure all edge access layer switches to use a stub routing feature.
B. Implement floating static routes on access switches for redundant links.
C. Use the First Hop Redundancy Protocol on access layer switches.
D. Enable multiple uplinks from each access switch stack to the distribution switches.
Which of these Layer 2 access designs does not support VLAN extensions?
A. FlexLinks
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
A customer has an existing WAN circuit with a capacity of 10 Mbps. The circuit has 6 Mbps of various user traffic and 5 Mbps of real-time audio traffic on average. Which two measures could be taken to avoid loss of real time traffic? (Choose two.)
A. Police the traffic to 3.3 Mbps and allow excess traffic to be remarked to the default queue.
B. Configure congestion avoidance mechanism WRED within the priority queue.
C. Ensure that real time traffic is prioritized over other traffic.
D. Police the traffic to 5 Mbps and allow excess traffic to be remarked to the default queue.
E. Increase the WAN circuit bandwidth.
In which OSI layer does IS-IS operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
An enterprise EIGRP network has been growing rapidly. After several recent outages, the network must be redesigned to facilitate further growth and address scalability concerns. Which two actions must be performed to accomplish this redesign? (Choose two.)
A. Replace the routers with newer models.
B. Increase bandwidth capacity between the peers.
C. Break down routing domain into multiple autonomous systems
D. Implement route summarization
E. Utilize authentication between the peers. AD
While troubleshooting an Application Centric network cluster, an engineer sees that an APIC has gone offline. What is the minimum number of APICs required for a production ACI fabric to continue to operate?
A. 1
B. 2
C. 3
D. 4
A network engineer must use an Internet connection to provide backup connectivity between two sites. The backup connection must be encrypted and support multicast. Which technology must be used?
A. GETVPN
B. IPsec direct encapsulation
C. DMVPN
D. GRE over IPsec
Free Access Full 300-320 Practice Exam Free
Looking for additional practice? Click here to access a full set of 300-320 practice exam free questions and continue building your skills across all exam domains.
Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!
Good luck with your 300-320 certification journey!