Cisco 300-420 Practice Exams
Last updated on Apr 09,2025- Exam Code: 300-420
- Exam Name: Designing Cisco Enterprise Networks (ENSLD)
- Certification Provider: Cisco
- Latest update: Apr 09,2025
In a Cisco SD-Access fabric, which node facilities connectivity between the fabric and networks external to the fabric?
- A . intermediate
- B . edge
- C . control plane
- D . border
Which WAN connectivity technology is optimal for edge computing compared to others and why?
- A . Due to low latency, high bandwidth, and closest proximity to the user. 4G/5G connectivity is the optimal WAN technology for edge computing compared to L3 VPN MPLS connectivity, which offers native separation and security with close proximity to the data center.
- B . Due to high bandwidth, separation and security, and proximity to the data center network. DWDM Is the optimal WAN technology lor edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.
- C . Due to low latency, high bandwidth, and closest proximity to the user, L3 VPN MPLS connectivity is the optimal WAN technology for edge computing compared to 4G/5G connectivity, which offers native separation and security with close proximity to the data center.
- D . Due to low cost, high bandwidth, low latency, and closest proximity to the edge of the network, Mero Ethernet is the optimal WAN technology for edge computing compared to MPLS, which offers native separation and security with close proximity to the data center.
An enterprise customer has these requirements:
✑ end-to-end QoS for the business-critical applications and VoIP services based on CoS marking.
✑ flexibility to offer services such as IPv6 and multicast without any reliance on the service provider.
✑ support for full-mesh connectivity at Layer 2.
Which WAN connectivity option meets these requirements?
- A . VPWS
- B . MPLS VPN
- C . DMVPN
- D . VPLS
An architect must create a QoS solution for a customer to ensure that a 40 Mbps Internet connection is shared between four subnets based on these requirements:
* Each subnet must receive no less than 10 Mbps of download bandwidth during peak traffic times.
* A subnet can use up to 40 Mbps during nonpeak traffic times if the other subnets are idle.
* Download traffic must never experience a delay.
Which solution must the architect choose?
- A . rate-limiting and shaping
- B . bandwidth percentage and policing
- C . shaping and policing
- D . bandwidth percentage and rate-limiting
A customer plans to adopt distributed QoS in their enterprise WAN. The policy must allow for individual packet marking according to the type of treatment required and for forwarding based on hop-by-hop treatment locally defined on each device.
Which technology must the customer select?
- A . CBWFQ
- B . LLQ
- C . Diffserv
- D . IntServ
A network engineer must optimize a campus OSPF deployment Currently each time a type 1 or type 2 LSA is generated within an area, the OSPF process must recompute the entire SPT.
Which solution improves the recomputation process?
- A . iSPF
- B . BFD
- C . SPF
- D . PRC
An engineer must use YANG with an XML representation to configure a Cisco IOS XE switch with these specifications:
✑ IP address 10.10.10.10/27 configured on the interface GigabitEthernet2/1/0
✑ connectivity from a directly connected host 10.10.10.1/27
Which YANG data model set must the engineer choose?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
DRAG DROP
Drag and drop the steps WAN Edge performs when on-boarded into the Cisco SD-WAN overlay from the left into the order they are completed on the right.
An engineer uses Postman and YANG to configure a router with:
✑ OSPF process ID 400
✑ network 192.168.128.128/25 enabled for Area 0
Which get-config reply verifies that the model set was designed correctly?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
Which solution allows overlay VNs to communicate with each other in an SD-WAN Architecture?
- A . External fusion routers can be used to map VNs to VRFs and selectively route traffic between VRFs.
- B . GRE tunneling can be configured between fabric edges to connect one VN to another.
- C . SGTs can be used to permit traffic from one VN to another.
- D . Route leaking can be used on the fabric border nodes to inject routes from one VN to another.