100% candidates have passed the CCNP Latest 300-420 practice exam by the help of Geekcert pass guaranteed CCNP Latest 300-420 exam questions preparation materials. The Geekcert Cisco PDF and VCEs are the latest and cover every knowledge points of CCNP Jan 11,2022 Newest 300-420 free download Designing Cisco Enterprise Networks (ENSLD) certifications. You can try the Q and As for an undeniable success in Hotest 300-420 pdf exam.

try Geekcert free demo of 300-420 exams and so on. Geekcert – latest update source for all 300-420 certification exams. Geekcert – find all popular 300-420 exam certification study materials here. our expert team is ready to help you to get your certification easily. pass your 300-420 exam in 1 day with Geekcert. Geekcert – pass all 300-420 certification exams easily with our real exam practice. latest update and experts revised.

We Geekcert has our own expert team. They selected and published the latest 300-420 preparation materials from Cisco Official Exam-Center: https://www.geekcert.com/300-420.html

The following are the 300-420 free dumps. Go through and check the validity and accuracy of our 300-420 dumps.Although questions are from 300-420 free dumps, the validity and accuracy of the 300-420 dumps are absolutely guaranteed.

Question 1:

Which solution allows overlay VNs to communicate with each other in an SD-WAN Architecture?

A. External fusion routers can be used to map VNs to VRFs and selectively route traffic between VRFs.

B. GRE tunneling can be configured between fabric edges to connect one VN to another.

C. SGTs can be used to permit traffic from one VN to another.

D. Route leaking can be used on the fabric border nodes to inject routes from one VN to another.

Correct Answer: B

Question 2:

An engineer must design a VPN solution for a company that has multiple branches connecting to a main office. What are two advantages of using DMVPN instead of IPsec tunnels to accomplish this task? (Choose two.)

A. support for AES 256-bit encryption

B. greater scalability

C. support for anycast gateway

D. lower traffic overhead

E. dynamic spoke-to-spoke tunnels

Correct Answer: BE

Question 3:

Which NETCONF operation creates filtering that is specific to the session notifications?





Correct Answer: A

Question 4:

An enterprise customer has these requirements:


end-to-end QoS for the business-critical applications and VoIP services based on CoS marking.


flexibility to offer services such as IPv6 and multicast without any reliance on the service provider.


support for full-mesh connectivity at Layer 2.

Which WAN connectivity option meets these requirements?





Correct Answer: D

Question 5:

What is a benefit of using VRRPv3 as compared to VRRPv2?

A. VRRPv3 supports IPv4 and IPv6

B. VRRPv3 supports authentication

C. VRRPv3 supports preemption

D. VRRPv3 supports stateful switchover

Correct Answer: A

Question 6:

A customer is discussing QoS requirements with a network consultant. The customer has specified that endto-end path verification is a requirement. Which QoS solution meets this requirement?

A. IntServ model with RSVP to support the traffic flows

B. DiffServ model with PHB to support the traffic flows

C. marking traffic at the access layer with DSCP to support the traffic flows

D. marking traffic at the access layer with CoS to support the traffic flows

Correct Answer: A

Question 7:

Which nonproprietary mechanism can be used to automate rendezvous point distribution in a large PIM domain?

A. Embedded RP


C. Auto-RP

D. Static RP

Correct Answer: B

Question 8:

Which two BGP features will result in successful route exchanges between eBGP neighbors sharing the same AS number? (Choose two.)

A. advertise-best-external

B. bestpath as-path ignore

C. client-to-client reflection

D. as-override

E. allow-as-in

Correct Answer: DE

Question 9:

Which design consideration should be observed when EIGRP is configured on Data Center switches?

A. Perform manual summarization on all Layer 3 interfaces to minimize the size of the routing table.

B. Prevent unnecessary EIGRP neighborships from forming across switch virtual interfaces.

C. Lower EIGRP hello and hold timers to their minimum settings to ensure rapid route reconvergence.

D. Configure multiple EIGRP autonomous systems to segment Data Center services and applications.

Correct Answer: A

Question 10:

Which design consideration must be made when using IPv6 overlay tunnels?

A. Overlay tunnels that connect isolated IPv6 networks can be considered a final IPv6 network architecture.

B. Overlay tunnels should only be considered as a transition technique toward a permanent solution.

C. Overlay tunnels can be configured only between border devices and require only the IPv6 protocol stack.

D. Overlay tunneling encapsulates IPv4 packets in IPv6 packets for delivery across an IPv6 infrastructure.

Correct Answer: C

Question 11:

When a network is designed using IS-IS protocol, which two circuit types are supported? (Choose two.)

A. nonbroadcast multiaccess

B. multiaccess

C. point-to-multipoint

D. nonbroadcast

E. point-to-point

Correct Answer: BE

Question 12:

Which consideration must be taken into account when using the DHCP relay feature in a Cisco SD-Access Architecture?

A. DHCP-relay must be enabled on fabric edge nodes to provide the correct mapping of DHCP scope to the local anycast gateway.

B. A DHCP server must be enabled on the border nodes to allow subnets to span multiple fabric edges.

C. DHCP servers must support Cisco SD-Access extensions to correctly assign IPs to endpoints in an SD-Access fabric with anycast gateway.

D. DHCP Option-82 must be enabled to map the circuit IP option to the access fabric node where the DHCP discover originated.

Correct Answer: A

Question 13:

Which feature must be incorporated into the campus LAN design to enable Wake on LAN?

A. dynamic ARP Inspection Snooping on layer 2 devices

B. directed broadcasts on layer 3 devices

C. proxy ARP on layer 3 devices

D. DHCP Snooping on layer 2 devices

Correct Answer: B

Question 14:

Which function are fabric intermediate nodes responsible for in an SD-Access Architecture?

A. mapping EIDs to RLOCs

B. encapsulating user traffic in a VXLAN header including the SGT

C. registering new endpoints in the HTDB

D. transporting IP packets between edge nodes and border nodes

Correct Answer: D

Question 15:

An organization is designing a detailed QoS plan that limits bandwidth to specific rates. Which two parameters are supported be the traffic policing feature? (Choose two.)

A. violating

B. marking

C. shaping

D. bursting

E. conforming

Correct Answer: BC