Practice Free 300-540 Exam Online Questions
Question #31
Which protocol is used for device authentication, authorization, and accounting?
- A . ACL
- B . uRPF
- C . TACACS
- D . MACSEC
Correct Answer: C
Question #32
Which of the following is essential for data plane high availability?
- A . Single compute node
- B . A single vNIC
- C . Redundant Top of Rack (TOR) switches
- D . Single TOR switch
Correct Answer: C
Question #33
Yang models are utilized in NFV for what purpose?
- A . To decrease data model standardization
- B . To define network elements and configurations
- C . To increase the complexity of network configurations
- D . To manualize the configuration process
Correct Answer: B
Question #34
Streaming telemetry with gRPC and gNMI is used for:
- A . Reducing network traffic
- B . Real-time network monitoring
- C . Physical network repairs
- D . Data encryption
Correct Answer: B
Question #35
VIM control plane KPIs are important for:
- A . Tracking physical server health
- B . Monitoring virtual infrastructure manager performance
- C . Decreasing network traffic
- D . Manual network configurations
Correct Answer: B
Question #36
What is a carrier-neutral facility primarily used for?
- A . Hosting physical servers for a single ISP
- B . Providing connectivity options to multiple cloud providers
- C . Storing backup data on physical tapes
- D . Single-tenant data center operations
Correct Answer: B
Question #37
Carrier-neutral facilities enhance cloud connectivity by offering:
- A . Single-tenant data center operations
- B . Direct access to only one cloud provider
- C . Multiple connectivity options including Direct Connect and MPLS
- D . Limited scalability options
Correct Answer: C
Question #38
Which of the following are true about IPsec VPNs? (Choose two)
- A . It encrypts data at the application layer
- B . It is suitable for creating secure connections over the public internet
- C . It is used exclusively within private networks
- D . It provides end-to-end encryption
Correct Answer: BD
Question #39
Implementing multi-homing in a network design provides __________.
- A . decreased bandwidth
- B . redundancy
- C . increased latency
- D . decreased security
Correct Answer: B