200-310 Premium Bundle

200-310 Premium Bundle

Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(1590 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
December 3, 2024Last update

Cisco 200-310 Free Practice Questions

Q1. A network engineer is following the Cisco enterprise architecture model. To which network layer would a branch office connect to using a private WAN? 

A. Enterprise Campus 

B. Enterprise Edge 

C. SP Edge Premise 

D. Remote Module 

Answer:

Q2. A data center is reaching its power and cooling capacity. What two virtualization 

technologies can address the problem by directly reducing the number of physical devices? (Choose two.) 

A. virtual switching systems 

B. virtual device contexts 

C. virtual servers 

D. virtual routing and forwarding 

E. virtual port channels 

F. virtual LANs 

Answer: B,C 

Q3. The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of the virtualization taking place in the Data Center? 

A. Virtualized media access utilizing Fiber Channel over Ethernet 

B. VLANs and virtual storage area networks (VSANs) provide for virtualized LAN and SAN connectivity, separating physical networks and equipment into virtual entities 

C. Virtual Machines that run an application within the client operating system, which is further virtualized and running on common hardware 

D. Storage devices virtualized into storage pools, and network devices are virtualized using device contexts 

Answer:

Q4. Which Cisco security mechanism has the attributes listed below? 

. It is a sensor appliance 

. It searches for potential attacks by capturing and analyzing traffic 

. It is a "purpose-built device" 

. It is installed passively 

. It introduces no delay or overhead 

A. IKE 

B. PIX 

C. HIPS 

D. NIDS 

E. HMAC 

Answer:

Q5. What is the primary advantage of implementing a wireless LAN controller in a wireless LAN design? 

A. roaming between APs 

B. RADIUS user authentication 

C. radio resource management 

D. accelerated data transfer 

Answer:

Q6. A company has dark fiber between headquarters and its data center. It is presently configured as a 10GbE connection. Network utilization shows high utilization on the connection. What technology can be implemented to increase capacity without acquiring another circuit? 

A. MPLS 

B. DWDM 

C. VPLS 

D. DMVPN 

Answer:

Q7. When designing a WAN backup for voice and video applications, what three types of connections should be used? (Choose three.) 

A. Private WAN 

B. internet 

C. ISDN 

D. MPLS 

E. dial-up 

F. ATM 

G. DSL 

Answer: A,C,D 

Q8. You are tasked with designing a new branch office that will support 75 users with possible expansion in the future and will need a highly available network. Which of the branch design profiles should be implemented? 

A. large branch design 

B. medium branch design 

C. teleworker design 

D. small branch design 

Answer:

Explanation: 

Medium Branch Design The medium branch design is recommended for branch offices of 50 to 100 users, which is similar to the small branch but with an additional access router in the WAN edge (slightly larger) allowing for redundancy services. Typically, two 2921 or 2951 routers are used to support the WAN, and separate access switches are used to provide LAN connectivity. 

Q9. Which Cisco device management feature is most suited to metering network traffic and providing data for billing network usage? 

A. BGP 

B. Cisco Discovery Protocol 

C. QoS 

D. RMON 

E. NetFlow 

Answer:

Q10. What are three valid methods of gathering information about an existing data network? (Choose three.) 

A. Use organizational input. 

B. Perform a traffic analysis. 

C. Analyze the user-mapping of a running application. 

D. Perform a packet-level audit to verify carrier service guarantees. 

E. Perform a network audit to gather more detail about the network. 

F. Use reports that analyze the metrics of the customer's existing network. 

Answer: A,B,E 

Q11. Where in the network hierarchy should network access control be performed? 

A. backbone 

B. core 

C. access 

D. distribution 

Answer:

Q12. Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.) 

A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers. 

B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+. 

C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation. 

D. Avoid wasted processing by disabling STP where loops are not possible. 

E. Use VTP transparent mode to decrease the potential for operational error. 

Answer: B,E 

Explanation: 

When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design. 

Performance in the access layer is also important. Redundancy and QoS features should be considered. 

The following are recommended best practices for the building access layer: 

. Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology. 

. Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers. 

. Set trunks to ON and ON with no-negotiate. 

. Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch). 

. Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks. 

. Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast. 

. Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing. 

. Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports. 

. Use Cisco STP Toolkit, which provides 

. PortFast: Bypass listening-learning phase for access ports 

. Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU) 

. Root GuarD. Prevents external switches from becoming root 

. BPDU GuarD. Disables PortFast-enabled port if a BPDU is received Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3, Page 85 

Q13. What two features are advantages of adding a secondary WAN link at the enterprise edge? (Choose two.) 

A. provides additional bandwidth and load balancing capabilities 

B. acts as a backup link in event the primary link fails 

C. reduces capital and operational costs 

D. improves security and prevents against denial of service attacks 

E. distributes traffic proactively based on link utilization 

Answer: A,B 

Q14. Which protocol is the recommended first-hop redundancy protocol for an existing infrastructure that contains multiple vendors and platforms? 

A. HSRP 

B. VRRP 

C. IGRP 

D. OSPF 

Answer:

Q15. What is the most compact representation of the following IPv6 address? 

2001:db8:0000:0000:cafe:0000:0000:1234 

A. 2001:db8::cafe::1234 

B. 2001:db8::cafe:0000:0000:1234 

C. 2001:db8:0:0:cafe::1234 

D. 2001:db8::cafe:0:1234 

Answer:

Q16. WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet? 

A. security 

B. static versus dynamic routing 

C. bandwidth 

D. QoS 

E. latency 

Answer:

Explanation: 

WAN Backup over the Internet Another alternative for WAN backup is to use the Internet as the connectivity transport between sites. However, keep in mind that this type of connection does not support bandwidth guarantees. The enterprise also needs to work closely with the ISP to set up the tunnels and advertise the company's networks internally so that remote offices have reachable IP destinations. Security is of great importance when you rely on the Internet for network connectivity, so a secure tunnel using IPsec needs to be deployed to protect the data during transport. 

START 200-310 EXAM