200-310 Premium Bundle

200-310 Premium Bundle

Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(19590 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 200-310 Free Practice Questions

Q1. In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services? 

A. monitor mode 

B. promiscuous mode 

C. discovery mode 

D. sniffer mode 

Answer:

Q2. Refer to the exhibit. 

A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer? 

A. #1 

B. #2 

C. #3 

D. #4 

E. #5 

Answer:

Q3. Which two link state routing protocols support IPv6 routing? (Choose two.) 

A. BGP4+ 

B. OSPF 

C. RIPng 

D. EIGRP 

E. IS-IS 

Answer: B,E 

Q4. DRAG DROP 

Answer:  

Q5. The enterprise campus core layer has requirements that are unique from the distribution and access layers. Which of the following is true about the core layer? 

A. The core layer provides convergence using Layer 2 and Layer 3 services and features. 

B. The core layer provides high availability to support the distribution layer connections to the enterprise edge. 

C. The campus core layer is optional. 

D. The core layer requires high performance to manage the traffic policing across the backbone. 

Answer:

Q6. To provide Layer 2 connectivity between the primary and remote data centers, given that the two data centers are using Layer 3 routed DCIs, which NX-OS technology can be used to facilitate this requirement? 

A. VRF 

B. OTV 

C. MPLS 

D. SPT 

E. VPC 

Answer:

Q7. You are tasked with designing a new branch office that will support 75 users with possible expansion in the future and will need a highly available network. Which of the branch design profiles should be implemented? 

A. large branch design 

B. medium branch design 

C. teleworker design 

D. small branch design 

Answer:

Explanation: 

Medium Branch Design The medium branch design is recommended for branch offices of 50 to 100 users, which is similar to the small branch but with an additional access router in the WAN edge (slightly larger) allowing for redundancy services. Typically, two 2921 or 2951 routers are used to support the WAN, and separate access switches are used to provide LAN connectivity. 

Q8. Which two are types of network virtualization? (Choose two.) 

A. VSS: Virtual Switching System 

B. VRF: virtual routing and forwarding 

C. VCI: virtual channel identifier 

D. VLSM: variable length subnet masking 

E. VM: virtual machine 

F. VMP: Virtual Memory Pool 

Answer: A,B 

Explanation: 

Network virtualization encompasses logical isolated network segments that share the same 

physical infrastructure. Each segment operates independently and is logically separate 

from the other segments. Each network segment appears with its own privacy, security, 

independent set of policies, QoS levels, and independent routing paths. 

Here are some examples of network virtualization technologies: 

VLAN: Virtual local-area network 

VSAN: Virtual storage-area network 

VRF: Virtual routing and forwarding 

VPN: Virtual private network 

VPC: Virtual Port Channel 

Q9. When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider? 

A. 802.1X 

B. ACLs in the core layer 

C. Cisco Security MARS 

D. Cisco Firewall Services Module 

Answer:

Q10. Which two devices would you place in your DMZ to ensure enterprise edge security? (Choose two.) 

A. IPS 

B. NAC 

C. ASA 

D. ACS 

E. WCS 

Answer: A,C 

Q11. Which Cisco device management feature is most suited to metering network traffic and providing data for billing network usage? 

A. BGP 

B. Cisco Discovery Protocol 

C. QoS 

D. RMON 

E. NetFlow 

Answer:

Q12. Which HSRP parameters must match, to ensure proper functionality? 

A. group parameters 

B. priority parameters 

C. preempt parameters 

D. tracking parameters 

Answer:

Q13. With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an example of such a strength? 

A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance. 

B. N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events. 

C. N+N+1 redundancy configuration has the least impact to system management because all of the controllers are colocated in an NOC or data center. 

D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the same subnet for more efficiency. 

Answer:

Explanation: With such an arrangement there is no complex mesh of access points & controllers. Link: http://www.cisco.com/web/learning/le31/le46/cln/qlm/CCDA/design/understanding-wireless-network-controller-technology-3/player.html 

N+N WLC Redundancy With N+N redundancy, shown in Figure 5-14. an equal number of controllers hack up each other. For example, a pair of WLCs on one floor serves as a backup to a second pair on another floor. The top WLC is primary for API and AP2 and secondary for AP3 and AP4. The bottom WLC is primary for AP3 and AP4 and secondary for API and AP2. There should be enough capacity on each controller to manage a failover situation. 

N+N+1 WLC Redundancy 

With N+N+1 redundancy, shown in Figure 5-15, an equal number of controllers back up each other (as with N+N), plus a backup WLC is configured as the tertiary WLC for the APs. N+N+1 redundancy functions the same as N+N redundancy plus a tertiary controller that backs up the secondary controllers. The tertiary WLC is placed in the data center or network operations center 

Q14. Which two can be used as a branch office WAN solution? (Choose two.) 

A. frame relay 

B. MPLS 

C. Metro Ethernet 

D. GPRS 

E. dial-up modem 

F. 3G USB modems 

Answer: B,C 

Explanation: Explanation Frame relay is old 'shared' technology today's sites use some flavor or Metro E or MPLS/VPN 

Q15. Where in the network hierarchy should network access control be performed? 

A. backbone 

B. core 

C. access 

D. distribution 

Answer:

Q16. A wireless LAN client is sending traffic to the wired LAN client. What path will the packet take to reach the destination endpoint in a lightweight wireless deployment? 

A. switch > controller > ap > client 

B. controller > ap > switch > client 

C. ap > controller > switch > client 

D. switch > ap > controller > client 

Answer:

START 200-310 EXAM