200-310 Premium Bundle

200-310 Premium Bundle

Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(21765 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 200-310 Free Practice Questions

Q1. When designing for a remote worker, which two are typical requirements? (Choose two.) 

A. best-effort interactive and low-volume traffic patterns 

B. connections to the enterprise edge using Layer 2 WAN technologies 

C. always-on connection with SLA from ISP 

D. voice and IPsec VPN support 

E. high-end security devices with stateful firewall filtering 

F. dual or multihoming to ISPs 

Answer: C,D 

Q2. Which three are security services offered through Cisco Router Security? (Choose three.) 

A. Trust and Identity 

B. Integrated Threat Control 

C. Unified Wireless Network Security Solution 

D. Secure Connectivity 

E. Voice-Messaging Security 

F. Endpoint Security 

G. Virtual Security Gateway 

Answer: A,B,D 

Q3. You have a campus network that consists of only Cisco devices. You have been tasked to discover the device platforms, the IOS versions, and an IP address of each device to map the network. Which proprietary protocol will assist you with this task? 

A. SNMP 

B. TCP 

C. CDP 

D. ICMP 

E. LLDP 

Answer:

Q4. Which three types of WAN topologies can be deployed in the Service Provider Module? (Choose three.) 

A. ring 

B. star 

C. full mesh 

D. core/edge 

E. collapsed core 

F. partial mesh 

Answer: B,C,F 

Q5. When designing an EIGRP network, which two things should you take into consideration? (Choose two.) 

A. ASN and K values must match. 

B. The neighbor command can be used to enable unicast communication. 

C. The neighbor diameter cannot exceed a 15-hops limit. 

D. NSSA areas can be used to redistribute external routes. 

E. Neighbor relationship can be established with non-Cisco routers. 

Answer: A,B 

Q6. Which mode is used to exclusively look for unauthorized access points? 

A. monitor mode 

B. sniffer mode 

C. rogue detector mode 

D. local mode 

Answer:

Explanation: 

Interference detection and avoidance: As Cisco LWAPs monitor all channels, interference is detected by a predefined threshold (10 percent by default). Interference can be generated by rogue APs, microwaves, cordless telephones, Bluetooth devices, neighboring WLANs, or other electronic devices. 

Q7. A network engineer is using the traditional switched hierarchical design. The client has asked to increase uplink utilization from the access layer to the distribution. How can the engineer attain this new requirement without adding new physical connections? 

A. enable spanning-tree portfast 

B. enable VSS at the distribution layer 

C. increase the MTU size on the uplink interfaces 

D. ensure the root bridge priority is equal on both distribution switches 

Answer:

Q8. An application uses broadcast traffic to send data to IPv4 hosts. How can the application communicate using IPv6? 

A. Anycast 

B. Unicast 

C. Broadcast 

D. Multicast 

Answer:

Q9. Which is part of the Prepare phase of PPDIOO? 

A. Obtain site contact information 

B. Perform network audit 

C. Identify customer requirements 

D. Perform gap analysis 

Answer:

Explanation: 

Prepare Phase The Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to support the strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy. 

Q10. What are three key areas that need to be considered when designing a remote data center? (Choose three.) 

A. power diversity 

B. active directory services 

C. Cisco IOS versions 

D. data storage 

E. applications 

F. user access 

G. packet routing 

Answer: A,D,E 

Q11. What type of device can be installed to increase a broadcast domain? 

A. router 

B. switch 

C. IDS 

D. IPS 

Answer:

Q12. Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.) 

A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers. 

B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+. 

C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation. 

D. Avoid wasted processing by disabling STP where loops are not possible. 

E. Use VTP transparent mode to decrease the potential for operational error. 

Answer: B,E 

Explanation: 

When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design. 

Performance in the access layer is also important. Redundancy and QoS features should be considered. 

The following are recommended best practices for the building access layer: 

. Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology. 

. Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers. 

. Set trunks to ON and ON with no-negotiate. 

. Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch). 

. Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks. 

. Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast. 

. Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing. 

. Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports. 

. Use Cisco STP Toolkit, which provides 

. PortFast: Bypass listening-learning phase for access ports 

. Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU) 

. Root GuarD. Prevents external switches from becoming root 

. BPDU GuarD. Disables PortFast-enabled port if a BPDU is received Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3, Page 85 

Q13. What two access point modes support the transmission of user traffic over a LWAPP/CAPWAP tunnel? (Choose two.) 

A. local 

B. H-REAP 

C. rogue detector 

D. monitor 

E. sniffer 

F. standalone 

Answer: A,B 

Q14. According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four.) 

A. faster ROI 

B. improved business agility 

C. increased network availability 

D. faster access to applications and services 

E. lower total cost of network ownership 

F. better implementation team engagement 

Answer: B,C,D,E 

Explanation: 

The PPDIOO life cycle provides four main benefits: 

+ It improves business agility by establishing business requirements and technology strategies. 

+ It increases network availability by producing a sound network design and validating the network operation. 

+ It speeds access to applications and services by improving availability, reliability, security, scalability, and performance. 

+ It lowers the total cost of ownership by validating technology requirements and planning for infrastructure changes and resource requirements. 

(Reference: Cisco CCDA Official Exam Certification Guide, 3rd Edition) described in the link below. Link: http://www.ciscopress.com/articles/article.asp?p=1608131&seqNum=3 

Q15. Refer to the exhibit. 

Which statement accurately represents the characteristics of the core layer in this design? 

A. QoS should only be performed only in the core. 

B. Load balancing should never be implemented or used. 

C. Access lists should be used in the core to perform packet manipulation. 

D. Partial mesh should be used as long as it is connected to each device by multiple paths. 

E. Policy-based traffic control should be implemented to enable prioritization and ensure the best performance for all time-critical applications. 

Answer:

Q16. With respect to IPv6 addressing, from a design perspective, which of these statements is it important to keep in mind? 

A. IPv6 addressing provides convenience of anycast addressing without any configuration requirements. 

B. IPv6 does not use multicast addressing. 

C. An IPv6 router will not forward packets from one link to other links if the packet has either a link-local source or a link-local destination address. 

D. Dynamic address assignment requires DHCPv6. 

Answer:

START 200-310 EXAM