200-310 Premium Bundle

200-310 Premium Bundle

Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(2820 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 200-310 Free Practice Questions

Q1. Application servers require load balancing and security services. Where in the data center network should these services be provisioned? 

A. core 

B. aggregation 

C. Layer 3 access 

D. distribution 

Answer:

Q2. A secure WAN design requires dynamic routing and IP multicast. What two VPN protocols meet these requirements? (Choose two.) 

A. Standard IPsec 

B. P2P GRE over IPsec 

C. DMVPN 

D. AnyConnect 

E. PPTP 

F. Easy VPN 

G. SSL/TLS 

Answer: B,C 

Q3. Which three modular components are part of the Cisco Enterprise Edge Architecture? (Choose three.) 

A. e-commerce module 

B. Internet connectivity module 

C. server farm module 

D. remote access and VPN module 

E. PSTN services module 

F. enterprise branch module 

G. building distribution module 

Answer: A,B,D 

Q4. Which three protocols support VLSM? (Choose three.) 

A. RIPv2 

B. RIPv1 

C. EIGRP 

D. OSPF 

E. IGRP 

Answer: A,C,D 

Q5. Which statement describes the methodology that supports the Cisco Enterprise Architecture models? 

A. It divides the network into functional network modules. 

B. It divides the network into role-based network modules. 

C. It divides the network into regional network modules. 

D. It divides the network into operational network modules. 

Answer:

Q6. Which three statements are true regarding the virtual interface on a Cisco Wireless LAN Controller? (Choose three.) 

A. supports mobility management 

B. serves as a DHCP relay 

C. used for all controller to AP communication 

D. supports embedded Layer 3 security 

E. default for out-of-band management 

F. default for in-band management 

G. provides connectivity to AAA servers 

Answer: A,B,D 

Q7. Refer to the exhibit. 

A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer? 

A. #1 

B. #2 

C. #3 

D. #4 

E. #5 

Answer:

Q8. Which three are considered as technical constraints when identifying network requirements? (Choose three.) 

A. support for legacy applications 

B. bandwidth support for new applications 

C. limited budget allocation 

D. policy limitations 

E. limited support staff to complete assessment 

F. support for existing legacy equipment 

G. limited timeframe to implement 

Answer: A,B,F 

Explanation: 

Network design might be constrained by parameters that limit the solution. Legacy applications might still exist that must be supported going forward, and these applications might require a legacy protocol that may limit a design. Technical constraints include the following: 

.Existing wiring does not support new technology. 

.Bandwidth might not support new applications. 

.The network must support exiting legacy equipment. 

.Legacy applications must be supported (application compatibility). 

Q9. Which consideration is the most important for the network designer when considering IP routing? 

A. convergence 

B. scalability 

C. on-demand routing 

D. redistribution 

Answer:

Q10. Which two are types of network virtualization? (Choose two.) 

A. VSS: Virtual Switching System 

B. VRF: virtual routing and forwarding 

C. VCI: virtual channel identifier 

D. VLSM: variable length subnet masking 

E. VM: virtual machine 

F. VMP: Virtual Memory Pool 

Answer: A,B 

Explanation: 

Network virtualization encompasses logical isolated network segments that share the same 

physical infrastructure. Each segment operates independently and is logically separate 

from the other segments. Each network segment appears with its own privacy, security, 

independent set of policies, QoS levels, and independent routing paths. 

Here are some examples of network virtualization technologies: 

VLAN: Virtual local-area network 

VSAN: Virtual storage-area network 

VRF: Virtual routing and forwarding 

VPN: Virtual private network 

VPC: Virtual Port Channel 

Q11. What business trend allows employees to use personal devices to access enterprise data and systems? 

A. ISE 

B. BYOD 

C. SAN 

D. IOE 

Answer:

Q12. A company must deploy an IGP routing protocol on an Enterprise Network. Where should route summarization be implemented? 

A. distribution 

B. core 

C. access 

D. backbone 

Answer:

Q13. Your company's Cisco routers are operating with EIGRP. You need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which describes the best practice for routing protocol deployment? 

A. Apply OSPF throughout both networks 

B. Apply one-way redistribution exclusively at each location 

C. Apply two-way redistribution exclusively at each location 

D. Apply two-way redistribution at each location with a route filter at only one location 

E. Apply two-way redistribution at each location with a route filter at each location 

F. Apply EIGRP with the same autonomous system throughout both networks 

Answer:

Explanation: Without filters there is possibility of routing loops. 

Link: 

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a008009487e.shtml 

Q14. In which phase of PPDIOO are the network requirements identified? 

A. Design 

B. Plan 

C. Prepare 

D. Implement 

E. Operate 

F. Optimize 

Answer:

Explanation: 

Plan Phase 

The Plan phase identifies the network requirements based on goals, facilities, and user needs. This phase characterizes sites and assesses the network, performs a gap analysis against best-practice architectures, and looks at the operational environment. A project plan is developed to manage the tasks, responsible parties, milestones, and resources to do the design and implementation. The project plan aligns with the scope, cost, and resource parameters established with the original business requirements. This project plan is followed (and updated) during all phases of the cycle. 

Q15. What two access point modes support the transmission of user traffic over a LWAPP/CAPWAP tunnel? (Choose two.) 

A. local 

B. H-REAP 

C. rogue detector 

D. monitor 

E. sniffer 

F. standalone 

Answer: A,B 

Q16. DRAG DROP 

Answer:  

START 200-310 EXAM