200-310 Premium Bundle

200-310 Premium Bundle

DESGN Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(41415 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 200-310 Free Practice Questions

P.S. Vivid 200-310 software are available on Google Drive, GET MORE: https://drive.google.com/open?id=1HeGiWiT85MPG_D5tyMM3dD_BxFUufyu7


New Cisco 200-310 Exam Dumps Collection (Question 11 - Question 20)

Question No: 11

What design requirement is necessary for campus network access layer switching?

A. high cost per port

B. high availability

C. high scalability

D. high performance

Answer: C


Question No: 12

An organization needs a WAN Transport technology that meets these criteria:

u2022 has a low initial cost

u2022 provides low-to-medium BW

u2022 has medium-to-high latency and jitter

Which technology should the organization use?

A. DSL

B. X.25

C. ISDN

D. wireless

E. analog modem

Answer: A


Question No: 13

A network engineer is tasked with summarizing the routes to a remote site. What is the optimal route statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the corporate WAN?

A. ip route 192.168.100.0 255.255.254.0 10.1.1.1

B. ip route 192.168.100.0 255.255.252.0 10.1.1.1

C. ip route 192.168.100.0 255.255.255.0 10.1.1.1

D. ip route 192.168.101.0 255.255.254.0 10.1.1.1

Answer: B


Question No: 14

Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for

network access?

A. RADIUS

B. LEAP

C. IPsec

D. TACACS

E. ISAKMP

Answer: A

Explanation:

Cisco Identity-Based Network Services

The Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security.

The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to apply authentication and authorization.

With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentials and initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host then sends the credentials to the switch, which forwards them to the RADIUS ACS.

The RADIUS ACS performs a lookup on the username and password to determine the credentials' validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the username and password are incorrect, the server sends a message to the switch or AP to block the host port.

Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server.


Question No: 15

What phase of Cisco's PPDIOO is the final test of the appropriateness of the design?

A. Operate

B. Optimize

C. Design

D. Implement

Answer: A


Question No: 16

OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)

A. All areas need to connect back to area 0.

B. The OSPF process number on each router should match.

C. NSSA areas should be used when an area cannot connect directly to area 0.

D. Stub areas should be connected together using virtual links.

E. ECMP may cause undesired results depending on the environment.

Answer: A,E


Question No: 17

Which three options are examples of network logical virtualization? (Choose three.)

A. virtual PortChannel

B. virtual machine

C. Virtual Device Context

D. Virtual Switching System

E. virtual device driver

Answer: A,C,D


Question No: 18

While designing a remote access VPN, a customer has requested three different levels of access to be granted for administrators, employees, and partners. Which three access policies must be configured for the three groups? (Choose Three)

A. Partners are centrally authenticated with limited network access controlled with ACLs.

B. Adminitrative users have local credentials with full access to the internal infrastructure.

C. Administrative users are centrally authenticated with fill access to the internal infrastructure.

D. Employee are centrally authenticated with limited network access controlled with ACLs.

E. Employees are centrally authenticated with full access to the internal infrastructure.

F. Partners are centrally authenticated with full access to the internal infrastructure.

Answer: D,E,F


Question No: 19

An engineer wants to find all of the objects of a certain type available in the MIT. Which kind of query must be performed?

A. object-level

B. tree-level

C. class-level

D. subtree-level

Answer: D


Question No: 20

When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?

A. 802.1X

B. ACLs in the core layer

C. Cisco Security MARS

D. NetFlow

Answer: A


Recommend!! Get the Vivid 200-310 dumps in VCE and PDF From Examcollection, Welcome to download: http://www.examcollectionuk.com/200-310-vce-download.html (New 287 Q&As Version)


START 200-310 EXAM