Download as pdf or txt
Download as pdf or txt
You are on page 1of 93

Cisco 200-310

Exam 200-310

Cisco Designing for Cisco


Title
Internetwork Solutions

Updated Version: 15.0

Product
288 Q&A
Type
Cisco 200-310

QUESTION: 1
Which two statements about designing the Data Center Access layer are correct? (Choose two.)

A. Multiport NIC servers should each have their own IP address.


B. Layer 3 connectivity should never be used in the access layer.
C. Layer 2 connectivity is primarily implemented in the access layer.
D. Multiport NIC servers should never be used in the access layer.
E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent.

Answer: C,E

QUESTION: 2
An organization needs a WAN Transport technology that meets these criteria:
• has a low initial cost
• provides low-to-medium BW
• has medium-to-high latency and jitter
Which technology should the organization use?

A. DSL
B. X.25
C. ISDN
D. wireless
E. analog modem

Answer: A

QUESTION: 3
Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.)

A. extends the network to remote users


B. allows networks to be set up and restructured quickly
C. reduces dial infrastructure expenditures
D. reduces the number of physical connections
E. simplifies the underlying structure of a customer WAN

Answer: D,E

QUESTION: 4
Refer to the exhibit.
Cisco 200-310

A standard Layer 2 campus network design is pictured. Which numbered box represents the core
layer?

A. #1
B. #2
C. #3
D. #4
E. #5

Answer: C

QUESTION: 5
Which two design criteria require VLANs in a proposed solution? (Choose two.)

A. video streaming on the LAN


B. security between departments
C. the segmenting of collision domains
D. the segmenting of broadcast domains
E. the use of multivendor equipment
F. a limited corporate budget
Cisco 200-310

Answer: B,D

QUESTION: 6
Which three sources does a network designer use to collect information for characterizing an existing
network? (Choose three.)

A. staff input
B. visual inventory
C. network audit
D. traffic analysis
E. server statistics

Answer: A,C,D

QUESTION: 7
Which Cisco security mechanism has the attributes listed below?
• it is a sensor appliance
• it searches for potential attacks by capturing and analyzing traffic
• it is a "purpose-built device"
• it is installed passively
• it introduces no delay or overhead

A. IKE
B. PIX
C. HIPS
D. NIDS
E. HMAC

Answer: D

QUESTION: 8
Which three pieces of information should be documented for each step in a design implementation
plan? (Choose three.)

A. step description
B. design document references
C. easy guidelines in case of failure
D. estimated implementation time
E. simple implementation guidelines
F. estimated rollback time in case of failure

Answer: A,B,D

QUESTION: 9
A company is implementing an Identity Management solution with these characteristics:
• existing AAA Server
• Cisco Catalyst switches
Cisco 200-310

• minimal added investments


Which Cisco Trust and Identity Management solution would you recommend?

A. NAC Appliance
B. Cisco IBNS
C. CSM
D. Cisco Security MARS

Answer: B

QUESTION: 10
Which Cisco device management feature is most suited to metering network traffic and providing
data for billing network usage?

A. BGP
B. Cisco Discovery Protocol
C. QoS
D. RMON
E. NetFlow

Answer: E

QUESTION: 11
What are three valid methods of gathering information about an existing data network? (Choose
three.)

A. Use organizational input.


B. Perform a traffic analysis.
C. Analyze the user-mapping of a running application.
D. Perform a packet-level audit to verify carrier service guarantees.
E. Perform a network audit to gather more detail about the network.
F. Use reports that analyze the metrics of the customer's existing network.

Answer: A,B,E

QUESTION: 12
Which two routing protocols converge most quickly? (Choose two.)

A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP

Answer: D,E

QUESTION: 13
What is the benefit of VLSM?
Cisco 200-310

A. reduces configuration complexity by using the same subnet mask length


B. reduces the routing table size by using automatic route summarization
C. reduces the routing table size by using manual route summarization
D. allows the subnet mask and classful routing updates to be advertised
E. secures the hosts on a subnet by using RFC 1918 addresses

Answer: C

QUESTION: 14
You want to gather as much detail as possible during a network audit with a minimal impact on the
network devices themselves.
Which tool would you use to include data time stamping across a large number of interfaces while
being customized according to each interface?

A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol

Answer: C

QUESTION: 15
What is the primary consideration when choosing a routed network design over a traditional campus
network design?

A. Layer 3 service support at the network edge


B. the routing protocol choice: open (OSPF) or proprietary (EIGRP)
C. the routing abilities of the host devices
D. the need to control the broadcast domains within the campus core

Answer: A

QUESTION: 16
Which statement is true concerning the data center access layer design?

A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of
services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at the access or
aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual
IP addresses on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the servers to the
aggregation layer.

Answer: B
Cisco 200-310

QUESTION: 17
Which statement is true concerning the data center distribution (aggregation) layer design?

A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by
STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of
any other devices.
C. A mix of both Layer 2 and Layer 3 access is the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging
IP routes and MAC address tables.

Answer: C

QUESTION: 18
When considering the three VoIP design models - single site, centralized multisite, and distributed
multisite - which question below would help to eliminate one of the options?

A. Will the switches be required to provide inline power?


B. Will users need to make offsite calls, beyond the enterprise?
C. Will users require applications such as voice mail and interactive voice response?
D. Are there users whose only enterprise access is via a QoS-enabled WAN?

Answer: D

QUESTION: 19
With deterministic Wireless LAN Controller redundancy design, the different options available to the
designer have their own strengths. Which statement is an example of such a strength?

A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of
oversubscription on aggregate network performance.
B. N+N redundancy configuration allows logically grouping access points on controllers to minimize
intercontroller roaming events.
C. N+N+1 redundancy configuration has the least impact to system management because all of the
controllers are colocated in an NOC or data center.
D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the
same subnet for more efficiency.

Answer: B

QUESTION: 20
When there is a need for immunity to EMI for connecting locations that are greater than 100 meters
apart, which two solutions can be utilized? (Choose two.)

A. multimode fiber
B. Fibre Channel
C. HVDC transmission lines
D. single-mode fiber
E. serial RS-232
Cisco 200-310

F. Gigabit Ethernet 1000BASE-CX

Answer: A,D

QUESTION: 21
Which mode is used to exclusively look for unauthorized access points?

A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode

Answer: C

QUESTION: 22
OSPF will be used as the IGP within a campus network. Which two things should you consider before
deployment? (Choose two.)

A. All areas need to connect back to area 0.


B. The OSPF process number on each router should match.
C. NSSA areas should be used when an area cannot connect directly to area 0.
D. Stub areas should be connected together using virtual links.
E. ECMP may cause undesired results depending on the environment.

Answer: A,E

QUESTION: 23
Which is the North American RIR for IPv4 addresses?

A. RIPE
B. ARIN
C. IANA
D. IEEE
E. APNIC

Answer: B

QUESTION: 24
An enterprise campus module is typically made up of four submodules, as described by the Cisco
Enterprise Architecture Model. Which two submodules are part of this module? (Choose two.)

A. DMZ
B. enterprise branch
C. building distribution
D. server farm/data center
E. MAN

Answer: C,D
Cisco 200-310

QUESTION: 25
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the
most important consideration when passing corporate traffic over the public Internet?

A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency

Answer: A

QUESTION: 26
Which type of area should you use in an enterprise OSPF deployment if you want to prevent
propagation of type 5 LSAs but still allow the redistribution of external routes?

A. stub
B. totally stubby
C. backbone
D. NSSA
E. virtual link

Answer: D

QUESTION: 27
Which protocol is used for voice bearer traffic?

A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP

Answer: B

QUESTION: 28
Refer to the exhibit.
Cisco 200-310

On which router should you configure redistribution?

A. Router 1
B. Router 2
C. Router 3
D. Router 4
E. Router 5

Answer: B

QUESTION: 29
Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.)

A. NetFlow
B. FWSM
C. ISE
D. VRRP
E. sFLOW

Answer: A,B,C
Cisco 200-310

QUESTION: 30
Which technology allows remote networks to be connected via site-to-site tunnels?

A. IPsec VPN
B. AnyConnect VPN
C. SSL VPN
D. EasyConnect VPN

Answer: A

QUESTION: 31
Which RFC defines the IPv6 standard?

A. RFC 1918
B. RFC 2338
C. RFC 2460
D. RFC 2740

Answer: C

QUESTION: 32
What is the maximum RIPv2 hop count for a reachable route?

A. 13
B. 14
C. 15
D. 16

Answer: C

QUESTION: 33
Which Cisco Wireless LAN Controller interface is used for out-of-band management?

A. service port
B. management port
C. controller port
D. virtual port

Answer: A

QUESTION: 34
In which operation mode does the AP act as a dedicated sensor for location-based and intrusion
detection services?

A. monitor mode
B. promiscuous mode
C. discovery mode
D. sniffer mode
Cisco 200-310

Answer: A

QUESTION: 35
Which HSRP parameters must match, to ensure proper functionality?

A. group parameters
B. priority parameters
C. preempt parameters
D. tracking parameters

Answer: A

QUESTION: 36
What three primary sources of information are needed to perform a network audit? (Choose three.)

A. existing documentation
B. new documentation
C. existing network management software
D. new network management tools
E. management personnel
F. technical personnel

Answer: A,C,D

QUESTION: 37
Which three layers comprise the traditional hierarchical model? (Choose three.)

A. core layer
B. distribution layer
C. access layer
D. aggregation layer
E. network layer
F. Internet layer

Answer: A,B,C

QUESTION: 38
Which first-hop redundancy protocol dynamically distributes client traffic between multiple routers?

A. HSRP
B. VRRP
C. GLBP
D. IGRP

Answer: C
Cisco 200-310

QUESTION: 39
Which three options are characteristics of data center evolution? (Choose three.)

A. consolidation
B. virtualization
C. automation
D. standardization
E. optimization
F. modulation

Answer: A,B,C

QUESTION: 40
Which option is a benefit of the modular approach to network design?

A. higher availability
B. repeatable scalability
C. increased security
D. improved resiliency

Answer: B

QUESTION: 41
Which statement describes the methodology that supports the Cisco Enterprise Architecture
models?

A. It divides the network into functional network modules.


B. It divides the network into role-based network modules.
C. It divides the network into regional network modules.
D. It divides the network into operational network modules.

Answer: A

QUESTION: 42
Which design is the recommended geometric design for routed topologies?

A. linear
B. triangular
C. rectangular
D. circular

Answer: B

QUESTION: 43
Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model
in the data center?

A. It enables NIC teaming.


Cisco 200-310

B. It removes STP dependency.


C. It increases scalability.
D. It decreases convergence.

Answer: A

QUESTION: 44
Router A has three feasible successors to the 192.168.1.0/24 network, which are listed here:
Option 1 has a metric of 8123228.
Option 2 has a metric of 2195467.
Option 3 has a metric of 8803823.
The variance 4 command was issued on Router

A. How many active entries does Router A have in its routing table for the 192.168.1.0/24 network?

A. 0
B. 1
C. 2
D. 3

Answer: C

QUESTION: 45
Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose
two.)

A. split horizon
B. route summarization
C. route poisoning
D. tuned timers

Answer: A,C

QUESTION: 46
Which interior routing protocol has the most preferable administrative distance by default?

A. RIP
B. OSPF
C. EIGRP
D. BGP
E. IS-IS

Answer: C

QUESTION: 47
What are the three modes of unicast reverse path forwarding? (Choose three.)

A. strict
Cisco 200-310

B. loose
C. VRF
D. global
E. PIM
F. local

Answer: A,B,C

QUESTION: 48
A network engineer has been asked to follow a top down design approach. What layer of the OSI
model is used to start the design?

A. physical
B. network
C. transport
D. application

Answer: D

QUESTION: 49
Where in the network hierarchy should network access control be performed?

A. backbone
B. core
C. access
D. distribution

Answer: C

QUESTION: 50
What are two advantages of employing scalability when designing a campus network? (Choose two.)

A. reduces operational cost


B. higher port density
C. investment protection
D. consistent operation
E. improved fault tolerance

Answer: D,E

QUESTION: 51
A network engineer is using the traditional switched hierarchical design. The client has asked to
increase uplink utilization from the access layer to the distribution. How can the engineer attain this
new requirement without adding new physical connections?

A. enable spanning-tree portfast


B. enable VSS at the distribution layer
C. increase the MTU size on the uplink interfaces
Cisco 200-310

D. ensure the root bridge priority is equal on both distribution switches

Answer: B

QUESTION: 52
Multicast has been enabled and configured in the Enterprise, and PIM Sparse-mode has been
enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on
the access layer switches?

A. IGMP snooping
B. Multicast boundary filter
C. PIM dense-mode
D. Dynamic ARP inspection

Answer: A

QUESTION: 53
What two SAN protocols will allow a customer to utilize 10GbE for SAN access? (Choose two.)

A. ISCSI
B. FCoE
C. SATA
D. Fiber Channel
E. AoE

Answer: A,B

QUESTION: 54
Application servers require load balancing and security services. Where in the data center network
should these services be provisioned?

A. core
B. aggregation
C. Layer 3 access
D. distribution

Answer: B

QUESTION: 55
A data center is reaching its power and cooling capacity. What two virtualization technologies can
address the problem by directly reducing the number of physical devices? (Choose two.)

A. virtual switching systems (VSS)


B. virtual device contexts (VDC)
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels (vPC)
F. virtual LANs
Cisco 200-310

Answer: B,C

QUESTION: 56
A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What
routing configuration prefers the IPsec tunnel only in the event of a private line failure?

A. floating static entry


B. EIGRP variance
C. bandwidth metric
D. OSPF maximum paths

Answer: A

QUESTION: 57
When designing a new enterprise campus network, what topology should be used for maximum
scalability?

A. flat
B. three-layer
C. star
D. partial mesh
E. full mesh

Answer: B

QUESTION: 58
A spanning tree topology can be simplified by deploying what Cisco IOS technology in the
distribution block?

A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links

Answer: D

QUESTION: 59
An organization is deciding what routing protocol to use throughout their network. What must be
considered if routing is to be performed at the access layer?

A. reduced scalability of the network when introducing a large number of switch blocks into the
routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Cisco 200-310

Answer: D

QUESTION: 60
A routing protocol neighbor relationship has been established between two routers across the public
Internet using GRE. What technology can be used to encrypt this communication channel?

A. access lists
B. IP security
C. context based access
D. intrusion prevention system

Answer: B

QUESTION: 61
Which statement correctly describes queuing in environments supporting teleworkers?

A. CQ is for time-sensitive protocols.


B. Queuing occurs on the outbound interface.
C. Priority queuing guarantees some level of service to all traffic.
D. Hardware queues are configured for appropriate PQ, CQ, or WFQ.
E. WFQ is the Cisco IOS default on all WAN links regardless of speed.

Answer: B

QUESTION: 62
Which first-hop redundancy protocol dynamically distributes traffic across multiple gateways?

A. HSRP
B. GLBP
C. VRRP
D. IBGP

Answer: B

QUESTION: 63
A network engineer must collect application-level information passing through a router. What two
tools can provide this information? (Choose two.)

A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog

Answer: A,D
Cisco 200-310

QUESTION: 64
What information should be utilized to identify network applications that are running on an existing
network infrastructure?

A. customer information
B. existing documentation
C. traffic analysis
D. external feedback
E. user feedback

Answer: C

QUESTION: 65
A design engineer must send management information messages across the public internet. What
solution provides a secure and encrypted method for passing these messages?

A. SNMP v3
B. NetFlow v9
C. Syslog Traps
D. Secure Shell v2
E. SNMP v2

Answer: A

QUESTION: 66
A network engineer is designing a solution that will monitor IP traffic through corporate routers with
the ability to export the flows to a collection engine without using network probes. What technology
meets this requirement?

A. RMON
B. NetFlow
C. SNMP
D. Syslog
E. IP SLA

Answer: B

QUESTION: 67
A network engineer is following the Cisco enterprise architecture model. Where are aggregation
switches found?

A. Enterprise Campus
B. Enterprise Edge
C. SP Edge WAN
D. Remote Module

Answer: A
Cisco 200-310

QUESTION: 68
What two configurations are Cisco recommended best practices for user access interfaces? (Choose
two.)

A. VTP transparent mode


B. BPDUguard
C. Root Guard
D. Portfast
E. Trunk mode

Answer: B,D

QUESTION: 69
What Cisco product is designed to improve the performance of Windows file and exchange services
in remote data centers?

A. Application Control Engine


B. Wide Area Application Services
C. Cisco Application Policy Infrastructure Controller
D. Cisco Prime Network Services Controller

Answer: B

QUESTION: 70
What design feature should be considered when accessing resources from a remote data center over
a WAN connection?

A. security
B. bandwidth
C. reliability
D. management

Answer: B

QUESTION: 71
What two addresses are defined under RFC 1918? (Choose two.)

A. 19.22.37.1
B. 10.1.7.19
C. 127.0.0.1
D. 172.31.1.1
E. 239.15.12.1

Answer: B,D

QUESTION: 72
What IPv4 addressing technique is used for proper address planning to reduce the number of entries
in a routing table?
Cisco 200-310

A. filtering
B. tunneling
C. summarization
D. translation
E. supernetting

Answer: C

QUESTION: 73
What two components are used when creating an endpoint's modified EUI-64 format IPv6 address?
(Choose two.)

A. IPv6 Prefix
B. 64-bit MAC address
C. 48-bit MAC address
D. IPv4 Address
E. Link Local Suffix

Answer: A,C

QUESTION: 74
A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own are

A. What OSPF area type should be configured?

A. Backbone Area
B. Totally Stub Area
C. Not So Stubby Area
D. Stub Area

Answer: C

QUESTION: 75
What two factors should be considered when deploying an enterprise campus network? (Choose
two.)

A. employees
B. geography
C. applications
D. administration
E. throughput

Answer: B,C

QUESTION: 76
The spanning tree topology can be simplified by deploying what Cisco NX-OS technology in the
distribution and access layer?
Cisco 200-310

A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links

Answer: B

QUESTION: 77
What network technology consolidates network and storage traffic in the data center?

A. virtual storage-area network


B. unified fabric
C. unified computing system
D. virtual switching system

Answer: B

QUESTION: 78
What type of topology supports WAN redundancy when a balance is required between cost, high
availability, and performance?

A. partial meshed
B. full meshed
C. star
D. ring
E. hub-and-spoke
F. bus
G. point-to-point

Answer: A

QUESTION: 79
What is the key limitation of using Internet circuits as a backup to a private enterprise WAN?

A. circuit bandwidth
B. prioritization
C. security
D. operational expense

Answer: B

QUESTION: 80
A network design engineer is seeking a dynamic routing protocol that supports fast convergence in a
Cisco environment. What protocol allows for this?

A. EIGRP
Cisco 200-310

B. OSPF
C. RIP
D. BGP
E. IS-IS

Answer: A

QUESTION: 81
What are two benefits of the bottom-up design approach? (Choose two.)

A. allows a quick response to a design request


B. facilitates design that is based on previous experience
C. requires little or no notation of actual organizational requirements for implementation
D. incorporates organizational requirements
E. provides a broader overview to the organization and the designer

Answer: A,B

QUESTION: 82
Which network layer is the best fit for security features such as DAI and DHCP snooping?

A. campus core
B. enterprise edge
C. campus distribution
D. remote-access VPN
E. enterprise data center
F. campus access

Answer: F

QUESTION: 83
Directory services and electronic messaging are performed at which layer of the network?

A. core
B. application
C. distribution
D. network

Answer: B

QUESTION: 84
Refer to the exhibit.
Cisco 200-310

Which configuration can be used to implement FHRP protocol and load balancing at the same time?

A. R1Interface Ethernet0ip address 171.16.6.5 255.255.255.0standby 1 preemptstandby 1 ip


171.16.6.100standby 1 track Serial0standby 2 preemptstandby 2 ip 171.16.6.200standby 2 track serial
0standby 2 priority 95!!R2interface Ethernet0ip address 171.16.6.6 255.255.255.0standby 1
preemptstandby 1 ip 171.16.6.100standby 1 track Serial0standby 1 priority 95standby 2
preemptstandby 2 ip 171.16.6.200standby 2 track serial 0
B. R1Interface Ethernet0ip address 171.16.6.5 255.255.255.0standby 1 preemptstandby 1 ip
171.16.6.100standby 1 track Serial0standby 1 priority 95!!R2interface Ethernet0ip address 171.16.6.6
255.255.255.0standby 1 preemptstandby 1 ip 171.16.6.100standby 1 track Serial0standby 1 priority
95
C. R1Interface Ethernet0ip address 171.16.6.5 255.255.255.0standby 1 preemptstandby 1 ip
171.16.6.100standby 1 track Serial0standby 1 priority 95standby 2 preemptstandby 2 ip
171.16.6.200standby 2 track serial 0standby 2 priority 95!!R2interface Ethernet0ip address
171.16.6.6 255.255.255.0standby 1 preemptstandby 1 ip 171.16.6.100standby 1 track Serial0standby
2 preemptstandby 2 ip 171.16.6.200standby 2 track serial 0
D. R1Interface Ethernet0ip address 171.16.6.5 255.255.255.0standby 1 preemptstandby 1 ip
171.16.6.100standby 1 track Serial0standby 1 priority 95!!R2interface Ethernet0ip address 171.16.6.6
255.255.255.0standby 1 preemptstandby 1 ip 171.16.6.100

Answer: A

QUESTION: 85
Cisco FabricPath brings the benefits of routing protocols to Layer 2 network Ethernet environments.
What are two advantages of using Cisco FabricPath technology? (Choose two.)

A. Cisco FabricPath provides MAC address scalability with conversational learning.


B. Loop mitigation is provided by the TTL field in the frame.
C. Cisco FabricPath technology is supported in all Cisco platforms and can replace legacy Ethernet in
Cisco 200-310

all campus networks.


D. Cisco FabricPath relies on OSPF to support Layer 2 forwarding between switches, which allows
load balancing between redundant paths.
E. Cisco FabricPath is IETF-standard and is not used with Cisco products.

Answer: A,B

QUESTION: 86
A network design shows two routers that are directly connected to an Ethernet switch using optical
connections. There is an OSPF adjacency between the routers. In this design, which solution ensures
that interface-down detection is reported as quickly as possible to the IGP?

A. optimized OSPF SPF timers


B. Bidirectional Forwarding Detection
C. automatic protection switching
D. optimized OSPF LSA timers
E. Ethernet OAM CFM monitoring

Answer: B

QUESTION: 87
Which statement is true about using a DNS server to discover a controller IP?

A. The AP sends a discovery request to the first controller on the list and then goes down the list
chronologically until it receives a discovery response.
B. The AP sends a discovery request to the last controller on the list and then goes up the list
chronologically until it receives a discovery response.
C. The AP sends a discovery request to all controllers on the list simultaneously.
D. Multiple controller IP addresses in a DNS response are not supported.

Answer: C

QUESTION: 88
Refer to the exhibit.
Cisco 200-310

A network engineer at a technical call center receives a call from a customer complaining that only
56 kbps of data can be transferred over the T1 Frame Relay WAN circuit at a remote site. The
engineer checks the Frame Relay switch and confirms that only 56 kbps is being transferred over the
circuit. The engineer requests the router configuration of the customer headquarters site router.
What is causing this issue to occur?

A. The wrong CIR is configured.


B. The BECN configuration is causing this issue.
C. The class name is spelled wrong under the interface.
D. The wrong DLCI number is assigned to the interface.

Answer: C

QUESTION: 89
Which option is an advanced congestion management mechanism?
Cisco 200-310

A. weighted fair queuing


B. policing
C. payload compression
D. header compression

Answer: A

QUESTION: 90
Which option is an example of physical device virtualization?

A. VSS
B. VPN
C. VRF
D. VLAN

Answer: A

QUESTION: 91
A data center is being deployed, and one design requirement is to be able to readily scale server
virtualization. Which IETF standard technology can provide this requirement?

A. Transparent Interconnection of Lots of Links


B. Cisco FabricPath
C. data center bridging
D. Cisco Unified Fabric

Answer: A

QUESTION: 92
A company would like to distribute a VM hosting cluster between three data centers with the
capability to move VMs between sites. The connectivity between data centers is IP only, and the new
design should use the existing WAN. Which Layer 2 tunneling technology should be used?

A. VPLS
B. L2TPv3
C. OTV
D. AToM

Answer: C

QUESTION: 93
In which two places is redundancy recommended in an enterprise campus network design? (Choose
two.)

A. building distribution
B. campus core
C. building access
D. e-commerce
Cisco 200-310

E. Internet connectivity

Answer: A,B

QUESTION: 94
What are two purposes of route redundancy? (Choose two.)

A. minimize the effect of link failures


B. minimize the effect of internetworking device failures
C. minimize the convergence time of STP
D. load balance across redundant paths
E. save network costs

Answer: A,B

QUESTION: 95
Which two statements are true regarding a hierarchical network? (Choose two.)

A. facilitates choosing the type of routing protocols to be used in the network


B. provides scalability without affecting other layers and functionality
C. provides better performance as network resources are efficiently utilized
D. limits redundancy at the distribution layer
E. complicates manageability because of the added security

Answer: B,C

QUESTION: 96
Which two Cisco data center devices can participate in Cisco FabricPath? (Choose two.)

A. Cisco Nexus 5500 Series Switches


B. Cisco Nexus 1000V Series Switches
C. Cisco Nexus 7000 Series Switches
D. Cisco Nexus 4900 Series Switches
E. Cisco MDS 9500 Series Multilayer Directors

Answer: A,C

QUESTION: 97
Refer to the exhibit.
Cisco 200-310

Assuming that a network will grow exponentially for the next 24 months, what is the main limitation
that must be addressed?

A. scalability
B. serviceability
C. redundancy
D. resiliency

Answer: A

QUESTION: 98
A network engineer is tasked with summarizing the routes to a remote site. What is the optimal
route statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the
corporate WAN?

A. ip route 192.168.100.0 255.255.254.0 10.1.1.1


B. ip route 192.168.100.0 255.255.252.0 10.1.1.1
C. ip route 192.168.100.0 255.255.255.0 10.1.1.1
D. ip route 192.168.101.0 255.255.254.0 10.1.1.1

Answer: B

QUESTION: 99
Refer to the exhibit.
Cisco 200-310

Where should routes in the routing table be aggregated or summarized?

A. in the core toward the data center


B. in the distribution toward the access
C. in the core toward the distribution
D. in the distribution toward the core

Answer: D

QUESTION: 100
Which option is used by OSPF to reduce the flooding domain of database updates in a network?

A. hello packets
B. virtual links
C. interface cost
D. areas

Answer: D
Cisco 200-310

QUESTION: 101
Refer to the exhibit.

Which three OSPF routers are the only routers that may perform summarization with the current
network layout? (Choose three.)

A. Router 2
B. Router 3
C. Router 4
D. Router 5
E. Router 7
F. Router 8

Answer: A,C,E

QUESTION: 102
Which two options should be used to achieve fast convergence in an OSPF network? (Choose two.)
Cisco 200-310

A. Bidirectional Forwarding Detection


B. fast hellos
C. LSA retransmission interval
D. SPF throttle timers
E. LSA group pacing

Answer: A,B

QUESTION: 103
Refer to the exhibit.

Which next hop will the router select if given an IP packet with the destination address 19.48.254.3?

A. Router 2
B. Router 1
C. Interface 0
D. Interface 1

Answer: A

QUESTION: 104
Refer to the exhibit.
Cisco 200-310

In this suboptimal design of a homogeneous Cisco network, which version of spanning tree provides
the fastest convergence?

A. PVST+
B. CST
C. RPVST
D. VSTP
E. PVST

Answer: C

QUESTION: 105
Refer to the exhibit.
Cisco 200-310

The red lines refer to STP blocked ports. What happens if the HSRP active moves to the right
distribution, and the STP root remains on the left distribution?

A. The STP root becomes the gateway.


B. The interdistribution link is used for transit.
C. The HSRP standby becomes the gateway.
D. The interaccess link is used for transit.
E. Host traffic is unable to reach the HSRP active.

Answer: B

QUESTION: 106
Refer to the exhibit.
Cisco 200-310

The organization is migrating away from FHRP. VSS has been implemented on a pair of Cisco Catalyst
6500 Series Switches. In order to avoid changes to end hosts, the default gateway is carried over to
the SVI on the VSS. Why does the implementation plan require a four-hour wait after removing the
FHRP configuration?

A. The VLAN interface MAC address and the FHRP MAC address are different. It takes four hours for
the VLAN interface to come up.
B. The SVI IP address and the FHRP IP address are different. It takes four hours for the SVI to come
up.
C. The VLAN interface MAC address and the FHRP MAC address are different. It takes four hours for
the ARP cache to time out.
D. The VLAN interface IP address and the FHRP IP address are different. It takes four hours for the
VLAN interface to come up.
E. The VLAN interface IP address and the FHRP IP address are different. It takes four hours for the
ARP cache to time out.

Answer: C

QUESTION: 107
Which command is correct for creating a virtual interface on a Cisco wireless controller?

A. config create interface


B. tag interface
C. config interface address
D. untag interface

Answer: C

QUESTION: 108
Which three series of Cisco wireless controllers support wireless Bidirectional Rate Limiting? (Choose
Cisco 200-310

three.)

A. Cisco 2500 Series Wireless Controllers


B. Cisco 5500 Series Wireless Controllers
C. Cisco 5700 Series Wireless Controllers
D. Cisco 7500 Series Wireless Controllers
E. Cisco 8500 Series Wireless Controllers
F. Cisco 7200 Series Wireless Controllers

Answer: B,D,E

QUESTION: 109
Which option can use deep-packet examination to determine the specific nature of an attack?

A. network IPS
B. NetFlow collector
C. stateful firewall
D. syslog server

Answer: A

QUESTION: 110
Refer to the exhibit.

Which location is best for placing a monitor-only IPS that has visibility into the most data center
traffic?

A. inline before the firewall


B. inline after the firewall
C. passive off the firewall
Cisco 200-310

D. passive off the internal switch

Answer: D

QUESTION: 111
A remote user for a company must periodically connect to the company network to access internal
resources using a company laptop with software that was preinstalled by the IT department. Which
VPN method is used for connectivity?

A. DMVPN
B. SSL VPN
C. IPsec VPN
D. GET VPN

Answer: C

QUESTION: 112
Which statement is true about the Cisco NAC Appliance?

A. recognizes users, their devices, and their roles in the network


B. does not offer audit and reporting features
C. must be placed inline with other network devices
D. does not recognize guest users

Answer: A

QUESTION: 113
Which two Cisco products can be used in a data center to support OTV technology? (Choose two.)

A. Cisco Nexus 5500 Series Switches


B. Cisco Nexus 7000 Series Switches
C. Cisco ASR 1000 Series Routers
D. Cisco ASR 9000 Series Routers
E. Cisco Nexus 3000 Series Switches

Answer: B,C

QUESTION: 114
Which IETF standard technology can be used with data center design to readily scale server
virtualization?

A. Transparent Interconnection of Lots of Links


B. OTV
C. vPC
D. FCoE

Answer: A
Cisco 200-310

QUESTION: 115
Which three options are examples of network logical virtualization? (Choose three.)

A. virtual PortChannel
B. virtual machine
C. Virtual Device Context
D. Virtual Switching System
E. virtual device driver

Answer: A,C,D

QUESTION: 116
Which type of structure consists of the addressing, routing protocols, QoS, and security components?

A. logical
B. physical
C. layered
D. virtual

Answer: A

QUESTION: 117
What phase of Cisco's PPDIOO is the final test of the appropriateness of the design?

A. Operate
B. Optimize
C. Design
D. Implement

Answer: A

QUESTION: 118
What phase of Cisco's PPDIOO includes the identification and resolution of issues prior to moving the
entire network to production?

A. Optimize
B. Operate
C. Implementation
D. Design

Answer: A

QUESTION: 119
You want to gather as much detail as possible during a network audit, to include data time stamping
across a large number of interfaces, customized according to interface, with a minimal impact on the
network devices themselves. Which tool would you use to meet these requirements?
Cisco 200-310

A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol

Answer: C
NetFlow provides extremely granular and accurate traffic measurements and a high-level collection
of aggregated traffic. The output of netflow information is displayed via the show ip cache flow
command on routers. The Table shows a description of the fields for NetFlow output.
Table. Netflow Output escription

QUESTION: 120
You want to gather as much detail as possible during a network audit with a minimal impact on the
network devices themselves. Which tool would you use to include data time stamping across a large
number of interfaces while being customized according to each interface?

A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol

Answer: C

QUESTION: 121
In which phase of PPDIOO are the network requirements identified?
Cisco 200-310

A. Design
B. Plan
C. Prepare
D. Implement
E. Operate
F. Optimize

Answer: B

Plan Phase
The Plan phase identifies the network requirements based on goals, facilities, and user needs. This
phase characterizes sites and assesses the network, performs a gap analysis against best-practice
architectures, and looks at the operational environment. A project plan is developed to manage the
tasks, responsible parties, milestones, and resources to do the design and implementation. The
project plan aligns with the scope, cost, and resource parameters established with the original
business requirements. This project plan is followed (and updated) during all phases of the cycle.

QUESTION: 122
Which is part of the Prepare phase of PPDIOO?

A. Obtain site contact information


B. Perform network audit
C. Identify customer requirements
D. Perform gap analysis

Answer: C
Cisco 200-310

Prepare Phase
The Prepare phase establishes organization and business requirements, develops a network strategy,
and proposes a high-level conceptual architecture to support the strategy. Technologies that support
the architecture are identified. This phase creates a business case to establish a financial justification
for a network strategy.

QUESTION: 123
When designing the identity and access control portions for the enterprise campus network, which
of these solutions would be the most appropriate solution to consider?

A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. NetFlow

Answer: A
Cisco 200-310

QUESTION: 124
Which is the purpose of the Cisco NAC Profiler?

A. Automates discovery and inventory of all LAN attached devices


B. Generates a profile based on username and group
C. Learns and creates a database of virus definitions based on LAN traffic
D. A database used to map user VPN accounts

Answer: A
Cisco NAC Profiler: Enables network administrators to keep a real-time, contextual inventory of all
devices in a network. It greatly facilitates the deployment and management of Cisco Network
Admission Control (NAC) systems by discovering and tracking the location and type of all LANattached
endpoints, including those that are not capable of authenticating. It also uses the
information about the device to determine the correct policies for NAC to apply.

QUESTION: 125
Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other
authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?

A. RADIUS
B. LEAP
C. IPsec
D. TACACS
E. ISAKMP

Answer: A
Cisco 200-310

Cisco Identity-Based Network Services


The Cisco Identity-Based Network Services solution is a way to authenticate host access based on
policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of
VLANs on a per-user basis, guest VLANs, and 802.1X with port security.
The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting
or denying access to the network. The 802.1 X protocol operates between the end-user client
seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the
network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called
authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the
user account database used to apply authentication and authorization.
With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs
(EAPoL) to send the credentials and initiate a session to the network. After the host and switch
establish LAN connectivity, username and password credentials are requested. The client host then
sends the credentials to the switch, which forwards them to the RADIUS ACS.
The RADIUS ACS performs a lookup on the username and password to determine the credentials'
validity. If the username and password are correct, an accept message is sent to the switch or AP to
allow access to the client host. If the username and password are incorrect, the server sends a
message to the switch or AP to block the host port.
Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch,
AP, and back-end RADIUS server.

QUESTION: 126
Which protocol is used for voice bearer traffic?

A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP

Answer: B
VoIP Control and Transport Protocols
A number of different protocols are used in a VoIP environment for call control, device provisioning,
and addressing.
Figure 14-15 shows those protocols focused on VoIP control and transport.
Cisco 200-310

QUESTION: 127
Which protocol is used to reserve bandwidth for the transport of a particular application data flow
across the network?

A. cRTP
B. IEEE 802.1P
C. RSVP
D. LFI
E. Auto QOS

Answer: C
RSVP Signaling protocol that enables end stations or applications to obtain guaranteed bandwidth
and low delays for their data flows.

QUESTION: 128
Which two features are supported by single wireless controller deployments? (Choose two.)

A. automatic detection and configuration of LWAPPs


B. LWAPP support across multiple floors and buildings
C. automatic detection and configuration of RF parameters
D. Layer 2 and Layer 3 roaming
E. controller redundancy
F. mobility groups

Answer: A,B

QUESTION: 129
Which four services does the architecture for Media Services contain? (Choose four.)

A. access services
B. transport services
C. storage services
D. forwarding services
E. session control services
F. security services
G. filtering services
H. remote access services

Answer: A,B,C,E
An architecture framework for media services supports different models of video models. As shown
in Figure 14-13, the network provides service to video media in the Media Services Framework.
Those services are access services, transport services, bridging services, storage servers, and session
control services, which arc provided to endpoints.
¦ Access services provide identity of end devices, mobility, and location services.
¦ Transport services provide QoS for reliable packet delivery.
¦ Bridging services provide transcoding, conferencing, and recording services of media streams.
¦ Storage services provide capture and storage of media streams and content management and
Cisco 200-310

distribution.
¦ Session control services provide session signaling and control and gateway services.

QUESTION: 130
Refer to the exhibit.
Cisco 200-310

Which layer is the distribution layer?

A. Layer A
B. Layer B
C. Layer C
D. Layers A and B form a consolidated core and distribution layer

Answer: B

QUESTION: 131
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?

A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable

Answer: C
Any cast is a network addressing and routing methodology in which data grams from a single sender
are routed to the topologically nearest node in a group of potential receivers all identified by the
Cisco 200-310

same destination address.


Link: http://en.wikipedia.org/wiki/Anycast

QUESTION: 132
What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch
office environment?

A. CST
B. RSPT
C. PVST
D. MISTP
E. Rapid PVST +

Answer: E

QUESTION: 133
Refer to the exhibit.

A standard, Layer 2 campus network design is pictured. Which numbered box represents the
Cisco 200-310

distribution layer?

A. #1
B. #2
C. #3
D. #4

Answer: B

QUESTION: 134
Which two are types of network virtualization? (Choose two.)

A. VSS: Virtual Switching System


B. VRF: virtual routing and forwarding
C. VCI: virtual channel identifier
D. VLSM: variable length subnet masking
E. VM: virtual machine
F. VMP: Virtual Memory Pool

Answer: A,B
Network virtualization encompasses logical isolated network segments that share the same physical
infrastructure. Each segment operates independently and is logically separate from the other
segments. Each network segment appears with its own privacy, security, independent set of policies,
QoS levels, and independent routing paths.
Here are some examples of network virtualization technologies:
¦ VLAN: Virtual local-area network
¦ VSAN: Virtual storage-area network
¦ VRF: Virtual routing and forwarding
¦ VPN: Virtual private network
¦ VPC: Virtual Port Channel

QUESTION: 135
You are tasked with designing a new branch office that will support 75 users with possible expansion
in the future and will need a highly available network. Which of the branch design profiles should be
implemented?

A. large branch design


B. medium branch design
C. teleworker design
D. small branch design

Answer: B
Medium Branch Design
The medium branch design is recommended for branch offices of 50 to 100 users, which is similar to
the small branch but with an additional access router in the WAN edge (slightly larger) allowing for
redundancy services. Typically, two 2921 or 2951 routers are used to support the WAN, and separate
access switches are used to provide LAN connectivity.
Cisco 200-310

QUESTION: 136
Which two can be used as a branch office WAN solution? (Choose two.)

A. frame relay
B. MPLS
C. Metro Ethernet
D. GPRS
E. dial-up modem
F. 3G USB modems

Answer: B,C
Explanation
Frame relay is old 'shared' technology today's sites use some flavor or Metro E or MPLS/VPN

QUESTION: 137
What is the acceptable amount of one-way network delay for voice and video applications?

A. 300 bytes
B. 1 sec
C. 150 ms
D. 500 ms

Answer: C
Delay Components in VoIP Networks
The ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not
exceed 150 ms to be acceptable, commercial voice quality. In private networks, somewhat longer
delays might be acceptable for economic reasons. The ITU G.114 recommendation specifics that 151-
ms to 400-ms one-way delay might be acceptable provided that organizations are aware that the
transmission time will affect the quality of user applications. One-way delays of above 400 ms are
unacceptable for general network planning purposes.

QUESTION: 138
Which mode is used to exclusively look for unauthorized access points?

A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode

Answer: C
CISENU200_310_02222016.dat

QUESTION: 139
Your company uses OSPF for internal routing. The company will be connected to VendorA via a single
dedicated link and to VendorB via redundant dedicated links. Both vendors also use OSPF for internal
routing.
Which of the following deployments describes the best intra-domain routing practice in this
Cisco 200-310

situation?

A. Connect your company to both VendorA and VendorB using existing OSPF.
B. Redistribute the routes on each link between your company and the vendors to a shared EIGRP
routing protocol.
C. Use IBGP to reach VendorA and EBGP to reach VendorB.
D. Use static routes to reach VendorA and EBGP to reach VendorB.
E. Use static routes to reach both VendorA and VendorB.

Answer: D

QUESTION: 140
You design a network with the following network addresses:
192.168.168.0
192.168.169.0
192.168.170.0
192.168.171.0
192.168.172.0
192.168.173.0
192.168.174.0
192.168.175.0
Which route address is the best summary of these network addresses?

A. 192.168.0.0/24
B. 192.168.171.128/3
C. 192.168.168.0/21
D. 192.168.175.0/3
E. 192.168.0.0/16

Answer: C

QUESTION: 141
Which two methods are used to reduce the mesh links required between iBGP peers in the same AS?
(Choose two.)

A. community
B. route refilectors
C. local preference
D. confederations
E. atomic aggregate

Answer: B,D

QUESTION: 142
Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model
in the data center?

A. It supports NIC teaming.


Cisco 200-310

B. It removes STP dependency.


C. It increases scalability.
D. It improves convergence time.

Answer: A

QUESTION: 143
Which option is an advantage of the bottom-up design model?

A. focuses on the needs of user communities


B. includes a thorough analysis of customer requirements
C. facilitates a quick response to client requests
D. produces a "big-picture" of the desired outcome

Answer: C

QUESTION: 144
A large company requests a hierarchical design model. What tier should be free of physically
connected hosts?

A. core
B. access
C. aggregation
D. distribution

Answer: A

QUESTION: 145
Which two options are benefits of using a modular network architecture? (Choose two.)

A. facilitates troubleshooting
B. accurate monitoring
C. consistent documentation
D. increased filexibility
E. reduced cabling requirements

Answer: A,D

QUESTION: 146
An organization is redesigning a 3-tier hierarchical network into a collapsed core. What design issue
is a primary concern per Cisco best practices?

A. services delineation
B. port density
C. feature availability
D. resource utilization

Answer: D
Cisco 200-310

QUESTION: 147
What three design best practices are key functions of the distribution layer? (Choose three.)

A. fault domain isolation


B. admission control
C. access switch aggregation
D. QoS tagging
E. address summarization
F. end user and application isolation

Answer: A,C,E

QUESTION: 148
What design requirement is necessary for campus network access layer switching?

A. high cost per port


B. high availability
C. high scalability
D. high performance

Answer: C

QUESTION: 149
A remote office has a T1 WAN link to headquarters and a T1 Internet connection. The client requests
WAN redundancy to headquarters with similar bandwidth. What two connection types satisfy this
requirement? (Choose two.)

A. Secondary T1 WAN circuit


B. ISDN BRI
C. IPSec Tunnel over the Internet
D. DWDM
E. POTS Line T1 WAN

Answer: A,C

QUESTION: 150
A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own are

A. What OSPF area type should be configured?

A. Backbone Area
B. Totally Stub Area
C. Not So Stubby Area
D. Stub Area

Answer: C
Cisco 200-310

QUESTION: 151
A network engineer is tasked to upgrade and expand a large existing production network. From the
IOS CLI, what two protocols can be used to build a topology map of the existing network? (Choose
two.)

A. SNMP
B. IP SLA
C. ICMP Echo
D. LLDP
E. Traceroute

Answer: D,E

QUESTION: 152
A network engineer has finished designing and implementing a new network. What two protocols
would they use to gain insight into the network and determine the components that require
optimization? (Choose two.)

A. CDP
B. NetFlow
C. ICMP Echo
D. NMAP
E. SNMP

Answer: B,E

QUESTION: 153
What are two benefits of a structured IPv4 addressing scheme? (Choose two.)

A. reduces routing table size


B. provides increased security
C. allows for address translation to be performed
D. improves manageability and troubleshooting
E. increases high availability

Answer: A,D

QUESTION: 154
What are two reasons discontinuous IPv4 networks hinder scalability? (Choose two.)

A. routing table bloat


B. inability to utilize automatic summarization
C. insufficient IP addresses
D. slowed packet forwarding
E. delayed interface queuing

Answer: A,B
Cisco 200-310

QUESTION: 155
What is a benefit of IPv6 over IPv4 addresses?

A. shorter addresses
B. automatic summarization
C. hierarchal global address space
D. faster IGP convergence

Answer: C

QUESTION: 156
GRE has been used to establish a routing-protocol neighbor relationship between two routers, across
the public Internet. Which technology can you use to encrypt this communication channel?

A. access lists
B. IPsec
C. CBAC
D. IPS

Answer: B

QUESTION: 157
Which option is a benefit of Cisco Discovery Protocol?

A. provides information about directly connected Cisco devices


B. provides greater detail about collected data, including time stamping
C. combines with the network layer data that is gathered by NetFlow when using a NetFlow collector
D. part of the IEEE 802.1ab standard

Answer: A

QUESTION: 158
Which three QoS levels should VoIP clients be set to on a Cisco WLC? (Choose three.)

A. Platinum
B. Bronze
C. Gold
D. Silver
E. Premier
F. Critical

Answer: A,C,D

QUESTION: 159
What is the optimal device and location to fulfill these requirements?
• provide early indication of reconnaissance and scanning activities with blocking capabilities
• require fewer interfaces to inspect traffic to the DMZ and internal network
Cisco 200-310

A. IPS inline outside of the firewall


B. IPS inline inside the firewall
C. Cisco IOS IPS on the border router
D. passive IPS connected to a SPAN port outside of the firewall
E. passive IPS connected to a SPAN port inside the firewall

Answer: A

QUESTION: 160
What are the three models that are required in the systematic approach of the top-down design
methodology? (Choose three.)

A. logical
B. physical
C. layered
D. network components
E. technological
F. protocols
G. virtual

Answer: A,B,C

QUESTION: 161
Refer to the exhibit.

Which functionality must be enabled on router A to connect two networks for translating private
addresses into "legal" public addresses on a one-for-one basis?

A. B. NAT
B. C. VLAN
C. D. GARP
D. PPP

Answer: B
Cisco 200-310

QUESTION: 162
Refer to the exhibit.

You are designing routing between building distribution switches and campus core switches.
Assuming that all links have the same speed, which statement about these designs is true?

A. Option A has more fault tolerance but slower convergence than Option B.
B. Option A has more fault tolerance and faster convergence than Option B.
C. Option B has more fault tolerance but slower convergence than Option A.
D. Option B has more fault tolerance and faster convergence than Option A.

Answer: B

QUESTION: 163
Which technology should a company use to connect a branch office to headquarters via an Internet
connection while maintaining confidentiality and the filexibility to run a routing protocol between the
two locations?

A. GRE over IPsec


B. IPsec
C. GRE
D. SSL VPN

Answer: A

QUESTION: 164
Which WAN technology is a cost-effective method to deliver 100 Mb of bandwidth to multiple
branch offices?

A. DSL
B. DWDM
C. ISDN
D. Metro Ethernet
Cisco 200-310

Answer: D

QUESTION: 165
Which statement describes the recommended deployment of DNS and DHCP servers in the Cisco
Network Architecture for the Enterprise?

A. Place the DHCP and DNS servers in the enterprise campus access layer and enterprise branch.
B. Place the DHCP and DNS servers in the enterprise campus server farm layer and enterprise branch.
C. Place the DHCP server in the enterprise campus core layer and remote access and VPN module,
and place the DNS server in the Internet connectivity module.
D. Place the DHCP server in the enterprise campus distribution layer, and place the DNS server in the
Internet connectivity module.

Answer: B

QUESTION: 166
A network engineer needs to create a controller-based, high-density RF design. Which two factors
determine the cell size? (Choose two.)

A. antenna type
B. ClientLink support
C. TPC threshold setting
D. QoS setting
E. free space path loss

Answer: A,C

QUESTION: 167
Which IP address can be routed to cross the public Internet?

A. 10.31.1.1
B. 192.168.32.1
C. 172.32.1.1
D. 169.254.32.1

Answer: C

QUESTION: 168
Which DHCP option do you need to configure to ensure that an LWAP can communicate with the
Cisco WLC in a different subnet?

A. 7
B. 19
C. 43
D. 150

Answer: C
Cisco 200-310

QUESTION: 169
Which two options can be virtual networking devices? (Choose two.)

A. ESX host
B. VM
C. switches
D. routers
E. Hyper-V host

Answer: C,D

QUESTION: 170 DRAG


DROP
Drag the STP toolkit term on the left to the definition on the right.

Answer: <map><m
x1="16" x2="366"
y1="15" y2="56"
ss="0" a="0" /><m
x1="17" x2="367"
y1="78
y2="116" ss="0" a="0" /><m x1="17" x2="366" y1="137" y2="177" ss="0" a="0" /><m x1="18"
x2="366" y1="197" y2="236" ss="0" a="0" /><m x1="16" x2="366" y1="256" y2="296" ss="0" a="0"
/><m x1="16" x2="366" y1="317" y2="356" ss="0" a="0" /><m x1="18" x2="367" y1="375" y2="416"
Cisco 200-310

ss="0" a="0" /><m x1="396" x2="747" y1="15" y2="55" ss="1" a="0" /><m x1="396" x2="746"
y1="76" y2="116" ss="1" a="0" /><m x1="397" x2="744" y1="135" y2="175" ss="1" a="0" /><m
x1="398" x2="746" y1="195" y2="236" ss="1" a="0" /><m x1="397" x2="745" y1="257" y2="296"
ss="1" a="0" /><m x1="397" x2="745" y1="317" y2="355" ss="1" a="0" /><m x1="396" x2="747"
y1="377" y2="414" ss="1" a="0" /><c start="2" stop="0" /><c start="5" stop="1" /><c start="0"
stop="2" /><c start="6" stop="3" /><c start="3" stop="4" /><c start="1" stop="5" /><c start="4"
stop="6" /></map>

QUESTION: 171 DRAG


DROP
Drag the characteristic on the left to the correct campus design model on the right.
Cisco 200-310

Answer: <map><m
x1="18" x2="368"
y1="21" y2="59"
ss="0" a="0" /><m
x1="19" x2="367"
y1="79
y2="122" ss="0" a="0" /><m x1="18" x2="367" y1="140" y2="180" ss="0" a="0" /><m x1="17"
x2="369" y1="201" y2="242" ss="0" a="0" /><m x1="18" x2="369" y1="262" y2="301" ss="0" a="0"
/><m x1="406" x2="760" y1="47" y2="83" ss="1" a="0" /><m x1="407" x2="756" y1="95" y2="135"
ss="1" a="0" /><m x1="410" x2="759" y1="145" y2="183" ss="1" a="0" /><m x1="409" x2="758"
y1="235" y2="274" ss="1" a="0" /><m x1="409" x2="756" y1="286" y2="325" ss="1" a="0" /><c
start="0" stop="0" /><c start="3" stop="1" /><c start="4" stop="2" /><c start="1" stop="3" /><c
start="2" stop="4" /></map>
Cisco 200-310

QUESTION: 172 DRAG


DROP
Drag the technology on the left to the matching routing protocol on the right.

Answer: <map><m
Cisco 200-310

x1="24" x2="374"
y1="11" y2="53"
ss="0" a="0" /><m
x1="25" x2="373"
y1="74
y2="114" ss="0" a="0" /><m x1="23" x2="375" y1="133" y2="172" ss="0" a="0" /><m x1="24"
x2="374" y1="194" y2="233" ss="0" a="0" /><m x1="23" x2="373" y1="255" y2="293" ss="0" a="0"
/><m x1="22" x2="375" y1="311" y2="351" ss="0" a="0" /><m x1="414" x2="763" y1="39" y2="81"
ss="1" a="0" /><m x1="412" x2="763" y1="87" y2="129" ss="1" a="0" /><m x1="415" x2="762"
y1="188" y2="228" ss="1" a="0" /><m x1="414" x2="765" y1="239" y2="276" ss="1" a="0" /><m
x1="414" x2="762" y1="339" y2="379" ss="1" a="0" /><m x1="415" x2="763" y1="389" y2="429"
ss="1" a="0" /><c start="2" stop="0" /><c start="5" stop="1" /><c start="0" stop="2" /><c start="4"
stop="3" /><c start="1" stop="4" /><c start="3" stop="5" /></map>

QUESTION: 173 DRAG


DROP
Drag the security term on the left to the matching description on the right.
Cisco 200-310

Answer: <map><m
x1="22" x2="374"
y1="23" y2="71"
ss="0" a="0" /><m
x1="25" x2="373"
y1="89
y2="138" ss="0" a="0" /><m x1="25" x2="374" y1="154" y2="202" ss="0" a="0" /><m x1="24"
x2="374" y1="218" y2="267" ss="0" a="0" /><m x1="403" x2="755" y1="23" y2="74" ss="1" a="0"
/><m x1="403" x2="753" y1="88" y2="138" ss="1" a="0" /><m x1="404" x2="753" y1="154"
y2="204" ss="1" a="0" /><m x1="404" x2="754" y1="220" y2="267" ss="1" a="0" /><c start="2"
stop="0" /><c start="3" stop="1" /><c start="0" stop="2" /><c start="1" stop="3" /></map>

QUESTION: 174 DRAG


DROP
Drag the term on the left to the matching deployment scenario on the right.
Cisco 200-310

Answer: <map><m
x1="24" x2="375"
y1="19" y2="58"
ss="0" a="0" /><m
x1="24" x2="374"
y1="81
y2="121" ss="0" a="0" /><m x1="25" x2="373" y1="138" y2="178" ss="0" a="0" /><m x1="23"
x2="373" y1="198" y2="238" ss="0" a="0" /><m x1="404" x2="756" y1="20" y2="59" ss="1" a="0"
/><m x1="405" x2="754" y1="82" y2="121" ss="1" a="0" /><m x1="404" x2="754" y1="139"
y2="181" ss="1" a="0" /><m x1="405" x2="755" y1="198" y2="238" ss="1" a="0" /><c start="1"
stop="0" /><c start="3" stop="1" /><c start="0" stop="2" /><c start="2" stop="3" /></map>

QUESTION: 175
What are two components of the Build phase in the Cisco Design Lifecycle? (Choose two.)

A. Migration
B. Deployment
C. Optimization
Cisco 200-310

D. Design
E. Configuration

Answer: A,B

QUESTION: 176
Which design enables easy and filexible scaling in the Cisco Enterprise Architecture model?

A. modular
B. top-down
C. bottom-up
D. full-mesh

Answer: A

QUESTION: 177
Which two issues are typical challenges to network stability and reliability? (Choose two.)

A. hardware failures
B. layer 1 link failures
C. application failures
D. core layer failures
E. distribution layer failures

Answer: A,B

QUESTION: 178
For a VLAN that requires 70 hosts, which subnet is the most efficient?

A. 10.0.0.1/8
B. 172.31.17.0/26
C. 192.168.1.0/25
D. 192.168.15.0/24

Answer: C

QUESTION: 179
If two routing protocols have the same route and prefix, which effect do they have on the routing
table?

A. Only the route with the lowest administrative distance is added.


B. Only the route with the highest administrative distance is added.
C. Both routes are added.
D. Neither route is added, and a loop is formed.

Answer: A
Cisco 200-310

QUESTION: 180
Which benefit is an advantage of route summarization?

A. It reduces the size of the routing table.


B. It causes routes to be updated more frequently.
C. It lowers the cost metric.
D. It enables neighbor discovery.

Answer: A

QUESTION: 181
Which two states are RSTP port states? (Choose two.)

A. discarding
B. learning
C. blocking
D. listening
E. disabled

Answer: A,B

QUESTION: 182
When is the Cisco FlexConnect design model recommended?

A. when remote-site APs are centrally managed


B. when each remote site has its own wireless controller
C. when each remote site runs VSS
D. when the remote sites use WAN optimization

Answer: A

QUESTION: 183
In which two modes can you deploy Cisco IPS appliances? (Choose two.)

A. inline
B. promiscuous
C. VTP group
D. threat mitigation
E. threat detection

Answer: A,B

QUESTION: 184
According to Cisco best practices, which traffic control should you apply to the strict priority queue?

A. Bandwidth should be limited to one-third of the link capacity.


B. Bandwidth should be limited to 768 kbps.
C. Limits should be applied to non-real-time traffic and all real-time traffic should be permitted.
Cisco 200-310

D. The link serialization delay should be set to less than 100 ms.

Answer: A

QUESTION: 185
According to fundamental design principles, which location is best for implementing Cisco QoS
policies?

A. hardware
B. software
C. Cisco 3900 Series Integrated Services Routers running IOS software
D. WAN routers running IOS software

Answer: A

QUESTION: 186
Which item is the fundamental basis of a virtual network?

A. a VRF instance
B. a MIB database
C. a GRE tunnel
D. redundant hardware

Answer: A

QUESTION: 187
Which network virtualization technique can you implement without disrupting the existing network
design and infrastructure?

A. VRF-Lite
B. EVN
C. MPLS
D. VNET tags

Answer: A

QUESTION: 188
A network engineer must connect two sites. Each site has a different autonomous system number.
Which method do you use to exchange routing information between the sites?

A. OSPFv3
B. BGP
C. static routing
D. EIGRP
E. IGP

Answer: B
Cisco 200-310

QUESTION: 189
A remote worker for a sales company must submit daily updates via the company email system. The
employee does not have a company-issued laptop, so which VPN method is used for connectivity to
the company email server?

A. SSL VPN
B. GETVPN
C. L3VPN
D. DMVPN

Answer: A

QUESTION: 190
Which option is a benefit of Cisco Discovery Protocol?

A. provides information about directly connected Cisco devices


B. provides greater detail about collected data, including time stamping
C. part of the IEEE 802 1ab standard
D. combines with the network layer data that is gathered by NetFlow when using a NetFlow collector

Answer: A
Cisco Discovery Protocol (formerly known as CDP) is a Layer 2, media-independent, and networkindependent
protocol that runs on Cisco devices and enables networking applications to learn about
directly connected devices nearby. This protocol facilitates the management of Cisco devices by
discovering these devices, determining how they are configured, and allowing systems using
different network-layer protocols to learn about each other.

QUESTION: 191
Why would an engineer implement variable-length subnet masks?

A. to make a subnet its own VLAN.


B. to expand an existing subnet .
C. to make a subnet public.
D. to prevent wasting IP addresses

Answer: B

QUESTION: 192
Which technology allow multiple instances of a routing table to coexist on the same router at the
same time?

A. vPC
B. Cisco virtual router
C. VRF
D. VSS

Answer: C
Cisco 200-310

QUESTION: 193
Company ABC has intermittent problems registering site IP phones over the WAN with Cisco Unified
CallManager at headquarter. The company hires a network consultant to help implement QoS in its
network. Which technique should the consultant use to identify traffic and apple alone that travers
the network.

A. policing
B. NBAR
C. priority queuing
D. RSVP

Answer: B

QUESTION: 194
Which statement about VSS is true?

A. it can maintain the topology independently of STP


B. it requires HSRP.
C. it requires STP for link redundancy
D. it has two control planes.

Answer: A

QUESTION: 195
What are two important aspects to consider when looking at backup circuit options for a branch
location?

A. local exchange carrier diversity


B. type of dynamic routing protocol
C. type of core switch
D. backup MPLS connection
E. Internet service provider diversity

Answer: B,E

QUESTION: 196
How many switches can be combined into a single network element using VSS?

A. 4
B. 6
C. 8
D. 2

Answer: D

QUESTION: 197
Which two design decisions can improve network resiliency? (Choose two)
Cisco 200-310

A. implement redundant topology


B. implement redundant links
C. implement serial device connections
D. increase data plane bandwidth
E. reduce network size

Answer: A,B

QUESTION: 198
A consultant at Company XYZ connects to the Guest wireless network but cannot reach the MGMT
VLAN to complete an audit . Other users can connect to the MGMT VLAN without any issues. Why is
the consultant unable to access the MGMT VLAN ?

A. The AP is offline
B. The access is not permitted
C. The MGMT VLAN is down
D. The WLC is offline

Answer: B

QUESTION: 199
Which two processes are included in the Build phase of the Cisco Design Lifecycle? (Choose two)

A. Assessment
B. Analysis
C. Design
D. Validation
E. Deployment

Answer: D,E

QUESTION: 200
When designing changes to an existing network which tow options are documented to understand
environmental constraints? (Choose two)

A. location of existing document


B. floor and rack space availability
C. host naming conventions
D. heating and air conditioning
E. utilization of network resources

Answer: D,E

QUESTION: 201
For a VLAN that requires 60 hosts, which subnet is the most efficient?

A. 172.31.17.0/27
B. 10.0.0.1/20
Cisco 200-310

C.192.68.15.0/24
D. 10.10.10.0/26

Answer: D

QUESTION: 202
Which two considerations are important when designing the access layer? (Choose two)

A. routing between VLANs


B. HSRP implementation
C. load balancing
D. QoS services
E. port security

Answer: D,E

QUESTION: 203
Which Cisco technology can connect more than two switches so that they behave as on switch?

A. Ether Channel
B. Stack Wise
C. VSS
D. routing

Answer: B

QUESTION: 204
Which tow network services should you host on the DMZ ? (Choose two)

A. NFS
B. WWW
C. TACACS+
D. DHCP
E. FTP

Answer: A,E

QUESTION: 205
Which two connector actions are important when designing the core layer?

A. port security
B. PoE
C. Access list requirements
D. low latency
E. redundancy

Answer: D,E
Cisco 200-310

QUESTION: 206
Which tow considerations are important when designing the core layer?
(Choose two)

A. port security
B. PoE
C. Access list requirements
D. low latency
E. redundancy

Answer: D E

QUESTION: 207
Which option is an advantage of a Layer 3 access model over the traditional Layer 2 access model ?

A. increased neighbor adjacencies


B. faster convergence
C. reduced resources on the router
D. reduced size of routing table

Answer: B

QUESTION: 208
Which statement about modular network design is true?

A. Each deployed module is identical to the others, simplifying configuration


B. Each module include access, distribution, and core layers
C. It is a filexible architecture that simplifies design, management and troubleshooting
D. It is complex and should be used only in specialized situations

Answer: B

QUESTION: 209
A network architect working for a larger financial institutions is designing a VPN solution that must
include encryption Which VPN type requirement?

A. GETVPN (Group Encrypted Transport VPN)


B. L2VPN
C. MPLS VPN
D. L3VPN

Answer: A
https://supportforums.cisco.com/t5/vpn/l3vpn-and-ipsec/td-p/2557205
https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encrypted-transportvpn/
prod_presentation0900aecd80582031.pdf

QUESTION: 210
Which statement about using STP in a redundant – link scenario is true?
Cisco 200-310

A. It provides the most efficient use to redundant links.


B. it uses only one redundant link at any one time.
C. it bonds the two links and treats them as one link.
D. it balances traffic by transmitting packets on alternating links.

Answer: D

QUESTION: 211
Under which phase of the Cisco Design Lifecycle would you evaluate the network infrastructure for
its adherence to best polices and corporate policies?

A. In the Validation stage of the Build phase


B. In the Deployment stage of the Build phase
C. In the Assessment stage of the Plane phase
D. In the Optimize stage of the Mange phase

Answer: A

QUESTION: 212
A network engineer must connect two sites. Each site has a different autonomous system number.
Which method do you use to exchange

A. BGP
B. IGP
C. EIGRP
D. OSPFv3

Answer: A

QUESTION: 213
What are two important aspects to consider when looking at backup circuit options for a branch
location? (Choose two)

A. local exchange carrier diversity


B. type of dynamic routing protocol
C. type of core switch
D. backup MPLS connection
E. Internet service provider diversity

Answer: B,E

QUESTION: 214
Which virtualization deployment an engineer will execute to separate to acompplish security
policies?

A. Create a Guest area for WLAN and LAN connections


B. Same corporate Network with NAC capabilities.
Cisco 200-310

C. Something using VLANs


D. dont remember

Answer: B

QUESTION: 215
What Routing Protocol is clasfull

A. OSPF
B. EIGRP
C. IGRP
D. RIPv1
E. RIPv2
F. eBGP

Answer: CD
QUESTION NO 216
Two companies that want to connect with multiple providers vendors, what protocol is the proper
one to use

A. BGP
B. IS-IS
C. OSPF
D. EIGRP

Answer: A

QUESTION: 217
Consider the reservation of IP Addressing what mask you will use in a point to point connection
between two Buildings

A. 255.255.255.0
B. 255.255.252.0
C. 255.255.255.252
D. 255.255.255.254

Answer: C

QUESTION: 218
Which option is an object instance than an API identifies using informationmodel-based
architecture?

A. DN
B. Class
C. Method
D. MO

Answer: A
Cisco 200-310

https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/aci-fabriccontroller/
white-paper-c11-729586.html

QUESTION: 219
In Cisco ACI, which option is the unified point of automation , management , monitoring and
programmble?

A. Python
B. REST
C. APIC
D. Postman

Answer: C

QUESTION: 220
You are deploying IP Telephony over a WAN. What will be the DSCP value for the voice traffic?

A. EF
B. AF41
C. COS4
D. BE

Answer: A

QUESTION: 221
What should be considered when scaling EIGRP (Choose three)?

A. CPU
B. Peers
C. Query scope
D. Interface Bandwidth
E. Memory
F. IP Address

Answer: A, B, C

QUESTION: 222
What is the maximum number of switches in VSS?
A.2
B.4
C.6
D.8

Answer: A

QUESTION: 223
What is the technology that allows you to combine more than two switches?
Cisco 200-310

A. Stackwise
B. VSS
C. vPC
D. EtherChannel

Answer: A

QUESTION: 224
In which phase of cisco design life cycle the validation of network infrastructure happened.

A. Assessment in plan
B. Deployment in build
C. Validation in build
D. Optimization in operate

Answer: C

QUESTION: 225
What kind of servers you should place in DMZ?

A. WWW
B. FTP
C. DHCP
D. TACACS+
E. NFP

Answer: A, B

QUESTION: 226
What is the VLAN subnet that can handle 60 hosts?

A. /21
B. /24
C. /25
D. /26

Answer: D

QUESTION: 227
What is the benefit of using VLSM?

A. To save a wasting of IP Address


B. To expand a subnet

Answer: A

QUESTION: 228
Which two design decision can improve network resiliency (Choose two)?
Cisco 200-310

A. Implement redundant link


B. Increase data plane bandwidth
C. Implement serial device connection
D. Reduce network size
E. Implement redundant topology

Answer: A, E

QUESTION: 229
In an enterprise Layer 2 switched network, which protocol must be running to enable link
redundancy?

A. CDP
B. PaGP
C. LACP
D. STP

Answer: D

QUESTION: 230
A network engineer must collect application-level information of deep attack?

A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog

Answer: A

QUESTION: 231
which QoS level should VOIPset be configured on WLC ?

A. Platinum
B. Gold
D. Premier
E. Critical

Answer: A

QUESTION: 232
When designing changes to an existing network, which two options are documented to understand
environmental constraint? (Choose two.)

A. Utilization of network resources


B. Floor and rack space availability
C. Host naming conventions
Cisco 200-310

D. Heating and Air conditioning


E. Location of existing documentation

Answer: B, D

QUESTION: 233
What will extend a trust boundary (there is switch interface configuration with separate voice VLAN
and data VLAN configured where the phone is connected to, also small diagram showing endpoint
(host), IP Phone, Access Switch, Distribution Switch, Core Switch and Data Centre Aggregation
switch)?

A. Multiple layers PC
B. IP Phone
C. Access Switch
D. Distribution Switch
E. Core Switch

Answer: B

QUESTION: 234
What query should you make if you want to find all objects of a particular type in an MIT tree?

A. mid-tree-level
B. class-level
C. object-level
D. tree-level

Answer: B
https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centricinfrastructure/
white-paper-c11-733105.html

QUESTION: 235
Between what two modules DMZ should be located? (Choose two)?

A. Internet
B. Building access
C. Building distribution
D. Corporate network

Answer: A, D

QUESTION: 236
which options characterizes normal traffic flow and performance (Choose two)?

A. Bandwidth
B. Utilization
C. Availability
D. Baseline
Cisco 200-310

Answer: A, B

QUESTION: 237
What describes the link performance?

A. Bandwidth
B. Utilization
C. Availability

Answer: A
https://en.wikipedia.org/wiki/Network_performance

QUESTION: 238
Which one of the following is “synchronous link” design?

A. SSL VPN over serial cable modem


B. Bonded T1s
C. Internet VPN
D. MPLS VPN

Answer: B
https://community.spiceworks.com/topic/325935-mpls-speeds

QUESTION: 239
What DNS entry to use for WLC with firmware version 6.0 or later so an Access Point can determine
the controller’s IP address?

A. DNS A record with controller’s hostname


B. DHCP option 43
C. cisco-capwap-controller
D. cisco-lwapp-controller

Answer: C

QUESTION: 240
What are two advantages of a modular design (Choose two)?

A. Increased scalability
B. Security can be implemented at every module
C. Increased redundancy as you can add modules
D. Hierarchy included in design

Answer: A, D
http://www.ciscopress.com/articles/article.asp?p=1073230&seqNum=2
https://thwack.solarwinds.com/docs/DOC-175763
Cisco 200-310

QUESTION: 241
What tool would you use to capture, segregate and analyse IP traffic?

A. Protocol Analyser
B. NetFlow

Answer: B

QUESTION: 242
What tool would you use to decode protocols?

A. Protocol Analyser
B. NetFlow
C. Spectrum Analyser

Answer: A

QUESTION: 243
Which one of the following represent correct IPv6 Global Unicast address format?

A. 48bit(Global Prefix)+16bit(Subnet ID)+64bit(Interface ID)


B. 16bit(Subnet ID)+ 48bit(Global Prefix)+64bit(Interface ID)
C. 64bit(Interface ID)+16bit(Subnet ID)+ 48bit(Global Prefix)
D. 64bit(Interface ID)+ 48bit(Global Prefix)+16bit(Subnet ID)

Answer: A

QUESTION: 244
What access policies to set up for remote VPN access (Choose three)?

A. Admins are centrally authenticated with full network access


B. Partners are centrally authenticated with access limited by use of ACLs
C. Employees are centrally authenticated with access limited by use of ACLs
D. Admins are locally authenticated with full network access
E. Partners are centrally authenticated with full access
F. Employees are centrally authenticated with full access

Answer: A, B, C

QUESTION: 245
What VPN tunnelling technology supports multicast?

A. DMVPN spoke-to-spoke
B. IPSec direct tunnelling hub-and-spoke
C. Easy VPN
D. IPSec direct tunnelling spoke-to-spoke

Answer: A
Cisco 200-310

QUESTION: 246
How to reduce the size of a routing table? (Choose two):

A. NAT
B. Summarization
C. Static routes
D. VLAN

Answer: A, B

QUESTION: 247
What are two classful routing protocols? (Choose two):

A. RIP
B. IGRP
C. OSPF
D. RIPv2
E. BGP

Answer: A, B

QUESTION: 248
What statement about EVN is true?

A. Support RIP
B. Support OSPFV3
C. Required LDP
D. Support as many as 32 virtual networks per device

Answer: D
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evnoverview.
html

QUESTION: 249
What is the best point to deploy the IPS, not to have false positives, since the traffic is already
filtered?
Cisco 200-310

A. Inline before the firewall


B. Inline after the firewall
C. Passive of the firewall
D. Passive of the Switch

Answer: B
https://supportforums.cisco.com/t5/intrusion-prevention-systems-ids/correct-placement-of-ids-ipsin-
network-architecture/td-p/2632437

QUESTION: 250
Which two high-level design components are included in Unified Wireless network?

A. Local
B. Cisco FlexConnect
C. Deterministic
D. N+1
E. Dynamic

Answer: A, B

QUESTION: 251
An organization needs to implement isolated logical structure due to compliance regulations. What
complex access control network virtualization method can it use?

A. The IT organization creates a quarantine network for end points that do not meet the posture
assessment requirements
B. The IT organization creates a separate guest network for wireless and wired clients
C. The IT organization acts as a client serving different, isolated departments
Cisco 200-310

Answer: A

QUESTION: 252
Which subnet mask should you use on point-to-point links to avoid wasting IP addresses?

A. 255.255.255.252
B. 255.255.255.250
C. 255.255.255.0
D. 255.255.255.248

Answer: A

QUESTION: 253
What IP address is used for broadcast for 120.20.78.8/30?

A. 120.20.78.11
B. 120.20.78.8
C. 120.20.78.12
D. 120.20.78.1

Answer: A

QUESTION: 254
Which connection provides cost effective backup connectivity for a branch network?

A. ATM
B. MPLS
C. SSL VPN
D. Ineternet VPN

Answer: D

QUESTION: 255
Which application provides AAA service for cisco devices?

A. TACACS
B. RADIUS

Answer: A

QUESTION: 256
Which Data Centre connection support QoS full mesh deployment and typically offer SLA?

A. MPLS

Answer: A
Cisco 200-310

QUESTION: 257
An infrastructure is designing a private WAN infrastructure to support an Organization and must
support quality of service and multicast functionality to the remote sites. Which WAN technology
support this requirement?

A. MPLS
B. IPsec VPN
C. DMVPN
D. SSL VPN

Answer: A

QUESTION: 258
Which type of router connects to two different OSPF areas?

A. area border
B. autonomous system boundary
C. backbone
D. internal

Answer: A
https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13703-8.html

QUESTION: 259
Which routing protocol provides the fastest convergence and greatest filexibility within a campus
environment?

A. IS-IS
B. BGP
C. OSPF
D. EIGRP

Answer: D

QUESTION: 260
How does the use of multiple areas in a link state routing protocol improve network scalability?

A. reduces network bandwidth


B. permits partial table updates
C. enables route summarization
D. overcomes router hop limit.

Answer: C

QUESTION: 261
Which option is an example of a fixed two-level hierarchical routing protocol?

A. OSPF
Cisco 200-310

B. RIPv2
C. EIGRP
D. static routes

Answer: A

QUESTION: 262
Which virtualization solution provides redundancy using a pair of switches that appear as one logical
switch and removes the need for a First HOP Redundancy Protocol?

A. VDC
B. VRRP
C. vPC
D. VSS

Answer: D
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-virtual-switchingsystem-
1440/prod_qas0900aecd806ed74b.html

QUESTION: 263
An engineer wants to find all of the objects of a certain type available in the MIT. Which kind of query
must be performed?

A. object-level
B. tree-level
C. class-level
D. subtree-level

Answer: D

QUESTION: 264
At which layer of the network should you perform traffic filtering and Qos classification?

A. session
B. distribution
C. application
D. core

Answer: C

QUESTION: 265
While designing a remote access VPN, a customer has requested three different levels of access to be
granted for administrators, employees, and partners. Which three access policies must be configured
for the three groups? (Choose Three)

A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Adminitrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with fill access to the internal infrastructure.
Cisco 200-310

D. Employee are centrally authenticated with limited network access controlled with ACLs.
E. Employees are centrally authenticated with full access to the internal infrastructure.
F. Partners are centrally authenticated with full access to the internal infrastructure.

Answer: DEF

QUESTION: 266
Which two techniques can you use to reduce the size of a network routing table?

A. implement VPN
B. route summarization
C. implement NAT
D. configure static routing
E. utilizing a default route

Answer: BE

QUESTION: 267
Traditionally, the DMZ exist between which two locations? (Choose two)

A. building distribution
B. building access
C. corporate network
D. metro access
E. Internet

Answer: CE

QUESTION: 268
An engineer wants to ensure that the Spanning Tree topology appears loop free while redundant
switches are present. Which Layer 2 technology must be used?

A. VPC
B. PaGP
C. LACP
D.OTV

Answer: C

QUESTION: 269
Which two options best describe the top-down design approach? (Choose two)

A. The approach begins with the needs of the organization


B. The design will meet both current and future requirements.
C. Organizational requirements should not be included.
D. The design is based on previous experience and allows for a quick solution.
E. The approach begins with the physical layer of the OSI model.
Cisco 200-310

Answer: AB
https://www.cisco.com/c/dam/en_us/training-events/le31/le46/cln/qlm/CCDA/design/top-downapproach- to-
network-design-3/player.html

QUESTION: 270
An engineer is planning branch WAN links to support unified communications. Which DSCP value
must be assigned to voice traffic?

A. EF
B. AF41
C. COS4
D. BE

Answer: A
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/QoSSRND-
Book/QoSIntro.html

QUESTION: 271
Which option best describes the high-level design document?

A. It includes specific information such as hardware models, software versions, IP addressing, and
routing protocols.
B. It contains the test plan to certify that the customer’s network is ready for use.
C. it contains the steps needed to install and configure the network equipment and the steps that
verify basic network operation.
D. it includes business and technical requirements and the proposed network architecture.

Answer: D
https://learningnetwork.cisco.com/thread/98302
"High-level design (HLD) explains the architecture that would be used for developing a software
product. The architecture diagram provides an overview of an entire system, identifying the main
components that would be developed for the product and their interfaces. The HLD uses possibly
nontechnical to mildly technical terms that should be understandable to the administrators of the
system

QUESTION: 272
Which value must you configure on a Microsoft DHCP server so that Cisco wireless Aps can locate the
wireless controllers?

A. the length value


B. the IP DHCP pool name
C. a vendor class identifier
D. the Type suboption code Oxe1

Answer: B

QUESTION: 273
Which tool captures network traffic, decodes the protocols in the captured packets, and provides
Cisco 200-310

statistics to characterize errors, and response time?

A. continuity tester
B. protocol analyzer
C. spectrum analyzer
D. bit error rate tester

Answer: B
Protocol analyzeris a tool that captures network traffic,decodes the protocols in the captured
packets, andprovides statistics to characterize load, errors, andresponse time

QUESTION: 274
Which statement about using VSS on a pair of switches is true?

A. IT enables the pair to operate as one logical switch.


B. It requires HSRP
C. It enables the administrator to mange each switch separately
D. it blocks traffic on the redundant link to prevent loops.

Answer: A
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SX/configuration/guide/book/vss.html#wp1062785

QUESTION: 275
A network engineer is tasked with summarizing the routes to a remote site. What is the optimal
route statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the
corporate WAN?

A. ip route 192.168.100.0 255.255.254.0


B. ip route 192.168.100.0 255.255.252.0
C. ip route 192.168.100.0 255.255.255.0
D. ip route 192.168.101.0 255.255.254.0

Answer: B

QUESTION: 276
Which scenario is the best example of a single-homed connected infrastructure?

A. a data center that is connected to one service provider over an MPLS circuit and another service
provicer over an Ethernet connection.
B. a remote office that is connected to the WAN using a DSL provider and a cable provider.
C. a small office that uses a DSL link to connect to the WAN.
D. to corporate office that uses two separate routers to connect to two different service providers.

Answer: C

QUESTION: 277
Which address is the broadcast address of subnet 120.20.78.8/30?
Cisco 200-310

A. 120.20.78.12
B. 120.20.78.1
C. 120.20.78.11
D. 120.20.78.8

Answer: C

QUESTION: 278
Which two major campus design models does the cisco unified wireless network support?

A. Cisco FlexConnect
B. N+N+1
C. Deterministic
D. Local Mode
E. Dynamic

Answer: AD
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Apr2014/CVDCampusWirelessLANDesignGuide-
APR14.pdf
Wireless Design Models Cisco Unified Wireless networks support two major campus design models:
Local mode and Cisco FlexConnect.

QUESTION: 279
Which two protocols are classful routing protocols? (Choose Two)

A. RIPv2
B. RIPv1
C. IGRP
D. OSPF
E. BGP

Answer: BC
Classless routing protocols do send the subnet mask with their updates. Thus,Variable Length Subnet
Masks (VLSMs) are allowed when using classless routing protocols. Examples of classful routing
protocols include RIPv1 and IGRP
https://supportforums.cisco.com/legacyfs/online/legacy/6/6/3/15371366-
Classful%20vs%20Classless%20Routing.pdf

QUESTION: 280
From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve
bootstrap information?

A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller
Cisco 200-310

Answer: A

QUESTION: 281
When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated
Configuration management?

A. IOS
B. REST API
C. APIC CLI
D. HTML

Answer: B
Integrated configuration management using the APIC GUI, REST API or Python scripts, all based on a
consistent ACI object model
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-
x/Operating_ACI/guide/b_Cisco_Operating_ACI/b_Cisco_Operating_ACI_chapter_01001.html

QUESTION: 282
Which VPN tunneling technology supports IP multicast?

A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke

Answer: A

QUESTION: 283
Which Layer in the Cisco Enterprise Archetecture model is highly available, has fast convergence, and
should avoid packet manipulation?

A. Campus distribution
B. enterprise data center
C. enterprise edge
D. campus access
E. campus core
F. remote access VPN

Answer: E
http://www.ciscopress.com/articles/article.asp?p=1315434

QUESTION: 284
In the traditional hierarchical LAN design, which two statements about the distribution layer are
true? (Choose Two)

A. It uses Layer 2 switching only.


B. It typically is connected directly to the internet
Cisco 200-310

C. it aggregates data from the access layer


D. Policy is omplemented at this layer
E. It provides users direct access to the network.

Answer: CD
http://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4

QUESTION: 285
Refer to exhibit.

Based on the following output from the access switch, which option is the trust boundry for QoS?
Cisco 200-310

A. IP phone
B. access
C. core
D. endpoint
E. distribution

Answer: E

QUESTION: 286
An engineer is desigining a network that is divided into multiple areas and supports a mixed vendor
routing environment. Which interior gateway protocol must be selected?

A. EIGRP
B. OSPF
C. BGP
D. RIPv2

Answer: A
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6800-series-switches/guidec07-
733457.html

QUESTION: 287
Which two benefits are realized by establishing virtualization in a campus network? (Choose Two)

A. enables path isolation


B. enhances network agility
C. consolidates applications
D. enables unlimited scalability
E. reduces network bandwidth
Cisco 200-310

Answer: BD
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/network-virtualizationsolutions/
net_brochure0900aecd804a17db.html

QUESTION: 288
Which option is one of the methods that Cisco routers and switches can use to share information
between directly connected devices on a regular basis?

A. NetFlow
B. ARP
C. NHRP
D. CDP

Answer: A

You might also like