Professional Documents
Culture Documents
200-310 Update2n
200-310 Update2n
Exam 200-310
Product
288 Q&A
Type
Cisco 200-310
QUESTION: 1
Which two statements about designing the Data Center Access layer are correct? (Choose two.)
Answer: C,E
QUESTION: 2
An organization needs a WAN Transport technology that meets these criteria:
• has a low initial cost
• provides low-to-medium BW
• has medium-to-high latency and jitter
Which technology should the organization use?
A. DSL
B. X.25
C. ISDN
D. wireless
E. analog modem
Answer: A
QUESTION: 3
Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.)
Answer: D,E
QUESTION: 4
Refer to the exhibit.
Cisco 200-310
A standard Layer 2 campus network design is pictured. Which numbered box represents the core
layer?
A. #1
B. #2
C. #3
D. #4
E. #5
Answer: C
QUESTION: 5
Which two design criteria require VLANs in a proposed solution? (Choose two.)
Answer: B,D
QUESTION: 6
Which three sources does a network designer use to collect information for characterizing an existing
network? (Choose three.)
A. staff input
B. visual inventory
C. network audit
D. traffic analysis
E. server statistics
Answer: A,C,D
QUESTION: 7
Which Cisco security mechanism has the attributes listed below?
• it is a sensor appliance
• it searches for potential attacks by capturing and analyzing traffic
• it is a "purpose-built device"
• it is installed passively
• it introduces no delay or overhead
A. IKE
B. PIX
C. HIPS
D. NIDS
E. HMAC
Answer: D
QUESTION: 8
Which three pieces of information should be documented for each step in a design implementation
plan? (Choose three.)
A. step description
B. design document references
C. easy guidelines in case of failure
D. estimated implementation time
E. simple implementation guidelines
F. estimated rollback time in case of failure
Answer: A,B,D
QUESTION: 9
A company is implementing an Identity Management solution with these characteristics:
• existing AAA Server
• Cisco Catalyst switches
Cisco 200-310
A. NAC Appliance
B. Cisco IBNS
C. CSM
D. Cisco Security MARS
Answer: B
QUESTION: 10
Which Cisco device management feature is most suited to metering network traffic and providing
data for billing network usage?
A. BGP
B. Cisco Discovery Protocol
C. QoS
D. RMON
E. NetFlow
Answer: E
QUESTION: 11
What are three valid methods of gathering information about an existing data network? (Choose
three.)
Answer: A,B,E
QUESTION: 12
Which two routing protocols converge most quickly? (Choose two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP
Answer: D,E
QUESTION: 13
What is the benefit of VLSM?
Cisco 200-310
Answer: C
QUESTION: 14
You want to gather as much detail as possible during a network audit with a minimal impact on the
network devices themselves.
Which tool would you use to include data time stamping across a large number of interfaces while
being customized according to each interface?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
QUESTION: 15
What is the primary consideration when choosing a routed network design over a traditional campus
network design?
Answer: A
QUESTION: 16
Which statement is true concerning the data center access layer design?
A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of
services across multiple servers.
B. With Layer 2 access, the default gateway for the servers can be configured at the access or
aggregation layer.
C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual
IP addresses on the two server links to two separate switches.
D. The access layer is normally not required, as dual homing is standard from the servers to the
aggregation layer.
Answer: B
Cisco 200-310
QUESTION: 17
Which statement is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by
STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of
any other devices.
C. A mix of both Layer 2 and Layer 3 access is the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging
IP routes and MAC address tables.
Answer: C
QUESTION: 18
When considering the three VoIP design models - single site, centralized multisite, and distributed
multisite - which question below would help to eliminate one of the options?
Answer: D
QUESTION: 19
With deterministic Wireless LAN Controller redundancy design, the different options available to the
designer have their own strengths. Which statement is an example of such a strength?
A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of
oversubscription on aggregate network performance.
B. N+N redundancy configuration allows logically grouping access points on controllers to minimize
intercontroller roaming events.
C. N+N+1 redundancy configuration has the least impact to system management because all of the
controllers are colocated in an NOC or data center.
D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the
same subnet for more efficiency.
Answer: B
QUESTION: 20
When there is a need for immunity to EMI for connecting locations that are greater than 100 meters
apart, which two solutions can be utilized? (Choose two.)
A. multimode fiber
B. Fibre Channel
C. HVDC transmission lines
D. single-mode fiber
E. serial RS-232
Cisco 200-310
Answer: A,D
QUESTION: 21
Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer: C
QUESTION: 22
OSPF will be used as the IGP within a campus network. Which two things should you consider before
deployment? (Choose two.)
Answer: A,E
QUESTION: 23
Which is the North American RIR for IPv4 addresses?
A. RIPE
B. ARIN
C. IANA
D. IEEE
E. APNIC
Answer: B
QUESTION: 24
An enterprise campus module is typically made up of four submodules, as described by the Cisco
Enterprise Architecture Model. Which two submodules are part of this module? (Choose two.)
A. DMZ
B. enterprise branch
C. building distribution
D. server farm/data center
E. MAN
Answer: C,D
Cisco 200-310
QUESTION: 25
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the
most important consideration when passing corporate traffic over the public Internet?
A. security
B. static versus dynamic routing
C. bandwidth
D. QoS
E. latency
Answer: A
QUESTION: 26
Which type of area should you use in an enterprise OSPF deployment if you want to prevent
propagation of type 5 LSAs but still allow the redistribution of external routes?
A. stub
B. totally stubby
C. backbone
D. NSSA
E. virtual link
Answer: D
QUESTION: 27
Which protocol is used for voice bearer traffic?
A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP
Answer: B
QUESTION: 28
Refer to the exhibit.
Cisco 200-310
A. Router 1
B. Router 2
C. Router 3
D. Router 4
E. Router 5
Answer: B
QUESTION: 29
Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.)
A. NetFlow
B. FWSM
C. ISE
D. VRRP
E. sFLOW
Answer: A,B,C
Cisco 200-310
QUESTION: 30
Which technology allows remote networks to be connected via site-to-site tunnels?
A. IPsec VPN
B. AnyConnect VPN
C. SSL VPN
D. EasyConnect VPN
Answer: A
QUESTION: 31
Which RFC defines the IPv6 standard?
A. RFC 1918
B. RFC 2338
C. RFC 2460
D. RFC 2740
Answer: C
QUESTION: 32
What is the maximum RIPv2 hop count for a reachable route?
A. 13
B. 14
C. 15
D. 16
Answer: C
QUESTION: 33
Which Cisco Wireless LAN Controller interface is used for out-of-band management?
A. service port
B. management port
C. controller port
D. virtual port
Answer: A
QUESTION: 34
In which operation mode does the AP act as a dedicated sensor for location-based and intrusion
detection services?
A. monitor mode
B. promiscuous mode
C. discovery mode
D. sniffer mode
Cisco 200-310
Answer: A
QUESTION: 35
Which HSRP parameters must match, to ensure proper functionality?
A. group parameters
B. priority parameters
C. preempt parameters
D. tracking parameters
Answer: A
QUESTION: 36
What three primary sources of information are needed to perform a network audit? (Choose three.)
A. existing documentation
B. new documentation
C. existing network management software
D. new network management tools
E. management personnel
F. technical personnel
Answer: A,C,D
QUESTION: 37
Which three layers comprise the traditional hierarchical model? (Choose three.)
A. core layer
B. distribution layer
C. access layer
D. aggregation layer
E. network layer
F. Internet layer
Answer: A,B,C
QUESTION: 38
Which first-hop redundancy protocol dynamically distributes client traffic between multiple routers?
A. HSRP
B. VRRP
C. GLBP
D. IGRP
Answer: C
Cisco 200-310
QUESTION: 39
Which three options are characteristics of data center evolution? (Choose three.)
A. consolidation
B. virtualization
C. automation
D. standardization
E. optimization
F. modulation
Answer: A,B,C
QUESTION: 40
Which option is a benefit of the modular approach to network design?
A. higher availability
B. repeatable scalability
C. increased security
D. improved resiliency
Answer: B
QUESTION: 41
Which statement describes the methodology that supports the Cisco Enterprise Architecture
models?
Answer: A
QUESTION: 42
Which design is the recommended geometric design for routed topologies?
A. linear
B. triangular
C. rectangular
D. circular
Answer: B
QUESTION: 43
Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model
in the data center?
Answer: A
QUESTION: 44
Router A has three feasible successors to the 192.168.1.0/24 network, which are listed here:
Option 1 has a metric of 8123228.
Option 2 has a metric of 2195467.
Option 3 has a metric of 8803823.
The variance 4 command was issued on Router
A. How many active entries does Router A have in its routing table for the 192.168.1.0/24 network?
A. 0
B. 1
C. 2
D. 3
Answer: C
QUESTION: 45
Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose
two.)
A. split horizon
B. route summarization
C. route poisoning
D. tuned timers
Answer: A,C
QUESTION: 46
Which interior routing protocol has the most preferable administrative distance by default?
A. RIP
B. OSPF
C. EIGRP
D. BGP
E. IS-IS
Answer: C
QUESTION: 47
What are the three modes of unicast reverse path forwarding? (Choose three.)
A. strict
Cisco 200-310
B. loose
C. VRF
D. global
E. PIM
F. local
Answer: A,B,C
QUESTION: 48
A network engineer has been asked to follow a top down design approach. What layer of the OSI
model is used to start the design?
A. physical
B. network
C. transport
D. application
Answer: D
QUESTION: 49
Where in the network hierarchy should network access control be performed?
A. backbone
B. core
C. access
D. distribution
Answer: C
QUESTION: 50
What are two advantages of employing scalability when designing a campus network? (Choose two.)
Answer: D,E
QUESTION: 51
A network engineer is using the traditional switched hierarchical design. The client has asked to
increase uplink utilization from the access layer to the distribution. How can the engineer attain this
new requirement without adding new physical connections?
Answer: B
QUESTION: 52
Multicast has been enabled and configured in the Enterprise, and PIM Sparse-mode has been
enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on
the access layer switches?
A. IGMP snooping
B. Multicast boundary filter
C. PIM dense-mode
D. Dynamic ARP inspection
Answer: A
QUESTION: 53
What two SAN protocols will allow a customer to utilize 10GbE for SAN access? (Choose two.)
A. ISCSI
B. FCoE
C. SATA
D. Fiber Channel
E. AoE
Answer: A,B
QUESTION: 54
Application servers require load balancing and security services. Where in the data center network
should these services be provisioned?
A. core
B. aggregation
C. Layer 3 access
D. distribution
Answer: B
QUESTION: 55
A data center is reaching its power and cooling capacity. What two virtualization technologies can
address the problem by directly reducing the number of physical devices? (Choose two.)
Answer: B,C
QUESTION: 56
A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What
routing configuration prefers the IPsec tunnel only in the event of a private line failure?
Answer: A
QUESTION: 57
When designing a new enterprise campus network, what topology should be used for maximum
scalability?
A. flat
B. three-layer
C. star
D. partial mesh
E. full mesh
Answer: B
QUESTION: 58
A spanning tree topology can be simplified by deploying what Cisco IOS technology in the
distribution block?
A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links
Answer: D
QUESTION: 59
An organization is deciding what routing protocol to use throughout their network. What must be
considered if routing is to be performed at the access layer?
A. reduced scalability of the network when introducing a large number of switch blocks into the
routing table
B. centralized management of access control lists at the distribution layer
C. reliability when implementing routing over spanning-tree at the access layer
D. performance differences between core, distribution and access layer equipment
Cisco 200-310
Answer: D
QUESTION: 60
A routing protocol neighbor relationship has been established between two routers across the public
Internet using GRE. What technology can be used to encrypt this communication channel?
A. access lists
B. IP security
C. context based access
D. intrusion prevention system
Answer: B
QUESTION: 61
Which statement correctly describes queuing in environments supporting teleworkers?
Answer: B
QUESTION: 62
Which first-hop redundancy protocol dynamically distributes traffic across multiple gateways?
A. HSRP
B. GLBP
C. VRRP
D. IBGP
Answer: B
QUESTION: 63
A network engineer must collect application-level information passing through a router. What two
tools can provide this information? (Choose two.)
A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog
Answer: A,D
Cisco 200-310
QUESTION: 64
What information should be utilized to identify network applications that are running on an existing
network infrastructure?
A. customer information
B. existing documentation
C. traffic analysis
D. external feedback
E. user feedback
Answer: C
QUESTION: 65
A design engineer must send management information messages across the public internet. What
solution provides a secure and encrypted method for passing these messages?
A. SNMP v3
B. NetFlow v9
C. Syslog Traps
D. Secure Shell v2
E. SNMP v2
Answer: A
QUESTION: 66
A network engineer is designing a solution that will monitor IP traffic through corporate routers with
the ability to export the flows to a collection engine without using network probes. What technology
meets this requirement?
A. RMON
B. NetFlow
C. SNMP
D. Syslog
E. IP SLA
Answer: B
QUESTION: 67
A network engineer is following the Cisco enterprise architecture model. Where are aggregation
switches found?
A. Enterprise Campus
B. Enterprise Edge
C. SP Edge WAN
D. Remote Module
Answer: A
Cisco 200-310
QUESTION: 68
What two configurations are Cisco recommended best practices for user access interfaces? (Choose
two.)
Answer: B,D
QUESTION: 69
What Cisco product is designed to improve the performance of Windows file and exchange services
in remote data centers?
Answer: B
QUESTION: 70
What design feature should be considered when accessing resources from a remote data center over
a WAN connection?
A. security
B. bandwidth
C. reliability
D. management
Answer: B
QUESTION: 71
What two addresses are defined under RFC 1918? (Choose two.)
A. 19.22.37.1
B. 10.1.7.19
C. 127.0.0.1
D. 172.31.1.1
E. 239.15.12.1
Answer: B,D
QUESTION: 72
What IPv4 addressing technique is used for proper address planning to reduce the number of entries
in a routing table?
Cisco 200-310
A. filtering
B. tunneling
C. summarization
D. translation
E. supernetting
Answer: C
QUESTION: 73
What two components are used when creating an endpoint's modified EUI-64 format IPv6 address?
(Choose two.)
A. IPv6 Prefix
B. 64-bit MAC address
C. 48-bit MAC address
D. IPv4 Address
E. Link Local Suffix
Answer: A,C
QUESTION: 74
A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own are
A. Backbone Area
B. Totally Stub Area
C. Not So Stubby Area
D. Stub Area
Answer: C
QUESTION: 75
What two factors should be considered when deploying an enterprise campus network? (Choose
two.)
A. employees
B. geography
C. applications
D. administration
E. throughput
Answer: B,C
QUESTION: 76
The spanning tree topology can be simplified by deploying what Cisco NX-OS technology in the
distribution and access layer?
Cisco 200-310
A. VDC
B. vPC
C. Rapid PVST+
D. VSS
E. Flex Links
Answer: B
QUESTION: 77
What network technology consolidates network and storage traffic in the data center?
Answer: B
QUESTION: 78
What type of topology supports WAN redundancy when a balance is required between cost, high
availability, and performance?
A. partial meshed
B. full meshed
C. star
D. ring
E. hub-and-spoke
F. bus
G. point-to-point
Answer: A
QUESTION: 79
What is the key limitation of using Internet circuits as a backup to a private enterprise WAN?
A. circuit bandwidth
B. prioritization
C. security
D. operational expense
Answer: B
QUESTION: 80
A network design engineer is seeking a dynamic routing protocol that supports fast convergence in a
Cisco environment. What protocol allows for this?
A. EIGRP
Cisco 200-310
B. OSPF
C. RIP
D. BGP
E. IS-IS
Answer: A
QUESTION: 81
What are two benefits of the bottom-up design approach? (Choose two.)
Answer: A,B
QUESTION: 82
Which network layer is the best fit for security features such as DAI and DHCP snooping?
A. campus core
B. enterprise edge
C. campus distribution
D. remote-access VPN
E. enterprise data center
F. campus access
Answer: F
QUESTION: 83
Directory services and electronic messaging are performed at which layer of the network?
A. core
B. application
C. distribution
D. network
Answer: B
QUESTION: 84
Refer to the exhibit.
Cisco 200-310
Which configuration can be used to implement FHRP protocol and load balancing at the same time?
Answer: A
QUESTION: 85
Cisco FabricPath brings the benefits of routing protocols to Layer 2 network Ethernet environments.
What are two advantages of using Cisco FabricPath technology? (Choose two.)
Answer: A,B
QUESTION: 86
A network design shows two routers that are directly connected to an Ethernet switch using optical
connections. There is an OSPF adjacency between the routers. In this design, which solution ensures
that interface-down detection is reported as quickly as possible to the IGP?
Answer: B
QUESTION: 87
Which statement is true about using a DNS server to discover a controller IP?
A. The AP sends a discovery request to the first controller on the list and then goes down the list
chronologically until it receives a discovery response.
B. The AP sends a discovery request to the last controller on the list and then goes up the list
chronologically until it receives a discovery response.
C. The AP sends a discovery request to all controllers on the list simultaneously.
D. Multiple controller IP addresses in a DNS response are not supported.
Answer: C
QUESTION: 88
Refer to the exhibit.
Cisco 200-310
A network engineer at a technical call center receives a call from a customer complaining that only
56 kbps of data can be transferred over the T1 Frame Relay WAN circuit at a remote site. The
engineer checks the Frame Relay switch and confirms that only 56 kbps is being transferred over the
circuit. The engineer requests the router configuration of the customer headquarters site router.
What is causing this issue to occur?
Answer: C
QUESTION: 89
Which option is an advanced congestion management mechanism?
Cisco 200-310
Answer: A
QUESTION: 90
Which option is an example of physical device virtualization?
A. VSS
B. VPN
C. VRF
D. VLAN
Answer: A
QUESTION: 91
A data center is being deployed, and one design requirement is to be able to readily scale server
virtualization. Which IETF standard technology can provide this requirement?
Answer: A
QUESTION: 92
A company would like to distribute a VM hosting cluster between three data centers with the
capability to move VMs between sites. The connectivity between data centers is IP only, and the new
design should use the existing WAN. Which Layer 2 tunneling technology should be used?
A. VPLS
B. L2TPv3
C. OTV
D. AToM
Answer: C
QUESTION: 93
In which two places is redundancy recommended in an enterprise campus network design? (Choose
two.)
A. building distribution
B. campus core
C. building access
D. e-commerce
Cisco 200-310
E. Internet connectivity
Answer: A,B
QUESTION: 94
What are two purposes of route redundancy? (Choose two.)
Answer: A,B
QUESTION: 95
Which two statements are true regarding a hierarchical network? (Choose two.)
Answer: B,C
QUESTION: 96
Which two Cisco data center devices can participate in Cisco FabricPath? (Choose two.)
Answer: A,C
QUESTION: 97
Refer to the exhibit.
Cisco 200-310
Assuming that a network will grow exponentially for the next 24 months, what is the main limitation
that must be addressed?
A. scalability
B. serviceability
C. redundancy
D. resiliency
Answer: A
QUESTION: 98
A network engineer is tasked with summarizing the routes to a remote site. What is the optimal
route statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the
corporate WAN?
Answer: B
QUESTION: 99
Refer to the exhibit.
Cisco 200-310
Answer: D
QUESTION: 100
Which option is used by OSPF to reduce the flooding domain of database updates in a network?
A. hello packets
B. virtual links
C. interface cost
D. areas
Answer: D
Cisco 200-310
QUESTION: 101
Refer to the exhibit.
Which three OSPF routers are the only routers that may perform summarization with the current
network layout? (Choose three.)
A. Router 2
B. Router 3
C. Router 4
D. Router 5
E. Router 7
F. Router 8
Answer: A,C,E
QUESTION: 102
Which two options should be used to achieve fast convergence in an OSPF network? (Choose two.)
Cisco 200-310
Answer: A,B
QUESTION: 103
Refer to the exhibit.
Which next hop will the router select if given an IP packet with the destination address 19.48.254.3?
A. Router 2
B. Router 1
C. Interface 0
D. Interface 1
Answer: A
QUESTION: 104
Refer to the exhibit.
Cisco 200-310
In this suboptimal design of a homogeneous Cisco network, which version of spanning tree provides
the fastest convergence?
A. PVST+
B. CST
C. RPVST
D. VSTP
E. PVST
Answer: C
QUESTION: 105
Refer to the exhibit.
Cisco 200-310
The red lines refer to STP blocked ports. What happens if the HSRP active moves to the right
distribution, and the STP root remains on the left distribution?
Answer: B
QUESTION: 106
Refer to the exhibit.
Cisco 200-310
The organization is migrating away from FHRP. VSS has been implemented on a pair of Cisco Catalyst
6500 Series Switches. In order to avoid changes to end hosts, the default gateway is carried over to
the SVI on the VSS. Why does the implementation plan require a four-hour wait after removing the
FHRP configuration?
A. The VLAN interface MAC address and the FHRP MAC address are different. It takes four hours for
the VLAN interface to come up.
B. The SVI IP address and the FHRP IP address are different. It takes four hours for the SVI to come
up.
C. The VLAN interface MAC address and the FHRP MAC address are different. It takes four hours for
the ARP cache to time out.
D. The VLAN interface IP address and the FHRP IP address are different. It takes four hours for the
VLAN interface to come up.
E. The VLAN interface IP address and the FHRP IP address are different. It takes four hours for the
ARP cache to time out.
Answer: C
QUESTION: 107
Which command is correct for creating a virtual interface on a Cisco wireless controller?
Answer: C
QUESTION: 108
Which three series of Cisco wireless controllers support wireless Bidirectional Rate Limiting? (Choose
Cisco 200-310
three.)
Answer: B,D,E
QUESTION: 109
Which option can use deep-packet examination to determine the specific nature of an attack?
A. network IPS
B. NetFlow collector
C. stateful firewall
D. syslog server
Answer: A
QUESTION: 110
Refer to the exhibit.
Which location is best for placing a monitor-only IPS that has visibility into the most data center
traffic?
Answer: D
QUESTION: 111
A remote user for a company must periodically connect to the company network to access internal
resources using a company laptop with software that was preinstalled by the IT department. Which
VPN method is used for connectivity?
A. DMVPN
B. SSL VPN
C. IPsec VPN
D. GET VPN
Answer: C
QUESTION: 112
Which statement is true about the Cisco NAC Appliance?
Answer: A
QUESTION: 113
Which two Cisco products can be used in a data center to support OTV technology? (Choose two.)
Answer: B,C
QUESTION: 114
Which IETF standard technology can be used with data center design to readily scale server
virtualization?
Answer: A
Cisco 200-310
QUESTION: 115
Which three options are examples of network logical virtualization? (Choose three.)
A. virtual PortChannel
B. virtual machine
C. Virtual Device Context
D. Virtual Switching System
E. virtual device driver
Answer: A,C,D
QUESTION: 116
Which type of structure consists of the addressing, routing protocols, QoS, and security components?
A. logical
B. physical
C. layered
D. virtual
Answer: A
QUESTION: 117
What phase of Cisco's PPDIOO is the final test of the appropriateness of the design?
A. Operate
B. Optimize
C. Design
D. Implement
Answer: A
QUESTION: 118
What phase of Cisco's PPDIOO includes the identification and resolution of issues prior to moving the
entire network to production?
A. Optimize
B. Operate
C. Implementation
D. Design
Answer: A
QUESTION: 119
You want to gather as much detail as possible during a network audit, to include data time stamping
across a large number of interfaces, customized according to interface, with a minimal impact on the
network devices themselves. Which tool would you use to meet these requirements?
Cisco 200-310
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
NetFlow provides extremely granular and accurate traffic measurements and a high-level collection
of aggregated traffic. The output of netflow information is displayed via the show ip cache flow
command on routers. The Table shows a description of the fields for NetFlow output.
Table. Netflow Output escription
QUESTION: 120
You want to gather as much detail as possible during a network audit with a minimal impact on the
network devices themselves. Which tool would you use to include data time stamping across a large
number of interfaces while being customized according to each interface?
A. RMON
B. SNMPv3
C. NetFlow
D. Cisco Discovery Protocol
Answer: C
QUESTION: 121
In which phase of PPDIOO are the network requirements identified?
Cisco 200-310
A. Design
B. Plan
C. Prepare
D. Implement
E. Operate
F. Optimize
Answer: B
Plan Phase
The Plan phase identifies the network requirements based on goals, facilities, and user needs. This
phase characterizes sites and assesses the network, performs a gap analysis against best-practice
architectures, and looks at the operational environment. A project plan is developed to manage the
tasks, responsible parties, milestones, and resources to do the design and implementation. The
project plan aligns with the scope, cost, and resource parameters established with the original
business requirements. This project plan is followed (and updated) during all phases of the cycle.
QUESTION: 122
Which is part of the Prepare phase of PPDIOO?
Answer: C
Cisco 200-310
Prepare Phase
The Prepare phase establishes organization and business requirements, develops a network strategy,
and proposes a high-level conceptual architecture to support the strategy. Technologies that support
the architecture are identified. This phase creates a business case to establish a financial justification
for a network strategy.
QUESTION: 123
When designing the identity and access control portions for the enterprise campus network, which
of these solutions would be the most appropriate solution to consider?
A. 802.1X
B. ACLs in the core layer
C. Cisco Security MARS
D. NetFlow
Answer: A
Cisco 200-310
QUESTION: 124
Which is the purpose of the Cisco NAC Profiler?
Answer: A
Cisco NAC Profiler: Enables network administrators to keep a real-time, contextual inventory of all
devices in a network. It greatly facilitates the deployment and management of Cisco Network
Admission Control (NAC) systems by discovering and tracking the location and type of all LANattached
endpoints, including those that are not capable of authenticating. It also uses the
information about the device to determine the correct policies for NAC to apply.
QUESTION: 125
Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other
authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?
A. RADIUS
B. LEAP
C. IPsec
D. TACACS
E. ISAKMP
Answer: A
Cisco 200-310
QUESTION: 126
Which protocol is used for voice bearer traffic?
A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP
Answer: B
VoIP Control and Transport Protocols
A number of different protocols are used in a VoIP environment for call control, device provisioning,
and addressing.
Figure 14-15 shows those protocols focused on VoIP control and transport.
Cisco 200-310
QUESTION: 127
Which protocol is used to reserve bandwidth for the transport of a particular application data flow
across the network?
A. cRTP
B. IEEE 802.1P
C. RSVP
D. LFI
E. Auto QOS
Answer: C
RSVP Signaling protocol that enables end stations or applications to obtain guaranteed bandwidth
and low delays for their data flows.
QUESTION: 128
Which two features are supported by single wireless controller deployments? (Choose two.)
Answer: A,B
QUESTION: 129
Which four services does the architecture for Media Services contain? (Choose four.)
A. access services
B. transport services
C. storage services
D. forwarding services
E. session control services
F. security services
G. filtering services
H. remote access services
Answer: A,B,C,E
An architecture framework for media services supports different models of video models. As shown
in Figure 14-13, the network provides service to video media in the Media Services Framework.
Those services are access services, transport services, bridging services, storage servers, and session
control services, which arc provided to endpoints.
¦ Access services provide identity of end devices, mobility, and location services.
¦ Transport services provide QoS for reliable packet delivery.
¦ Bridging services provide transcoding, conferencing, and recording services of media streams.
¦ Storage services provide capture and storage of media streams and content management and
Cisco 200-310
distribution.
¦ Session control services provide session signaling and control and gateway services.
QUESTION: 130
Refer to the exhibit.
Cisco 200-310
A. Layer A
B. Layer B
C. Layer C
D. Layers A and B form a consolidated core and distribution layer
Answer: B
QUESTION: 131
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?
A. Link-local
B. Site-local
C. Anycast
D. Multicast
E. Global aggregatable
Answer: C
Any cast is a network addressing and routing methodology in which data grams from a single sender
are routed to the topologically nearest node in a group of potential receivers all identified by the
Cisco 200-310
QUESTION: 132
What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch
office environment?
A. CST
B. RSPT
C. PVST
D. MISTP
E. Rapid PVST +
Answer: E
QUESTION: 133
Refer to the exhibit.
A standard, Layer 2 campus network design is pictured. Which numbered box represents the
Cisco 200-310
distribution layer?
A. #1
B. #2
C. #3
D. #4
Answer: B
QUESTION: 134
Which two are types of network virtualization? (Choose two.)
Answer: A,B
Network virtualization encompasses logical isolated network segments that share the same physical
infrastructure. Each segment operates independently and is logically separate from the other
segments. Each network segment appears with its own privacy, security, independent set of policies,
QoS levels, and independent routing paths.
Here are some examples of network virtualization technologies:
¦ VLAN: Virtual local-area network
¦ VSAN: Virtual storage-area network
¦ VRF: Virtual routing and forwarding
¦ VPN: Virtual private network
¦ VPC: Virtual Port Channel
QUESTION: 135
You are tasked with designing a new branch office that will support 75 users with possible expansion
in the future and will need a highly available network. Which of the branch design profiles should be
implemented?
Answer: B
Medium Branch Design
The medium branch design is recommended for branch offices of 50 to 100 users, which is similar to
the small branch but with an additional access router in the WAN edge (slightly larger) allowing for
redundancy services. Typically, two 2921 or 2951 routers are used to support the WAN, and separate
access switches are used to provide LAN connectivity.
Cisco 200-310
QUESTION: 136
Which two can be used as a branch office WAN solution? (Choose two.)
A. frame relay
B. MPLS
C. Metro Ethernet
D. GPRS
E. dial-up modem
F. 3G USB modems
Answer: B,C
Explanation
Frame relay is old 'shared' technology today's sites use some flavor or Metro E or MPLS/VPN
QUESTION: 137
What is the acceptable amount of one-way network delay for voice and video applications?
A. 300 bytes
B. 1 sec
C. 150 ms
D. 500 ms
Answer: C
Delay Components in VoIP Networks
The ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not
exceed 150 ms to be acceptable, commercial voice quality. In private networks, somewhat longer
delays might be acceptable for economic reasons. The ITU G.114 recommendation specifics that 151-
ms to 400-ms one-way delay might be acceptable provided that organizations are aware that the
transmission time will affect the quality of user applications. One-way delays of above 400 ms are
unacceptable for general network planning purposes.
QUESTION: 138
Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer: C
CISENU200_310_02222016.dat
QUESTION: 139
Your company uses OSPF for internal routing. The company will be connected to VendorA via a single
dedicated link and to VendorB via redundant dedicated links. Both vendors also use OSPF for internal
routing.
Which of the following deployments describes the best intra-domain routing practice in this
Cisco 200-310
situation?
A. Connect your company to both VendorA and VendorB using existing OSPF.
B. Redistribute the routes on each link between your company and the vendors to a shared EIGRP
routing protocol.
C. Use IBGP to reach VendorA and EBGP to reach VendorB.
D. Use static routes to reach VendorA and EBGP to reach VendorB.
E. Use static routes to reach both VendorA and VendorB.
Answer: D
QUESTION: 140
You design a network with the following network addresses:
192.168.168.0
192.168.169.0
192.168.170.0
192.168.171.0
192.168.172.0
192.168.173.0
192.168.174.0
192.168.175.0
Which route address is the best summary of these network addresses?
A. 192.168.0.0/24
B. 192.168.171.128/3
C. 192.168.168.0/21
D. 192.168.175.0/3
E. 192.168.0.0/16
Answer: C
QUESTION: 141
Which two methods are used to reduce the mesh links required between iBGP peers in the same AS?
(Choose two.)
A. community
B. route refilectors
C. local preference
D. confederations
E. atomic aggregate
Answer: B,D
QUESTION: 142
Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model
in the data center?
Answer: A
QUESTION: 143
Which option is an advantage of the bottom-up design model?
Answer: C
QUESTION: 144
A large company requests a hierarchical design model. What tier should be free of physically
connected hosts?
A. core
B. access
C. aggregation
D. distribution
Answer: A
QUESTION: 145
Which two options are benefits of using a modular network architecture? (Choose two.)
A. facilitates troubleshooting
B. accurate monitoring
C. consistent documentation
D. increased filexibility
E. reduced cabling requirements
Answer: A,D
QUESTION: 146
An organization is redesigning a 3-tier hierarchical network into a collapsed core. What design issue
is a primary concern per Cisco best practices?
A. services delineation
B. port density
C. feature availability
D. resource utilization
Answer: D
Cisco 200-310
QUESTION: 147
What three design best practices are key functions of the distribution layer? (Choose three.)
Answer: A,C,E
QUESTION: 148
What design requirement is necessary for campus network access layer switching?
Answer: C
QUESTION: 149
A remote office has a T1 WAN link to headquarters and a T1 Internet connection. The client requests
WAN redundancy to headquarters with similar bandwidth. What two connection types satisfy this
requirement? (Choose two.)
Answer: A,C
QUESTION: 150
A network engineer requires that an OSPF ASBR must only flood external LSAs only within its own are
A. Backbone Area
B. Totally Stub Area
C. Not So Stubby Area
D. Stub Area
Answer: C
Cisco 200-310
QUESTION: 151
A network engineer is tasked to upgrade and expand a large existing production network. From the
IOS CLI, what two protocols can be used to build a topology map of the existing network? (Choose
two.)
A. SNMP
B. IP SLA
C. ICMP Echo
D. LLDP
E. Traceroute
Answer: D,E
QUESTION: 152
A network engineer has finished designing and implementing a new network. What two protocols
would they use to gain insight into the network and determine the components that require
optimization? (Choose two.)
A. CDP
B. NetFlow
C. ICMP Echo
D. NMAP
E. SNMP
Answer: B,E
QUESTION: 153
What are two benefits of a structured IPv4 addressing scheme? (Choose two.)
Answer: A,D
QUESTION: 154
What are two reasons discontinuous IPv4 networks hinder scalability? (Choose two.)
Answer: A,B
Cisco 200-310
QUESTION: 155
What is a benefit of IPv6 over IPv4 addresses?
A. shorter addresses
B. automatic summarization
C. hierarchal global address space
D. faster IGP convergence
Answer: C
QUESTION: 156
GRE has been used to establish a routing-protocol neighbor relationship between two routers, across
the public Internet. Which technology can you use to encrypt this communication channel?
A. access lists
B. IPsec
C. CBAC
D. IPS
Answer: B
QUESTION: 157
Which option is a benefit of Cisco Discovery Protocol?
Answer: A
QUESTION: 158
Which three QoS levels should VoIP clients be set to on a Cisco WLC? (Choose three.)
A. Platinum
B. Bronze
C. Gold
D. Silver
E. Premier
F. Critical
Answer: A,C,D
QUESTION: 159
What is the optimal device and location to fulfill these requirements?
• provide early indication of reconnaissance and scanning activities with blocking capabilities
• require fewer interfaces to inspect traffic to the DMZ and internal network
Cisco 200-310
Answer: A
QUESTION: 160
What are the three models that are required in the systematic approach of the top-down design
methodology? (Choose three.)
A. logical
B. physical
C. layered
D. network components
E. technological
F. protocols
G. virtual
Answer: A,B,C
QUESTION: 161
Refer to the exhibit.
Which functionality must be enabled on router A to connect two networks for translating private
addresses into "legal" public addresses on a one-for-one basis?
A. B. NAT
B. C. VLAN
C. D. GARP
D. PPP
Answer: B
Cisco 200-310
QUESTION: 162
Refer to the exhibit.
You are designing routing between building distribution switches and campus core switches.
Assuming that all links have the same speed, which statement about these designs is true?
A. Option A has more fault tolerance but slower convergence than Option B.
B. Option A has more fault tolerance and faster convergence than Option B.
C. Option B has more fault tolerance but slower convergence than Option A.
D. Option B has more fault tolerance and faster convergence than Option A.
Answer: B
QUESTION: 163
Which technology should a company use to connect a branch office to headquarters via an Internet
connection while maintaining confidentiality and the filexibility to run a routing protocol between the
two locations?
Answer: A
QUESTION: 164
Which WAN technology is a cost-effective method to deliver 100 Mb of bandwidth to multiple
branch offices?
A. DSL
B. DWDM
C. ISDN
D. Metro Ethernet
Cisco 200-310
Answer: D
QUESTION: 165
Which statement describes the recommended deployment of DNS and DHCP servers in the Cisco
Network Architecture for the Enterprise?
A. Place the DHCP and DNS servers in the enterprise campus access layer and enterprise branch.
B. Place the DHCP and DNS servers in the enterprise campus server farm layer and enterprise branch.
C. Place the DHCP server in the enterprise campus core layer and remote access and VPN module,
and place the DNS server in the Internet connectivity module.
D. Place the DHCP server in the enterprise campus distribution layer, and place the DNS server in the
Internet connectivity module.
Answer: B
QUESTION: 166
A network engineer needs to create a controller-based, high-density RF design. Which two factors
determine the cell size? (Choose two.)
A. antenna type
B. ClientLink support
C. TPC threshold setting
D. QoS setting
E. free space path loss
Answer: A,C
QUESTION: 167
Which IP address can be routed to cross the public Internet?
A. 10.31.1.1
B. 192.168.32.1
C. 172.32.1.1
D. 169.254.32.1
Answer: C
QUESTION: 168
Which DHCP option do you need to configure to ensure that an LWAP can communicate with the
Cisco WLC in a different subnet?
A. 7
B. 19
C. 43
D. 150
Answer: C
Cisco 200-310
QUESTION: 169
Which two options can be virtual networking devices? (Choose two.)
A. ESX host
B. VM
C. switches
D. routers
E. Hyper-V host
Answer: C,D
Answer: <map><m
x1="16" x2="366"
y1="15" y2="56"
ss="0" a="0" /><m
x1="17" x2="367"
y1="78
y2="116" ss="0" a="0" /><m x1="17" x2="366" y1="137" y2="177" ss="0" a="0" /><m x1="18"
x2="366" y1="197" y2="236" ss="0" a="0" /><m x1="16" x2="366" y1="256" y2="296" ss="0" a="0"
/><m x1="16" x2="366" y1="317" y2="356" ss="0" a="0" /><m x1="18" x2="367" y1="375" y2="416"
Cisco 200-310
ss="0" a="0" /><m x1="396" x2="747" y1="15" y2="55" ss="1" a="0" /><m x1="396" x2="746"
y1="76" y2="116" ss="1" a="0" /><m x1="397" x2="744" y1="135" y2="175" ss="1" a="0" /><m
x1="398" x2="746" y1="195" y2="236" ss="1" a="0" /><m x1="397" x2="745" y1="257" y2="296"
ss="1" a="0" /><m x1="397" x2="745" y1="317" y2="355" ss="1" a="0" /><m x1="396" x2="747"
y1="377" y2="414" ss="1" a="0" /><c start="2" stop="0" /><c start="5" stop="1" /><c start="0"
stop="2" /><c start="6" stop="3" /><c start="3" stop="4" /><c start="1" stop="5" /><c start="4"
stop="6" /></map>
Answer: <map><m
x1="18" x2="368"
y1="21" y2="59"
ss="0" a="0" /><m
x1="19" x2="367"
y1="79
y2="122" ss="0" a="0" /><m x1="18" x2="367" y1="140" y2="180" ss="0" a="0" /><m x1="17"
x2="369" y1="201" y2="242" ss="0" a="0" /><m x1="18" x2="369" y1="262" y2="301" ss="0" a="0"
/><m x1="406" x2="760" y1="47" y2="83" ss="1" a="0" /><m x1="407" x2="756" y1="95" y2="135"
ss="1" a="0" /><m x1="410" x2="759" y1="145" y2="183" ss="1" a="0" /><m x1="409" x2="758"
y1="235" y2="274" ss="1" a="0" /><m x1="409" x2="756" y1="286" y2="325" ss="1" a="0" /><c
start="0" stop="0" /><c start="3" stop="1" /><c start="4" stop="2" /><c start="1" stop="3" /><c
start="2" stop="4" /></map>
Cisco 200-310
Answer: <map><m
Cisco 200-310
x1="24" x2="374"
y1="11" y2="53"
ss="0" a="0" /><m
x1="25" x2="373"
y1="74
y2="114" ss="0" a="0" /><m x1="23" x2="375" y1="133" y2="172" ss="0" a="0" /><m x1="24"
x2="374" y1="194" y2="233" ss="0" a="0" /><m x1="23" x2="373" y1="255" y2="293" ss="0" a="0"
/><m x1="22" x2="375" y1="311" y2="351" ss="0" a="0" /><m x1="414" x2="763" y1="39" y2="81"
ss="1" a="0" /><m x1="412" x2="763" y1="87" y2="129" ss="1" a="0" /><m x1="415" x2="762"
y1="188" y2="228" ss="1" a="0" /><m x1="414" x2="765" y1="239" y2="276" ss="1" a="0" /><m
x1="414" x2="762" y1="339" y2="379" ss="1" a="0" /><m x1="415" x2="763" y1="389" y2="429"
ss="1" a="0" /><c start="2" stop="0" /><c start="5" stop="1" /><c start="0" stop="2" /><c start="4"
stop="3" /><c start="1" stop="4" /><c start="3" stop="5" /></map>
Answer: <map><m
x1="22" x2="374"
y1="23" y2="71"
ss="0" a="0" /><m
x1="25" x2="373"
y1="89
y2="138" ss="0" a="0" /><m x1="25" x2="374" y1="154" y2="202" ss="0" a="0" /><m x1="24"
x2="374" y1="218" y2="267" ss="0" a="0" /><m x1="403" x2="755" y1="23" y2="74" ss="1" a="0"
/><m x1="403" x2="753" y1="88" y2="138" ss="1" a="0" /><m x1="404" x2="753" y1="154"
y2="204" ss="1" a="0" /><m x1="404" x2="754" y1="220" y2="267" ss="1" a="0" /><c start="2"
stop="0" /><c start="3" stop="1" /><c start="0" stop="2" /><c start="1" stop="3" /></map>
Answer: <map><m
x1="24" x2="375"
y1="19" y2="58"
ss="0" a="0" /><m
x1="24" x2="374"
y1="81
y2="121" ss="0" a="0" /><m x1="25" x2="373" y1="138" y2="178" ss="0" a="0" /><m x1="23"
x2="373" y1="198" y2="238" ss="0" a="0" /><m x1="404" x2="756" y1="20" y2="59" ss="1" a="0"
/><m x1="405" x2="754" y1="82" y2="121" ss="1" a="0" /><m x1="404" x2="754" y1="139"
y2="181" ss="1" a="0" /><m x1="405" x2="755" y1="198" y2="238" ss="1" a="0" /><c start="1"
stop="0" /><c start="3" stop="1" /><c start="0" stop="2" /><c start="2" stop="3" /></map>
QUESTION: 175
What are two components of the Build phase in the Cisco Design Lifecycle? (Choose two.)
A. Migration
B. Deployment
C. Optimization
Cisco 200-310
D. Design
E. Configuration
Answer: A,B
QUESTION: 176
Which design enables easy and filexible scaling in the Cisco Enterprise Architecture model?
A. modular
B. top-down
C. bottom-up
D. full-mesh
Answer: A
QUESTION: 177
Which two issues are typical challenges to network stability and reliability? (Choose two.)
A. hardware failures
B. layer 1 link failures
C. application failures
D. core layer failures
E. distribution layer failures
Answer: A,B
QUESTION: 178
For a VLAN that requires 70 hosts, which subnet is the most efficient?
A. 10.0.0.1/8
B. 172.31.17.0/26
C. 192.168.1.0/25
D. 192.168.15.0/24
Answer: C
QUESTION: 179
If two routing protocols have the same route and prefix, which effect do they have on the routing
table?
Answer: A
Cisco 200-310
QUESTION: 180
Which benefit is an advantage of route summarization?
Answer: A
QUESTION: 181
Which two states are RSTP port states? (Choose two.)
A. discarding
B. learning
C. blocking
D. listening
E. disabled
Answer: A,B
QUESTION: 182
When is the Cisco FlexConnect design model recommended?
Answer: A
QUESTION: 183
In which two modes can you deploy Cisco IPS appliances? (Choose two.)
A. inline
B. promiscuous
C. VTP group
D. threat mitigation
E. threat detection
Answer: A,B
QUESTION: 184
According to Cisco best practices, which traffic control should you apply to the strict priority queue?
D. The link serialization delay should be set to less than 100 ms.
Answer: A
QUESTION: 185
According to fundamental design principles, which location is best for implementing Cisco QoS
policies?
A. hardware
B. software
C. Cisco 3900 Series Integrated Services Routers running IOS software
D. WAN routers running IOS software
Answer: A
QUESTION: 186
Which item is the fundamental basis of a virtual network?
A. a VRF instance
B. a MIB database
C. a GRE tunnel
D. redundant hardware
Answer: A
QUESTION: 187
Which network virtualization technique can you implement without disrupting the existing network
design and infrastructure?
A. VRF-Lite
B. EVN
C. MPLS
D. VNET tags
Answer: A
QUESTION: 188
A network engineer must connect two sites. Each site has a different autonomous system number.
Which method do you use to exchange routing information between the sites?
A. OSPFv3
B. BGP
C. static routing
D. EIGRP
E. IGP
Answer: B
Cisco 200-310
QUESTION: 189
A remote worker for a sales company must submit daily updates via the company email system. The
employee does not have a company-issued laptop, so which VPN method is used for connectivity to
the company email server?
A. SSL VPN
B. GETVPN
C. L3VPN
D. DMVPN
Answer: A
QUESTION: 190
Which option is a benefit of Cisco Discovery Protocol?
Answer: A
Cisco Discovery Protocol (formerly known as CDP) is a Layer 2, media-independent, and networkindependent
protocol that runs on Cisco devices and enables networking applications to learn about
directly connected devices nearby. This protocol facilitates the management of Cisco devices by
discovering these devices, determining how they are configured, and allowing systems using
different network-layer protocols to learn about each other.
QUESTION: 191
Why would an engineer implement variable-length subnet masks?
Answer: B
QUESTION: 192
Which technology allow multiple instances of a routing table to coexist on the same router at the
same time?
A. vPC
B. Cisco virtual router
C. VRF
D. VSS
Answer: C
Cisco 200-310
QUESTION: 193
Company ABC has intermittent problems registering site IP phones over the WAN with Cisco Unified
CallManager at headquarter. The company hires a network consultant to help implement QoS in its
network. Which technique should the consultant use to identify traffic and apple alone that travers
the network.
A. policing
B. NBAR
C. priority queuing
D. RSVP
Answer: B
QUESTION: 194
Which statement about VSS is true?
Answer: A
QUESTION: 195
What are two important aspects to consider when looking at backup circuit options for a branch
location?
Answer: B,E
QUESTION: 196
How many switches can be combined into a single network element using VSS?
A. 4
B. 6
C. 8
D. 2
Answer: D
QUESTION: 197
Which two design decisions can improve network resiliency? (Choose two)
Cisco 200-310
Answer: A,B
QUESTION: 198
A consultant at Company XYZ connects to the Guest wireless network but cannot reach the MGMT
VLAN to complete an audit . Other users can connect to the MGMT VLAN without any issues. Why is
the consultant unable to access the MGMT VLAN ?
A. The AP is offline
B. The access is not permitted
C. The MGMT VLAN is down
D. The WLC is offline
Answer: B
QUESTION: 199
Which two processes are included in the Build phase of the Cisco Design Lifecycle? (Choose two)
A. Assessment
B. Analysis
C. Design
D. Validation
E. Deployment
Answer: D,E
QUESTION: 200
When designing changes to an existing network which tow options are documented to understand
environmental constraints? (Choose two)
Answer: D,E
QUESTION: 201
For a VLAN that requires 60 hosts, which subnet is the most efficient?
A. 172.31.17.0/27
B. 10.0.0.1/20
Cisco 200-310
C.192.68.15.0/24
D. 10.10.10.0/26
Answer: D
QUESTION: 202
Which two considerations are important when designing the access layer? (Choose two)
Answer: D,E
QUESTION: 203
Which Cisco technology can connect more than two switches so that they behave as on switch?
A. Ether Channel
B. Stack Wise
C. VSS
D. routing
Answer: B
QUESTION: 204
Which tow network services should you host on the DMZ ? (Choose two)
A. NFS
B. WWW
C. TACACS+
D. DHCP
E. FTP
Answer: A,E
QUESTION: 205
Which two connector actions are important when designing the core layer?
A. port security
B. PoE
C. Access list requirements
D. low latency
E. redundancy
Answer: D,E
Cisco 200-310
QUESTION: 206
Which tow considerations are important when designing the core layer?
(Choose two)
A. port security
B. PoE
C. Access list requirements
D. low latency
E. redundancy
Answer: D E
QUESTION: 207
Which option is an advantage of a Layer 3 access model over the traditional Layer 2 access model ?
Answer: B
QUESTION: 208
Which statement about modular network design is true?
Answer: B
QUESTION: 209
A network architect working for a larger financial institutions is designing a VPN solution that must
include encryption Which VPN type requirement?
Answer: A
https://supportforums.cisco.com/t5/vpn/l3vpn-and-ipsec/td-p/2557205
https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encrypted-transportvpn/
prod_presentation0900aecd80582031.pdf
QUESTION: 210
Which statement about using STP in a redundant – link scenario is true?
Cisco 200-310
Answer: D
QUESTION: 211
Under which phase of the Cisco Design Lifecycle would you evaluate the network infrastructure for
its adherence to best polices and corporate policies?
Answer: A
QUESTION: 212
A network engineer must connect two sites. Each site has a different autonomous system number.
Which method do you use to exchange
A. BGP
B. IGP
C. EIGRP
D. OSPFv3
Answer: A
QUESTION: 213
What are two important aspects to consider when looking at backup circuit options for a branch
location? (Choose two)
Answer: B,E
QUESTION: 214
Which virtualization deployment an engineer will execute to separate to acompplish security
policies?
Answer: B
QUESTION: 215
What Routing Protocol is clasfull
A. OSPF
B. EIGRP
C. IGRP
D. RIPv1
E. RIPv2
F. eBGP
Answer: CD
QUESTION NO 216
Two companies that want to connect with multiple providers vendors, what protocol is the proper
one to use
A. BGP
B. IS-IS
C. OSPF
D. EIGRP
Answer: A
QUESTION: 217
Consider the reservation of IP Addressing what mask you will use in a point to point connection
between two Buildings
A. 255.255.255.0
B. 255.255.252.0
C. 255.255.255.252
D. 255.255.255.254
Answer: C
QUESTION: 218
Which option is an object instance than an API identifies using informationmodel-based
architecture?
A. DN
B. Class
C. Method
D. MO
Answer: A
Cisco 200-310
https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/aci-fabriccontroller/
white-paper-c11-729586.html
QUESTION: 219
In Cisco ACI, which option is the unified point of automation , management , monitoring and
programmble?
A. Python
B. REST
C. APIC
D. Postman
Answer: C
QUESTION: 220
You are deploying IP Telephony over a WAN. What will be the DSCP value for the voice traffic?
A. EF
B. AF41
C. COS4
D. BE
Answer: A
QUESTION: 221
What should be considered when scaling EIGRP (Choose three)?
A. CPU
B. Peers
C. Query scope
D. Interface Bandwidth
E. Memory
F. IP Address
Answer: A, B, C
QUESTION: 222
What is the maximum number of switches in VSS?
A.2
B.4
C.6
D.8
Answer: A
QUESTION: 223
What is the technology that allows you to combine more than two switches?
Cisco 200-310
A. Stackwise
B. VSS
C. vPC
D. EtherChannel
Answer: A
QUESTION: 224
In which phase of cisco design life cycle the validation of network infrastructure happened.
A. Assessment in plan
B. Deployment in build
C. Validation in build
D. Optimization in operate
Answer: C
QUESTION: 225
What kind of servers you should place in DMZ?
A. WWW
B. FTP
C. DHCP
D. TACACS+
E. NFP
Answer: A, B
QUESTION: 226
What is the VLAN subnet that can handle 60 hosts?
A. /21
B. /24
C. /25
D. /26
Answer: D
QUESTION: 227
What is the benefit of using VLSM?
Answer: A
QUESTION: 228
Which two design decision can improve network resiliency (Choose two)?
Cisco 200-310
Answer: A, E
QUESTION: 229
In an enterprise Layer 2 switched network, which protocol must be running to enable link
redundancy?
A. CDP
B. PaGP
C. LACP
D. STP
Answer: D
QUESTION: 230
A network engineer must collect application-level information of deep attack?
A. NBAR
B. CiscoWorks
C. SNMP collector
D. NetFlow collector
E. Syslog
Answer: A
QUESTION: 231
which QoS level should VOIPset be configured on WLC ?
A. Platinum
B. Gold
D. Premier
E. Critical
Answer: A
QUESTION: 232
When designing changes to an existing network, which two options are documented to understand
environmental constraint? (Choose two.)
Answer: B, D
QUESTION: 233
What will extend a trust boundary (there is switch interface configuration with separate voice VLAN
and data VLAN configured where the phone is connected to, also small diagram showing endpoint
(host), IP Phone, Access Switch, Distribution Switch, Core Switch and Data Centre Aggregation
switch)?
A. Multiple layers PC
B. IP Phone
C. Access Switch
D. Distribution Switch
E. Core Switch
Answer: B
QUESTION: 234
What query should you make if you want to find all objects of a particular type in an MIT tree?
A. mid-tree-level
B. class-level
C. object-level
D. tree-level
Answer: B
https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centricinfrastructure/
white-paper-c11-733105.html
QUESTION: 235
Between what two modules DMZ should be located? (Choose two)?
A. Internet
B. Building access
C. Building distribution
D. Corporate network
Answer: A, D
QUESTION: 236
which options characterizes normal traffic flow and performance (Choose two)?
A. Bandwidth
B. Utilization
C. Availability
D. Baseline
Cisco 200-310
Answer: A, B
QUESTION: 237
What describes the link performance?
A. Bandwidth
B. Utilization
C. Availability
Answer: A
https://en.wikipedia.org/wiki/Network_performance
QUESTION: 238
Which one of the following is “synchronous link” design?
Answer: B
https://community.spiceworks.com/topic/325935-mpls-speeds
QUESTION: 239
What DNS entry to use for WLC with firmware version 6.0 or later so an Access Point can determine
the controller’s IP address?
Answer: C
QUESTION: 240
What are two advantages of a modular design (Choose two)?
A. Increased scalability
B. Security can be implemented at every module
C. Increased redundancy as you can add modules
D. Hierarchy included in design
Answer: A, D
http://www.ciscopress.com/articles/article.asp?p=1073230&seqNum=2
https://thwack.solarwinds.com/docs/DOC-175763
Cisco 200-310
QUESTION: 241
What tool would you use to capture, segregate and analyse IP traffic?
A. Protocol Analyser
B. NetFlow
Answer: B
QUESTION: 242
What tool would you use to decode protocols?
A. Protocol Analyser
B. NetFlow
C. Spectrum Analyser
Answer: A
QUESTION: 243
Which one of the following represent correct IPv6 Global Unicast address format?
Answer: A
QUESTION: 244
What access policies to set up for remote VPN access (Choose three)?
Answer: A, B, C
QUESTION: 245
What VPN tunnelling technology supports multicast?
A. DMVPN spoke-to-spoke
B. IPSec direct tunnelling hub-and-spoke
C. Easy VPN
D. IPSec direct tunnelling spoke-to-spoke
Answer: A
Cisco 200-310
QUESTION: 246
How to reduce the size of a routing table? (Choose two):
A. NAT
B. Summarization
C. Static routes
D. VLAN
Answer: A, B
QUESTION: 247
What are two classful routing protocols? (Choose two):
A. RIP
B. IGRP
C. OSPF
D. RIPv2
E. BGP
Answer: A, B
QUESTION: 248
What statement about EVN is true?
A. Support RIP
B. Support OSPFV3
C. Required LDP
D. Support as many as 32 virtual networks per device
Answer: D
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evnoverview.
html
QUESTION: 249
What is the best point to deploy the IPS, not to have false positives, since the traffic is already
filtered?
Cisco 200-310
Answer: B
https://supportforums.cisco.com/t5/intrusion-prevention-systems-ids/correct-placement-of-ids-ipsin-
network-architecture/td-p/2632437
QUESTION: 250
Which two high-level design components are included in Unified Wireless network?
A. Local
B. Cisco FlexConnect
C. Deterministic
D. N+1
E. Dynamic
Answer: A, B
QUESTION: 251
An organization needs to implement isolated logical structure due to compliance regulations. What
complex access control network virtualization method can it use?
A. The IT organization creates a quarantine network for end points that do not meet the posture
assessment requirements
B. The IT organization creates a separate guest network for wireless and wired clients
C. The IT organization acts as a client serving different, isolated departments
Cisco 200-310
Answer: A
QUESTION: 252
Which subnet mask should you use on point-to-point links to avoid wasting IP addresses?
A. 255.255.255.252
B. 255.255.255.250
C. 255.255.255.0
D. 255.255.255.248
Answer: A
QUESTION: 253
What IP address is used for broadcast for 120.20.78.8/30?
A. 120.20.78.11
B. 120.20.78.8
C. 120.20.78.12
D. 120.20.78.1
Answer: A
QUESTION: 254
Which connection provides cost effective backup connectivity for a branch network?
A. ATM
B. MPLS
C. SSL VPN
D. Ineternet VPN
Answer: D
QUESTION: 255
Which application provides AAA service for cisco devices?
A. TACACS
B. RADIUS
Answer: A
QUESTION: 256
Which Data Centre connection support QoS full mesh deployment and typically offer SLA?
A. MPLS
Answer: A
Cisco 200-310
QUESTION: 257
An infrastructure is designing a private WAN infrastructure to support an Organization and must
support quality of service and multicast functionality to the remote sites. Which WAN technology
support this requirement?
A. MPLS
B. IPsec VPN
C. DMVPN
D. SSL VPN
Answer: A
QUESTION: 258
Which type of router connects to two different OSPF areas?
A. area border
B. autonomous system boundary
C. backbone
D. internal
Answer: A
https://www.cisco.com/c/en/us/support/docs/ip/open-shortest-path-first-ospf/13703-8.html
QUESTION: 259
Which routing protocol provides the fastest convergence and greatest filexibility within a campus
environment?
A. IS-IS
B. BGP
C. OSPF
D. EIGRP
Answer: D
QUESTION: 260
How does the use of multiple areas in a link state routing protocol improve network scalability?
Answer: C
QUESTION: 261
Which option is an example of a fixed two-level hierarchical routing protocol?
A. OSPF
Cisco 200-310
B. RIPv2
C. EIGRP
D. static routes
Answer: A
QUESTION: 262
Which virtualization solution provides redundancy using a pair of switches that appear as one logical
switch and removes the need for a First HOP Redundancy Protocol?
A. VDC
B. VRRP
C. vPC
D. VSS
Answer: D
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-virtual-switchingsystem-
1440/prod_qas0900aecd806ed74b.html
QUESTION: 263
An engineer wants to find all of the objects of a certain type available in the MIT. Which kind of query
must be performed?
A. object-level
B. tree-level
C. class-level
D. subtree-level
Answer: D
QUESTION: 264
At which layer of the network should you perform traffic filtering and Qos classification?
A. session
B. distribution
C. application
D. core
Answer: C
QUESTION: 265
While designing a remote access VPN, a customer has requested three different levels of access to be
granted for administrators, employees, and partners. Which three access policies must be configured
for the three groups? (Choose Three)
A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Adminitrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with fill access to the internal infrastructure.
Cisco 200-310
D. Employee are centrally authenticated with limited network access controlled with ACLs.
E. Employees are centrally authenticated with full access to the internal infrastructure.
F. Partners are centrally authenticated with full access to the internal infrastructure.
Answer: DEF
QUESTION: 266
Which two techniques can you use to reduce the size of a network routing table?
A. implement VPN
B. route summarization
C. implement NAT
D. configure static routing
E. utilizing a default route
Answer: BE
QUESTION: 267
Traditionally, the DMZ exist between which two locations? (Choose two)
A. building distribution
B. building access
C. corporate network
D. metro access
E. Internet
Answer: CE
QUESTION: 268
An engineer wants to ensure that the Spanning Tree topology appears loop free while redundant
switches are present. Which Layer 2 technology must be used?
A. VPC
B. PaGP
C. LACP
D.OTV
Answer: C
QUESTION: 269
Which two options best describe the top-down design approach? (Choose two)
Answer: AB
https://www.cisco.com/c/dam/en_us/training-events/le31/le46/cln/qlm/CCDA/design/top-downapproach- to-
network-design-3/player.html
QUESTION: 270
An engineer is planning branch WAN links to support unified communications. Which DSCP value
must be assigned to voice traffic?
A. EF
B. AF41
C. COS4
D. BE
Answer: A
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/QoS_SRND/QoSSRND-
Book/QoSIntro.html
QUESTION: 271
Which option best describes the high-level design document?
A. It includes specific information such as hardware models, software versions, IP addressing, and
routing protocols.
B. It contains the test plan to certify that the customer’s network is ready for use.
C. it contains the steps needed to install and configure the network equipment and the steps that
verify basic network operation.
D. it includes business and technical requirements and the proposed network architecture.
Answer: D
https://learningnetwork.cisco.com/thread/98302
"High-level design (HLD) explains the architecture that would be used for developing a software
product. The architecture diagram provides an overview of an entire system, identifying the main
components that would be developed for the product and their interfaces. The HLD uses possibly
nontechnical to mildly technical terms that should be understandable to the administrators of the
system
QUESTION: 272
Which value must you configure on a Microsoft DHCP server so that Cisco wireless Aps can locate the
wireless controllers?
Answer: B
QUESTION: 273
Which tool captures network traffic, decodes the protocols in the captured packets, and provides
Cisco 200-310
A. continuity tester
B. protocol analyzer
C. spectrum analyzer
D. bit error rate tester
Answer: B
Protocol analyzeris a tool that captures network traffic,decodes the protocols in the captured
packets, andprovides statistics to characterize load, errors, andresponse time
QUESTION: 274
Which statement about using VSS on a pair of switches is true?
Answer: A
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-
2SX/configuration/guide/book/vss.html#wp1062785
QUESTION: 275
A network engineer is tasked with summarizing the routes to a remote site. What is the optimal
route statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the
corporate WAN?
Answer: B
QUESTION: 276
Which scenario is the best example of a single-homed connected infrastructure?
A. a data center that is connected to one service provider over an MPLS circuit and another service
provicer over an Ethernet connection.
B. a remote office that is connected to the WAN using a DSL provider and a cable provider.
C. a small office that uses a DSL link to connect to the WAN.
D. to corporate office that uses two separate routers to connect to two different service providers.
Answer: C
QUESTION: 277
Which address is the broadcast address of subnet 120.20.78.8/30?
Cisco 200-310
A. 120.20.78.12
B. 120.20.78.1
C. 120.20.78.11
D. 120.20.78.8
Answer: C
QUESTION: 278
Which two major campus design models does the cisco unified wireless network support?
A. Cisco FlexConnect
B. N+N+1
C. Deterministic
D. Local Mode
E. Dynamic
Answer: AD
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Apr2014/CVDCampusWirelessLANDesignGuide-
APR14.pdf
Wireless Design Models Cisco Unified Wireless networks support two major campus design models:
Local mode and Cisco FlexConnect.
QUESTION: 279
Which two protocols are classful routing protocols? (Choose Two)
A. RIPv2
B. RIPv1
C. IGRP
D. OSPF
E. BGP
Answer: BC
Classless routing protocols do send the subnet mask with their updates. Thus,Variable Length Subnet
Masks (VLSMs) are allowed when using classless routing protocols. Examples of classful routing
protocols include RIPv1 and IGRP
https://supportforums.cisco.com/legacyfs/online/legacy/6/6/3/15371366-
Classful%20vs%20Classless%20Routing.pdf
QUESTION: 280
From which DNS record can a Cisco wireless AP, running Cisco WLC version 6.0 or later, retrieve
bootstrap information?
A. cisco-capwap-controller
B. the DNS A record of the controller hostname
C. the DHCP Option 43 name
D. cisco-lwapp-controller
Cisco 200-310
Answer: A
QUESTION: 281
When integrating services with Cisco ACI Service Graphs, which tool can be used for integrated
Configuration management?
A. IOS
B. REST API
C. APIC CLI
D. HTML
Answer: B
Integrated configuration management using the APIC GUI, REST API or Python scripts, all based on a
consistent ACI object model
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-
x/Operating_ACI/guide/b_Cisco_Operating_ACI/b_Cisco_Operating_ACI_chapter_01001.html
QUESTION: 282
Which VPN tunneling technology supports IP multicast?
A. DMVPN spoke-to-spoke
B. Cisco Easy VPN
C. IPsec direct encapsulation spoke-to-spoke
D. IPsec direct encapsulation hub-and-spoke
Answer: A
QUESTION: 283
Which Layer in the Cisco Enterprise Archetecture model is highly available, has fast convergence, and
should avoid packet manipulation?
A. Campus distribution
B. enterprise data center
C. enterprise edge
D. campus access
E. campus core
F. remote access VPN
Answer: E
http://www.ciscopress.com/articles/article.asp?p=1315434
QUESTION: 284
In the traditional hierarchical LAN design, which two statements about the distribution layer are
true? (Choose Two)
Answer: CD
http://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4
QUESTION: 285
Refer to exhibit.
Based on the following output from the access switch, which option is the trust boundry for QoS?
Cisco 200-310
A. IP phone
B. access
C. core
D. endpoint
E. distribution
Answer: E
QUESTION: 286
An engineer is desigining a network that is divided into multiple areas and supports a mixed vendor
routing environment. Which interior gateway protocol must be selected?
A. EIGRP
B. OSPF
C. BGP
D. RIPv2
Answer: A
https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6800-series-switches/guidec07-
733457.html
QUESTION: 287
Which two benefits are realized by establishing virtualization in a campus network? (Choose Two)
Answer: BD
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/network-virtualizationsolutions/
net_brochure0900aecd804a17db.html
QUESTION: 288
Which option is one of the methods that Cisco routers and switches can use to share information
between directly connected devices on a regular basis?
A. NetFlow
B. ARP
C. NHRP
D. CDP
Answer: A