200-310 Premium Bundle

200-310 Premium Bundle

Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(27825 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
May 1, 2024Last update

Cisco 200-310 Free Practice Questions

Q1. Which three technologies are recommended to be used for WAN connectivity in today's Enterprise Edge designs? (Choose three.) 

A. DWDM 

B. Metro Ethernet 

C. Frame Relay 

D. MPLS VPN 

E. ISDN 

F. DSL 

G. Wireless 

Answer: A,B,D 

Explanation: 

There is some discussion about whether ISDN not DWDM should be the answer but it does say TODAYS network 

Q2. A remote office has a T1 WAN link to headquarters and a T1 Internet connection. The client requests WAN redundancy to headquarters with similar bandwidth. What two connection types satisfy this requirement? (Choose two.) 

A. Secondary T1 WAN circuit 

B. ISDN BRI 

C. IPSec Tunnel over the Internet 

D. DWDM l 

E. POTS Line T1 WAN 

Answer: A,C 

Q3. In which network location should an external DNS server be placed? 

A. campus data center 

B. enterprise branch 

C. internet 

D. remote access 

Answer:

Q4. A customer requests a filtering design based on the need to scan all internet traffic, including remote workers. What solution meets these requirements? 

A. Cisco Cloud Web Security 

B. Cisco Network Admission Control 

C. Cisco Identity Services Engine 

D. Cisco Adaptive Security Appliance 

Answer:

Q5. DRAG DROP 

Answer:  

Q6. Which of these statements is true concerning the data center access layer design? 

A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers. 

B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer. 

C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate switches. 

D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer. 

Answer:

Q7. Which four services does the architecture for Media Services contain? (Choose four.) 

A. access services 

B. transport services 

C. storage services 

D. forwarding services 

E. session control services 

F. security services 

G. filtering services 

H. remote access services 

Answer: A,B,C,E 

Explanation: 

An architecture framework for media services supports different models of video models. As shown in Figure 14-13, the network provides service to video media in the Media Services Framework. Those services are access services, transport services, bridging services, storage servers, and session control services, which arc provided to endpoints. 

Access services provide identity of end devices, mobility, and location services. 

Transport services provide QoS for reliable packet delivery. 

Bridging services provide transcoding, conferencing, and recording services of media streams. 

Storage services provide capture and storage of media streams and content management and distribution. 

Session control services provide session signaling and control and gateway services. 

Q8. What is the primary advantage of implementing a wireless LAN controller in a wireless LAN design? 

A. roaming between APs 

B. RADIUS user authentication 

C. radio resource management 

D. accelerated data transfer 

Answer:

Q9. What routing protocol requires full mesh between internal peers in an enterprise network? 

A. OSPF 

B. EIGRP 

C. BGP 

D. ISIS 

E. RIP 

Answer:

Q10. Which three describe challenges that are faced when deploying an environment for teleworkers? (Choose three.) 

A. supporting a mix of technically knowledgeable and nontechnical users 

B. simplifying router installation and configuration 

C. verifying available power at employee's house for necessary equipment 

D. avoiding situations where employees might use nonstandard hardware or configurations 

E. reducing daily commuting time to main office location 

F. providing access to FTP servers located in main office location 

G. implementing leased line connectivity between main office and employee's home location 

Answer: A,B,D 

Q11. Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network? 

A. Authentication validation should be deployed as close to the data center as possible. 

B. Use the principle of top-down privilege, which means that each subject should have the privileges that are necessary to perform their defined tasks, as well as all the tasks for those roles below them. 

C. Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible. 

D. For ease of management, practice defense in isolation - security mechanisms should be in place one time, in one place. 

Answer:

Explanation: Validating user authentication should be implemented as close to the source as possible, with an emphasis on strong authentication for access from untrusted networks. Access rules should enforce policy deployed throughout the network with the following guidelines: 

.Source-specific rules with any type destinations should be applied as close to the source as possible. 

.Destination-specific rules with any type sources should be applied as close to the destination as possible. 

.Mixed rules integrating both source and destination should be used as close to the source as possible. 

An integral part of identity and access control deployments is to allow only the necessary access. Highly distributed rules allow for greater granularity and scalability but, unfortunately, increase the management complexity. On the other hand, centralized rule deployment eases management but lacks flexibility and scalability. 

Practicing “defense in depth” by using security mechanisms that back each other up is an important concept to understand. For example, the perimeter Internet routers should use ACLs to filter packets in addition to the firewall inspecting packets at a deeper level. 

Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 13 

Q12. A customer wants to support a BYOD environment. What two products allow for posture assessment? (Choose two.) 

A. ACS 

B. NAC 

C. ASA 

D. ISE 

E. WAAS 

F. IDS 

Answer: B,D 

Q13. A company wants to use private IP addresses for all its internal hosts. Which technology can the company use to provide access to the Internet using a single public IP address? 

A. static NAT 

B. source routing 

C. ACL 

D. PAT 

Answer:

Q14. Which three items pertain to EIGRP? (Choose three.) 

A. Can use multiple unequal paths. 

B. Routes are redistributed as type 2 by default. 

C. ASN and K values must match to form neighbors. 

D. Uses multicast address 224.0.0.9 for updates. 

E. Exchanges full routing table every 30 seconds. 

F. Summary routes have AD of 90. 

G. External routes have AD of 170. 

Answer: A,C,G 

Q15. A hierarchical design of the EIGRP domain facilitates which two of the following? (Choose two.) 

A. route summarization 

B. faster convergence 

C. unequal cost load balancing 

D. redistribution 

E. virtual links 

Answer: A,B 

Q16. If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport? 

A. ISDN 

B. Metro Ethernet 

C. Frame Relay 

D. ADSL 

E. ATM 

Answer:

START 200-310 EXAM