200-310 Premium Bundle

200-310 Premium Bundle

Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(4710 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 19, 2024Last update

Cisco 200-310 Free Practice Questions

Q1. Refer to the exhibit. 

Which three modules would typically utilize public IPv4 addressing? (Choose three.) 

A. Access 

B. Distribution 

C. Core 

D. Data Center 

E. E-Commerce 

F. Internet Connectivity 

G. Remote Access/VPN 

H. WAN/MAN 

I. Branch 

J. Branch Data Center 

Answer: E,F,G 

Q2. When designing an EIGRP network, which two things should you take into consideration? (Choose two.) 

A. ASN and K values must match. 

B. The neighbor command can be used to enable unicast communication. 

C. The neighbor diameter cannot exceed a 15-hops limit. 

D. NSSA areas can be used to redistribute external routes. 

E. Neighbor relationship can be established with non-Cisco routers. 

Answer: A,B 

Q3. What two performance considerations must be taken into account when designing a remote worker access solution? (Choose two.) 

A. simultaneous VPN connections 

B. port density 

C. throughput capacity 

D. packet size 

E. latency 

Answer: A,C 

Q4. What technology can secure data over an insecure medium and provide WAN redundancy in the event of a primary connection failure? 

A. virtual private network 

B. shadow PVC 

C. dial-up ISDN 

D. GRE Tunnel 

Answer:

Q5. DRAG DROP 

Answer:  

Q6. Which three are features of LWAPP? (Choose three.) 

A. firmware synchronization 

B. local management of APs 

C. configuration changes manually synced 

D. encryption of control channel 

E. configuration data only on the WLC 

F. wireless control free operation 

G. replaces 802.1x for authentication in wireless connections 

Answer: A,D,E 

Q7. An enterprise campus module is typically made up of four sub modules, as described by the Cisco Enterprise Architecture Model. Which two sub modules are part of this module? 

A. DMZ 

B. enterprise branch 

C. building distribution 

D. server farm/data center 

E. MAN 

Answer: C,D 

Q8. Which servers that reside in the data center require direct links to all other enterprise modules? 

A. network management servers 

B. DHCP servers 

C. Active Directory servers 

D. IP SLA servers 

E. web servers 

Answer:

Q9. Which is usually used to connect to an upstream ISP? 

A. EIGRP 

B. OSPF 

C. BGP 

D. IS-IS 

E. RIPv2 

Answer:

Q10. DRAG DROP 

Answer:  

Q11. A network engineer is following the Cisco enterprise architecture model. To which network layer would a branch office connect to using a private WAN? 

A. Enterprise Campus 

B. Enterprise Edge 

C. SP Edge Premise 

D. Remote Module 

Answer:

Q12. Which of these statements is true concerning the data center access layer design? 

A. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers. 

B. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer. 

C. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual IP addresses on the two server links to two separate switches. 

D. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer. 

Answer:

Q13. Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access? 

A. RADIUS 

B. LEAP 

C. IPsec 

D. TACACS 

E. ISAKMP 

Answer:

Explanation: 

Cisco Identity-Based Network Services The Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security. 

The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to apply authentication and authorization. With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentials and initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host then sends the credentials to the switch, which forwards them to the RADIUS ACS. The RADIUS ACS performs a lookup on the username and password to determine the credentials' validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the username and password are incorrect, the server sends a message to the switch or AP to block the host port. Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server. 

Q14. Which Cisco security mechanism has the attributes listed below? 

. It is a sensor appliance 

. It searches for potential attacks by capturing and analyzing traffic 

. It is a "purpose-built device" 

. It is installed passively 

. It introduces no delay or overhead 

A. IKE 

B. PIX 

C. HIPS 

D. NIDS 

E. HMAC 

Answer:

Q15. A client wants to consolidate applications that are currently housed at multiple sites to a remote data center. What two design requirements are unique to this scenario? (Choose two.) 

A. bandwidth 

B. security 

C. latency 

D. storage 

E. availability 

Answer: A,C 

Q16. At which layer of the network is route summarization recommended? 

A. data link layer 

B. core layer 

C. distribution layer 

D. access layer 

Answer:

START 200-310 EXAM