200-310 Premium Bundle

200-310 Premium Bundle

Designing for Cisco Internetwork Solutions Certification Exam

4.5 
(5640 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
April 19, 2024Last update

Cisco 200-310 Free Practice Questions

Q1. You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface? 

A. RMON 

B. SNMPv3 

C. NetFlow 

D. Cisco Discovery Protocol 

Answer:

Q2. WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet? 

A. security 

B. static versus dynamic routing 

C. bandwidth 

D. QoS 

E. latency 

Answer:

Explanation: 

WAN Backup over the Internet Another alternative for WAN backup is to use the Internet as the connectivity transport between sites. However, keep in mind that this type of connection does not support bandwidth guarantees. The enterprise also needs to work closely with the ISP to set up the tunnels and advertise the company's networks internally so that remote offices have reachable IP destinations. Security is of great importance when you rely on the Internet for network connectivity, so a secure tunnel using IPsec needs to be deployed to protect the data during transport. 

Q3. In which network location should an external DNS server be placed? 

A. campus data center 

B. enterprise branch 

C. internet 

D. remote access 

Answer:

Q4. Which Cisco device management feature is most suited to metering network traffic and providing data for billing network usage? 

A. BGP 

B. Cisco Discovery Protocol 

C. QoS 

D. RMON 

E. NetFlow 

Answer:

Q5. Which two are types of network virtualization? (Choose two.) 

A. VSS: Virtual Switching System 

B. VRF: virtual routing and forwarding 

C. VCI: virtual channel identifier 

D. VLSM: variable length subnet masking 

E. VM: virtual machine 

F. VMP: Virtual Memory Pool 

Answer: A,B 

Explanation: 

Network virtualization encompasses logical isolated network segments that share the same 

physical infrastructure. Each segment operates independently and is logically separate 

from the other segments. Each network segment appears with its own privacy, security, 

independent set of policies, QoS levels, and independent routing paths. 

Here are some examples of network virtualization technologies: 

VLAN: Virtual local-area network 

VSAN: Virtual storage-area network 

VRF: Virtual routing and forwarding 

VPN: Virtual private network 

VPC: Virtual Port Channel 

Q6. Which statement describes a unique advantage of EIGRP? 

A. It enables unequal-cost load balancing. 

B. It enables equal-cost load balancing. 

C. It enables source-based load balancing. 

D. It enables port-based load balancing. 

Answer:

Q7. A client wants to deploy a video conferencing platform in a multisite WAN environment. What two design considerations need to be evaluated? (Choose two.) 

A. CODECs supported by the video units 

B. buffer sizes on the routers 

C. POE capabilities of the switches 

D. number of current calls 

E. number of hops between sites 

Answer: A,D 

Q8. A spanning tree topology can be simplified by deploying what Cisco IOS technology in the distribution block? 

A. VDC 

B. vPC 

C. Rapid PVST+ 

D. VSS 

E. Flex Links 

Answer:

Q9. Which protocol is used for voice bearer traffic? 

A. MGCP 

B. RTP 

C. SCCP 

D. CDP 

E. ICMP 

Answer:

Explanation: 

VoIP Control and Transport Protocols 

A number of different protocols are used in a VoIP environment for call control, device provisioning, and addressing. 

Figure 14-15 shows those protocols focused on VoIP control and transport. 

Q10. Refer to the exhibit. 

A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer? 

A. #1 

B. #2 

C. #3 

D. #4 

Answer:

Q11. A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to start the design? 

A. physical 

B. network 

C. transport 

D. application 

Answer:

Q12. Which three modular components are part of the Cisco Enterprise Edge Architecture? (Choose three.) 

A. e-commerce module 

B. Internet connectivity module 

C. server farm module 

D. remote access and VPN module 

E. PSTN services module 

F. enterprise branch module 

G. building distribution module 

Answer: A,B,D 

Q13. What three customer supported details identifies network requirements based on the PPDIOO design model? (Choose three.) 

A. goals 

B. budget 

C. user needs 

D. locations 

E. policies 

F. tasks 

Answer: A,B,C 

Q14. Which three solutions are part of the Borderless Network Services? (Choose three.) 

A. Wireless 

B. Routing 

C. TrustSec 

D. MediaNet 

E. Switching 

F. EnergyWise 

G. Next-Gen WAN 

Answer: C,D,F 

Q15. Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.) 

A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers. 

B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+. 

C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation. 

D. Avoid wasted processing by disabling STP where loops are not possible. 

E. Use VTP transparent mode to decrease the potential for operational error. 

Answer: B,E 

Explanation: 

When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design. 

Performance in the access layer is also important. Redundancy and QoS features should be considered. 

The following are recommended best practices for the building access layer: 

. Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology. 

. Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers. 

. Set trunks to ON and ON with no-negotiate. 

. Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch). 

. Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks. 

. Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast. 

. Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing. 

. Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports. 

. Use Cisco STP Toolkit, which provides 

. PortFast: Bypass listening-learning phase for access ports 

. Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU) 

. Root GuarD. Prevents external switches from becoming root 

. BPDU GuarD. Disables PortFast-enabled port if a BPDU is received Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3, Page 85 

Q16. Which network access control technology is recommended to use with Layer 2 access layer switches? 

A. 802.1q 

B. 802.1x 

C. 802.3af 

D. 802.3q 

E. 802.11n 

Answer:

START 200-310 EXAM