Exam Code: 200-310 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Designing for Cisco Internetwork Solutions
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 200-310 Exam.
Q33. Which two link state routing protocols support IPv6 routing? (Choose two.)
A. BGP4+
B. OSPF
C. RIPng
D. EIGRP
E. IS-IS
Answer: B,E
Q34. Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point sub interfaces? (Choose two.)
A. RIPv1
B. RIPv2
C. IS-IS
D. EIGRP
E. OSPF
Answer: D,E
Q35. Characterizing an existing network requires gathering as much information about the network as possible. Which of these choices describes the preferred order for the information-gathering process?
A. site and network audits, traffic analysis, existing documentation and organizational input
B. existing documentation and organizational input, site and network audits, traffic analysis
C. traffic analysis, existing documentation and organizational input, site and network audits
D. site and network audits, existing documentation and organizational input, traffic analysis
Answer: B
Explanation:
This section describes the steps necessary to characterize the existing network infrastructure and all sites. This process requires three steps:
Step 1. Gather existing documentation about the network, and query the organization to discover additional information. Organization input, a network audit, and traffic analysis provide the key information you need. (Note that existing documentation may be inaccurate.)
Step 2. Perform a network audit that adds detail to the description of the network. If possible, use traffic-analysis information to augment organizational input when you are describing the applications and protocols used in the network.
Step 3. Based on your network characterization, write a summary report that describes the health of the network. With this information, you can propose hardware and software upgrades to support the network requirements and the organizational requirements.
Q36. Which three are valid Layer 2 access designs? (Choose three.)
A. Looped Triangle
B. Looped Square
C. Looped U
D. Loop-Free Triangle
E. Loop-Free Square
F. Loop-Free U
Answer: A,B,F
Q37. What branch design supports 100 to 1000 users and integrates ASA firewalls?
A. small
B. medium
C. large
D. extra large
Answer: C
Q38. Which Cisco device has the sole function at looking at threat detection and mitigation at the Enterprise edge?
A. Cisco IOS router
B. Cisco ASA
C. Cisco Catalyst FWSM
D. Cisco IPS
Answer: D
Q39. Which mode is used to exclusively look for unauthorized access points?
A. monitor mode
B. sniffer mode
C. rogue detector mode
D. local mode
Answer: C
Explanation:
Interference detection and avoidance: As Cisco LWAPs monitor all channels, interference is detected by a predefined threshold (10 percent by default). Interference can be generated by rogue APs, microwaves, cordless telephones, Bluetooth devices, neighboring WLANs, or other electronic devices.
Q40. Which is the equation used to derive a 64 Kbps bit rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words
Answer: D
Q41. A data center is reaching its power and cooling capacity. What two virtualization
technologies can address the problem by directly reducing the number of physical devices? (Choose two.)
A. virtual switching systems
B. virtual device contexts
C. virtual servers
D. virtual routing and forwarding
E. virtual port channels
F. virtual LANs
Answer: B,C
Q42. What IPv4 addressing technique allows for the division of addresses into subnets of different sizes?
A. VLSM
B. RIR
C. CIDR
D. NAT
Answer: A
Q43. A hierarchical design of the EIGRP domain facilitates which two of the following? (Choose two.)
A. route summarization
B. faster convergence
C. unequal cost load balancing
D. redistribution
E. virtual links
Answer: A,B
Q44. Which three are features of LWAPP? (Choose three.)
A. firmware synchronization
B. local management of APs
C. configuration changes manually synced
D. encryption of control channel
E. configuration data only on the WLC
F. wireless control free operation
G. replaces 802.1x for authentication in wireless connections
Answer: A,D,E
Q45. Which subnet address and mask would you use for all Class D multicast addresses to be
matched within an access list?
A. 224.0.0.0/20
B. 224.0.0.0/4
C. 239.0.0.0/24
D. 239.0.0.0/8
E. 225.0.0.0/8
Answer: B
Q46. What characteristic separates link state routing protocols from a distance vector?
A. creates a topological view of the entire network
B. path calculation utilizes a more granular metric
C. does not scale well for large networks
D. constantly shares link state updates throughout the topology
Answer: A
Q47. DRAG DROP
Answer:
Q48. If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport?
A. ISDN
B. Metro Ethernet
C. Frame Relay
D. ADSL
E. ATM
Answer: D
To know more about the 200-310, click here.