200-310 Dumps

200-310 Real Exam Dumps Questions and answers 151-160

Get Full Version of the Exam

Question No.151

Which design is the recommended geometric design for routed topologies?

  1. linear

  2. triangular

  3. rectangular

  4. circular

Correct Answer: B

Question No.152

Your company uses OSPF for internal routing. The company will be connected to VendorA via a single dedicated link and to VendorB via redundant dedicated links. Both vendors also use OSPF for internal routing. Which of the following deployments describes the best intra-domain routing practice in this situation?

  1. Connect your company to both VendorA and VendorB using existing OSPF.

  2. Redistribute the routes on each link between your company and the vendors to a shared EIGRP routing protocol.

  3. Use IBGP to reach VendorA and EBGP to reach VendorB.

  4. Use static routes to reach VendorA and EBGP to reach VendorB.

  5. Use static routes to reach both VendorA and VendorB.

Correct Answer: D

Question No.153

What is the VLAN subnet that can handle 60 hosts?









Correct Answer: D

Question No.154

Which statement correctly describes queuing in environments supporting teleworkers?

  1. CQ is for time-sensitive protocols.

  2. Queuing occurs on the outbound interface.

  3. Priority queuing guarantees some level of service to all traffic.

  4. Hardware queues are configured for appropriate PQ, CQ, or WFQ.

  5. WFQ is the Cisco IOS default on all WAN links regardless of speed.

Correct Answer: B

Question No.155

What is the primary consideration when choosing a routed network design over a traditional campus network design?

  1. Layer 3 service support at the network edge

  2. the routing protocol choice: open (OSPF) or proprietary (EIGRP)

  3. the routing abilities of the host devices

  4. the need to control the broadcast domains within the campus core

Correct Answer: A

Question No.156

When is the Cisco FlexConnect design model recommended?

  1. when remote-site APs are centrally managed

  2. when each remote site has its own wireless controller

  3. when each remote site runs VSS

  4. when the remote sites use WAN optimization

Correct Answer: A

Question No.157

An organization needs to implement isolated logical structure due to compliance regulations. What complex access control network virtualization method can it use?

  1. The IT organization creates a quarantine network for end points that do not meet the posture assessment requirements

  2. The IT organization creates a separate guest network for wireless and wired clients

  3. The IT organization acts as a client serving different, isolated departments

Correct Answer: A

Question No.158

Which option is a benefit of Cisco Discovery Protocol?

  1. provides information about directly connected Cisco devices

  2. provides greater detail about collected data, including time stamping

  3. part of the IEEE 802 1ab standard

  4. combines with the network layer data that is gathered by NetFlow when using a NetFlow collector

Correct Answer: A


Cisco Discovery Protocol (formerly known as CDP) is a Layer 2, media-independent, and network-independent protocol that runs on Cisco devices and enables networking applications to learn about directly connected devices nearby. This protocol facilitates the management of Cisco devices by discovering these devices, determining how they are configured, and allowing systems using different network-layer protocols to learn about each other.

Question No.159

Which three options are characteristics of data center evolution? (Choose three.)

  1. consolidation

  2. virtualization

  3. automation

  4. standardization

  5. optimization

  6. modulation

Correct Answer: ABC

Question No.160

Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data center?

  1. It supports NIC teaming.

  2. It removes STP dependency.

  3. It increases scalability.

  4. It improves convergence time.

Correct Answer: A

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 121-130

Get Full Version of the Exam

Question No.121

What DNS entry to use for WLC with firmware version 6.0 or later so an Access Point can determine the controller#39;s IP address?

  1. DNS A record with controller#39;s hostname

  2. DHCP option 43

  3. cisco-capwap-controller

  4. cisco-lwapp-controller

Correct Answer: C

Question No.122

What will extend a trust boundary (there is switch interface configuration with separate voice VLAN and data VLAN configured where the phone is connected to, also small diagram showing endpoint (host), IP Phone, Access Switch, Distribution Switch, Core Switch and Data Centre Aggregation switch)?

  1. Multiple layers PC

  2. IP Phone

  3. Access Switch

  4. Distribution Switch

  5. Core Switch

Correct Answer: B

Question No.123

A design engineer must send management information messages across the public internet. What solution provides a secure and encrypted method for passing these messages?

  1. SNMP v3

  2. NetFlow v9

  3. Syslog Traps

  4. Secure Shell v2

  5. SNMP v2

Correct Answer: A

Question No.124

Which two benefits are realized by establishing virtualization in a campus network? (Choose two)

  1. enables path isolation

  2. enhances network agility

  3. consolidates applications

  4. enables unlimited scalability

  5. reduces network bandwidth

Correct Answer: BD

Explanation: solutions/net_brochure0900aecd804a17db.html

Question No.125

An organization needs a WAN Transport technology that meets these criteria:



has a low initial cost provides low-to-medium BW


has medium-to-high latency and jitter

Which technology should the organization use?

  1. DSL

  2. X.25

  3. ISDN

  4. wireless

  5. analog modem

Correct Answer: A

Question No.126

Which virtualization deployment an engineer will execute to separate to acompplish security policies?

  1. Same corporate Network with NAC capabilities.

  2. Something using VLANs

  3. dont remember

Correct Answer: B

Question No.127

When considering the three VoIP design models – single site, centralized multisite, and distributed multisite – which question below would help to eliminate one of the options?

  1. Will the switches be required to provide inline power?

  2. Will users need to make offsite calls, beyond the enterprise?

  3. Will users require applications such as voice mail and interactive voice response?

  4. Are there users whose only enterprise access is via a QoS-enabled WAN?

Correct Answer: D

Question No.128

Which IP address can be routed to cross the public Internet?





Correct Answer: C

Question No.129

Refer to the exhibit. On which router should you configure redistribution?


  1. Router 1

  2. Router 2

  3. Router 3

  4. Router 4

  5. Router 5

Correct Answer: B

Question No.130

Which statement about VSS is true?

  1. it can maintain the topology independently of STP

  2. it requires HSRP.

  3. it requires STP for link redundancy

  4. it has two control planes.

Correct Answer: A

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 131-140

Get Full Version of the Exam

Question No.131

What tool would you use to capture, segregate and analyse IP traffic?

  1. Protocol Analyser

  2. NetFlow

Correct Answer: B

Question No.132

Which IPv6 feature enables routing to distribute connection requests to the nearest content server?

  1. Link-local

  2. Site-local

  3. Anycast

  4. Multicast

  5. Global aggregatable

Correct Answer: C


Any cast is a network addressing and routing methodology in which data grams from a single sender are routed to the topologically nearest node in a group of potential receivers all identified by the same destination address.

Question No.133

Cisco FabricPath brings the benefits of routing protocols to Layer 2 network Ethernet environments. What are two advantages of using Cisco FabricPath technology? (Choose two.)

  1. Cisco FabricPath provides MAC address scalability with conversational learning.

  2. Loop mitigation is provided by the TTL field in the frame.

  3. Cisco FabricPath technology is supported in all Cisco platforms and can replace legacy Ethernet in all campus networks.

  4. Cisco FabricPath relies on OSPF to support Layer 2 forwarding between switches, which allows load balancing between redundant paths.

  5. Cisco FabricPath is IETF-standard and is not used with Cisco products.

Correct Answer: AB

Question No.134

What Cisco product is designed to improve the performance of Windows file and exchange services in remote data centers?

  1. Application Control Engine

  2. Wide Area Application Services

  3. Cisco Application Policy Infrastructure Controller

  4. Cisco Prime Network Services Controller

Correct Answer: B

Question No.135


Drag the STP toolkit term on the left to the definition on the right.


Correct Answer:


Question No.136

Which technology should a company use to connect a branch office to headquarters via an Internet connection while maintaining confidentiality and the flexibility to run a routing protocol between the two locations?

  1. GRE over IPsec

  2. IPsec

  3. GRE

  4. SSL VPN

Correct Answer: A

Question No.137

What information should be utilized to identify network applications that are running on an existing network infrastructure?

  1. customer information

  2. existing documentation

  3. traffic analysis

  4. external feedback

  5. user feedback

Correct Answer: C

Question No.138

According to fundamental design principles, which location is best for implementing Cisco QoS policies?

  1. hardware

  2. software

  3. Cisco 3900 Series Integrated Services Routers running IOS software

  4. WAN routers running IOS software

Correct Answer: A

Question No.139

Which technology allow multiple instances of a routing table to coexist on the same router at the same time?

  1. vPC

  2. Cisco virtual router

  3. VRF

  4. VSS

Correct Answer: C

Question No.140

What are two important aspects to consider when looking at backup circuit options for a branch location? (Choose two)

  1. local exchange carrier diversity

  2. type of dynamic routing protocol

  3. type of core switch

  4. backup MPLS connection

  5. Internet service provider diversity

Correct Answer: BE

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 141-150

Get Full Version of the Exam

Question No.141

Which virtualization solution provides redundancy using a pair of switches that appear as one logical switch and removes the need for a First HOP Redundancy Protocol?

  1. VDC

  2. VRRP

  3. vPC

  4. VSS

Correct Answer: D

Explanation: system-1440/prod_qas0900aecd806ed74b.html

Question No.142

A network engineer must collect application-level information of deep attack?

  1. NBAR

  2. CiscoWorks

  3. SNMP collector

  4. NetFlow collector

  5. Syslog

Correct Answer: A

Question No.143

Refer to the exhibit. In this suboptimal design of a homogeneous Cisco network, which version of spanning tree provides the fastest convergence?


  1. PVST

  2. CST

  3. RPVST

  4. VSTP

  5. PVST

Correct Answer: C

Question No.144

Which option is one of the methods that Cisco routers and switches can use to share information between directly connected devices on a regular basis?

  1. NetFlow

  2. ARP

  3. NHRP

  4. CDP

Correct Answer: A

Question No.145

A network engineer is tasked to upgrade and expand a large existing production network. From the IOS CLI, what two protocols can be used to build a topology map of the existing network? (Choose two.)

  1. SNMP

  2. IP SLA

  3. ICMP Echo

  4. LLDP

  5. Traceroute

Correct Answer: DE

Question No.146

What three primary sources of information are needed to perform a network audit? (Choose three.)

  1. existing documentation

  2. new documentation

  3. existing network management software

  4. new network management tools

  5. management personnel

  6. technical personnel

Correct Answer: ACD

Question No.147

A network engineer must connect two sites. Each site has a different autonomous system number. Which method do you use to exchange?

  1. BGP

  2. IGP

  3. EIGRP

  4. OSPFv3

Correct Answer: A

Question No.148

Consider the reservation of IP Addressing what mask you will use in a point to point connection between two Buildings?




Correct Answer: B

Question No.149


Drag the security term on the left to the matching description on the right.


Correct Answer:


Question No.150

Which tool captures network traffic, decodes the protocols in the captured packets, and provides statistics to characterize errors, and response time?

  1. continuity tester

  2. protocol analyzer

  3. spectrum analyzer

  4. bit error rate tester

Correct Answer: B


Protocol analyzeris a tool that captures network traffic,decodes the protocols in the captured packets, andprovides statistics to characterize load, errors, andresponse time

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Exam

Question No.81

Which two network services should you host on the DMZ? (Choose two)

  1. NFS

  2. WWW


  4. DHCP

  5. FTP

Correct Answer: BE

Question No.82

Which option is an advantage of a Layer 3 access model over the traditional Layer 2 access model?

  1. increased neighbor adjacencies

  2. faster convergence

  3. reduced resources on the router

  4. reduced size of routing table

Correct Answer: B

Question No.83

Which two states are RSTP port states? (Choose two.)

  1. discarding

  2. learning

  3. blocking

  4. listening

  5. disabled

Correct Answer: AB

Question No.84

Refer to exhibit. Based on the following output from the access switch, which option is the trust boundry for QoS?


  1. IP phone

  2. access

  3. core

  4. endpoint

  5. distribution

Correct Answer: E

Question No.85

Which two are types of network virtualization? (Choose two.)

  1. VSS: Virtual Switching System

  2. VRF: virtual routing and forwarding

  3. VCI: virtual channel identifier

  4. VLSM: variable length subnet masking

  5. VM: virtual machine

  6. VMP: Virtual Memory Pool

Correct Answer: AB


Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and is logically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independent routing paths. Here are some examples of network virtualization technologies:

VLAN: Virtual local-area network VSAN: Virtual storage-area network VRF: Virtual routing and forwarding VPN: Virtual private network

VPC: Virtual Port Channel

Question No.86

Refer to the exhibit. A standard Layer 2 campus network design is pictured. Which numbered box represents the core layer?


  1. #1

  2. #2

  3. #3

  4. #4

  5. #5

Correct Answer: C

Question No.87

Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.)

  1. NetFlow

  2. FWSM

  3. ISE

  4. VRRP

  5. sFLOW

Correct Answer: ABC

Question No.88

Which four services does the architecture for Media Services contain? (Choose four.)

  1. access services

  2. transport services

  3. storage services

  4. forwarding services

  5. session control services

  6. security services

  7. filtering services

  8. remote access services

Correct Answer: ABCE


An architecture framework for media services supports different models of video models. As shown in Figure 14-13, the network provides service to video media in the Media Services Framework. Those services are access services, transport services, bridging services, storage servers, and session control services, which arc provided to endpoints. Access services provide identity of end devices, mobility, and location services. Transport services provide QoS for reliable packet delivery. Bridging services provide transcoding, conferencing, and recording services of media streams.

Storage services provide capture and storage of media streams and content management and distribution.

Session control services provide session signaling and control and gateway services.


Question No.89

Which protocol is used to reserve bandwidth for the transport of a particular application data flow across the network?

  1. cRTP

  2. IEEE 802.1P

  3. RSVP

  4. LFI

  5. Auto QOS

Correct Answer: C


RSVP Signaling protocol that enables end stations or applications to obtain guaranteed bandwidth and low delays for their data flows.

Question No.90

In an enterprise Layer 2 switched network, which protocol must be running to enable link redundancy?

  1. CDP

  2. PaGP

  3. LACP

  4. STP

Correct Answer: D

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 91-100

Get Full Version of the Exam

Question No.91

Which two options can be virtual networking devices? (Choose two.)

  1. ESX host

  2. VM

  3. switches

  4. routers

  5. Hyper-V host

Correct Answer: CD

Question No.92

A routing protocol neighbor relationship has been established between two routers across the public Internet using GRE. What technology can be used to encrypt this communication channel?

  1. access lists

  2. IP security

  3. context based access

  4. intrusion prevention system

Correct Answer: B

Question No.93

In which two places is redundancy recommended in an enterprise campus network design? (Choose two.)

  1. building distribution

  2. campus core

  3. building access

  4. e-commerce

  5. Internet connectivity

Correct Answer: AB

Question No.94

In which phase of cisco design life cycle the validation of network infrastructure happened?

  1. Assessment in plan

  2. Deployment in build

  3. Validation in build

  4. Optimization in operate

Correct Answer: C

Question No.95

Which two issues are typical challenges to network stability and reliability? (Choose two.)

  1. hardware failures

  2. layer 1 link failures

  3. application failures

  4. core layer failures

  5. distribution layer failures

Correct Answer: AB

Question No.96

Which two design decision can improve network resiliency? (Choose two)

  1. Implement redundant link

  2. Increase data plane bandwidth

  3. Implement serial device connection

  4. Reduce network size

  5. Implement redundant topology

Correct Answer: AE

Question No.97

Application servers require load balancing and security services. Where in the data center network should these services be provisioned?

  1. core

  2. aggregation

  3. Layer 3 access

  4. distribution

Correct Answer: B

Question No.98

Refer to the exhibit. Which functionality must be enabled on router A to connect two networks for translating private addresses into quot;legalquot; public addresses on a one-for-one basis?


  1. NAT

  2. VLAN

  3. GARP

  4. PPP

Correct Answer: A

Question No.99

What statement about EVN is true?

  1. Support RIP

  2. Support OSPFV3

  3. Required LDP

  4. Support as many as 32 virtual networks per device

    Correct Answer: D

    Explanation: overview.html

    Question No.100

    Which option best describes the high-level design document?

    1. It includes specific information such as hardware models, software versions, IP addressing, and routing protocols.

    2. It contains the test plan to certify that the customer#39;s network is ready for use.

    3. it contains the steps needed to install and configure the network equipment and the steps that verify basic network operation.

    4. it includes business and technical requirements and the proposed network architecture.

Correct Answer: D


High-level design (HLD) explains the architecture that would be used for developing a software product. The architecture diagram provides an overview of an entire system, identifying the main components that would be developed for the product and their interfaces. The HLD uses possibly nontechnical to mildly technical terms that should be understandable to the administrators of the system

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 101-110

Get Full Version of the Exam

Question No.101

What is the maximum number of switches in VSS?









Correct Answer: A

Question No.102

If two routing protocols have the same route and prefix, which effect do they have on the routing table?

  1. Only the route with the lowest administrative distance is added.

  2. Only the route with the highest administrative distance is added.

  3. Both routes are added.

  4. Neither route is added, and a loop is formed.

Correct Answer: A

Question No.103

Which statement is true concerning the data center access layer design?

  1. The access layer in the data center is typically built at Layer 3, which allows for better sharing of services across multiple servers.

  2. With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.

  3. A dual-homing NIC requires a VLAN or trunk between the two access switches to support the dual

    IP addresses on the two server links to two separate switches.

  4. The access layer is normally not required, as dual homing is standard from the servers to the aggregation layer.

Correct Answer: B

Question No.104

Which is part of the Prepare phase of PPDIOO?

  1. Obtain site contact information

  2. Perform network audit

  3. Identify customer requirements

  4. Perform gap analysis

Correct Answer: C



Prepare Phase

The Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to support the strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy.

Question No.105

A consultant at Company XYZ connects to the Guest wireless network but cannot reach the MGMT VLAN to complete an audit . Other users can connect to the MGMT VLAN without any issues. Why is the consultant unable to access the MGMT VLAN?

  1. The AP is offline

  2. The access is not permitted

  3. The MGMT VLAN is down

  4. The WLC is offline

Correct Answer: B

Question No.106

How does the use of multiple areas in a link state routing protocol improve network scalability?

  1. reduces network bandwidth

  2. permits partial table updates

  3. enables route summarization

  4. overcomes router hop limit.

Correct Answer: C

Question No.107

When designing a new enterprise campus network, what topology should be used for maximum scalability?

  1. flat

  2. three-layer

  3. star

  4. partial mesh

  5. full mesh

Correct Answer: B

Question No.108

Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.)

  1. split horizon

  2. route summarization

  3. route poisoning

  4. tuned timers

Correct Answer: AC

Question No.109

You design a network with the following network addresses:

Which route address is the best summary of these network addresses? A.





Correct Answer: C

Question No.110

What two components are used when creating an endpoint#39;s modified EUI-64 format IPv6 address? (Choose two.)

  1. IPv6 Prefix

  2. 64-bit MAC address

  3. 48-bit MAC address

  4. IPv4 Address

  5. Link Local Suffix

Correct Answer: AC

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 111-120

Get Full Version of the Exam

Question No.111

When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized? (Choose two.)

  1. multimode fiber

  2. Fibre Channel

  3. HVDC transmission lines

  4. single-mode fiber

  5. serial RS-232

  6. Gigabit Ethernet 1000BASE-CX

Correct Answer: AD

Question No.112

A data center is reaching its power and cooling capacity. What two virtualization technologies can address the problem by directly reducing the number of physical devices? (Choose two.)

  1. virtual switching systems (VSS)

  2. virtual device contexts (VDC)

  3. virtual servers

  4. virtual routing and forwarding

  5. virtual port channels (vPC)

  6. virtual LANs

Correct Answer: BC

Question No.113

Which RFC defines the IPv6 standard?

  1. RFC 1918

  2. RFC 2338

  3. RFC 2460

  4. RFC 2740

Correct Answer: C

Question No.114

What IP address is used for broadcast for





Correct Answer: A

Question No.115

Which two can be used as a branch office WAN solution? (Choose two.)

  1. frame relay

  2. MPLS

  3. Metro Ethernet

  4. GPRS

  5. dial-up modem

  6. 3G USB modems

Correct Answer: BC


Frame relay is old #39;shared#39; technology today#39;s sites use some flavor or Metro E or MPLS/VPN.

Question No.116

Traditionally, the DMZ exist between which two locations? (Choose two.)

  1. building distribution

  2. building access

  3. corporate network

  4. metro access

  5. Internet

Correct Answer: CE

Question No.117

Which option is an advantage of the bottom-up design model?

  1. focuses on the needs of user communities

  2. includes a thorough analysis of customer requirements

  3. facilitates a quick response to client requests

  4. produces a quot;big-picturequot; of the desired outcome

Correct Answer: C

Question No.118

Which statement about using STP in a redundant – link scenario is true?

  1. It provides the most efficient use to redundant links.

  2. it uses only one redundant link at any one time.

  3. it bonds the two links and treats them as one link.

  4. it balances traffic by transmitting packets on alternating links.

Correct Answer: D

Question No.119

An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise Architecture Model. Which two submodules are part of this module? (Choose two.)

  1. DMZ

  2. enterprise branch

  3. building distribution

  4. server farm/data center

  5. MAN

Correct Answer: CD

Question No.120

Why would an engineer implement variable-length subnet masks?

  1. to make a subnet its own VLAN.

  2. to expand an existing subnet .

  3. to make a subnet public.

  4. to prevent wasting IP addresses

Correct Answer: B

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Exam

Question No.71

Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?

  1. stub

  2. totally stubby

  3. backbone

  4. NSSA

  5. virtual link

Correct Answer: D

Question No.72

Which scenario is the best example of a single-homed connected infrastructure?

  1. a data center that is connected to one service provider over an MPLS circuit and another service provicer over an Ethernet connection.

  2. a remote office that is connected to the WAN using a DSL provider and a cable provider.

  3. a small office that uses a DSL link to connect to the WAN.

  4. to corporate office that uses two separate routers to connect to two different service providers.

Correct Answer: C

Question No.73

Which two connector actions are important when designing the core layer?

  1. port security

  2. PoE

  3. Access list requirements

  4. low latency

  5. redundancy

Correct Answer: DE

Question No.74

A company would like to distribute a VM hosting cluster between three data centers with the capability to move VMs between sites. The connectivity between data centers is IP only, and the new design should use the existing WAN. Which Layer 2 tunneling technology should be used?

  1. VPLS

  2. L2TPv3

  3. OTV

  4. AToM

Correct Answer: C

Question No.75

An engineer wants to ensure that the Spanning Tree topology appears loop free while redundant switches are present. Which Layer 2 technology must be used?

  1. VPC

  2. PaGP

  3. LACP

  4. OTV

Correct Answer: C

Question No.76

What access policies to set up for remote VPN access? (Choose three)

  1. Admins are centrally authenticated with full network access

  2. Partners are centrally authenticated with access limited by use of ACLs

  3. Employees are centrally authenticated with access limited by use of ACLs

  4. Admins are locally authenticated with full network access

  5. Partners are centrally authenticated with full access

  6. Employees are centrally authenticated with full access

Correct Answer: ABC

Question No.77

A network engineer must collect application-level information passing through a router. What two

tools can provide this information? (Choose two.)

  1. NBAR

  2. CiscoWorks

  3. SNMP collector

  4. NetFlow collector

  5. Syslog

Correct Answer: AD

Question No.78

A network engineer is tasked with summarizing the routes to a remote site. What is the optimal route statement to connect to the and networks across the corporate WAN?

A. ip route

B. ip route

C. ip route

D. ip route

Correct Answer: B

Question No.79

What three design best practices are key functions of the distribution layer? (Choose three.)

  1. fault domain isolation

  2. admission control

  3. access switch aggregation

  4. QoS tagging

  5. address summarization

  6. end user and application isolation

Correct Answer: ACE

Question No.80

Which statement describes the recommended deployment of DNS and DHCP servers in the Cisco Network Architecture for the Enterprise?

  1. Place the DHCP and DNS servers in the enterprise campus access layer and enterprise branch.

  2. Place the DHCP and DNS servers in the enterprise campus server farm layer and enterprise branch.

  3. Place the DHCP server in the enterprise campus core layer and remote access and VPN module, and place the DNS server in the Internet connectivity module.

  4. Place the DHCP server in the enterprise campus distribution layer, and place the DNS server in the Internet connectivity module.

Correct Answer: B

Get Full Version of 200-310 Dumps

200-310 Dumps

200-310 Real Exam Dumps Questions and answers 21-30

Get Full Version of the Exam

Question No.21

Which two methods are used to reduce the mesh links required between iBGP peers in the same AS? (Choose two.)

  1. community

  2. route reflectors

  3. local preference

  4. confederations

  5. atomic aggregate

Correct Answer: BD

Question No.22

Which two Cisco data center devices can participate in Cisco FabricPath? (Choose two.)

  1. Cisco Nexus 5500 Series Switches

  2. Cisco Nexus 1000V Series Switches

  3. Cisco Nexus 7000 Series Switches

  4. Cisco Nexus 4900 Series Switches

  5. Cisco MDS 9500 Series Multilayer Directors

Correct Answer: AC

Question No.23

OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)

  1. All areas need to connect back to area 0.

  2. The OSPF process number on each router should match.

  3. NSSA areas should be used when an area cannot connect directly to area 0.

  4. Stub areas should be connected together using virtual links.

  5. ECMP may cause undesired results depending on the environment.

Correct Answer: AE

Question No.24

How to reduce the size of a routing table? (Choose two.)

  1. NAT

  2. Summarization

  3. Static routes

  4. VLAN

Correct Answer: AB

Question No.25

Company ABC has intermittent problems registering site IP phones over the WAN with Cisco Unified CallManager at headquarter. The company hires a network consultant to help implement QoS in its network. Which technique should the consultant use to identify traffic and apple alone that travers the network?

  1. policing

  2. NBAR

  3. priority queuing

  4. RSVP

Correct Answer: B

Question No.26

With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength?

  1. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.

  2. N N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.

  3. N N 1 redundancy configuration has the least impact to system management because all of the controllers are colocated in an NOC or data center.

  4. N 1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the same subnet for more efficiency.

Correct Answer: B

Question No.27

Which option can use deep-packet examination to determine the specific nature of an attack?

  1. network IPS

  2. NetFlow collector

  3. stateful firewall

  4. syslog server

Correct Answer: A

Question No.28

How many switches can be combined into a single network element using VSS?









Correct Answer: D

Question No.29

The spanning tree topology can be simplified by deploying what Cisco NX-OS technology in the distribution and access layer?

  1. VDC

  2. vPC

  3. Rapid PVST

  4. VSS

  5. Flex Links

Correct Answer: B

Question No.30

Router A has three feasible successors to the network, which are listed here: Option 1 has a metric of 8123228.

Option 2 has a metric of 2195467. Option 3 has a metric of 8803823.

The variance 4 command was issued on Router A.

How many active entries does Router A have in its routing table for the network?









Correct Answer: C

Get Full Version of 200-310 Dumps