200-310 - Designing for Cisco Internetwork Solutions
Which IPv6 feature enables routing to distribute connection requests to the nearest content server?
Which two are types of network virtualization. (Choose two.)
You are tasked with designing a new branch office that will support 75 users with possible expansion in the
Which two can be used as a branch office WAN solution.
(Choose two.)
What is the acceptable amount of one
way network delay for voice and video applications.
Which mode is used to exclusively look for unauthorized access points.
Which two routing protocols converge most quickly.
(Choose two.)
Which of these is the equation used to derive a 64 Kbps bit rate.
When designing the threat detection and mitigation portion for the enterprise data center network, which of
Which WLC interface is dedicated for WLAN client data.
Which of the following is a component within the Cisco Enterprise Campus module.
Where in the Cisco Enterprise Architecture model does network management reside.
Which three solutions are part of the Borderless Network Services.
(Choose three.)
The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization.
When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart,
Which Cisco technology using Nexus NX
OS infrastructure allows the network architect to create up to four
Spanning Layer 2 across geographically separate data centers is a key consideration for current data center
Which two statements about designing the Data Center Access layer are correct.
(Choose two.)
The enterprise campus core layer has requirements that are unique from the distribution and access layers.
Which of these statements is true concerning the data center access layer design.
Which one of these statements is true concerning the data center distribution (aggregation) layer design.
Which is a factor in enterprise campus design decisions.
Which IGP provides the fastest convergence by default.
Which three are valid Layer 2 access designs.
(Choose three.)
Which Gigabit Ethernet media type provides the longest reach without a repeater.
Which three are associated with the distribution layer within the campus design.
(Choose three.)
Which two enterprise campus layers are combined in a medium
sized LAN.
(Choose two.)
What is a characteristic of campus core designs.
In the enterprise data center, which are the three main components.
(Choose three.)
Which two are characteristics of a Lightweight Access Point.
(Choose two.)
Which model of ISR is utilized for the teleworker design profile.
Which three options represents the components of the Teleworker Solution.
(Choose three.)
Which three service categories are supported by an ISR.
(Choose three.)
When designing for a remote worker, which two are typical requirements.
(Choose two.)
What is the maximum number of groups that is supported by GLBP.
Which two routing protocols usually converge most quickly.
(Choose two.)
Which consideration is the most important for the network designer when considering IP routing.
Your supervisor has asked you to deploy a routing protocol within the lab environment that will allow for
At which layer of the network is route summarization recommended.
Which two link state routing protocols support IPv6 routing.
(Choose two.)
Which is the North American RIR for IPv4 addresses.
type 5 LSAs but still allow the redistribution of external routes.
Which is usually used to connect to an upstream ISP.
You are designing a network that requires a routing protocol that will use minimal network bandwidth. Which
Which two statements best describe an OSPF deployment.
(Choose two.)
Which three items pertain to EIGRP.
(Choose three.)
A hierarchical design of the EIGRP domain facilitates which two of the following.
(Choose two.)
Which three protocols support VLSM.
(Choose three.)
Which statement should the designer keep in mind when considering the advanced routing features.
Which statement describes a unique advantage of EIGRP.
Which routing protocol classification should you use when full topology information is needed.
When designing the infrastructure protection portion for the enterprise edge, which solution would be the
Which two design approaches provide management of enterprise network devices.
(Choose two.)
You are asked to design a new branch office that will need to support 25 users. These users will be using
What are the three modes of unicast reverse path forwarding.
(Choose three.)
Which network access control technology is recommended to use with Layer 2 access layer switches.
Which is the equation used to derive a 64 Kbps bit rate.
Which technology enables WLCs to peer with each other to enable roaming support.
Which IP telephony component supports VoIP, PoE, and QoS.
Which factor would be most influential in choosing multimode fiber optic connections over UTP.
Which two devices would you place in your DMZ to ensure enterprise edge security.
(Choose two.)
Which three are security services offered through Cisco Router Security.
(Choose three.)
Which voice codec should you use in order to provide toll quality calls.
Which three are features of LWAPP.
(Choose three.)
Which three of these are layers in the Cisco SONA Architecture.
(Choose three.)
An engineer receives a resource utilization alert on a router. What command should be used to investigate
What part of the network does a top
down network design focus on for solution development.
What three design requirements are key to designing a campus core.
(Choose three.)
What type of device can be installed to increase a broadcast domain.
To what Layer 2 technology does VRF closely compare.
In which network location should an external DNS server be placed.
What submodule is found within the Enterprise Edge module.
What branch design supports 100 to 1000 users and integrates ASA firewalls.
What IPv4 addressing technique allows for the division of addresses into subnets of different sizes.
What routing protocol requires full mesh between internal peers in an enterprise network.
What characteristic separates link state routing protocols from a distance vector.
What routing configuration can prevent routing loops between IGPs.
What is the first step when creating a network security policy.
What two CoS values are used by voice traffic.
(Choose two.)
What wireless authentication option requires a Public Key Infrastructure.
What is the primary advantage of implementing a wireless LAN controller in a wireless LAN design.
destination endpoint in a lightweight wireless deployment.
Which two of these are scalability benefits of designing a network that utilizes VPNs.
(Choose two.)
Which two design criteria require VLANs in a proposed solution.
(Choose two.)
Which three Cisco technologies can you use to detect and mitigate threats.
(Choose three.)
Which technology allows remote networks to be connected via site
to
site tunnels.
Which RFC defines the IPv6 standard.
What is the maximum RIPv2 hop count for a reachable route.
Which Cisco Wireless LAN Controller interface is used for out
of
band management.
Which HSRP parameters must match, to ensure proper functionality.
What three primary sources of information are needed to perform a network audit.
(Choose three.)
Which three layers comprise the traditional hierarchical model.
(Choose three.)
Which first
hop redundancy protocol dynamically distributes client traffic between multiple routers.
Which three options are characteristics of data center evolution.
(Choose three.)
Which option is a benefit of the modular approach to network design.
Which statement describes the methodology that supports the Cisco Enterprise Architecture models.
Which design is the recommended geometric design for routed topologies.
Which two mechanisms are used by distance vector protocols to prevent routing loops.
(Choose two.)
Which interior routing protocol has the most preferable administrative distance by default.
Where in the network hierarchy should network access control be performed.
What are two advantages of employing scalability when designing a campus network.
(Choose two.)
What two SAN protocols will allow a customer to utilize 10GbE for SAN access.
(Choose two.)
Which option is an advantage of the bottom
up design model.
Which two options are benefits of using a modular network architecture.
(Choose two.)
Which two features are available in the Cisco STP Toolkit.
(Choose two.)
What three design best practices are key functions of the distribution layer.
(Choose three.)
What design requirement is necessary for campus network access layer switching.
What are two benefits of a structured IPv4 addressing scheme.
(Choose two.)
What are two reasons discontinuous IPv4 networks hinder scalability.
(Choose two.)
What is a benefit of IPv6 over IPv4 addresses.
Which option is a benefit of Cisco Discovery Protocol.
Which option is an example of physical device virtualization.
In which two places is redundancy recommended in an enterprise campus network design.
(Choose two.)
What are two purposes of route redundancy.
(Choose two.)
Which IP address can be routed to cross the public Internet.
Which two options can be virtual networking devices.
(Choose two.)
What are two components of the Build phase in the Cisco Design Lifecycle.
(Choose two.)
Which design enables easy and flexible scaling in the Cisco Enterprise Architecture model.
Which two issues are typical challenges to network stability and reliability.
(Choose two.)
For a VLAN that requires 70 hosts, which subnet is the most efficient.
Which benefit is an advantage of route summarization.
Which two states are RSTP port states.
(Choose two.)
When is the Cisco FlexConnect design model recommended.
In which two modes can you deploy Cisco IPS appliances.
(Choose two.)
Which item is the fundamental basis of a virtual network.
Directory services and electronic messaging are performed at which layer of the OSI model.
In an enterprise Layer 2 switched network, which protocol must be running to enable link redundancy.
Which two descriptions of Cisco Application Centric Infrastructure are true.
(Choose two.)
Which statement about VSS is true.
Which two processes are included in the Build phase of the Cisco Design Lifecycle.
(Choose two.)
Which two statements are true regarding a hierarchical network.
(Choose two.)
Which two options best describe the top
down design approach.
(Choose two.)
statement to connect to the 192.168.101.0/24 and 192.168.102.0/24 networks across the corporate WAN.
Why would an engineer implement variable
length subnet masks.
Which option can use deep
packet examination to determine the specific nature of an attack.
Which two design decisions can improve network resiliency.
(Choose two.)
Which two considerations are important when designing the access layer.
(Choose two.)
adherence to best practices and corporate policies.
For a VLAN that requires 60 hosts, which subnet is the most efficient.
Which Cisco technology can connect more than two switches so that they behave as one switch.
Which two network services should you host on the DMZ.
(Choose two.)
Which network layer is the best fit for security features such as DAI and DHCP snooping.
Which two features are Cisco recommended best practices for user access interfaces.
(Choose two.)
Which statement about modular network design in true.
What are two benefits of the bottom
up design approach.
(Choose two.)
Which two considerations are important when designing the core layer.
(Choose two.)
How many switches can be combined into a single network element using VSS.
Which option is an advantage of a Layer 3 access model over the traditional Layer 2 access model.
Which statement about using STP in a redundant
link scenario is true.
Refer to the exhibit. On which router should you configure redistribution.
Refer to the exhibit. Which statement is true concerning enterprise edge distribution switches.
Refer to the exhibit. Which layer is the distribution layer.
Refer to the exhibit. Where should routes in the routing table be aggregated or summarized.
Which type of router connects to two different OSPF areas.
How does the use of multiple areas in a link state routing protocol improve network scalability.
Which protocol is an example of a fixed two
level hierarchical routing protocol.
An engineer wants to find all of the objects of a certain type available in the MI
At which layer of the network should you perform traffic filtering and QoS classification.
Which two techniques can you use to reduce the size of a network routing table.
(Choose two.)
Traditionally, the DMZ exists between which two locations.
(Choose two.)
Which option best describes the high
level design document.
Which statement about using VSS on a pair of switches is true.
Which scenario is the best example of a single
homed connected infrastructure.
Which address is the broadcast address of subnet 120.20.78.8/30.
Which two major campus design models does the Cisco Unified Wireless Network support.
(Choose two.)
Which two protocols are classful routing protocols.
(Choose two.)
Which VPN tunneling technology supports IP multicast.
Which format reflects that of the IPv6 global unicast address.
Which connection provides cost effective backup connectivity for a branch network.
Which two benefits are realized by establishing virtualization in a campus network.
(Choose two.)
Which statement correctly describes queuing in environments supporting teleworkers.
Which first
hop redundancy protocol dynamically distributes traffic across multiple gateways.
What two addresses are defined under RFC 1918.
(Choose two.)
