200-310 - Designing for Cisco Internetwork Solutions
Go back to
How many questions are there on the 200-310 exam?
There are 55-65 questions on the 200-310 exam to be completed in 75 minutes.
How long is the 200-310 exam?
The 200-310 exam is 75 minutes to complete 55-65 questions.
How much does the 200-310 exam cost?
The 200-310 exam is $300. The exam provider is Pearson Vue and you can register for the exam on their website.
What is the best way to study for the 200-310 exam?
The best way to study for the 200-310 exam is to practice at Exam.com.
In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services?
A company is implementing an Identity Management solution with these characteristics: existing AAA Server Cisco Catalyst switches minimal added investments Which Cisco Trust and Identity Management solution would you recommend?
Which two statements about designing the Data Center Access layer are correct? (Choose two.)
Layer 2 connectivity is primarily implemented in the access layer.
Layer 2 clustering implementation requires servers to be Layer 2 adjacent.
What two SAN protocols will allow a customer to utilize 10GbE for SAN access? (Choose two.)
An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise Architecture Model. Which two submodules are part of this module? (Choose two.)
server farm/data center
Which Cisco security mechanism has the attributes listed below? it is a sensor appliance it searches for potential attacks by capturing and analyzing traffic it is a "purpose-built device" it is installed passively it introduces no delay or overhead
Which RFC defines the IPv6 standard?
Which is the North American RIR for IPv4 addresses?
Application servers require load balancing and security services. Where in the data center network should these services be provisioned?
What is the primary consideration when choosing a routed network design over a traditional campus network design?
Layer 3 service support at the network edge
Which option is a benefit of the modular approach to network design?
Which statement describes the methodology that supports the Cisco Enterprise Architecture models?
It divides the network into functional network modules.
With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength?
N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.
When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options?
Are there users whose only enterprise access is via a QoS-enabled WAN?
An organization needs a WAN Transport technology that meets these criteria: has a low initial cost provides low-to-medium BW has medium-to-high latency and jitter Which technology should the organization use?
You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface?
Which HSRP parameters must match, to ensure proper functionality?
Which first-hop redundancy protocol dynamically distributes client traffic between multiple routers?
What is the maximum RIPv2 hop count for a reachable route?
Which mode is used to exclusively look for unauthorized access points?
rogue detector mode
Which protocol is used for voice bearer traffic?
Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three.)
Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
Router A has three feasible successors to the 192.168.1.0/24 network, which are listed here: Option 1 has a metric of 8123228. Option 2 has a metric of 2195467. Option 3 has a metric of 8803823. The variance 4 command was issued on Router A. How many active entries does Router A have in its routing table for the 192.168.1.0/24 network?
Where in the network hierarchy should network access control be performed?
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?
Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.)
Which statement is true concerning the data center distribution (aggregation) layer design?
A mix of both Layer 2 and Layer 3 access is the most optimal.
Which Cisco Wireless LAN Controller interface is used for out-of-band management?
OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)
All areas need to connect back to area 0.
ECMP may cause undesired results depending on the environment.
Which statement is true concerning the data center access layer design?
With Layer 2 access, the default gateway for the servers can be configured at the access or aggregation layer.
A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to start the design?
Which technology allows remote networks to be connected via site-to-site tunnels?
What is the benefit of VLSM?
reduces the routing table size by using manual route summarization
Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.)
reduces the number of physical connections
simplifies the underlying structure of a customer WAN