200-310 - Designing for Cisco Internetwork Solutions

Go back to Cisco

Exam FAQ

How many questions are there on the 200-310 exam? How long is the 200-310 exam? How much does the 200-310 exam cost? What is the best way to study for the 200-310 exam?

Example Questions

In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services? A company is implementing an Identity Management solution with these characteristics: existing AAA Server Cisco Catalyst switches minimal added investments Which Cisco Trust and Identity Management solution would you recommend? Which two statements about designing the Data Center Access layer are correct? (Choose two.) What two SAN protocols will allow a customer to utilize 10GbE for SAN access? (Choose two.) An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise Architecture Model. Which two submodules are part of this module? (Choose two.) Which Cisco security mechanism has the attributes listed below? it is a sensor appliance it searches for potential attacks by capturing and analyzing traffic it is a "purpose-built device" it is installed passively it introduces no delay or overhead Which RFC defines the IPv6 standard? Which is the North American RIR for IPv4 addresses? Application servers require load balancing and security services. Where in the data center network should these services be provisioned? What is the primary consideration when choosing a routed network design over a traditional campus network design? Which option is a benefit of the modular approach to network design? Which statement describes the methodology that supports the Cisco Enterprise Architecture models? With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which statement is an example of such a strength? When considering the three VoIP design models - single site, centralized multisite, and distributed multisite - which question below would help to eliminate one of the options? An organization needs a WAN Transport technology that meets these criteria: has a low initial cost provides low-to-medium BW has medium-to-high latency and jitter Which technology should the organization use? You want to gather as much detail as possible during a network audit with a minimal impact on the network devices themselves. Which tool would you use to include data time stamping across a large number of interfaces while being customized according to each interface? Which HSRP parameters must match, to ensure proper functionality? Which first-hop redundancy protocol dynamically distributes client traffic between multiple routers? What is the maximum RIPv2 hop count for a reachable route? Which mode is used to exclusively look for unauthorized access points? Which protocol is used for voice bearer traffic? Which three sources does a network designer use to collect information for characterizing an existing network? (Choose three.) Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes? Router A has three feasible successors to the 192.168.1.0/24 network, which are listed here: Option 1 has a metric of 8123228. Option 2 has a metric of 2195467. Option 3 has a metric of 8803823. The variance 4 command was issued on Router A. How many active entries does Router A have in its routing table for the 192.168.1.0/24 network? Where in the network hierarchy should network access control be performed? WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet? Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.) Which statement is true concerning the data center distribution (aggregation) layer design? Which Cisco Wireless LAN Controller interface is used for out-of-band management? OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.) Which statement is true concerning the data center access layer design? A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to start the design? Which technology allows remote networks to be connected via site-to-site tunnels? What is the benefit of VLSM? Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.)

Study Guides