Act now and download your Cisco ccda 200 310 official cert guide download test today! Do not waste time for the worthless Cisco ccda 200 310 pdf tutorials. Download Latest Cisco Designing for Cisco Internetwork Solutions exam with real questions and answers and begin to learn Cisco 200 310 desgn with a classic professional.
Q49. What three primary sources of information are needed to perform a network audit? (Choose three.)
A. existing documentation
B. new documentation
C. existing network management software
D. new network management tools
E. management personnel
F. technical personnel
Answer: A,C,D
Q50. Which two are types of network virtualization? (Choose two.)
A. VSS: Virtual Switching System
B. VRF: virtual routing and forwarding
C. VCI: virtual channel identifier
D. VLSM: variable length subnet masking
E. VM: virtual machine
F. VMP: Virtual Memory Pool
Answer: A,B
Explanation:
Network virtualization encompasses logical isolated network segments that share the same
physical infrastructure. Each segment operates independently and is logically separate
from the other segments. Each network segment appears with its own privacy, security,
independent set of policies, QoS levels, and independent routing paths.
Here are some examples of network virtualization technologies:
VLAN: Virtual local-area network
VSAN: Virtual storage-area network
VRF: Virtual routing and forwarding
VPN: Virtual private network
VPC: Virtual Port Channel
Q51. Which two are characteristics of a Lightweight Access Point? (Choose two.)
A. managed via a central wireless LAN controller
B. code upgrade performed via a TFTP server
C. CAPWAP tunnels D. managed directly via CLI or web interface
E. facilitates the creation of its own WLANs and port mappings
Answer: A,C
Q52. A company is implementing an Identity Management solution with these characteristics:
1) existing AAA Server
2) Cisco Catalyst switches
3) minimal added investments
Which Cisco Trust and Identity Management solution would you recommend?
A. NAC Appliance
B. Cisco IBNS
C. CSM
D. Cisco Security MARS
Answer: B
Q53. A routing protocol neighbor relationship has been established between two routers across the public Internet using GRE. What technology can be used to encrypt this communication channel?
A. access lists
B. IP security
C. context based access
D. intrusion prevention system
Answer: B
Q54. Which three are valid Layer 2 access designs? (Choose three.)
A. Looped Triangle
B. Looped Square
C. Looped U
D. Loop-Free Triangle
E. Loop-Free Square
F. Loop-Free U
Answer: A,B,F
Q55. When evaluating network designs, what indicator demonstrates that the modular approach was followed?
A. ability to scale
B. follows best practices
C. redundant connectivity
D. easy to deploy
Answer: A
Q56. You have a campus network that consists of only Cisco devices. You have been tasked to discover the device platforms, the IOS versions, and an IP address of each device to map the network. Which proprietary protocol will assist you with this task?
A. SNMP
B. TCP
C. CDP
D. ICMP
E. LLDP
Answer: C
Q57. Which three statements are true regarding the virtual interface on a Cisco Wireless LAN Controller? (Choose three.)
A. supports mobility management
B. serves as a DHCP relay
C. used for all controller to AP communication
D. supports embedded Layer 3 security
E. default for out-of-band management
F. default for in-band management
G. provides connectivity to AAA servers
Answer: A,B,D
Q58. Which three options are valid Cisco STP tools used to ensure best-practice access layer design for the enterprise campus? (Choose three.)
A. Port fast
B. UDLD
C. Root Guard
D. BPDU Guard
E. Flex Links
F. SPAN
G. Ether Channel
Answer: A,C,D
Explanation:
Access layer Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology.
Use RPVST+ if STP is required. It provides the best convergence.
Set trunks to ON and ON with no-negotiate
Manually prune unused VLANs to avoid broadcast propagation.
Use VTP Transparent mode, because there is little need for a common VLAN database in hierarchical networks.
Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up Port Fast.
Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing.
Use Cisco STP Toolkit, which provides Port Fast, Loop Guard, Root Guard, and BPDU Guard.
Q59. An organization needs a WAN Transport technology that meets these criteria:
. has a low initial cost
. provides low-to-medium BW
. has medium-to-high latency and jitter
Which technology should the organization use?
A. DSL
B. X.25
C. ISDN
D. wireless
E. analog modem
Answer: A
Q60. Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point sub interfaces? (Choose two.)
A. RIPv1
B. RIPv2
C. IS-IS
D. EIGRP
E. OSPF
Answer: D,E
Q61. Which RFC defines the IPv6 standard?
A. RFC 1918
B. RFC 2338
C. RFC 2460
D. RFC 2740
Answer: C
Q62. ACME corporation is implementing dynamic routing on the LAN at its corporate headquarters. The interior gateway protocol that they select must support these requirements: multivendor environment, efficient subnetting, high scalability, and fast convergence..Which interior gateway protocol should they implement?
A. EIGRP
B. OSPF
C. RIPng
D. BGP
Answer: B
Q63. Which statement describes a unique advantage of EIGRP?
A. It enables unequal-cost load balancing.
B. It enables equal-cost load balancing.
C. It enables source-based load balancing.
D. It enables port-based load balancing.
Answer: A
Q64. With deterministic Wireless LAN Controller redundancy design, the different options available to the designer have their own strengths. Which one of these statements is an example of such a strength?
A. Dynamic load balancing, or salt-and-pepper access point design, avoids the potential impact of oversubscription on aggregate network performance.
B. N+N redundancy configuration allows logically grouping access points on controllers to minimize intercontroller roaming events.
C. N+N+1 redundancy configuration has the least impact to system management because all of the controllers are colocated in an NOC or data center.
D. N+1 redundancy configuration uses Layer 3 intercontroller roaming, maintaining traffic on the same subnet for more efficiency.
Answer: B
Explanation: With such an arrangement there is no complex mesh of access points & controllers. Link: http://www.cisco.com/web/learning/le31/le46/cln/qlm/CCDA/design/understanding-wireless-network-controller-technology-3/player.html
N+N WLC Redundancy With N+N redundancy, shown in Figure 5-14. an equal number of controllers hack up each other. For example, a pair of WLCs on one floor serves as a backup to a second pair on another floor. The top WLC is primary for API and AP2 and secondary for AP3 and AP4. The bottom WLC is primary for AP3 and AP4 and secondary for API and AP2. There should be enough capacity on each controller to manage a failover situation.
N+N+1 WLC Redundancy
With N+N+1 redundancy, shown in Figure 5-15, an equal number of controllers back up each other (as with N+N), plus a backup WLC is configured as the tertiary WLC for the APs. N+N+1 redundancy functions the same as N+N redundancy plus a tertiary controller that backs up the secondary controllers. The tertiary WLC is placed in the data center or network operations center