200-310 Designing for Cisco Inter network Solutions Exam Set 2

Which of the following best describes a hypervisor?


Options are :

  • It used to send documents to a web browser.
  • It is used to run a guest OS within a host OS. (Correct)
  • It is used to allow multiple VMs to communicate within a host system.
  • It is used to route packets between VMs and a physical network.

Answer : It is used to run a guest OS within a host OS.

200-310 Designing for Cisco Inter network Solutions Exam Set 4

Which of the following is a leased-line WAN technology that divides a link's bandwidth into equal-sized segments based on clock rate?


Options are :

  • TDM (Correct)
  • WDM
  • ATM
  • DWDM

Answer : TDM

You are installing a 4U device in a data center. Which of the following are you installing?


Options are :

  • a network device in a 7inch space (Correct)
  • a lock for rack security
  • cabling at the demarc
  • an environmental control

Answer : a network device in a 7inch space

Which of the following statements best describes the purpose of CDP?


Options are :

  • CDP is a proprietary protocol used to power IP devices over Ethernet
  • CDP is a standard protocol used to power IP devices over Ethernet.
  • CDP is a proprietary protocol used by Cisco devices to detect neighboring Cisco devices. (Correct)
  • CDP is a standard protocol used by Cisco devices to detect neighboring devices of any type.

Answer : CDP is a proprietary protocol used by Cisco devices to detect neighboring Cisco devices.

400-101 CCIE Routing and Switching Written Practice Exam Set 12

Which of the following is not required of a collapsed core layer in a three-tier hierarchical network design?


Options are :

  • Layer 2 aggregation
  • intelligent network services
  • end user, group, and endpoint isolation (Correct)
  • high-speed physical and logical paths

Answer : end user, group, and endpoint isolation

Which of the following statements are true when VSS is implemented on a distribution layer switch pair in a campus network? (Choose two.)


Options are :

  • Loop Guard should be disabled throughout the VSS-enabled network. (Correct)
  • VSS eliminates the need to use an FHRP for convergence. (Correct)
  • Each access layer switch uses a single, active physical uplink to the distribution switch pair.
  • MEC trunk links should not be configured using the auto-desirable option.

Answer : Loop Guard should be disabled throughout the VSS-enabled network. VSS eliminates the need to use an FHRP for convergence.

Which of the following is a characteristic of the bottom-up design approach?


Options are :

  • It accounts for projected infrastructure growth.
  • It focuses on applications and services.
  • It relies on previous experience. (Correct)
  • It requires a complete analysis of the organization's needs.

Answer : It relies on previous experience.

400-101 CCIE Routing and Switching Written Practice Exam Set 12

In which of the following situations would static routing be the most appropriate routing mechanism?


Options are :

  • when the router has a single link to a router within a different AS (Correct)
  • when the router has redundant links to a router within the same AS
  • when the router has redundant links to a router within a different AS
  • when the router has a single link to a router within the same AS

Answer : when the router has a single link to a router within a different AS

Which of the following are you least likely to implement in the building access layer of an enterprise campus network design? (Choose two.)


Options are :

  • redundancy (Correct)
  • PoE
  • access layer aggregation (Correct)
  • STP

Answer : redundancy access layer aggregation

Which of the following is true of the core layer of a hierarchical design?


Options are :

  • It aggregates LAN wiring closets.
  • It provides address summarization.
  • It aggregates WAN connections.
  • It is also known as the backbone layer. (Correct)
  • It isolates the access and distribution layers.

Answer : It is also known as the backbone layer.

Cisco CCNP Route 300-101 Practice Tests Set 5

Which of the following are required when configuring a VSS? (Choose two.)


Options are :

  • identical IOS versions (Correct)
  • HSRP
  • GLBP
  • identical supervisor types (Correct)
  • VRRP

Answer : identical IOS versions identical supervisor types

You are planning a network by using the top-down design method. You are using structured design principles to generate a model of the completed system. Which of the following are you most likely to ignore?


Options are :

  • business goals
  • future network services
  • technical objectives
  • network protocols (Correct)

Answer : network protocols

Which of the following is not a reason to choose a VPN solution instead of a traditional WAN?


Options are :

  • Traffic is sent over dedicated lines. (Correct)
  • Network expansion is easy
  • The cost is lower
  • Traffic is encrypted.

Answer : Traffic is sent over dedicated lines.

Cisco CCNP Route 300-101 Practice Tests Set 3

On which of the following layers of the hierarchical network design model should you implement PortFast, BPDU guard, and root guard?


Options are :

  • only on access layer ports (Correct)
  • only on distribution layer ports
  • only on core and distribution layer ports
  • only on core layer ports

Answer : only on access layer ports

Which of the following is used by both NetFlow and NBAR to identify a traffic flow?


Options are :

  • Application layer information
  • Network layer information
  • Session layer information (Correct)
  • Transport layer information

Answer : Session layer information

Which of the following is a BGP attribute that represents the external metric of a route?


Options are :

  • confederation
  • route reflector
  • MED (Correct)
  • community

Answer : MED

400-101 CCIE Routing and Switching Written Practice Exam Set 12

Which of the following actions are you most likely to perform first when using the bottomup network design approach?


Options are :

  • Route cables from a server room to workstations. (Correct)
  • Analyze the company application requirements.
  • Configure switches with VLANs.
  • License OSes to host network services.

Answer : Route cables from a server room to workstations.

Which of the following statements are true regarding standard IP ACLs? (Choose two.)


Options are :

  • Standard ACLs can filter traffic from a specific host or a specific network (Correct)
  • Standard ACLs can be numbered in the range from 1 through 99 or from 1300 through 1999.
  • Standard ACLs can be numbered in the range from 1 through 99 or from 1300 through 1999. (Correct)
  • Standard ACLs can filter traffic based on source and destination address
  • Standard ACLs should be placed as close to the source as possible

Answer : Standard ACLs can filter traffic from a specific host or a specific network Standard ACLs can be numbered in the range from 1 through 99 or from 1300 through 1999.

Which of the following statements is true regarding Cisco best practices when implementing QoS in a campus LAN?


Options are :

  • Traffic should be classified as close to its destination as possible.
  • QoS mechanisms should always be implemented in software when possible.
  • Traffic should be marked as close to its source as possible. (Correct)
  • Traffic should be policed as close to the destination as possible.

Answer : Traffic should be marked as close to its source as possible.

Cisco CCNP Route 300-101 Practice Tests Set 5

Which of the following statements regarding VPNs are true? (Choose two.)


Options are :

  • An ISDN terminal adapter can be used as an endpoint device.
  • Workstations do not typically need client software to use a site-to-site VPN. (Correct)
  • VPNs typically cost less to implement than a traditional WAN. (Correct)
  • VPNs route traffic over dedicated leased lines.
  • Data is transmitted in clear text.

Answer : Workstations do not typically need client software to use a site-to-site VPN. VPNs typically cost less to implement than a traditional WAN.

Which of the following WLC interfaces is used for Layer 2 discovery?


Options are :

  • the AP manager interface
  • the service port interface
  • the dynamic interface
  • the management interface (Correct)

Answer : the management interface

Which of the following statements is true regarding the Cisco ACI architecture?


Options are :

  • The scalability of the fabric is limited by the available number of leaf ports.
  • Each spine node requires at least two ports per leaf node
  • Spine nodes must be fully meshed.
  • All nonlocal traffic traverses only a single spine node. (Correct)

Answer : All nonlocal traffic traverses only a single spine node.

Cisco CCNP Route 300-101 Practice Tests Set 4

You want to implement a protocol to provide secure communications between a web browser and a web server. Which of the following protocols should you use?


Options are :

  • GRE
  • TLS (Correct)
  • HTTP
  • EAP

Answer : TLS

What AD is assigned to iBGP routes by default?


Options are :

  • 0
  • 20
  • 200 (Correct)
  • 100
  • 1

Answer : 200

In which of the following locations can you not deploy an IPS appliance?


Options are :

  • between two Layer 3 devices on the same IP subnet
  • between two Layer 2 devices on different VLANs
  • between two Layer 3 devices on different IP subnets (Correct)
  • between two Layer 2 devices on the same VLAN

Answer : between two Layer 3 devices on different IP subnets

Cisco CCNP Route 300-101 Practice Tests Set 5

Which of the following AP modes do not provide client connectivity? (Choose three.)


Options are :

  • sniffer mode (Correct)
  • bridge mode
  • local mode
  • HREAP mode
  • rogue detector mode (Correct)
  • monitor mode (Correct)

Answer : sniffer mode rogue detector mode monitor mode

In which of the following modules of the Cisco enterprise architecture would you expect to find a DHCP server? (Choose two.)


Options are :

  • building distribution
  • campus core
  • data center (Correct)
  • enterprise edge (Correct)

Answer : data center enterprise edge

Which of the following statements are true regarding a Cisco IPS device? (Choose two.)


Options are :

  • It does not sit in line with the network traffic flow.
  • It can block packets associated with a particular traffic flow. (Correct)
  • It cannot send a TCP reset to an attacking device.
  • It can block all packets from an attacking device. (Correct)
  • It cannot send an alarm to a management device.

Answer : It can block packets associated with a particular traffic flow. It can block all packets from an attacking device.

Cisco CCNP Route 300-101 Practice Tests Set 1

In which of the following ways are Cisco IPS and IDS devices similar? (Choose two.)


Options are :

  • They can both use signatures to detect malicious traffic. (Correct)
  • They both sit in the path of network traffic.
  • They both prevent malicious traffic from infiltrating the network.
  • They both provide real-time monitoring of malicious traffic (Correct)
  • Neither sits in the path of network traffic

Answer : They can both use signatures to detect malicious traffic. They both provide real-time monitoring of malicious traffic

Which of the following features are provided by IPSec? (Choose three.)


Options are :

  • multicast packet encapsulation
  • data confidentiality (Correct)
  • data integrity (Correct)
  • broadcast packet encapsulation
  • data origin authentication (Correct)

Answer : data confidentiality data integrity data origin authentication

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions