200-310 Designing for Cisco Inter network Solutions Exam Set 2

Which of the following best describes a hypervisor?


Options are :

  • It used to send documents to a web browser.
  • It is used to run a guest OS within a host OS. (Correct)
  • It is used to allow multiple VMs to communicate within a host system.
  • It is used to route packets between VMs and a physical network.

Answer : It is used to run a guest OS within a host OS.

Which of the following is a leased-line WAN technology that divides a link's bandwidth into equal-sized segments based on clock rate?


Options are :

  • TDM (Correct)
  • WDM
  • ATM
  • DWDM

Answer : TDM

You are installing a 4U device in a data center. Which of the following are you installing?


Options are :

  • a network device in a 7inch space (Correct)
  • a lock for rack security
  • cabling at the demarc
  • an environmental control

Answer : a network device in a 7inch space

Which of the following statements best describes the purpose of CDP?


Options are :

  • CDP is a proprietary protocol used to power IP devices over Ethernet
  • CDP is a standard protocol used to power IP devices over Ethernet.
  • CDP is a proprietary protocol used by Cisco devices to detect neighboring Cisco devices. (Correct)
  • CDP is a standard protocol used by Cisco devices to detect neighboring devices of any type.

Answer : CDP is a proprietary protocol used by Cisco devices to detect neighboring Cisco devices.

Which of the following is not required of a collapsed core layer in a three-tier hierarchical network design?


Options are :

  • Layer 2 aggregation
  • intelligent network services
  • end user, group, and endpoint isolation (Correct)
  • high-speed physical and logical paths

Answer : end user, group, and endpoint isolation

Which of the following statements are true when VSS is implemented on a distribution layer switch pair in a campus network? (Choose two.)


Options are :

  • Loop Guard should be disabled throughout the VSS-enabled network. (Correct)
  • VSS eliminates the need to use an FHRP for convergence. (Correct)
  • Each access layer switch uses a single, active physical uplink to the distribution switch pair.
  • MEC trunk links should not be configured using the auto-desirable option.

Answer : Loop Guard should be disabled throughout the VSS-enabled network. VSS eliminates the need to use an FHRP for convergence.

Which of the following is a characteristic of the bottom-up design approach?


Options are :

  • It accounts for projected infrastructure growth.
  • It focuses on applications and services.
  • It relies on previous experience. (Correct)
  • It requires a complete analysis of the organization's needs.

Answer : It relies on previous experience.

In which of the following situations would static routing be the most appropriate routing mechanism?


Options are :

  • when the router has a single link to a router within a different AS (Correct)
  • when the router has redundant links to a router within the same AS
  • when the router has redundant links to a router within a different AS
  • when the router has a single link to a router within the same AS

Answer : when the router has a single link to a router within a different AS

Which of the following are you least likely to implement in the building access layer of an enterprise campus network design? (Choose two.)


Options are :

  • redundancy (Correct)
  • PoE
  • access layer aggregation (Correct)
  • STP

Answer : redundancy access layer aggregation

Which of the following is true of the core layer of a hierarchical design?


Options are :

  • It aggregates LAN wiring closets.
  • It provides address summarization.
  • It aggregates WAN connections.
  • It is also known as the backbone layer. (Correct)
  • It isolates the access and distribution layers.

Answer : It is also known as the backbone layer.

Which of the following are required when configuring a VSS? (Choose two.)


Options are :

  • identical IOS versions (Correct)
  • HSRP
  • GLBP
  • identical supervisor types (Correct)
  • VRRP

Answer : identical IOS versions identical supervisor types

You are planning a network by using the top-down design method. You are using structured design principles to generate a model of the completed system. Which of the following are you most likely to ignore?


Options are :

  • business goals
  • future network services
  • technical objectives
  • network protocols (Correct)

Answer : network protocols

Which of the following is not a reason to choose a VPN solution instead of a traditional WAN?


Options are :

  • Traffic is sent over dedicated lines. (Correct)
  • Network expansion is easy
  • The cost is lower
  • Traffic is encrypted.

Answer : Traffic is sent over dedicated lines.

On which of the following layers of the hierarchical network design model should you implement PortFast, BPDU guard, and root guard?


Options are :

  • only on access layer ports (Correct)
  • only on distribution layer ports
  • only on core and distribution layer ports
  • only on core layer ports

Answer : only on access layer ports

Which of the following is used by both NetFlow and NBAR to identify a traffic flow?


Options are :

  • Application layer information
  • Network layer information
  • Session layer information (Correct)
  • Transport layer information

Answer : Session layer information

Which of the following is a BGP attribute that represents the external metric of a route?


Options are :

  • confederation
  • route reflector
  • MED (Correct)
  • community

Answer : MED

Which of the following actions are you most likely to perform first when using the bottomup network design approach?


Options are :

  • Route cables from a server room to workstations. (Correct)
  • Analyze the company application requirements.
  • Configure switches with VLANs.
  • License OSes to host network services.

Answer : Route cables from a server room to workstations.

Which of the following statements are true regarding standard IP ACLs? (Choose two.)


Options are :

  • Standard ACLs can filter traffic from a specific host or a specific network (Correct)
  • Standard ACLs can be numbered in the range from 1 through 99 or from 1300 through 1999.
  • Standard ACLs can be numbered in the range from 1 through 99 or from 1300 through 1999. (Correct)
  • Standard ACLs can filter traffic based on source and destination address
  • Standard ACLs should be placed as close to the source as possible

Answer : Standard ACLs can filter traffic from a specific host or a specific network Standard ACLs can be numbered in the range from 1 through 99 or from 1300 through 1999.

Which of the following statements is true regarding Cisco best practices when implementing QoS in a campus LAN?


Options are :

  • Traffic should be classified as close to its destination as possible.
  • QoS mechanisms should always be implemented in software when possible.
  • Traffic should be marked as close to its source as possible. (Correct)
  • Traffic should be policed as close to the destination as possible.

Answer : Traffic should be marked as close to its source as possible.

Which of the following statements regarding VPNs are true? (Choose two.)


Options are :

  • An ISDN terminal adapter can be used as an endpoint device.
  • Workstations do not typically need client software to use a site-to-site VPN. (Correct)
  • VPNs typically cost less to implement than a traditional WAN. (Correct)
  • VPNs route traffic over dedicated leased lines.
  • Data is transmitted in clear text.

Answer : Workstations do not typically need client software to use a site-to-site VPN. VPNs typically cost less to implement than a traditional WAN.

Which of the following WLC interfaces is used for Layer 2 discovery?


Options are :

  • the AP manager interface
  • the service port interface
  • the dynamic interface
  • the management interface (Correct)

Answer : the management interface

Which of the following statements is true regarding the Cisco ACI architecture?


Options are :

  • The scalability of the fabric is limited by the available number of leaf ports.
  • Each spine node requires at least two ports per leaf node
  • Spine nodes must be fully meshed.
  • All nonlocal traffic traverses only a single spine node. (Correct)

Answer : All nonlocal traffic traverses only a single spine node.

You want to implement a protocol to provide secure communications between a web browser and a web server. Which of the following protocols should you use?


Options are :

  • GRE
  • TLS (Correct)
  • HTTP
  • EAP

Answer : TLS

What AD is assigned to iBGP routes by default?


Options are :

  • 0
  • 20
  • 200 (Correct)
  • 100
  • 1

Answer : 200

In which of the following locations can you not deploy an IPS appliance?


Options are :

  • between two Layer 3 devices on the same IP subnet
  • between two Layer 2 devices on different VLANs
  • between two Layer 3 devices on different IP subnets (Correct)
  • between two Layer 2 devices on the same VLAN

Answer : between two Layer 3 devices on different IP subnets

Which of the following AP modes do not provide client connectivity? (Choose three.)


Options are :

  • sniffer mode (Correct)
  • bridge mode
  • local mode
  • HREAP mode
  • rogue detector mode (Correct)
  • monitor mode (Correct)

Answer : sniffer mode rogue detector mode monitor mode

In which of the following modules of the Cisco enterprise architecture would you expect to find a DHCP server? (Choose two.)


Options are :

  • building distribution
  • campus core
  • data center (Correct)
  • enterprise edge (Correct)

Answer : data center enterprise edge

Which of the following statements are true regarding a Cisco IPS device? (Choose two.)


Options are :

  • It does not sit in line with the network traffic flow.
  • It can block packets associated with a particular traffic flow. (Correct)
  • It cannot send a TCP reset to an attacking device.
  • It can block all packets from an attacking device. (Correct)
  • It cannot send an alarm to a management device.

Answer : It can block packets associated with a particular traffic flow. It can block all packets from an attacking device.

In which of the following ways are Cisco IPS and IDS devices similar? (Choose two.)


Options are :

  • They can both use signatures to detect malicious traffic. (Correct)
  • They both sit in the path of network traffic.
  • They both prevent malicious traffic from infiltrating the network.
  • They both provide real-time monitoring of malicious traffic (Correct)
  • Neither sits in the path of network traffic

Answer : They can both use signatures to detect malicious traffic. They both provide real-time monitoring of malicious traffic

Which of the following features are provided by IPSec? (Choose three.)


Options are :

  • multicast packet encapsulation
  • data confidentiality (Correct)
  • data integrity (Correct)
  • broadcast packet encapsulation
  • data origin authentication (Correct)

Answer : data confidentiality data integrity data origin authentication

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions