200-310 Designing for Cisco Inter network Solutions Exam Set 3

Which of the following tasks can best be achieved with SNMP?


Options are :

  • determining the number of bytes transmitted by an interface on a network device (Correct)
  • identifying the nearest interface on an adjacent Cisco device
  • verifying IPv4 connectivity to an adjacent network device
  • monitoring IPv4 traffic flows through an interface on a Cisco device

Answer : determining the number of bytes transmitted by an interface on a network device

Which of the following statements regarding Cisco GET VPN are true? (Choose two.)


Options are :

  • A packet's original source and destination are not protected during transmission. (Correct)
  • Dynamic routing protocols that rely on multicast traffic can be used between peers. (Correct)
  • Tunnel setup delay introduces jitter and delay that make GET unsuitable for voice traffic.
  • Key management is not scalable, because there is no centralized key server.
  • All encrypted traffic must pass through a central hub router.

Answer : A packet's original source and destination are not protected during transmission. Dynamic routing protocols that rely on multicast traffic can be used between peers.

Which of the following best describes a DMZ?


Options are :

  • websites available to only users inside a private network
  • a network zone between the Internet and a private or trusted network (Correct)
  • a portion of a private or trusted network that can be accessed by a business partner
  • decentralized computer resources that can be accessed over the Internet

Answer : a network zone between the Internet and a private or trusted network

You are routing traffic between company departments that reside in the same physical location. Which of the following are you least likely to use?


Options are :

  • BGP (Correct)
  • static routes
  • EIGRP
  • OSPF

Answer : BGP

Which of the following is the maximum number of chassis that may be connected to form a VSS?


Options are :

  • four
  • two (Correct)
  • three
  • nine

Answer : two

Which of the following technologies can you use to configure up to nine switches to act as a single switch?


Options are :

  • HSRP
  • VTP
  • StackWise (Correct)
  • EtherChannel

Answer : StackWise

What AD is assigned to static routes by default?


Options are :

  • 100
  • 0
  • 1 (Correct)
  • 20

Answer : 1

Which of the following are reasons to choose a VPN solution instead of a traditional WAN? (Choose three.)


Options are :

  • Network expansion is easy. (Correct)
  • The cost is lower. (Correct)
  • Traffic is sent over dedicated lines
  • Traffic is encrypted. (Correct)

Answer : Network expansion is easy. The cost is lower. Traffic is encrypted.

Which of the following network virtualization techniques does Cisco recommend for extending fewer than 32 VNETs across a WAN?


Options are :

  • EVN with 802.1Q tagging
  • Multi-VRF with GRE tunnels
  • EVN with GRE tunnels (Correct)
  • Multi-VRF with 802.1Q tagging

Answer : EVN with GRE tunnels

Which of the following features are provided by IPSec? (Choose three.)


Options are :

  • data integrity (Correct)
  • data origin authentication (Correct)
  • data confidentiality (Correct)
  • multicast packet encapsulation
  • broadcast packet encapsulation

Answer : data integrity data origin authentication data confidentiality

You have configured NIC teaming on a Microsoft Windows Server. The server's NICs are connected to a Cisco Catalyst 3750 switch that has been configured to use LACP. Which of the following characteristics will the switch use to load balance traffic?


Options are :

  • the source IP address
  • the destination MAC address
  • the source MAC address (Correct)
  • the source and destination MAC addresses

Answer : the source MAC address

Which of the following are characteristics of the top-down design approach? (Choose two.)


Options are :

  • It is less time-consuming than the bottom-up approach.
  • It provides a "big picture" overview. (Correct)
  • It focuses on devices and technologies
  • It can lead to inefficient designs.
  • It considers projected growth as a design factor. (Correct)

Answer : It provides a "big picture" overview. It considers projected growth as a design factor.

On a Cisco PE router, you have implemented a VRF instance with the name of boson. In addition, you have associated an interface on the PE router with the boson VRF instance and assigned that interface the IP address 123.45.67.89. You are currently logged in to a Cisco PE router and want to examine the path that packets take to reach the CE router. The CE router interface that connects to the PE router has been assigned the IP address 123.45.67.90. Which of the following commands should you issue?


Options are :

  • traceroute boson
  • traceroute 123.45.67.89
  • traceroute vrf boson 123.45.67.90 (Correct)
  • traceroute vrf 123.45.67.90

Answer : traceroute vrf boson 123.45.67.90

You want to install antivirus software on a host that is configured with multiple VMs. Which of the following statements is true?


Options are :

  • Antivirus software installed on the host will prevent damage to any VM.
  • Antivirus software should be installed on the host and on each VM in order to fully protect the system. (Correct)
  • Antivirus software must be installed only on the host and cannot be installed on the VMs.
  • Antivirus software can be installed on only one of the VMs and will protect the host and other VMs.

Answer : Antivirus software should be installed on the host and on each VM in order to fully protect the system.

Which of the following network issues can most likely be mitigated by using a modular architecture? (Choose three.)


Options are :

  • hardware failures (Correct)
  • physical link failures (Correct)
  • poor scalability (Correct)
  • application failures

Answer : hardware failures physical link failures poor scalability

In which of the following situations would iBGP be the most appropriate routing mechanism? (Choose two.)


Options are :

  • when the router has a single link to a router within the same AS (Correct)
  • when the router has a single link to a router within a different AS
  • when the router has redundant links to a router within the same AS (Correct)
  • when the router has redundant links to a router within a different AS

Answer : when the router has a single link to a router within the same AS when the router has redundant links to a router within the same AS

Once an STP-enabled network has converged, which of the following are valid port states for participating switch ports? (Choose two.)


Options are :

  • blocking (Correct)
  • learning
  • forwarding (Correct)
  • listening
  • initializing

Answer : blocking forwarding

On a Cisco router, which of the following commands relies on ICMP TEMs to map the path that a packet takes as it passes through a network?


Options are :

  • arp
  • netconf
  • traceroute (Correct)
  • ping

Answer : traceroute

Which of the following can you configure on a Cisco switch to facilitate a NIC teaming implementation on Microsoft Windows Server 2012?


Options are :

  • HSRP
  • VRRP
  • LACP (Correct)
  • PAgP

Answer : LACP

In a switched hierarchical design, which enterprise campus module layer or layers exclusively use Layer 2 switching?


Options are :

  • only the distribution layer
  • the distribution and access layers
  • . the distribution and campus core layers
  • only the campus core layer
  • only the access layer (Correct)

Answer : only the access layer

Which of the following network virtualization technologies can be used to create redundancy and manage loops between multiple devices?


Options are :

  • VRF
  • VDC
  • VLAN
  • vPC (Correct)

Answer : vPC

Which of the following is a type of attack that can be mitigated by enabling DAI on campus access layer switches?


Options are :

  • DHCP spoofing
  • VLAN hopping
  • ARP poisoning (Correct)
  • MAC flooding

Answer : ARP poisoning

Which of the following statements are true regarding an IDS? (Choose two.)


Options are :

  • None of its physical interfaces can be in promiscuous mode.
  • It must have two or more monitoring interfaces.
  • It does not have a MAC address assigned to its monitoring port.
  • It does not have an IP address assigned to its monitoring port. (Correct)
  • It cannot mitigate single-packet attacks. (Correct)

Answer : It does not have an IP address assigned to its monitoring port. It cannot mitigate single-packet attacks.

Which of the following best describes PAT?


Options are :

  • It uses ports to translate inside local addresses to one or more inside global addresses (Correct)
  • It translates inside local addresses to inside global addresses that are allocated from a pool.
  • It translates a single outside local address to a single outside global address.
  • It translates a single inside local address to a single inside global address.

Answer : It uses ports to translate inside local addresses to one or more inside global addresses

Which of the following actions are you most likely to perform during the initial phase of the top-down network design approach?


Options are :

  • Analyze the company application requirements. (Correct)
  • Select switches to build out the LAN.
  • License OSes to host network services.
  • Route cables from a server room to workstations.

Answer : Analyze the company application requirements.

In a campus network hierarchy, which of the following security functions does not typically occur at the campus access layer?


Options are :

  • DAI
  • DHCP snooping
  • packet filtering (Correct)
  • NAC

Answer : packet filtering

Which of the following IPv6 address spaces contains an inherent hierarchy that simplifies Internet routing tables?


Options are :

  • global unicast (Correct)
  • link-local
  • anycast
  • broadcast

Answer : global unicast

Which of the following is defined in the IEEE 802.3ad standard?


Options are :

  • VRRP
  • PAgP
  • HSRP
  • LACP (Correct)

Answer : LACP

Which of the following is a network architecture principle that represents the structured manner in which the logical and physical functions of the network are arranged?


Options are :

  • modularity
  • bottom-up
  • hierarchy (Correct)
  • top-down

Answer : hierarchy

Which of the following statements are true regarding the distribution layer of the hierarchical network model? (Choose two.)


Options are :

  • The distribution layer provides NAC.
  • The distribution layer provides load balancing. (Correct)
  • The distribution layer provides redundant paths to the default gateway. (Correct)
  • The distribution layer provides fast convergence.

Answer : The distribution layer provides load balancing. The distribution layer provides redundant paths to the default gateway.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions