aiotestking uk

200-310 Exam Questions - Online Test


200-310 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. What two CoS values are used by voice traffic? (Choose two.) 

A. COS1 

B. COS2 

C. COS3 

D. COS4 

E. COS5 

Answer: C,E 

Q2. When designing a new enterprise campus network, what topology should be used for maximum scalability? 

A. flat 

B. three-layer 

C. star 

D. partial mesh 

E. full mesh 

Answer:

Q3. Which statement describes the methodology that supports the Cisco Enterprise Architecture models? 

A. It divides the network into functional network modules. 

B. It divides the network into role-based network modules. 

C. It divides the network into regional network modules. 

D. It divides the network into operational network modules. 

Answer:

Q4. A network engineer is following the three tiered Network Hierarchical Model. At which tier is 

route summarization implemented? 

A. core 

B. distribution 

C. backbone 

D. access 

Answer:

Q5. You want to gather as much detail as possible during a network audit, to include data time stamping across a large number of interfaces, customized according to interface, with a minimal impact on the network devices themselves. Which tool would you use to meet these requirements? 

A. RMON 

B. SNMPv3 

C. NetFlow 

D. Cisco Discovery Protocol 

Answer:

Explanation: 

NetFlow provides extremely granular and accurate traffic measurements and a high-level collection of aggregated traffic. The output of netflow information is displayed via the show ip cache flow command on routers. The Table shows a description of the fields for NetFlow output. 

Table. Netflow Output escription 

Q6. What is the benefit of VLSM? 

A. reduces configuration complexity by using the same subnet mask length 

B. reduces the routing table size by using automatic route summarization 

C. reduces the routing table size by using manual route summarization 

D. allows the subnet mask and classful routing updates to be advertised 

E. secures the hosts on a subnet by using RFC 1918 addresses 

Answer:

Q7. A network engineer is attempting to separate routing domains using a virtualization technology. What protocol can be configured to perform this task? 

A. VLAN 

B. VSAN 

C. VRF 

D. VPC 

Answer:

Q8. An organization is deciding what routing protocol to use throughout their network. What must be considered if routing is to be performed at the access layer? 

A. reduced scalability of the network when introducing a large number of switch blocks into the routing table 

B. centralized management of access control lists at the distribution layer 

C. reliability when implementing routing over spanning-tree at the access layer 

D. performance differences between core, distribution and access layer equipment 

Answer:

Q9. Which subnet address and mask would you use for all Class D multicast addresses to be 

matched within an access list? 

A. 224.0.0.0/20 

B. 224.0.0.0/4 

C. 239.0.0.0/24 

D. 239.0.0.0/8 

E. 225.0.0.0/8 

Answer:

Q10. Spanning Layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network? 

A. Overlay Transport Virtualization 

B. Virtual Private LAN Services 

C. Generic Routing Encapsulation 

D. QinQ tunneling 

Answer: