aiotestking uk

200-310 Exam Questions - Online Test


200-310 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which is part of the Prepare phase of PPDIOO? 

A. Obtain site contact information 

B. Perform network audit 

C. Identify customer requirements 

D. Perform gap analysis 

Answer:

Explanation: 

Prepare Phase The Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to support the strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy. 

Q2. Which network virtualization technology involves creating virtual routers with its own individual routing tables on a physical router? 

A. VSS 

B. vPC 

C. VRF 

D. VLAN 

Answer:

Q3. Refer to the list of requirements. Which IP telephony design model should you implement to fulfill these requirements?.- must be a single, large location with many remote sites -must have multisite WAN connectivity - requires SRST for call processing redundancy 

A. centralized 

B. distributed 

C. clustered 

D. decentralized 

Answer:

Q4. Which two features are supported by single wireless controller deployments? (Choose two.) 

A. automatic detection and configuration of LWAPPs 

B. LWAPP support across multiple floors and buildings 

C. automatic detection and configuration of RF parameters 

D. Layer 2 and Layer 3 roaming 

E. controller redundancy 

F. mobility groups 

Answer: A,B 

Q5. Which two of these are scalability benefits of designing a network that utilizes VPNs? (Choose two.) 

A. extends the network to remote users 

B. allows networks to be set up and restructured quickly 

C. reduces dial infrastructure expenditures 

D. reduces the number of physical connections 

E. simplifies the underlying structure of a customer WAN 

Answer: D,E 

Q6. Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access? 

A. RADIUS 

B. LEAP 

C. IPsec 

D. TACACS 

E. ISAKMP 

Answer:

Explanation: 

Cisco Identity-Based Network Services The Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security. 

The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to apply authentication and authorization. With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentials and initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host then sends the credentials to the switch, which forwards them to the RADIUS ACS. The RADIUS ACS performs a lookup on the username and password to determine the credentials' validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the username and password are incorrect, the server sends a message to the switch or AP to block the host port. Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server. 

Q7. Which HSRP parameters must match, to ensure proper functionality? 

A. group parameters 

B. priority parameters 

C. preempt parameters 

D. tracking parameters 

Answer:

Q8. When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider? 

A. 802.1X 

B. ACLs in the core layer 

C. Cisco Security MARS 

D. Cisco Firewall Services Module 

Answer:

Q9. OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.) 

A. All areas need to connect back to area 0. 

B. The OSPF process number on each router should match. 

C. NSSA areas should be used when an area cannot connect directly to area 0. 

D. Stub areas should be connected together using virtual links. 

E. ECMP may cause undesired results depending on the environment. 

Answer: A,E 

Q10. A spanning tree topology can be simplified by deploying what Cisco IOS technology in the distribution block? 

A. VDC 

B. vPC 

C. Rapid PVST+ 

D. VSS 

E. Flex Links 

Answer: