[Free] Download New Updated (April 2016) Cisco 200-310 Actual Tests 21-30

By | April 6, 2016

Ensurepass

QUESTION 21

Which type of structure consists of the addressing, routing protocols, QoS, and security components?

 

A.

logical

B.

physical

C.

layered

D.

virtual

 

Correct Answer: A

 

 

QUESTION 22

What are two benefits of the bottom-up design approach? (Choose two.)

 

A.

allows a quick response to a design request

B.

facilitates design that is based on previous experience

C.

requires little or no notation of actual organizational requirements for implementation

D.

incorporates organizational requirements

E.

provides a broader overview to the organization and the designer

 

Correct Answer: AB

 

 

QUESTION 23

Which two statements are true regarding a hierarchical network? (Choose two.)

 

A.

facilitates choosing the type of routing protocols to be used in the network

B.

provides scalability without affecting other layers and functionality

C.

provides better performance as network resources are efficiently utilized

D.

limits redundancy at the distribution layer

E.

complicates manageability because of the added security

 

Correct Answer: BC

 

 

QUESTION 24

OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)

 

A.

All areas need to connect back to area 0.

B.

The OSPF process number on each router should match.

C.

NSSA areas should be used when an area cannot connect directly to area 0.

D.

Stub areas should be connected together using virtual links.

E.

ECMP may cause undesired results depending on the environment.

 

Correct Answer: AE

 

 

QUESTION 25

Which two issues are typical challenges to network stability and reliability? (Choose two.)

 

A.

hardware failures

B.

layer 1 link failures

C.

application failures

D.

core layer failures

E.

distribution layer failures

 

Correct Answer: AB

 

 

QUESTION 26

Which two statements about designing the Data Center Access layer are correct? (Choose two.)

 

A.

Multiport NIC servers should each have their own IP address.

B.

Layer 3 connectivity should never be used in the access layer.

C.

Layer 2 connectivity is primarily implemented in the access layer.

D.

Multiport NIC servers should never be used in the access layer.

E.

Layer 2 clustering implementation requires servers to be Layer 2 adjacent.

 

Correct Answer: CE

 

 

QUESTION 27

What is the maximum RIPv2 hop count for a reachable route?

 

A.

13

B.

14

C.

15

D.

16

 

Correct Answer: C

 

 

QUESTION 28

If two routing protocols have the same route and prefix, which effect do they have on the routing table?

 

A.

Only the route with the lowest administrative distance is added.

B.

Only the route with the highest administrative distance is added.

C.

Both routes are added.

D.

Neither route is added, and a loop is formed.

 

Correct Answer: A

QUESTION 29

Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?

 

A.

RADIUS

B.

LEAP

C.

IPsec

D.

TACACS

E.

ISAKMP

 

Correct Answer: A

Explanation:

Cisco Identity-Based Network Services

The Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security.

The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to apply authentication and authorization.

With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentials and initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host then sends the credentials to the switch, which forwards them to the RADIUS ACS.

The RADIUS ACS performs a lookup on the username and password to determine the credentials’ validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the username and password are incorrect, the server sends a message to the switch or AP to block the host port. Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server.

 

 

QUESTION 30

When there is a need for immunity to EMI for connecting locations that are greater than 100 meters apart, which two solutions can be utilized? (Choose two.)

 

A.

multimode fiber

B.

Fibre Channel

C.

HVDC transmission lines

D.

single-mode fiber

E.

serial RS-232

F.

Gigabit Ethernet 1000BASE-CX

 

Correct Answer: AD

 

Free VCE & PDF File for Cisco 200-310 Real Exam

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …