200-310 Exam - Designing for Cisco Internetwork Solutions

certleader.com

Q1. An engineer receives a resource utilization alert on a router. What command should be used to investigate the issue? 

A. show processes cpu 

B. show memory 

C. show running-config 

D. show version 

Answer:

Q2. Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access? 

A. RADIUS 

B. LEAP 

C. IPsec 

D. TACACS 

E. ISAKMP 

Answer:

Explanation: 

Cisco Identity-Based Network Services The Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security. 

The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to apply authentication and authorization. With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentials and initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host then sends the credentials to the switch, which forwards them to the RADIUS ACS. The RADIUS ACS performs a lookup on the username and password to determine the credentials' validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the username and password are incorrect, the server sends a message to the switch or AP to block the host port. Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server. 

Q3. Which first-hop redundancy protocol dynamically distributes client traffic between multiple routers? 

A. HSRP 

B. VRRP 

C. GLBP 

D. IGRP 

Answer:

Q4. DRAG DROP 

Answer:  

Q5. A secure WAN design requires dynamic routing and IP multicast. What two VPN protocols meet these requirements? (Choose two.) 

A. Standard IPsec 

B. P2P GRE over IPsec 

C. DMVPN 

D. AnyConnect 

E. PPTP 

F. Easy VPN 

G. SSL/TLS 

Answer: B,C 

Q6. Which three are considered as technical constraints when identifying network requirements? (Choose three.) 

A. support for legacy applications 

B. bandwidth support for new applications 

C. limited budget allocation 

D. policy limitations 

E. limited support staff to complete assessment 

F. support for existing legacy equipment 

G. limited timeframe to implement 

Answer: A,B,F 

Explanation: 

Network design might be constrained by parameters that limit the solution. Legacy applications might still exist that must be supported going forward, and these applications might require a legacy protocol that may limit a design. Technical constraints include the following: 

.Existing wiring does not support new technology. 

.Bandwidth might not support new applications. 

.The network must support exiting legacy equipment. 

.Legacy applications must be supported (application compatibility). 

Q7. High availability is a key design consideration in the enterprise campus network. In a fully redundant topology, which is likely to provide faster IGP convergence during a failure? 

A. redundant supervisors 

B. redundant supervisors with Cisco Nonstop Forwarding (NSF) and Stateful Switchover (SSO) 

C. single supervisors with tuned IGP timers 

D. single supervisors 

Answer:

Q8. Which three are valid Layer 2 access designs? (Choose three.) 

A. Looped Triangle 

B. Looped Square 

C. Looped U 

D. Loop-Free Triangle 

E. Loop-Free Square 

F. Loop-Free U 

Answer: A,B,F 

Q9. What wireless authentication option requires a Public Key Infrastructure? 

A. EAP-TLS 

B. PEAP 

C. LEAP 

D. EAP-FAST 

Answer:

Q10. Which voice codec should you use in order to provide toll quality calls? 

A. G.711 

B. G.718 

C. G.722 

D. G.729 

Answer: