P.S. Simulation 200-310 Q&A are available on Google Drive, GET MORE: https://drive.google.com/open?id=1VS0ulGY2kPBljQcTWc9vAueUOjgKSPs-
New Questions 5
A routing protocol neighbor relationship has been established between two routers across the public Internet using GRE. What technology can be used to encrypt this communication channel?
A. access lists
B. IP security
C. context based access
D. intrusion prevention system
Answer: B
New Questions 6
What will extend a trust boundary (there is switch interface configuration with separate voice VLAN and data VLAN configured where the phone is connected to, also small diagram showing endpoint (host), IP Phone, Access Switch, Distribution Switch, Core Switch and Data Centre Aggregation switch)?
A. Multiple layers PC
B. IP Phone
C. Access Switch
D. Distribution Switch
E. Core Switch
Answer: B
New Questions 7
What two configurations are Cisco recommended best practices for user access interfaces? (Choose two.)
A. VTP transparent mode
B. BPDUguard
C. Root Guard
D. Portfast
E. Trunk mode
Answer: B,D
New Questions 8
In which two places is redundancy recommended in an enterprise campus network design? (Choose two.)
A. building distribution
B. campus core
C. building access
D. e-commerce
E. Internet connectivity
Answer: A,B
New Questions 9
What statement about EVN is true?
A. Support RIP
B. Support OSPFV3
C. Required LDP
D. Support as many as 32 virtual networks per device
Answer: D
Explanation: http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/evn/configuration/xe-3s/evn-xe-3s-book/evn-overview.html
New Questions 10
Which statement is true concerning the data center distribution (aggregation) layer design?
A. With Layer 3 at the aggregation layer, the physical loops in the topology must still be managed by STP.
B. The boundary between Layer 2 and Layer 3 must reside in the multilayer switches, independent of any other devices.
C. A mix of both Layer 2 and Layer 3 access is the most optimal.
D. In a small data center, the aggregation layer can connect directly to the campus core, exchanging IP routes and MAC address tables.
Answer: C
New Questions 11
Which protocol is used for voice bearer traffic?
A. MGCP
B. RTP
C. SCCP
D. CDP
E. ICMP
Answer: B
New Questions 12
Which three options are characteristics of data center evolution? (Choose three.)
A. consolidation
B. virtualization
C. automation
D. standardization
E. optimization
F. modulation
Answer: A,B,C
New Questions 13
While designing a remote access VPN, a customer has requested three different levels of access to be granted for administrators, employees, and partners. Which three access policies must be configured for the three groups? (Choose Three)
A. Partners are centrally authenticated with limited network access controlled with ACLs.
B. Adminitrative users have local credentials with full access to the internal infrastructure.
C. Administrative users are centrally authenticated with fill access to the internal infrastructure.
D. Employee are centrally authenticated with limited network access controlled with ACLs.
E. Employees are centrally authenticated with full access to the internal infrastructure.
F. Partners are centrally authenticated with full access to the internal infrastructure.
Answer: D,E,F
New Questions 14
A company would like to distribute a VM hosting cluster between three data centers with the capability to move VMs between sites. The connectivity between data centers is IP only, and the new design should use the existing WAN. Which Layer 2 tunneling technology should be used?
A. VPLS
B. L2TPv3
C. OTV
D. AToM
Answer: C
100% Latest Cisco 200-310 Questions & Answers shared by Thedumpscentre, Get HERE: http://www.thedumpscentre.com/200-310-dumps/ (New 287 Q&As)