200-310 Exam - Designing for Cisco Internetwork Solutions

certleader.com

Q1. DRAG DROP 

Drag the characteristics of the traditional campus network on the left to the most appropriate hierarchical network layer on the right. 

Answer:  

Q2. Which is the equation used to derive a 64 Kbps bit rate? 

A. 2 x 8 kHz x 4-bit code words 

B. 8 kHz x 8-bit code words 

C. 2 x 4-bit code words x 8 kHz 

D. 2 x 4 kHz x 8-bit code words 

Answer:

Q3. What are two advantages of employing scalability when designing a campus network? (Choose two.) 

A. reduces operational cost 

B. higher port density 

C. investment protection 

D. consistent operation 

E. improved fault tolerance 

Answer: D,E 

Q4. A network engineer is following the Cisco enterprise architecture model. To which network layer would a branch office connect to using a private WAN? 

A. Enterprise Campus 

B. Enterprise Edge 

C. SP Edge Premise 

D. Remote Module 

Answer:

Q5. Which two statements about designing the Data Center Access layer are correct? (Choose two.) 

A. Multiport NIC servers should each have their own IP address. 

B. Layer 3 connectivity should never be used in the access layer. 

C. Layer 2 connectivity is primarily implemented in the access layer. 

D. Multiport NIC servers should never be used in the access layer. 

E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent. 

Answer: C,E 

Explanation: 

User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2 Here is the Explanation: from the Cisco press CCDA certification guide Figure 4-8. Enterprise Data Center Infrastructure Overview 

Defining the DC Access Layer 

The data center access layer’s main purpose is to provide Layer 2 and Layer 3 physical port density for various servers in the data center. In addition, data center access layer switches provide high-performance, low-latency switching and can support a mix of oversubscription requirements. Both Layer 2 and Layer 3 access (also called routed access) designs are available, but most data center access layers are built using Layer 2 connectivity. The Layer 2 access design uses VLAN trunks upstream, which allows data center aggregation services to be shared across the same VLAN and across multiple switches. Other advantages of Layer 2 access are support for NIC teaming and server clustering that requires network connections to be Layer 2 adjacent or on the same VLAN with one another. 

CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4 

Q6. Which two are types of network virtualization? (Choose two.) 

A. VSS: Virtual Switching System 

B. VRF: virtual routing and forwarding 

C. VCI: virtual channel identifier 

D. VLSM: variable length subnet masking 

E. VM: virtual machine 

F. VMP: Virtual Memory Pool 

Answer: A,B 

Explanation: 

Network virtualization encompasses logical isolated network segments that share the same 

physical infrastructure. Each segment operates independently and is logically separate 

from the other segments. Each network segment appears with its own privacy, security, 

independent set of policies, QoS levels, and independent routing paths. 

Here are some examples of network virtualization technologies: 

VLAN: Virtual local-area network 

VSAN: Virtual storage-area network 

VRF: Virtual routing and forwarding 

VPN: Virtual private network 

VPC: Virtual Port Channel 

Q7. Refer to the exhibit. 

A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer? 

A. #1 

B. #2 

C. #3 

D. #4 

Answer:

Q8. A company must deploy an IGP routing protocol on an Enterprise Network. Where should route summarization be implemented? 

A. distribution 

B. core 

C. access 

D. backbone 

Answer:

Q9. Which model of ISR is utilized for the teleworker design profile? A. Cisco 1900 Series 

B. Cisco 1800 Series 

C. Cisco 800 Series 

D. Cisco 500 Series 

Answer:

Q10. A dynamically routed private line and a statically routed IPsec tunnel connect two offices. What routing configuration prefers the IPsec tunnel only in the event of a private line failure? 

A. floating static entry 

B. EIGRP variance 

C. bandwidth metric 

D. OSPF maximum paths 

Answer: