Download CCDA -Designing for Cisco Internetwork Solutions.braindumps.200-310.2019-09-24.1e.388q.vcex

Download Exam

File Info

Exam CCDA - Designing for Cisco Internetwork Solutions
Number 200-310
File Name CCDA -Designing for Cisco Internetwork Solutions.braindumps.200-310.2019-09-24.1e.388q.vcex
Size 5.5 Mb
Posted September 24, 2019
Downloads 48
Download CCDA -Designing for Cisco Internetwork Solutions.braindumps.200-310.2019-09-24.1e.388q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1

In which phase of PPDIOO are the network requirements identified?

  • A: Design
  • B: Plan
  • C: Prepare
  • D: Implement
  • E: Operate
  • F: Optimize

Correct Answer: B

Plan Phase 
The Plan phase identifies the network requirements based on goals, facilities, and user needs. This phase characterizes sites and assesses the network, performs a gap analysis against best-practice architectures, and looks at the operational environment. A project plan is developed to manage the tasks, responsible parties, milestones, and resources to do the design and implementation. The project plan aligns with the scope, cost, and resource parameters established with the original business requirements. This project plan is followed (and updated) during all phases of the cycle.

Question 2

Which is part of the Prepare phase of PPDIOO?

  • A: Obtain site contact information
  • B: Perform network audit
  • C: Identify customer requirements
  • D: Perform gap analysis

Correct Answer: C

Prepare Phase 
The Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to support the strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy.

Question 3

When designing the identity and access control portions for the enterprise campus network, which of these solutions would be the most appropriate solution to consider?

  • A: 802.1X
  • B: ACLs in the core layer
  • C: Cisco Security MARS
  • D: NetFlow

Correct Answer: A


Question 4

Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access?

  • B: LEAP
  • C: IPsec

Correct Answer: A

Cisco Identity-Based Network Services 
The Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security. 
The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to apply authentication and authorization. 
With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentials and initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host then sends the credentials to the switch, which forwards them to the RADIUS ACS. 
The RADIUS ACS performs a lookup on the username and password to determine the credentials' validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the username and password are incorrect, the server sends a message to the switch or AP to block the host port. 
Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server.

Question 5

Which protocol is used for voice bearer traffic?

  • A: MGCP
  • B: RTP
  • C: SCCP
  • D: CDP
  • E: ICMP

Correct Answer: B

VoIP Control and Transport Protocols 
A number of different protocols are used in a VoIP environment for call control, device provisioning, and addressing. 
Figure 14-15 shows those protocols focused on VoIP control and transport. 


Question 6

Which two features are supported by single wireless controller deployments? (Choose two.)

  • A: automatic detection and configuration of LWAPPs
  • B: LWAPP support across multiple floors and buildings
  • C: automatic detection and configuration of RF parameters
  • D: Layer 2 and Layer 3 roaming
  • E: controller redundancy
  • F: mobility groups

Correct Answer: AB

Question 7

Refer to the exhibit. 

Which layer is the distribution layer?

  • A: Layer A
  • B: Layer B
  • C: Layer C
  • D: Layers A and B form a consolidated core and distribution layer

Correct Answer: B

Question 8

Which IPv6 feature enables routing to distribute connection requests to the nearest content server?

  • A: Link-local
  • B: Site-local
  • C: Anycast
  • D: Multicast
  • E: Global aggregatable

Correct Answer: C

Any cast is a network addressing and routing methodology in which data grams from a single sender are routed to the topologically nearest node in a group of potential receivers all identified by the same destination address. 

Question 9

Refer to the exhibit. 

A standard, Layer 2 campus network design is pictured. Which numbered box represents the distribution layer?

  • A: #1
  • B: #2
  • C: #3
  • D: #4

Correct Answer: B

Question 10

Which two are types of network virtualization? (Choose two.)

  • A: VSS: Virtual Switching System
  • B: VRF: virtual routing and forwarding
  • C: VCI: virtual channel identifier
  • D: VLSM: variable length subnet masking
  • E: VM: virtual machine
  • F: VMP: Virtual Memory Pool

Correct Answer: AB

Network virtualization encompasses logical isolated network segments that share the same physical infrastructure. Each segment operates independently and is logically separate from the other segments. Each network segment appears with its own privacy, security, independent set of policies, QoS levels, and independent routing paths. 
Here are some examples of network virtualization technologies:
VLAN: Virtual local-area network
VSAN: Virtual storage-area network
VRF: Virtual routing and forwarding
VPN: Virtual private network
VPC: Virtual Port Channel





You can buy ProfExam with a 20% discount!


Use ProfExam Simulator to open VCEX and EXAM files