[PDF&VCE] Lead2pass Latest 200-310 Free Dumps Guarantee 200-310 Certification Exam 100% Success (126-150)
2016 September Cisco Official New Released 200-310 Dumps in Lead2pass.com! 100% Free Download! 100% Pass Guaranteed! The Cisco 200-310 PDF, 200-310 VCE and 200-310 exam questions and answers at Lead2pass are written and prepared by Cisco affiliated trainers and lecturers with decades of experience in the IT field. This ensures that you are equipped with the latest and most current information to give you a better chance of passing the Cisco 200-310 exam.
Following questions and answers are all new published by Cisco Official Exam Center: http://www.lead2pass.com/200-310.html 3 1 QUESTION 126 What is the first step when creating a network security policy? A. define what should be protected B. investigate how likely an attack is to occur C. implement measures to protect assets D. hire a security firm to perform penetration tests Answer: A QUESTION 127 A customer requests a filtering design based on the need to scan all internet traffic, including remote workers. What solution meets these requirements? A. Cisco Cloud Web Security B. Cisco Network Admission Control C. Cisco Identity Services Engine D. Cisco Adaptive Security Appliance Answer: A QUESTION 128 A customer wants to support a BYOD environment. What two products allow for posture assessment? (Choose two.) A. ACS B. NAC C. ASA D. ISE E. WAAS F. IDS Answer: BD QUESTION 129 What two CoS values are used by voice traffic? (Choose two.) A. COS1 B. COS2 C. COS3 D. COS4 E. COS5 Answer: CE QUESTION 130 A client wants to deploy a video conferencing platform in a multisite WAN environment. What two design considerations need to be evaluated? (Choose two.) A. CODECs supported by the video units B. buffer sizes on the routers C. POE capabilities of the switches D. number of current calls E. number of hops between sites Answer: AD QUESTION 131 What wireless authentication option requires a Public Key Infrastructure? A. EAP-TLS B. PEAP C. LEAP D. EAP-FAST Answer: A QUESTION 132 What two access point modes support the transmission of user traffic over a LWAPP/CAPWAP tunnel? (Choose two.) A. local B. H-REAP C. rogue detector D. monitor E. sniffer F. standalone Answer: AB QUESTION 133 What is the primary advantage of implementing a wireless LAN controller in a wireless LAN design? A. roaming between APs B. RADIUS user authentication C. radio resource management D. accelerated data transfer Answer: C QUESTION 134 A wireless LAN client is sending traffic to the wired LAN client. What path will the packet take to reach the destination endpoint in a lightweight wireless deployment? A. switch > controller > ap > client B. controller > ap > switch > client C. ap > controller > switch > client D. switch > ap > controller > client Answer: C QUESTION 135 What Cisco product is designed to improve the performance of Windows file and exchange services in remote data centers? A. Application Control Engine B. Wide Area Application Services C. Cisco Application Policy Infrastructure Controller D. Cisco Prime Network Services Controller Answer: B QUESTION 136 Which design is the recommended geometric design for routed topologies? A. linear B. triangular C. rectangular D. circular Answer: B QUESTION 137 Which statement describes an advantage of the Layer 2 access model over the Layer 3 access model in the data center? A. It enables NIC teaming. B. It removes STP dependency. C. It increases scalability. D. It decreases convergence. Answer: A QUESTION 138 Router A has three feasible successors to the 192.168.1.0/24 network, which are listed here: - Option 1 has a metric of 8123228. - Option 2 has a metric of 2195467. - Option 3 has a metric of 8803823. The variance 4 command was issued on Router A. How many active entries does Router A have in its routing table for the 192.168.1.0/24 network? A. 0 B. 1 C. 2 D. 3 Answer: C QUESTION 139 Which two mechanisms are used by distance vector protocols to prevent routing loops? (Choose two.) A. split horizon B. route summarization C. route poisoning D. tuned timers Answer: AC QUESTION 140 Which interior routing protocol has the most preferable administrative distance by default? A. RIP B. OSPF C. EIGRP D. BGP E. IS-IS Answer: C QUESTION 141 What are the three modes of unicast reverse path forwarding? (Choose three.) A. strict B. loose C. VRF D. global E. PIM F. local Answer: ABC QUESTION 142 A network engineer has been asked to follow a top down design approach. What layer of the OSI model is used to start the design? A. physical B. network C. transport D. application Answer: D QUESTION 143 Where in the network hierarchy should network access control be performed? A. backbone B. core C. access D. distribution Answer: C QUESTION 144 What are two advantages of employing scalability when designing a campus network? (Choose two.) A. reduces operational cost B. higher port density C. investment protection D. consistent operation E. improved fault tolerance Answer: DE QUESTION 145 A network engineer is using the traditional switched hierarchical design. The client has asked to increase uplink utilization from the access layer to the distribution. How can the engineer attain this new requirement without adding new physical connections? A. enable spanning-tree portfast B. enable VSS at the distribution layer C. increase the MTU size on the uplink interfaces D. ensure the root bridge priority is equal on both distribution switches Answer: B QUESTION 146 Multicast has been enabled and configured in the Enterprise, and PIM Sparse- mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches? A. IGMP snooping B. Multicast boundary filter C. PIM dense-mode D. Dynamic ARP inspection Answer: A QUESTION 147 What two SAN protocols will allow a customer to utilize 10GbE for SAN access? (Choose two.) A. ISCSI B. FCoE C. SATA D. Fiber Channel E. AoE Answer: AB QUESTION 148 A routing protocol neighbor relationship has been established between two routers across the public Internet using GRE. What technology can be used to encrypt this communication channel? A. access lists B. IP security C. context based access D. intrusion prevention system Answer: B QUESTION 149 Which two statements about designing the Data Center Access layer are correct? (Choose two.) A. Multiport NIC servers should each have their own IP address. B. Layer 3 connectivity should never be used in the access layer. C. Layer 2 connectivity is primarily implemented in the access layer. D. Multiport NIC servers should never be used in the access layer. E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent. Answer: CE QUESTION 150 An organization needs a WAN Transport technology that meets these criteria: - has a low initial cost - provides low-to-medium BW - has medium-to-high latency and jitter Which technology should the organization use? A. DSL B. X.25 C. ISDN D. wireless E. analog modem Answer: A
Lead2pass guarantees your 200-310 exam success with our exam resources. Our 200-310 braindumps are the latest and developed by experienced IT certification professionals working in today's prospering companies and data centers. All our 200-310 braindumps include 200-310 real exam questions which guarantee your 100% success of 200-310 exam in your first try.
200-310 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDRHROM0NDWGhJejA 2 2016 Cisco 200-310 exam dumps (All 277 Q&As) from Lead2pass: http://www.lead2pass.com/200-310.html 3 1 [100% Exam Pass Guaranteed]
|