[Free] Download New Updated (December) Cisco 200-310 Exam Questions 21-30

Ensurepass

QUESTION 21

Which mode is used to exclusively look for unauthorized access points?

 

A.

monitor mode

B.

sniffer mode

C.

rogue detector mode

D.

local mode

 

Correct Answer: C

 

 

QUESTION 22

OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)

 

A.

All areas need to connect back to area 0.

B.

The OSPF process number on each router should match.

C.

NSSA areas should be used when an area cannot connect directly to area 0.

D.

Stub areas should be connected together using virtual links.

E.

ECMP may cause undesired results depending on the environment.

 

Correct Answer: AE

 

 

QUESTION 23

Which is the North American RIR for IPv4 addresses?

 

A.

RIPE

B.

ARIN

C.

IANA

D.

IEEE

E.

APNIC

 

Correct Answer: B

 

 

QUESTION 24

An enterprise campus module is typically made up of four submodules, as described by the Cisco Enterprise Architecture Model. Which two submodules are part of this module? (Choose two.)

 

A.

DMZ

B.

enterprise branch

C.

building distribution

D.

server farm/data center

E.

MAN

 

Correct Answer: CD

 

 

QUESTION 25

WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?

 

A.

security

B.

static versus dynamic routing

C.

bandwidth

D.

QoS

E.

latency

 

< font color="#000000">Correct Answer: A

 

 

 

 

QUESTION 26

Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?

 

A.

stub

B.

totally stubby

C.

backbone

D.

NSSA

E.

virtual link

 

Correct Answer: D

 

 

QUESTION 27

Which protocol is used for voice bearer traffic?

 

A.

MGCP

B.

RTP

C.

SCCP

D.

CDP

E.

ICMP

 

Correct Answer: B

 

 

QUESTION 28

Refer to the exhibit. On which router should you configure redistribution?

 

clip_image002

 

A.

Router 1

B.

Router 2

C.

Router 3

D.

Router 4

E.

Router 5

 

Correct Answer: B

 

 

QUESTION 29

Which three Cisco technologies can you use to detect and mitigate threats? (Choose three.)

 

A.

NetFlow

B.

FWSM

C.

ISE

D.

VRRP

E.

sFLOW

 

Correct Answer: ABC

 

 

QUESTION 30

Which technology allows remote networks to be connected via site-to-site tunnels?

 

A.

IPsec VPN

B.

AnyConnect VPN

C.

SSL VPN

D.

EasyConnect VPN

 

Correct Answer: A

 

Free VCE & PDF File for Cisco 200-310 Exam Questions

Instant Access to Free VCE Files: CCNA | CCNP | CCIE …
Instant Access to Free PDF Files: CCNA | CCNP | CCIE …