Sale!

200-310 Designing for Cisco Internetwork Solutions

$25.00 $19.95

  • Passing Score: 800
  • Time Limit: 120 min
  • File Version: 1.0
  • Q&A: 174
  • Updated March 2020
Recommend this page

Description


Udacity - Cloud Computing Nanodegree program: Unleash Your Career!

Exam Demo

200-310 Designing for Cisco Internetwork Solutions

QUESTION 1
Which of the following is a leased-line WAN technology that divides a link’s bandwidth into equal-sized segments based on clock rate?
A. TDM
B. ATM
C. WDM
D. DWDM
E. MPLS
F. Metro Ethernet

Correct Answer: A

Section: Enterprise Network Design Explanation
Explanation
Explanation/Reference:
Section: Enterprise Network Design Explanation
Explanation:
Time division multiplexing (TDM) is a leased-line WAN technology that divides a link’s bandwidth into equal-sized segments based on clock rate. TDM
enables several data streams to share a single physical connection. Each data stream is then allotted a fixed number of segments that can be used to
transmit data. Because the number of segments dedicated to each data stream is static, unused bandwidth from one data stream cannot be dynamically
reallocated to another data stream that has exceeded its available bandwidth. By contrast, statistical multiplexing dynamically allocates bandwidth to
data streams based on their traffic flow. For example, if a particular data stream does not have any traffic to send, its bandwidth is reallocated to other
data streams that need it.
Metro Ethernet does not divide a link’s bandwidth into equal-sized segments based on clock rate. Metro Ethernet is a WAN technology that is commonly
used to connect networks in the same metropolitan area.
For example, if a company has multiple branch offices within the same city, the company can use Metro Ethernet to connect the branch offices to the
corporate headquarters. Metro Ethernet providers typically provide up to 1,000 Mbps of bandwidth.
Wavelength division multiplexing (WDM) does not divide a link’s bandwidth into equal-sized segments based on clock rate. WDM is a leased-line WAN
technology used to increase the amount of data signals that a single fiber strand can carry. To accomplish this, WDM can transfer data of varying light
wavelengths on up to 16 channels per single fiber strand. Whereas TDM divides the bandwidth in order to carry multiple data streams simultaneously,
WDM aggregates the data signals being carried within the fiber strand.
Dense WDM (DWDM) does not divide a link’s bandwidth into equal-sized segments based on clock rate. DWDM is a leased-line WAN technology that
improves on WDM by carrying up to 160 channels on a single fiber strand. The spacing of DWDM channels is highly compressed, requiring a more
complex transceiver design and therefore making the technology very expensive to implement.
Asynchronous Transfer Mode (ATM) uses statistical multiplexing and does not divide a link’s bandwidth into equal-sized segments based on clock rate.

ATM is a shared WAN technology that transports its payload in a series of 53byte cells. ATM has the unique ability to transport different types of trafficincluding
IP packets, traditional circuit-switched voice, and video-while still maintaining a high quality of service for delay-sensitive traffic, such as voice
and video services. Although ATM could be categorized as a packet-switched WAN technology, it is often listed in its own category as a cell-switched
WAN technology.
Multiprotocol Label Switching (MPLS) does not divide a link’s bandwidth into equal-sized segments based on clock rate. MPLS is a shared WAN
technology that makes routing decisions based on information contained in a fixed-length label. In an MPLS virtual private network (VPN), each
customer site is provided with its own label by the service provider. This enables the customer site to use its existing IP addressing scheme internally
while allowing the service provider to manage multiple sites that might have conflicting IP address ranges. The service provider then forwards traffic
over shared lines between the sites in the VPN according to the routing information that is passed to each provider edge router.
Reference:
CCDA 200-310 Official Cert Guide, Chapter 6, TimeDivision Multiplexing, p. 225
Cisco: ISDN Voice, Video and Data Call Switching with Router TDM Switching Features

QUESTION 2
DRAG DROP
You are adding an additional LAP to your current wireless network, which uses LWAPP. The LAP is configured with a static IP address. You want to
identify the sequence in which the LAP will connect to and register with a WLC on the network.
Select the lap connection steps on the left, and drag them to the appropriate location on the right. Not all steps will be used.
Select and Place:

200-310-1

Correct Answer:

200-310-2

Section: Considerations for Expanding an Existing Network Explanation
Explanation
Explanation/Reference:
Section:
Considerations for Expanding an Existing Network Explanation
Explanation:
When you add a lightweight access point (LAP) to a Wireless network that uses Lightweight Access Point Protocol (LWAPP), the LAP goes through a
sequence of steps to register with a Wireless LAN controller (WLC) on the network. First, if Open Systems Interconnection (OSI) Layer 2 LWAPP mode
is supported, the LAP attempts to locate a WLC by broadcasting a Layer 2 LWAPP discovery request message. If a WLC does not respond to the Layer
2 broadcast, the LAP will broadcast a
Layer 3 LWAPP discovery request message.
Once a WLC receives the LWAPP discovery message, the WLC will send an LWAPP discovery response message to the LAP; the discovery response
will contain the IP address of the WLC. The LAP compiles a list of all discovery responses it receives. The list is cross-referenced against the LAP’s
internal configuration. The LAP will then send an LWAPP join request message to one of the WLCs on its list of responses.
If the LAP has been configured with a primary, secondary, and tertiary WLC, the LAP will first send an LWAPP join request message to the primary
WLC. If no response is received from the primary WLC, the LAP will try the secondary and tertiary WLCs in sequence. If no response is received from
either the secondary or tertiary WLCs, the LAP will examine the responses on its list for a master controller flag. If one of the WLCs is configured as a master, the LAP will send an LWAPP join request message to the master WLC. If there is no master configured, or if the master does not respond, the
LAP will examine its list of responses and send an LWAPP join request message to the WLC with the greatest capacity.
When a WLC responds with an LWAPP join response message, the authentication process begins. After the LAP and the WLC authenticate with each
other, the LAP will register with the WLC.
Reference:
Cisco: Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC): Register the LAP with the WLC

QUESTION 3
Which of the following statements best describes the purpose of CDP?
A. CDP is a proprietary protocol used by Cisco devices to detect neighboring Cisco devices.
B. CDP is a standard protocol used to power IP devices over Ethernet.
C. CDP is a proprietary protocol used to power IP devices over Ethernet.
D. CDP is a standard protocol used by Cisco devices to detect neighboring devices of any type.

Correct Answer: A

Section: Design Methodologies Explanation
Explanation
Explanation/Reference:
Section: Design Methodologies Explanation
Explanation:
Cisco Discovery Protocol (CDP) is a Cisco-proprietary protocol used by Cisco devices to detect neighboring Cisco devices. For example, Cisco switches
use CDP to determine whether an attached Voice over IP (VoIP) phone is manufactured by Cisco or by a third party. CDP is enabled by default on Cisco
devices. You can globally disable CDP by issuing the no cdp run command in global configuration mode. You can disable CDP on a perinterface basis
by issuing the no cdp enable command in interface configuration mode.
CDP packets are broadcast from a CDPenabled device on a multicast address. Each directly connected CDPenabled device receives the broadcast and
uses that information to build a CDP table. Detailed information about neighboring CDP devices can be viewed in IOS by issuing the show cdp neighbor
detail command in global configuration mode. The following abbreviated sample output shows information obtained from CDP about the IP phone
named SEP00123456789A:

200-310-3

Link Layer Detection Protocol (LLDP), not CDP, is a standard protocol that detects neighboring devices of any type. Cisco devices also support LLDP.
LLDP can be used in a heterogeneous network to enable Cisco devices to detect non-Cisco devices and vice versa. LLDP, which is enabled by default,
can be disabled globally by issuing the no lldp run command. You can reenable LLDP by issuing the lldp run command.
CDP is not a protocol used to power IP devices over Ethernet, although an IP phone can provide Power over Ethernet (PoE) requirements to a switch by
using CDP. A Catalyst switch can provide power to both Cisco and non-Cisco IP phones that support either the 802.3af standard method or the Cisco
prestandard method of PoE. For a Catalyst switch to successfully power an IP phone, both the switch and the IP phone must support the same PoE
method. After a common PoE method is determined, CDP messages sent between Catalyst switches and Cisco IP phones can further refine the
amount of power allocated to each device.
Reference:
CCDA 200-310 Official Cert Guide, Chapter 15, CDP, p. 629
Cisco: Catalyst 3750 Switch Software Configuration Guide, 12.2(40)SE: Configuring CDP

QUESTION 4
Which of the following statements are true regarding standard IP ACLs? (Choose two.)
A. Standard ACLs should be placed as close to the source as possible.
B. Standard ACLs can filter traffic based on source and destination address.
C. Standard ACLs can be numbered in the range from 1 through 99 or from 1300 through 1999.
D. Standard ACLs can filter traffic based on port number.
E. Standard ACLs can filter traffic from a specific host or a specific network.

Correct Answer: CE

Section: Considerations for Expanding an Existing Network Explanation
Explanation
Explanation/Reference:

Section: Considerations for Expanding an Existing Network Explanation
Explanation:
Standard IP access control lists (ACLs) can be numbered in the range from 1 through 99 or from 1300 through 1999 and can filter traffic from a specific
host or a specific network. ACLs are used to control packet flow across a network. For example, you could use an ACL on a router to restrict a specific
type of traffic, such as Telnet sessions, from passing through a corporate network. There are two types of IP ACLs: standard and extended. Standard IP
ACLs can be used to filter based only on source IP addresses; standard IP ACLs cannot be used to filter based on source and destination address.
Standard ACLs should be placed as close to the destination as possible so that other traffic originating from the source address is not affected by the
ACL.
Extended IP ACLs enable you to permit or deny packets based on not only source IP address but destination network, protocol, or destination port. In
contrast to standard IP ACLs, extended IP ACLs should be placed as close to the source as possible. This ensures that traffic being denied by the ACL
does not unnecessarily traverse the network. Extended ACLs have access list numbers from 100 through 199 and from 2000 through 2699.
Reference:
CCDA 200-310 Official Cert Guide, Chapter 13, Identity and Access Control Deployments, pp. 532-533 Cisco: Configuring IP Access Lists

QUESTION 5
In which of the following situations would static routing be the most appropriate routing mechanism?
A. when the router has a single link to a router within the same AS
B. when the router has redundant links to a router within the same AS
C. when the router has a single link to a router within a different AS
D. when the router has redundant links to a router within a different AS

Correct Answer: C

Section: Addressing and Routing Protocols in an Existing Network Explanation
Explanation
Explanation/Reference:
Section: Addressing and Routing Protocols in an Existing Network Explanation
Explanation:
Static routing would be the most appropriate routing mechanism for a router that has a single link to a router within a different autonomous system (AS).
An AS is defined as the collection of all areas that are managed by a single organization. Because an interdomain routing protocol, such as Border
Gateway Protocol (BGP), can be complicated to configure and uses a large portion of a router’s resources, static routing is recommended if dynamic
routing information is not exchanged between routers that reside in different ASes. For example, if you connect a router to the Internet through a single
Internet service provider (ISP), it is not necessary for the router to run BGP, because the router will use this single connection to the Internet for all traffic
that is not destined to the internal network.
External BGP (eBGP), not static routing, would be the most appropriate routing protocol for a router that has redundant links to a router within a different
AS. BGP is typically used to exchange routing information between ASes, between a company and an ISP, or between ISPs. BGP routers within the
same AS communicate by using internal BGP (iBGP), and BGP routers in different ASes communicate by using eBGP.

An intradomain routing protocol, such as Enhanced Interior Gateway Routing Protocol (EIGRP) or Open Shortest Path First (OSPF), would be the most
appropriate routing protocol for a router that has a single link or redundant links to a router within the same AS.
Reference:
CCDA 200-310 Official Cert Guide, Chapter 10, Static Versus Dynamic Route Assignment, pp. 380-381

Google IT Support Professional Certificate by Grow with Google (550x480)