Replace 200-310: Actualtests real paper from 1 to 10
The article at Testaimer.com going over http://www.testaimer.com/200-310-test is very comprehensive.
Q1. Which consideration is the most important for the network designer when considering IP routing?
A. convergence
B. scalability
C. on-demand routing
D. redistribution
Answer: A
Q2. Which is the equation used to derive a 64 Kbps bit rate?
A. 2 x 8 kHz x 4-bit code words
B. 8 kHz x 8-bit code words
C. 2 x 4-bit code words x 8 kHz
D. 2 x 4 kHz x 8-bit code words
Answer: D
Q3. What are three valid methods of gathering information about an existing data network? (Choose three.)
A. Use organizational input.
B. Perform a traffic analysis.
C. Analyze the user-mapping of a running application.
D. Perform a packet-level audit to verify carrier service guarantees.
E. Perform a network audit to gather more detail about the network.
F. Use reports that analyze the metrics of the customer's existing network.
Answer: A,B,E
Q4. Application servers require load balancing and security services. Where in the data center network should these services be provisioned?
A. core
B. aggregation
C. Layer 3 access
D. distribution
Answer: B
Q5. Which two routing protocols converge most quickly? (Choose two.)
A. RIPv1
B. RIPv2
C. BGP
D. OSPF
E. EIGRP
Answer: D,E
Q6. A customer requests a filtering design based on the need to scan all internet traffic, including remote workers. What solution meets these requirements?
A. Cisco Cloud Web Security
B. Cisco Network Admission Control
C. Cisco Identity Services Engine
D. Cisco Adaptive Security Appliance
Answer: A
Q7. A network engineer is attempting to separate routing domains using a virtualization technology. What protocol can be configured to perform this task?
A. VLAN
B. VSAN
C. VRF
D. VPC
Answer: C
Q8. DRAG DROP
Answer:
Q9. Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Choose three.)
A. provides end-user connectivity
B. provides high speed transport
C. provides QoS services
D. enforces security policies
E. provides WAN connections
F. connects access devices to the core backbone
Answer: C,D,F
Explanation: Link: http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/campover.html#wp708979
Q10. Which type of area should you use in an enterprise OSPF deployment if you want to prevent propagation of type 5 LSAs but still allow the redistribution of external routes?
A. stub
B. totally stubby
C. backbone
D. NSSA
E. virtual link
Answer: D