It is impossible to pass Cisco 200-310 exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed Cisco 200-310 practice questions. You will get a surprising result by our Rebirth Designing for Cisco Internetwork Solutions practice guides.

2021 Mar 200-310 free download

Q61. Which three technologies are recommended to be used for WAN connectivity in today's Enterprise Edge designs? (Choose three.) 


B. Metro Ethernet 

C. Frame Relay 




G. Wireless 

Answer: A,B,D 


There is some discussion about whether ISDN not DWDM should be the answer but it does say TODAYS network 

Q62. Refer to the exhibit. 

Which statement accurately represents the characteristics of the core layer in this design? 

A. QoS should only be performed only in the core. 

B. Load balancing should never be implemented or used. 

C. Access lists should be used in the core to perform packet manipulation. 

D. Partial mesh should be used as long as it is connected to each device by multiple paths. 

E. Policy-based traffic control should be implemented to enable prioritization and ensure the best performance for all time-critical applications. 


Q63. Your company's Cisco routers are operating with EIGRP. You need to join networks with an acquisition's heterogeneous routers at 3 sites, operating with EIGRP and OSPF. Which describes the best practice for routing protocol deployment? 

A. Apply OSPF throughout both networks 

B. Apply one-way redistribution exclusively at each location 

C. Apply two-way redistribution exclusively at each location 

D. Apply two-way redistribution at each location with a route filter at only one location 

E. Apply two-way redistribution at each location with a route filter at each location 

F. Apply EIGRP with the same autonomous system throughout both networks 


Explanation: Without filters there is possibility of routing loops. 


Q64. Which two design approaches provide management of enterprise network devices? (Choose two.) 

A. in-band 

B. out-of-line 

C. out-of-band 

D. in-line 

Answer: A,C 

Q65. In which operation mode does the AP act as a dedicated sensor for location-based and intrusion detection services? 

A. monitor mode 

B. promiscuous mode 

C. discovery mode 

D. sniffer mode 


Up to the immediate present 200-310 practice question:

Q66. Which is the equation used to derive a 64 Kbps bit rate? 

A. 2 x 8 kHz x 4-bit code words 

B. 8 kHz x 8-bit code words 

C. 2 x 4-bit code words x 8 kHz 

D. 2 x 4 kHz x 8-bit code words 


Q67. What is the primary consideration when choosing a routed network design over a traditional campus network design? 

A. Layer 3 service support at the network edge 

B. the routing protocol choice: open (OSPF) or proprietary (EIGRP) 

C. the routing abilities of the host devices 

D. the need to control the broadcast domains within the campus core 


Explanation: Layer 3 ability at network edge should be available to leverage the benefits of routed network design. Link: 

Q68. Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis? 

A. virtual port-channel 

B. virtual routing and forwarding 

C. virtual switching system 

D. virtual device context 




Virtual local-area network (VLAN), virtual storage-area network (VSAN), and virtual device contexts (VDC) help to segment the LAN, SAN, and network devices instances. 

Cisco Nexus 1000V virtual switch for VMware ESX and ESXI help to deliver visibility and policy control for virtual machines (VM). 

Flexible networking options with support for all server form factors and vendors, including support for blade servers from Cisco, Dell, IBM, and HP with integrated Ethernet and Fiber Channel switches. 

Q69. Which one of these statements is an example of how trust and identity management solutions should be deployed in the enterprise campus network? 

A. Authentication validation should be deployed as close to the data center as possible. 

B. Use the principle of top-down privilege, which means that each subject should have the privileges that are necessary to perform their defined tasks, as well as all the tasks for those roles below them. 

C. Mixed ACL rules, using combinations of specific sources and destinations, should be applied as close to the source as possible. 

D. For ease of management, practice defense in isolation - security mechanisms should be in place one time, in one place. 


Explanation: Validating user authentication should be implemented as close to the source as possible, with an emphasis on strong authentication for access from untrusted networks. Access rules should enforce policy deployed throughout the network with the following guidelines: 

.Source-specific rules with any type destinations should be applied as close to the source as possible. 

.Destination-specific rules with any type sources should be applied as close to the destination as possible. 

.Mixed rules integrating both source and destination should be used as close to the source as possible. 

An integral part of identity and access control deployments is to allow only the necessary access. Highly distributed rules allow for greater granularity and scalability but, unfortunately, increase the management complexity. On the other hand, centralized rule deployment eases management but lacks flexibility and scalability. 

Practicing “defense in depth” by using security mechanisms that back each other up is an important concept to understand. For example, the perimeter Internet routers should use ACLs to filter packets in addition to the firewall inspecting packets at a deeper level. 

Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 13 

Q70. Which is part of the Prepare phase of PPDIOO? 

A. Obtain site contact information 

B. Perform network audit 

C. Identify customer requirements 

D. Perform gap analysis 



Prepare Phase The Prepare phase establishes organization and business requirements, develops a network strategy, and proposes a high-level conceptual architecture to support the strategy. Technologies that support the architecture are identified. This phase creates a business case to establish a financial justification for a network strategy.