We provide real ccda 200 310 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 200 310 desgn pdf Exam quickly & easily. The 200 310 pdf PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco ccda 200 310 dumps pdf and vce product and material, you can easily pass the ccda 200 310 exam.



Q102. When designing a new enterprise campus network, what topology should be used for maximum scalability? 

A. flat 

B. three-layer 

C. star 

D. partial mesh 

E. full mesh 


Q103. A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed? (Choose three.) 

A. interface queuing and scheduling 

B. congestion management 

C. compression and fragmentation 

D. bandwidth provisioning 

E. traffic classification 

F. buffer management 

Answer: A,D,E 

Q104. A network engineer is using the traditional switched hierarchical design. The client has asked to increase uplink utilization from the access layer to the distribution. How can the engineer attain this new requirement without adding new physical connections? 

A. enable spanning-tree portfast 

B. enable VSS at the distribution layer 

C. increase the MTU size on the uplink interfaces 

D. ensure the root bridge priority is equal on both distribution switches 


Q105. Where in the Cisco Enterprise Architecture model does network management reside? 

A. Enterprise data center module 

B. Enterprise campus module 

C. Enterprise edge module 

D. Service Provider edge module 

E. Service Provider data center module 



The network management servers reside in the campus infrastructure but have tie-ins to all the components in the enterprise network for monitoring and management. 

Q106. Which two are types of network virtualization? (Choose two.) 

A. VSS: Virtual Switching System 

B. VRF: virtual routing and forwarding 

C. VCI: virtual channel identifier 

D. VLSM: variable length subnet masking 

E. VM: virtual machine 

F. VMP: Virtual Memory Pool 

Answer: A,B 


Network virtualization encompasses logical isolated network segments that share the same 

physical infrastructure. Each segment operates independently and is logically separate 

from the other segments. Each network segment appears with its own privacy, security, 

independent set of policies, QoS levels, and independent routing paths. 

Here are some examples of network virtualization technologies: 

VLAN: Virtual local-area network 

VSAN: Virtual storage-area network 

VRF: Virtual routing and forwarding 

VPN: Virtual private network 

VPC: Virtual Port Channel 

Q107. Which Cisco security mechanism has the attributes listed below? 

. It is a sensor appliance 

. It searches for potential attacks by capturing and analyzing traffic 

. It is a "purpose-built device" 

. It is installed passively 

. It introduces no delay or overhead 







Q108. Which two of these practices are considered to be best practices when designing the access layer for the enterprise campus? (Choose two.) 

A. Implement all of the services (QoS, security, STP, and so on) in the access layer, offloading the work from the distribution and core layers. 

B. Always use a Spanning Tree Protocol; preferred is Rapid PVST+. 

C. Use automatic VLAN pruning to prune unused VLANs from trunked interfaces to avoid broadcast propagation. 

D. Avoid wasted processing by disabling STP where loops are not possible. 

E. Use VTP transparent mode to decrease the potential for operational error. 

Answer: B,E 


When designing the building access layer, you must consider the number of users or ports required to size up the LAN switch. Connectivity speed for each host should also be considered. Hosts might be connected using various technologies such as Fast Ethernet, Gigabit Ethernet, or port channels. The planned VLANs enter into the design. 

Performance in the access layer is also important. Redundancy and QoS features should be considered. 

The following are recommended best practices for the building access layer: 

. Limit VLANs to a single closet when possible to provide the most deterministic and highly available topology. 

. Use Rapid Per-VLAN Spanning Tree Plus (RPVST+) if STP is required. It provides the faster convergence than traditional 802.1d default timers. 

. Set trunks to ON and ON with no-negotiate. 

. Manually prune unused VLANs to avoid broadcast propagation (commonly done on the distribution switch). 

. Use VLAN Trunking Protocol (VTP) Transparent mode, because there is little need for a common VLAN database in hierarchical networks. 

. Disable trunking on host ports, because it is not necessary. Doing so provides more security and speeds up PortFast. 

. Consider implementing routing in the access layer to provide fast convergence and Layer 3 load balancing. 

. Use the switchport host commands on server and end-user ports to enable PortFast and disable channeling on these ports. 

. Use Cisco STP Toolkit, which provides 

. PortFast: Bypass listening-learning phase for access ports 

. Loop GuarD. Prevents alternate or root port from becoming designated in absence of bridge protocol data units (BPDU) 

. Root GuarD. Prevents external switches from becoming root 

. BPDU GuarD. Disables PortFast-enabled port if a BPDU is received Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 3, Page 85