Pass4sure offers free demo for cisco 200 310 exam. "Designing for Cisco Internetwork Solutions", also known as cisco 200 310 exam, is a Cisco Certification. This set of posts, Passing the Cisco 200 310 desgn exam, will help you answer those questions. The ccda 200 310 pdf Questions & Answers covers all the knowledge points of the real exam. 100% real Cisco ccda 200 310 official cert guide download exams and revised by experts!

Q121. Which three items pertain to EIGRP? (Choose three.) 

A. Can use multiple unequal paths. 

B. Routes are redistributed as type 2 by default. 

C. ASN and K values must match to form neighbors. 

D. Uses multicast address for updates. 

E. Exchanges full routing table every 30 seconds. 

F. Summary routes have AD of 90. 

G. External routes have AD of 170. 

Answer: A,C,G 

Q122. What is the primary consideration when choosing a routed network design over a traditional campus network design? 

A. Layer 3 service support at the network edge 

B. the routing protocol choice: open (OSPF) or proprietary (EIGRP) 

C. the routing abilities of the host devices 

D. the need to control the broadcast domains within the campus core 


Explanation: Layer 3 ability at network edge should be available to leverage the benefits of routed network design. Link: 

Q123. Which three protocols support VLSM? (Choose three.) 

A. RIPv2 

B. RIPv1 




Answer: A,C,D 

Q124. Which two statements about designing the Data Center Access layer are correct? (Choose two.) 

A. Multiport NIC servers should each have their own IP address. 

B. Layer 3 connectivity should never be used in the access layer. 

C. Layer 2 connectivity is primarily implemented in the access layer. 

D. Multiport NIC servers should never be used in the access layer. 

E. Layer 2 clustering implementation requires servers to be Layer 2 adjacent. 

Answer: C,E 


User access is primarily layer 2 in nature, layer 2 clustering is possible only in layer 2 Here is the Explanation: from the Cisco press CCDA certification guide Figure 4-8. Enterprise Data Center Infrastructure Overview 

Defining the DC Access Layer 

The data center access layer’s main purpose is to provide Layer 2 and Layer 3 physical port density for various servers in the data center. In addition, data center access layer switches provide high-performance, low-latency switching and can support a mix of oversubscription requirements. Both Layer 2 and Layer 3 access (also called routed access) designs are available, but most data center access layers are built using Layer 2 connectivity. The Layer 2 access design uses VLAN trunks upstream, which allows data center aggregation services to be shared across the same VLAN and across multiple switches. Other advantages of Layer 2 access are support for NIC teaming and server clustering that requires network connections to be Layer 2 adjacent or on the same VLAN with one another. 

CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 4 

Q125. Cisco Identity-Based Networking Services relies heavily on the 802.1X protocol. Which other authentication solution is used hand-in-hand with 802.1X to authenticate users for network access? 



C. IPsec 





Cisco Identity-Based Network Services The Cisco Identity-Based Network Services solution is a way to authenticate host access based on policy for admission to the network. IBNS supports identity authentication, dynamic provisioning of VLANs on a per-user basis, guest VLANs, and 802.1X with port security. 

The 802.1 X protocol is a standards-based protocol for authenticating network clients by permitting or denying access to the network. The 802.1 X protocol operates between the end-user client seeking access and an Ethernet switch or wireless access point (AP) providing the connection to the network. In 802.1 X terminology, clients are called supplicants, and switches and APs are called authenticates. A back-end RADIUS server such as a Cisco Access Control Server (ACS) provides the user account database used to apply authentication and authorization. With an IBNS solution, the host uses 802.IX and Extensible Authentication Protocol over LANs (EAPoL) to send the credentials and initiate a session to the network. After the host and switch establish LAN connectivity, username and password credentials are requested. The client host then sends the credentials to the switch, which forwards them to the RADIUS ACS. The RADIUS ACS performs a lookup on the username and password to determine the credentials' validity. If the username and password are correct, an accept message is sent to the switch or AP to allow access to the client host. If the username and password are incorrect, the server sends a message to the switch or AP to block the host port. Figure 13-4 illustrates the communication flow of two hosts using 802.1X and KAPoL with the switch, AP, and back-end RADIUS server. 

Q126. When designing for a remote worker, which two are typical requirements? (Choose two.) 

A. best-effort interactive and low-volume traffic patterns 

B. connections to the enterprise edge using Layer 2 WAN technologies 

C. always-on connection with SLA from ISP 

D. voice and IPsec VPN support 

E. high-end security devices with stateful firewall filtering 

F. dual or multihoming to ISPs 

Answer: C,D 

Q127. Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point sub interfaces? (Choose two.) 

A. RIPv1 

B. RIPv2 




Answer: D,E 

Q128. What is the recommended spanning tree protocol to use for all Layer 2 deployments in a branch office environment? 





E. Rapid PVST + 


Q129. What technology can secure data over an insecure medium and provide WAN redundancy in the event of a primary connection failure? 

A. virtual private network 

B. shadow PVC 

C. dial-up ISDN 

D. GRE Tunnel 


Q130. What branch design supports 100 to 1000 users and integrates ASA firewalls? 

A. small 

B. medium 

C. large 

D. extra large