200-310 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Exam

Question No.51

which options characterizes normal traffic flow and performance? (Choose two)

  1. Bandwidth

  2. Utilization

  3. Availability

  4. Baseline

Correct Answer: AB

Question No.52

A data center is being deployed, and one design requirement is to be able to readily scale server virtualization. Which IETF standard technology can provide this requirement?

  1. Transparent Interconnection of Lots of Links

  2. Cisco FabricPath

  3. data center bridging

  4. Cisco Unified Fabric

Correct Answer: A

Question No.53

Refer to the exhibit. Assuming that a network will grow exponentially for the next 24 months, what is the main limitation that must be addressed?


  1. scalability

  2. serviceability

  3. redundancy

  4. resiliency

Correct Answer: A

Question No.54

A network engineer must connect two sites. Each site has a different autonomous system number. Which method do you use to exchange routing information between the sites?

  1. OSPFv3

  2. BGP

  3. static routing

  4. EIGRP

  5. IGP

Correct Answer: B

Question No.55

What are two benefits of the bottom-up design approach? (Choose two.)

  1. allows a quick response to a design request

  2. facilitates design that is based on previous experience

  3. requires little or no notation of actual organizational requirements for implementation

  4. incorporates organizational requirements

  5. provides a broader overview to the organization and the designer

Correct Answer: AB

Question No.56

Which network virtualization technique can you implement without disrupting the existing network design and infrastructure?

  1. VRF-Lite

  2. EVN

  3. MPLS

  4. VNET tags

Correct Answer: A

Question No.57


Drag the characteristic on the left to the correct campus design model on the right.


Correct Answer:


Question No.58

What are three valid methods of gathering information about an existing data network? (Choose three.)

  1. Use organizational input.

  2. Perform a traffic analysis.

  3. Analyze the user-mapping of a running application.

  4. Perform a packet-level audit to verify carrier service guarantees.

  5. Perform a network audit to gather more detail about the network.

  6. Use reports that analyze the metrics of the customer#39;s existing network.

Correct Answer: ABE

Question No.59

Which statement is true about using a DNS server to discover a controller IP?

  1. The AP sends a discovery request to the first controller on the list and then goes down the list chronologically until it receives a discovery response.

  2. The AP sends a discovery request to the last controller on the list and then goes up the list chronologically until it receives a discovery response.

  3. The AP sends a discovery request to all controllers on the list simultaneously.

  4. Multiple controller IP addresses in a DNS response are not supported.

Correct Answer: C

Question No.60

Where in the network hierarchy should network access control be performed?

  1. backbone

  2. core

  3. access

  4. distribution

Correct Answer: C

Get Full Version of 200-310 Dumps