Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 1 out of 18 pages
Viewing questions 1-20 out of questions
Questions # 1:

Question # 1

Refer to the exhibit. An engineer must translate the PC1 IP address to 10.199.77.100 and permit PC1 to ping the loopback 0 on router R2. What command set must be used?

A)

Question # 1

B)

Question # 1

C)

Question # 1

D)

Question # 1

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 2:

Which Rapid PVST+ feature should be configured on a switch port to immediately send traffic to a connected server as soon as it is active?

Options:

A.

BPDU guard


B.

loop guard


C.

portfast


D.

uplinkfast


Expert Solution
Questions # 3:

Which WLC management connection type is vulnerable to man-in-the-middIe attacks?

Options:

A.

Telnet


B.

console


C.

HTTPS


D.

SSH


Expert Solution
Questions # 4:

What is an Ansible inventory?

Options:

A.

file that defines the target devices upon which commands and tasks are executed


B.

unit of Python code to be executed within Ansible


C.

collection of actions to perform on target devices, expressed in YAML format


D.

device with Ansible installed that manages target devices


Expert Solution
Questions # 5:

A packet from a company s branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes: 172. 31.0 .0/16.72.31.0.0724. and 172.31 0 0/25. How does the router handle the packet?

Options:

A.

It sends the traffic via prefix 172.31.0.0/16


B.

It sends the traffic via the default gateway 0.0.0.070.


C.

It sends the traffic via prefix 172.31.0.0/24


D.

It sends the traffic via prefix 172.31.0.0/25


Expert Solution
Questions # 6:

Refer to the exhibit.

Question # 6

SW_1 and SW_12 represent two companies that are merging. They use separate network vendors. The VLANs on both Sides have been migrated to share IP subnets. Which command sequence must be issued on both sides to join the two companies and pass all VLANs between the companies?

Options:

A.

switchport mode trunkswitchport trunk encapsulation dot1q


B.

switchport mode trunkswitchport trunk allowed vlan allswitchport dot1q ethertype 0800


C.

switchport mode dynamic desirableswitchport trunk allowed vlan allswitchport trunk native vlan 7


D.

switchport dynamic autoswitchport nonegotiate


Expert Solution
Questions # 7:

Question # 7

Refer to the exhibit. A packet sourced from 10.10.10.32 is destined for the Internet. What is the administrative distance for the destination route?

Options:

A.

0


B.

1


C.

2


D.

32


Expert Solution
Questions # 8:

Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two.)

Options:

A.

REST APIs that allow for external applications to interact natively


B.

adapters that support all families of Cisco IOS software


C.

SDKs that support interaction with third-party network equipment


D.

customized versions for small, medium, and large enterprises


E.

modular design that is upgradable as needed


Expert Solution
Questions # 9:

Refer to the exhibit.

Question # 9

What is the next hop for traffic entering R1 with a destination of 10.1.2 126?

Options:

A.

10.165 20.126


B.

10.165.20.146


C.

10.165.20.166


D.

10.165 20.226


Expert Solution
Questions # 10:

Drag and drop the SNMP components from the left onto the description on the right.

Question # 10


Expert Solution
Questions # 11:

Refer to the exhibit.

Question # 11

What is represented by the word "switch’’ in line 2 of the JSON schema?

Options:

A.

array


B.

key


C.

value


D.

object


Expert Solution
Questions # 12:

What is the function of "off-the-shell" switches in a controller-based network?

Options:

A.

providing a central view of the deployed network


B.

forwarding packets


C.

making routing decisions


D.

setting packet-handling policies


Expert Solution
Questions # 13:

Which two wireless security stewards use Counter Mode Cipher Block Chaining Message Authentication Code Protocol for encryption and data integrity'? (Choose two.)

Options:

A.

WPA2


B.

WPA3


C.

Wi-Fi 6


D.

WEP


E.

WPA


Expert Solution
Questions # 14:

What is the main difference between traditional networks and controller-based networking?

Options:

A.

Controller-based networks increase TCO for the company, and traditional networks require less investment.


B.

Controller-based networks provide a framework for Innovation, and traditional networks create efficiency.


C.

Controller-based networks are open for application requests, and traditional networks operate manually.


D.

Controller-based networks are a closed ecosystem, and traditional networks take advantage of programmability.


Expert Solution
Questions # 15:

An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?

Options:

A.

crypto key Import rsa pem


B.

crypto key pubkey-chain rsa


C.

crypto key generate rsa


D.

crypto key zeroize rsa


Expert Solution
Questions # 16:

Refer to the exhibit.

Question # 16

A network engineer executes the show ip route command on router D. What is the next hop to network 192.168 1 0/24 and why?

Options:

A.

The next hop is 10.0.2.1 because it uses distance vector routing


B.

The next hop is 10.0.2.1 because it is a link-state routing protocol


C.

The next hop is 10.0.0.1 because it has a better administrative distance


D.

The next hop is 10.0.0.1 because it has a higher metric.


Expert Solution
Questions # 17:

Which WPA mode uses PSK authentication?

Options:

A.

Local


B.

Client


C.

Enterprise


D.

Personal


Expert Solution
Questions # 18:

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Question # 18


Expert Solution
Questions # 19:

What is a characteristic of RSA?

Options:

A.

It uses preshared keys for encryption


B.

It requires both sides to have identical keys


C.

It is a private-key encryption algorithm


D.

It is a public-key cryptosystem


Expert Solution
Questions # 20:

How does machine learning improve the detection of unauthorized network access?

Options:

A.

It monitors for outdated software.


B.

It dictates security policy updates.


C.

It identifies patterns indicating intrusions.


D.

It assigns security clearance levels.


Expert Solution
Viewing page 1 out of 18 pages
Viewing questions 1-20 out of questions