Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 2 out of 8 pages
Viewing questions 51-100 out of questions
Questions # 51:

Refer to the exhibit.

Question # 51

Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?

Options:

A.

ip route 0.0.0.0 0.0.0.0 g0/1 1


B.

ip route 0.0.0.0 0.0.0.0 209.165.201.5 10


C.

ip route 0.0.0.0 0.0.0.0 209.165.200.226 1


D.

ip route 0,0.0.0 0.0.0.0 g0/1 6


Expert Solution
Questions # 52:

What role does a hypervisor provide for each virtual machine in server virtualization?

Options:

A.

infrastructure-as-a-service.


B.

Software-as-a-service


C.

control and distribution of physical resources


D.

services as a hardware controller.


Expert Solution
Questions # 53:

Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.

Question # 53


Expert Solution
Questions # 54:

Refer to the exhibit.

Question # 54

Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?

Options:

A.

192.168.0.7


B.

192.168.0.4


C.

192.168.0.40


D.

192.168.3.5


Expert Solution
Questions # 55:

Refer to the exhibit.

Question # 55

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

Options:

A.

Select the WPA Policy option with the CCKM option.


B.

Disable AES encryption.


C.

Enable Fast Transition and select the FT 802.1x option.


D.

Enable Fast Transition and select the FT PSK option.


Expert Solution
Questions # 56:

An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?

Options:

A.

Add the switch in the VTP domain with a lower revision number


B.

Add the switch with DTP set to dynamic desirable


C.

Add the switch in the VTP domain with a higher revision number


D.

Add the switch with DTP set to desirable


Expert Solution
Questions # 57:

Refer to the exhibit.

Question # 57

A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?

Options:

A.

ip route 172.21.34.0 255.255.255.192 10.73.65.65


B.

ip route 172.21.34.0 255.255.255.0 10.73.65.65


C.

ip route 172.21.34.0 255.255.128.0 10.73.65.64


D.

ip route 172.21.34.0 255.255.255.128 10.73.65.66


Expert Solution
Questions # 58:

Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right.

Question # 58


Expert Solution
Questions # 59:

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

Options:

A.

configure the hello and dead timers to match on both sides


B.

configure the same process ID for the router OSPF process


C.

configure the same router ID on both routing processes


D.

Configure the interfaces as OSPF active on both sides.


E.

configure both interfaces with the same area ID


Expert Solution
Questions # 60:

Refer to the exhibit.

Question # 60

Which plan must be Implemented to ensure optimal QoS marking practices on this network?

Options:

A.

As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer.


B.

Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2.


C.

Remark traffic as it traverses R1 and trust all markings at the access layer.


D.

As traffic enters from the access layer on SW1 and SW2. trust all traffic markings.


Expert Solution
Questions # 61:

Which configuration is needed to generate an RSA key for SSH on a router?

Options:

A.

Configure the version of SSH


B.

Configure VTY access.


C.

Create a user with a password.


D.

Assign a DNS domain name


Expert Solution
Questions # 62:

Refer to the exhibit.

Question # 62

Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)

A)

Question # 62

B)

Question # 62

C)

Question # 62

D)

Question # 62

E)

Question # 62

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


E.

Option E


Expert Solution
Questions # 63:

In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?

Options:

A.

There is limited unique address space, and traffic on the new subnet will stay local within the organization.


B.

The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.


C.

Traffic on the subnet must traverse a site-to-site VPN to an outside organization.


D.

The ISP requires the new subnet to be advertised to the internet for web services.


Expert Solution
Questions # 64:

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?

Options:

A.

platform-as-a-service


B.

software-as-a-service


C.

network-as-a-service


D.

infrastructure-as-a-service


Expert Solution
Questions # 65:

Refer to the exhibit.

Question # 65

The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

A)

Question # 65

B)

Question # 65

C)

Question # 65

D)

Question # 65

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 66:

Refer to the exhibit.

Question # 66

An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message: " % Connection refused by remote host " Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?

Options:

A.

Add the access-list 10 permit any command to the configuration


B.

Remove the access-class 10 in command from line vty 0.4.


C.

Add the ip access-group 10 out command to interface g0/0.


D.

Remove the password command from line vty 0 4.


Expert Solution
Questions # 67:

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

Question # 67


Expert Solution
Questions # 68:

Refer to the exhibit.

Question # 68

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

Options:

A.

Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15


B.

Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15


C.

interface FastEthernet0/1 switchport mode access switchport voice vlan 10


D.

Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated


Expert Solution
Questions # 69:

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

Question # 69

B)

Question # 69

C)

Question # 69

D)

Question # 69

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 70:

What criteria is used first during me root port selection process?

Options:

A.

local port ID


B.

lowest path cost to the root bridge


C.

lowest neighbor ' s bridge ID


D.

lowest neighbor ' s port ID


Expert Solution
Questions # 71:

What is the purpose of a southbound API in a control based networking architecture?

Options:

A.

Facilities communication between the controller and the applications


B.

Facilities communication between the controller and the networking hardware


C.

allows application developers to interact with the network


D.

integrates a controller with other automation and orchestration tools.


Expert Solution
Questions # 72:

Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)

Options:

A.

OSPF area


B.

OSPF MD5 authentication key


C.

iPv6 address


D.

OSPf process ID


E.

OSPf stub flag


Expert Solution
Questions # 73:

Refer to the exhibit.

Question # 73

Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)

Options:

A.

transport input telnet


B.

crypto key generate rsa


C.

ip ssh pubkey-chain


D.

login console


E.

username cisco password 0 Cisco


Expert Solution
Questions # 74:

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two)

Options:

A.

runts


B.

giants


C.

frame


D.

CRC


E.

input errors


Expert Solution
Questions # 75:

Refer to the exhibit.

Question # 75

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:

A.

Configure the OSPF priority on router A with the lowest value between the three routers.


B.

Configure router B and router C as OSPF neighbors of router A.


C.

Configure the router A interfaces with the highest OSPF priority value within the area.


D.

Configure router A with a fixed OSPF router ID


Expert Solution
Questions # 76:

Refer to the exhibit.

Question # 76

A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?

Options:

A.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh


B.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp


C.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet


D.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https


Expert Solution
Questions # 77:

Which Layer 2 switch function encapsulates packets for different VLANs so that the packets traverse the same port and maintain traffic separation between the VLANs?

Options:

A.

VLAN numbering


B.

VLAN DSCP


C.

VLAN tagging


D.

VLAN marking


Expert Solution
Questions # 78:

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

Options:

A.

CPU ACL


B.

TACACS


C.

Flex ACL


D.

RADIUS


Expert Solution
Questions # 79:

Question # 79

Refer to the exhibit. Routers R1 and R2 have been configured with their respective LAN interfaces. The two circuits are operational and reachable across the WAN. Which command set establishes failover redundancy if the primary circuit goes down?

Options:

A.

Ri(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.62R2(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.5 2


B.

Ri(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.6R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.5


C.

Ri(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.6R2(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.5


D.

Ri(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.2R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.1


Expert Solution
Questions # 80:

Question # 80

Refer to the exhibit.

Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?

Options:

A.

Disable WPA Policy and WPA Encryption and then enable PSK using ASCII.


B.

Enable PSK and FT PSK and then disable WPA Policy.


C.

Disable WPA Encryption and then enable FT PSK.


D.

Enable PSK using Hex format and then disable WPA Policy.


Expert Solution
Questions # 81:

Refer to the exhibit.

Question # 81

If configuring a static default route on the router with the ip route 0.0.0.0 0.0.0.0 10.13.0.1 120 command how does the router respond?

Options:

A.

It ignores the new static route until the existing OSPF default route is removed


B.

It immediately replaces the existing OSPF route in the routing table with the newly configured static route


C.

It starts load-balancing traffic between the two default routes


D.

It starts sending traffic without a specific matching entry in the routing table to GigabitEthernet0/1


Expert Solution
Questions # 82:

Refer to the exhibit.

Question # 82

An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?

Options:

A.

interface gi0/1no cdp enable


B.

interface gi0/1clear cdp table


C.

interface gi0/0no cdp advertise-v2


D.

interface gi0/0no cdp run


Expert Solution
Questions # 83:

Drag and drop the statements about networking from the left onto the corresponding networking types on the right.

Question # 83


Expert Solution
Questions # 84:

What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?

Options:

A.

Layer 2 switch


B.

load balancer


C.

firewall


D.

LAN controller


Expert Solution
Questions # 85:

How does QoS optimize voice traffic?

Options:

A.

reducing bandwidth usage


B.

by reducing packet loss


C.

by differentiating voice and video traffic


D.

by increasing jitter


Expert Solution
Questions # 86:

Question # 86

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?

Options:

A.

The OSPF router IDs are mismatched.


B.

Router2 is using the default hello timer.


C.

The network statement on Router1 is misconfigured.


D.

The OSPF process IDs are mismatched.


Expert Solution
Questions # 87:

Refer to the exhibit.

Question # 87

Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?

Options:

A.

via next-hop 10.0.1.5


B.

via next-hop 10 0 1.4


C.

via next-hop 10.0 1.50


D.

via next-hop 10.0 1 100


Expert Solution
Questions # 88:

What is the difference between IPv6 unicast and anycast addressing?

Options:

A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration


B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration


C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.


D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes


Expert Solution
Questions # 89:

Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum bandwidth has been surpassed?

Options:

A.

weighted random early detection


B.

traffic policing


C.

traffic shaping


D.

traffic prioritization


Expert Solution
Questions # 90:

Refer to the exhibit.

Question # 90

Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?

Options:

A.

GigabitEthernet0/0


B.

GigabltEthornet0/1


C.

GigabitEthernet0/2


D.

GigabitEthernet0/3


Expert Solution
Questions # 91:

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

Options:

A.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network broadcast


B.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network point-to-point


C.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf cost 0


D.

router ospf 1network 192.168.1.1 0.0.0.0 area 0hello interval 15interface e1/1Ip address 192.168.1.1 255.255.255.252


Expert Solution
Questions # 92:

Which type of IPv6 address is similar to a unicast address but is assigned to multiple devices on the same network at the same time?

Options:

A.

global unicast address


B.

anycast address


C.

multicast address


D.

link-local address


Expert Solution
Questions # 93:

Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?

Options:

A.

SYIM flood


B.

reflection


C.

teardrop


D.

amplification


Expert Solution
Questions # 94:

When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)

Options:

A.

ASCII


B.

base64


C.

binary


D.

decimal


E.

hexadecimal


Expert Solution
Questions # 95:

Refer to the exhibit.

Question # 95

All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?

Options:

A.

192.168.1.0/24 via 192.168.12.2


B.

192.168.1.128/25 via 192.168.13.3


C.

192.168.1.192/26 via 192.168.14.4


D.

192.168.1.224/27 via 192.168.15.5


Expert Solution
Questions # 96:

Refer to the exhibit.

Question # 96

R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?

Options:

A.

R1(config)#ip route 192.168.20.0 255.255.0.0 192.168.30.2


B.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 90


C.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 111


D.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2


Expert Solution
Questions # 97:

What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model?

Options:

A.

access - core - distribution - access


B.

access - distribution - distribution - access


C.

access - core - access


D.

access -distribution - core - distribution - access


Expert Solution
Questions # 98:

Which WLC management connection type is vulnerable to man-in-the-middle attacks?

Options:

A.

SSH


B.

HTTPS


C.

Telnet


D.

console


Expert Solution
Questions # 99:

Which protocol is used for secure remote CLI access?

Options:

A.

HTTPS


B.

HTTP


C.

Telnet


D.

SSH


Expert Solution
Questions # 100:

What is one reason to implement LAG on a Cisco WLC?

Options:

A.

to increase security and encrypt management frames


B.

to provide link redundancy and load balancing


C.

to allow for stateful and link-state failover


D.

to enable connected switch ports to failover and use different VLANs


Expert Solution
Viewing page 2 out of 8 pages
Viewing questions 51-100 out of questions