Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 151-200 out of questions
Questions # 151:

How is Al used to identify issues within network traffic?

Options:

A.

II exclusively predicts device malfunctions.


B.

It enhances data packet delivery speeds.


C.

It simplifies traffic route mapping.


D.

It analyzes patterns for anomaly detection.


Expert Solution
Questions # 152:

Which two principles must be considered when using per-hop behavior in QoS? (Choose two.)

Options:

A.

Policing is not supported on subinterfaces.


B.

Shaping and rate limiting have the same effect.


C.

Shaping drops excessive traffic without adding traffic delay.


D.

Shaping levels out traffic bursts by delaying excess traffic.


E.

Policing is performed in the inbound and outbound directions.


Expert Solution
Questions # 153:

Question # 153

Refer to the exhibit. What is the value of the administrative distance for the default gateway?

Options:

A.

10


B.

0


C.

1


D.

110


Expert Solution
Questions # 154:

Question # 154

Refer to the exhibit. A network engineer must configure the CPE router to allow computers in the 172.20.1.0/24 network to obtain their IP configurations from the central DHCP server. Which configuration must the engineer apply to the CPE?

Options:

A.

interface GigabitEthernet0/1ip helper-address 172.20.254.1


B.

interface GigabitEthernet0/0ip helper-address 172.20.1.1


C.

interface GigabitEthernet0/0ip helper-address 172.20.255.1


D.

interface GigabitEthernet0/ip helper-address 172.20.255.11


Expert Solution
Questions # 155:

Question # 155

Refer to the exhibit. The Wi-Fi SSID " Office_WLAN " has Layer 2 Security configured with MAC filtering enabled. What additional security is provided by this specific feature?

Options:

A.

There is an extra layer of security that ensures only authorized devices with known MAC addresses connect to the network


B.

There is strong mutual authentication used between NAC and the network devices using X.509 standard


C.

All data frames exchanged between the client and the access point are encrypted


D.

There is a Galcis cache algorithm configured that provides strong encryption and authentication


Expert Solution
Questions # 156:

Which statement describes virtual machines?

Options:

A.

They include a guest OS and the service.


B.

They enable the network to become agile and hardware-centric.


C.

They use a supervisor to provide management for services.


D.

They facilitate local management of infrastructure devices.


Expert Solution
Questions # 157:

Question # 157

Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process.

Which command must be configured on switch SW2’s Gi0/1-2 interfaces to establish the channel to SW1?

Options:

A.

channel-group 1 mode desirable


B.

channel-group 1 mode on


C.

channel-group 1 mode auto


D.

channel-group 1 mode active


Expert Solution
Questions # 158:

Question # 158

Refer to the exhibit. Which interface does a packet take to reach the host address of 192.168.18.16?

Options:

A.

GigabitEthernet1/0


B.

GigabitEthernet0/0


C.

GigabitEthernet2/0


D.

Null0


Expert Solution
Questions # 159:

What is the function of generative AI in network operations?

Options:

A.

It disables unused services.


B.

It deploys network firmware updates.


C.

It creates synthetic network configurations.


D.

It computes optimal data storage solutions.


Expert Solution
Questions # 160:

What is represented by the word " switch " within this JSON schema?

Question # 160

Options:

A.

array


B.

value


C.

key


D.

object


Expert Solution
Questions # 161:

Drag and drop the AAA features from the left onto the corresponding AAA security services on the right Not all options are used.

Question # 161


Expert Solution
Questions # 162:

What is represented by the word " LB13 " within this JSON schema?

Question # 162

Options:

A.

value


B.

object


C.

array


D.

key


Expert Solution
Questions # 163:

Question # 163

Refer to the exhibit. Configurations for the switch and PCs are complete.

Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?

Options:

A.

interface GigabitEthernet0/0 ip address 10.10.2.10 255.255.252.0


B.

interface GigabitEthernet0/0.3 encapsulation dot1Q 3 native ip address 10.10.2.10 255.255.252.0


C.

interface GigabitEthernet0/0.10 encapsulation dot1Q 3


D.

interface GigabitEthernet0/0.3 encapsulation dot1Q 10 ip address 10.10.2.10 255.255.252.0


Expert Solution
Questions # 164:

Question # 164

Refer to the exhibit. What is represented in line 2 within this JSON schema?

Options:

A.

key


B.

value


C.

object


D.

array


Expert Solution
Questions # 165:

What is a characteristic of an SSID in wireless networks?

Options:

A.

provides protection against spyware


B.

eliminates network piggybacking


C.

associates a name to a wireless network


D.

allows easy file sharing between endpoints


Expert Solution
Questions # 166:

Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?

Options:

A.

LAG


B.

default


C.

trunk


D.

Bopess


Expert Solution
Questions # 167:

Refer to the exhibit.

Question # 167

What is the metric for the route to the 192.168.10.33 host?

Options:

A.

84


B.

110


C.

192


D.

193


Expert Solution
Questions # 168:

Refer to the exhibit.

Question # 168

What is the correct next hop for router R1 to reach IP addresses 192.168.2.86 and 10.20.1.50?

Options:

A.

172.16.1.4


B.

172.16.1.1


C.

172.16.1.2


D.

172.16.1.3


Expert Solution
Questions # 169:

Drag and drop the IPv6 address from the left onto the type on the right.

Question # 169


Expert Solution
Questions # 170:

Question # 170

Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?

Options:

A.

router D


B.

router B


C.

router C


D.

router A


Expert Solution
Questions # 171:

Question # 171

Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?

Options:

A.

router D


B.

router B


C.

router C


D.

router A


Expert Solution
Questions # 172:

Question # 172

Refer to the exhibit. A network engineer is configuring a WLAN to use a WPA2 PSK and allow only specific clients to join. Which two actions must be taken to complete the process? (Choose two)

Options:

A.

Enable the MAC Filtering option


B.

Enable the OSEN Policy option


C.

Enable the CCKM option for Authentication Key Management


D.

Enable the WPA2 Policy option


E.

Enable the 802.1X option for Authentication Key Management


Expert Solution
Questions # 173:

Which interface is used to send traffic to the destination network?

O 10.76.170 161/26 |110/102] via FO/17

O 10.76.170 161/26[110/27e31] via FO/2 0

R 10.76.170.161/261120/15] via FO/8

R 10.76.170.161/26 [120/10] via FO/12

Options:

A.

F0/8


B.

FO/20


C.

FO/12


D.

FO/17


Expert Solution
Questions # 174:

Drag and drop the IPv6 address from the left onto the type on the right.

Question # 174


Expert Solution
Questions # 175:

Question # 175

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?

Options:

A.

ip route 10.0.2.0 255.255.255.240 10.0.0.6 91


B.

ip route 10.0.2.0 255.255.255.248 10.0.0.6 91


C.

ip route 10.0.2.0 255.255.255.248 null0 93


D.

ip route 10.0.2.0 255.255.255.240 10.0.0.7 92


Expert Solution
Questions # 176:

How are API keys used to enforce rate limiting?

Options:

A.

To define the network path the API request should take


B.

To uniquely identify each client application


C.

To specify the type of data format the client prefers to receive


D.

To encrypt data sent in the API request


Expert Solution
Questions # 177:

An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?

Options:

A.

255.255.255.224


B.

255.255.255.248


C.

255.255.255.0


D.

255.255.255.252


Expert Solution
Questions # 178:

Question # 178

Refer to the exhibit. Which routes are configured with their default administrative distances?

Options:

A.

Local


B.

EIGRP


C.

RIP


D.

OSPF


Expert Solution
Questions # 179:

Which syslog message logging level displays interface line protocol up/down events?

Options:

A.

Informational


B.

debugging


C.

alerts


D.

notifications


Expert Solution
Questions # 180:

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4 ' s WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4 ' s LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Question # 180


Expert Solution
Questions # 181:

Question # 181

Refer to the exhibit. Configurations for the switch and PCs are complete.

Which configuration must be applied so that VLANs 2 and 3 communicate back and forth?

Options:

A.

interface GigabitEthernet0/0 ip address 10.10.2.10 255.255.252.0


B.

interface GigabitEthernet0/0.3 encapsulation dot1Q 3 native ip address 10.10.2.10 255.255.252.0


C.

interface GigabitEthernet0/0.10 encapsulation dot1Q 3


D.

interface GigabitEthernet0/0.3 encapsulation dot1Q 10 ip address 10.10.2.10 255.255.252.0


Expert Solution
Questions # 182:

Aswitch receives a frame with the destination MAC address 3C:5D: 7E:9F: 1A:2B.

Switch# show ethernet-frame-and-mac-address-table

Question # 182

How does the switch handle the frame?

Options:

A.

It ages out the frame until the MAC address becomes known.


B.

It drops the frame to avoid unnecessary network congestion.


C.

It switches the frame to a predetermined port based on settings.


D.

It floods the frame to all ports except the incoming port.


Expert Solution
Questions # 183:

Question # 183

Refer to the exhibit. VLAN 23 is being implemented between SW1 and SW2. The command show interface ethernet0/0 switchport has been issued on SW1. Ethernet0/0 on SW1 is the uplink to SW2. Which command when entered on the uplink interface allows PC 1 and PC 2 to communicate without impact to the communication between PC 11 and PC 12?

Options:

A.

switchport trunk allowed vlan 2-1001


B.

switchport trunk allowed vlan add 23


C.

switchport trunk allowed vlan 23


D.

switchport trunk allowed vlan 22-23


Expert Solution
Questions # 184:

When an access point is seeking to join wireless LAN controller, which message is sent to the AP- Manager interface?

Options:

A.

Discovery response


B.

DHCP request


C.

DHCP discover


D.

Discovery request


Expert Solution
Questions # 185:

A packet from a company s branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes: 172. 31.0 .0/16.72.31.0.0724. and 172.31 0 0/25. How does the router handle the packet?

Options:

A.

It sends the traffic via prefix 172.31.0.0/16


B.

It sends the traffic via the default gateway 0.0.0.070.


C.

It sends the traffic via prefix 172.31.0.0/24


D.

It sends the traffic via prefix 172.31.0.0/25


Expert Solution
Questions # 186:

What are two differences between WPA2 and WPA3 wireless security? (Choose two.)

Options:

A.

WPA3 um AES for stronger protection than WPA2 which uses SAE


B.

WPA2 uses 1 M-bit key encryption and WPA3 requires 256-brt key encryption


C.

WPA3 uses AES for stronger protection than WPA2 which uses TKIP WPA3 uses


D.

SAE tor stronger protection than WPA2 which uses AES


E.

WPA2 uses 12B-M key encryption and WPA3 supports 128 bit and 192 bit key encryption


Expert Solution
Questions # 187:

Refer to the exhibit.

Question # 187

For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:

• Disable all neighbor discovery methods on R5 interface GiO/1.

• Permit neighbor discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

Question # 187

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 188:

How does IPsec provide secure networking for applications within an organization?

Options:

A.

It takes advantage of FTP to secure file transfers between nodes on the network.


B.

It provides GRE tunnels to transmit traffic securely between network nodes.


C.

It enables sets of security associations between peers.


D.

It leverages TFTP providing secure file transfers among peers on the network.


Expert Solution
Questions # 189:

How do TCP and UDP fit into a query-response model?

Options:

A.

TCP establishes a connection prior to sending data, and UDP sends immediately.


B.

TCP uses error detection for packets, and UDP uses error recovery.


C.

TCP avoids using sequencing, and UDP avoids using acknowledgments.


D.

TCP encourages out-of-order packet delivery, and UDP prevents re-ordering.


Expert Solution
Questions # 190:

What are two examples of multifactor authentication? (Choose two.)

Options:

A.

single sign-on


B.

unique user knowledge


C.

passwords that expire


D.

soft tokens


E.

shared password responsibility


Expert Solution
Questions # 191:

Question # 191

Refer to the exhibit. An engineer configured the New York router with static routes that point to the Atlanta and Washington sites. Which command must be configured on the Atlanta and Washington routers so that both sites are able to reach the Lo2 interface on the New York router?

Options:

A.

ipv6 route ::/0 Serial 0/0/0


B.

ipv6 route 0.0.0.0 0.0.0.0 Serial 0/0/0


C.

ipv6 route ::/0 2000::2


D.

ipv6 route ::/0 Serial 0/0/1


Expert Solution
Questions # 192:

Drag and drop the characteristics of device-management technologies from the left onto the corresponding deployment types on the right.

Question # 192


Expert Solution
Questions # 193:

Refer to the exhibit.

Question # 193

How many objects are present in the given JSON-encoded data?

Options:

A.

one


B.

four


C.

seven


D.

nine


Expert Solution
Questions # 194:

In a cloud-computing environment what is rapid elasticity?

Options:

A.

control and monitoring of resource consumption by the tenant


B.

automatic adjustment of capacity based on need


C.

pooling resources in a multitenant model based on need


D.

self-service of computing resources by the tenant


Expert Solution
Questions # 195:

Which two features introduced in SNMPv2 provides the ability to retrieve large amounts of data in one request

Options:

A.

Get


B.

GetNext


C.

Set


D.

GetBulk


E.

Inform


Expert Solution
Questions # 196:

When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format?

Options:

A.

6


B.

8


C.

12


D.

18


Expert Solution
Questions # 197:

Refer to the exhibit.

Traffic from R1 to the 10.10.2.0/24 subnet uses 192.168.1.2 as its next hop. An network engineer wants to update the R1 configuration so that traffic with destination 10.10.2.1 passes through router R3, and all other traffic to the 10.10.20/24 subnet passes through r2. Which command must be used?

Question # 197

Options:

A.

Ip route 10.10.2.1 255.255.255.255 192.168.1.4 115


B.

Ip route 10.10.2.0 255.255.255.0 192.168.1.4 100


C.

Ip route 10.10.2.0 255.255.255.0 192.168.1.4 115


D.

Ip route 10.10.2.1 255.255.255.255 192.168.1.4 100


Expert Solution
Questions # 198:

Which protocol should be used to transfer large files on a company intranet that allows TCP ports 20 and 21 through the firewall?

Options:

A.

REST API


B.

FTP


C.

SMTP


D.

TFTP


Expert Solution
Questions # 199:

An engineer is configuring switch SW1 to act an NTP server when all upstream NTP server connectivity fails. Which configuration must be used?

A)

Question # 199

B)

Question # 199

C)

Question # 199

D)

Question # 199

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 200:

Drag and drop the steps in a standard DNS lookup operation from the left into the order on the right.

Question # 200


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 151-200 out of questions