Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions
Questions # 81:

How does automation leverage data models to reduce the operational complexity of a managed network?

Options:

A.

Reduces the response time for specific requests to devices with many interfaces


B.

Categorizes traffic and provides insights


C.

Allows the controller to be vendor-agnostic


D.

Streamlines monitoring using SNMP and other polling tools


Expert Solution
Questions # 82:

What is a characteristic of a Layer 2 switch?

Options:

A.

Uses routers to create collision domains


B.

Responsible for sending data in a particular sequence


C.

Avoids MAC address storage for faster transmission


D.

Uses the data link layer for communications


Expert Solution
Questions # 83:

Question # 83

Refer to the exhibit. The routers R1-LAB and R2-LAB are configured with link-local addresses. What command must be applied to interface Gi0/0 on R1-LAB for an automated address self-assignment on the IPv6 network?

Options:

A.

ipv6 address 2001:db8:1:0FFA:0::/64


B.

ipv6 address 2001:db8:0:0FFA::1/64


C.

ipv6 address 2001:db8:0:0FFA::/64 eui-64


D.

ipv6 address 2001:db8:0:0FFA::/64 anycast


Expert Solution
Questions # 84:

What is the maximum length of characters used in an SSID?

Options:

A.

16


B.

32


C.

48


D.

64


Expert Solution
Questions # 85:

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Question # 85Question # 85


Expert Solution
Questions # 86:

Question # 86

Refer to the exhibit.

Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?

Options:

A.

Disable WPA Policy and WPA Encryption and then enable PSK using ASCII.


B.

Enable PSK and FT PSK and then disable WPA Policy.


C.

Disable WPA Encryption and then enable FT PSK.


D.

Enable PSK using Hex format and then disable WPA Policy.


Expert Solution
Questions # 87:

Question # 87

Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:

    Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.

    Wireless clients on this WLAN must be able to apply VLAN settings from RADIUS attributes.

Which two actions meet these requirements? (Choose two.)

Options:

A.

Enable the Aironet IE option.


B.

Enable the Coverage Hole Detection option.


C.

Set the MFP Client Protection option to Required


D.

Enable the client band select option.


E.

Enable the allow AAA Override option


Expert Solution
Questions # 88:

An engineer requires a switch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

Options:

A.

switchport mode dynamic desirable


B.

switchport mode trunk


C.

switchport nonegotiate


D.

switchport mode dynamic auto


Expert Solution
Questions # 89:

Question # 89

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Question # 89


Expert Solution
Questions # 90:

What is represented by the word "switch" within this JSON schema?

Question # 90

Options:

A.

array


B.

value


C.

key


D.

object


Expert Solution
Questions # 91:

Which two QoS tools provide congestion management? (Choose two.)

Options:

A.

PBR


B.

FRTS


C.

PQ


D.

CBWFQ


E.

CAR


Expert Solution
Questions # 92:

Why would a network administrator implement the HSRP protocol?

Options:

A.

To provide network redundancy in the case of a router failure


B.

To use an open standard protocol that is configured on Cisco and third-party routers


C.

To allow hosts in a network to use the same default gateway virtual IP when load-balancing traffic


D.

To allow clients to be configured with multiple default gateway IPs


Expert Solution
Questions # 93:

Where are the real-time control functions processed in a split MAC architecture?

Options:

A.

Centralized cloud management platform


B.

Central WLC


C.

Individual AP


D.

Client device


Expert Solution
Questions # 94:

What is the function of generative AI in network operations?

Options:

A.

It disables unused services.


B.

It deploys network firmware updates.


C.

It creates synthetic network configurations.


D.

It computes optimal data storage solutions.


Expert Solution
Questions # 95:

An organization developed new security policies and decided to print the policies and distribute them to all personnel so that employees review and apply the policies. Which element of a security program is the organization implementing?

Options:

A.

Asset identification


B.

User training


C.

Physical access control


D.

Vulnerability control


Expert Solution
Questions # 96:

Question # 96

Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process.

Which command must be configured on switch SW2’s Gi0/1-2 interfaces to establish the channel to SW1?

Options:

A.

channel-group 1 mode desirable


B.

channel-group 1 mode on


C.

channel-group 1 mode auto


D.

channel-group 1 mode active


Expert Solution
Questions # 97:

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4's WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4's LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Question # 97


Expert Solution
Questions # 98:

What is the difference between the TCP and UDP protocols?

Options:

A.

TCP ensures ordered, reliable data delivery, and UDP offers low latency and high throughput.


B.

TCP is used for transmitting data over the internet, and UDP is used for transmitting data over a local network.


C.

TCP manages multicast and broadcast data transfers, and UDP only handles unicast communications.


D.

TCP is used to ensure data integrity in a file transfer, and UDP is used to broadcast a message to multiple recipients.


Expert Solution
Questions # 99:

What is an advantage of using SDN versus traditional networking when it comes to security?

Options:

A.

SDN security is managed near the perimeter of the network with firewalls, VPNs, and IPS, and traditional networking security policies are created based on telemetry data.


B.

SDN exposes an API to configure locally per device for security policies, and traditional networking uses northbound API for network admin interface for configuring security policies.


C.

SDN creates a unified control point making security policies consistent across all devices, and traditional networking must be configured device by device, leaving room for error.


D.

SDN devices communicate with each other to establish a security policy, and in traditional networking, devices communicate upstream to a central location to establish a security policy.


Expert Solution
Questions # 100:

Which statement describes virtualization on containers?

Options:

A.

It is a type of operating system virtualization that allows the host operating system to control the different CPU memory processes.


B.

It emulates a physical computer and enables multiple machines to run with many operating systems on a physical machine.


C.

It separates virtual machines from each other and allocates memory, processors, and storage to compute.


D.

It contains a guest operating system and virtual partition of hardware for OS and requires application libraries.


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions