Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 6 out of 8 pages
Viewing questions 251-300 out of questions
Questions # 251:

How does authentication differ from authorization?

Options:

A.

Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.


B.

Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access


C.

Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network


D.

Authentication is used to verify a person ' s identity, and authorization is used to create syslog messages for logins.


Expert Solution
Questions # 252:

Which part of the HTTP request is used in REST API basic authentication to carry credentials?

Options:

A.

cookie


B.

content-type


C.

authorization


D.

accept


Expert Solution
Questions # 253:

Question # 253

Refer to the exhibit. OSPF neighbors routers A, B, C, and D are sending a route for 10.227.150.160/27. When the current route for 10.227.150.160/27 becomes unavailable, which cost will router Y use to route traffic to 10.227.150.160/27?

Options:

A.

Cost 20


B.

Cost 30


C.

Cost 40


D.

Cost 50


Expert Solution
Questions # 254:

Refer to the exhibit.

Question # 254

The network engineer is configuring router R2 as a replacement router on the network After the initial configuration is applied it is determined that R2 failed to show R1 as a neighbor Which configuration must be applied to R2 to complete the OSPF configuration and enable it to establish the neighbor relationship with R1?

A)

Question # 254

B)

Question # 254

C)

Question # 254

D)

Question # 254

Options:

A.

Option


B.

Option


C.

Option


D.

Option


Expert Solution
Questions # 255:

Refer to the exhibit.

Question # 255

After configuring a new static route on the CPE. the engineer entered this series of commands to verify that the new configuration is operating normally When is the static default route installed into the routing table?

Options:

A.

when 203 0 113.1 is no longer reachable as a next hop B. when the default route learned over external BGP becomes invalid


B.

when a route to 203.0 113 1 is learned via BGP


C.

when the default route over external BGP changes its next hop


Expert Solution
Questions # 256:

What is a link-local all-nodes IPv6 multicast address?

Options:

A.

ff02:0:0:0:0:0:0:1


B.

2004:31c:73d9:683e:255::


C.

fffe:034:0dd:45d6:789e::


D.

fe80:4433:034:0dd::2


Expert Solution
Questions # 257:

Question # 257

Refer to the exhibit. A static route must be configured on R14 to forward traffic for the 172.21.34.0/25 network that resides on R86. Which command must be used to fulfill the request?

Options:

A.

ip route 172.21.34.0 255.255.255.192 10.73.65.65


B.

ip route 172.21.34.0 255.255.255.0 10.73.65.65


C.

ip route 172.21.34.0 255.255.255.128 10.73.65.66


D.

ip route 172.21.34.0 255.255.128.0 10.73.65.64


Expert Solution
Questions # 258:

What is a characteristic of private IPv4 addressing?

Options:

A.

traverses the Internet when an outbound ACL Is applied


B.

used without allocation from a regional Internet authority


C.

shared address space between an ISP and subscriber


D.

reduces the need for isolated networks


Expert Solution
Questions # 259:

Question # 259

Refer to the exhibit. Of the routes learned with dynamic routing protocols, which has the least preferred metric?

Options:

A.

EIGRP


B.

OSPF


C.

Local


D.

RIP


Expert Solution
Questions # 260:

Which technology is appropriate for communication between an SDN controller and applications running over the network?

Options:

A.

REST API


B.

OpenFlow


C.

Southbound API


D.

NETCONF


Expert Solution
Questions # 261:

Question # 261

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Question # 261


Expert Solution
Questions # 262:

What is a characteristic of a Layer 2 switch?

Options:

A.

Provides a single broadcast domain for all connected devices


B.

Performs packet fragmentation and reassembly


C.

Tracks the number of active TCP connections


D.

Uses the data link layer for communications


Expert Solution
Questions # 263:

Which combination of methods satisfies the minimum security requirements when a new multifactor authentication solution is deployed?

Options:

A.

password of 8 to 15 characters and personal 12-diglt PIN


B.

authorized USB dongle and mobile phone


C.

fingerprint scanning and facial recognition


D.

complex password and time-based one-time password


Expert Solution
Questions # 264:

What are two behaviors of a point-to-point WAN topology? (Choose two.)

Options:

A.

It uses a single router to route traffic between sites.


B.

It leverages a dedicated connection.


C.

It connects remote networks through a single line.


D.

t delivers redundancy between the central office and branch offices.


E.

It provides direct connections between each router in the topology.


Expert Solution
Questions # 265:

Which action implements physical access control as part of the security program of an organization?

Options:

A.

configuring a password for the console port


B.

configuring enable passwords on network devices


C.

backing up syslogs at a remote location


D.

setting up IP cameras to monitor key infrastructure


Expert Solution
Questions # 266:

Which IP address is used when an administrator must open a web-based management session with a lightweight AP?

Options:

A.

WLCIP


B.

gateway IP


C.

autonomous AP IP


D.

ACS IP


Expert Solution
Questions # 267:

What is a characteristic of private IPv4 addressing?

Options:

A.

traverses the Internet when an outbound ACL Is applied


B.

used without allocation from a regional Internet authority


C.

shared address space between an ISP and subscriber


D.

reduces the need for isolated networks


Expert Solution
Questions # 268:

What is the purpose of the ip address dhcp command?

Options:

A.

to configure an Interface as a DHCP server


B.

to configure an interface as a DHCP helper


C.

to configure an interface as a DHCP relay


D.

to configure an interface as a DHCP client


Expert Solution
Questions # 269:

An engineer must configure R1 for a new user account. The account must meet these requirements:

* It must be configured in the local database.

* The username is engineer.

* It must use the strongest password configurable. Which command must the engineer configure on the router?

Options:

A.

R1 (config)# username engineer2 algorithm-type scrypt secret test2021


B.

R1(config)# username engineer2 secret 5 password S1$b1Ju$kZbBS1Pyh4QzwXyZ


C.

R1(config)# username engineer2 privilege 1 password 7 test2021


D.

R1(config)# username englneer2 secret 4 S1Sb1Ju$kZbBS1Pyh4QzwXyZ


Expert Solution
Questions # 270:

Refer to the exhibit.

Question # 270

Which switch becomes the root of a spanning tree for VLAN 20 if all li links are of equal speed?

Question # 270

Options:

A.

SW1


B.

SW2


C.

SW3


D.

SW4


Expert Solution
Questions # 271:

What is an expected outcome when network management automation is deployed?

Options:

A.

A distributed management plane must be used.


B.

Software upgrades are performed from a central controller


C.

Complexity increases when new device configurations are added


D.

Custom applications are needed to configure network devices


Expert Solution
Questions # 272:

Refer to the exhibit.

Question # 272

Which two commands when used together create port channel 10? (Choose two.)

Options:

A.

int range g0/0-1channel-group 10 mode active


B.

int range g0/0-1 chanm.l-group 10 mode desirable


C.

int range g0/0-1channel-group 10 mode passive


D.

int range g0/0-1 channel-group 10 mode auto


E.

int range g0/0-1 channel-group 10 mode on


Expert Solution
Questions # 273:

Refer to the exhibit.

Question # 273

An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?

Options:

A.

Configure the ip dhcp relay information command under interface Gi0/1.


B.

Configure the ip dhcp smart-relay command globally on the router


C.

Configure the ip helper-address 172.16.2.2 command under interface Gi0/0


D.

Configure the ip address dhcp command under interface Gi0/0


Expert Solution
Questions # 274:

Refer to the exhibit.

Question # 274

Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?

Options:

A.

heavy traffic congestion


B.

a duplex incompatibility


C.

a speed conflict


D.

queuing drops


Expert Solution
Questions # 275:

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Question # 275


Expert Solution
Questions # 276:

Refer to the exhibit.

Question # 276

An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0 ' 1 interface for the router to assign a unique 64-brt IPv6 address to Itself?

Options:

A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64


B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64


C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64


D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64


Expert Solution
Questions # 277:

Refer to the exhibit.

Question # 277

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

Options:

A.

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.


B.

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.


C.

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.


D.

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.


Expert Solution
Questions # 278:

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

Options:

A.

interface vlan 2000ipv6 address ffc0:0000:aaaa::1234:2343/64


B.

interface vlan 2000Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64


C.

interface vlan 2000ipv6 address fe80;0000:aaaa::1234:2343/64


D.

interface vlan 2000ipv6 address fd00::1234:2343/64


Expert Solution
Questions # 279:

What is a function of Opportunistic Wireless Encryption in an environment?

Options:

A.

offer compression


B.

increase security by using a WEP connection


C.

provide authentication


D.

protect traffic on open networks


Expert Solution
Questions # 280:

Refer to the exhibit.

Question # 280

Which types of JSON data is shown

Options:

A.

Object


B.

Sequence


C.

String


D.

boolean


Expert Solution
Questions # 281:

Drag and drop the DNS commands from the left onto their effects on the right.

Question # 281


Expert Solution
Questions # 282:

Refer to the exhibit.

Question # 282

The router has been configured with a subnet to accommodate the requirement for 380 users on a subnet. The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

Options:

A.

Subnet: 10.7.54.0Subnet mask: 255.255.254.0Broadcast address: 10.7.54.255Usable IP address range: 10.7.54.1 - 10.7.55.254


B.

Subnet: 10.7.54.0Subnet mask: 255.255.128.0Broadcast address: 10.7.55.255Usable IP address range: 10.7.54.1 - 10.7.55.254


C.

Subnet: 10.7.54.0Subnet mask: 255.255.255.0Broadcast address: 10.7.54.255Usable IP address range: 10.7.54.1 - 10.7.55.254


D.

Subnet: 10.7.54.0Subnet mask: 255.255.254.0Broadcast address: 10.7.55.255Usable IP address range: 10.7.54.1 - 10.7.55.254


Expert Solution
Questions # 283:

What is the RFC 4627 default encoding for JSON text?

Options:

A.

UCS-2


B.

UTF-8


C.

Hex


D.

GB18030


Expert Solution
Questions # 284:

Which two practices are recommended for an acceptable security posture in a network? (Choose two)

Options:

A.

Backup device configurations to encrypted USB drives for secure retrieval


B.

maintain network equipment in a secure location


C.

Use a cryptographic keychain to authenticate to network devices


D.

Place internal email and file servers in a designated DMZ


E.

Disable unused or unnecessary ports, interfaces and services


Expert Solution
Questions # 285:

Which advantage does the network assurance capability of Cisco DNA Center provide over traditional campus management?

Options:

A.

Cisco DNA Center correlates information from different management protocols to obtain insights, and traditional campus management requires manual analysis.


B.

Cisco DNA Center handles management tasks at the controller to reduce the load on infrastructure devices, and traditional campus management uses the data backbone.


C.

Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric and nonfabric devices, and traditional campus management uses CLI exclusively.


D.

Cisco DNA Center automatically compares security postures among network devices, and traditional campus management needs manual comparisons.


Expert Solution
Questions # 286:

Question # 286

Refer to the exhibit. An engineer is asked to confère router R1 so that it forms an OSPF single-area neighbor relationship with R2. Which command sequence must be implemented to configure the router?

Question # 286

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 287:

Question # 287

Refer to the exhibit. How does router R1 handle traffic to the 172.16.1.4/30 subnet?

Options:

A.

It sends all traffic over the path via 172.16.9.5 using 172.16.4.4 as a backup.


B.

It sends all traffic over the path via 172.16.4.4.


C.

It load-balances traffic over 172.16.9.5 and 172.16.4.4.


D.

It sends all traffic over the path via 10.0.1.100


Expert Solution
Questions # 288:

What is the difference between controller-based networks and traditional networks as they relate to control-plane and/or data-plane functions?

Options:

A.

Controller-based networks centralize all important data-plane functions, and traditional networks distribute data-plane functions.


B.

Controller-based networks centralize all important control-plane functions, and traditional networks distribute control-plane functions.


C.

Traditional networks centralize all important control-plane functions, and controller-based networks distribute control-plane functions.


D.

Traditional networks centralize all important data-plane functions, and controller-based networks distribute data-plane functions.


Expert Solution
Questions # 289:

Drag and drop the statement about networking from the left into the Corresponding networking types on the right. Not all statements are used.

Question # 289


Expert Solution
Questions # 290:

What is the difference regarding reliability and communication type between TCP and UDP?

Options:

A.

TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol


B.

TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol


C.

TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connection-oriented protocol


D.

TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connection-oriented protocol


Expert Solution
Questions # 291:

Refer to the exhibit.

Question # 291

If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1?

Options:

A.

DHCP client


B.

access point


C.

router


D.

PC


Expert Solution
Questions # 292:

Refer to the exhibit.

Question # 292

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface ' s configuration?

Options:

A.

Use the Ixml library to parse the data returned by the NETCONF server for the interface ' s configuration.


B.

Create an XML filter as a string and pass it to get_config() method as an argument.


C.

Create a JSON filter as a string and pass it to the get_config() method as an argument.


D.

Use the JSON library to parse the data returned by the NETCONF server for the interface ' s configuration.


Expert Solution
Questions # 293:

Drag and drop the network protocols from the left onto the correct transport services on the right.

Question # 293


Expert Solution
Questions # 294:

An engineer is configuring an encrypted password for the enable command on a router where the local user database has already been configured Drag and drop the configuration commands from the left into the correct sequence on the right Not all commands are used

Question # 294


Expert Solution
Questions # 295:

What is an appropriate use for private IPv4 addressing?

Options:

A.

on the public-facing interface of a firewall


B.

to allow hosts inside to communicate in both directions with hosts outside the organization


C.

on internal hosts that stream data solely to external resources


D.

on hosts that communicates only with other internal hosts


Expert Solution
Questions # 296:

What are two roles of Domain Name Services (DNS)? (Choose Two)

Options:

A.

builds a flat structure of DNS names for more efficient IP operations


B.

encrypts network Traffic as it travels across a WAN by default


C.

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)


D.

enables applications to identify resources by name instead of IP address


E.

allows a single host name to be shared across more than one IP address


Expert Solution
Questions # 297:

Which two outcomes are predictable behaviors for HSRP? (Choose two.)

Options:

A.

The two routers synchronize configurations to provide consistent packet forwarding


B.

The two routers negotiate one router as the active router and the other as the standby router


C.

Each router has a different IP address, both routers act as the default gateway on the LAN, and traffic is load-balanced between them


D.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN


E.

The two routers share the same interface IP address and default gateway traffic is load-balanced between them


Expert Solution
Questions # 298:

What is the purpose of traffic shaping?

Options:

A.

to mitigate delays over slow links


B.

to provide fair queuing for buffered flows


C.

to limit the bandwidth that a flow can use to


D.

be a marking mechanism that identifies different flows


Expert Solution
Questions # 299:

What is a DHCP client?

Options:

A.

a workstation that requests a domain name associated with its IP address


B.

a host that is configured to request an IP address automatically


C.

a server that dynamically assigns IP addresses to hosts.


D.

a router that statically assigns IP addresses to hosts.


Expert Solution
Questions # 300:

Refer to the exhibit.

Question # 300

A router reserved these five routes from different routing information sources.

Which two routes does the router install in its routing table? (Choose two)

Options:

A.

RIP route 10.0.0.0/30


B.

iBGP route 10.0.0.0/30


C.

OSPF route 10.0.0.0/30


D.

EIGRP route 10.0.0.1/32


E.

OSPF route 10.0.0.0/16


Expert Solution
Viewing page 6 out of 8 pages
Viewing questions 251-300 out of questions