Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 6 out of 8 pages
Viewing questions 251-300 out of questions
Questions # 251:

What is an advantage of using SDN versus traditional networking when it comes to security?

Options:

A.

SDN security is managed near the perimeter of the network with firewalls, VPNs, and IPS, and traditional networking security policies are created based on telemetry data.


B.

SDN exposes an API to configure locally per device for security policies, and traditional networking uses northbound API for network admin interface for configuring security policies.


C.

SDN creates a unified control point making security policies consistent across all devices, and traditional networking must be configured device by device, leaving room for error.


D.

SDN devices communicate with each other to establish a security policy, and in traditional networking, devices communicate upstream to a central location to establish a security policy.


Expert Solution
Questions # 252:

Question # 252

Refer to the exhibit.

How does router R1 forward packets destined to 10.0.4.10?

Options:

A.

via 10.0.4.2


B.

via 10.0.0.2


C.

via FastEthernet0/1


D.

via FastEthernet1/1


Expert Solution
Questions # 253:

Which two northbound APIs are found in a software-defined network? (Choose two.)

Options:

A.

OpenFlow


B.

REST


C.

OpFlex


D.

SOAP


E.

NETCONF


Expert Solution
Questions # 254:

Which AP feature provides a captive portal for users to authenticate, register, and accept terms before accessing the internet?

Options:

A.

Whole Home


B.

Hotspot


C.

One-Click


D.

Enhanced Bluetooth


Expert Solution
Questions # 255:

Which header must be included in a REST request from an application that requires JSON-formatted content?

Options:

A.

Content-Type: application/json


B.

Accept-Encoding: application/json


C.

Accept: application/json


D.

Accept-Language: application/json


Expert Solution
Questions # 256:

Question # 256

Refer to the exhibit. All routers In the network are configured. R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which command sequence must be configured on R2 to be elected as the DR in the network?

Question # 256

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 257:

What is the purpose of the service-set identifier?

Options:

A.

It identifies the wired network to which a network device is connected.


B.

It identifies a wireless network for a mobile device to connect.


C.

It identifies the wireless network to which an application must connect.


D.

It identifies the wired network to which a user device is connected.


Expert Solution
Questions # 258:

What is a function of Layer 3 switches?

Options:

A.

They route traffic between devices in different VLANs.


B.

They forward Ethernet frames between VLANs using only MAC addresses.


C.

They move frames between endpoints limited to IP addresses.


D.

They transmit broadcast traffic when operating in Layer 3 mode exclusively.


Expert Solution
Questions # 259:

What is a characteristic of private IPv4 addressing?

Options:

A.

alleviates the shortage of IPv4 addresses


B.

reduces the forwarding table on network routers


C.

enables secure connectivity over the internet


D.

used as the NAT outside global IP address


Expert Solution
Questions # 260:

Question # 260

Refer to the exhibit. How must OSPF be configured on the GigabitEthernet0/0 interface of the neighbor device to achieve the desired neighbor relationship?

Options:

A.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf network point-to-point


B.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf cost 5


C.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf 1 area 2


D.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf priority 1


Expert Solution
Questions # 261:

How does MAC learning function?

Options:

A.

inserts MAC addresses dynamically into the CAM table


B.

restricts ports to a maximum of 10 dynamically-learned addresses


C.

protects against denial of service attacks


D.

rewrites the source and destination MAC address


Expert Solution
Questions # 262:

Which switch port configuration must be configured when connected to an AP running in FlexConnect mode, and the WLANs use flex local switching?

Options:

A.

access port with one VLAN


B.

trunk port with pruned VLANs


C.

Layer 3 port with an IP address


D.

tagged port with MAC Filtering enabled


Expert Solution
Questions # 263:

Which action prevents debug messages from being sent via syslog while allowing other messages when an abnormally high number of syslog messages are generated by a device with the debug process turned on?

Options:

A.

Use an access list to filter out the syslog messages.


B.

Turn off the logging monitor in global configuration mode.


C.

Disable logging to the console.


D.

Set the logging trap severity level to informational.


Expert Solution
Questions # 264:

What differentiates the TCP and UDP protocols?

Options:

A.

TCP tracks segments being transmitted or received by assigning segment numbers, and UDP adjusts data flow according to network conditions.


B.

TCP establishes a connection with the device on the other end before transferring, and UDP transfers without establishing a connection.


C.

TCP sends data at a constant rate with error checking on upper protocol layers, and UDP provides error-checking and sequencing.


D.

TCP immediately transmits data without waiting for a handshake, and UDP awaits a response from the receiver before sending additional data.


Expert Solution
Questions # 265:

How does automation affect network management processes?

Options:

A.

It interoperates with ISE to define and manage patch and update schedules.


B.

It performs configuration updates based on user profiles.


C.

It improves the efficiency of system lifecycle management.


D.

It provides a reactive support model.


Expert Solution
Questions # 266:

A new DHCP server has been deployed in a corporate environment with lease time set to eight hours. Which CMD command on a Windows-based device allows the engineer to verify the DHCP lease expiration?

Options:

A.

ipconfig /renew


B.

ipconfig


C.

ipconfig /all


D.

ipconfig /displaydns


Expert Solution
Questions # 267:

Question # 267

Refer to the exhibit. Which interface does a packet take to reach the host address of 192.168.18.16?

Options:

A.

GigabitEthernet1/0


B.

GigabitEthernet0/0


C.

GigabitEthernet2/0


D.

Null0


Expert Solution
Questions # 268:

What is a reason to implement HSRP on a network?

Options:

A.

to Identify the closest hop to the default gateway In a LAN network


B.

to provide load balancing over multiple gateways in a LAN network


C.

to optimally route traffic based on the forwarding capacity of the edge routing devices in the LAN network


D.

to ensure that user traffic in a LAN rapidly recovers from the failure of an edge routing device


Expert Solution
Questions # 269:

Question # 269

Question # 269

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.


Expert Solution
Questions # 270:

What is the function of the controller in a software-defined network?

Options:

A.

multicast replication at the hardware level


B.

fragmenting and reassembling packets


C.

making routing decisions


D.

forwarding packets


Expert Solution
Questions # 271:

Refer to the exhibit.

Question # 271

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

Options:

A.

Select the WPA Policy option with the CCKM option.


B.

Disable AES encryption.


C.

Enable Fast Transition and select the FT 802.1x option.


D.

Enable Fast Transition and select the FT PSK option.


Expert Solution
Questions # 272:

Refer to the exhibit.

Question # 272

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

Question # 272

B)

Question # 272

C)

Question # 272

D)

Question # 272

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 273:

A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network. Which type of IPv6 address must the engineer assign?

Options:

A.

unique local address


B.

link-local address


C.

aggregatable global address


D.

IPv4-compatible IPv6 address


Expert Solution
Questions # 274:

Refer to the exhibit.

Question # 274

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

Options:

A.

interface FastEthernet0/0ip helper-address 10.0.1.1iaccess-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1


B.

interface FastEthernot0/1ip helper-address 10.0.1.1!access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1


C.

interface FastEthernetO/0ip helper-address 10.0.1.1Iaccess-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps


D.

interface FastEthernet0/1ip helper-address 10.0.1.1!access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1


Expert Solution
Questions # 275:

Refer to the exhibit.

Question # 275

What is the prefix length for the route that router1 will use to reach host A?

Options:

A.

/25


B.

/27


C.

/28


D.

/29


Expert Solution
Questions # 276:

Refer to the exhibit.

Question # 276

A network engineer configures the Cisco WLC to authenticate local wireless clients against a RADIUS server Which task must be performed to complete the process?

Options:

A.

Change the Server Status to Disabled


B.

Select Enable next to Management


C.

Select Enable next to Network User


D.

Change the Support for CoA to Enabled.


Expert Solution
Questions # 277:

Refer to the exhibit.

Question # 277

A network administrator must permit traffic from the 10.10.0.0/24 subnet to the WAN on interlace Seria10. What is the effect of the configuration as the administrator applies the command?

Options:

A.

The permit command fails and returns an error code.


B.

The router accepts all incoming traffic to Seria10 with the last octet of the source IP set to 0.


C.

The sourced traffic from IP range 10.0.0.0 -10.0.0.255 is allowed on Seria10.


D.

The router fails to apply the access list to the interface.


Expert Solution
Questions # 278:

Refer to the exhibit.

PC A and the file server. Which commend must be configured on switch A to prevent interruption of other communications?

Question # 278

Options:

A.

switch port trunk allowed vlan 12


B.

switchport trunk allowed vlan none


C.

switchport trunk allowed vlan add 13


D.

switch port trunk allowed vlan remove 10-11


Expert Solution
Questions # 279:

What does WPA3 provide in wireless networking?

Options:

A.

safeguards against brute force attacks with SAE


B.

optional Protected Management Frame negotiation


C.

backward compatibility with WPAand WPA2


D.

increased security and requirement of a complex configuration


Expert Solution
Questions # 280:

Question # 280

Refer to the exhibit. An engineer is building a new Layer 2 LACP EtherChannel between SW1 and SW2. and they executed the given show commands to verify the work Which additional task must be performed so that the switches successfully bundle the second member in the LACP port-channel?

Options:

A.

Configure the switchport trunk allowed vlan 300 command on SW1 port-channel 1


B.

Configure the switchport trunk allowed vlan 300 command on interface Fa0/2 on SW1.


C.

Configure the switchport trunk allowtd vlan add 300 command on interface FaO 2 on SW2.


D.

Configure the switchport trunk allowtd vlan add 300 command on SW1 port-channel 1


Expert Solution
Questions # 281:

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Question # 281


Expert Solution
Questions # 282:

Question # 282

Refer to the exhibit. An engineer must translate the PC1 IP address to 10.199.77.100 and permit PC1 to ping the loopback 0 on router R2. What command set must be used?

A)

Question # 282

B)

Question # 282

C)

Question # 282

D)

Question # 282

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 283:

What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model?

Options:

A.

access - core - distribution - access


B.

access - distribution - distribution - access


C.

access - core - access


D.

access -distribution - core - distribution - access


Expert Solution
Questions # 284:

The service password-encryption command is entered on a router. What is the effect of this configuration?

Options:

A.

restricts unauthorized users from viewing clear-text passwords in the running configuration


B.

encrypts the password exchange when a VPN tunnel is established


C.

prevents network administrators from configuring clear-text passwords


D.

protects the VLAN database from unauthorized PC connections on the switch


Expert Solution
Questions # 285:

Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and Provisioning of Wireless Access Points (CAPWAP) protocol?

Options:

A.

bridge


B.

route


C.

autonomous


D.

lightweight


Expert Solution
Questions # 286:

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?

Options:

A.

OpenFlow


B.

Java


C.

REST


D.

XML


Expert Solution
Questions # 287:

When a WLAN with WPA2 PSK is configured in the Wireless LAN Controller GUI which format is supported?

Options:

A.

Unicode


B.

base64


C.

decimal


D.

ASCII


Expert Solution
Questions # 288:

What is the primary different between AAA authentication and authorization?

Options:

A.

Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.


B.

Authentication identifies a user who is attempting to access a system, and authorization validates the users password


C.

Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform.


D.

Authentication controls the system processes a user can access and authorization logs the activities the user initiates


Expert Solution
Questions # 289:

Refer to the exhibit.

Question # 289

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Options:

A.

passive


B.

mode on


C.

auto


D.

active


Expert Solution
Questions # 290:

Drag and drop the AAA lerms from the left onto the descriptions on the right.

Question # 290


Expert Solution
Questions # 291:

Refer to the exhibit.

Question # 291

The default-information originate command is configured under the R1 OSPF configuration After testing workstations on VLAN 20 at Site B cannot reach a DNS server on the Internet Which action corrects the configuration issue?

Options:

A.

Add the default-information originate command onR2


B.

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1


C.

Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2


D.

Add the always keyword to the default-information originate command on R1


Expert Solution
Questions # 292:

Question # 292

Refer to the exhibit. Which type of JSON data is shown?

Options:

A.

sequence


B.

string


C.

object


D.

Boolean


Expert Solution
Questions # 293:

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

Options:

A.

when the sending device waits 15 seconds before sending the frame again


B.

when the cable length limits are exceeded


C.

when one side of the connection is configured for half-duplex


D.

when Carrier Sense Multiple Access/Collision Detection is used


E.

when a collision occurs after the 32nd byte of a frame has been transmitted


Expert Solution
Questions # 294:

Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right

Question # 294


Expert Solution
Questions # 295:

What is a similarity between OM3 and OM4 fiber optic cable?

Options:

A.

Both have a 50 micron core diameter


B.

Both have a 9 micron core diameter


C.

Both have a 62.5 micron core diameter


D.

Both have a 100 micron core diameter


Expert Solution
Questions # 296:

Refer to the exhibit.

Question # 296

An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?

Question # 296

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 297:

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

Options:

A.

CPU ACL


B.

TACACS


C.

Flex ACL


D.

RADIUS


Expert Solution
Questions # 298:

Refer to the exhibit.

Question # 298

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

Question # 298

B)

Question # 298

C)

Question # 298

D)

Question # 298

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 299:

Refer to the exhibit.

Question # 299

Between which zones do wireless users expect to experience intermittent connectivity?

Options:

A.

between zones 1 and 2


B.

between zones 2 and 5


C.

between zones 3 and 4


D.

between zones 3 and 6


Expert Solution
Questions # 300:

Drag and drop the functions from the left onto the correct network components on the right

Question # 300


Expert Solution
Viewing page 6 out of 8 pages
Viewing questions 251-300 out of questions