Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 301-350 out of questions
Questions # 301:

What is the difference between an IPv6 link-local address and a unique local address?

Options:

A.

The scope of an IPv6 link-local address is limited to a loopback address, and an IPv6 unique local address is limited to a directly attached interface.


B.

The scope of an IPv6 link-local address can be used throughout a company site or network, but an IPv6 unique local address is limited to a loopback address.


C.

The scope of an IPv6 link-local address is global, but the scope of an IPv6 unique local address is limited to a loopback address.


D.

The scope of an IPv6 link-local address is limited to a directly attached interface, but an IPv6 unique local address is used throughout a company site or network.


Expert Solution
Questions # 302:

What does physical access control regulate?

Options:

A.

access to spec fie networks based on business function


B.

access to servers to prevent malicious activity


C.

access to computer networks and file systems


D.

access to networking equipment and facilities


Expert Solution
Questions # 303:

Refer to the exhibit.

Question # 303

Only four switches are participating in the VLAN spanning-tree process.

Branch-1 priority 614440

Branch-2: priority 39082416

Branch-3: priority 0

Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

Options:

A.

Branch-1


B.

Branch-2


C.

Branch-3


D.

Branch-4


Expert Solution
Questions # 304:

Which feature of Digest Authentication prevents credentials from being sent in plaintext?

Options:

A.

SSL/TLS encryption


B.

Challenge-response mechanism


C.

Token-based authorization


D.

Public key infrastructure


Expert Solution
Questions # 305:

Which architecture is best for small offices with minimal wireless needs and no central management?

Options:

A.

cloud-based AP


B.

split MAC


C.

autonomous AP


D.

mesh network


Expert Solution
Questions # 306:

Refer to the exhibit.

Question # 306

The network engineer is configuring a new WLAN and is told to use a static password for authentication instead of the RADIUS servers. Which additional set of tasks must the engineer perform to complete the configuration?

Options:

A.

Crable PSKEnable iod 1s


B.

Select WPA2 PolicyDisable PMFEnable PSK


C.

Select WPA PolicyEnable PSK


D.

Select WPA PolicySelect WRAS Policy


Expert Solution
Questions # 307:

Refer to the exhibit.

Question # 307

Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.

Which command must be used to configure the route?

Options:

A.

ip route 10.0.3.0 0.255255.255 10.0.4.2


B.

route add 10.0.3.0 mask 255.255.255.0 10.0.4.3


C.

Ip route 10.0.3.0 255.255.255.0 10.0.4.3


D.

route add 10.0.3.0 0.255.255.255 10.0.4.2


Expert Solution
Questions # 308:

Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right

Question # 308


Expert Solution
Questions # 309:

Which technology allows for logical Layer 3 separation on physical network equipment?

Options:

A.

Virtual Route Forwarding


B.

Virtual Switch System


C.

IPsec Transport Mode


D.

Time Division Multiplexer


Expert Solution
Questions # 310:

How does MAC learning function?

Options:

A.

Enabled by default on all VLANs and interfaces


B.

Forwards frames to a neighbor port using CDP


C.

Overwrites the known source MAC address in the address table


D.

Protects against denial of service attacks


Expert Solution
Questions # 311:

Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right.

Question # 311


Expert Solution
Questions # 312:

Refer to the exhibit.

Question # 312

Which command must be issued to enable a floating static default route on router A?

Options:

A.

lp route 0.0.0.0 0.0.0.0 192.168.1.2


B.

ip default-gateway 192.168.2.1


C.

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10


D.

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10


Expert Solution
Questions # 313:

Which two network actions occur within the data plane? (Choose two.)

Options:

A.

Add or remove an 802.1Q trunking header.


B.

Make a configuration change from an incoming NETCONF RPC.


C.

Run routing protocols.


D.

Match the destination MAC address to the MAC address table.


E.

Reply to an incoming ICMP echo request.


Expert Solution
Questions # 314:

Question # 314

Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks must the engineer perform to complete the process? (Choose two.)

Options:

A.

Select the 802.1 x option for Auth Key Management.


B.

Select the WPA Policy option.


C.

Select the PSK option for Auth Key Management.


D.

Select the AES option for Auth Key Management.


E.

Select the AES (CCMP128) option for WPA2/WPA3 Encryption.


Expert Solution
Questions # 315:

What is one reason to implement LAG on a Cisco WLC?

Options:

A.

to increase security and encrypt management frames


B.

to provide link redundancy and load balancing


C.

to allow for stateful and link-state failover


D.

to enable connected switch ports to failover and use different VLANs


Expert Solution
Questions # 316:

Refer to the exhibit.

Question # 316

Which command configures OSPF on the point-to-point link between routers R1 and R2?

Options:

A.

router-id 10.0.0.15


B.

neighbor 10.1.2.0 cost 180


C.

ipospf priority 100


D.

network 10.0.0.0 0.0.0.255 area 0


Expert Solution
Questions # 317:

Refer to the exhibit.

Question # 317

Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?

Options:

A.

GigabitEthernet0/0


B.

GigabltEthornet0/1


C.

GigabitEthernet0/2


D.

GigabitEthernet0/3


Expert Solution
Questions # 318:

Refer to the exhibit.

Question # 318

Which two commands when used together create port channel 10? (Choose two.)

Options:

A.

int range g0/0-1channel-group 10 mode active


B.

int range g0/0-1 chanm.l-group 10 mode desirable


C.

int range g0/0-1channel-group 10 mode passive


D.

int range g0/0-1 channel-group 10 mode auto


E.

int range g0/0-1 channel-group 10 mode on


Expert Solution
Questions # 319:

What does the term "spirt MAC” refer to in a wireless architecture?

Options:

A.

divides data link layer functions between the AP and WLC


B.

combines the management and control functions from the data-forwarding functions


C.

uses different MAC addresses for 2.4 GHz and 5 GHz bands on the same AP


D.

leverages two APs to handle control and data traffic


Expert Solution
Questions # 320:

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

Question # 320


Expert Solution
Questions # 321:

Refer to the exhibit.

Question # 321

An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration accomplishes this task?

Question # 321

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 322:

Which two outcomes are predictable behaviors for HSRP? (Choose two)

Options:

A.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.


B.

The two routers negotiate one router as the active router and the other as the standby router


C.

Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.D The two routers synchronize configurations to provide consistent packet forwarding


D.

The two routed share the same IP address, and default gateway traffic is load-balanced between them


Expert Solution
Questions # 323:

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

Options:

A.

DHCP


B.

STP


C.

SNMP


D.

DNS


Expert Solution
Questions # 324:

How does automation leverage data models to reduce the operational complexity of a managed network?

Options:

A.

Reduces the response time for specific requests to devices with many interfaces


B.

Categorizes traffic and provides insights


C.

Allows the controller to be vendor-agnostic


D.

Streamlines monitoring using SNMP and other polling tools


Expert Solution
Questions # 325:

Which syslog message logging level displays interface line protocol up/down events?

Options:

A.

Informational


B.

debugging


C.

alerts


D.

notifications


Expert Solution
Questions # 326:

How do TCP and UDP differ in the way they guarantee packet delivery?

Options:

A.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.


B.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.


C.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.


D.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.


Expert Solution
Questions # 327:

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?

Options:

A.

SMTP


B.

SNMP


C.

TCP


D.

FTP


Expert Solution
Questions # 328:

Refer to the exhibit.

Question # 328

When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?

Options:

A.

Layer 2 switch


B.

Router


C.

Load balancer


D.

firewall


Expert Solution
Questions # 329:

Refer to the exhibit.

Question # 329

PC1 is trying to ping PC3 for the first time and sends out an ARP to S1 Which action is taken by S1?

Options:

A.

It forwards it out G0/3 only


B.

It is flooded out every port except G0/0.


C.

It drops the frame.


D.

It forwards it out interface G0/2 only.


Expert Solution
Questions # 330:

What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?

Options:

A.

different nonoverlapping channels


B.

different overlapping channels


C.

one overlapping channel


D.

one nonoverlapping channel


Expert Solution
Questions # 331:

Refer to the Exhibit.

Question # 331

After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?

Options:

A.

There is a native VLAN mismatch


B.

Access mode is configured on the switch ports.


C.

The PCs are m the incorrect VLAN


D.

All VLANs are not enabled on the trunk


Expert Solution
Questions # 332:

Which function is performed by the collapsed core layer in a two-tier architecture?

Options:

A.

enforcing routing policies


B.

marking interesting traffic for data polices


C.

attaching users to the edge of the network


D.

applying security policies


Expert Solution
Questions # 333:

What is the primary effect of the spanning-tree portfast command?

Options:

A.

it enables BPDU messages


B.

It minimizes spanning-tree convergence time


C.

It immediately puts the port into the forwarding state when the switch is reloaded


D.

It immediately enables the port in the listening state


Expert Solution
Questions # 334:

Drag the IPv6 DNS record types from the left onto the description on the right.

Question # 334


Expert Solution
Questions # 335:

Which QoS feature drops traffic that exceeds the committed access rate?

Options:

A.

Shaping


B.

Policing


C.

Weighted fair queuing


D.

FIFO


Expert Solution
Questions # 336:

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Question # 336


Expert Solution
Questions # 337:

A network security team noticed that an increasing number of employees are becoming victims of phishing attacks. Which security program should be implemented to mitigate the problem?

Options:

A.

Physical access control


B.

Software firewall enabled on all PCs


C.

Email system patches


D.

User awareness training


Expert Solution
Questions # 338:

Why are API keys used to enforce rate limiting?

Options:

A.

to uniquely identify clients to monitor their usage patterns


B.

to encrypt data to prevent excessive usage


C.

to contain embedded permissions that automatically expire


D.

to track the geographical location of each request


Expert Solution
Questions # 339:

Why would a network administrator choose to implement RFC 1918 address space?

Options:

A.

to route traffic on the internet


B.

to provide flexibility in the IP network design


C.

to provide overlapping address space with another network


D.

to limit the number of hosts on the network


Expert Solution
Questions # 340:

Which role does AI play in monitoring network data flow?

Options:

A.

It analyzes patterns for anomaly detection.


B.

It exclusively predicts device malfunctions.


C.

It simplifies traffic route mapping.


D.

It enhances data packet delivery speeds.


Expert Solution
Questions # 341:

Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)

Options:

A.

disabled


B.

listening


C.

forwarding


D.

learning


E.

blocking


Expert Solution
Questions # 342:

Refer to the exhibit.

Question # 342

What is a reason for poor performance on the network interface?

Options:

A.

The interface is receiving excessive broadcast traffic.


B.

The cable connection between the two devices is faulty.


C.

The interface is operating at a different speed than the connected device.


D.

The bandwidth setting of the interface is misconfigured


Expert Solution
Questions # 343:

A network engineer must configure two new subnets using the address block 10 70 128 0/19 to meet these requirements:

• The first subnet must support 24 hosts

• The second subnet must support 472 hosts

• Both subnets must use the longest subnet mask possible from the address block

Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )

Options:

A.

interface vlan 1234ip address 10.70.159.1 255.255.254.0


B.

interface vlan 1148ip address 10.70.148.1 255.255.254.0


C.

interface vlan 4722ip address 10.70.133.17 255.255.255.192


D.

interface vlan 3002ip address 10.70.147.17 255.255.255.224


E.

interface vlan 155ip address 10.70.155.65 255.255.255.224


Expert Solution
Questions # 344:

Which PoE mode enables powered-device detection and guarantees power when the device is detected?

Options:

A.

dynamic


B.

static


C.

active


D.

auto


Expert Solution
Questions # 345:

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

Options:

A.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network broadcast


B.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network point-to-point


C.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf cost 0


D.

router ospf 1network 192.168.1.1 0.0.0.0 area 0hello interval 15interface e1/1Ip address 192.168.1.1 255.255.255.252


Expert Solution
Questions # 346:

A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?

Options:

A.

ipv6 address 21:EB8:C1:2200:1::331/64


B.

ipv6 address 2001:EB8:C1:22:1::331/64


C.

ipv6 address 2001 :EB8:C 1:2200.1 ::331-64


D.

ipv6 address 2001:EB8:C1:2200:1:0000:331/64


Expert Solution
Questions # 347:

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

Question # 347

B)

Question # 347

C)

Question # 347

D)

Question # 347

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 348:

Which action is taken by the data plane within a network device?

Options:

A.

forwards traffic to the next hop


B.

constructs a routing table based on a routing protocol


C.

provides CLI access to the network device


D.

looks up an egress interface in the forwarding information base


Expert Solution
Questions # 349:

Which remote access protocol provides unsecured remote CLI access?

Options:

A.

console


B.

Telnet


C.

Bash


D.

SSH


Expert Solution
Questions # 350:

Drag and drop the network topology architecture types from the left onto the corresponding function on the right. Not all architecture types are used.

Question # 350


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 301-350 out of questions