Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 8 out of 8 pages
Viewing questions 351-400 out of questions
Questions # 351:

Which type of organization should use a collapsed-core architecture?

Options:

A.

large and requires a flexible, scalable network design


B.

large and must minimize downtime when hardware fails


C.

small and needs to reduce networking costs currently


D.

small but is expected to grow dramatically in the near future


Expert Solution
Questions # 352:

Refer to the exhibit.

Question # 352

To which device does Router1 send packets that are destined to host 10.10.13.165?

Options:

A.

Router2


B.

Router3


C.

Router4


D.

Router5


Expert Solution
Questions # 353:

Question # 353

Refer to the exhibit. The static routes were implemented on the border router. What is the next hop IP address for a ping sent to 172.16.153.154 from the border router?

Options:

A.

10.56.65.56


B.

10.56.65.65


C.

10.65.56.56


D.

10.65.65.65


Expert Solution
Questions # 354:

Which type of protocol is VRRP?

Options:

A.

uses dynamic IP address assignment


B.

allows two or more routers to act as a default gateway


C.

uses a destination IP address 224.0.0.102 for router-to-router communication


D.

uses Cisco-proprietary First Hop Redundancy Protocol


Expert Solution
Questions # 355:

If a notice-level messaging is sent to a syslog server, which event has occurred?

Options:

A.

A network device has restarted


B.

An ARP inspection has failed


C.

A routing instance has flapped


D.

A debug operation is running


Expert Solution
Questions # 356:

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

Options:

A.

ipv6 address 2001:0db8::5: a: 4F 583B


B.

ipv6 address 2001:db8::500:a:400F:583B


C.

ipv6 address 2001 db8:0::500:a:4F:583B


D.

ipv6 address 2001::db8:0000::500:a:400F:583B


Expert Solution
Questions # 357:

An organization developed new security policies and decided to print the policies and distribute them to all personnel so that employees review and apply the policies. Which element of a security program is the organization implementing?

Options:

A.

Asset identification


B.

User training


C.

Physical access control


D.

Vulnerability control


Expert Solution
Questions # 358:

Refer to the exhibit.

Question # 358

A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line but not from show running- config. Which command completes the configuration?

Options:

A.

Device(config)# netconf lock-time 500


B.

Device(config)# netconf max-message 1000


C.

Device(config)# no netconf ssh acl 1


D.

Device(config)# netconf max-sessions 100


Expert Solution
Questions # 359:

Which configuration ensures that the switch is always the root for VLAN 750?

Options:

A.

Switch(config)#spanning-tree vlan 750 priority 38003685


B.

Switch(config)#spanning-tree vlan 750 root primary


C.

Switch(config)#spanning-tree vlan 750 priority 614440


D.

Switch(config)#spanning-tree vlan 750 priority 0


Expert Solution
Questions # 360:

Refer to the exhibit.

Question # 360

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

Options:

A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255


B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22


C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22


D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255


Expert Solution
Questions # 361:

Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?

Options:

A.

802.1x


B.

IP Source Guard


C.

MAC Authentication Bypass


D.

802.11n


Expert Solution
Questions # 362:

The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two)

Options:

A.

There is a duplex mismatch


B.

There is a speed mismatch


C.

There is a protocol mismatch


D.

The interface is shut down


E.

The interface is error-disabled


Expert Solution
Questions # 363:

Which technology must be implemented to configure network device monitoring with the highest security?

Options:

A.

IP SLA


B.

syslog


C.

NetFlow


D.

SNMPv3


Expert Solution
Questions # 364:

Which protocol uses the SSL?

Options:

A.

HTTP


B.

SSH


C.

HTTPS


D.

Telnet


Expert Solution
Questions # 365:

Refer to the exhibit.

Question # 365

Which configuration enables DHCP addressing for hosts connected to interface FastEthernetO/1 on router R4?

Options:

A.

interface FastEthernet0/0ip helper-address 10.0.1.1iaccess-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1


B.

interface FastEthernot0/1ip helper-address 10.0.1.1!access-list 100 permit tcp host 10.0.1.1 eq 67 host 10.148.2.1


C.

interface FastEthernetO/0ip helper-address 10.0.1.1Iaccess-list 100 permit host 10.0.1.1 host 10.148.2.1 eq bootps


D.

interface FastEthernet0/1ip helper-address 10.0.1.1!access-list 100 permit udp host 10.0.1.1 eq bootps host 10.148.2.1


Expert Solution
Questions # 366:

Which action is taken by the data plane within a network device?

Options:

A.

forwards traffic to the next hop


B.

constructs a routing table based on a routing protocol


C.

provides CLI access to the network device


D.

looks up an egress interface in the forwarding information base


Expert Solution
Questions # 367:

Refer to the exhibit.

Question # 367

Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?

Options:

A.

The frame is processed in VLAN 5.


B.

The frame is processed in VLAN 11


C.

The frame is processed in VLAN 1


D.

The frame is dropped


Expert Solution
Questions # 368:

Refer to the exhibit.

Question # 368

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

Question # 368

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 369:

Refer to the exhibit.

Question # 369

Of the routes learned with dynamic routing protocols, which has the least preferred metric?

Options:

A.

Local


B.

EIGRP


C.

OSPF


D.

RIP


Expert Solution
Questions # 370:

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.

Question # 370


Expert Solution
Questions # 371:

Refer to the exhibit.

Question # 371

All interfaces are configured with duplex auto and ip ospf network broadcast. Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency and act as a central point for exchanging OSPF information between routers?

Question # 371

Question # 371

Question # 371

Question # 371

Options:

A.

Option A


B.

Option B


C.

Option C


D.

option D


Expert Solution
Questions # 372:

Question # 372

Refer to the exhibit Router R1 Fa0/0 is unable to ping router R3 Fa0 ' 1. Which action must be taken in router R1 to help resolve the configuration issue?

Options:

A.

set the default network as 20.20.20.0/24


B.

set the default gateway as 20.20.20.2


C.

configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network


D.

configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network


Expert Solution
Viewing page 8 out of 8 pages
Viewing questions 351-400 out of questions