Pass the Cisco CCNA 200-301 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions
Questions # 161:

What are two differences between WPA2 and WPA3 wireless security? (Choose two.)

Options:

A.

WPA3 um AES for stronger protection than WPA2 which uses SAE


B.

WPA2 uses 1 M-bit key encryption and WPA3 requires 256-brt key encryption


C.

WPA3 uses AES for stronger protection than WPA2 which uses TKIP WPA3 uses


D.

SAE tor stronger protection than WPA2 which uses AES


E.

WPA2 uses 12B-M key encryption and WPA3 supports 128 bit and 192 bit key encryption


Expert Solution
Questions # 162:

Which (unction generally performed by a traditional network device is replaced by a software-defined controller?

Options:

A.

encryption and decryption for VPN link processing


B.

building route tables and updating the forwarding table


C.

changing the source or destination address during NAT operations


D.

encapsulation and decapsulation of packets in a data-link frame


Expert Solution
Questions # 163:

Refer to the exhibit.

Question # 163

Which prefix did router R1 learn from internal EIGRP?

Options:

A.

192.168.10/24


B.

192.168.3.0/24


C.

192.168.2.0/24


D.

172.16 1.0/24


Expert Solution
Questions # 164:

Refer to the exhibit.

Question # 164

Given the following switch MAC addresses, which switch will be elected as the root bridge?

SW1: 0C:5A:05:53:27:17

SW2: 0C:0A:A8:1A:3C:9D

SW3: 0C:0A:18:81:83:19

SW4: 0C:0A:05:22:05:97

Options:

A.

SW1


B.

SW2


C.

SW3


D.

SW4


Expert Solution
Questions # 165:

A client experiences slow throughput from a server that is directly connected to the core switch in a data center. A network engineer finds minimal latency on connections to the server, but data transfers are unreliable, and the output of the show Interfaces counters errors command shows a high FCS-Err count on the interface that is connected to the server. What is the cause of the throughput issue?

Options:

A.

high bandwidth usage


B.

a physical cable fault


C.

a speed mismatch


D.

a cable that is too long


Expert Solution
Questions # 166:

What is a zero-day exploit?

Options:

A.

It is when a new network vulnerability is discovered before a fix is available


B.

It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.


C.

It is when the network is saturated with malicious traffic that overloads resources and bandwidth


D.

It is when an attacker inserts malicious code into a SOL server.


Expert Solution
Questions # 167:

What is a reason why an administrator would choose to implement an automated network management approach?

Options:

A.

Reduce inconsistencies in the network configuration.


B.

Enable "box by box" configuration and deployment.


C.

Decipher simple password policies.


D.

Increase recurrent management costs.


Expert Solution
Questions # 168:

Drag and drop the DNS commands from the left onto their effects on the right.

Question # 168


Expert Solution
Questions # 169:

Refer to the exhibit.

Question # 169

Which action by the router when a packet is sourced from 10.10.10.2 and destined 10.10.10.16?

Options:

A.

It queues the packets waiting for the route to be learned.


B.

It floods packets to all learned next hops.


C.

It discards the packets.


D.

It uses a route that is similar to the destination address.


Expert Solution
Questions # 170:

What is an Ansible inventory?

Options:

A.

file that defines the target devices upon which commands and tasks are executed


B.

unit of Python code to be executed within Ansible


C.

collection of actions to perform on target devices, expressed in YAML format


D.

device with Ansible installed that manages target devices


Expert Solution
Questions # 171:

Refer to the exhibit.

Question # 171

An engineer configures interface fa0/1 on SW1 and SW2 to pass traffic from two different VLANs. For security reasons, company policy requires the native VLAN to be set to a nondefault value. Which configuration meets this requirement?

A)

Question # 171

B)

Question # 171

C)

Question # 171

D)

Question # 171

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 172:

Drag and drop the use cases for device-management technologies from the left onto the corresponding.

Question # 172


Expert Solution
Questions # 173:

Question # 173

Refer to the exhibit. How does router R1 handle traffic to the 172.16.1.4/30 subnet?

Options:

A.

It sends all traffic over the path via 172.16.9.5 using 172.16.4.4 as a backup.


B.

It sends all traffic over the path via 172.16.4.4.


C.

It load-balances traffic over 172.16.9.5 and 172.16.4.4.


D.

It sends all traffic over the path via 10.0.1.100


Expert Solution
Questions # 174:

Refer to the exhibit.

Question # 174

Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?

Options:

A.

Interface range G1/1 – 1/3 switchport mode trunk channel-group 1 mode active no shutdown


B.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode passive no shutdown


C.

Interface range G1/1 – 1/3 switchport mode trunk

channel-group 1 mode desirable

no shutdown


D.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode on no shutdown


Expert Solution
Questions # 175:

Drag and drop the statement about AAA services from the left to the corresponding AAA services on the right.

Question # 175


Expert Solution
Questions # 176:

Drag and drop the network topology architecture types from the left onto the corresponding function on the right. Not all architecture types are used.

Question # 176


Expert Solution
Questions # 177:

How do UTP and STP cables compare?

Options:

A.

STP cables are cheaper to procure and easier to install and UTP cables are more expensive and harder to install.


B.

UTP cables are less prone to crosstalk and interference and STP cables are more prone to crosstalk and interference.


C.

UTP cables provide taster and more reliable data transfer rates and STP cables are slower and less reliable.


D.

STP cables are shielded and protect against electromagnetic interference and UTP lacks the same protection against electromagnetic interference.


Expert Solution
Questions # 178:

Which encryption method is used by WPA3?

Options:

A.

PSK


B.

TKIP


C.

SAE


D.

AES


Expert Solution
Questions # 179:

Which capability does TFTP provide?

Options:

A.

loads configuration files on systems without data storage devices


B.

provides authentication for data communications over a private data network


C.

provides encryption mechanisms for file transfer across a WAN


D.

provides secure file access within the LAN


Expert Solution
Questions # 180:

Refer to the exhibit.

Question # 180

Which types of JSON data is shown

Options:

A.

Object


B.

Sequence


C.

String


D.

boolean


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions