Cisco 200-301 v2021-04-16 q222
Cisco 200-301 v2021-04-16 q222
q222
NEW QUESTION: 1
Which function does the range of private IPv4 addresses perform?
A. allows multiple companies to each use the same addresses without conflicts
B. enables secure communications to the internet for all external hosts
C. ensures that NAT is not required to reach the internet with private range addressing
D. provides a direct connection for hosts from outside of the enterprise network
Answer: A (LEAVE A REPLY)
NEW QUESTION: 2
Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable
What is the result of this configuration?
A. The link is becomes an access port.
B. The link becomes a trunk port.
C. The link is in an error disables state
D. The link is in a down state.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 3
Refer to the exhibit.
A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the
packet?
A. 207.165.200.254 via Serial0/0/0
B. 207.165.200.250 via Serial/0/0/0
C. 207.165.200.254 via Serial0/0/1
D. 207.165.200.246 via Serial0/1/0
Answer: C (LEAVE A REPLY)
NEW QUESTION: 4
Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?
A. To pass client traffic two or more ports must be configured.
B. The EtherChannel must be configured in "mode active"
C. When enabled the WLC bandwidth drops to 500 Mbps
D. One functional physical port is needed to pass client traffic
Answer: D (LEAVE A REPLY)
NEW QUESTION: 5
Refer to the exhibit.
After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns
to the NETCONF client, to only the interface's configuration?
A. Use the JSON library to parse the data returned by the NETCONF server for the interface's configuration.
B. Create a JSON filter as a string and pass it to the get_config() method as an argument.
C. Create an XML filter as a string and pass it to get_config() method as an argument.
D. Use the Ixml library to parse the data returned by the NETCONF server for the interface's configuration.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 6
Refer to the exhibit.
After the election process what is the root bridge in the HQ LAN?
A. Switch 3
B. Switch 4
C. Switch 2
D. Switch 1
Answer: B (LEAVE A REPLY)
NEW QUESTION: 7
By default, how Does EIGRP determine the metric of a route for the routing table?
A. it uses a default metric of 10 for all routes that are learned by the router
B. it uses the bandwidth and delay values of the path to calculate the route metric
C. it counts the number of hops between the receiving and destination routers and uses that value as the
metric
D. it uses a reference Bandwidth and the actual bandwidth of the connected link to calculate the route metric
Answer: B (LEAVE A REPLY)
NEW QUESTION: 8
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network
device? (Choose two)
A. Enable NTP authentication.
B. Verify the time zone.
C. Disable NTP broadcasts
D. Specify the IP address of the NTP server
E. Set the NTP server private key
Answer: A,D (LEAVE A REPLY)
Explanation
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-2glx/configuration/guide/ntp.html To
configure authentication, perform this task in privileged mode:Step 1: Configure an authentication key pair for
NTP and specify whether the key will be trusted or untrusted.Step 2: Set the IP address of the NTP server and
the public key.Step 3: Enable NTP client mode.Step 4: Enable NTP authentication.Step 5: Verify the NTP
configuration.
NEW QUESTION: 9
A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz
network for their voice quality. What action must be taken to meet the requirement?
A. enable RX-SOP
B. enable Band Select
C. enable AAA override
D. enable DTIM
Answer: B (LEAVE A REPLY)
NEW QUESTION: 10
Refer to the exhibit.
A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other
computers must be able to access the web server Which configuration when applied to switch A accomplishes
this task?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
NEW QUESTION: 11
Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.
Answer:
NEW QUESTION: 12
Refer to the exhibit.
Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other
traffic?
A. access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip
access-group 100 in
B. access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface
GigabitEthernet0/0 ip access-group 100 in
C. access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface
GigabitEthernet0/0 ip access-group 100 in
D. access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip
access-group 100 in
Answer: D (LEAVE A REPLY)
NEW QUESTION: 13
The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface
conditions?(choose two)
A. There is a protocol mismatch
B. The interface is error-disabled
C. There is a speed mismatch
D. The interface is shut down
E. There is a duplex mismatch
Answer: B,C (LEAVE A REPLY)
NEW QUESTION: 14
Refer to the exhibit.
A router reserved these five routes from different routing information sources.
Which two routes does the router install in its routing table? (Choose two)
A. iBGP route 10.0.0.0/30
B. RIP route 10.0.0.0/30
C. OSPF route 10.0.0.0/30
D. EIGRP route 10.0.0.1/32
E. OSPF route 10.0.0.0/16
Answer: C,D (LEAVE A REPLY)
NEW QUESTION: 15
Refer to the exhibit.
A packet is being sent across router R1 to host 172.16.0.14. What is the destination route for the packet?
A. 209.165.200.254 via Serial0/0/1
B. 209.165.200.250 via Serial0/0/0
C. 209.165.200.254 via Serial0/0/0
D. 209.165.200.246 via Serial0/1/0
Answer: A (LEAVE A REPLY)
NEW QUESTION: 16
Refer to the exhibit.
The nip server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2.
Which command must be configured on router 2 so that it operates in server-only mode and relies only on its
internal clock?
A. Router2(config)#ntp passive
B. Router2(config)#ntp server 192.168.0.2
C. Router2(config)#ntp server 172.17.0.1
D. Router2(config)#ntp master 4
Answer: B (LEAVE A REPLY)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
NEW QUESTION: 17
Drag and drop the SNMP components from the left onto the descriptions on the right.
Answer:
NEW QUESTION: 18
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
A. IKEv2
B. IKEv1
C. IPsec
D. MD5
Answer: C (LEAVE A REPLY)
Explanation
A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other
over a public network such as the Internet. A site-to-site VPN means that two sites create a VPN tunnel by
encrypting and sending data between two devices. One set of rules for creating a siteto-site VPN is defined by
IPsec.
NEW QUESTION: 19
Drag and drop the descriptions from the left onto the configuration-management technologies on the right.
Answer:
Explanation
Ansible:- uses SSH for remote device communication- uses YAML for fundamental configuration elements
Chef:- uses TCP port 10002 for configuration push jobs- uses Ruby for fundamental configuration elements
Puppet:- fundamental configuration elements are stored in a manifest- uses TCP 8140 for communication The
focus of Ansible is to be streamlined and fast, and to require no node agent installation.Thus, Ansible performs
all functions over SSH. Ansible is built on Python, in contrast to the Ruby foundation of Puppet and Chef.TCP
port 10002 is the command port. It may be configured in the Chef Push Jobs configuration file .This port
allows Chef Push Jobs clients to communicate with the Chef Push Jobs server.Puppet is an open-source
configuration management solution, which is built with Ruby and offers custom Domain Specific Language
(DSL) and Embedded Ruby (ERB) templates to create custom Puppet language files, offering a declarative-
paradigm programming approach.A Puppet piece of code is called a manifest, and is a file with .pp extension.
NEW QUESTION: 20
What is a similarity between OM3 and OM4 fiber optic cable?
A. Both have a 62.5 micron core diameter
B. Both have a 100 micron core diameter
C. Both have a 9 micron core diameter
D. Both have a 50 micron core diameter
Answer: D (LEAVE A REPLY)
NEW QUESTION: 21
What is the function of a server?
A. It transmits packets between hosts in the same broadcast domain.
B. It provides shared applications to end users.
C. It routes traffic between Layer 3 devices.
D. It Creates security zones between trusted and untrusted networks
Answer: B (LEAVE A REPLY)
NEW QUESTION: 22
What are two southbound APIs? (Choose two )
A. OpenFlow
B. NETCONF
C. Thrift
D. CORBA
E. DSC
Answer: A,B (LEAVE A REPLY)
Explanation
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact
with the forwarding plane to make adjustments to the network, so it can better adapt to changing business
requirements.
The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate
and delete configuration to network devices.
NEW QUESTION: 23
R1 has learned route 192.168.12.0/24 via IS-IS. OSPF, RIP. and Internal EIGRP Under normal operating
conditions, which routing protocol is installed in the routing table?
A. IS-IS
B. RIP
C. Internal EIGRP
D. OSPF
Answer: (SHOW ANSWER)
Explanation
With the same route (prefix), the router will choose the routing protocol with lowest Administrative Distance
(AD) to install into the routing table. The AD of Internal EIGRP (90) is lowest so it would be chosen. The table
below lists the ADs of popular routing protocols.
CCNA 200-301 Dumps Full Questions - Exam Study Guide & Free 203
Note: The AD of IS-IS is 115. The "EIGRP" in the table above is "Internal EIGRP". The AD of "External
EIGRP" is 170. An EIGRP external route is a route that was redistributed into EIGRP.
NEW QUESTION: 24
What are two functions of a server on a network? (Choose two)
A. handles requests from multiple workstations at the same time
B. runs applications that send and retrieve data for workstations that make requests
C. housed solely in a data center that is dedicated to a single client
D. runs the same operating system in order to communicate with other servers
E. achieves redundancy by exclusively using virtual server clustering
Answer: A,B (LEAVE A REPLY)
NEW QUESTION: 25
Which type of security program is violated when a group of employees enters a building using the ID badge of
only one person?
A. intrusion detection
B. network authorization
C. physical access control
D. user awareness
Answer: (SHOW ANSWER)
NEW QUESTION: 26
A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2
connectivity to ports on another switch What must be configured when using active mode on both sides of the
connection?
A. LLDP
B. LACP
C. Cisco vPC
D. 802.1q trunks
Answer: B (LEAVE A REPLY)
NEW QUESTION: 27
Which resource is able to be shared among virtual machines deployed on the same physical server?
A. VM configuration file
B. disk
C. applications
D. operating system
Answer: A (LEAVE A REPLY)
NEW QUESTION: 28
What makes Cisco DNA Center different from traditional network management applications and their
management of networks?
A. It only supports auto-discovery of network elements in a greenfield deployment.
B. It modular design allows someone to implement different versions to meet the specific needs of an
organization
C. IT abstracts policy from the actual device configuration
D. It does not support high availability of management functions when operating in cluster mode
Answer: C (LEAVE A REPLY)
NEW QUESTION: 29
What is the primary function of a Layer 3 device?
A. to transmit wireless traffic between hosts
B. to analyze traffic and drop unauthorized traffic from the Internet
C. to pass traffic between different networks
D. forward traffic within the same broadcast domain
Answer: (SHOW ANSWER)
NEW QUESTION: 30
Refer to the exhibit.
An engineer must configure GigabitEthernet1/1 to accommodate voice and data traffic Which configuration
accomplishes this task?
A. Option D
B. Option B
C. Option C
D. Option A
Answer: (SHOW ANSWER)
NEW QUESTION: 31
Which CRUD operation modifies an existing table or view?
A. create
B. update
C. read
D. replace
Answer: B (LEAVE A REPLY)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
NEW QUESTION: 32
The service password-encryption command is entered on a router. What is the effect of this configuration?
A. protects the VLAN database from unauthorized PC connections on the switch
B. encrypts the password exchange when a VPN tunnel is established
C. prevents network administrators from configuring clear-text passwords
D. restricts unauthorized users from viewing clear-text passwords in the running configuration
Answer: D (LEAVE A REPLY)
NEW QUESTION: 33
What is a function of a remote access VPN?
A. allows the users to access company internal network resources through a secure tunnel
B. used exclusively when a user is connected to a company's internal network
C. used cryptographic tunneling to protect the privacy of data for multiple users simultaneously
D. establishes a secure tunnel between two branch sites
Answer: A (LEAVE A REPLY)
NEW QUESTION: 34
Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right
Answer:
NEW QUESTION: 35
An organization secures its network with multi-factor authentication using an authenticator app on employee
smartphone. How is the application secured in the case of a user's smartphone being lost or stolen?
A. The application verifies that the user is in a specific location before it provides the second factor.
B. The application challenges a user by requiring an administrator password to reactivate when the
smartphone is rebooted.
C. The application requires an administrator password to reactivate after a configured Interval.
D. The application requires the user to enter a PIN before it provides the second factor.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 36
An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask
combination meets this criteria?
A. Option B
B. Option D
C. Option A
D. Option C
Answer: (SHOW ANSWER)
NEW QUESTION: 37
An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router
is in the proper mode?
A. Exchange
B. 2-way
C. Init
D. Full
Answer: D (LEAVE A REPLY)
NEW QUESTION: 38
Drag and drop the QoS congestion management terms from the left onto the description on the right.
Answer:
NEW QUESTION: 39
What is a difference between RADIUS and TACACS+?
A. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of
authentication
B. TACACS+ encrypts only password information and RADIUS encrypts the entire payload
C. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and
interim commands
D. TACACS+ separates authentication and authorization, and RADIUS merges them
Answer: (SHOW ANSWER)
NEW QUESTION: 40
Refer to the exhibit.
Shortly after SiteA was connected to SiteB over a new single-mode fiber path users at SiteA report intermittent
connectivity issues with applications hosted at SiteB What is the cause of the intermittent connectivity issue?
A. The sites were connected with the wrong cable type
B. An incorrect SFP media type was used at SiteA
C. High usage is causing high latency
D. Interface errors are incrementing
Answer: C (LEAVE A REPLY)
NEW QUESTION: 41
What is a characteristic of spine-and-leaf architecture?
A. It provides greater predictability on STP blocked ports.
B. It provides variable latency
C. Each link between leaf switches allows for higher bandwidth.
D. Each device is separated by the same number of hops
Answer: D (LEAVE A REPLY)
NEW QUESTION: 42
What occurs when overlapping Wi-Fi channels are implemented?
A. Wireless devices are unable to distinguish between different SSIDs
B. The wireless network becomes vulnerable to unauthorized access.
C. Network communications are open to eavesdropping.
D. Users experience poor wireless network performance.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 43
Drag and drop the application protocols from the left onto the transport protocols that it uses on the right
Answer:
NEW QUESTION: 44
Refer to the exhibit.
Which switch becomes the root of the spanning tree for VLAN 110?
A. Switch 1
B. Switch 2
C. Switch 3
D. Switch 4
Answer: B (LEAVE A REPLY)
NEW QUESTION: 45
Which device tracks the state of active connections in order to make a decision to forward a packet through?
A. router
B. wireless LAN controller
C. wireless access point
D. firewall
Answer: B (LEAVE A REPLY)
NEW QUESTION: 46
Refer to the exhibit.
Which type of configuration is represented in the output?
A. JSON
B. Chef
C. Ansible
D. Puppet
Answer: (SHOW ANSWER)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
NEW QUESTION: 47
Refer to Exhibit.
How does SW2 interact with other switches in this VTP domain?
A. It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports
B. It forwards only the VTP advertisements that it receives on its trunk ports.
C. It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports
D. It processes VTP updates from any VTP clients on the network on its access ports.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 48
An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or
desirable mode. What action should be taken?
A. configure switchport mode dynamic desirable
B. configure switchport nonegotiate
C. configure switchport trunk dynamic desirable
D. configure switchport mode dynamic auto
Answer: D (LEAVE A REPLY)
NEW QUESTION: 49
Refer to the exhibit.
NEW QUESTION: 50
What is a benefit of VRRP?
A. It provides traffic load balancing to destinations that are more than two hops from the source.
B. It allows neighbors to share routing table information between each other.
C. It provides the default gateway redundancy on a LAN using two or more routers.
D. It prevents loops in a Layer 2 LAN by forwarding all traffic to a root bridge, which then makes the final
forwarding decision.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 51
Refer to the exhibit.
Which command configures a floating static route to provide a backup to the primary link?
A. ip route 0.0.0.0 0.0.0.0 209.165.200.224
B. ip route 0.0.0.0 0.0.0.0 209.165.202.131
C. ip route 209.165.201.0 255.255.255.224 209.165.202.130
D. ip route 209.165.200.224 255.255.255.224 209.165.202.129 254
Answer: D (LEAVE A REPLY)
NEW QUESTION: 52
When DHCP is configured on a router, which command must be entered so the default gateway is
automatically distributed?
A. ip helper-address
B. dns-server
C. default-gateway
D. default-router
Answer: (SHOW ANSWER)
NEW QUESTION: 53
Which technology is used to improve web traffic performance by proxy caching?
A. ASA
B. WSA
C. Firepower
D. FireSIGHT
Answer: (SHOW ANSWER)
NEW QUESTION: 54
Refer to the exhibit.
A network engineer must configured communication between PC A and the File Server. To prevent
interruption for any other communications, which command must be configured?
A. Switchport trunk allowed vlan remove 10-11
B. Switch trunk allowed vlan 12
C. Switchport trunk allowed vlan none
D. Switchport trunk allowed vlan add 13
Answer: (SHOW ANSWER)
NEW QUESTION: 55
Refer to the exhibit.
An engineer is bringing up a new circuit to the MPLS provider on the Gi0/1 interface of Router1 The new
circuit uses eBGP and teams the route to VLAN25 from the BGP path What s the expected behavior for the
traffic flow for route 10.10.13.0/25?
A. Route 10.10.13.0/25 learned via the GiO/0 interface remains in the routing table
B. Traffic to 10.10.13.0/25 is asymmeteical
C. Route 10.10.13.0/25 is updated in the routing table as being learned from interface Gi0/1.
D. Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces
Answer: A (LEAVE A REPLY)
NEW QUESTION: 56
Which CRUD operation corresponds to the HTTP GET method?
A. read
B. update
C. create
D. delete
Answer: A (LEAVE A REPLY)
Explanation
GET: This method retrieves the information identified by the request URI. In the context of the RESTful web
services, this method is used to retrieve resources. This is the method used for read operations (the R in
CRUD).
https://hub.packtpub.com/crud-operations-rest/
NEW QUESTION: 57
What is a practice that protects a network from VLAN hopping attacks?
A. Implement port security on internet-facing VLANs
B. Configure an ACL to prevent traffic from changing VLANs
C. Change native VLAN to an unused VLAN ID
D. Enable dynamic ARP inspection
Answer: C (LEAVE A REPLY)
NEW QUESTION: 58
Refer to the exhibit.
What two conclusions should be made about this configuration? (Choose two )
A. The spanning-tree mode is PVST+
B. The root port is FastEthernet 2/1
C. This is a root bridge
D. The spanning-tree mode is Rapid PVST+
E. The designated port is FastEthernet 2/1
Answer: B,D (LEAVE A REPLY)
NEW QUESTION: 59
A network engineer must back up 20 network router configurations globally within a customer environment.
Which protocol allows the engineer to perform this function using the Cisco IOS MIB?
A. CDP
B. SNMP
C. SMTP
D. ARP
Answer: B (LEAVE A REPLY)
Explanation
SNMP is an application-layer protocol that provides a message format for communication between SNMP
managers and agents. SNMP provides a standardized framework and a common language used for the
monitoring and management of devices in a network.The SNMP framework has three parts:+ An SNMP
manager+ An SNMP agent+ A Management Information Base (MIB)The Management Information Base (MIB)
is a virtual information storage area for network management information, which consists of collections of
managed objects.With SNMP, the network administrator can send commands to multiple routers to do the
backup
NEW QUESTION: 60
A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2
GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address
2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?
A. ipv6 address 2001::db8:0000::500:a:400F:583B
B. ipv6 address 2001 db8:0::500:a:4F:583B
C. ipv6 address 2001:0db8::5: a: 4F 583B
D. ipv6 address 2001:db8::500:a:400F:583B
Answer: (SHOW ANSWER)
NEW QUESTION: 61
Refer to the exhibit.
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
NEW QUESTION: 62
In which two ways does a password manager reduce the chance of a hacker stealing a users password?
(Choose two.)
A. It automatically provides a second authentication factor that is unknown to the original user.
B. It uses an internal firewall to protect the password repository from unauthorized access.
C. It stores the password repository on the local workstation with built-in antivirus and anti-malware
functionality
D. It protects against keystroke logging on a compromised device or web site.
E. It encourages users to create stronger passwords.
Answer: D,E (LEAVE A REPLY)
NEW QUESTION: 63
In software defined architectures, which plane is distributed and responsible for traffic forwarding?
A. data plane
B. control plane
C. policy plane
D. management plane
Answer: A (LEAVE A REPLY)
NEW QUESTION: 64
Refer to the exhibit.
NEW QUESTION: 65
What is the primary effect of the spanning-tree portfast command?
A. It minimizes spanning-tree convergence time
B. It immediately puts the port into the forwarding state when the switch is reloaded
C. It immediately enables the port in the listening state
D. it enables BPDU messages
Answer: A (LEAVE A REPLY)
NEW QUESTION: 66
Which 802.11 management frame type is sent when a client roams between access points on the same
SSID?
A. Probe Request
B. Reassociation Request
C. Association Request
D. Authentication Request
Answer: B (LEAVE A REPLY)
NEW QUESTION: 67
A network administrator must to configure SSH for remote access to router R1 The requirement is to use a
public and private key pair to encrypt management traffic to and from the connecting client.
Which configuration, when applied, meets the requirements?
A. Option C
B. Option D
C. Option B
D. Option A
Answer: (SHOW ANSWER)
NEW QUESTION: 68
Which network allows devices to communicate without the need to access the Internet?
A. 1729.0.0/16
B. 172.28.0.0/16
C. 192.0.0.0/8
D. 209.165.201.0/24
Answer: (SHOW ANSWER)
Explanation
The private ranges of each class of IPv4 are listed below:
Class A private IP address ranges from 10.0.0.0 to 10.255.255.255 Class B private IP address ranges from
172.16.0.0 to 172.31.255.255 Class C private IP address ranges from 192.168.0.0 to 192.168.255.255 Only
the network 172.28.0.0/16 belongs to the private IP address (of class B).
NEW QUESTION: 69
Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security
mechanism categories on the right.
Answer:
NEW QUESTION: 70
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which
command should be used?
A. switchport trunk encapsulation dot1q
B. switchport trunk allowed vlan 10
C. switchport mode trunk
D. switchport trunk native vlan 10
Answer: (SHOW ANSWER)
NEW QUESTION: 71
Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the
right.
Answer:
NEW QUESTION: 72
Refer to the exhibit.
An extended ACL has been configured configuration failed to work as
intended Which two
changes stop outbound traffic on TCP the 10.0.10 0/26 subnet while
still allowing all other traffic? (Choose
two )
A. The source and destination IPs must be swapped in ACL 101
B. The ACL must be moved to the Gi0/1 interface outbound on R2
C. Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic
D. The ACL must be configured the Gi0/2 interface inbound on R1
E. Add a "permit ip any any" statement to the begining of ACL 101 for allowed traffic.
Answer: A,C (LEAVE A REPLY)
NEW QUESTION: 73
Which set of action satisfy the requirement for multifactor authentication?
A. The user swipes a key fob, then clicks through an email link
B. The user enters a user name and password, and then clicks a notification in an authentication app on a
mobile device
C. The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen
D. The user enters a user name and password and then re-enters the credentials on a second screen
Answer: B (LEAVE A REPLY)
Explanation
This is an example of how two-factor authentication (2FA) works:1. The user logs in to the website or service
with their username and password.2. The password is validated by an authentication server and, if correct, the
user becomes eligible for the second factor.3. The authentication server sends a unique code to the user's
second-factor method (such as a smartphone app).4. The user confirms their identity by providing the
additional authentication for their second-factor method.
NEW QUESTION: 74
What are two roles of Domain Name Services (DNS)? (Choose Two)
A. allows a single host name to be shared across more than one IP address
B. improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
C. builds a flat structure of DNS names for more efficient IP operations
D. enables applications to identify resources by name instead of IP address
E. encrypts network Traffic as it travels across a WAN by default
Answer: A,D (LEAVE A REPLY)
NEW QUESTION: 75
Which switch technology establishes a network connection immediately when it is plugged in?
A. BPDU guard
B. PortFast
C. UplinkFast
D. BackboneFast
Answer: (SHOW ANSWER)
NEW QUESTION: 76
What is a DHCP client?
A. a server that dynamically assigns IP addresses to hosts.
B. a workstation that requests a domain name associated with its IP address
C. a router that statically assigns IP addresses to hosts.
D. a host that is configured to request an IP address automatically
Answer: (SHOW ANSWER)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
NEW QUESTION: 77
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
A. TCP uses synchronization packets, and UDP uses acknowledgment packets.
B. UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits
C. UDP provides reliable message transfer and TCP is a connectionless protocol
D. TCP uses the three-way handshake and UDP does not guarantee message delivery
Answer: (SHOW ANSWER)
NEW QUESTION: 78
An engineer must configure Interswitch VLAN communication between a Cisco switch and a third-party switch.
Which action should be taken?
A. configure IEEE 802.1q
B. configure DSCP
C. configure IEEE 802.1p
D. configure ISL
Answer: A (LEAVE A REPLY)
NEW QUESTION: 79
Refer to the exhibit.
What is the next hop address for traffic that is destined to host 10.0.1.5?
A. 10.0.1.4
B. 10.0.1.3
C. 10.0.1.50
D. Loopback D
Answer: (SHOW ANSWER)
NEW QUESTION: 80
Refer to the exhibit.
If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?
A. It sends packets out of interface Fa0/1.
B. It load-balances traffic out of Fa0/1 and Fa0/2.
C. It is unreachable and discards the traffic.
D. It sends packets out of interface FaO/2.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 81
Which action is taken by a switch port enabled for PoE power classification override?
A. Should a monitored port exceeds the maximum administrative value for power, the port is shutdown and
err-disabled
B. If a switch determines that a device is using less than the minimum configured power it assumes the device
has failed and disconnects
C. When a powered device begins drawing power from a PoE switch port a syslog message is generated
D. As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused
Answer: A (LEAVE A REPLY)
NEW QUESTION: 82
Refer to the exhibit.
The New York router is configured with static routes pointing to the Atlanta and Washington sites. Which two
tasks must be performed so that the Serial0/0/0 interfaces on the Atlanta and Washington routers can reach
one another?
(Choose two.)
A. Configure the ipv6 route 2012::/126 2023::1 command on the Washington router.
B. Configure the ipv6 route 2023::/126 2012::1 command on the Atlanta router.
C. Configure the Ipv6 route 2012::/126 s0/0/0 command on the Atlanta router.
D. Configure the ipv6 route 2023::/126 2012::2 command on the Atlanta router.
E. Configure the ipv6 route 2012::/126 2023::2 command on the Washington router.
Answer: D,E (LEAVE A REPLY)
Explanation
The short syntax of static IPv6 route is:ipv6 route <destination-IPv6-address> {next-hop-IPv6-address | exit-
interface}
NEW QUESTION: 83
What is a characteristic of private IPv4 addressing?
A. used without tracking or registration
B. issued by IANA in conjunction with an autonomous system number
C. traverse the Internet when an outbound ACL is applied
D. composed of up to 65.536 available addresses
Answer: D (LEAVE A REPLY)
NEW QUESTION: 84
Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
A. SAE encryption
B. scrambled encryption key
C. AES encryption
D. TKiP encryption
Answer: A (LEAVE A REPLY)
NEW QUESTION: 85
How does Cisco DNA Center gather data from the network?
A. Devices use the call-home protocol to periodically send data to the controller.
B. Devices establish an iPsec tunnel to exchange data with the controller
C. Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the
controller
D. The Cisco CU Analyzer tool gathers data from each licensed network device and streams it to the
controller.
Answer: (SHOW ANSWER)
NEW QUESTION: 86
What are two benefits of network automation? (Choose two)
A. reduced operational costs
B. faster changes with more reliable results
C. increased network security
D. reduced hardware footprint
E. fewer network failures
Answer: A,B (LEAVE A REPLY)
NEW QUESTION: 87
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
A. A console password must be configured on the switch
B. The Ip domain-name command must be configured on the switch
C. The switch must be running a k9 (crypto) IOS image
D. IP routing must be enabled on the switch
E. Telnet must be disabled on the switch
Answer: B,C (LEAVE A REPLY)
NEW QUESTION: 88
Refer to the exhibit.
An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If the switch and DHCP
server configurations are complete and correct. Which two sets of commands must be configured on R1 and
R2 to complete the task? (Choose two)
A. R1(config)# interface fa0/0
R1(config-if)#ip helper-address 198.51.100.100
B. R2(config)# interface gi0/0
R2(config-if)#ip address dhcp
C. R2(config)# interface gi0/0
R2(config-if)#ip helper-address 198.51.100.100
D. R1(config)# interface fa0/0
R1(config-if)#ip helper-address 192.0.2.2
E. R1(config)# interface fa0/0
R1(config-if)#ip address dhcp
R1(config-if)# no shutsown
Answer: C,E (LEAVE A REPLY)
NEW QUESTION: 89
Refer to the exhibit.
NEW QUESTION: 90
Refer to the exhibit.
An engineer is tasked with verifying network configuration parameters on a client workstation to report back to
the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.
Answer:
NEW QUESTION: 91
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
A. allocating nonoverlapping channels to access points that are in close physical proximity to one another
B. setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
C. disabling TPC so that access points can negotiate signal levels with their attached wireless devices.
D. configuring access points to provide clients with a maximum of 5 Mbps
Answer: A (LEAVE A REPLY)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
NEW QUESTION: 92
Which type of wireless encryption is used for WPA2 in preshared key mode?
A. TKIP with RC4
B. RC4
C. AES-128
D. AES-256
Answer: D (LEAVE A REPLY)
Explanation
We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so
we can deduce the encryption is AES-256, not AES-128.
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/67134-wpa2-config.html
NEW QUESTION: 93
What are two differences between optical-fiber cabling and copper cabling? (Choose two)
A. The data can pass through the cladding
B. A BNC connector is used for fiber connections
C. Fiber connects to physical interfaces using Rj-45 connections
D. The glass core component is encased in a cladding
E. Light is transmitted through the core of the fiber
Answer: D,E (LEAVE A REPLY)
NEW QUESTION: 94
Which command enables a router to become a DHCP client?
A. ip helper-address
B. ip address dhcp
C. ip dhcp pool
D. ip dhcp client
Answer: B (LEAVE A REPLY)
NEW QUESTION: 95
When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)
A. 2002::5
B. FF02::2
C. FC00::/7
D. FF02::1
E. 2000::/3
Answer: (SHOW ANSWER)
NEW QUESTION: 96
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
A. action
B. data
C. control
D. management
Answer: (SHOW ANSWER)
NEW QUESTION: 97
Refer to the exhibit.
With which metric was the route to host 172.16.0.202 learned?
A. 0
B. 110
C. 38443
D. 3184439
Answer: (SHOW ANSWER)
Explanation
Both the line "O 172.16.0.128/25" and "S 172.16.0.0/24" cover the host 172.16.0.202 but with the "longest
(prefix) match" rule the router will choose the first route.
NEW QUESTION: 98
If a notice-level messaging is sent to a syslog server, which event has occurred?
A. A network device has restarted
B. An ARP inspection has failed
C. A routing instance has flapped
D. A debug operation is running
Answer: C (LEAVE A REPLY)
Explanation
Usually no action is required when a route flaps so it generates the notification syslog level message (level 5).
NEW QUESTION: 99
When implementing a router as a DHCP server, which two features must be configured'? (Choose two)
A. smart-relay
B. manual bindings
C. address pool
D. relay agent information
E. database agent
Answer: (SHOW ANSWER)
If the network environment is operating normally, which type of device must be connected to interface
FastEthernet 0/1?
A. DHCP client
B. access point
C. router
D. PC
Answer: (SHOW ANSWER)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable
address in the 10.0.0.0/30 subnet. Which command set meets the requirement?
A. interface gi0/0
no cdp advertise-v2
B. interface gi0/1
no cdp enable
C. interface gi0/0
no cdp run
D. interface gi0/1
clear cdp table
Answer: C (LEAVE A REPLY)
A network administrator must permit SSH access to remotely manage routers in a network. The operations
team resides on the 10.20.1.0/25 network. Which command will accomplish this task?
A. access-list 2699 permit udp 10.20.1.0 0.0.0.255
B. no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22
C. access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22
D. no access-list 2699 deny ip any 10.20.1.0 0.0.0.255
Answer: D (LEAVE A REPLY)
Explanation
Note : Already a statement is there in last to allow SSH Traffic for network 10.20.1.0 0.0.0.127, but Second
statement says deny ip any 10.20.1.0 0.0.0.255, so how it will work once it is denied. So the right answer is
remove the --- no access-list 2699 deny ip any 10.20.1.0 0.0.0.255.
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
Answer:
NEW QUESTION: 124
A network administrator must enable DHCP services between two sites. What must be configured for the
router to pass DHCPDISCOVER messages on to the server?
A. DHCP Snooping
B. DHCP Binding
C. a DHCP Pool
D. a DHCP Relay Agent
Answer: D (LEAVE A REPLY)
A. SW1
B. SW3
C. SW2
D. SW4
Answer: (SHOW ANSWER)
Which route does R1 select for traffic that is destined to 192 168.16.2?
A. 192.168.16.0/21
B. 192.168.16.0/24
C. 192.168 26.0/26
D. 192.168.16.0/27
Answer: (SHOW ANSWER)
Explanation
The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the
longest prefix so it will be chosen. This is called the "longest prefix match" rule.
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
Which route type does the routing protocol Code D represent in the output?
A. statically assigned route
B. route learned through EIGRP
C. internal BGP route
D. /24 route of a locally configured IP
Answer: (SHOW ANSWER)
Explanation
Double-Tagging attack:In this attack, the attacking computer generates frames with two 802.1Q tags. The first
tag matches the native VLAN of the trunk port (VLAN 10 in this case), and the second matches the VLAN of a
host it wants to attack (VLAN 20).When the packet from the attacker reaches Switch A, Switch A only sees the
first VLAN 10 and it matches with its native VLAN 10 so this VLAN tag is removed. Switch A forwards the
frame out all links with the same native VLAN 10. Switch B receives the frame with an tag of VLAN 20 so it
removes this tag and forwards out to the Victim computer.Note: This attack only works if the trunk (between
two switches) has the same native VLAN as the attacker.To mitigate this type of attack, you can use VLAN
access control lists (VACLs, which applies to all traffic within a VLAN. We can use VACL to drop attacker
traffic to specific victims/servers) or implement Private VLANs.ARP attack (like ARP poisoning/spoofing) is a
type of attack in which a malicious actor sends falsified ARP messages over a local area network as ARP
allows a gratuitous reply from a host even if an ARP request was not received. This results in the linking of an
attacker's MAC address with the IP address of a legitimate computer or server on the network. This is an
attack based on ARP which is at Layer 2.Dynamic ARP inspection (DAI) is a security feature that validates
ARP packets in a network which can be used to mitigate this type of attack.
An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity
on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all
values are used.
Answer:
NEW QUESTION: 150
What is the same for both copper and fiber interfaces when using SFP modules?
A. They support an inline optical attenuator to enhance signal strength
B. They provide minimal interruption to services by being hot-swappable
C. They offer reliable bandwidth up to 100 Mbps in half duplex mode
D. They accommodate single-mode and multi-mode in a single module
Answer: B (LEAVE A REPLY)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
An engineer configured NAT translations and has verified that the configuration is correct.
Which IP address is the source IP?
A. 10.4.4.4
B. 10.4.4.5
C. 172.23.103.10
D. 172.23.104.4
Answer: (SHOW ANSWER)
If configuring a static default route on the router with the ip route 0.0.0.0 0.0.0.0 10.13.0.1 120 command how
does the router respond?
A. It ignores the new static route until the existing OSPF default route is removed
B. It immediately replaces the existing OSPF route in the routing table with the newly configured static route
C. It starts load-balancing traffic between the two default routes
D. It starts sending traffic without a specific matching entry in the routing table to GigabitEthernetO/1
Answer: A (LEAVE A REPLY)
Explanation
Our new static default route has the Administrative Distance (AD) of 120, which is bigger than the AD of OSPF
External route (O*E2) so it will not be pushed into the routing table until the current OSPF External route is
removed.For your information, if you don't type the AD of 120 (using the command "ip route 0.0.0.0
0.0.0.0 10.13.0.1") then the new static default route would replace the OSPF default route as the default AD of
static route is 1. You will see such line in the routing table:S* 0.0.0.0/0 [1/0] via 10.13.0.1
Answer:
NEW QUESTION: 170
Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)?
(Choose two)
A. blocking
B. listening
C. speaking
D. learning
E. forwarding
Answer: D,E (LEAVE A REPLY)
Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?
A. The frame is processed in VLAN 5.
B. The frame is dropped
C. The frame is processed in VLAN 1
D. The frame is processed in VLAN 11
Answer: A (LEAVE A REPLY)
Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in
desirable or trunk mode?
A. switchport mode dot1-tunnel
B. switchport mode trunk
C. switchport mode dynamic auto
D. switchport mode dynamic desirable
Answer: (SHOW ANSWER)
Based on the LACP neighbor status, in which mode is the SW1 port channel configured?
A. passive
B. mode on
C. auto
D. active
Answer: D (LEAVE A REPLY)
Explanation
From the neighbor status, we notice the "Flags" are SP. "P" here means the neighbor is in Passive mode.In
order to create an Etherchannel interface, the (local) SW1 ports should be in Active mode.Moreover, the "Port
State" in the exhibit is "0x3c" (which equals to "00111100 in binary format).Bit 3 is "1" which means the ports
are synchronizing -> the ports are working so the local ports should be in Active mode.
An engineer booted a new switch and applied this configuration via the console port. Which additional
configuration must be applied to allow administrators to authenticate directly to enable privilege mode via
Telnet using a local username and password?
A. Option A
B. Option B
C. Option D
D. Option C
Answer: A (LEAVE A REPLY)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
NEW QUESTION: 182
Refer to the exhibit.
Answer:
Explanation
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
Router R1 is running three different routing protocols. Which route characteristic is used by the router to
forward the packet that it receives for destination IP 172.16.32.1?
A. metric
B. cost
C. administrative distance
D. longest prefix
Answer: (SHOW ANSWER)
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)
Answer:
NEW QUESTION: 218
Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right
Answer:
NEW QUESTION: 219
What is an appropriate use for private IPv4 addressing?
A. on hosts that communicates only with other internal hosts
B. on internal hosts that stream data solely to external resources
C. to allow hosts inside to communicate in both directions with hosts outside the organization
D. on the public-facing interface of a firewall
Answer: (SHOW ANSWER)
Answer:
Valid 200-301 Dumps shared by Fast2test.com for Helping Passing 200-301 Exam! Fast2test.com now
offer the newest 200-301 exam dumps, the Fast2test.com 200-301 exam questions have been updated
and answers have been corrected get the newest Fast2test.com 200-301 dumps with Test Engine here:
https://www.fast2test.com/200-301-premium-file.html (216 Q&As Dumps, 30%OFF Special Discount:
freecram)