Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-301 - Cisco Certified Network Associate

Page: 13 / 13
Total 1069 questions

Which command configures the Cisco WLC to prevent a serial session with the WLC CLI from being automatical togged out?

A.

config sessions maxsessions 0

B.

config sessions timeout 0

C.

config serial timeout 0

D.

config serial timeout 9600

How does network automation help reduce network downtime?

A.

Changes can be implemented in parallel across multiple devices at once, which increases the speed of the change rate.

B.

By using automation platforms with intent-based configuration, all changes are checked for possible outages before being implemented.

C.

Emails can be generated based on when a network admin performs a network change, which increases visibility.

D.

Configuration templates and testing can be built into implementation, which increases the success rate of a network change.

Drag and drop the characteristics of transport layer protocols from the left onto the corresponding protocols on the right.

Refer to the exhibit. Drag and drop the subnet masks from the left onto the corresponding subnets on the right. Not all subnet masks used.

How does authentication differ from authorization?

A.

Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.

B.

Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access

C.

Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network

D.

Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.

Refer the exhibit.

What is the cause of poor performance on router R19?

A.

excessive collisions

B.

speed and duplex mismatch

C.

port oversubscription

D.

excessive CRC errors

What is the role of syslog level 7 in network device health monitoring?

A.

It provides information about error conditions visible on the network device.

B.

It shares normal operational messages from the network equipment.

C.

It sends outputs from various debug commands on the device.

D.

It warns about emergency conditions on the network appliance.

Refer to the exhibit.

Which configuration for RTR-1 deniess SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

The network engineer is configuring a new WLAN and is told to use a setup password for authentication instead of the RADIUS servers. Which additional set of tasks must the engineer perform to complete the configuration?

A.

Disable PMF Enable PSK Enable 802.1x

B.

Select WPA Policy Enable CCKM Enable PSK

C.

Select WPA Policy Select WPA2 Policy Enable FT PSK

D.

Select WPA2 Policy Disable PMF Enable PSK

Drag and drop the WLAN components from the left onto the component details on the right.

NO: 105

What is the MAC address used with VRRP as a virtual address?

A.

00-00-0C-07-AD-89

B.

00-00-5E-00-01-0a

C.

00-07-C0-70-AB-01

D.

00-C6-41-93-90-91

What differentiates the Cisco OfficeExtend AP mode from FlexConnect AP mode?

A.

FlexConnect allows a personal SSID to be configured on the AP, and personal SSIDs are not supported with OfficeExtend.

B.

OfficeExtend does not support DTLS tunneling of traffic to the WLC, and FlexConnect tunnels traffic to the WLC with DTLS.

C.

OfficeExtend tunnels all traffic through the WLC, and FlexConnect terminates client traffic at the AP switch port.

D.

FlexConnect must be deployed behind a router that NATs the client traffic, and OfficeExtend uses public IP sources.

What are two characteristics of a small office / home office connection environment? (Choose two.)

A.

It requires 10Gb ports on all uplinks.

B.

It supports between 50 and 100 users.

C.

It supports between 1 and 50 users.

D.

It requires a core, distribution, and access layer architecture.

E.

A router port connects to a broadband connection.

Drag and drop the management connection types from the left onto the definitions on the right.

Refer to the exhibit An IPv6 address must be obtained automatically on the LAN interface on R1 Which command must be implemented to accomplish the task?

A.

Ipv6 address 2001:dbB:d8d2:1008:4343:61:0010::/64

B.

Ipv6 address autoconfig

C.

Ipv6 address fe80::/10

D.

Ipv6 address dhcp

Refer to the exhibit.

PC A is communicating with another device at IP address 10.227.225.255. Through which router does router Y route the traffic?

A.

router A

B.

router B

C.

router C

D.

router D

What should a network administrator consider when deciding to implement automation?

A.

Automated systems may have difficulty expanding network changes at scale.

B.

Network automation typically is limited to the configuration and management of virtual devices within a network.

C.

Network automation typically increases enterprise management operating costs.

D.

Manual changes frequently lead to configuration errors and inconsistencies.

Refer to the exhibit.

Which interface is chosen to forward traffic to the host at 192.168.0.55?

A.

GigabitEthernet0

B.

GigabitEthernet0/1

C.

Null0

D.

GigabitEthernet0/3

A router has two static routes to the same destination network under the same OSPF process. How does the router forward packets to the destination if the next-hop devices are different?

A.

The router chooses the route with the oldest age.

B.

The router load-balances traffic over all routes to the destination.

C.

The router chooses the next hop with the lowest MAC address.

D.

The router chooses the next hop with the lowest IP address.

Refer to the exhibit.

Which next-hop IP address has the least desirable metric when sourced from R1?

A.

10.10.10.5

B.

10.10.10.3

C.

10.10.10.4

D.

10.10.10.2