Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-301 - Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1

Page: 2 / 8
Total 1209 questions

What is used to identify spurious DHCP servers?

A.

DHCPREQUEST

B.

DHCPDISCOVER

C.

DHCPACK

D.

DHCPOFFER

Drag and drop the virtualization concepts from the left onto the matching statements on the right.

Which command do you enter so that a switch configured with Rapid PVST + listens and learns for a specific time period?

A.

switch(config)#spanning-tree vlan 1 max-age 6

B.

switch(config)#spanning-tree vlan 1 hello-time 10

C.

switch(config)#spanning-tree vlan 1 priority 4096

D.

switch(config)#spanning-tree vlan 1 forward-time 20

What are two features of the DHCP relay agent? (Choose two.)

A.

assigns DNS locally and then forwards request to DHCP server

B.

permits one IP helper command under an individual Layer 3 interface

C.

allows only MAC-to-IP reservations to determine the local subnet of a client

D.

minimizes the necessary number of DHCP servers

E.

configured under the Layer 3 interface of a router on the client subnet

Refer to the exhibit. Which interface does a packet take to reach the destination address of 10.10.10.147?

A.

FastEthemet 0/0

B.

Senal0/0

C.

FastEthemet 0/1

In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?

A.

when the subnet must be available only within an organization

B.

when the subnet does not need to be routable

C.

when the addresses on the subnet must be equivalent to private IPv4 addresses

D.

when the subnet must be routable over the internet

Refer to the exhibit. An engineer just installed network 10.120.10.0/24. Which configuration must be applied to the R14 router to add the new network to its OSPF routing table?

A.

router ospf 100network 10.120.10.0 255.255.255.0 area 0

B.

router ospf 120network 10.120.10.0 255.255.255.0 area 0ip route 10.120.10.0 255.255.255.0 fa0/1

C.

router ospf 100 area 0network 10.120.10.0 0.0.0.255

Refer to the exhibit.

Which route does R1 select for traffic that is destined to 192.168.16.2?

A.

192.168.16.0/21

B.

192.168.16.0/24

C.

192.168.16.0/26

D.

192.168.16.0/27

Refer to the exhibit.

An engineer configures interface fa0/1 on SW1 and SW2 to pass traffic from two different VLANs. For security reasons, company policy requires the native VLAN to be set to a nondefault value. Which configuration meets this requirement?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Why is TCP desired over UDP for application that require extensive error checking, such as HTTPS?

A.

UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet received.

B.

UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.

C.

UDP uses flow control mechanisms for the delivery of packets, and TCP uses congestion control for efficient packet delivery.

D.

UDP uses sequencing data tor packets to arrive in order, and TCP offers trie capability to receive packets in random order.

What is a feature of WPA?

A.

802.1x authentication

B.

preshared key

C.

TKIP/MIC encryption

D.

small Wi-Fi application

Refer to the exhibit.

An engineer is configuring a new Cisco switch NewSW, to replace SW2 The details have been provided

• Switches SW1 and SW2 are third-party devices without support for trunk ports

• The existing connections must be maintained between PC1 PC2 and PC3

• Allow the switch to pass traffic from future VLAN 10. Which configuration must be applied?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Drag and drop the device behaviors from the left onto the matching HSRP slate on the right.

Refer to the exhibit.

A packet sourced from 10.10.10.1 is destined for 10.10.8.14. What is the subnet mask of the destination route?

A.

255.255.254.0

B.

255.255.255.240

C.

255.255.255.248

D.

255.255.255.252

Which EtherChannel mode must be configured when using LAG on a WLC?

A.

on

B.

active

C.

auto

D.

passive

Which command creates a static NAT binding for a PC address of 10.1.1.1 to the public routable address 209.165.200.225 assigned to the PC?

A.

R1(config)#ip nat inside source static 10.1.1.1 209.165.200.225

B.

R1(config)#ip nat inside source static 209.165.200.225 10.1.1.1

C.

R1(config)#ip nat outside source static 10.1.1.1 209.165.200.225

D.

R1(config)#ip nat outside source static 209.165.200.225 10.1.1.1

What are two disadvantages of a full-mesh topology? (Choose two.)

A.

It needs a high MTU between sites.

B.

It has a high implementation cost.

C.

It must have point-to-point communication.

D.

It requires complex configuration.

E.

It works only with BGP between sites.

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?

A.

If will choose the route with the longest match.O 100.100.100.100'32 (110/21) via 192.168.1.1. 00:05:57. EmernetO/1.

B.

It will always prefer the static route over dynamic routes and choose the routeS 100.100.0.0/16(1/0] via 192.168.4.1.

C.

It will choose the route with the highest metric.D 100.100.100.0/24 (90/435200) via 192.168.2.1. 00:00:13. EthernetO/2.

D.

It will choose the route with the lowest metric,R 100.0.0.0/8 [120/2] via 192.168.3.1. 00:00:13. EthernetO/3.

Which part of the HTTP request is used in REST API basic authentication to carry credentials?

A.

cookie

B.

content-type

C.

authorization

D.

accept

Drag and drop the statements about networking from the left onto the corresponding networking types on the right

Refer to the exhibit.

PC1 regularly sends 1800 Mbps of traffic to the server. A network engineer needs to configure the EtherChannel to disable Port Channel 1 between SW1 and SW2 when the Ge0/0 and Ge0/1 ports on SW2 go down. Which configuration must the engineer apply to the switch?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Two switches have been implemented and all interfaces are at the default configuration level. A trunk link must be implemented between two switches with these requirements:

• using an industry-standard trunking protocol

• permitting VLANs 1 -10 and denying other VLANs

How must the interconnecting ports be configured?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit. A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration must meet these requirements:

• Create the username as CCUser.

• Create the password as NA!2Scc.

• Encrypt the user password.

What must be configured to meet the requirements?

A.

username CCUser privies 10 password NA!2Scc

B.

username CCUser password NA!2Scc enable password level 5 NA!2$cc

C.

username CCUser secret NA!2Scc

D.

username CCUser privilege 15 password NA!2Scc enable secret 0 NA!2$cc

Refer to the exhibit.

Host A switch interface is configured in VLAN 2. Host D sends a unicast packet destined for the IP address of host A.

What does the switch do when it receives the frame from host D?

A.

It creates a broadcast storm.

B.

It drops the frame from the MAC table of the switch.

C.

It shuts down the source port and places It In err-disable mode.

D.

It floods the frame out of every port except the source port.

Drag and drop the REST API call method for HTTP from the left onto the action they perform on the right.

Drag and drop the SNMP components from the left onto the description on the right.

Which mechanism carries multicast traffic between remote sites and supports encryption?

A.

GRE over IPsec

B.

IPsec over ISATAP

C.

GRE

D.

ISATAP

Which (unction generally performed by a traditional network device is replaced by a software-defined controller?

A.

encryption and decryption for VPN link processing

B.

building route tables and updating the forwarding table

C.

changing the source or destination address during NAT operations

D.

encapsulation and decapsulation of packets in a data-link frame

What is represented in line 3 within this JSON schema?

A.

object

B.

key

C.

array

D.

value

How does automation leverage data models to reduce the operational complexity of a managed network?

A.

Reduces the response time for specific requests to devices with many interfaces

B.

Categorizes traffic and provides insights

C.

Allows the controller to be vendor-agnostic

D.

Streamlines monitoring using SNMP and other polling tools

Why are API keys used to enforce rate limiting?

A.

to uniquely identify clients to monitor their usage patterns

B.

to encrypt data to prevent excessive usage

C.

to contain embedded permissions that automatically expire

D.

to track the geographical location of each request

Refer to the exhibit.

A network engineer is configuring a WLAN to connect with the 172.16.10.0/24 network on VLAN 20. The engineer wants to limit the number of devices that connect to the WLAN on the USERWL SSID to 125. Which configuration must the engineer perform on the WLC?

A.

In the Management Software activation configuration, set the Clients value to 125.

B.

In the Controller IPv6 configuration, set the Throttle value to 125.

C.

In the WLAN configuration, set the Maximum Allowed Clients value to 125.

D.

In the Advanced configuration, set the DTIM value to 125.

Which header must be included in a REST request from an application that requires JSON-formatted content?

A.

Content-Type: application/json

B.

Accept-Encoding: application/json

C.

Accept: application/json

D.

Accept-Language: application/json

What is the difference between the TCP and UDP protocols?

A.

TCP ensures ordered, reliable data delivery, and UDP offers low latency and high throughput.

B.

TCP is used for transmitting data over the internet, and UDP is used for transmitting data over a local network.

C.

TCP manages multicast and broadcast data transfers, and UDP only handles unicast communications.

D.

TCP is used to ensure data integrity in a file transfer, and UDP is used to broadcast a message to multiple recipients.

Refer to the exhibit. A guest WLAN must be created that prompts the client for a username and password on the local web page of the WLC. Which two actions must be performed on the Layer 2 tab before enabling the Authentication option on the Layer 3 tab? (Choose two.)

A.

Uncheck the WPA Policy option check box, and check the WPA2 Policy option check box.

B.

Uncheck the MAC Filtering option check box.

C.

Change the WPA Encryption option from TKIP to CCMP(128AES).

D.

Set the Security Type option to Personal.

E.

Set the Layer 2 Security option to None.

What is a characteristic of private IPv4 addressing?

A.

traverses the Internet when an outbound ACL Is applied

B.

used without allocation from a regional Internet authority

C.

shared address space between an ISP and subscriber

D.

reduces the need for isolated networks

Which interface is used to send traffic to the destination network?

10.174.208.210/28 [110/2708] via G0/21

10.174.208.210/28 [110/25445] via G0/20

10.174.208.210/28 [120/1] via G0/12

10.174.208.210/28 [120/4] via G0/16

A.

G0/12

B.

G0/20

C.

G0/21

D.

G0/16

What is the maximum length of characters used in an SSID?

A.

16

B.

32

C.

48

D.

64

A new DHCP server has been deployed in a corporate environment with lease time set to eight hours. Which CMD command on a Windows-based device allows the engineer to verify the DHCP lease expiration?

A.

ipconfig /renew

B.

ipconfig

C.

ipconfig /all

D.

ipconfig /displaydns

How does automation affect network management processes?

A.

It interoperates with ISE to define and manage patch and update schedules.

B.

It performs configuration updates based on user profiles.

C.

It improves the efficiency of system lifecycle management.

D.

It provides a reactive support model.

Drag and drop the IPv6 address from the left onto the type on the right.

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

Refer to the exhibit. A network engineer is adding another physical interface as a new member to the existing Port-Channel1 bundle.

Which command set must be configured on the new interface to complete the process?

A.

switchport mode trunk channel-group 1 mode active

B.

no switchport channel-group 1 mode active

C.

no switchport channel-group 1 mode on

D.

switchport switchport mode trunk

How is Al used to identify issues within network traffic?

A.

II exclusively predicts device malfunctions.

B.

It enhances data packet delivery speeds.

C.

It simplifies traffic route mapping.

D.

It analyzes patterns for anomaly detection.

Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:

    Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.

    Wireless clients on this WLAN must be able to apply VLAN settings from RADIUS attributes.

Which two actions meet these requirements? (Choose two.)

A.

Enable the Aironet IE option.

B.

Enable the Coverage Hole Detection option.

C.

Set the MFP Client Protection option to Required

D.

Enable the client band select option.

E.

Enable the allow AAA Override option

Which two principles must be considered when using per-hop behavior in QoS? (Choose two.)

A.

Policing is not supported on subinterfaces.

B.

Shaping and rate limiting have the same effect.

C.

Shaping drops excessive traffic without adding traffic delay.

D.

Shaping levels out traffic bursts by delaying excess traffic.

E.

Policing is performed in the inbound and outbound directions.

Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process.

Which command must be configured on switch SW2’s Gi0/1-2 interfaces to establish the channel to SW1?

A.

channel-group 1 mode desirable

B.

channel-group 1 mode on

C.

channel-group 1 mode auto

D.

channel-group 1 mode active