Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-301 - Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1

Page: 3 / 8
Total 1209 questions

Which AP mode wirelessly connects two separate network segments each set up within a different campus building?

A.

mesh

B.

local

C.

bridge

D.

point-to-point

How does MAC learning function?

A.

rewrites the source and destination MAC address

B.

adds unknown source MAC addresses to the CAM table

C.

sends the frame back to the source to verify availability

D.

drops received MAC addresses not listed in the address table

Which QoS feature drops traffic that exceeds the committed access rate?

A.

Shaping

B.

Policing

C.

Weighted fair queuing

D.

FIFO

Refer to the exhibit. Which interface does a packet take to reach the host address of 192.168.18.16?

A.

GigabitEthernet1/0

B.

GigabitEthernet0/0

C.

GigabitEthernet2/0

D.

Null0

Refer to the exhibit. A network engineer is configuring a wireless LAN with Web Passthrough Layer 3 Web Policy. Which action must the engineer take to complete the configuration?

A.

Set the Layer 2 Security to 802.1X.

B.

Enable TKIP and CCMP256 WPA2 Encryption.

C.

Set the Layer 2 Security to None.

D.

Enable the WPA Policy.

Which switch port configuration must be configured when connected to an AP running in FlexConnect mode, and the WLANs use flex local switching?

A.

access port with one VLAN

B.

trunk port with pruned VLANs

C.

Layer 3 port with an IP address

D.

tagged port with MAC Filtering enabled

Refer to the exhibit. VLAN 23 is being implemented between SW1 and SW2. The command show interface ethernet0/0 switchport has been issued on SW1. Ethernet0/0 on SW1 is the uplink to SW2. Which command when entered on the uplink interface allows PC 1 and PC 2 to communicate without impact to the communication between PC 11 and PC 12?

A.

switchport trunk allowed vlan 2-1001

B.

switchport trunk allowed vlan add 23

C.

switchport trunk allowed vlan 23

D.

switchport trunk allowed vlan 22-23

How does MAC learning function?

A.

inserts MAC addresses dynamically into the CAM table

B.

restricts ports to a maximum of 10 dynamically-learned addresses

C.

protects against denial of service attacks

D.

rewrites the source and destination MAC address

Refer to the exhibit.

Network services must be enabled on interface Gil/0734. Which configuration meets the needs for this implementation?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

Which two QoS tools provide congestion management? (Choose two.)

A.

PBR

B.

FRTS

C.

PQ

D.

CBWFQ

E.

CAR

What differentiates the TCP and UDP protocols?

A.

TCP tracks segments being transmitted or received by assigning segment numbers, and UDP adjusts data flow according to network conditions.

B.

TCP establishes a connection with the device on the other end before transferring, and UDP transfers without establishing a connection.

C.

TCP sends data at a constant rate with error checking on upper protocol layers, and UDP provides error-checking and sequencing.

D.

TCP immediately transmits data without waiting for a handshake, and UDP awaits a response from the receiver before sending additional data.

What is the function of generative AI in network operations?

A.

It disables unused services.

B.

It deploys network firmware updates.

C.

It creates synthetic network configurations.

D.

It computes optimal data storage solutions.

Refer to the exhibit. Which tasks must be performed on the Download File tab to install new software using TCP port 22?)

A.

Set the File Type to Code, set the Transfer Mode to SFTP, and specify the IP address of the WLC.

B.

Set the File Type to Configuration, set the Transfer Mode to FTP, and specify the IP address of the file server.

C.

Set the File Type to Code, set the Transfer Mode to SFTP, and specify the IP address of the file server.

D.

Set the File Type to Configuration, set the Transfer Mode to SFTP, and specify the IP address of the WLC.

Refer to the exhibit. Which two commands, when configured on router R1. fulfill these requirements? (Choose two.) ' Packets toward the entire network 2001:db8:23: :/64 must be forwarded through router R2. ' Packets toward host 2001: db8:23::14 preferably must be forwarded through R3.

A.

ipv6 route 2001:db8:23: :/128 fd00:12::2

B.

Ipv6 route 2001:db8:23::14/128 fd00:13::3

C.

ipv6 route 2001:db8:23::14/64 fd00:12::2 200

D.

ipv6 route 2001:db8:23: l4/64 fd00:12::2

E.

ipv6 route 2001:db8:23: :/64 fd00:12::2

Refer to the exhibit.

What is the correct next hop for router R1 to reach IP addresses 192.168.2.86 and 10.20.1.50?

A.

172.16.1.4

B.

172.16.1.1

C.

172.16.1.2

D.

172.16.1.3

Why does an administrator choose to implement a remote access IPsec VPN?

A.

to establish an encrypted tunnel between a remote user and a private network over the internet

B.

to allow access to an enterprise network using any internet-enabled location via a web browser using SSL

C.

to provide a secure link between an HTTPS server, authentication subsystem, and an end-user

D.

to use cryptography for authentication between a device and user over a negotiated VPN gateway

What is the main purpose of SSH management access?

A.

To support DES 56-bit and 3DES (168-bit) ciphers

B.

To enable secured access to the inbound management interface

C.

To validate management access with username and domain name only

D.

To allow passwords protected with HTTPS encryption to be sent

Refer to the exhibit. After a recent internal security audit, the network administrator decided to block all P2P-capable devices from the selected SSID. Which configuration setting must the administrator apply?

A.

Set the P2P Block Action to Drop.

B.

Select a correctly configured Layer 2 ACL.

C.

Set the Wi-Fi Direct Client Policy to Not-Allow.

D.

Set the MFP Client Protection to Required.

Which statement describes virtualization on containers?

A.

It is a type of operating system virtualization that allows the host operating system to control the different CPU memory processes.

B.

It emulates a physical computer and enables multiple machines to run with many operating systems on a physical machine.

C.

It separates virtual machines from each other and allocates memory, processors, and storage to compute.

D.

It contains a guest operating system and virtual partition of hardware for OS and requires application libraries.

Refer to the exhibit. How must OSPF be configured on the GigabitEthernet0/0 interface of the neighbor device to achieve the desired neighbor relationship?

A.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf network point-to-point

B.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf cost 5

C.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf 1 area 2

D.

Router(config)#interface GigabitEthernet 0/0Router(config-if)#ip ospf priority 1

Which technology allows for logical Layer 3 separation on physical network equipment?

A.

Virtual Route Forwarding

B.

Virtual Switch System

C.

IPsec Transport Mode

D.

Time Division Multiplexer

What are two behaviors of a point-to-point WAN topology? (Choose two.)

A.

It uses a single router to route traffic between sites.

B.

It leverages a dedicated connection.

C.

It connects remote networks through a single line.

D.

t delivers redundancy between the central office and branch offices.

E.

It provides direct connections between each router in the topology.

Which role do predictive Al models play in network load balancing?

A.

They anticipate future traffic spikes.

B.

They assign IP addresses to devices.

C.

They select correct cabling types for deployment.

D.

They solely monitor historical traffic volumes.

A network security team noticed that an increasing number of employees are becoming victims of phishing attacks. Which security program should be implemented to mitigate the problem?

A.

Physical access control

B.

Software firewall enabled on all PCs

C.

Email system patches

D.

User awareness training

What is a characteristic of an SSID in wireless networks?

A.

provides protection against spyware

B.

eliminates network piggybacking

C.

associates a name to a wireless network

D.

allows easy file sharing between endpoints

Which security element uses a combination of one-time passwords, a login name, and a personal smartphone?

A.

software-defined segmentation

B.

multifactor authentication

C.

attribute-based access control

D.

rule-based access control

Refer to the exhibit. During initial configuration testing, the Windows workstation PC1 cannot connect with the 172.16.2.0/24 network.

Which set of actions corrects the configuration?

A.

Change the IP address to 172.16.1.6 and change the subnet mask to 255.255.255.248.

B.

Change the IP address to 172.16.1.6 and change the DNS servers to 172.16.1.12 and 172.16.1.13.

C.

Change the IP address to 172.16.1.9 and change the default gateway to 172.16.1.7.

D.

Change the IP address to 172.16.1.9 and change the DNS server to 172.16.1.12 only.

Which two features are provided by Ansible in network automation? (Choose two.)

A.

supplying network credentials

B.

role-based access control

C.

agentless deployment

D.

manual playbook runs

E.

launching job templates using version control

What is the purpose of the service-set identifier?

A.

It identifies the wired network to which a network device is connected.

B.

It identifies a wireless network for a mobile device to connect.

C.

It identifies the wireless network to which an application must connect.

D.

It identifies the wired network to which a user device is connected.

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

What is an advantage of using SDN versus traditional networking when it comes to security?

A.

SDN security is managed near the perimeter of the network with firewalls, VPNs, and IPS, and traditional networking security policies are created based on telemetry data.

B.

SDN exposes an API to configure locally per device for security policies, and traditional networking uses northbound API for network admin interface for configuring security policies.

C.

SDN creates a unified control point making security policies consistent across all devices, and traditional networking must be configured device by device, leaving room for error.

D.

SDN devices communicate with each other to establish a security policy, and in traditional networking, devices communicate upstream to a central location to establish a security policy.

Aswitch receives a frame with the destination MAC address 3C:5D: 7E:9F: 1A:2B.

Switch# show ethernet-frame-and-mac-address-table

How does the switch handle the frame?

A.

It ages out the frame until the MAC address becomes known.

B.

It drops the frame to avoid unnecessary network congestion.

C.

It switches the frame to a predetermined port based on settings.

D.

It floods the frame to all ports except the incoming port.

Refer to the exhibit. All routers In the network are configured. R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which command sequence must be configured on R2 to be elected as the DR in the network?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

Which combination of methods satisfies the minimum security requirements when a new multifactor authentication solution is deployed?

A.

password of 8 to 15 characters and personal 12-diglt PIN

B.

authorized USB dongle and mobile phone

C.

fingerprint scanning and facial recognition

D.

complex password and time-based one-time password

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?

A.

ip route 10.0.2.0 255.255.255.240 10.0.0.7 92

B.

ip route 10.0.2.0 255.255.255.248 10.0.0.6 91

C.

ip route 10.0.2.0 256.255.255.240 10.0.0.6 91

D.

ip route 10.0.2.0 255.255.255.248 null0 93

Which feature Is mandatory when configuring a new SSID for a wireless network running WPA3-Personal mode?

A.

Opportunistic Wireless Encryption

B.

Protected Management Frame

C.

Enhanced Open

D.

Fast Transition

What is a characteristic of private IPv4 addressing?

A.

alleviates the shortage of IPv4 addresses

B.

reduces the forwarding table on network routers

C.

enables secure connectivity over the internet

D.

used as the NAT outside global IP address

What is a similarity between global and unique local IPv6 addresses?

A.

They are allocated by the same organization.

B.

They are routable on the global internet.

C.

They use the same process for subnetting.

D.

They are part of the multicast IPv6 group type.

Which role does AI play in monitoring network data flow?

A.

It analyzes patterns for anomaly detection.

B.

It exclusively predicts device malfunctions.

C.

It simplifies traffic route mapping.

D.

It enhances data packet delivery speeds.

Which two northbound APIs are found in a software-defined network? (Choose two.)

A.

OpenFlow

B.

REST

C.

OpFlex

D.

SOAP

E.

NETCONF

How does MAC learning function?

A.

Sends frames with unknown destinations to a multicast group.

B.

Increases security on the management VLAN.

C.

Rewrites the source and destination MAC address.

D.

Associates the MAC address with the port on which it is received.

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4's WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4's LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

What is a characteristic of encryption in wireless networks?

A.

uses a unidirectional handshake for authentication

B.

Intercepts data threats before they attack a network

C.

uses integrity checks to identify forgery attacks

D.

prevents intercepted data from being easily read

Why would a network administrator choose to implement RFC 1918 address space?

A.

to route traffic on the internet

B.

to provide flexibility in the IP network design

C.

to provide overlapping address space with another network

D.

to limit the number of hosts on the network

Which type of protocol is VRRP?

A.

uses dynamic IP address assignment

B.

allows two or more routers to act as a default gateway

C.

uses a destination IP address 224.0.0.102 for router-to-router communication

D.

uses Cisco-proprietary First Hop Redundancy Protocol

Refer to the exhibit.

An engineer must document all Wi-Fi services on a new wireless LAN controller. The Wi-Fi SSID "Office_WLan" has Layer 2 Security. What is determined by this configuration?

A.

There is a strong mutual authentication used between NAC and the network devices using x.509 standard.

B.

There is an extra layer of security that ensures only authorized devices with known MAC addresses connect to the network.

C.

There is a robust security mechanism configured to protect against various Layer 2 and Layer 3 attacks.

D.

There is Galois cache algorithm configured that provides strong encryption and authentication.

What is the main capability of multifactor authentication?

A.

Identifying permissions for end users using three authentication factors

B.

Authenticating and authorizing end users using two authentication factors

C.

Confirming end-user identity using two or more authentication factors

D.

Verifying end-user access permissions using two authentication factors

Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?

A.

0.0.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.255

Refer to the exhibit.

Which two prefixes are included in this routing table entry? (Choose two.)

A.

192.168.1.17

B.

192.168.1.61

C.

192.168.1.64

D.

192.168.1.127

E.

192.168.1.254