Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-301 - Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1

Page: 4 / 8
Total 1209 questions

Which type of IPv6 address is publicly routable in the same way as IPv4 public address?

A.

global unicast

B.

link-local

C.

unique local

D.

multicast

Refer to the exhibit.

A network administrator assumes a task to complete the connectivity between PC A and the File Server. Switch A and Switch B have been partially configured with VLAN 10, 11, 12, and 13. What is the next step in the configuration?

A.

Add PC A to VLAN 10 and the File Server to VLAN 11 fa VLAN segmentation

B.

Add VLAN 13 to the trunk links on Switch A and Switch B for VLAN propagation

C.

Add a router on a stick between Switch A and Switch B allowing for Inter-VLAN routing.

D.

Add PC A to the same subnet as the Fie Server allowing for intra-VLAN communication.

Which statement describes virtual machines?

A.

They include a guest OS and the service.

B.

They enable the network to become agile and hardware-centric.

C.

They use a supervisor to provide management for services.

D.

They facilitate local management of infrastructure devices.

Refer to the exhibit. Which next hop is used to route packets to the application server at 152.168.32.85?

A.

10.10.1.2

B.

10.10.2.2

C.

10.10.3.2

D.

10.10.4.2

Refer to the exhibit.

The LACP EtherChannel is configured, and the last change is to modify the interfaces on SwitchA to respond to packets received, but not to initiate negotiation. The interface range gigabitethernet0/0-15 command is entered. What must be configured next?

A.

SwitchA(config-if-range) #channel-group 1 mode desirable

B.

SwitchA(config-if-range) #channel-group 1 mode auto

C.

SwitchA(config-if-range) #channel-group 1 mode active

D.

SwitchA(config-if-range) #channel-group 1 mode passive

How does a network administrator securely manage an AP in lightweight mode?

A.

using the CLI via an out-of-band connection

B.

using the WLC GUI via HTTPS

C.

using the AP GUI via an in-band SSH connection

D.

using the CLI via a virtual interface with SSH

Refer to the exhibit. What is the value of the administrative distance for the default gateway?

A.

10

B.

0

C.

1

D.

110

What are two differences between optical-fiber cabling and copper cabling? (Choose two)

A.

Light is transmitted through the core of the fiber

B.

A BNC connector is used for fiber connections

C.

The glass core component is encased in a cladding

D.

Fiber connects to physical interfaces using Rj-45 connections

E.

The data can pass through the cladding

The SW1 interface g0/1 is in the down/down state. Which two configurations are valid reasons for the interface conditions?(choose two)

A.

There is a duplex mismatch

B.

There is a speed mismatch

C.

There is a protocol mismatch

D.

The interface is shut down

E.

The interface is error-disabled

Which function does an SNMP agent perform?

A.

it sends information about MIB variables in response to requests from the NMS

B.

it requests information from remote network nodes about catastrophic system events.

C.

it manages routing between Layer 3 devices in a network

D.

it coordinates user authentication between a network device and a TACACS+ or RADIUS server

What are two characteristics of a public cloud Implementation? (Choose two.)

A.

It is owned and maintained by one party, but it is shared among multiple organizations.

B.

It enables an organization to fully customize how It deploys network resources.

C.

It provides services that are accessed over the Internet.

D.

It Is a data center on the public Internet that maintains cloud services for only one company.

E.

It supports network resources from a centralized third-party provider and privately-owned virtual resources

An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?

A.

WEP

B.

RC4

C.

AES

D.

TKIP

Which plane is centralized by an SDN controller?

A.

management-plane

B.

control-plane

C.

data-plane

D.

services-plane

Which action does the router take as rt forwards a packet through the network?

A.

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

B.

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

C.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

D.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Which technology must be implemented to configure network device monitoring with the highest security?

A.

IP SLA

B.

syslog

C.

NetFlow

D.

SNMPv3

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?

A.

The application requires an administrator password to reactivate after a configured Interval.

B.

The application requires the user to enter a PIN before it provides the second factor.

C.

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

D.

The application verifies that the user is in a specific location before it provides the second factor.

An office has 8 floors with approximately 30-40 users per floor What command must be configured on the router Switched Virtual Interface to use address space efficiently?

A.

ip address 192.168.0.0 255.255.0.0

B.

ip address 192.168.0.0 255.255.254.0

C.

ip address 192.168.0.0 255.255.255.128

D.

ip address 192.168.0.0 255.255.255.224

Where does wireless authentication happen?

A.

SSID

B.

radio

C.

band

D.

Layer 2

What are two characteristics of a controller-based network? (Choose two)

A.

The administrator can make configuration updates from the CLI

B.

It uses northbound and southbound APIs to communicate between architectural layers

C.

It moves the control plane to a central point.

D.

It decentralizes the control plane, which allows each device to make its own forwarding decisions

E.

It uses Telnet to report system issues.

What is the benefit of configuring PortFast on an interface?

A.

After the cable is connected, the interface uses the fastest speed setting available for that cable type

B.

After the cable is connected, the interface is available faster to send and receive user data

C.

The frames entering the interface are marked with higher priority and then processed faster by a switch.

D.

Real-time voice and video frames entering the interface are processed faster

Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?

A.

FIFO

B.

WFQ

C.

PQ

D.

WRED

Refer to the exhibit.

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

A.

207.165.200.246 via Serial0/1/0

B.

207.165.200.254 via Serial0/0/1

C.

207.165.200.254 via Serial0/0/0

D.

207.165.200.250 via Serial/0/0/0

What is a function of TFTP in network operations?

A.

transfers a backup configuration file from a server to a switch using a username and password

B.

transfers files between file systems on a router

C.

transfers a configuration files from a server to a router on a congested link

D.

transfers IOS images from a server to a router for firmware upgrades

Refer to the exhibit.

If configuring a static default route on the router with the ip route 0.0.0.0 0.0.0.0 10.13.0.1 120 command how does the router respond?

A.

It ignores the new static route until the existing OSPF default route is removed

B.

It immediately replaces the existing OSPF route in the routing table with the newly configured static route

C.

It starts load-balancing traffic between the two default routes

D.

It starts sending traffic without a specific matching entry in the routing table to GigabitEthernet0/1

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

A.

configure the hello and dead timers to match on both sides

B.

configure the same process ID for the router OSPF process

C.

configure the same router ID on both routing processes

D.

Configure the interfaces as OSPF active on both sides.

E.

configure both interfaces with the same area ID

Refer to the exhibit.

Which two commands were used to create port channel 10? (Choose two )

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Where does a switch maintain DHCP snooping information?

A.

in the MAC address table

B.

in the CAM table

C.

in the binding database

D.

in the frame forwarding database

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

A.

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.

After spanning tree converges PortFast shuts down any port that receives BPDUs.

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

A.

enable dynamic MAC address learning

B.

implement static MAC addressing.

C.

enable sticky MAC addressing

D.

implement auto MAC address learning

A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch. What must be configured when using active mode on both sides of the connection?

A.

802.1q trunks

B.

Cisco vPC

C.

LLDP

D.

LACP

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

A.

It allows the traffic to pass through unchanged

B.

It drops the traffic

C.

It tags the traffic with the default VLAN

D.

It tags the traffic with the native VLAN

Refer to the exhibit.

Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?

A.

R2 is using the passive-interface default command

B.

R1 has an incorrect network command for interface Gi1/0

C.

R2 should have its network command in area 1

D.

R1 interface Gil/0 has a larger MTU size

Refer to the exhibit.

A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?

A.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh

B.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp

C.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet

D.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https

Which configuration is needed to generate an RSA key for SSH on a router?

A.

Configure the version of SSH

B.

Configure VTY access.

C.

Create a user with a password.

D.

Assign a DNS domain name

Refer to the exhibit.

With which metric was the route to host 172.16.0.202 learned?

A.

0

B.

110

C.

38443

D.

3184439

When OSPF learns multiple paths to a network, how does it select a route?

A.

It multiple the active K value by 256 to calculate the route with the lowest metric.

B.

For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth.

C.

It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowest cost.

D.

It count the number of hops between the source router and the destination to determine the router with the lowest metric

What is a capability of FTP in network management operations?

A.

encrypts data before sending between data resources

B.

devices are directly connected and use UDP to pass file information

C.

uses separate control and data connections to move files between server and client

D.

offers proprietary support at the session layer when transferring data

Which port type supports the spanning-tree portfast command without additional configuration?

A.

access ports

B.

Layer 3 main Interfaces

C.

Layer 3 suninterfaces

D.

trunk ports

Refer to the exhibit.

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

A.

Exchange

B.

2-way

C.

Full

D.

Init

What is the same for both copper and fiber interfaces when using SFP modules?

A.

They support an inline optical attenuator to enhance signal strength

B.

They provide minimal interruption to services by being hot-swappable

C.

They offer reliable bandwidth up to 100 Mbps in half duplex mode

D.

They accommodate single-mode and multi-mode in a single module

Refer to the exhibit.

What is the effect of this configuration?

A.

The switch port interface trust state becomes untrusted

B.

The switch port remains administratively down until the interface is connected to another switch

C.

Dynamic ARP inspection is disabled because the ARP ACL is missing

D.

The switch port remains down until it is configured to trust or untrust incoming packets

Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.

Refer to the exhibit.

Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?

A.

192.168.0.7

B.

192.168.0.4

C.

192.168.0.40

D.

192.168.3.5

What is the difference between IPv6 unicast and anycast addressing?

A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Refer to the exhibit.

Which network prefix was learned via EIGRP?

A.

172.16.0.0/16

B.

192.168.2.0/24

C.

207.165.200.0/24

D.

192.168.1.0/24

What is a requirement when configuring or removing LAG on a WLC?

A.

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.

The controller must be rebooted after enabling or reconfiguring LAG.

C.

The management interface must be reassigned if LAG disabled.

D.

Multiple untagged interfaces on the same port must be supported.

Which characteristic differentiates the concept of authentication from authorization and accounting?

A.

user-activity logging

B.

service limitations

C.

consumption-based billing

D.

identity verification

An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

A.

switchport mode trunk

B.

switchport mode dynamic desirable

C.

switchport mode dynamic auto

D.

switchport nonegotiate

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

A.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network broadcast

B.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf network point-to-point

C.

router ospf 1network 192.168.1.1 0.0.0.0 area 0interface e1/1ip address 192.168.1.1 255.255.255.252ip ospf cost 0

D.

router ospf 1network 192.168.1.1 0.0.0.0 area 0hello interval 15interface e1/1Ip address 192.168.1.1 255.255.255.252