Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 200-301 - Cisco Certified Network Associate

Page: 6 / 13
Total 1069 questions

How do TCP and UDP differ in the way they provide reliability for delivery of packets?

A.

TCP is a connectionless protocol that does not provide reliable delivery of data, UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery.

B.

TCP does not guarantee delivery or error checking to ensure that there is no corruption of data UDP provides message acknowledgement and retransmits data if lost.

C.

TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking for sequencing

D.

TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake

Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.

What is the function of a hub-and-spoke WAN topology?

A.

allows access restrictions to be implemented between subscriber sites.

B.

provides direct connections between subscribers

C.

supports Layer 2 VPNs

D.

supports application optimization

Refer to the exhibit.

After the election process what is the root bridge in the HQ LAN?

A.

Switch 1

B.

Switch 2

C.

Switch 3

D.

Switch 4

What is the difference in data transmission delivery and reliability between TCP and UDP?

A.

TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to ensure applications receive the data on the remote end.

B.

UDP sets up a connection between both devices before transmitting data. TCP uses the three-way handshake to transmit data with a reliable connection.

C.

UDP is used for multicast and broadcast communication. TCP is used for unicast communication and transmits data at a higher rate with error checking.

D.

TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.

Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right

Refer to the exhibit.

An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What is recommended for the wireless infrastructure design of an organization?

A.

group access points together to increase throughput on a given channel

B.

configure the first three access points are configured to use Channels 1, 6, and 11

C.

include a least two access points on nonoverlapping channels to support load balancing

D.

assign physically adjacent access points to the same Wi-Fi channel

Where does the configuration reside when a helper address Is configured lo support DHCP?

A.

on the router closest to the server

B.

on the router closest to the client

C.

on every router along the path

D.

on the switch trunk interface

What is a DNS lookup operation?

A.

DNS server pings the destination to verify that it is available

B.

serves requests over destination port 53

C.

DNS server forwards the client to an alternate IP address when the primary IP is down

D.

responds to a request for IP address to domain name resolution to the DNS server

Refer to exhibit.

Which statement explains the configuration error message that is received?

A.

It is a broadcast IP address

B.

The router does not support /28 mask.

C.

It belongs to a private IP address range.

D.

IT is a network IP address.

Why was the RFC 1918 address space defined?

A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Which CRUD operation corresponds to the HTTP GET method?

A.

read

B.

update

C.

create

D.

delete

What are two fundamentals of virtualization? (choose two)

A.

The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic

B.

It allows logical network devices to move traffic between virtual machines and the rest of the physical network

C.

It allows multiple operating systems and applications to run independently on one physical server.

D.

It allows a physical router to directly connect NICs from each virtual machine into the network

E.

It requires that some servers, virtual machines and network gear reside on the Internet

Refer to the exhibit.

If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1?

A.

DHCP client

B.

access point

C.

router

D.

PC

How do TCP and UDP differ in the way they guarantee packet delivery?

A.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

B.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

C.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

D.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

A.

DHCP

B.

STP

C.

SNMP

D.

DNS

Refer to the exhibit.

An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?

A.

interface gi0/1no cdp enable

B.

interface gi0/1clear cdp table

C.

interface gi0/0no cdp advertise-v2

D.

interface gi0/0no cdp run

Refer to the exhibit.

PC1 is trying to ping PC3 for the first time and sends out an ARP to S1 Which action is taken by S1?

A.

It forwards it out G0/3 only

B.

It is flooded out every port except G0/0.

C.

It drops the frame.

D.

It forwards it out interface G0/2 only.

What does physical access control regulate?

A.

access to spec fie networks based on business function

B.

access to servers to prevent malicious activity

C.

access to computer networks and file systems

D.

access to networking equipment and facilities