Cisco 200-301 - Cisco Certified Network Associate
Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used
Drag the IPv6 DNS record types from the left onto the description on the right.
Which device tracks the state of active connections in order to make a decision to forward a packet through?
What is a function of Wireless LAN Controller?
What is a benefit of VRRP?
Which device controls the forwarding of authentication requests for users when connecting to the network using a lightweight access point?
Which configuration ensures that the switch is always the root for VLAN 750?
Drag and drop the IPv6 address type characteristics from the left to the right.
A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?
Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right
Refer to the exhibit.
An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:"% Connection refused by remote host" Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?
Which result occurs when PortFast is enabled on an interface that is connected to another switch?
Refer to the exhibit.
A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?
Which set of action satisfy the requirement for multifactor authentication?
Which two QoS tools provides congestion management? ( Choose two )
Refer to the exhibit.
What action establishes the OSPF neighbor relationship without forming an adjacency?
How do AAA operations compare regarding user identification, user services and access control?
Refer to the exhibit.
Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?
A)
B)
C)
D)
What are two descriptions of three-tier network topologies? (Choose two)