Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 200-301 - Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1

Page: 7 / 8
Total 1209 questions

When DHCP is configured on a router, which command must be entered so the default gateway is automatically distributed?

A.

default-router

B.

default-gateway

C.

ip helper-address

D.

dns-server

What is the role of a firewall in an enterprise network?

A.

Forwards packets based on stateless packet inspection

B.

Processes unauthorized packets and allows passage to less secure segments of the network

C.

determines which packets are allowed to cross from unsecured to secured networks

D.

explicitly denies all packets from entering an administrative domain

Refer to the exhibit.

An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What is the primary purpose of a First Hop Redundancy Protocol?

A.

It allows directly connected neighbors to share configuration information.

B.

It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.

C.

It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.

D.

It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.

Which WAN access technology is preferred for a small office / home office architecture?

A.

broadband cable access

B.

frame-relay packet switching

C.

dedicated point-to-point leased line

D.

Integrated Services Digital Network switching.

What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?

A.

initiates a ping request to the URL

B.

prompts the user to specify the desired IP address

C.

continuously attempts to resolve the URL until the command is cancelled

D.

sends a broadcast message in an attempt to resolve the URL

Refer to the exhibit.

Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

A.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any anyinterface GigabitEthernet0/0 ip access-group 100 in

B.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any anyline vty 0 15 ip access-group 100 in

C.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any anyinterface GigabitEthernet0/0 ip access-group 100 in

D.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any anyline vty 0 15 ip access-group 100 in

What is a benefit of using a Cisco Wireless LAN Controller?

A.

Central AP management requires more complex configurations

B.

Unique SSIDs cannot use the same authentication method

C.

It supports autonomous and lightweight APs

D.

It eliminates the need to configure each access point individually

What is a role of wireless controllers in an enterprise network?

A.

centralize the management of access points in an enterprise network

B.

support standalone or controller-based architectures

C.

serve as the first line of defense in an enterprise network

D.

provide secure user logins to devices on the network.

Which level of severity must be set to get informational syslogs?

A.

alert

B.

critical

C.

notice

D.

debug

Which statement identifies the functionality of virtual machines?

A.

Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor

B.

The hypervisor can virtualize physical components including CPU. memory, and storage

C.

Each hypervisor can support a single virtual machine and a single software switch

D.

The hypervisor communicates on Layer 3 without the need for additional resources

Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?

A.

ipv6 address dhcp

B.

ipv6 address 2001:DB8:5:112::/64 eui-64

C.

ipv6 address autoconfig

D.

ipv6 address 2001:DB8:5:112::2/64 link-local

Drag and drop the IPv6 address type characteristics from the left to the right.

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.

Which technology is appropriate for communication between an SDN controller and applications running over the network?

A.

OpenFlow

B.

REST API

C.

NETCONF

D.

Southbound API

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

A.

DHCP

B.

STP

C.

SNMP

D.

DNS

A network engineer is configuring an OSPFv2 neighbor adjacency Drag and drop the parameters from the left onto their required categories on the right. Not all parameters are used

What are two southbound APIs? (Choose two )

A.

OpenFlow

B.

NETCONF

C.

Thrift

D.

CORBA

E.

DSC

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch.

Which two steps will fulfill the request? (Choose two)

A.

Configure the ports in an EtherChannel.

B.

Administratively shut down the ports

C.

Configure the port type as access and place in VLAN 99

D.

Configure the ports as trunk ports

E.

Enable the Cisco Discovery Protocol

An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?

A.

logging trap 5

B.

logging trap 2

C.

logging trap 4

D.

logging trap 3

Which network action occurs within the data plane?

A.

compare the destination IP address to the IP routing table.

B.

run routing protocols (OSPF, EIGRP, RIP, BGP)

C.

make a configuration change from an incoming NETCONF RPC

D.

reply to an incoming ICMP echo request

What uses HTTP messages to transfer data to applications residing on different hosts?

A.

OpenFlow

B.

OpenStack

C.

OpFlex

D.

REST

What occurs to frames during the process of frame flooding?

A.

Frames are sent to every port on the switch in the same VLAN except from the originating port

B.

Frames are sent to every port on the switch that has a matching entry in the MAC address table.

C.

Frames are sent to all ports, including those that are assigned to other VLANs.

D.

Frames are sent to every port on the switch in the same VLAN.

Drag drop the descriptions from the left onto the correct configuration-management technologies on the right.

Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which IPv6 address block sends packets to a group address rather than a single address?

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Refer to the exhibit.

After the election process what is the root bridge in the HQ LAN?

A.

Switch 1

B.

Switch 2

C.

Switch 3

D.

Switch 4

What is a characteristic of cloud-based network topology?

A.

wireless connections provide the sole access method to services

B.

onsite network services are provided with physical Layer 2 and Layer 3 components

C.

services are provided by a public, private, or hybrid deployment

D.

physical workstations are configured to share resources

Which network allows devices to communicate without the need to access the Internet?

A.

1729.0.0/16

B.

172.28.0.0/16

C.

192.0.0.0/8

D.

209.165.201.0/24

Which two WAN architecture options help a business scalability and reliability for the network? (Choose two)

A.

asychronous routing

B.

single-homed branches

C.

dual-homed branches

D.

static routing

E.

dynamic routing

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

A.

role-based access control

B.

biometrics

C.

multifactor authentication

D.

physical access control

What causes a port to be placed in the err-disabled state?

A.

latency

B.

port security violation

C.

shutdown command issued on the port

D.

nothing plugged into the port

Refer to the exhibit.

The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged.

Which command accomplishes this task?

A.

switchport access vlan 67

B.

switchport trunk allowed vlan 67

C.

switchport private-vlan association host 67

D.

switchport trunk native vlan 67

Which device performs stateful inspection of traffic?

A.

firewall

B.

switch

C.

access point

D.

wireless controller

What is the purpose of a southbound API in a control based networking architecture?

A.

Facilities communication between the controller and the applications

B.

Facilities communication between the controller and the networking hardware

C.

allows application developers to interact with the network

D.

integrates a controller with other automation and orchestration tools.

What is a DHCP client?

A.

a host that is configured to request an IP address automatically

B.

a server that dynamically assigns IP addresses to hosts

C.

a workstation that requests a domain name associated with its IP address

D.

a rooter that statically assigns IP addresses to hosts

What is recommended for the wireless infrastructure design of an organization?

A.

group access points together to increase throughput on a given channel

B.

configure the first three access points are configured to use Channels 1, 6, and 11

C.

include a least two access points on nonoverlapping channels to support load balancing

D.

assign physically adjacent access points to the same Wi-Fi channel

Refer to the exhibit.

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255

B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22

C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22

D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?

A.

platform-as-a-service

B.

software-as-a-service

C.

network-as-a-service

D.

infrastructure-as-a-service

Which two encoding methods are supported by REST APIs? (Choose two)

A.

YAML

B.

JSON

C.

EBCDIC

D.

SGML

E.

XML

If a notice-level messaging is sent to a syslog server, which event has occurred?

A.

A network device has restarted

B.

An ARP inspection has failed

C.

A routing instance has flapped

D.

A debug operation is running

Refer to the exhibit.

How must router A be configured so that it only sends Cisco Discovery Protocol Information to router C?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

An engineer is configuring the router to provide static NAT for the webserver Drag and drop the configuration commands from the left onto the letters that correspond to its position in the configuration on the right.

What is a function of Wireless LAN Controller?

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

Refer to the exhibit.

R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and BDR. Which set of configurations must the engineer implement?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option

What is the purpose of using First Hop Redundancy Protocol in a specific subnet?

A.

Filter traffic based on destination IP addressing

B.

Sends the default route to the hosts on a network

C.

ensures a loop-free physical topology

D.

forwards multicast hello messages between routers

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?

A.

The Layer 2 switch drops the received frame

B.

The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.

C.

The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.

D.

The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table

Refer to the exhibit.

Which switch becomes the root bridge?

A.

S1

B.

S2

C.

S3

D.

S4

What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?

A.

different nonoverlapping channels

B.

different overlapping channels

C.

one overlapping channel

D.

one nonoverlapping channel