Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 200-301 - Cisco Certified Network Associate

Page: 7 / 13
Total 1069 questions

Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used

Drag the IPv6 DNS record types from the left onto the description on the right.

Which device tracks the state of active connections in order to make a decision to forward a packet through?

A.

wireless access point

B.

firewall

C.

wireless LAN controller

D.

router

What is a function of Wireless LAN Controller?

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

What is a benefit of VRRP?

A.

It provides traffic load balancing to destinations that are more than two hops from the source.

B.

It provides the default gateway redundancy on a LAN using two or more routers.

C.

It allows neighbors to share routing table information between each other.

D.

It prevents loops in a Layer 2 LAN by forwarding all traffic to a root bridge, which then makes the final forwarding decision.

Which device controls the forwarding of authentication requests for users when connecting to the network using a lightweight access point?

A.

TACACS server

B.

wireless access point

C.

RADIUS server

D.

wireless LAN controller

Which configuration ensures that the switch is always the root for VLAN 750?

A.

Switch(config)#spanning-tree vlan 750 priority 38003685

B.

Switch(config)#spanning-tree vlan 750 root primary

C.

Switch(config)#spanning-tree vlan 750 priority 614440

D.

Switch(config)#spanning-tree vlan 750 priority 0

Drag and drop the IPv6 address type characteristics from the left to the right.

A network engineer must back up 20 network router configurations globally within a customer environment. Which protocol allows the engineer to perform this function using the Cisco IOS MIB?

A.

CDP

B.

SNMP

C.

SMTP

D.

ARP

Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right

Refer to the exhibit.

An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:"% Connection refused by remote host" Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?

A.

Add the access-list 10 permit any command to the configuration

B.

Remove the access-class 10 in command from line vty 0.4.

C.

Add the ip access-group 10 out command to interface g0/0.

D.

Remove the password command from line vty 0 4.

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

A.

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.

After spanning tree converges PortFast shuts down any port that receives BPDUs.

Refer to the exhibit.

A network administrator has been tasked with securing VTY access to a router. Which access-list entry accomplishes this task?

A.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq ssh

B.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq scp

C.

access-list 101 permit tcp 10.11.0 0.0.0.255 172.16.10 0.0.0.255 eq telnet

D.

access-list 101 permit tcp 10.1.10 0.0.0.255 172.16.10 0.0.0.255 eq https

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

A.

enable dynamic MAC address learning

B.

implement static MAC addressing.

C.

enable sticky MAC addressing

D.

implement auto MAC address learning

Which set of action satisfy the requirement for multifactor authentication?

A.

The user swipes a key fob, then clicks through an email link

B.

The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device

C.

The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen

D.

The user enters a user name and password and then re-enters the credentials on a second screen

Which two QoS tools provides congestion management? ( Choose two )

A.

CAR

B.

CBWFQ

C.

PQ

D.

PBR

E.

FRTS

Refer to the exhibit.

What action establishes the OSPF neighbor relationship without forming an adjacency?

A.

modify hello interval

B.

modify process ID

C.

modify priority

D.

modify network type

How do AAA operations compare regarding user identification, user services and access control?

A.

Authorization provides access control and authentication tracks user services

B.

Authentication identifies users and accounting tracks user services

C.

Accounting tracks user services, and authentication provides access control

D.

Authorization identifies users and authentication provides access control

Refer to the exhibit.

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What are two descriptions of three-tier network topologies? (Choose two)

A.

The core and distribution layers perform the same functions

B.

The access layer manages routing between devices in different domains

C.

The network core is designed to maintain continuous connectivity when devices fail.

D.

The core layer maintains wired connections for each host

E.

The distribution layer runs Layer 2 and Layer 3 technologies