Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 200-301 - Cisco Certified Network Associate

Page: 1 / 18
Total 1191 questions

Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right

Which device tracks the state of active connections in order to make a decision to forward a packet through?

A.

wireless access point

B.

firewall

C.

wireless LAN controller

D.

router

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?

A.

Layer 2 switch

B.

load balancer

C.

firewall

D.

LAN controller

After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?

A.

Enable the allow AAA Override

B.

Enable the Even: Driven RRM.

C.

Disable the LAG Mode or Next Reboot.

D.

Enable the Authorized MIC APs against auth-list or AAA.

Which statement identifies the functionality of virtual machines?

A.

Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor

B.

The hypervisor can virtualize physical components including CPU. memory, and storage

C.

Each hypervisor can support a single virtual machine and a single software switch

D.

The hypervisor communicates on Layer 3 without the need for additional resources

Drag the IPv6 DNS record types from the left onto the description on the right.

What are two functions of a server on a network? (Choose two)

A.

achieves redundancy by exclusively using virtual server clustering

B.

runs applications that send and retrieve data for workstations that make requests

C.

handles requests from multiple workstations at the same time

D.

runs the same operating system in order to communicate with other servers

E.

housed solely in a data center that is dedicated to a single client

Which IPv6 address block sends packets to a group address rather than a single address?

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/8

Which CRUD operation modifies an existing table or view?

A.

read

B.

create

C.

replace

D.

update

Refer to the exhibit.

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

A.

the path through R1, because the OSPF administrative distance is 110

B.

the path through R2. because the IBGP administrative distance is 200

C.

the path through R2 because the EBGP administrative distance is 20

D.

the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP

What is the purpose of a southbound API in a control based networking architecture?

A.

Facilities communication between the controller and the applications

B.

Facilities communication between the controller and the networking hardware

C.

allows application developers to interact with the network

D.

integrates a controller with other automation and orchestration tools.

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

A.

2000::/3

B.

2002::5

C.

FC00::/7

D.

FF02::1

E.

FF02::2

Which type of information resides on a DHCP server?

A.

a list of the available IP addresses in a pool

B.

a list of public IP addresses and their corresponding names

C.

usernames and passwords for the end users in a domain

D.

a list of statically assigned MAC addresses

What is a function of Wireless LAN Controller?

A.

register with a single access point that controls traffic between wired and wireless endpoints.

B.

use SSIDs to distinguish between wireless clients.

C.

send LWAPP packets to access points.

D.

monitor activity on wireless and wired LANs

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

A.

DHCP

B.

STP

C.

SNMP

D.

DNS

What are two southbound APIs? (Choose two )

A.

OpenFlow

B.

NETCONF

C.

Thrift

D.

CORBA

E.

DSC

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Drag and drop the QoS congestion management terms from the left onto the description on the right.

Refer to the exhibit.

Which type of route does R1 use to reach host 10.10.13.10/32?

A.

floating static route

B.

host route

C.

default route

D.

network route