Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 200-301 Cisco Certified Network Associate is now Stable and With Pass Result

200-301 Practice Exam Questions and Answers

Cisco Certified Network Associate

Last Update 3 days ago
Total Questions : 959

Cisco Certified Network Associate is stable now with all latest exam questions are added 3 days ago. Incorporating 200-301 practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Cisco Certified Network Associate exam format, identifying knowledge gaps, applying theoretical knowledge in Cisco practical scenarios, you are setting yourself up for success. 200-301 exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

200-301 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through 200-301 dumps allows you to practice pacing yourself, ensuring that you can complete all Cisco Certified Network Associate exam questions within the allotted time frame without sacrificing accuracy.

200-301 PDF

200-301 PDF (Printable)
$53.2
$132.99

200-301 Testing Engine

200-301 PDF (Printable)
$58
$144.99

200-301 PDF + Testing Engine

200-301 PDF (Printable)
$72.8
$181.99
Question # 1

When a WPA2-PSK WLAN is configured in the Wireless LAN Controller, what is the minimum number of characters that is required in ASCII format?

Options:

A.  

6

B.  

8

C.  

12

D.  

18

Discussion 0
Question # 2

Which cable type must be used to interconnect one switch using 1000 BASE-SX GBiC modules and another switch using 1000 BASE-SX SFP modules?

Options:

A.  

LC to SC

B.  

SC t ST

C.  

SC to SC

D.  

LC to LC

Discussion 0
Question # 3

Refer to the exhibit.

Question # 3

When router R1 is sending traffic to IP address 10.56.192 1, which interface or next hop address does it use to route the packet?

Options:

A.  

0.0.0.0.0/0

B.  

10.56.0.1

C.  

10.56.128.19

D.  

Vlan57

Discussion 0
Question # 4

A Cisco engineer notices thai two OSPF neighbors are connected using a crossover Ethernet cable. The neighbors are taking too long to become fully adjacent. Which command must be issued under the interface configuration on each router to reduce the time required for the adjacency to reach the FULL state?

Options:

A.  

ip ospf network broadcast

B.  

ip ospf dead-interval 40

C.  

ip ospf network point-to-point

D.  

ip ospf priority 0

Discussion 0
Question # 5

Which WPA mode uses PSK authentication?

Options:

A.  

Local

B.  

Client

C.  

Enterprise

D.  

Personal

Discussion 0
Question # 6

What does WPA3 provide in wireless networking?

Options:

A.  

safeguards against brute force attacks with SAE

B.  

optional Protected Management Frame negotiation

C.  

backward compatibility with WPAand WPA2

D.  

increased security and requirement of a complex configuration

Discussion 0
Question # 7

Why is TCP desired over UDP for application that require extensive error checking, such as HTTPS?

Options:

A.  

UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet received.

B.  

UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.

C.  

UDP uses flow control mechanisms for the delivery of packets, and TCP uses congestion control for efficient packet delivery.

D.  

UDP uses sequencing data tor packets to arrive in order, and TCP offers trie capability to receive packets in random order.

Discussion 0
Question # 8

Refer to the exhibit.

Question # 8

All interfaces are configured with duplex auto and ip ospf network broadcast. Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency and act as a central point for exchanging OSPF information between routers?

Question # 8

Question # 8

Question # 8

Question # 8

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

option D

Discussion 0
Question # 9

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

Question # 9

Options:

Discussion 0
Question # 10

Options:

A.  

LAG

B.  

EtherChannel

C.  

trunk

D.  

access

Discussion 0
Question # 11

Refer to the exhibit.

Question # 11

Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?

Options:

A.  

Interface range G1/1 – 1/3 switchport mode trunk channel-group 1 mode active no shutdown

B.  

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode passive no shutdown

C.  

Interface range G1/1 – 1/3 switchport mode trunk

channel-group 1 mode desirable

no shutdown

D.  

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode on no shutdown

Discussion 0
Question # 12

Configure IPv4 and IPv6 connectivity between two routers. For IPv4, use a /28 network from the 192.168.1.0/24 private range. For IPv6, use the first /64 subnet from the 2001:0db8:aaaa::/48 subnet.

1. Using Ethernet0/1 on routers R1 and R2, configure the next usable/28 from the 192.168.1.0/24 range. The network 192.168.1.0/28 is unavailable.

2. For the IPv4 /28 subnet, router R1 must be configured with the first usable host address.

3. For the IPv4 /28 subnet, router R2 must be configured with the last usable host address.

4. For the IPv6 /64 subnet, configure the routers with the IP addressing provided from the topology.

5. A ping must work between the routers on the IPv4 and IPv6 address ranges.

Question # 12Question # 12

Options:

Discussion 0
Question # 13

Refer to the exhibit.

Question # 13

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

Options:

A.  

the path through R1, because the OSPF administrative distance is 110

B.  

the path through R2. because the IBGP administrative distance is 200

C.  

the path through R2 because the EBGP administrative distance is 20

D.  

the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP

Discussion 0
Question # 14

Refer to the exhibit.

Question # 14

Between which zones do wireless users expect to experience intermittent connectivity?

Options:

A.  

between zones 1 and 2

B.  

between zones 2 and 5

C.  

between zones 3 and 4

D.  

between zones 3 and 6

Discussion 0
Question # 15

Refer to the exhibit.

Question # 15

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Options:

A.  

passive

B.  

mode on

C.  

auto

D.  

active

Discussion 0
Question # 16

Which plane is centralized by an SDN controller?

Options:

A.  

management-plane

B.  

control-plane

C.  

data-plane

D.  

services-plane

Discussion 0
Question # 17

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

Options:

A.  

enable dynamic MAC address learning

B.  

implement static MAC addressing.

C.  

enable sticky MAC addressing

D.  

implement auto MAC address learning

Discussion 0
Question # 18

Which configuration is needed to generate an RSA key for SSH on a router?

Options:

A.  

Configure the version of SSH

B.  

Configure VTY access.

C.  

Create a user with a password.

D.  

Assign a DNS domain name

Discussion 0
Question # 19

A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?

Options:

A.  

cost

B.  

adminstrative distance

C.  

metric

D.  

as-path

Discussion 0
Question # 20

Which statement correctly compares traditional networks and controller-based networks?

Options:

A.  

Only traditional networks offer a centralized control plane

B.  

Only traditional networks natively support centralized management

C.  

Traditional and controller-based networks abstract policies from device configurations

D.  

Only controller-based networks decouple the control plane and the data plane

Discussion 0
Question # 21

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two )

Options:

A.  

Telnet

B.  

SSH

C.  

HTTP

D.  

HTTPS

E.  

TFTP

Discussion 0
Question # 22

How does a Cisco Unified Wireless network respond to Wi-Fi channel overlap?

Options:

A.  

It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points

B.  

It allows the administrator to assign channels on a per-device or per-interface basis.

C.  

It segregates devices from different manufacturers onto different channels.

D.  

It analyzes client load and background noise and dynamically assigns a channel.

Discussion 0
Question # 23

Refer to Exhibit.

Question # 23

Which action do the switches take on the trunk link?

Options:

A.  

The trunk does not form and the ports go into an err-disabled status.

B.  

The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.

C.  

The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.

D.  

The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.

Discussion 0
Question # 24

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

Options:

A.  

configure the hello and dead timers to match on both sides

B.  

configure the same process ID for the router OSPF process

C.  

configure the same router ID on both routing processes

D.  

Configure the interfaces as OSPF active on both sides.

E.  

configure both interfaces with the same area ID

Discussion 0
Question # 25

What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?

Options:

A.  

No router ID is set, and the OSPF protocol does not run.

B.  

The highest up/up physical interface IP address is selected as the router I

D.  

C.  

The lowest IP address is incremented by 1 and selected as the router I

D.  

D.  

The router ID 0.0.0.0 is selected and placed in the OSPF process.

Discussion 0
Question # 26

Refer to the exhibit.

Question # 26

Drag and drop the networking parameters from the left onto the correct values on the right.

Question # 26

Options:

Discussion 0
Question # 27

Which protocol does an access point use to draw power from a connected switch?

Options:

A.  

Internet Group Management Protocol

B.  

Adaptive Wireless Path Protocol

C.  

Cisco Discovery Protocol

D.  

Neighbor Discovery Protocol

Discussion 0
Question # 28

What are two descriptions of three-tier network topologies? (Choose two)

Options:

A.  

The core and distribution layers perform the same functions

B.  

The access layer manages routing between devices in different domains

C.  

The network core is designed to maintain continuous connectivity when devices fail.

D.  

The core layer maintains wired connections for each host

E.  

The distribution layer runs Layer 2 and Layer 3 technologies

Discussion 0
Question # 29

Refer to the exhibit.

Question # 29

What is the effect of this configuration?

Options:

A.  

All ARP packets are dropped by the switch

B.  

Egress traffic is passed only if the destination is a DHCP server.

C.  

All ingress and egress traffic is dropped because the interface is untrusted

D.  

The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings.

Discussion 0
Question # 30

Refer to the exhibit.

Question # 30

Router R2 is configured with multiple routes to reach network 10 1.1 0/24 from router R1. What protocol is chosen by router R2 to reach the destination network 10.1 1 0/24?

Options:

A.  

eBGP

B.  

static

C.  

OSPF

D.  

EIGRP

Discussion 0
Question # 31

What Is the path for traffic sent from one user workstation to another workstation on a separate switch In a Ihree-lter architecture model?

Options:

A.  

access - core - distribution - access

B.  

access - distribution - distribution - access

C.  

access - core - access

D.  

access -distribution - core - distribution - access

Discussion 0
Question # 32

Refer to the exhibit.

Question # 32

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.

Question # 32

Options:

Discussion 0
Question # 33

Refer to the exhibit.

Question # 33

An administrator configures four switches for local authentication using passwords that are stored in a cryptographic hash. The four switches must also support SSH access for administrators to manage the network infrastructure. Which switch is configured correctly to meet these requirements?

Options:

A.  

SW1

B.  

SW2

C.  

SW3

D.  

SW4

Discussion 0
Question # 34

Why does a switch flood a frame to all ports?

Options:

A.  

The frame has zero destination MAC addresses.

B.  

The source MAC address of the frame is unknown

C.  

The source and destination MAC addresses of the frame are the same

D.  

The destination MAC address of the frame is unknown.

Discussion 0
Question # 35

Refer to the exhibit.

Question # 35

Only four switches are participating in the VLAN spanning-tree process.

Branch-1 priority 614440

Branch-2: priority 39082416

Branch-3: priority 0

Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

Options:

A.  

Branch-1

B.  

Branch-2

C.  

Branch-3

D.  

Branch-4

Discussion 0
Question # 36

When the active router in an HSRP group fails, what router assumes the role and forwards packets?

Options:

A.  

backup

B.  

standby

C.  

listening

D.  

forwarding

Discussion 0
Question # 37

When a WLAN with WPA2 PSK is configured in the Wireless LAN Controller GUI which format is supported?

Options:

A.  

Unicode

B.  

base64

C.  

decimal

D.  

ASCII

Discussion 0
Question # 38

Which function is performed by DHCP snooping?

Options:

A.  

propagates VLAN information between switches

B.  

listens to multicast traffic for packet forwarding

C.  

provides DDoS mitigation

D.  

rate-limits certain traffic

Discussion 0
Question # 39

What is the primary different between AAA authentication and authorization?

Options:

A.  

Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.

B.  

Authentication identifies a user who is attempting to access a system, and authorization validates the users password

C.  

Authentication identifies and verifies a user who is attempting to access a system, and authorization controls the tasks the user can perform.

D.  

Authentication controls the system processes a user can access and authorization logs the activities the user initiates

Discussion 0
Question # 40

Drag and drop the lightweight access point operation modes from the left onto the descriptions on the right

Question # 40

Options:

Discussion 0
Question # 41

An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines?

Options:

A.  

hypervisor

B.  

router

C.  

straight cable

D.  

switch

Discussion 0
Question # 42

When deploying syslog, which severity level logs informational message?

Options:

A.  

0

B.  

2

C.  

4

D.  

6

Discussion 0
Question # 43

Which action does the router take as rt forwards a packet through the network?

Options:

A.  

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

B.  

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

C.  

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

D.  

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Discussion 0
Question # 44

Which command must be entered to configure a DHCP relay?

Options:

A.  

ip helper-address

B.  

ip address dhcp

C.  

ip dhcp pool

D.  

ip dhcp relay

Discussion 0
Question # 45

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

Options:

A.  

TKiP encryption

B.  

AES encryption

C.  

scrambled encryption key

D.  

SAE encryption

Discussion 0
Question # 46

Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?

Options:

A.  

FIFO

B.  

WFQ

C.  

PQ

D.  

WRED

Discussion 0
Question # 47

Refer to the exhibit.

Question # 47

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

Options:

A.  

207.165.200.246 via Serial0/1/0

B.  

207.165.200.254 via Serial0/0/1

C.  

207.165.200.254 via Serial0/0/0

D.  

207.165.200.250 via Serial/0/0/0

Discussion 0
Question # 48

A corporate office uses four floors in a building

• Floor 1 has 24 users

• Floor 2 has 29 users

• Floor 3 has 28 users

•Floor 4 has 22 users

Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?

Options:

A.  

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

B.  

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

C.  

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

D.  

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

Discussion 0
Question # 49

Which JSON data type is an unordered set of attribute- value pairs?

Options:

A.  

array

B.  

string

C.  

object

D.  

Boolean

Discussion 0
Question # 50

When a WPA2-PSK WLAN is configured in the wireless LAN Controller, what is the minimum number of characters that in ASCll format?

Options:

A.  

6

B.  

8

C.  

12

D.  

18

Discussion 0
Question # 51

Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?

Options:

A.  

20

B.  

90

C.  

110

D.  

115

Discussion 0
Question # 52

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.

Which two misconfigurations cause this behavior? (Choose two)

Options:

A.  

The packets fail to match any permit statement

B.  

A matching permit statement is too high in the access test

C.  

A matching permit statement is too broadly defined

D.  

The ACL is empty

E.  

A matching deny statement is too high in the access list

Discussion 0
Question # 53

Refer to the exhibit.

Question # 53

Which two prefixes are included in this routing table entry? (Choose two.)

Options:

A.  

192.168.1.17

B.  

192.168.1.61

C.  

192.168.1.64

D.  

192.168.1.127

E.  

192.168.1.254

Discussion 0
Question # 54

What are two differences between optical-fiber cabling and copper cabling? (Choose two)

Options:

A.  

Light is transmitted through the core of the fiber

B.  

A BNC connector is used for fiber connections

C.  

The glass core component is encased in a cladding

D.  

Fiber connects to physical interfaces using Rj-45 connections

E.  

The data can pass through the cladding

Discussion 0
Question # 55

What role does a hypervisor provide for each virtual machine in server virtualization?

Options:

A.  

infrastructure-as-a-service.

B.  

Software-as-a-service

C.  

control and distribution of physical resources

D.  

services as a hardware controller.

Discussion 0
Question # 56

Refer to the exhibit.

Question # 56

Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?

Options:

A.  

switchport mode trunk

B.  

switchport mode dot1-tunnel

C.  

switchport mode dynamic auto

D.  

switchport mode dynamic desirable

Discussion 0
Question # 57

Refer to the exhibit.

Question # 57

Which command configures a floating static route to provide a backup to the primary link?

Options:

A.  

ip route 0.0.0.0 0.0.0.0 209.165.202.131

B.  

ip route 209.165.201.0 255.255.255.224 209.165.202.130

C.  

ip route 0.0.0.0 0.0.0.0 209.165.200.224

D.  

ip route 209.165.200.224 255.255.255.224 209.165.202.129 254

Discussion 0
Question # 58

With REST API, which standard HTTP header tells a server which media type is expected by the client?

Options:

A.  

Accept-Encoding: gzip. deflate

B.  

Accept-Patch: text/example; charset=utf-8

C.  

Content-Type: application/json; charset=utf-8

D.  

Accept: application/json

Discussion 0
Question # 59

What is a function of a Layer 3 switch?

Options:

A.  

move frames between endpoints limited to IP addresses

B.  

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.  

forward Ethernet frames between VLANs using only MAC addresses

D.  

flood broadcast traffic within a VLAN

Discussion 0
Question # 60

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

Options:

A.  

DHCP relay agent

B.  

DHCP server

C.  

DHCPDISCOVER

D.  

DHCPOFFER

Discussion 0
Question # 61

Question # 61

Question # 61

Question # 61

IP connectivity and OSPF are preconfigured on all devices where necessary. Do not make any changes to the IP addressing or OSP

F.  

The company policy uses connected interfaces and next hops when configuring static routes except for load balancing or redundancy without floating static. Connectivity must be established between subnet 172.20.20.128/25 on the Internet and the LAN at 192.168.0.0/24 connected to SW1:

1. Configure reachability to the switch SW1 LAN subnet in router R2.

2. Configure default reachability to the Internet subnet in router R1.

3. Configure a single static route in router R2 to reach to the Internet subnet considering both redundant links between routers R1 and R2. A default route is NOT allowed in router R2.

4. Configure a static route in router R1 toward the switch SW1 LAN subnet where the primary link must be through Ethernet0/1. and the backup link must be through Ethernet0/2 using a floating route. Use the minimal administrative distance value when required.

Options:

Discussion 0
Question # 62

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Question # 62

Options:

Discussion 0
Question # 63

Physical connectivity is implemented between the two Layer 2 switches, and the network connectivity between them must be configured

1. Configure an LACP EtherChannel and number it as 1; configure it between switches SW1 and SVV2 using interfaces Ethernet0/0 and Ethernet0/1 on both sides. The LACP mode must match on both ends

2 Configure the EtherChannel as a trunk link.

3. Configure the trunk link with 802.1 q tags.

4. Configure the native VLAN of the EtherChannel as VLAN 15.

Question # 63Question # 63

Options:

Discussion 0
Question # 64

Question # 64

Question # 64

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Options:

Discussion 0
Question # 65

Physical connectivity is implemented between the two Layer 2 switches,

and the network connectivity between them must be configured.

I . Configure an LACP EtherChanneI and number it as 44; configure it

between switches SWI and SW2 using interfaces EthernetO/O and

Ethernet0/1 on both sides. The LACP mode must match on both ends.

2. Configure the EtherChanneI as a trunk link.

3. Configure the trunk link with 802. Iq tags.

4. Configure VLAN 'MONITORING' as the untagged VLAN of the

EtherChannel.

==================

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Question # 65

Options:

Discussion 0
Question # 66

Question # 66

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

Question # 66

Options:

Discussion 0
Question # 67

Question # 67

Question # 67

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Options:

Discussion 0
Question # 68

Question # 68

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

Question # 68

Options:

Discussion 0
Question # 69

Connectivity between four routers has been established. IP connectivity must be configured in the order presented to complete the implementation. No dynamic routing protocols are included.

1. Configure static routing using host routes to establish connectivity from router R3 to the router R1 Loopback address using the source IP of 209.165.200.230.

2. Configure an IPv4 default route on router R2 destined for router R4.

3. Configure an IPv6 default router on router R2 destined for router R4.

Question # 69Question # 69

Options:

Discussion 0
Question # 70

How do servers connect to the network in a virtual environment?

Options:

A.  

wireless to an access point that is physically connected to the network

B.  

a cable connected to a physical switch on the network

C.  

a virtual switch that links to an access point that is physically connected to the network

D.  

a software switch on a hypervisor that is physically connected to the network

Discussion 0
Question # 71

Drag the IPv6 DNS record types from the left onto the description on the right.

Question # 71

Options:

Discussion 0
Question # 72

Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?

Options:

A.  

role-based access control

B.  

biometrics

C.  

multifactor authentication

D.  

physical access control

Discussion 0
Question # 73

Which 802.11 frame type is association response?

Options:

A.  

management

B.  

protected frame

C.  

control

D.  

action

Discussion 0
Question # 74

Refer to the exhibit.

Question # 74

If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?

Options:

A.  

It load-balances traffic out of Fa0/1 and Fa0/2.

B.  

It is unreachable and discards the traffic.

C.  

It sends packets out of interface FaO/2.

D.  

It sends packets out of interface Fa0/1.

Discussion 0
Question # 75

Drag and drop the descriptions of file-transfer protocols from the left onto the correct protocols on the right.

Question # 75

Options:

Discussion 0
Question # 76

Drag and drop the IPv6 address type characteristics from the left to the right.

Question # 76

Options:

Discussion 0
Question # 77

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:

A.  

Provide uninterrupted forwarding service.

B.  

Police traffic that is sent to the edge of the network.

C.  

Provide direct connectivity for end user devices.

D.  

Ensure timely data transfer between layers.

E.  

Inspect packets for malicious activity.

Discussion 0
Question # 78

What event has occurred if a router sends a notice level message to a syslog server?

Options:

A.  

A TCP connection has been torn down

B.  

An ICMP connection has been built

C.  

An interface line has changed status

D.  

A certificate has expired.

Discussion 0
Question # 79

Refer to the exhibit.

Question # 79

Which type of configuration is represented in the output?

Options:

A.  

Ansible

B.  

JSON

C.  

Chef

D.  

Puppet

Discussion 0
Question # 80

Drag and drop the DNS lookup components from the left onto the functions on the right.

Question # 80

Options:

Discussion 0
Question # 81

What facilitates a Telnet connection between devices by entering the device name?

Options:

A.  

SNMP

B.  

DNS lookup

C.  

syslog

D.  

NTP

Discussion 0
Question # 82

Drag and drop the WLAN components from the left onto the correct descriptions on the right.

Question # 82

Options:

Discussion 0
Question # 83

What are two improvements provided by automation for network management in an SDN environment? (Choose two)

Options:

A.  

Data collection and analysis tools establish a baseline for the network

B.  

Artificial intelligence identifies and prevents potential design failures.

C.  

Machine learning minimizes the overall error rate when automating troubleshooting processes

D.  

New devices are onboarded with minimal effort

E.  

Proprietary Cisco APIs leverage multiple network management tools.

Discussion 0
Question # 84

Which statement identifies the functionality of virtual machines?

Options:

A.  

Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor

B.  

The hypervisor can virtualize physical components including CPU. memory, and storage

C.  

Each hypervisor can support a single virtual machine and a single software switch

D.  

The hypervisor communicates on Layer 3 without the need for additional resources

Discussion 0
Question # 85

Refer to the exhibit.

Question # 85

When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?

Options:

A.  

Layer 2 switch

B.  

Router

C.  

Load balancer

D.  

firewall

Discussion 0
Question # 86

Refer to the exhibit.

Question # 86

What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?

Options:

A.  

R1(config)#interface ethernet0/0

R1(config)#encapsulation dot1q 20

R1(config)#ip address 10.20.20.1 255.255.255.0

B.  

R1(config)#interface ethernet0/0.20

R1(config)#encapsulation dot1q 20

R1(config)#ip address 10.20.20.1 255.255.255.0

C.  

R1(config)#interface ethernet0/0.20

R1(config)#ip address 10.20.20.1 255.255.255.0

D.  

R1(config)#interface ethernet0/0

R1(config)#ip address 10.20.20.1 255.255.255.0

Discussion 0
Question # 87

OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?

Options:

A.  

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf network broadcast

B.  

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf network point-to-point

C.  

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

interface e1/1

ip address 192.168.1.1 255.255.255.252

ip ospf cost 0

D.  

router ospf 1

network 192.168.1.1 0.0.0.0 area 0

hello interval 15

interface e1/1

Ip address 192.168.1.1 255.255.255.252

Discussion 0
Question # 88

Which two WAN architecture options help a business scalability and reliability for the network? (Choose two)

Options:

A.  

asychronous routing

B.  

single-homed branches

C.  

dual-homed branches

D.  

static routing

E.  

dynamic routing

Discussion 0
Question # 89

Refer to the exhibit.

Question # 89

A company is configuring a failover plan and must implement the default routes in such a way that a floating static route will assume traffic forwarding when the primary link goes down. Which primary route configuration must be used?

Options:

A.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2 GigabitEthernetl/0

B.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2 tracked

C.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2 floating

D.  

ip route 0.0.0.0 0.0.0.0 192.168.0.2

Discussion 0
Question # 90

Refer to the exhibit.

Question # 90

Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?

Options:

A.  

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 100

B.  

R3(config)#interface Gig0/0 R3(config-if)#ip ospf priority 100

C.  

R3(config)#interface Gig0/0 R3(config-if)i=ip ospf priority 1

D.  

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 0

Discussion 0
Question # 91

Refer to the exhibit.

Question # 91

How should the configuration be updated to allow PC1 and PC2 access to the Internet?

Options:

A.  

Modify the configured number of the second access list.

B.  

Add either the ip nat {inside|outside} command under both interfaces.

C.  

Remove the overload keyword from the ip nat inside source command.

D.  

Change the ip nat inside source command to use interface GigabitEthernet0/0.

Discussion 0
Question # 92

Refer to the exhibit.

Question # 92

Host A sent a data frame destined for host D

Question # 92

What does the switch do when it receives the frame from host A?

Options:

A.  

It drops the frame from the switch CAM table.

B.  

It floods the frame out of all ports except port Fa0/1.

C.  

It shuts down the port Fa0/1 and places it in err-disable mode.

D.  

It experiences a broadcast storm.

Discussion 0
Question # 93

Which action implements physical access control as part of the security program of an organization?

Options:

A.  

configuring a password for the console port

B.  

backing up syslogs at a remote location

C.  

configuring enable passwords on network devices

D.  

setting up IP cameras to monitor key infrastructure

Discussion 0
Question # 94

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:

A.  

password password

B.  

crypto key generate rsa modulus 1024

C.  

ip domain-name domain

D.  

ip ssh authentication-retries 2

Discussion 0
Question # 95

Refer to the exhibit.

Question # 95

The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

A)

Question # 95

B)

Question # 95

C)

Question # 95

D)

Question # 95

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 96

A Cisco engineer is configuring a factory-default router with these three passwords:

• The user EXEC password for console access is p4ssw0rd1

• The user EXEC password for Telnet access is s3cr3t2

• The password for privileged EXEC mode is pnv4t3p4ss Which command sequence must the engineer configured

A)

Question # 96

B)

Question # 96

C)

Question # 96

D)

Question # 96

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 97

Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.

Question # 97

Options:

Discussion 0
Question # 98

Refer to the exhibit.

Question # 98

Which plan must be Implemented to ensure optimal QoS marking practices on this network?

Options:

A.  

As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer.

B.  

Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2.

C.  

Remark traffic as it traverses R1 and trust all markings at the access layer.

D.  

As traffic enters from the access layer on SW1 and SW2. trust all traffic markings.

Discussion 0
Question # 99

What is a requirement for nonoverlapping Wi-Fi channels?

Options:

A.  

different security settings

B.  

discontinuous frequency ranges

C.  

different transmission speeds

D.  

unique SSIDs

Discussion 0
Question # 100

Which two network actions occur within the data plane? (Choose two.)

Options:

A.  

Add or remove an 802.1Q trunking header.

B.  

Make a configuration change from an incoming NETCONF RP

C.  

C.  

Run routing protocols.

D.  

Match the destination MAC address to the MAC address table.

E.  

Reply to an incoming ICMP echo request.

Discussion 0
Question # 101

What is a function of Opportunistic Wireless Encryption in an environment?

Options:

A.  

offer compression

B.  

increase security by using a WEP connection

C.  

provide authentication

D.  

protect traffic on open networks

Discussion 0
Question # 102

Refer to the exhibit.

Question # 102

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?

A)

Question # 102

B)

Question # 102

C)

Question # 102

D)

Question # 102

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 103

Which field within the access-request packet is encrypted by RADIUS?

Options:

A.  

authorized services

B.  

authenticator

C.  

username

D.  

password

Discussion 0
Question # 104

Refer to the exhibit.

Question # 104

Traffic sourced from the loopback0 Interface is trying to connect via ssh to the host at 10.0.1.15. What Is the next hop to the destination address?

Options:

A.  

192.168.0.7

B.  

192.168.0.4

C.  

192.168.0.40

D.  

192.168.3.5

Discussion 0
Question # 105

Which action is taken by the data plane within a network device?

Options:

A.  

forwards traffic to the next hop

B.  

constructs a routing table based on a routing protocol

C.  

provides CLI access to the network device

D.  

looks up an egress interface in the forwarding information base

Discussion 0
Question # 106

Refer to the exhibit.

Question # 106

The link between PC1 and the switch is up. but it is performing poorly. Which interface condition is causing the performance problem?

Options:

A.  

There is a duplex mismatch on the interface

B.  

There is an issue with the fiber on the switch interface.

C.  

There is a speed mismatch on the interface.

D.  

There is an interface type mismatch

Discussion 0
Question # 107

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165 200 225

How should R1 be configured?

A)

Question # 107

B)

Question # 107

C)

Question # 107

D)

Question # 107

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 108

What is the function of the controller in a software-defined network?

Options:

A.  

multicast replication at the hardware level

B.  

fragmenting and reassembling packets

C.  

making routing decisions

D.  

forwarding packets

Discussion 0
Question # 109

Refer to the exhibit.

Question # 109

Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?

Options:

A.  

10.10.10.5

B.  

10.10.11.2

C.  

10.10.12.2

D.  

10.10.10.9

Discussion 0
Question # 110

Refer to the exhibit.

Question # 110

Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?

Options:

A.  

via next-hop 10.0.1.5

B.  

via next-hop 10 0 1.4

C.  

via next-hop 10.0 1.50

D.  

via next-hop 10.0 1 100

Discussion 0
Question # 111

Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right.

Question # 111

Options:

Discussion 0
Question # 112

What is a function of a Next-Generation IPS?

Options:

A.  

makes forwarding decisions based on learned MAC addresses

B.  

serves as a controller within a controller-based network

C.  

integrates with a RADIUS server to enforce Layer 2 device authentication rules

D.  

correlates user activity with network events

Discussion 0
Question # 113

Refer to the exhibit.

Question # 113

Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?

Options:

A.  

ip route 0.0.0.0 0.0.0.0 g0/1 1

B.  

ip route 0.0.0.0 0.0.0.0 209.165.201.5 10

C.  

ip route 0.0.0.0 0.0.0.0 209.165.200.226 1

D.  

ip route 0,0.0.0 0.0.0.0 g0/1 6

Discussion 0
Question # 114

Refer to the exhibit.

Question # 114

Which command must be issued to enable a floating static default route on router A?

Options:

A.  

lp route 0.0.0.0 0.0.0.0 192.168.1.2

B.  

ip default-gateway 192.168.2.1

C.  

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10

D.  

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10

Discussion 0
Question # 115

A Cisco engineer must configure a single switch interface to meet these requirements

• accept untagged frames and place them in VLAN 20

• accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone

Which command set must the engineer apply?

A)

Question # 115

B)

Question # 115

C)

Question # 115

D)

Question # 115

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 116

Refer to the exhibit.

Question # 116

Site A was recently connected to site B over a new single-mode fiber path. Users at site A report Intermittent connectivity Issues with applications hosted at site

B.  

What is the reason for the problem?

Options:

A.  

Heavy usage is causing high latency.

B.  

An incorrect type of transceiver has been inserted into a device on the link.

C.  

physical network errors are being transmitted between the two sites.

D.  

The wrong cable type was used to make the connection.

Discussion 0
Question # 117

An engineer must configure R1 for a new user account. The account must meet these requirements:

* It must be configured in the local database.

* The username is engineer.

* It must use the strongest password configurable. Which command must the engineer configure on the router?

Options:

A.  

R1 (config)# username engineer2 algorithm-type scrypt secret test2021

B.  

R1(config)# username engineer2 secret 5 .password S1$b1Ju$kZbBS1Pyh4QzwXyZ

C.  

R1(config)# username engineer2 privilege 1 password 7 test2021

D.  

R1(config)# username englneer2 secret 4 S1Sb1Ju$kZbBS1Pyh4QzwXyZ

Discussion 0
Question # 118

Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?

Options:

A.  

shaping

B.  

classification

C.  

policing

D.  

marking

Discussion 0
Question # 119

Refer to the exhibit.

Question # 119

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:

A.  

Configure the OSPF priority on router A with the lowest value between the three routers.

B.  

Configure router B and router C as OSPF neighbors of router

A.  

C.  

Configure the router A interfaces with the highest OSPF priority value within the area.

D.  

Configure router A with a fixed OSPF router ID

Discussion 0
Question # 120

What provides centralized control of authentication and roaming In an enterprise network?

Options:

A.  

a lightweight access point

B.  

a firewall

C.  

a wireless LAN controller

D.  

a LAN switch

Discussion 0
Question # 121

Refer to the exhibit.

Question # 121

Packets received by the router from BGP enter via a serial interface at 209 165 201 1 Each route is present within the routing table Which interface is used to forward traffic with a destination IP of 10.1.1.19?

Options:

A.  

F0/4

B.  

F0/0

C.  

F0/1

D.  

F0/3

Discussion 0
Question # 122

Which type of network attack overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?

Options:

A.  

SYIM flood

B.  

reflection

C.  

teardrop

D.  

amplification

Discussion 0
Question # 123

How does Rapid PVST+ create a fast loop-free network topology?

Options:

A.  

lt requires multiple links between core switches

B.  

It generates one spanning-tree instance for each VLAN

C.  

It maps multiple VLANs into the same spanning-tree instance

D.  

It uses multiple active paths between end stations.

Discussion 0
Question # 124

Refer to the exhibit.

Question # 124

Which two commands when used together create port channel 10? (Choose two.)

Options:

A.  

int range g0/0-1

channel-group 10 mode active

B.  

int range g0/0-1 chanm.l-group 10 mode desirable

C.  

int range g0/0-1

channel-group 10 mode passive

D.  

int range g0/0-1 channel-group 10 mode auto

E.  

int range g0/0-1 channel-group 10 mode on

Discussion 0
Question # 125

Refer to the exhibit.

Question # 125

R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?

Options:

A.  

R1(config)#ip route 192.168.20.0 255.255.0.0 192.168.30.2

B.  

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 90

C.  

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 111

D.  

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2

Discussion 0
Question # 126

A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?

Options:

A.  

ipv6 address 21:EB8:C1:2200:1::331/64

B.  

ipv6 address 2001:EB8:C1:22:1::331/64

C.  

ipv6 address 2001 :EB8:C 1:2200.1 ::331-64

D.  

ipv6 address 2001:EB8:C1:2200:1:0000:331/64

Discussion 0
Question # 127

Refer to the exhibit.

Question # 127

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:

A.  

username CNAC secret R!41!4319115@

B.  

ip ssh version 2

C.  

line vty 0 4

D.  

crypto key generate rsa 1024

E.  

transport input ssh

Discussion 0
Question # 128

Which protocol uses the SSL?

Options:

A.  

HTTP

B.  

SSH

C.  

HTTPS

D.  

Telnet

Discussion 0
Question # 129

Refer to the exhibit.

Question # 129

An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?

Options:

A.  

Configure router A to use the same MTU size as router

B.  

B.  

Set the router B OSPF ID to a nonhost address.

C.  

Configure a point-to-point link between router A and router

B.  

D.  

Set the router B OSPF ID to the same value as its IP address

Discussion 0
Question # 130

Refer to the exhibit.

Question # 130

Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?

Options:

A.  

Define a NAT pool on the router.

B.  

Configure static NAT translations for VLAN 200.

C.  

Configure the ip nat outside command on another interface for VLAN 200.

D.  

Update the NAT INSIDF RANGFS ACL

Discussion 0
Question # 131

Which Layer 2 switch function encapsulates packets for different VLANs so that the packets traverse the same port and maintain traffic separation between the VLANs?

Options:

A.  

VLAN numbering

B.  

VLAN DSCP

C.  

VLAN tagging

D.  

VLAN marking

Discussion 0
Question # 132

What are two benefits of FHRPs? (Choose two.)

Options:

A.  

They enable automatic failover of the default gateway.

B.  

They allow multiple devices to serve as a single virtual gateway for clients in the network.

C.  

They are able to bundle multiple ports to increase bandwidth.

D.  

They prevent loops in the Layer 2 network.

E.  

They allow encrypted traffic.

Discussion 0
Question # 133

Refer to the exhibit.

Question # 133

Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)

Options:

A.  

transport input telnet

B.  

crypto key generate rsa

C.  

ip ssh pubkey-chain

D.  

login console

E.  

username cisco password 0 Cisco

Discussion 0
Question # 134

A network engineer must configure two new subnets using the address block 10 70 128 0/19 to meet these requirements:

• The first subnet must support 24 hosts

• The second subnet must support 472 hosts

• Both subnets must use the longest subnet mask possible from the address block

Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )

Options:

A.  

interface vlan 1234

ip address 10.70.159.1 255.255.254.0

B.  

interface vlan 1148

ip address 10.70.148.1 255.255.254.0

C.  

interface vlan 4722

ip address 10.70.133.17 255.255.255.192

D.  

interface vlan 3002

ip address 10.70.147.17 255.255.255.224

E.  

interface vlan 155

ip address 10.70.155.65 255.255.255.224

Discussion 0
Question # 135

Refer to the exhibit.

Question # 135

A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?

A)

Question # 135

B)

Question # 135

C)

Question # 135

D)

Question # 135

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 136

What is one reason to implement LAG on a Cisco WLC?

Options:

A.  

to increase security and encrypt management frames

B.  

to provide link redundancy and load balancing

C.  

to allow for stateful and link-state failover

D.  

to enable connected switch ports to failover and use different VLANs

Discussion 0
Question # 137

Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)

Options:

A.  

disabled

B.  

listening

C.  

forwarding

D.  

learning

E.  

blocking

Discussion 0
Question # 138

Drag and drop the characteristics of networking from the left onto the networking types on the right.

Question # 138

Options:

Discussion 0
Question # 139

What is the purpose of the ip address dhcp command?

Options:

A.  

to configure an Interface as a DHCP server

B.  

to configure an interface as a DHCP helper

C.  

to configure an interface as a DHCP relay

D.  

to configure an interface as a DHCP client

Discussion 0
Question # 140

Refer to the exhibit.

Question # 140

Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24?

Options:

A.  

F0/10

B.  

F0/11

C.  

F0/12

D.  

F0/13

Discussion 0
Question # 141

Which wireless security protocol relies on Perfect Forward Secrecy?

Options:

A.  

WPA3

B.  

WPA

C.  

WEP

D.  

WPA2

Discussion 0
Question # 142

Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.

Question # 142

Options:

Discussion 0
Question # 143

Refer to the exhibit.

Question # 143

An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?

Options:

A.  

Configure the ip dhcp relay information command under interface Gi0/1.

B.  

Configure the ip dhcp smart-relay command globally on the router

C.  

Configure the ip helper-address 172.16.2.2 command under interface Gi0/0

D.  

Configure the ip address dhcp command under interface Gi0/0

Discussion 0
Question # 144

Refer to the exhibit.

Question # 144

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

Options:

A.  

Select the WPA Policy option with the CCKM option.

B.  

Disable AES encryption.

C.  

Enable Fast Transition and select the FT 802.1x option.

D.  

Enable Fast Transition and select the FT PSK option.

Discussion 0
Question # 145

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

Question # 145

B)

Question # 145

C)

Question # 145

D)

Question # 145

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 146

All physical cabling is in place. Router R4 and PCI are fully configured and

inaccessible. R4's WAN interfaces use .4 in the last octet for each subnet.

Configurations should ensure that connectivity is established end-to-end.

1 . Configure static routing to ensure RI prefers the path through R2 to

reach only PCI on R4's LAN

2. Configure static routing that ensures traffic sourced from RI will take

an alternate path through R3 to PCI in the event of an outage along

the primary path

3. Configure default routes on RI and R3 to the Internet using the least number of hops

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

Question # 146

Options:

Discussion 0
Question # 147

Refer to the exhibit.

Question # 147

Which switch becomes the root bridge?

Options:

A.  

S1

B.  

S2

C.  

S3

D.  

S4

Discussion 0
Question # 148

Which global command encrypt all passwords in the running configuration?

Options:

A.  

password-encrypt

B.  

enable password-encryption

C.  

enable secret

D.  

service password-encryption

Discussion 0
Question # 149

How does a switch process a frame received on Fa0/1 with the destination MAC address of 0e38.7363.657b when the table is missing the address?

Options:

A.  

lt drops the frame immediately.

B.  

It forwards the frame back out of interface Fa0/1.

C.  

It floods the frame to all interfaces except Fa0/1.

D.  

It holds the frame until the MAC address timer expires and then drops the frame.

Discussion 0
Question # 150

Refer to the exhibit.

Question # 150

Which two commands, when configured on router R1, fulfill these requirements? (Choose two.)

Packets towards the entire network 2001:db8:2::/64 must be forwarded through router R2.

Packets toward host 2001:db8:23::14 preferably must be forwarded through R3.

Options:

A.  

Ipv6 route 2001:db8:23::/128 fd00:12::2

B.  

Ipv6 route 2001:db8:23::14/128 fd00:13::3

C.  

Ipv6 route 2001:db8:23::14/64 fd00:12::2

D.  

Ipv6 route 2001:db8:23::/64 fd00:12::2

E.  

Ipv6 route 2001:db8:23::14/64 fd00:12::2 200

Discussion 0
Question # 151

What causes a port to be placed in the err-disabled state?

Options:

A.  

latency

B.  

port security violation

C.  

shutdown command issued on the port

D.  

nothing plugged into the port

Discussion 0
Question # 152

What is the purpose of traffic shaping?

Options:

A.  

to mitigate delays over slow links

B.  

to provide fair queuing for buffered flows

C.  

to limit the bandwidth that a flow can use to

D.  

be a marking mechanism that identifies different flows

Discussion 0
Question # 153

What is an appropriate use for private IPv4 addressing?

Options:

A.  

on the public-facing interface of a firewall

B.  

to allow hosts inside to communicate in both directions with hosts outside the organization

C.  

on internal hosts that stream data solely to external resources

D.  

on hosts that communicates only with other internal hosts

Discussion 0
Question # 154

Refer to the exhibit.

Question # 154

What two conclusions should be made about this configuration? (Choose two )

Options:

A.  

The designated port is FastEthernet 2/1

B.  

This is a root bridge

C.  

The spanning-tree mode is Rapid PVST+

D.  

The spanning-tree mode is PVST+

E.  

The root port is FastEthernet 2/1

Discussion 0
Question # 155

Refer to the Exhibit.

Question # 155

After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?

Options:

A.  

There is a native VLAN mismatch

B.  

Access mode is configured on the switch ports.

C.  

The PCs are m the incorrect VLAN

D.  

All VLANs are not enabled on the trunk

Discussion 0
Question # 156

Which two outcomes are predictable behaviors for HSRP? (Choose two.)

Options:

A.  

The two routers synchronize configurations to provide consistent packet forwarding

B.  

The two routers negotiate one router as the active router and the other as the standby router

C.  

Each router has a different IP address, both routers act as the default gateway on the LAN, and traffic is load-balanced between them

D.  

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN

E.  

The two routers share the same interface IP address and default gateway traffic is load-balanced between them

Discussion 0
Question # 157

How does HSRP provide first hop redundancy?

Options:

A.  

It load-balances traffic by assigning the same metric value to more than one route to the same destination m the IP routing table.

B.  

It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces configured with the same VLAN.

C.  

It forwards multiple packets to the same destination over different routed links n the data path

D.  

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as the default gateway for hosts on a LAN

Discussion 0
Question # 158

What is the role of a firewall in an enterprise network?

Options:

A.  

Forwards packets based on stateless packet inspection

B.  

Processes unauthorized packets and allows passage to less secure segments of the network

C.  

determines which packets are allowed to cross from unsecured to secured networks

D.  

explicitly denies all packets from entering an administrative domain

Discussion 0
Question # 159

An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface?

Options:

A.  

ipv6 address 2001:db8::700:3:400F:572B

B.  

ipv6 address 2001:db8:0::700:3:4F:572B

C.  

ipv6 address 2001:Odb8::7:3:4F:572B

D.  

ipv6 address 2001::db8:0000::700:3:400F:572B

Discussion 0
Question # 160

Refer to the exhibit.

Question # 160

After the election process what is the root bridge in the HQ LAN?

Question # 160

Options:

A.  

Switch 1

B.  

Switch 2

C.  

Switch 3

D.  

Switch 4

Discussion 0
Question # 161

Refer to the exhibit.

Question # 161

Which command provides this output?

Options:

A.  

show ip route

B.  

show ip interface

C.  

show interface

D.  

show cdp neighbor

Discussion 0
Question # 162

Which type of information resides on a DHCP server?

Options:

A.  

a list of the available IP addresses in a pool

B.  

a list of public IP addresses and their corresponding names

C.  

usernames and passwords for the end users in a domain

D.  

a list of statically assigned MAC addresses

Discussion 0
Question # 163

Refer to the exhibit.

Question # 163

How must router A be configured so that it only sends Cisco Discovery Protocol Information to router C?

Question # 163

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 164

Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable

What is the result of this configuration?

Options:

A.  

The link is in a down state.

B.  

The link is in an error disables state

C.  

The link is becomes an access port.

D.  

The link becomes a trunk port.

Discussion 0
Question # 165

Refer to Exhibit.

Question # 165

The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the NEW York router? (Choose two)

Options:

A.  

ipv6 route 2000::1/128 2012::1

B.  

ipv6 route 2000::3/128 2023::3

C.  

ipv6 route 2000::3/128 s0/0/0

D.  

ipv6 route 2000::1/128 2012::2

E.  

ipv6 route 2000::1/128 s0/0/1

Discussion 0
Question # 166

Refer to the exhibit.

Question # 166

After running the code in the exhibit, which step reduces the amount of data that the NETCONF server returns to the NETCONF client, to only the interface's configuration?

Options:

A.  

Use the Ixml library to parse the data returned by the NETCONF server for the interface's configuration.

B.  

Create an XML filter as a string and pass it to get_config() method as an argument.

C.  

Create a JSON filter as a string and pass it to the get_config() method as an argument.

D.  

Use the JSON library to parse the data returned by the NETCONF server for the interface's configuration.

Discussion 0
Question # 167

Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used

Question # 167

Options:

Discussion 0
Question # 168

Which CRUD operation modifies an existing table or view?

Options:

A.  

read

B.  

create

C.  

replace

D.  

update

Discussion 0
Question # 169

Refer to the exhibit.

Question # 169

Which switch in this configuration will be elected as the root bridge?

Question # 169

Options:

A.  

SW1

B.  

SW2

C.  

SW3

D.  

SW4

Discussion 0
Question # 170

Question # 170

Refer to the exhibit Routers R1 and R2 have been configured with their respective LAN interfaces The two circuits are operational and reachable across WAN Which command set establishes failover redundancy if the primary circuit goes down?

Question # 170

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 171

Which function does the range of private IPv4 addresses perform?

Options:

A.  

allows multiple companies to each use the same addresses without conflicts

B.  

provides a direct connection for hosts from outside of the enterprise network

C.  

ensures that NAT is not required to reach the internet with private range addressing

D.  

enables secure communications to the internet for all external hosts

Discussion 0
Question # 172

An engineer must configure Interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken?

Options:

A.  

configure IEEE 802.1p

B.  

configure IEEE 802.1q

C.  

configure ISL

D.  

configure DSCP

Discussion 0
Question # 173

Which device tracks the state of active connections in order to make a decision to forward a packet through?

Options:

A.  

wireless access point

B.  

firewall

C.  

wireless LAN controller

D.  

router

Discussion 0
Question # 174

When implementing a router as a DHCP server, which two features must be configured'? (Choose two)

Options:

A.  

relay agent information

B.  

database agent

C.  

address pool

D.  

smart-relay

E.  

manual bindings

Discussion 0
Question # 175

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?

Options:

A.  

SMTP

B.  

SNMP

C.  

TCP

D.  

FTP

Discussion 0
Question # 176

Refer to the exhibit.

Question # 176

which path is used by the router for internet traffic ?

Options:

A.  

209.165.200.0/27

B.  

10.10.10.0/28

C.  

0.0.0.0/0

D.  

10.10.13.0/24

Discussion 0
Question # 177

Refer to the exhibit.

Question # 177

An engineer configured NAT translations and has verified that the configuration is correct.

Which IP address is the source IP?

Options:

A.  

10.4.4.4

B.  

10.4.4.5

C.  

172.23.103.10

D.  

172.23.104.4

Discussion 0
Question # 178

Refer to the exhibit.

Question # 178

The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged.

Which command accomplishes this task?

Options:

A.  

switchport access vlan 67

B.  

switchport trunk allowed vlan 67

C.  

switchport private-vlan association host 67

D.  

switchport trunk native vlan 67

Discussion 0
Question # 179

Which 802.11 management frame type is sent when a client roams between access points on the same SSID?

Options:

A.  

Reassociation Request

B.  

Probe Request

C.  

Authentication Request

D.  

Association Request

Discussion 0
Question # 180

Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?

Options:

A.  

on

B.  

auto

C.  

active

D.  

desirable

Discussion 0
Question # 181

Refer to the exhibit.

Question # 181

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

Options:

A.  

access-list 2699 permit udp 10.20.1.0 0.0.0.255

B.  

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22

C.  

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22

D.  

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255

Discussion 0
Question # 182

Which option about JSON is true?

Options:

A.  

uses predefined tags or angle brackets () to delimit markup text

B.  

used to describe structured data that includes arrays

C.  

used for storing information

D.  

similar to HTML, it is more verbose than XML

Discussion 0
Question # 183

How does Cisco DNA Center gather data from the network?

Options:

A.  

Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller

B.  

Devices establish an iPsec tunnel to exchange data with the controller

C.  

Devices use the call-home protocol to periodically send data to the controller.

D.  

The Cisco CU Analyzer tool gathers data from each licensed network device and streams it to the controller.

Discussion 0
Question # 184

What is the function of a controller in controller-based networking?

Options:

A.  

It serves as the centralized management point of an SDN architecture.

B.  

It centralizes the data plane for the network.

C.  

It is the card on a core router that maintains all routing decisions for a campus.

D.  

It is a pair of core routers that maintain all routing decisions for a campus

Discussion 0
Question # 185

What are two benefits of controller-based networking compared to traditional networking?

Options:

A.  

controller-based increases network bandwidth usage, while traditional lightens the load on the network.

B.  

controller-based inflates software costs, while traditional decreases individual licensing costs

C.  

Controller-based reduces network configuration complexity, while traditional increases the potential for errors

D.  

Controller-based provides centralization of key IT functions. While traditional requires distributes management function

E.  

controller-based allows for fewer network failure, while traditional increases failure rates.

Discussion 0
Question # 186

Refer to the exhibit.

Question # 186

A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-Ghz clients connect? (Choose two.)

Options:

A.  

Enable the Broadcast SSID option

B.  

Enable the Status option.

C.  

Set the Radio Policy option to 802 11g Only.

D.  

Set the Radio Policy option to 802.11a Only.

E.  

Set the Interface/Interface Group(G) to an interface other than guest

Discussion 0
Question # 187

Which two practices are recommended for an acceptable security posture in a network? (Choose two)

Options:

A.  

Backup device configurations to encrypted USB drives for secure retrieval

B.  

maintain network equipment in a secure location

C.  

Use a cryptographic keychain to authenticate to network devices

D.  

Place internal email and file servers in a designated DMZ

E.  

Disable unused or unnecessary ports, interfaces and services

Discussion 0
Question # 188

Drag and drop the DNS commands from the left onto their effects on the right.

Question # 188

Options:

Discussion 0
Question # 189

How does encryption project the wireless network?

Options:

A.  

via integrity checks to identify wireless forgery attacks in the frame

B.  

via specific ciphers to detect and prevent zero-day network attacks

C.  

via an algorithm to change wireless data so that only the access point and client understand it

D.  

via a policy to prevent unauthorized users from communicating on the wireless network

Discussion 0
Question # 190

Which security method is used to prevent man-in-the-middle attack?

Options:

A.  

authorization

B.  

authentication

C.  

anti-replay

D.  

accounting

Discussion 0
Question # 191

What does a switch do when it receives a frame whose destination MAC address is missing from the MAC address table?

Options:

A.  

It floods the frame unchanged across all remaining ports in the incoming VLAN.

B.  

It appends the table with a static entry for the MAC and shuts down the port.

C.  

It updates the CAM table with the destination MAC address of the frame.

D.  

It changes the checksum of the frame to a value that indicates an invalid frame.

Discussion 0
Question # 192

Refer to the exhibit.

Question # 192

In which structure does the word "warning" directly reside?

Options:

A.  

array

B.  

object

C.  

Boolean

D.  

string

Discussion 0
Question # 193

What is used as a solution for protecting an individual network endpoint from attack?

Options:

A.  

Router

B.  

Wireless controller

C.  

Anti software

D.  

Cisco DNA Center

Discussion 0
Question # 194

How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?

Options:

A.  

Traditional campus device management schemes typically deploy patches and updates quicker than Cisco DNA Center device management.

B.  

Cisco DNA Center device management is implemented at a lower cost than most traditional campus device management options.

C.  

Traditional campus device management allows a network to scale quicker than using Cisco DNA Center device management.

D.  

Cisco DNA Center device management deploys a network faster than traditional campus device management.

Discussion 0
Question # 195

What is a function of MAC address learning?

Options:

A.  

It is enabled by default on all VLANs and interfaces

B.  

It increases the potential for MAC address flooding.

C.  

It is disabled by default on all interfaces connected to trunks

D.  

lt increases security on the management VLAN

Discussion 0
Question # 196

What is a reason why an administrator would choose to implement an automated network management approach?

Options:

A.  

Reduce inconsistencies in the network configuration.

B.  

Enable "box by box" configuration and deployment.

C.  

Decipher simple password policies.

D.  

Increase recurrent management costs.

Discussion 0
Question # 197

Drag and drop each characteristic of device-management technologies from the left onto the deployment type on the right.

Question # 197

Options:

Discussion 0
Question # 198

Which enhancements were implemented as part of WPA3?

Options:

A.  

802.1x authentication and AES-128 encryption

B.  

TKIP encryption improving WEP and per-packet keying

C.  

AES-64 m personal mode and AES-128 in enterprise mode

D.  

forward secrecy and SAE in personal mode for secure initial key exchange

Discussion 0
Question # 199

Which encryption method is used by WPA3?

Options:

A.  

PSK

B.  

TKIP

C.  

SAE

D.  

AES

Discussion 0
Question # 200

Refer to the exhibit.

Question # 200

How many objects are present in the given JSON-encoded data?

Options:

A.  

one

B.  

four

C.  

seven

D.  

nine

Discussion 0
Question # 201

A network engineer is upgrading a small data center to host several new applications, including server backups that are expected to account for up to 90% of the bandwidth during peak times. The data center connects to the MPLS network provider via a primary circuit and a secondary circuit. How does the engineer inexpensively update the data center to avoid saturation of the primary circuit by traffic associated with the backups?

Options:

A.  

Assign traffic from the backup servers to a dedicated switch.

B.  

Configure a dedicated circuit for the backup traffic.

C.  

Place the backup servers in a dedicated VLAN.

D.  

Advertise a more specific route for the backup traffic via the secondary circuit.

Discussion 0
Question # 202

Question # 202

A)

Question # 202

B)

Question # 202

C)

Question # 202

D)

Question # 202

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 203

Drag and drop the device behaviors from the left onto the matching HSRP slate on the right.

Question # 203

Options:

Discussion 0
Question # 204

What are two reasons to implement DHCP in a network? (Choose two.)

Options:

A.  

reduce administration time in managing IP address ranges for clients

B.  

control the length of time an IP address is used by a network device

C.  

manually control and configure IP addresses on network devices

D.  

dynamic control over the best path to reach an IP address

E.  

access a website by name instead of by IP address

Discussion 0
Question # 205

A DHCP pool has been created with the name NOC

C.  

The pool is using 192.168.20.0/24 and must use the next to last usable IP address as the default gateway for the DHCP clients. What is the next step in the process?

Options:

A.  

default-router192.168.20.253

B.  

network 192.168.20.254 255.255.255.0 secondary

C.  

ip default-gateway 0.0.0.0 0.0.0.0 192.168.20.253

D.  

next-server 192.168.20.254

Discussion 0
Question # 206

What does traffic shaping do?

Options:

A.  

It modifies the QoS attributes of a packet

B.  

It queues excess traffic

C.  

It organizes traffic into classes.

D.  

It sets QoS attributes within a packet.

Discussion 0
Question # 207

Question # 207

A)

Question # 207

B)

Question # 207

C)

Question # 207

D)

Question # 207

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 208

Refer to the exhibit.

Question # 208

A newly configured PC fails to connect to the internet using TCP port 80 to www cisco com Which setting must be modified for the connection to work?

Options:

A.  

Subnet Mask

B.  

DNS Servers

C.  

Default Gateway

D.  

DHCP Server

Discussion 0
Question # 209

Refer to the exhibit.

Question # 209

Rapid PVST+ mode is on the same VLAN on each switch. Which switch becomes the root bridge and why?

Options:

A.  

SW2, because its MAC address is the highest

B.  

SW3, because its priority is the highest

C.  

SW4, because its priority is highest and its MAC address is lower

D.  

SW1, because its priority is the lowest and its MAC address is higher

Discussion 0
Question # 210

Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two.)

Options:

A.  

REST APIs that allow for external applications to interact natively

B.  

adapters that support all families of Cisco IOS software

C.  

SDKs that support interaction with third-party network equipment

D.  

customized versions for small, medium, and large enterprises

E.  

modular design that is upgradable as needed

Discussion 0
Question # 211

What is the definition of backdoor malware?

Options:

A.  

malicious code that is installed onto a computer to allow access by an unauthorized user

B.  

malicious code with the main purpose of downloading other malicious code

C.  

malicious program that is used to launch other malicious programs

D.  

malicious code that infects a user machine and then uses that machine to send spam

Discussion 0
Question # 212

What is a function of Cisco Advanced Malware Protection for a Next-Generation IPS?

Options:

A.  

authorizing potentially compromised wireless traffic

B.  

inspecting specific files and file types for malware

C.  

authenticating end users

D.  

URL filtering

Discussion 0
Question # 213

An engineer is configuring SSH version 2 exclusively on the R1 router. What is the minimum configuration required to permit remote management using the cryptographic protocol?

Question # 213

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 214

Refer to the exhibit.

Question # 214

A network engineer must configure the link with these requirements:

• Consume as few IP addresses as possible.

• Leave at least two additional useable IP addresses for future growth.

Which set of configurations must be applied?

A)

Question # 214

B)

Question # 214

C)

Question # 214

D)

Question # 214

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 215

Refer to the exhibit. Local access for R4 must be established and these requirements must be met:

• Only Telnet access is allowed.

• The enable password must be stored securely.

• The enable password must be applied in plain text.

• Full access to R4 must be permitted upon successful login.

Which configuration script meets the requirements?

A)

Question # 215

B)

Question # 215

C)

Question # 215

D)

Question # 215

Options:

A.  

Option

B.  

Option

C.  

Option

D.  

Option

Discussion 0
Question # 216

Which device separates networks by security domains?

Options:

A.  

firewall

B.  

access point

C.  

intrusion protection system

D.  

wireless controller

Discussion 0
Question # 217

What is the MAC address used with VRRP as a virtual address?

Options:

A.  

00-00-0C-07-AD-89

B.  

00-00-5E-00-01-0a

C.  

00-07-C0-70-AB-01

D.  

00-C6-41-93-90-91

Discussion 0
Question # 218

Which Windows command is used instead of the route print command to display the contents of the IP routing table?

Options:

A.  

netstat-n

B.  

ipconfig

C.  

ifconfig

D.  

netstat-r

Discussion 0
Question # 219

Which port type does a lightweight AP use to connect to the wired network when it is configured in local mode?

Options:

A.  

EtherChannel

B.  

LAG

C.  

trunk

D.  

access

Discussion 0
Question # 220

Drag and drop the IPv6 address details from the left onto the corresponding types on the right.

Question # 220

Options:

Discussion 0
Question # 221

Which two wireless security stewards use Counter Mode Cipher Block Chaining Message Authentication Code Protocol for encryption and data integrity'? (Choose two.)

Options:

A.  

WPA2

B.  

WPA3

C.  

Wi-Fi 6

D.  

WEP

E.  

WPA

Discussion 0
Question # 222

An engineer is configuring switch SW1 to act an NTP server when all upstream NTP server connectivity fails. Which configuration must be used?

A)

Question # 222

B)

Question # 222

C)

Question # 222

D)

Question # 222

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 223

Refer to the exhibit.

Question # 223

Which prefix did router R1 learn from internal EIGRP?

Options:

A.  

192.168.10/24

B.  

192.168.3.0/24

C.  

192.168.2.0/24

D.  

172.16 1.0/24

Discussion 0
Question # 224

Refer to the exhibit.

Question # 224

A)

Question # 224

B)

Question # 224

C)

Question # 224

D)

Question # 224

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 225

Which two transport layer protocols carry syslog messages? (Choose two.)

Options:

A.  

TCP

B.  

IP

C.  

RTP

D.  

UDP

E.  

ARP

Discussion 0
Question # 226

Question # 226

Refer to the exhibit. Each router must be configured with the last usable IP address in the subnet. Which configuration fulfills this requirement?

Question # 226

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 227

What does a switch search for in the CAM table when forwarding a frame?

Options:

A.  

source MAC address and aging time

B.  

destination MAC address and flush time

C.  

source MAC address and source port

D.  

destination MAC address and destination port

Discussion 0
Question # 228

What is an advantage of using auto mode versus static mode for power allocation when an access point is connected to a PoE switch port?

Options:

A.  

All four pairs of the cable are used

B.  

It detects the device is a powered device

C.  

The default level is used for the access point

D.  

Power policing is enabled at the same time

Discussion 0
Question # 229

What is a difference between an IPv6 multicast address and an IPv6 anycast address?

Options:

A.  

A packet sent to an IPv6 multicast address is delivered to one or more destinations at once, but a packet sent to an IPv6 anycast address is routed to the closest interface with that address.

B.  

An IPv6 multicast address uses the prefix 2002::/15 and forwards to one destination, and an IPv6 anycast address uses the prefix ff00::/8 and forwards to any destination in a group.

C.  

IPv6 multicast addresses are used to transition from IPv4 to IPv6, and IPv6 anycast addresses are used for address aggregation in an IPv6-only environment.

D.  

An IPv6 multicast address is assigned to numerous interfaces within a subnet, but an IPv6 anycast address is used for a predefined group of nodes in an all-IPv6 routers group.

Discussion 0
Question # 230

Refer to the exhibit.

Question # 230

PC A is communicating with another device at IP address 10.227.225.255. Through which router does router Y route the traffic?

Options:

A.  

router A

B.  

router B

C.  

router C

D.  

router D

Discussion 0
Question # 231

To improve corporate security, an organization is planning to implement badge authentication to limit access to the data center. Which element of a security program is being deployed?

Options:

A.  

user training

B.  

user awareness

C.  

vulnerability verification

D.  

physical access control

Discussion 0
Get 200-301 dumps and pass your exam in 24 hours!

Free Exams Sample Questions