Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

200-301 Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1 Questions and Answers

Questions 4

Drag and drop the IPv6 address details from the left onto the corresponding types on the right.

200-301 Question 4

Options:

Buy Now
Questions 5

Refer to the exhibit.

200-301 Question 5

All routers in the network are configured correctly, and the expected routes are being exchanged among the routeis. Which set or routes are learned from neighbors and Installed on router 2?

A)

200-301 Question 5

B)

200-301 Question 5

C)

200-301 Question 5

D)

200-301 Question 5

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now

200-301 Report Card

Questions 6

Refer the exhibit.

200-301 Question 6

What is the cause of poor performance on router R19?

Options:

A.

excessive collisions

B.

speed and duplex mismatch

C.

port oversubscription

D.

excessive CRC errors

Buy Now
Questions 7

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?

Options:

A.

ip route 0.0.0.0 0.0.0.0 10.200.0.2 1

B.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating

C.

ip route 0.0.0.0 0.0.0.0 10.200.0.2

D.

Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10

Buy Now
Questions 8

Refer to the exhibit.

200-301 Question 8

The show ip ospf interface command has been executed on R1. How is OSPF configured?

Options:

A.

A point-to-point network type is configured.

B.

The default Hello and Dead timers are in use.

C.

There are six OSPF neighbors on this interface.

D.

The interface is not participating in OSPF.

Buy Now
Questions 9

What is a reason why an administrator would choose to implement an automated network management approach?

Options:

A.

Reduce inconsistencies in the network configuration.

B.

Enable " box by box " configuration and deployment.

C.

Decipher simple password policies.

D.

Increase recurrent management costs.

Buy Now
Questions 10

What is a function performed by a web server?

Options:

A.

provide an application that is transmitted over HTTP

B.

send and retrieve email from client devices

C.

authenticate and authorize a user ' s identity

D.

securely store flies for FTP access

Buy Now
Questions 11

What is the purpose of configuring different levels of syslog for different devices on the network?

Options:

A.

to rate-limit messages for different seventy levels from each device

B.

to set the severity of syslog messages from each device

C.

to identify the source from which each syslog message originated

D.

to control the number of syslog messages from different devices that are stored locally

Buy Now
Questions 12

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

200-301 Question 12

Options:

Buy Now
Questions 13

Which WAN topology has the highest degree of reliability?

Options:

A.

full mesh

B.

Point-to-point

C.

hub-and-spoke

D.

router-on-a-stick

Buy Now
Questions 14

Refer to the exhibit.

200-301 Question 14

Which configuration establishes a Layer 2 LACP EtherChannel when applied to both switches?

Options:

A.

Interface range G1/1 – 1/3 switchport mode trunk channel-group 1 mode active no shutdown

B.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode passive no shutdown

C.

Interface range G1/1 – 1/3 switchport mode trunkchannel-group 1 mode desirableno shutdown

D.

Interface range G1/1 – 1/3 switchport mode access channel-group 1 mode on no shutdown

Buy Now
Questions 15

When should an engineer implement a collapsed-core architecture?

Options:

A.

for small networks with minimal need for growth

B.

the access and distribution layers must be on the same device

C.

for large networks that are connected to multiple remote sites

D.

only when using VSS technology

Buy Now
Questions 16

What is a reason to implement LAG on a Cisco WLC?

Options:

A.

Increase the available throughput on the link.

B.

Increase security by encrypting management frames

C.

Allow for stateful failover between WLCs

D.

Enable the connected switch ports to use different Layer 2 configurations

Buy Now
Questions 17

Why choose Cisco DNA Center for automated lifecycle management?

Options:

A.

To perform upgrades without service interruption

B.

To provide fast and accurate deployment of patches and updates

C.

To allow SSH access to all nodes in the network.

D.

To provide software redundancy in the network.

Buy Now
Questions 18

Refer to the exhibit.

200-301 Question 18

A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:

• accommodates current configured VLANs

• expands the range to include VLAN 20

• allows for IEEE standard support for virtual LANs

Which configuration on the NewSwitch side of the link meets these requirements?

A)

200-301 Question 18

B)

200-301 Question 18

C)

200-301 Question 18

D)

200-301 Question 18

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 19

Refer to the exhibit.

200-301 Question 19

R1 has taken the DROTHER role in the OSPF DR/BDR election process. Which configuration must an engineer implement so that R1 is elected as the DR?

200-301 Question 19

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 20

Which type of encryption does WPA1 use for data protection?

Options:

A.

AES

B.

TKIP

C.

PEAP

D.

EAP

Buy Now
Questions 21

Drag and drop the SNMP components from the left onto the description on the right.

200-301 Question 21

Options:

Buy Now
Questions 22

What is the collapsed layer in collapsed core architectures?

Options:

A.

core and WAN

B.

access and WAN

C.

distribution and access

D.

core and distribution

Buy Now
Questions 23

What is a benefit for external users who consume public cloud resources?

Options:

A.

implemented over a dedicated WAN

B.

located in the same data center as the users

C.

all hosted on physical servers

D.

accessed over the Internet

Buy Now
Questions 24

What is a valid IPv6 address record in DNS?

Options:

A.

A

B.

MX

C.

AAAA

D.

CNAME

Buy Now
Questions 25

Drag and chop the TCP/IP protocols from the left onto their primary transmission protocols on the right.

200-301 Question 25

Options:

Buy Now
Questions 26

200-301 Question 26

Refer to the exhibit Routers R1 R2 and R3 use a protocol to identify their neighbors ' IP addresses hardware platforms, and software versions. A network engineer must configure R2 to avoid sharing any neighbor information with R3, and maintain its relationship with R1. What action meets this requirement?

Options:

A.

Configure the no cdp enable command on gO/2.

B.

Configure the no cdp run command globally.

C.

Configure the no lldp run command globally.

D.

Configure the no lldp receive command on gQV1.

Buy Now
Questions 27

Refer to the exhibit.

200-301 Question 27

How must OSPF be configured on the GigabitEthernet0/0 interface of the neighbor device to achieve.

A)

200-301 Question 27

B)

200-301 Question 27

C)

200-301 Question 27

D)

200-301 Question 27

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 28

Refer to the exhibit. User traffic originating within site 0 is failing to reach an application hosted on IP address 192.168 0 10. Which is located within site A What is determined by the routing table?

Options:

A.

The default gateway for site B is configured incorrectly

B.

The lack of a default route prevents delivery of the traffic

C.

The traffic is blocked by an implicit deny in an ACL on router2

D.

The traffic to 192 168 010 requires a static route to be configured in router 1.

Buy Now
Questions 29

Refer to the exhibit.

200-301 Question 29

Which types of JSON data is shown

Options:

A.

Object

B.

Sequence

C.

String

D.

boolean

Buy Now
Questions 30

Refer to the exhibit.

200-301 Question 30

Which prefix did router R1 learn from internal EIGRP?

Options:

A.

192.168.10/24

B.

192.168.3.0/24

C.

192.168.2.0/24

D.

172.16 1.0/24

Buy Now
Questions 31

Refer to the exhibit.

200-301 Question 31

What two conclusions should be made about this configuration? (Choose two )

Options:

A.

The designated port is FastEthernet 2/1

B.

This is a root bridge

C.

The spanning-tree mode is Rapid PVST+

D.

The spanning-tree mode is PVST+

E.

The root port is FastEthernet 2/1

Buy Now
Questions 32

Which global command encrypt all passwords in the running configuration?

Options:

A.

password-encrypt

B.

enable password-encryption

C.

enable secret

D.

service password-encryption

Buy Now
Questions 33

Refer to the exhibit.

200-301 Question 33

A router reserved these five routes from different routing information sources.

Which two routes does the router install in its routing table? (Choose two)

Options:

A.

RIP route 10.0.0.0/30

B.

iBGP route 10.0.0.0/30

C.

OSPF route 10.0.0.0/30

D.

EIGRP route 10.0.0.1/32

E.

OSPF route 10.0.0.0/16

Buy Now
Questions 34

Refer to the exhibit.

200-301 Question 34

All interfaces are in the same VLAN. All switches are configured with the default STP priorities. During the STP electronics, which switch becomes the root bridge?

Options:

A.

MDF-DC-4:08:E0:19: 08:B3:19

B.

MDF-DC-3:08:0E:18::1A:3C:9D

C.

MDF-DC-08:0E:18:22:05:97

D.

MDF-DC-1:DB:E:44:02:54:79

Buy Now
Questions 35

What is the function of a controller in a software-defined network?

Options:

A.

multicast replication at the hardware level

B.

forwarding packets

C.

fragmenting and reassembling packets

D.

setting packet-handling policies

Buy Now
Questions 36

Which set of actions satisfies the requirement for multifactor authentication?

Options:

A.

The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.

B.

The user swipes a key fob, then clicks through an email link.

C.

The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen.

D.

The user enters a user name and password, and then re-enters the credentials on a second screen.

Buy Now
Questions 37

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

200-301 Question 37

Options:

Buy Now
Questions 38

Which implementation provides the strongest encryption combination for the wireless environment?

Options:

A.

WPA2 + AES

B.

WPA + AES

C.

WEP

D.

WPA + TKIP

Buy Now
Questions 39

Refer to the exhibit.

200-301 Question 39

Router R4 is dynamically learning the path to the server. If R4 is connected to R1 via OSPF Area 20, to R2 v2ia R2 BGP, and to R3 via EIGRP 777, which path is installed in the routing table of R4?

Options:

A.

the path through R1, because the OSPF administrative distance is 110

B.

the path through R2. because the IBGP administrative distance is 200

C.

the path through R2 because the EBGP administrative distance is 20

D.

the path through R3. because the EIGRP administrative distance is lower than OSPF and BGP

Buy Now
Questions 40

When a switch receives a frame for a known destination MAC address, how is the frame handed?

Options:

A.

sent to the port identified for the known MAC address

B.

broadcast to all ports

C.

forwarded to the first available port

D.

flooded to all ports except the one from which it originated

Buy Now
Questions 41

What criteria is used first during me root port selection process?

Options:

A.

local port ID

B.

lowest path cost to the root bridge

C.

lowest neighbor ' s bridge ID

D.

lowest neighbor ' s port ID

Buy Now
Questions 42

Refer to the exhibit.

200-301 Question 42

R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and BDR. Which set of configurations must the engineer implement?

A)

200-301 Question 42

B)

200-301 Question 42

C)

200-301 Question 42

D)

200-301 Question 42

Options:

A.

Option

B.

Option

C.

Option

D.

Option

Buy Now
Questions 43

When configuring a WLAN with WPA2 PSK in the Cisco Wireless LAN Controller GUI, which two formats are available to select? (Choose two)

Options:

A.

ASCII

B.

base64

C.

binary

D.

decimal

E.

hexadecimal

Buy Now
Questions 44

How does a switch process a frame received on Fa0/1 with the destination MAC address of 0e38.7363.657b when the table is missing the address?

Options:

A.

lt drops the frame immediately.

B.

It forwards the frame back out of interface Fa0/1.

C.

It floods the frame to all interfaces except Fa0/1.

D.

It holds the frame until the MAC address timer expires and then drops the frame.

Buy Now
Questions 45

Which option about JSON is true?

Options:

A.

uses predefined tags or angle brackets () to delimit markup text

B.

used to describe structured data that includes arrays

C.

used for storing information

D.

similar to HTML, it is more verbose than XML

Buy Now
Questions 46

Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)

Options:

A.

listening

B.

blocking

C.

forwarding

D.

learning

E.

speaking

Buy Now
Questions 47

What is the function of a hub-and-spoke WAN topology?

Options:

A.

allows access restrictions to be implemented between subscriber sites.

B.

provides direct connections between subscribers

C.

supports Layer 2 VPNs

D.

supports application optimization

Buy Now
Questions 48

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)

Options:

A.

5GHz provides increased network capacity with up to 23 nonoveriapping channels.

B.

For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.

C.

5GHz channel selection requires an autonomous access point.

D.

Adjacent cells with overlapping channels use a repeater access point.

E.

Cells that overlap one another are configured to use nonoveriapping channels.

Buy Now
Questions 49

Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?

200-301 Question 49

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 50

Refer to the exhibit.

200-301 Question 50

An administrator must turn off the Cisco Discovery Protocol on the port configured with address last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement?

Options:

A.

interface gi0/1no cdp enable

B.

interface gi0/1clear cdp table

C.

interface gi0/0no cdp advertise-v2

D.

interface gi0/0no cdp run

Buy Now
Questions 51

Drag and drop the DHCP snooping terms from the left onto the descriptions on the right.

200-301 Question 51

Options:

Buy Now
Questions 52

An email user has been lured into clicking a link in an email sent by their company ' s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

Options:

A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Buy Now
Questions 53

Drag the IPv6 DNS record types from the left onto the description on the right.

200-301 Question 53

Options:

Buy Now
Questions 54

An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?

200-301 Question 54

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 55

What is the maximum bandwidth of a T1 point-to-point connection?

Options:

A.

1.544 Mbps

B.

2.048 Mbps

C.

34.368 Mbps

D.

43.7 Mbps

Buy Now
Questions 56

Which CRUD operation corresponds to the HTTP GET method?

Options:

A.

read

B.

update

C.

create

D.

delete

Buy Now
Questions 57

Which network action occurs within the data plane?

Options:

A.

compare the destination IP address to the IP routing table.

B.

run routing protocols (OSPF, EIGRP, RIP, BGP)

C.

make a configuration change from an incoming NETCONF RPC

D.

reply to an incoming ICMP echo request

Buy Now
Questions 58

Refer to the exhibit.

200-301 Question 58

Which password must an engineer use to enter the enable mode?

Options:

A.

adminadmin123

B.

default

C.

testing 1234

D.

cisco123

Buy Now
Questions 59

When implementing a router as a DHCP server, which two features must be configured ' ? (Choose two)

Options:

A.

relay agent information

B.

database agent

C.

address pool

D.

smart-relay

E.

manual bindings

Buy Now
Questions 60

Refer to the exhibit.

200-301 Question 60

Which type of route does R1 use to reach host 10.10.13.10/32?

Options:

A.

floating static route

B.

host route

C.

default route

D.

network route

Buy Now
Questions 61

What causes a port to be placed in the err-disabled state?

Options:

A.

latency

B.

port security violation

C.

shutdown command issued on the port

D.

nothing plugged into the port

Buy Now
Questions 62

How do TCP and UDP differ in the way they provide reliability for delivery of packets?

Options:

A.

TCP is a connectionless protocol that does not provide reliable delivery of data, UDP is a connection-oriented protocol that uses sequencing to provide reliable delivery.

B.

TCP does not guarantee delivery or error checking to ensure that there is no corruption of data UDP provides message acknowledgement and retransmits data if lost.

C.

TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream without checking for sequencing

D.

TCP uses windowing to deliver packets reliably; UDP provides reliable message transfer between hosts by establishing a three-way handshake

Buy Now
Questions 63

Drag and drop the network protocols from the left onto the correct transport services on the right.

200-301 Question 63

Options:

Buy Now
Questions 64

What is the difference in data transmission delivery and reliability between TCP and UDP?

Options:

A.

TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to ensure applications receive the data on the remote end.

B.

UDP sets up a connection between both devices before transmitting data. TCP uses the three-way handshake to transmit data with a reliable connection.

C.

UDP is used for multicast and broadcast communication. TCP is used for unicast communication and transmits data at a higher rate with error checking.

D.

TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.

Buy Now
Questions 65

How are the switches in a spine-and-leaf topology interconnected?

Options:

A.

Each leaf switch is connected to one of the spine switches.

B.

Each leaf switch is connected to two spine switches, making a loop.

C.

Each leaf switch is connected to each spine switch.

D.

Each leaf switch is connected to a central leaf switch, then uplinked to a core spine switch.

Buy Now
Questions 66

Which command prevents passwords from being stored in the configuration as plain text on a router or switch?

Options:

A.

enable secret

B.

service password-encryption

C.

username Cisco password encrypt

D.

enable password

Buy Now
Questions 67

What is the purpose of a southbound API in a control based networking architecture?

Options:

A.

Facilities communication between the controller and the applications

B.

Facilities communication between the controller and the networking hardware

C.

allows application developers to interact with the network

D.

integrates a controller with other automation and orchestration tools.

Buy Now
Questions 68

How does Cisco DNA Center gather data from the network?

Options:

A.

Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller

B.

Devices establish an iPsec tunnel to exchange data with the controller

C.

Devices use the call-home protocol to periodically send data to the controller.

D.

The Cisco CU Analyzer tool gathers data from each licensed network device and streams it to the controller.

Buy Now
Questions 69

What uses HTTP messages to transfer data to applications residing on different hosts?

Options:

A.

OpenFlow

B.

OpenStack

C.

OpFlex

D.

REST

Buy Now
Questions 70

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

200-301 Question 70

Options:

Buy Now
Questions 71

What mechanism carries multicast traffic between remote sites and supports encryption?

Options:

A.

ISATAP

B.

GRE over iPsec

C.

iPsec over ISATAP

D.

GRE

Buy Now
Questions 72

What is a difference between local AP mode and FiexConnet AP mode?

Options:

A.

Local AP mode creates two CAPWAP tunnels per AP to the WLC

B.

FiexConnect AP mode fails to function if the AP loses connectivity with the WLC

C.

FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured

D.

Local AP mode causes the AP to behave as if it were an autonomous AP

Buy Now
Questions 73

Which type of address is the public IP address of a NAT device?

Options:

A.

outside global

B.

outsdwde local

C.

inside global

D.

insride local

E.

outside public

F.

inside public

Buy Now
Questions 74

Refer to the exhibit.

200-301 Question 74

Which command provides this output?

Options:

A.

show ip route

B.

show ip interface

C.

show interface

D.

show cdp neighbor

Buy Now
Questions 75

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (choose two.)

Options:

A.

5GHz provides increased network capacity with up to 23 nonoveriapping channels.

B.

For maximum throughput, the WLC is configured to dynamically set adjacent access points to the same channel.

C.

5GHz channel selection requires an autonomous access point.

D.

Adjacent cells with overlapping channels use a repeater access point.

E.

Cells that overlap one another are configured to use nonoveriapping channels.

Buy Now
Questions 76

What are two functions of a Layer 2 switch? (Choose two)

Options:

A.

acts as a central point for association and authentication servers

B.

selects the best route between networks on a WAN

C.

moves packets within a VLAN

D.

moves packets between different VLANs

E.

makes forwarding decisions based on the MAC address of a packet

Buy Now
Questions 77

What is an advantage of Cisco DNA Center versus traditional campus device management?

Options:

A.

It supports numerous extensibility options including cross-domain adapters and third-party SDKs.

B.

It supports high availability for management functions when operating in cluster mode.

C.

It enables easy autodiscovery of network elements m a brownfield deployment.

D.

It is designed primarily to provide network assurance.

Buy Now
Questions 78

Refer to the exhibit.

200-301 Question 78

What is the correct next hop for router R1 to reach IP addresses 192.168.2.86 and 10.20.1.50?

Options:

A.

172.16.1.4

B.

172.16.1.1

C.

172.16.1.2

D.

172.16.1.3

Buy Now
Questions 79

What event has occurred if a router sends a notice level message to a syslog server?

Options:

A.

A TCP connection has been torn down

B.

An ICMP connection has been built

C.

An interface line has changed status

D.

A certificate has expired.

Buy Now
Questions 80

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

Options:

A.

The floating static route must have a higher administrative distance than the primary route so it is used as a backup

B.

The administrative distance must be higher on the primary route so that the backup route becomes secondary.

C.

The floating static route must have a lower administrative distance than the primary route so it is used as a backup

D.

The default-information originate command must be configured for the route to be installed into the routing table

Buy Now
Questions 81

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

Options:

A.

TCP uses synchronization packets, and UDP uses acknowledgment packets.

B.

UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits

C.

UDP provides reliable message transfer and TCP is a connectionless protocol

D.

TCP uses the three-way handshake and UDP does not guarantee message delivery

Buy Now
Questions 82

Which level of severity must be set to get informational syslogs?

Options:

A.

alert

B.

critical

C.

notice

D.

debug

Buy Now
Questions 83

Drag and drop the DNS lookup components from the left onto the functions on the right.

200-301 Question 83

Options:

Buy Now
Questions 84

Which switch technology establishes a network connection immediately when it is plugged in?

Options:

A.

PortFast

B.

BPDU guard

C.

UplinkFast

D.

BackboneFast

Buy Now
Questions 85

What is the purpose of using First Hop Redundancy Protocol in a specific subnet?

Options:

A.

Filter traffic based on destination IP addressing

B.

Sends the default route to the hosts on a network

C.

ensures a loop-free physical topology

D.

forwards multicast hello messages between routers

Buy Now
Questions 86

Refer to the exhibit.

200-301 Question 86

Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

Options:

A.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any anyinterface GigabitEthernet0/0 ip access-group 100 in

B.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any anyline vty 0 15 ip access-group 100 in

C.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any anyinterface GigabitEthernet0/0 ip access-group 100 in

D.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any anyline vty 0 15 ip access-group 100 in

Buy Now
Questions 87

When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?

Options:

A.

IPsec tunnel mode with AH

B.

IPsec transport mode with AH

C.

IPsec tunnel mode with ESP

D.

IPsec transport mode with ESP

Buy Now
Questions 88

What is the primary effect of the spanning-tree portfast command?

Options:

A.

it enables BPDU messages

B.

It minimizes spanning-tree convergence time

C.

It immediately puts the port into the forwarding state when the switch is reloaded

D.

It immediately enables the port in the listening state

Buy Now
Questions 89

What does a router do when configured with the default DNS lookup settings, and a URL is entered on the CLI?

Options:

A.

initiates a ping request to the URL

B.

prompts the user to specify the desired IP address

C.

continuously attempts to resolve the URL until the command is cancelled

D.

sends a broadcast message in an attempt to resolve the URL

Buy Now
Questions 90

Which technology allows for multiple operating systems to be run on a single host computer?

Options:

A.

virtual routing and forwarding

B.

network port ID visualization

C.

virtual device contexts

D.

server visualization

Buy Now
Questions 91

Refer to the exhibit.

200-301 Question 91

Which route type does the routing protocol Code D represent in the output?

Options:

A.

internal BGP route

B.

/24 route of a locally configured IP

C.

statically assigned route

D.

route learned through EIGRP

Buy Now
Questions 92

Which plane is centralized by an SDN controller?

Options:

A.

management-plane

B.

control-plane

C.

data-plane

D.

services-plane

Buy Now
Questions 93

Refer to the exhibit.

200-301 Question 93

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

200-301 Question 93

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 94

What is the purpose of an SSID?

Options:

A.

It provides network security

B.

It differentiates traffic entering access posits

C.

It identities an individual access point on a WLAN

D.

It identifies a WLAN

Buy Now
Questions 95

Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.

200-301 Question 95

Options:

Buy Now
Questions 96

How will Link Aggregation be Implemented on a Cisco Wireless LAN Controller?

Options:

A.

One functional physical port is needed to pass client traffic.

B.

The EthernetChannel must be configured in " mode active " .

C.

When enabled, the WLC bandwidth drops to 500 Mbps.

D.

To pass client traffic, two or more ports must be configured.

Buy Now
Questions 97

Which two WAN architecture options help a business improve scalability and reliability for the network? (Choose two.)

Options:

A.

asynchronous routing

B.

single-homed branches

C.

dual-homed branches

D.

static routing

E.

dynamic routing

Buy Now
Questions 98

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

Options:

A.

Provide uninterrupted forwarding service.

B.

Police traffic that is sent to the edge of the network.

C.

Provide direct connectivity for end user devices.

D.

Ensure timely data transfer between layers.

E.

Inspect packets for malicious activity.

Buy Now
Questions 99

Which function is performed by the collapsed core layer in a two-tier architecture?

Options:

A.

enforcing routing policies

B.

marking interesting traffic for data polices

C.

attaching users to the edge of the network

D.

applying security policies

Buy Now
Questions 100

How do servers connect to the network in a virtual environment?

Options:

A.

wireless to an access point that is physically connected to the network

B.

a cable connected to a physical switch on the network

C.

a virtual switch that links to an access point that is physically connected to the network

D.

a software switch on a hypervisor that is physically connected to the network

Buy Now
Questions 101

An engineer must configure the IPv6 address 2001:0db8:0000:0000:0700:0003:400F:572B on the serial0/0 interface of the HQ router and wants to compress it for easier configuration. Which command must be issued on the router interface?

Options:

A.

ipv6 address 2001:db8::700:3:400F:572B

B.

ipv6 address 2001:db8:0::700:3:4F:572B

C.

ipv6 address 2001:Odb8::7:3:4F:572B

D.

ipv6 address 2001::db8:0000::700:3:400F:572B

Buy Now
Questions 102

After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?

Options:

A.

Enable the allow AAA Override

B.

Enable the Even: Driven RRM.

C.

Disable the LAG Mode or Next Reboot.

D.

Enable the Authorized MIC APs against auth-list or AAA.

Buy Now
Questions 103

Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right.

200-301 Question 103

Options:

Buy Now
Questions 104

Refer to the exhibit.

200-301 Question 104

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

Options:

A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255

B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22

C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22

D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255

Buy Now
Questions 105

An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?

200-301 Question 105

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 106

What is recommended for the wireless infrastructure design of an organization?

Options:

A.

group access points together to increase throughput on a given channel

B.

configure the first three access points are configured to use Channels 1, 6, and 11

C.

include a least two access points on nonoverlapping channels to support load balancing

D.

assign physically adjacent access points to the same Wi-Fi channel

Buy Now
Questions 107

How do TCP and UDP differ in the way they guarantee packet delivery?

Options:

A.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

B.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

C.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

D.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

Buy Now
Questions 108

Which network allows devices to communicate without the need to access the Internet?

Options:

A.

1729.0.0/16

B.

172.28.0.0/16

C.

192.0.0.0/8

D.

209.165.201.0/24

Buy Now
Questions 109

Refer to the Exhibit.

200-301 Question 109

After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?

Options:

A.

There is a native VLAN mismatch

B.

Access mode is configured on the switch ports.

C.

The PCs are m the incorrect VLAN

D.

All VLANs are not enabled on the trunk

Buy Now
Questions 110

Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?

Options:

A.

DTP

B.

FTP

C.

SMTP

D.

TFTP

Buy Now
Questions 111

Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?

Options:

A.

Ansible

B.

Python

C.

Puppet

D.

Chef

Buy Now
Questions 112

in Which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?

Options:

A.

A spine switch and a leaf switch can be added with redundant connections between them

B.

A spine switch can be added with at least 40 GB uplinks

C.

A leaf switch can be added with a single connection to a core spine switch.

D.

A leaf switch can be added with connections to every spine switch

Buy Now
Questions 113

What is the total number of users permitted to simultaneously browse the controller management pages when using the AireOS GUI?

Options:

A.

2

B.

5

C.

8

D.

9

Buy Now
Questions 114

In QoS, which prioritization method is appropriate for interactive voice and video?

Options:

A.

expedited forwarding

B.

traffic policing

C.

round-robin scheduling

D.

low-latency queuing

Buy Now
Questions 115

A user configured OSPF in a single area between two routers A serial interface connecting R1 and R2 is running encapsulation PPP By default which OSPF network type is seen on this interface when the user types show ip ospf interface on R1 or R2?

Options:

A.

port-to-multipoint

B.

broadcast

C.

point-to-point

D.

nonbroadcast

Buy Now
Questions 116

Refer to the exhibit.

200-301 Question 116

An engineer must document all Wi-Fi services on a new wireless LAN controller. The Wi-Fi SSID " Office_WLan " has Layer 2 Security. What is determined by this configuration?

Options:

A.

There is a strong mutual authentication used between NAC and the network devices using x.509 standard.

B.

There is an extra layer of security that ensures only authorized devices with known MAC addresses connect to the network.

C.

There is a robust security mechanism configured to protect against various Layer 2 and Layer 3 attacks.

D.

There is Galois cache algorithm configured that provides strong encryption and authentication.

Buy Now
Questions 117

200-301 Question 117

Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?

Options:

A.

router D

B.

router B

C.

router C

D.

router A

Buy Now
Questions 118

What are two roles of Domain Name Services (DNS)? (Choose Two)

Options:

A.

builds a flat structure of DNS names for more efficient IP operations

B.

encrypts network Traffic as it travels across a WAN by default

C.

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

D.

enables applications to identify resources by name instead of IP address

E.

allows a single host name to be shared across more than one IP address

Buy Now
Questions 119

Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?

Options:

A.

20

B.

90

C.

110

D.

115

Buy Now
Questions 120

200-301 Question 120

Refer to the exhibit. Which route type is configured to reach the Internet?

Options:

A.

host route

B.

floating static route

C.

default route

D.

network route

Buy Now
Questions 121

200-301 Question 121

Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?

Options:

A.

0.0.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.255

Buy Now
Questions 122

Which role does AI play in monitoring network data flow?

Options:

A.

It analyzes patterns for anomaly detection.

B.

It exclusively predicts device malfunctions.

C.

It simplifies traffic route mapping.

D.

It enhances data packet delivery speeds.

Buy Now
Questions 123

When implementing a router as a DHCP server, which two features must be configured ' ? (Choose two)

Options:

A.

relay agent information

B.

database agent

C.

address pool

D.

smart-relay

E.

manual bindings

Buy Now
Questions 124

What is the expected outcome when an EUI-64 address is generated?

Options:

A.

The seventh bit of the original MAC address of the interface is inverted

B.

The interface ID is configured as a random 64-bit value

C.

The characters FE80 are inserted at the beginning of the MAC address of the interface

D.

The MAC address of the interface is used as the interface ID without modification

Buy Now
Questions 125

Drag and drop the TCP and UDP characteristics from the left onto the supporting protocols on the right. Not all options are used.

200-301 Question 125

Options:

Buy Now
Questions 126

Which set of action satisfy the requirement for multifactor authentication?

Options:

A.

The user swipes a key fob, then clicks through an email link

B.

The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device

C.

The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen

D.

The user enters a user name and password and then re-enters the credentials on a second screen

Buy Now
Questions 127

When deploying syslog, which severity level logs informational message?

Options:

A.

0

B.

2

C.

4

D.

6

Buy Now
Questions 128

Refer to the exhibit.

200-301 Question 128

Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?

Options:

A.

switchport mode trunk

B.

switchport mode dot1-tunnel

C.

switchport mode dynamic auto

D.

switchport mode dynamic desirable

Buy Now
Questions 129

Which two primary drivers support the need for network automation? (Choose two.)

Options:

A.

Eliminating training needs

B.

Increasing reliance on self-diagnostic and self-healing

C.

Policy-derived provisioning of resources

D.

Providing a ship entry point for resource provisioning

E.

Reducing hardware footprint

Buy Now
Questions 130

Which function does an SNMP agent perform?

Options:

A.

it sends information about MIB variables in response to requests from the NMS

B.

it requests information from remote network nodes about catastrophic system events.

C.

it manages routing between Layer 3 devices in a network

D.

it coordinates user authentication between a network device and a TACACS+ or RADIUS server

Buy Now
Questions 131

What is a function of a Layer 3 switch?

Options:

A.

move frames between endpoints limited to IP addresses

B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.

forward Ethernet frames between VLANs using only MAC addresses

D.

flood broadcast traffic within a VLAN

Buy Now
Questions 132

Refer to the exhibit.

200-301 Question 132

Only four switches are participating in the VLAN spanning-tree process.

Branch-1 priority 614440

Branch-2: priority 39082416

Branch-3: priority 0

Branch-4: root primary

Which switch becomes the permanent root bridge for VLAN 5?

Options:

A.

Branch-1

B.

Branch-2

C.

Branch-3

D.

Branch-4

Buy Now
Questions 133

What are two characteristics of an SSID? (Choose Two)

Options:

A.

It can be hidden or broadcast in a WLAN

B.

It uniquely identifies an access point in a WLAN

C.

It uniquely identifies a client in a WLAN

D.

It is at most 32 characters long.

E.

IT provides secured access to a WLAN

Buy Now
Questions 134

Aswitch receives a frame with the destination MAC address 3C:5D: 7E:9F: 1A:2B.

Switch# show ethernet-frame-and-mac-address-table

200-301 Question 134

How does the switch handle the frame?

Options:

A.

It ages out the frame until the MAC address becomes known.

B.

It drops the frame to avoid unnecessary network congestion.

C.

It switches the frame to a predetermined port based on settings.

D.

It floods the frame to all ports except the incoming port.

Buy Now
Questions 135

Drag and drop the characteristic from the left onto the cable type on the right.

200-301 Question 135

Options:

Buy Now
Questions 136

Which action prevents debug messages from being sent via syslog while allowing other messages when an abnormally high number of syslog messages are generated by a device with the debug process turned on?

Options:

A.

Use an access list to filter out the syslog messages.

B.

Turn off the logging monitor in global configuration mode.

C.

Disable logging to the console.

D.

Set the logging trap severity level to informational.

Buy Now
Questions 137

How does automation affect network management processes?

Options:

A.

It interoperates with ISE to define and manage patch and update schedules.

B.

It performs configuration updates based on user profiles.

C.

It improves the efficiency of system lifecycle management.

D.

It provides a reactive support model.

Buy Now
Questions 138

How is Al used to identify issues within network traffic?

Options:

A.

II exclusively predicts device malfunctions.

B.

It enhances data packet delivery speeds.

C.

It simplifies traffic route mapping.

D.

It analyzes patterns for anomaly detection.

Buy Now
Questions 139

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?

Options:

A.

1,6,11

B.

1,5,10

C.

1,2,3

D.

5,6,7

Buy Now
Questions 140

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?

Options:

A.

The application requires an administrator password to reactivate after a configured Interval.

B.

The application requires the user to enter a PIN before it provides the second factor.

C.

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

D.

The application verifies that the user is in a specific location before it provides the second factor.

Buy Now
Questions 141

What is a characteristic of private IPv4 addressing?

Options:

A.

traverses the Internet when an outbound ACL Is applied

B.

used without allocation from a regional Internet authority

C.

shared address space between an ISP and subscriber

D.

reduces the need for isolated networks

Buy Now
Questions 142

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

Options:

A.

configure the hello and dead timers to match on both sides

B.

configure the same process ID for the router OSPF process

C.

configure the same router ID on both routing processes

D.

Configure the interfaces as OSPF active on both sides.

E.

configure both interfaces with the same area ID

Buy Now
Questions 143

What is the benefit of configuring PortFast on an interface?

Options:

A.

After the cable is connected, the interface uses the fastest speed setting available for that cable type

B.

After the cable is connected, the interface is available faster to send and receive user data

C.

The frames entering the interface are marked with higher priority and then processed faster by a switch.

D.

Real-time voice and video frames entering the interface are processed faster

Buy Now
Questions 144

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?

Options:

A.

enable AAA override

B.

enable RX-SOP

C.

enable DTIM

D.

enable Band Select

Buy Now
Questions 145

Refer to the exhibit.

200-301 Question 145

Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?

Options:

A.

longest prefix

B.

metric

C.

cost

D.

administrative distance

Buy Now
Questions 146

Refer to the exhibit.

200-301 Question 146

Which command configures a floating static route to provide a backup to the primary link?

Options:

A.

ip route 0.0.0.0 0.0.0.0 209.165.202.131

B.

ip route 209.165.201.0 255.255.255.224 209.165.202.130

C.

ip route 0.0.0.0 0.0.0.0 209.165.200.224

D.

ip route 209.165.200.224 255.255.255.224 209.165.202.129 254

Buy Now
Questions 147

Refer to the exhibit.

200-301 Question 147

The show ip ospf interface command has been executed on R1 How is OSPF configured?

Options:

A.

The interface is not participating in OSPF

B.

A point-to-point network type is configured

C.

The default Hello and Dead timers are in use

D.

There are six OSPF neighbors on this interface

Buy Now
Questions 148

200-301 Question 148

Refer to the exhibit. Which configuration enables SW2 to establish an LACP EtherChannel?

Options:

A.
B.

B.

C.

C.

D.

D.

Buy Now
Questions 149

200-301 Question 149

Refer to the exhibit. An administrator is configuring a new WLAN for a wireless network that has these requirements:

Dual-band clients that connect to the WLAN must be directed to the 5-GHz spectrum.

Wireless clients on this WLAN must be able to apply VLAN settings from RADIUS attributes.

Which two actions meet these requirements? (Choose two.)

Options:

A.

Enable the Aironet IE option.

B.

Enable the Coverage Hole Detection option.

C.

Set the MFP Client Protection option to Required

D.

Enable the client band select option.

E.

Enable the allow AAA Override option

Buy Now
Questions 150

An organization developed new security policies and decided to print the policies and distribute them to all personnel so that employees review and apply the policies. Which element of a security program is the organization implementing?

Options:

A.

Asset identification

B.

User training

C.

Physical access control

D.

Vulnerability control

Buy Now
Questions 151

What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closer? (Choose two.)

Options:

A.

enable the PortFast feature on ports

B.

implement port-based authentication

C.

configure static ARP entries

D.

configure ports to a fixed speed

E.

shut down unused ports

Buy Now
Questions 152

200-301 Question 152

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?

Options:

A.

ip route 10.0.2.0 255.255.255.240 10.0.0.7 92

B.

ip route 10.0.2.0 255.255.255.248 10.0.0.6 91

C.

ip route 10.0.2.0 256.255.255.240 10.0.0.6 91

D.

ip route 10.0.2.0 255.255.255.248 null0 93

Buy Now
Questions 153

An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or desirable mode. What action should be taken?

Options:

A.

configure switchport nonegotiate

B.

configure switchport mode dynamic desirable

C.

configure switchport mode dynamic auto

D.

configure switchport trunk dynamic desirable

Buy Now
Questions 154

Where does a switch maintain DHCP snooping information?

Options:

A.

in the MAC address table

B.

in the CAM table

C.

in the binding database

D.

in the frame forwarding database

Buy Now
Questions 155

When OSPF learns multiple paths to a network, how does it select a route?

Options:

A.

It multiple the active K value by 256 to calculate the route with the lowest metric.

B.

For each existing interface, it adds the metric from the source router to the destination to calculate the route with the lowest bandwidth.

C.

It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface to calculate the router with the lowest cost.

D.

It count the number of hops between the source router and the destination to determine the router with the lowest metric

Buy Now
Questions 156

Which JSON data type is an unordered set of attribute- value pairs?

Options:

A.

array

B.

string

C.

object

D.

Boolean

Buy Now
Questions 157

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

Options:

A.

Exchange

B.

2-way

C.

Full

D.

Init

Buy Now
Questions 158

What makes Cisco DNA Center different from traditional network management applications and their management of networks?

Options:

A.

It omits supports auto-discovery of network elements in a greenfield deployment.

B.

It modular design allows someone to implement different versions to meet the specific needs of an organization

C.

It abstracts policy from the actual device configuration

D.

It does not support high availability of management functions when operating in cluster mode

Buy Now
Questions 159

200-301 Question 159

Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down, which two tasks must they perform to complete the process? (Choose two)

Options:

A.

Select the WPA2 Policy and AES check boxes

B.

Select ASCII from the PSK Format drop-down list, enter the key, and leave the Auth Key Mgmt setting blank

C.

Select the WPA2 Policy, AES, and TKIP check boxes

D.

Select CCKM for the Auth Key Mgmt drop-down list, set the PSK Format to Hex, and enter the key

E.

Select PSK from the Auth Key Mgmt drop-down list, set the PSK Format to ASCII, and enter the key

Buy Now
Questions 160

Drag and drop the steps in a standard DNS lookup operation from the let into the order on the right.

200-301 Question 160

Options:

Buy Now
Questions 161

A new DHCP server has been deployed in a corporate environment with lease time set to eight hours. Which CMD command on a Windows-based device allows the engineer to verify the DHCP lease expiration?

Options:

A.

ipconfig /renew

B.

ipconfig

C.

ipconfig /all

D.

ipconfig /displaydns

Buy Now
Questions 162

Drag and drop the IPv6 address from the left onto the type on the right.

200-301 Question 162

Options:

Buy Now
Questions 163

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

Options:

A.

switchport trunk allowed vlan 10

B.

switchport trunk native vlan 10

C.

switchport mode trunk

D.

switchport trunk encapsulation dot1q

Buy Now
Questions 164

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two)

Options:

A.

when the sending device waits 15 seconds before sending the frame again

B.

when the cable length limits are exceeded

C.

when one side of the connection is configured for half-duplex

D.

when Carrier Sense Multiple Access/Collision Detection is used

E.

when a collision occurs after the 32nd byte of a frame has been transmitted

Buy Now
Questions 165

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

Options:

A.

Enable Security Association Teardown Protection and set the SA Query timeout to 10

B.

Enable MAC filtering and set the SA Query timeout to 10

C.

Enable 802.1x Layer 2 security and set me Comeback timer to 10

D.

Enable the Protected Management Frame service and set the Comeback timer to 10

Buy Now
Questions 166

200-301 Question 166

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?

Options:

A.

The OSPF router IDs are mismatched.

B.

Router2 is using the default hello timer.

C.

The network statement on Router1 is misconfigured.

D.

The OSPF process IDs are mismatched.

Buy Now
Questions 167

Refer to the exhibit.

200-301 Question 167

Which route type is configured to reach the internet?

Options:

A.

host route

B.

default route

C.

floating static route

D.

network route

Buy Now
Questions 168

Refer to the exhibit.

200-301 Question 168

A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other computers must be able to access the web server Which configuration when applied to switch A accomplishes this task?

200-301 Question 168

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 169

An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?

Options:

A.

WEP

B.

RC4

C.

AES

D.

TKIP

Buy Now
Questions 170

Why was the RFC 1918 address space defined?

Options:

A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Buy Now
Questions 171

Refer to the exhibit.

200-301 Question 171

The entire contents of the MAC address table are shown. Sales-4 sends a data frame to Sales-1.

200-301 Question 171

What does the switch do as it receives the frame from Sales-4?

Options:

A.

Perform a lookup in the MAC address table and discard the frame due to a missing entry.

B.

Insert the source MAC address and port into the forwarding table and forward the frame to Sales-1.

C.

Map the Layer 2 MAC address to the Layer 3 IP address and forward the frame.

D.

Flood the frame out of all ports except on the port where Sales-1 is connected.

Buy Now
Questions 172

What are two descriptions of three-tier network topologies? (Choose two)

Options:

A.

The core and distribution layers perform the same functions

B.

The access layer manages routing between devices in different domains

C.

The network core is designed to maintain continuous connectivity when devices fail.

D.

The core layer maintains wired connections for each host

E.

The distribution layer runs Layer 2 and Layer 3 technologies

Buy Now
Questions 173

Refer to the exhibit.

200-301 Question 173

Which configuration issue is preventing the OSPF neighbor relationship from being established between the two routers?

Options:

A.

R2 is using the passive-interface default command

B.

R1 has an incorrect network command for interface Gi1/0

C.

R2 should have its network command in area 1

D.

R1 interface Gil/0 has a larger MTU size

Buy Now
Questions 174

Refer to the exhibit.

200-301 Question 174

Between which zones do wireless users expect to experience intermittent connectivity?

Options:

A.

between zones 1 and 2

B.

between zones 2 and 5

C.

between zones 3 and 4

D.

between zones 3 and 6

Buy Now
Questions 175

Refer to the exhibit.

200-301 Question 175

What does router R1 use as its OSPF router-ID?

Options:

A.

10.10.1.10

B.

10.10.10.20

C.

172.16.15.10

D.

192.168.0.1

Buy Now
Questions 176

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

Options:

A.

DHCP relay agent

B.

DHCP server

C.

DHCPDISCOVER

D.

DHCPOFFER

Buy Now
Questions 177

An engineer configures interface Gi1/0 on the company PE router to connect to an ISP Neighbor discovery is disabled

200-301 Question 177

Which action is necessary to complete the configuration if the ISP uses third-party network devices?

Options:

A.

Enable LLDP globally

B.

Disable autonegotiation

C.

Disable Cisco Discovery Protocol on the interface

D.

Enable LLDP-MED on the ISP device

Buy Now
Questions 178

200-301 Question 178

Refer to the exhibit. The static routes were implemented on the border router. What is the next hop IP address for a ping sent to 172.16.153.154 from the border router?

Options:

A.

10.56.65.56

B.

10.56.65.65

C.

10.65.56.56

D.

10.65.65.65

Buy Now
Questions 179

Why would a network administrator choose to implement RFC 1918 address space?

Options:

A.

to route traffic on the internet

B.

to provide flexibility in the IP network design

C.

to provide overlapping address space with another network

D.

to limit the number of hosts on the network

Buy Now
Questions 180

Refer to the exhibit.

200-301 Question 180

Which two commands must be configured on router R1 to enable the router to accept secure remote-access connections? (Choose two)

Options:

A.

transport input telnet

B.

crypto key generate rsa

C.

ip ssh pubkey-chain

D.

login console

E.

username cisco password 0 Cisco

Buy Now
Questions 181

What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?

Options:

A.

OpenFlow

B.

Java

C.

REST

D.

XML

Buy Now
Questions 182

What are two differences between optical-fiber cabling and copper cabling? (Choose two)

Options:

A.

Light is transmitted through the core of the fiber

B.

A BNC connector is used for fiber connections

C.

The glass core component is encased in a cladding

D.

Fiber connects to physical interfaces using Rj-45 connections

E.

The data can pass through the cladding

Buy Now
Questions 183

What role does a hypervisor provide for each virtual machine in server virtualization?

Options:

A.

infrastructure-as-a-service.

B.

Software-as-a-service

C.

control and distribution of physical resources

D.

services as a hardware controller.

Buy Now
Questions 184

Refer to the exhibit.

200-301 Question 184

Which change to the configuration on Switch?

allows the two switches to establish an GtherChannel?

Options:

A.

Change the protocol to EtherChannel mode on.

B.

Change the LACP mode to active

C.

Change the LACP mode to desirable

D.

Change the protocol to PAqP and use auto mode

Buy Now
Questions 185

How does Rapid PVST+ create a fast loop-free network topology?

Options:

A.

lt requires multiple links between core switches

B.

It generates one spanning-tree instance for each VLAN

C.

It maps multiple VLANs into the same spanning-tree instance

D.

It uses multiple active paths between end stations.

Buy Now
Questions 186

Which QoS per-hop behavior changes the value of the ToS field in the IPv4 packet header?

Options:

A.

shaping

B.

classification

C.

policing

D.

marking

Buy Now
Questions 187

which IPv6 address block forwards packets to a multicast address rather than a unicast address?

Options:

A.

2000::/3

B.

FC00::/7

C.

FE80::/10

D.

FF00::/12

Buy Now
Questions 188

Which interface condition is occurring in this output?

200-301 Question 188

Options:

A.

duplex mismatch

B.

bad NIC

C.

high throughput

D.

broadcast storm

Buy Now
Questions 189

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the port to learn the MAC address of the printer and insert it into the table automatically?

Options:

A.

enable dynamic MAC address learning

B.

implement static MAC addressing.

C.

enable sticky MAC addressing

D.

implement auto MAC address learning

Buy Now
Questions 190

Where does wireless authentication happen?

Options:

A.

SSID

B.

radio

C.

band

D.

Layer 2

Buy Now
Questions 191

Refer to the exhibit.

200-301 Question 191

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

Options:

A.

207.165.200.246 via Serial0/1/0

B.

207.165.200.254 via Serial0/0/1

C.

207.165.200.254 via Serial0/0/0

D.

207.165.200.250 via Serial/0/0/0

Buy Now
Questions 192

Refer to the exhibit.

200-301 Question 192

A network engineer is in the process of establishing IP connectivity between two sites. Routers R1 and R2 are partially configured with IP addressing. Both routers have the ability to access devices on their respective LANs. Which command set configures the IP connectivity between devices located on both LANs in each site?

200-301 Question 192

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 193

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)

Options:

A.

Enable NTP authentication.

B.

Verify the time zone.

C.

Disable NTP broadcasts

D.

Specify the IP address of the NTP server

E.

Set the NTP server private key

Buy Now
Questions 194

Which result occurs when PortFast is enabled on an interface that is connected to another switch?

Options:

A.

Spanning tree may fail to detect a switching loop in the network that causes broadcast storms

B.

VTP is allowed to propagate VLAN configuration information from switch to switch automatically.

C.

Root port choice and spanning tree recalculation are accelerated when a switch link goes down

D.

After spanning tree converges PortFast shuts down any port that receives BPDUs.

Buy Now
Questions 195

Refer to the exhibit.

200-301 Question 195

What is occurring on this switch?

Options:

A.

A high number of frames smaller than 64 bytes are received.

B.

Frames are dropped after 16 failed transmission attempts.

C.

The internal transmit buffer is overloaded.

D.

An excessive number of frames greater than 1518 bytes are received.

Buy Now
Questions 196

An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines?

Options:

A.

hypervisor

B.

router

C.

straight cable

D.

switch

Buy Now
Questions 197

Refer to the exhibit.

200-301 Question 197

Which prefix does Router 1 use for traffic to Host A?

Options:

A.

10.10.10.0/28

B.

10.10.13.0/25

C.

10.10.13.144/28

D.

10.10.13.208/29

Buy Now
Questions 198

Which port type supports the spanning-tree portfast command without additional configuration?

Options:

A.

access ports

B.

Layer 3 main Interfaces

C.

Layer 3 suninterfaces

D.

trunk ports

Buy Now
Questions 199

Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC address of that interface?

Options:

A.

configure a stateful DHCPv6 server on the network

B.

enable SLAAC on an interface

C.

disable the EUI-64 bit process

D.

explicitly assign a link-local address

Buy Now
Questions 200

Which action does the router take as rt forwards a packet through the network?

Options:

A.

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

B.

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

C.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

D.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Buy Now
Questions 201

Which type of IPv6 address is publicly routable in the same way as IPv4 public address?

Options:

A.

global unicast

B.

link-local

C.

unique local

D.

multicast

Buy Now
Questions 202

What are two benefits of network automation? (Choose two)

Options:

A.

reduced operational costs

B.

reduced hardware footprint

C.

faster changes with more reliable results

D.

fewer network failures

E.

increased network security

Buy Now
Questions 203

Refer to the exhibit.

200-301 Question 203

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

200-301 Question 203

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 204

What are two reasons for an engineer to configure a floating state route? (Choose two)

Options:

A.

to automatically route traffic on a secondary path when the primary path goes down

B.

to route traffic differently based on the source IP of the packet

C.

to enable fallback static routing when the dynamic routing protocol fails

D.

to support load balancing via static routing

E.

to control the return path of traffic that is sent from the router

Buy Now
Questions 205

A network administrator must to configure SSH for remote access to router R1 The requirement is to use a public and private key pair to encrypt management traffic to and from the connecting client.

Which configuration, when applied, meets the requirements?

200-301 Question 205

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 206

A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch. What must be configured when using active mode on both sides of the connection?

Options:

A.

802.1q trunks

B.

Cisco vPC

C.

LLDP

D.

LACP

Buy Now
Questions 207

What is the same for both copper and fiber interfaces when using SFP modules?

Options:

A.

They support an inline optical attenuator to enhance signal strength

B.

They provide minimal interruption to services by being hot-swappable

C.

They offer reliable bandwidth up to 100 Mbps in half duplex mode

D.

They accommodate single-mode and multi-mode in a single module

Buy Now
Questions 208

200-301 Question 208

Refer to the exhibit. HQC needs to use a configuration that:

Handles up to 150,000 concurrent connections

Minimizes consumption of public IP addresses

Which configuration meets the requirements?

Options:

A.

ip nat pool NATPOOL 209.165.201.1 209.165.201.5 netmask 255.255.255.248ip nat inside source list HQC interface gigabitEthernet0/0 overload

B.

ip nat pool NATPOOL 209.165.200.225 209.165.200.226 netmask 255.255.255.252ip nat outside source list HQC pool NATPOOL overload

C.

ip nat pool NATPOOL 209.165.201.1 209.165.201.3 netmask 255.255.255.248ip nat inside source list HQC pool NATPOOL overload

D.

ip nat pool NATPOOL 209.165.201.1 209.165.201.248 netmask 255.255.255.248ip nat outside source list HQC pool NATPOOL overload

Buy Now
Questions 209

200-301 Question 209

Refer to the exhibit. Routers R1 and R2 have been configured with their respective LAN interfaces. The two circuits are operational and reachable across the WAN. Which command set establishes failover redundancy if the primary circuit goes down?

Options:

A.

Ri(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.62R2(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.5 2

B.

Ri(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.6R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.5

C.

Ri(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.6R2(config)#ip route 0.0.0.0 0.0.0.0 10.10.10.5

D.

Ri(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.2R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.1

Buy Now
Questions 210

Refer to the exhibit.

200-301 Question 210

Which IPv6 configuration is required for R17 to successfully ping the WAN interface on R18?

A)

200-301 Question 210

B)

200-301 Question 210

C)

200-301 Question 210

D)

200-301 Question 210

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 211

Which two QoS tools provide congestion management? (Choose two.)

Options:

A.

PBR

B.

FRTS

C.

PQ

D.

CBWFQ

E.

CAR

Buy Now
Questions 212

How does CAPWAP communicate between an access point in local mode and a WLC?

Options:

A.

The access point must directly connect to the WLC using a copper cable

B.

The access point must not be connected to the wired network, as it would create a loop

C.

The access point must be connected to the same switch as the WLC

D.

The access point has the ability to link to any switch in the network, assuming connectivity to the WLC

Buy Now
Questions 213

200-301 Question 213

Refer to the exhibit. What is the administrative distance for the advertised prefix that includes the host IP address 192.168.20.1?

Options:

A.

0

B.

192.168.10.2

C.

24

D.

1

Buy Now
Questions 214

Refer to the exhibit.

200-301 Question 214

Which network prefix was learned via EIGRP?

Options:

A.

172.16.0.0/16

B.

192.168.2.0/24

C.

207.165.200.0/24

D.

192.168.1.0/24

Buy Now
Questions 215

Refer to the exhibit.

200-301 Question 215

A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?

Options:

A.

ip route 172.21.34.0 255.255.255.192 10.73.65.65

B.

ip route 172.21.34.0 255.255.255.0 10.73.65.65

C.

ip route 172.21.34.0 255.255.128.0 10.73.65.64

D.

ip route 172.21.34.0 255.255.255.128 10.73.65.66

Buy Now
Questions 216

Which two outcomes are predictable behaviors for HSRP? (Choose two)

Options:

A.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.

B.

The two routers negotiate one router as the active router and the other as the standby router

C.

Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.D The two routers synchronize configurations to provide consistent packet forwarding

D.

The two routed share the same IP address, and default gateway traffic is load-balanced between them

Buy Now
Questions 217

How is AI used to identify issues within network traffic?

Options:

A.

It enhances data packet delivery speeds

B.

It analyzes patterns for anomaly detection

C.

It exclusively predicts device malfunctions

D.

It guarantees zero packet loss in the network

Buy Now
Questions 218

Refer to the exhibit.

200-301 Question 218

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.

200-301 Question 218

Options:

Buy Now
Questions 219

Refer to the exhibit.

200-301 Question 219

An engineer is configuring an EtherChannel using LACP between Switches 1 and 2 Which configuration must be applied so that only Switch 1 sends LACP initiation packets?

Options:

A.

Switch 1 (config-if)#channel-group 1 mode onSwrtch2(config-if)#channel-group 1 mode passive

B.

Switch1(config-if)#channel-group 1 mode passiveSwitch2(config-if)#channel-group 1 mode active

C.

Switch1{config-if)£channel-group 1 mode activeSwitch2(config-if)#channel-group 1 mode passive

D.

Switch1(config-if)#channel-group 1 mode onSwitch2(config-if)#channel-group 1 mode active

Buy Now
Questions 220

Refer to the exhibit.

200-301 Question 220

R1 learns all routes via OSPF Which command configures a backup static route on R1 to reach the 192 168.20.0/24 network via R3?

Options:

A.

R1(config)#ip route 192.168.20.0 255.255.0.0 192.168.30.2

B.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 90

C.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2 111

D.

R1(config)#ip route 192.168.20.0 255.255.255.0 192.168.30.2

Buy Now
Questions 221

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

200-301 Question 221

B)

200-301 Question 221

C)

200-301 Question 221

D)

200-301 Question 221

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 222

An engineer must configure R1 for a new user account. The account must meet these requirements:

* It must be configured in the local database.

* The username is engineer.

* It must use the strongest password configurable. Which command must the engineer configure on the router?

Options:

A.

R1 (config)# username engineer2 algorithm-type scrypt secret test2021

B.

R1(config)# username engineer2 secret 5 password S1$b1Ju$kZbBS1Pyh4QzwXyZ

C.

R1(config)# username engineer2 privilege 1 password 7 test2021

D.

R1(config)# username englneer2 secret 4 S1Sb1Ju$kZbBS1Pyh4QzwXyZ

Buy Now
Questions 223

Refer to the exhibit.

200-301 Question 223

An engineer built a new L2 LACP EtherChannel between SW1 and SW2 and executed these show commands to verify the work. Which additional task allows the two switches to establish an LACP port channel?

Options:

A.

Change the channel-group mode on SW2 to auto

B.

Change the channel-group mode on SW1 to desirable.

C.

Configure the interface port-channel 1 command on both switches.

D.

Change the channel-group mode on SW1 to active or passive.

Buy Now
Questions 224

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:

A.

password password

B.

crypto key generate rsa modulus 1024

C.

ip domain-name domain

D.

ip ssh authentication-retries 2

Buy Now
Questions 225

Refer to the exhibit.

200-301 Question 225

The following must be considered:

• SW1 is fully configured for all traffic

• The SW4 and SW9 links to SW1 have been configured

• The SW4 interface Gi0/1 and Gi0/0 on SW9 have been configured

• The remaining switches have had all VLANs adde d to their VLAN database

Which configuration establishes a successful ping from PC2 to PC7 without interruption to traffic flow between other PCs?

A)

200-301 Question 225

B)

200-301 Question 225

C)

200-301 Question 225

D)

200-301 Question 225

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 226

Which feature of Digest Authentication prevents credentials from being sent in plaintext?

Options:

A.

SSL/TLS encryption

B.

Challenge-response mechanism

C.

Token-based authorization

D.

Public key infrastructure

Buy Now
Questions 227

Which two spanning-tree states are bypassed on an interface running PortFast? (Choose two.)

Options:

A.

disabled

B.

listening

C.

forwarding

D.

learning

E.

blocking

Buy Now
Questions 228

Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used.

200-301 Question 228

Options:

Buy Now
Questions 229

Drag and drop the statements about networking from the left onto the corresponding networking types on the right.

200-301 Question 229

Options:

Buy Now
Questions 230

What is a function of Opportunistic Wireless Encryption in an environment?

Options:

A.

offer compression

B.

increase security by using a WEP connection

C.

provide authentication

D.

protect traffic on open networks

Buy Now
Questions 231

Refer to the exhibit.

200-301 Question 231

An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for now hosts. Which configuration script must be used?

A)

200-301 Question 231

B)

200-301 Question 231

C)

200-301 Question 231

D)

200-301 Question 231

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 232

Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.

200-301 Question 232

Options:

Buy Now
Questions 233

Refer to the exhibit.

200-301 Question 233

A network engineer must update the configuration on Switch2 so that it sends LLDP packets every minute and the information sent via LLDP is refreshed every 3 minutes Which configuration must the engineer apply?

A)

200-301 Question 233

B)

200-301 Question 233

C)

200-301 Question 233

D)

200-301 Question 233

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 234

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165 200 225

How should R1 be configured?

A)

200-301 Question 234

B)

200-301 Question 234

C)

200-301 Question 234

D)

200-301 Question 234

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 235

Refer to the exhibit.

200-301 Question 235

All VLANs are present in the VLAN database. Which command sequence must be applied to complete the configuration?

Options:

A.

Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15

B.

Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15

C.

interface FastEthernet0/1 switchport mode access switchport voice vlan 10

D.

Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated

Buy Now
Questions 236

A Cisco engineer is configuring a factory-default router with these three passwords:

• The user EXEC password for console access is p4ssw0rd1

• The user EXEC password for Telnet access is s3cr3t2

• The password for privileged EXEC mode is pnv4t3p4ss Which command sequence must the engineer configured

A)

200-301 Question 236

B)

200-301 Question 236

C)

200-301 Question 236

D)

200-301 Question 236

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 237

Which Layer 2 switch function encapsulates packets for different VLANs so that the packets traverse the same port and maintain traffic separation between the VLANs?

Options:

A.

VLAN numbering

B.

VLAN DSCP

C.

VLAN tagging

D.

VLAN marking

Buy Now
Questions 238

Which protocol is used for secure remote CLI access?

Options:

A.

HTTPS

B.

HTTP

C.

Telnet

D.

SSH

Buy Now
Questions 239

Refer to the exhibit.

200-301 Question 239

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?

A)

200-301 Question 239

B)

200-301 Question 239

C)

200-301 Question 239

D)

200-301 Question 239

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 240

What is an expected outcome when network management automation is deployed?

Options:

A.

A distributed management plane must be used.

B.

Software upgrades are performed from a central controller

C.

Complexity increases when new device configurations are added

D.

Custom applications are needed to configure network devices

Buy Now
Questions 241

Refer to the exhibit.

200-301 Question 241

Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to forward traffic with a destination IP of 10.10.10.24?

Options:

A.

F0/10

B.

F0/11

C.

F0/12

D.

F0/13

Buy Now
Questions 242

What is the difference between IPv6 unicast and anycast addressing?

Options:

A.

IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration

B.

IPv6 unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration

C.

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.

D.

Unlike an IPv6 anycast address, an IPv6 unicast address is assigned to a group of interfaces on multiple nodes

Buy Now
Questions 243

Refer to the exhibit.

200-301 Question 243

Which configuration allows routers R14 and R86 to form an OSPFv2 adjacency while acting as a central point for exchanging OSPF information between routers?

A)

200-301 Question 243

B)

200-301 Question 243

C)

200-301 Question 243

D)

200-301 Question 243

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 244

Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.

200-301 Question 244

Options:

Buy Now
Questions 245

What is one reason to implement LAG on a Cisco WLC?

Options:

A.

to increase security and encrypt management frames

B.

to provide link redundancy and load balancing

C.

to allow for stateful and link-state failover

D.

to enable connected switch ports to failover and use different VLANs

Buy Now
Questions 246

What is a requirement for nonoverlapping Wi-Fi channels?

Options:

A.

different security settings

B.

discontinuous frequency ranges

C.

different transmission speeds

D.

unique SSIDs

Buy Now
Questions 247

Refer to the exhibit.

200-301 Question 247

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:

A.

username CNAC secret R!41!4319115@

B.

ip ssh version 2

C.

line vty 0 4

D.

crypto key generate rsa 1024

E.

transport input ssh

Buy Now
Questions 248

200-301 Question 248

Three switches must be configured for Layer 2 connectivity. The company requires only the designated VLANs to be configured on their respective switches and permitted accross any links between switches for security purposes. Do not modify or delete VTP configurations.

The network needs two user-defined VLANs configured:

VLAN 110: MARKETING

VLAN 210: FINANCE

1. Configure the VLANs on the designated switches and assign them as access ports to the interfaces connected to the PCs.

2. Configure the e0/2 interfaces on Sw1 and Sw2 as 802.1q trunks with only the required VLANs permitted.

3. Configure the e0/3 interfaces on Sw2 and Sw3 as 802.1q trunks with only the required VLANs permitted.

200-301 Question 248

Options:

Buy Now
Questions 249

200-301 Question 249

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?

Options:

A.

ip route 10.0.2.0 255.255.255.240 10.0.0.6 91

B.

ip route 10.0.2.0 255.255.255.248 10.0.0.6 91

C.

ip route 10.0.2.0 255.255.255.248 null0 93

D.

ip route 10.0.2.0 255.255.255.240 10.0.0.7 92

Buy Now
Questions 250

Which interface is used to send traffic to the destination network?

O 10.18.75.113/27 [110/6906] via GO/6

O 10.18.75.113/27 [110/23018] via GO/3

R 10.18.75.113/27 [120/16] via GO/16

R 10.18.75.113/27 [120/14] via GO/23

Options:

A.

G0/23

B.

G0/3

C.

G0/16

D.

G0/6

Buy Now
Questions 251

Which WLC management connection type is vulnerable to man-in-the-middle attacks?

Options:

A.

SSH

B.

HTTPS

C.

Telnet

D.

console

Buy Now
Questions 252

Refer to the exhibit.

200-301 Question 252

Users need to connect to the wireless network with IEEE 802. 11r-compatible devices. The connection must be maintained as users travel between floors or to other areas in the building What must be the configuration of the connection?

Options:

A.

Select the WPA Policy option with the CCKM option.

B.

Disable AES encryption.

C.

Enable Fast Transition and select the FT 802.1x option.

D.

Enable Fast Transition and select the FT PSK option.

Buy Now
Questions 253

Refer to the exhibit.

200-301 Question 253

All traffic enters the CPE router from interface Serial0/3 with an IP address of 192 168 50 1 Web traffic from the WAN is destined for a LAN network where servers are load-balanced An IP packet with a destination address of the HTTP virtual IP of 192 1681 250 must be forwarded Which routing table entry does the router use?

Options:

A.

192.168.1.0/24 via 192.168.12.2

B.

192.168.1.128/25 via 192.168.13.3

C.

192.168.1.192/26 via 192.168.14.4

D.

192.168.1.224/27 via 192.168.15.5

Buy Now
Questions 254

Refer to the exhibit.

200-301 Question 254

Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?

Options:

A.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 100

B.

R3(config)#interface Gig0/0 R3(config-if)#ip ospf priority 100

C.

R3(config)#interface Gig0/0 R3(config-if)i=ip ospf priority 1

D.

R3(config)#interface Gig0/1 R3(config-if)#ip ospf priority 0

Buy Now
Questions 255

Which two components comprise part of a PKI? (Choose two.)

Options:

A.

preshared key that authenticates connections

B.

RSA token

C.

CA that grants certificates

D.

clear-text password that authenticates connections

E.

one or more CRLs

Buy Now
Questions 256

Which two network actions occur within the data plane? (Choose two.)

Options:

A.

Add or remove an 802.1Q trunking header.

B.

Make a configuration change from an incoming NETCONF RPC.

C.

Run routing protocols.

D.

Match the destination MAC address to the MAC address table.

E.

Reply to an incoming ICMP echo request.

Buy Now
Questions 257

Refer to the exhibit.

200-301 Question 257

Users on existing VLAN 100 can reach sites on the Internet. Which action must the administrator take to establish connectivity to the Internet for users in VLAN 200?

Options:

A.

Define a NAT pool on the router.

B.

Configure static NAT translations for VLAN 200.

C.

Configure the ip nat outside command on another interface for VLAN 200.

D.

Update the NAT INSIDF RANGFS ACL

Buy Now
Questions 258

Refer to the exhibit.

200-301 Question 258

What is the metric for the route to the 192.168.10.33 host?

Options:

A.

84

B.

110

C.

192

D.

193

Buy Now
Questions 259

Refer to the exhibit.

200-301 Question 259

An engineer is updating the R1 configuration to connect a new server to the management network. The PCs on the management network must be blocked from pinging the default gateway of the new server. Which command must be configured on R1 to complete the task?

Options:

A.

R1(config)#lp route 172.16.2.2 255.255.255.248 gi0/1

B.

R1(config)#jp route 172.16.2.2 255.255.255.255 gi0/0

C.

R1(config > #ip route 172.16.2.0 255.255.255.0 192.168.1.15

D.

R1(conflg)#ip route 172.16.2.0 255.255.255.0 192.168.1.5

Buy Now
Questions 260

What is a requirement when configuring or removing LAG on a WLC?

Options:

A.

The Incoming and outgoing ports for traffic flow must be specified If LAG Is enabled.

B.

The controller must be rebooted after enabling or reconfiguring LAG.

C.

The management interface must be reassigned if LAG disabled.

D.

Multiple untagged interfaces on the same port must be supported.

Buy Now
Questions 261

A network engineer must configure two new subnets using the address block 10 70 128 0/19 to meet these requirements:

• The first subnet must support 24 hosts

• The second subnet must support 472 hosts

• Both subnets must use the longest subnet mask possible from the address block

Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )

Options:

A.

interface vlan 1234ip address 10.70.159.1 255.255.254.0

B.

interface vlan 1148ip address 10.70.148.1 255.255.254.0

C.

interface vlan 4722ip address 10.70.133.17 255.255.255.192

D.

interface vlan 3002ip address 10.70.147.17 255.255.255.224

E.

interface vlan 155ip address 10.70.155.65 255.255.255.224

Buy Now
Questions 262

Refer to the exhibit.

200-301 Question 262

Which route must be configured on R1 so that OSPF routing is used when OSPF is up. but the server is still reachable when OSPF goes down?

Options:

A.

ip route 10.1.1.10 255.255.255.255 172.16.2.2 100

B.

ip route 10.1.1.0 255.255.255.0 gi0/1 125

C.

ip route 10.1.1.0 255.255.255.0 172.16.2.2 100

D.

ip route 10.1.1.10 255.255.255.255 gi0/0 125

Buy Now
Questions 263

Refer to the exhibit.

200-301 Question 263

Of the routes learned with dynamic routing protocols, which has the least preferred metric?

Options:

A.

Local

B.

EIGRP

C.

OSPF

D.

RIP

Buy Now
Questions 264

Why does an administrator choose to implement a remote access IPsec VPN?

Options:

A.

to establish an encrypted tunnel between a remote user and a private network over the internet

B.

to allow access to an enterprise network using any internet-enabled location via a web browser using SSL

C.

to provide a secure link between an HTTPS server, authentication subsystem, and an end-user

D.

to use cryptography for authentication between a device and user over a negotiated VPN gateway

Buy Now
Questions 265

200-301 Question 265

Refer to the exhibit. A secondary route is required on router R1 to pass traffic to the LAN network on R2 if the primary link fails. Which command must be entered to configure the router?

Options:

A.

ip route 10.0.2.0 255.255.255.240 10.0.0.7 92

B.

ip route 10.0.2.0 255.255.255.248 10.0.0.6 91

C.

ip route 10.0.2.0 256.255.255.240 10.0.0.6 91

D.

ip route 10.0.2.0 255.255.255.248 null0 93

Buy Now
Questions 266

Drag and drop the IPv6 address from the left onto the type on the right.

200-301 Question 266

Options:

Buy Now
Questions 267

Which statement describes virtualization on containers?

Options:

A.

It is a type of operating system virtualization that allows the host operating system to control the different CPU memory processes.

B.

It emulates a physical computer and enables multiple machines to run with many operating systems on a physical machine.

C.

It separates virtual machines from each other and allocates memory, processors, and storage to compute.

D.

It contains a guest operating system and virtual partition of hardware for OS and requires application libraries.

Buy Now
Questions 268

Refer to the exhibit.

200-301 Question 268

Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)

A)

200-301 Question 268

B)

200-301 Question 268

C)

200-301 Question 268

D)

200-301 Question 268

E)

200-301 Question 268

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 269

Which value is the unique identifier that an access point uses to establish and maintain wireless connectivity to wireless network devices?

Options:

A.

VLANID

B.

SSID

C.

RFID

D.

WLANID

Buy Now
Questions 270

Which wireless security protocol relies on Perfect Forward Secrecy?

Options:

A.

WPA3

B.

WPA

C.

WEP

D.

WPA2

Buy Now
Questions 271

Refer to the exhibit.

200-301 Question 271

The DHCP server and clients are connected to the same switch. What is the next step to complete the DHCP configuration to allow clients on VLAN 1 to receive addresses from the DHCP server?

Options:

A.

Configure the ip dhcp snooping trust command on the interlace that is connected to the DHCP client.

B.

Configure the ip dhcp relay information option command on the interface that is connected to the DHCP client.

C.

Configure the ip dhcp snooping trust command on the interface that is connected to the DHCP server.

D.

Configure the Ip dhcp relay information option command on the interface that is connected to the DHCP server.

Buy Now
Questions 272

Refer to the exhibit.

200-301 Question 272

Which plan must be Implemented to ensure optimal QoS marking practices on this network?

Options:

A.

As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer.

B.

Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2.

C.

Remark traffic as it traverses R1 and trust all markings at the access layer.

D.

As traffic enters from the access layer on SW1 and SW2. trust all traffic markings.

Buy Now
Questions 273

Refer to the exhibit.

200-301 Question 273

What is a reason for poor performance on the network interface?

Options:

A.

The interface is receiving excessive broadcast traffic.

B.

The cable connection between the two devices is faulty.

C.

The interface is operating at a different speed than the connected device.

D.

The bandwidth setting of the interface is misconfigured

Buy Now
Questions 274

Which field within the access-request packet is encrypted by RADIUS?

Options:

A.

authorized services

B.

authenticator

C.

username

D.

password

Buy Now
Questions 275

Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum bandwidth has been surpassed?

Options:

A.

weighted random early detection

B.

traffic policing

C.

traffic shaping

D.

traffic prioritization

Buy Now
Questions 276

Refer to the exhibit.

200-301 Question 276

Which command configures OSPF on the point-to-point link between routers R1 and R2?

Options:

A.

router-id 10.0.0.15

B.

neighbor 10.1.2.0 cost 180

C.

ipospf priority 100

D.

network 10.0.0.0 0.0.0.255 area 0

Buy Now
Questions 277

What is a function of an endpoint on a network?

Options:

A.

forwards traffic between VLANs on a network

B.

connects server and client devices to a network

C.

allows users to record data and transmit to a tile server

D.

provides wireless services to users in a building

Buy Now
Questions 278

When deploying a new network that includes both Cisco and third-party network devices, which redundancy protocol avoids the interruption of network traffic if the default gateway router fails?

Options:

A.

FHRP

B.

HSRP

C.

GLBP

D.

VRRP

Buy Now
Questions 279

200-301 Question 279

Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down, which two tasks must they perform to complete the process? (Choose two)

Options:

A.

Select the WPA2 Policy and AES check boxes

B.

Select ASCII from the PSK Format drop-down list, enter the key, and leave the Auth Key Mgmt setting blank

C.

Select the WPA2 Policy, AES, and TKIP check boxes

D.

Select CCKM for the Auth Key Mgmt drop-down list, set the PSK Format to Hex, and enter the key

E.

Select PSK from the Auth Key Mgmt drop-down list, set the PSK Format to ASCII, and enter the key

Buy Now
Questions 280

200-301 Question 280

Refer to the exhibit. How will router R1 handle packets destined to 192.168.64.22?

Options:

A.

It will use the static route to 10.1.1.1.

B.

It will use the route with the highest AD and highest destination IP.

C.

It will route the packets to 10.1.1.2.

D.

It will drop the packets.

Buy Now
Questions 281

What is a characteristic of a Layer 2 switch?

Options:

A.

Provides a single broadcast domain for all connected devices

B.

Performs packet fragmentation and reassembly

C.

Tracks the number of active TCP connections

D.

Uses the data link layer for communications

Buy Now
Questions 282

Which two principles must be considered when using per-hop behavior in QoS? (Choose two.)

Options:

A.

Policing is not supported on subinterfaces.

B.

Shaping and rate limiting have the same effect.

C.

Shaping drops excessive traffic without adding traffic delay.

D.

Shaping levels out traffic bursts by delaying excess traffic.

E.

Policing is performed in the inbound and outbound directions.

Buy Now
Questions 283

200-301 Question 283

Refer to the exhibit. Which routes are configured with their default administrative distances?

Options:

A.

EIGRP

B.

OSPF

C.

RIP

D.

Local

Buy Now
Questions 284

Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?

Options:

A.

LAG

B.

default

C.

trunk

D.

Bopess

Buy Now
Questions 285

Which two transport layer protocols carry syslog messages? (Choose two.)

Options:

A.

UDP

B.

RTP

C.

TCP

D.

IP

E.

ARP

Buy Now
Questions 286

Which two features are provided by Ansible in network automation? (Choose two.)

Options:

A.

supplying network credentials

B.

role-based access control

C.

agentless deployment

D.

manual playbook runs

E.

launching job templates using version control

Buy Now
Questions 287

Drag and drop the characteristics of networking from the left onto the networking types on the right.

200-301 Question 287

Options:

Buy Now
Questions 288

Refer to the exhibit.

200-301 Question 288

Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?

Options:

A.

ip route 0.0.0.0 0.0.0.0 g0/1 1

B.

ip route 0.0.0.0 0.0.0.0 209.165.201.5 10

C.

ip route 0.0.0.0 0.0.0.0 209.165.200.226 1

D.

ip route 0,0.0.0 0.0.0.0 g0/1 6

Buy Now
Questions 289

200-301 Question 289

Refer to the exhibit. Inter-VLAN routing is configured on SW1. Client A is running Linux as an OS in VLAN 10 with a default gateway IP 10.0.0.1 but cannot ping client B in VLAN 20 running Windows. What action must be taken to verify that client A has the correct IP settings?

Options:

A.

Run the ipconfig command on client A and ensure that the IP address is within the host range of 10.0.0.1 - 10.0.255.254.

B.

Run the ifconfig command on client A to confirm that its IP and subnet mask fall within 255.254.0.0.

C.

Run the ipconfig command on client A to confirm that the correct 10.0.0.1 default gateway is used.

D.

Run the ifconfig command on client A to confirm that the subnet mask is set to 255.255.128.0.

Buy Now
Questions 290

200-301 Question 290

Refer to the exhibit. The Wi-Fi SSID " Office_WLAN " has Layer 2 Security configured with MAC filtering enabled. What additional security is provided by this specific feature?

Options:

A.

There is an extra layer of security that ensures only authorized devices with known MAC addresses connect to the network

B.

There is strong mutual authentication used between NAC and the network devices using X.509 standard

C.

All data frames exchanged between the client and the access point are encrypted

D.

There is a Galcis cache algorithm configured that provides strong encryption and authentication

Buy Now
Questions 291

Refer to the exhibit.

200-301 Question 291

Router R1 resides in OSPF Area 0. After updating the R1 configuration to influence the paths that it will use to direct traffic, an engineer verified that each of the four Gigabit interfaces has the same route to 10.10.0.0/16. Which interface will R1 choose to send traffic to reach the route?

Options:

A.

GigabitEthernet0/0

B.

GigabltEthornet0/1

C.

GigabitEthernet0/2

D.

GigabitEthernet0/3

Buy Now
Questions 292

Refer to the exhibit.

200-301 Question 292

An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?

A)

200-301 Question 292

B)

200-301 Question 292

C)

200-301 Question 292

D)

200-301 Question 292

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 293

What is the function of the controller in a software-defined network?

Options:

A.

multicast replication at the hardware level

B.

fragmenting and reassembling packets

C.

making routing decisions

D.

forwarding packets

Buy Now
Questions 294

Which action is taken by the data plane within a network device?

Options:

A.

forwards traffic to the next hop

B.

constructs a routing table based on a routing protocol

C.

provides CLI access to the network device

D.

looks up an egress interface in the forwarding information base

Buy Now
Questions 295

Refer to the exhibit.

200-301 Question 295

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:

A.

Configure the OSPF priority on router A with the lowest value between the three routers.

B.

Configure router B and router C as OSPF neighbors of router A.

C.

Configure the router A interfaces with the highest OSPF priority value within the area.

D.

Configure router A with a fixed OSPF router ID

Buy Now
Questions 296

Refer to the exhibit.

200-301 Question 296

The router has been configured with a supernet to accommodate the requirement for 380 users on a subnet The requirement already considers 30% future growth. Which configuration verifies the IP subnet on router R4?

A)

200-301 Question 296

B)

200-301 Question 296

C)

200-301 Question 296

D)

200-301 Question 296

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 297

A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network. Which type of IPv6 address must the engineer assign?

Options:

A.

unique local address

B.

link-local address

C.

aggregatable global address

D.

IPv4-compatible IPv6 address

Buy Now
Questions 298

Refer to the exhibit.

200-301 Question 298

An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP address from a DHCP server?

Options:

A.

Configure the ip dhcp relay information command under interface Gi0/1.

B.

Configure the ip dhcp smart-relay command globally on the router

C.

Configure the ip helper-address 172.16.2.2 command under interface Gi0/0

D.

Configure the ip address dhcp command under interface Gi0/0

Buy Now
Questions 299

A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?

Options:

A.

ipv6 address 21:EB8:C1:2200:1::331/64

B.

ipv6 address 2001:EB8:C1:22:1::331/64

C.

ipv6 address 2001 :EB8:C 1:2200.1 ::331-64

D.

ipv6 address 2001:EB8:C1:2200:1:0000:331/64

Buy Now
Questions 300

Which PoE mode enables powered-device detection and guarantees power when the device is detected?

Options:

A.

dynamic

B.

static

C.

active

D.

auto

Buy Now
Questions 301

A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?

Options:

A.

interface vlan 2000ipv6 address ffc0:0000:aaaa::1234:2343/64

B.

interface vlan 2000Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64

C.

interface vlan 2000ipv6 address fe80;0000:aaaa::1234:2343/64

D.

interface vlan 2000ipv6 address fd00::1234:2343/64

Buy Now
Questions 302

Refer to the exhibit.

200-301 Question 302

How should the configuration be updated to allow PC1 and PC2 access to the Internet?

Options:

A.

Modify the configured number of the second access list.

B.

Add either the ip nat {inside|outside} command under both interfaces.

C.

Remove the overload keyword from the ip nat inside source command.

D.

Change the ip nat inside source command to use interface GigabitEthernet0/0.

Buy Now
Questions 303

Refer to the exhibit.

200-301 Question 303

An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?

Options:

A.

switchport trunk allowed vlan 100-104

B.

switchport trunk allowed vlan add 104

C.

switchport trunk allowed vlan all

D.

switchport trunk allowed vlan 104

Buy Now
Questions 304

Refer to the exhibit.

200-301 Question 304

Which command must be issued to enable a floating static default route on router A?

Options:

A.

lp route 0.0.0.0 0.0.0.0 192.168.1.2

B.

ip default-gateway 192.168.2.1

C.

ip route 0.0.0.0 0.0.0.0 192.168.2.1 10

D.

ip route 0.0.0.0 0.0.0.0 192.168.1.2 10

Buy Now
Questions 305

Which type of IPv6 address is similar to a unicast address but is assigned to multiple devices on the same network at the same time?

Options:

A.

global unicast address

B.

anycast address

C.

multicast address

D.

link-local address

Buy Now
Questions 306

Refer to the exhibit.

200-301 Question 306

Switch A is newly configured. All VLANs are present in the VLAN database. The IP phone and PC A on Gi0/1 must be configured for the appropriate VLANs to establish connectivity between the PCs. Which command set fulfills the requirement?

A)

200-301 Question 306

B)

200-301 Question 306

C)

200-301 Question 306

D)

200-301 Question 306

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 307

Which protocol uses the SSL?

Options:

A.

HTTP

B.

SSH

C.

HTTPS

D.

Telnet

Buy Now
Questions 308

Refer to the exhibit.

200-301 Question 308

An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0 ' 1 interface for the router to assign a unique 64-brt IPv6 address to Itself?

Options:

A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64

B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64

C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64

D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64

Buy Now
Questions 309

Which interface mode must be configured to connect the lightweight APs in a centralized architecture?

Options:

A.

WLAN dynamic

B.

management

C.

trunk

D.

access

Buy Now
Questions 310

Which type of wired port is required when an AP offers one unique SSID, passes client data and management traffic, and is in autonomous mode?

Options:

A.

LAG

B.

default

C.

trunk

D.

Bopess

Buy Now
Questions 311

200-301 Question 311

Refer to the exhibit. OSPF neighbors routers A, B, C, and D are sending a route for 10.227.150.160/27. When the current route for 10.227.150.160/27 becomes unavailable, which cost will router Y use to route traffic to 10.227.150.160/27?

Options:

A.

Cost 20

B.

Cost 30

C.

Cost 40

D.

Cost 50

Buy Now
Questions 312

200-301 Question 312

Refer to the exhibit. During initial configuration testing, the Windows workstation PC1 cannot connect with the 172.16.2.0/24 network. Which set of actions corrects the configuration?

Options:

A.

Change the IP address to 172.16.1.6 and change the subnet mask to 255.255.255.248.

B.

Change the IP address to 172.16.1.9 and change the default gateway to 172.16.1.7.

C.

Change the IP address to 172.16.1.9 and change the DNS server to 172.16.1.12 only.

D.

Change the IP address to 172.16.1.6 and change the DNS servers to 172.18.1.12 and 172.16.1.13.

Buy Now
Questions 313

Which protocol should be used to transfer large files on a company intranet that allows UDP 69 through the firewall?

Options:

A.

FTP

B.

TFTP

C.

REST API

D.

SMTP

Buy Now
Questions 314

Which interface condition is occurring in this output?

200-301 Question 314

Options:

A.

duplex mismatch

B.

queueing

C.

bad NIC

D.

broadcast storm

Buy Now
Questions 315

200-301 Question 315

200-301 Question 315

IP connectivity between the three routers is configured. OSPF adjacencies must be established.

1. Configure R1 and R2 Router IDs using the interface IP addresses from the link that is shared between them.

2. Configure the R2 links with a max value facing R1 and R3. R2 must become the DR. R1 and R3 links facing R2 must remain with the default OSPF configuration for DR election. Verify the configuration after clearing the OSPF process.

3. Using a host wildcard mask, configure all three routers to advertise their respective Loopback1 networks.

4. Configure the link between R1 and R3 to disable their ability to add other OSPF routers.

Options:

Buy Now
Questions 316

200-301 Question 316

Refer to the exhibit.

Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?

Options:

A.

Disable WPA Policy and WPA Encryption and then enable PSK using ASCII.

B.

Enable PSK and FT PSK and then disable WPA Policy.

C.

Disable WPA Encryption and then enable FT PSK.

D.

Enable PSK using Hex format and then disable WPA Policy.

Buy Now
Questions 317

How does MAC learning function?

Options:

A.

rewrites the source and destination MAC address

B.

adds unknown source MAC addresses to the CAM table

C.

sends the frame back to the source to verify availability

D.

drops received MAC addresses not listed in the address table

Buy Now
Questions 318

Which role do predictive Al models play in network load balancing?

Options:

A.

They anticipate future traffic spikes.

B.

They assign IP addresses to devices.

C.

They select correct cabling types for deployment.

D.

They solely monitor historical traffic volumes.

Buy Now
Questions 319

200-301 Question 319

Refer to the exhibit. A VTY password has been set to Labtest32! for remote access. Which commands are required to allow only SSH access and to hide passwords in the running configuration?

Options:

A.

SW1#(config-line)#login local  SW1#(config-line)#exit  SW1(config)#crypto key generate rsa

B.

SW1#(config-line)#login local  SW1#(config-line)#exit  SW1(config)#enable secret test!2E

C.

SW1#(config-line)#transport input ssh  SW1#(config-line)#exit  SW1(config)#service password-encryption

D.

SW1#(config-line)#exit  SW1(config)#aaa new-model

Buy Now
Questions 320

What is a characteristic of private IPv4 addressing?

Options:

A.

alleviates the shortage of IPv4 addresses

B.

reduces the forwarding table on network routers

C.

enables secure connectivity over the internet

D.

used as the NAT outside global IP address

Buy Now
Questions 321

200-301 Question 321

Refer to the exhibit. Which interface does a packet take to reach the destination address of 10.10.10.147?

Options:

A.

Serial 0/0

B.

FastEthernet 0/2

C.

FastEthernet 0/0

D.

FastEthernet 0/1

Buy Now
Questions 322

How does a network administrator securely manage an AP in lightweight mode?

Options:

A.

using the CLI via an out-of-band connection

B.

using the WLC GUI via HTTPS

C.

using the AP GUI via an in-band SSH connection

D.

using the CLI via a virtual interface with SSH

Buy Now
Questions 323

Which technology is appropriate for communication between an SDN controller and applications running over the network?

Options:

A.

REST API

B.

OpenFlow

C.

Southbound API

D.

NETCONF

Buy Now
Questions 324

An engineer must update the configuration on two PCs in two different subnets to communicate locally with each other. One PC is configured with IP address 192.168.25.128/25 and the other with 192.168.25.100/25. Which network mask must the engineer configure on both PCs to enable the communication?

Options:

A.

255.255.255.224

B.

255.255.255.248

C.

255.255.255.0

D.

255.255.255.252

Buy Now
Questions 325

200-301 Question 325

Refer to the exhibit.

How does router R1 forward packets destined to 10.0.4.10?

Options:

A.

via 10.0.4.2

B.

via 10.0.0.2

C.

via FastEthernet0/1

D.

via FastEthernet1/1

Buy Now
Questions 326

Which syslog message logging level displays interface line protocol up/down events?

Options:

A.

Informational

B.

debugging

C.

alerts

D.

notifications

Buy Now
Questions 327

Which key function is provided by the data plane?

Options:

A.

Making routing decisions

B.

Originating packets

C.

Forwarding traffic to the next hop

D.

Exchanging routing table data

Buy Now
Questions 328

Which cloud-provided service allows an organization to install its own operating system on a virtual machine?

Options:

A.

platform-as-a-service

B.

software-as-a-service

C.

infrastructure-as-a-service

D.

network-as-a-service

Buy Now
Questions 329

200-301 Question 329

Refer to the exhibit. The routers R1-LAB and R2-LAB are configured with link-local addresses. What command must be applied to interface Gi0/0 on R1-LAB for an automated address self-assignment on the IPv6 network?

Options:

A.

ipv6 address 2001:db8:1:0FFA:0::/64

B.

ipv6 address 2001:db8:0:0FFA::1/64

C.

ipv6 address 2001:db8:0:0FFA::/64 eui-64

D.

ipv6 address 2001:db8:0:0FFA::/64 anycast

Buy Now
Questions 330

What is the function of generative AI in network operations?

Options:

A.

It disables unused services.

B.

It deploys network firmware updates.

C.

It creates synthetic network configurations.

D.

It computes optimal data storage solutions.

Buy Now
Questions 331

200-301 Question 331

Refer to the exhibit. The route for 10.220.100.96/27 has been very unstable. The same route has four backups to routers A, B, C, and D via the respective methods. The routing protocol defaults for router Y have not been changed. When the current route for 10.220.100.96/27 becomes unavailable, which router will router Y use to route traffic to 10.220.100.96/27?

Options:

A.

router D

B.

router B

C.

router C

D.

router A

Buy Now
Questions 332

200-301 Question 332

Refer to the exhibit. A network engineer is configuring a WLAN to use a WPA2 PSK and allow only specific clients to join. Which two actions must be taken to complete the process? (Choose two)

Options:

A.

Enable the MAC Filtering option

B.

Enable the OSEN Policy option

C.

Enable the CCKM option for Authentication Key Management

D.

Enable the WPA2 Policy option

E.

Enable the 802.1X option for Authentication Key Management

Buy Now
Questions 333

What does a switch search for in the CAM table when forwarding a frame?

Options:

A.

source MAC address and aging time

B.

destination MAC address and flush time

C.

source MAC address and source port

D.

destination MAC address and destination port

Buy Now
Questions 334

200-301 Question 334

Refer to the exhibit. A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration must meet these requirements:

• Create the username as CCUser.

• Create the password as NA!2Scc.

• Encrypt the user password.

What must be configured to meet the requirements?

Options:

A.

username CCUser privies 10 password NA!2Scc

B.

username CCUser password NA!2Scc enable password level 5 NA!2$cc

C.

username CCUser secret NA!2Scc

D.

username CCUser privilege 15 password NA!2Scc enable secret 0 NA!2$cc

Buy Now
Questions 335

Which type of IPv4 address must be assigned to a server to protect it from external access and allow only internal users access while restricting internet access?

Options:

A.

global unicast

B.

public

C.

private

D.

multicast

Buy Now
Questions 336

The address block 192 168 32 0/24 must be subnetted into smaller networks The engineer must meet these requirements

• Create 8 new subnets

• Each subnet must accommodate 30 hosts

• Interface VLAN 10 must use the last usable IP in the first new subnet

• A Layer 3 interface is used

Which configuration must be applied to the interface?

A)

200-301 Question 336

B)

200-301 Question 336

C)

200-301 Question 336

D)

200-301 Question 336

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 337

Refer to the exhibit.

PC A and the file server. Which commend must be configured on switch A to prevent interruption of other communications?

200-301 Question 337

Options:

A.

switch port trunk allowed vlan 12

B.

switchport trunk allowed vlan none

C.

switchport trunk allowed vlan add 13

D.

switch port trunk allowed vlan remove 10-11

Buy Now
Questions 338

Which cable type must be used to interconnect one switch using 1000 BASE-SX GBiC modules and another switch using 1000 BASE-SX SFP modules?

Options:

A.

LC to SC

B.

SC t ST

C.

SC to SC

D.

LC to LC

Buy Now
Questions 339

A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)

Options:

A.

crypto key generate rsa general-keys modulus 1024

B.

transport input all

C.

crypto key generate rsa usage-keys

D.

crypto key generate rsa modulus 2048

E.

transport Input ssh

Buy Now
Questions 340

Drag and drop the statements about networking from the left onto the corresponding networking types on the right. Not all statements are used.

200-301 Question 340

Options:

Buy Now
Questions 341

Refer to the exhibit.

200-301 Question 341

Which configuration parameter is preventing host C from reaching the internet?

Options:

A.

automatic DNS

B.

default gateway

C.

IP network mask

D.

IP address assignment

Buy Now
Questions 342

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied, the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?

Options:

A.

ipv6 address 2001:db8 :: 500:a:400F:583B

B.

ipv6 address 2001:0db8 :: 5:a:4F:583B

C.

ipv6 address 2001 :: db8:0000 :: 500:a:400F:583B

D.

ipv6 address 2001:db8:0 :: 500:a:4F:583B

Buy Now
Questions 343

Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?

Options:

A.

virtual interface

B.

management interface

C.

console port

D.

service port

Buy Now
Questions 344

How does network automation help reduce network downtime?

Options:

A.

Changes can be implemented in parallel across multiple devices at once, which increases the speed of the change rate.

B.

By using automation platforms with intent-based configuration, all changes are checked for possible outages before being implemented.

C.

Emails can be generated based on when a network admin performs a network change, which increases visibility.

D.

Configuration templates and testing can be built into implementation, which increases the success rate of a network change.

Buy Now
Questions 345

An engineer is configuring router R1 with an IPv6 static route for prefix 2019:C15C:0CAF:E001::/64. The next hop must be 2019:C15C:0CAF:E002::1 The route must be reachable via the R1 Gigabit 0/0 interface. Which command configures the designated route?

Options:

A.

R1(config)#ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1

B.

R1(config-if)#ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1

C.

R1(config-if)#ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet0/0

D.

R1(config)#ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet0/0

Buy Now
Questions 346

Refer to the exhibit. The user has connectivity to devices on network 192.168.3 0/24 but cannot reach users on the network 10.10.1.0724.

What is the first step to verify connectivity?

200-301 Question 346

Options:

A.

Is the internet reachable?

B.

Is the default gateway reachable?

C.

Is the DNS server reachable?

Buy Now
Questions 347

What describes the functionality of southbound APIs?

Options:

A.

They use HTTP messages to communicate.

B.

They enable communication between the controller and the network device.

C.

They convey information from the controller to the SDN applications.

D.

They communicate with the management plane.

Buy Now
Questions 348

Which WLC management connection type is vulnerable to man-in-the-middIe attacks?

Options:

A.

Telnet

B.

console

C.

HTTPS

D.

SSH

Buy Now
Questions 349

200-301 Question 349

Refer to the exhibit. Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?

Options:

A.

Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management

B.

Set the Fast Transition option and the WPA gik-randomize State to disable

C.

Under Protected Management Frames, set the PMF option to Required

D.

Enable CCKM under Authentication Key Management

Buy Now
Questions 350

What is the role of community strings in SNMP operations?

Options:

A.

It serves as a sequence tag on SNMP traffic messages.

B.

It serves as a password lo protect access to MIB objects.

C.

It passes the Active Directory username and password that are required for device access

D.

It translates alphanumeric MIB output values to numeric values.

Buy Now
Questions 351

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:

A.

ip domain-name domain

B.

password password

C.

crypto key generate rsa modulus 1024

D.

ip ssh authentication-retries 2

Buy Now
Questions 352

What is a characteristics of a collapsed-core network topology?

Options:

A.

It allows the core and distribution layers to run as a single combined layer.

B.

It enables the core and access layers to connect to one logical distribution device over an EtherChannel.

C.

It enables all workstations in a SOHO environment to connect on a single switch with internet access.

D.

It allows wireless devices to connect directly to the core layer, which enables faster data transmission.

Buy Now
Questions 353

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

200-301 Question 353

Options:

Buy Now
Questions 354

Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)

Options:

A.

site-to-site VPN

B.

DMVPN

C.

GETVPN

D.

IPsec remote access

E.

clientless VPN

Buy Now
Questions 355

A router received three destination prefixes:10.0.0/18, and 10.0.0/24. When the show ip route command is executed, which output does it return?

A)

200-301 Question 355

B)

200-301 Question 355

C)

200-301 Question 355

D)

200-301 Question 355

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 356

Refer to the exhibit.

200-301 Question 356

Which type of JSON data is represented?

Options:

A.

string

B.

array

C.

number

D.

object

Buy Now
Questions 357

Which type of DNS record is used to specify the mail server responsible for accepting email messages on behalf of a recipient ' s domain?

Options:

A.

MX record

B.

TXT record

C.

A record

D.

SRV record

Buy Now
Questions 358

Refer to Exhibit.

200-301 Question 358

Rotor to the exhibit. The IP address configurations must be completed on the DC-1 and HQ-1 routers based on these requirements:

DC-1 Gi1/0 must be the last usable address on a /30

DC-1 Gi1/1 must be the first usable address on a /29

DC-1 Gi1/2 must be the last usable address on a /28

HQ-1 Gil/3 must be the last usable address on a /29

Drag and drop the commands from the left onto the destination interfaces on the right. Not all commands are used

200-301 Question 358

Options:

Buy Now
Questions 359

What does a switch do when it receives a frame whose destination MAC address is missing from the MAC address table?

Options:

A.

It floods the frame unchanged across all remaining ports in the incoming VLAN.

B.

It appends the table with a static entry for the MAC and shuts down the port.

C.

It updates the CAM table with the destination MAC address of the frame.

D.

It changes the checksum of the frame to a value that indicates an invalid frame.

Buy Now
Questions 360

How does MAC learning function on a switch?

Options:

A.

broadcasts frames to all ports without queueing

B.

adds unknown source MAC addresses to the address table

C.

sends a retransmission request when a new frame is received

D.

sends frames with unknown destinations to a multicast group

Buy Now
Questions 361

Refer to the exhibit.

200-301 Question 361

Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.

Which command must be used to configure the route?

Options:

A.

ip route 10.0.3.0 0.255255.255 10.0.4.2

B.

route add 10.0.3.0 mask 255.255.255.0 10.0.4.3

C.

Ip route 10.0.3.0 255.255.255.0 10.0.4.3

D.

route add 10.0.3.0 0.255.255.255 10.0.4.2

Buy Now
Questions 362

What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?

Options:

A.

forwarding mode and provides the lowest-cost path to the root bridge for each VLAN

B.

learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN

C.

blocking mode and provides an alternate path toward the designated bridge

D.

listening mode and provides an alternate path toward the root bridge

Buy Now
Questions 363

Drag and drop the IPv6 address description from the left onto the IPv6 address types on the right. Not all options are used.

200-301 Question 363

Options:

Buy Now
Questions 364

Which action implements physical access control as part of the security program of an organization1?

Options:

A.

backing up syslogs at a remote location

B.

configuring a password for the console port

C.

configuring enable passwords on network devices

D.

setting up IP cameras to monitor key infrastructure

Buy Now
Questions 365

Refer to the exhibit.

200-301 Question 365

How many objects are present in the given JSON-encoded data?

Options:

A.

one

B.

four

C.

seven

D.

nine

Buy Now
Questions 366

An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use 5GHz access points?

Options:

A.

Re-Anchor Roamed Clients

B.

OEAP Split Tunnel

C.

11ac MU-MIMO

D.

Client Band Select

Buy Now
Questions 367

Which solution is appropriate when mitigating password attacks where the attacker was able to sniff the clear-text password of the system administrator?

Options:

A.

next-generation firewall to keep stateful packet inspection

B.

multifactor authentication using two separate authentication sources

C.

ACL to restrict incoming Telnet sessions " admin " accounts

D.

IPS with a block list of known attack vectors

Buy Now
Questions 368

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2.

200-301 Question 368

Options:

Buy Now
Questions 369

How does IPsec provide secure networking for applications within an organization?

Options:

A.

It takes advantage of FTP to secure file transfers between nodes on the network.

B.

It provides GRE tunnels to transmit traffic securely between network nodes.

C.

It enables sets of security associations between peers.

D.

It leverages TFTP providing secure file transfers among peers on the network.

Buy Now
Questions 370

NO: 346

What must a network administrator consider when deciding whether to configure a new wireless network with APs in autonomous mode or APs running in cloud-based mode?

Autonomous mode APs are less dependent on an underlay but more complex to maintain than APs in cloud-based mode.

Cloud-based mode APs relay on underlays and are more complex to maintain than APs in autonomous mode.

Options:

A.

Cloud-based mode APs are easy to deploy but harder to automate than APs in autonomous mode.

B.

Autonomous mode APs are easy to deploy and automate than APs in cloud-based mode.

Buy Now
Questions 371

200-301 Question 371

A)

200-301 Question 371

B)

200-301 Question 371

C)

200-301 Question 371

D)

200-301 Question 371

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 372

Refer to the exhibit.

200-301 Question 372

How many JSON objects are presented?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now
Exam Code: 200-301
Exam Name: Implementing and Administering Cisco Solutions (200-301 CCNA) v1.1
Last Update: Apr 20, 2026
Questions: 1240

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99