200-301_2
200-301_2
Get the Full 200-301 dumps in VCE and PDF From SurePassExam
https://www.surepassexam.com/200-301-exam-dumps.html (903 New Questions)
Cisco
Exam Questions 200-301
Cisco Certified Network Associate
NEW QUESTION 1
- (Topic 3)
Which wireless security protocol relies on Perfect Forward Secrecy?
A. WPA3
B. WPA
C. WEP
D. WPA2
Answer: A
NEW QUESTION 2
- (Topic 3)
R1 as an NTP server must have:
• NTP authentication enabled
• NTP packets sourced from Interface loopback 0
• NTP stratum 2
• NTP packets only permitted to client IP 209.165 200 225
How should R1 be configured?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 3
- (Topic 3)
Refer to the exhibit.
An engineer assumes a configuration task from a peer Router A must establish an OSPF neighbor relationship with neighbor 172 1 1 1 The output displays the
status of the adjacency after 2 hours. What is the next step in the configuration process for the routers to establish an adjacency?
Answer: B
NEW QUESTION 4
- (Topic 3)
Routers R1 and R3 have the default configuration The router R2 priority is set to 99 Which commands on R3 configure it as the DR in the 10.0 4.0/24 network?
Answer: B
NEW QUESTION 5
- (Topic 3)
Which protocol is used for secure remote CLI access?
A. HTTPS
B. HTTP
C. Telnet
D. SSH
Answer: D
NEW QUESTION 6
DRAG DROP - (Topic 3)
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
NEW QUESTION 7
- (Topic 3)
Refer to the exhibit.
Which two configurations must the engineer apply on this network so that R1 becomes the DR? (Choose two.)
A)
B)
C)
D)
E)
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: BC
NEW QUESTION 8
- (Topic 3)
Refer to the exhibit.
Packets received by the router from BGP enter via a serial interface at 209.165.201.10. Each route is present within the routing table. Which interface is used to
forward traffic with a destination IP of 10.10.10.24?
A. F0/10
B. F0/11
C. F0/12
D. F0/13
Answer: B
NEW QUESTION 9
FILL IN THE BLANK - (Topic 3)
Refer to the exhibit.
Drag and drop the prefix lengths from the left onto the corresponding prefixes on the right Not all prefixes are used
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Diagram Description automatically generated with low confidence
NEW QUESTION 10
- (Topic 3)
Refer to the exhibit.
An IP subnet must be configured on each router that provides enough addresses for the number of assigned hosts and anticipates no more than 10% growth for
now hosts. Which configuration script must be used?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
NEW QUESTION 10
- (Topic 3)
Refer to the exhibit.
A. 172.16.0.0/16
B. 192.168.2.0/24
C. 207.165.200.0/24
D. 192.168.1.0/24
Answer: B
NEW QUESTION 12
- (Topic 3)
Refer to the exhibit.
An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0'1 interface for the router to assign a unique 64-brt
IPv6 address to Itself?
Answer: A
NEW QUESTION 13
- (Topic 3)
Which QoS traffic handling technique retains excess packets in a queue and reschedules these packets for later transmission when the configured maximum
bandwidth has been surpassed?
Answer: C
NEW QUESTION 15
- (Topic 3)
A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which
additional command must the engineer configure before entering the command to generate the RSA key?
A. password password
B. crypto key generate rsa modulus 1024
C. ip domain-name domain
D. ip ssh authentication-retries 2
Answer: C
Explanation:
https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/how-to-setup-network-switch.html
NEW QUESTION 16
- (Topic 2)
Which type of IPv6 address is publicly routable in the same way as IPv4 public address?
A. global unicast
B. link-local
C. unique local
D. multicast
Answer: A
NEW QUESTION 20
- (Topic 2)
Refer to the exhibit.
Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?
Answer: A
NEW QUESTION 22
- (Topic 2)
Which networking function occurs on the data plane?
Answer: A
NEW QUESTION 25
- (Topic 2)
What are two differences between optical-fiber cabling and copper cabling? (Choose two)
Answer: AC
NEW QUESTION 30
- (Topic 2)
Refer to the exhibit.
A. host route
B. default route
C. floating static route
D. network route
Answer: B
NEW QUESTION 32
- (Topic 2)
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two )
A. Telnet
B. SSH
C. HTTP
D. HTTPS
E. TFTP
Answer: AC
NEW QUESTION 36
- (Topic 2)
A packet is destined for 10.10.1.22. Which static route does the router choose to forward the packet?
Answer: C
NEW QUESTION 39
- (Topic 2)
Which command must be entered to configure a DHCP relay?
A. ip helper-address
B. ip address dhcp
C. ip dhcp pool
D. ip dhcp relay
Answer: A
NEW QUESTION 42
- (Topic 2)
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
Answer: AD
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4000/8-2glx/configuration/guide/ntp.html
To configure authentication, perform this task in privileged mode:Step 1: Configure an authentication key pair for NTP and specify whether the key will be trusted
or untrusted.Step 2: Set the IP address of the NTP server and the public key.Step 3: Enable NTP client mode.Step 4: Enable NTP authentication.Step 5: Verify the
NTP configuration.
NEW QUESTION 43
- (Topic 2)
Refer to the exhibit.
Which command must be executed for Gi1.1 on SW1 to become a trunk port if Gi1/1 on SW2 is configured in desirable or trunk mode?
Answer: C
NEW QUESTION 44
- (Topic 2)
Refer to Exhibit.
An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands
must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta
goes down? (Choose two)
Answer: AE
Explanation:
Floating static routes are static routes that have an administrative distance greater than the administrative distance (AD) of another static route or dynamic routes.
By default a static route has an AD of 1 then floating static route must have the AD greater than 1. Floating static route has a manually configured administrative
distance greater than that of the primary route and therefore would not be in the routing table until the primary route fails.
NEW QUESTION 45
- (Topic 2)
Refer to me exhibit.
Which action is taken by the router when a packet is sourced from 10.10.10.2 and destined for 10.10.10.16?
Answer: A
NEW QUESTION 47
- (Topic 2)
What is the primary function of a Layer 3 device?
Answer: C
NEW QUESTION 50
- (Topic 2)
Refer to the exhibit.
Answer: B
NEW QUESTION 54
- (Topic 2)
Refer to the exhibit.
Which route does R1 select for traffic that is destined to 192 168.16.2?
A. 192.168.16.0/21
B. 192.168.16.0/24
C. 192.168 26.0/26
D. 192.168.16.0/27
Answer: D
Explanation:
The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so it will be chosen. This is called the
“longest prefix match” rule.
NEW QUESTION 58
- (Topic 2)
What are two benefits of network automation? (Choose two)
Answer: AC
NEW QUESTION 62
- (Topic 2)
Refer to the exhibit.
A network engineer must block access for all computers on VLAN 20 to the web server via HTTP All other computers must be able to access the web server
Which configuration when applied to switch A accomplishes this task?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 65
- (Topic 2)
Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?
A. HTTPS
B. RADIUS
C. TACACS+
D. HTTP
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-guide/b_cg80/b_cg80_chapter_011.html
NEW QUESTION 69
- (Topic 2)
Which type of traffic is sent with pure iPsec?
A. broadcast packets from a switch that is attempting to locate a MAC address at one of several remote sites
B. multicast traffic from a server at one site to hosts at another location
C. spanning-tree updates between switches that are at two different sites
D. unicast messages from a host at a remote site to a server at headquarters
Answer: D
Explanation:
“The original poster makes a correct observation that EIGRP does not work in a pure IPSEC environment. IPSEC was designed to process unicast traffic.
NEW QUESTION 70
- (Topic 2)
A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be
applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?
Answer: B
NEW QUESTION 73
- (Topic 2)
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
Answer: B
NEW QUESTION 77
- (Topic 2)
which IPv6 address block forwards packets to a multicast address rather than a unicast address?
A. 2000::/3
B. FC00::/7
C. FE80::/10
D. FF00::/12
Answer: D
NEW QUESTION 81
- (Topic 2)
Which goal is achieved by the implementation of private IPv4 addressing on a network?
Answer: A
NEW QUESTION 82
- (Topic 2)
Which command must be entered when a device is configured as an NTP server?
A. ntp authenticate
B. ntp server
C. ntp peer
D. ntp master
Answer: D
Explanation:
To configure a Cisco device as an Authoritative NTP Server, use the ntp master [stratum] command.To configure a Cisco device as a NTP client, use the
command ntp server <IP address>. For example:Router(config)#ntp server 192.168.1.1. This command will instruct the router to query 192.168.1.1 for the time.
NEW QUESTION 84
- (Topic 2)
What are two characteristics of an SSID? (Choose Two)
Answer: BE
NEW QUESTION 86
- (Topic 2)
Refer to the exhibit.
Answer: D
NEW QUESTION 90
- (Topic 2)
Refer to the exhibit.
A network administrator assumes a task to complete the connectivity between PC A and the File Server. Switch A and Switch B have been partially configured with
VLAN 10, 11, 12, and 13. What is the next step in the configuration?
Answer: B
NEW QUESTION 92
- (Topic 2)
Refer to the exhibit.
What action establishes the OSPF neighbor relationship without forming an adjacency?
Answer: A
NEW QUESTION 94
- (Topic 2)
What benefit does controller-based networking provide versus traditional networking?
Answer: C
NEW QUESTION 97
- (Topic 2)
Refer to the exhibit.
An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:"%
Connection refused by remote host" Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?
Answer: A
A. IP SLA
B. syslog
C. NetFlow
D. SNMPv3
Answer: C
A. SSID
B. radio
C. band
D. Layer 2
Answer: D
Answer: A
Answer: B
Answer: A
Answer: A
Answer: BE
An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If the switch and DHCP server configurations are complete and correct. Which
two sets of
commands must be configured on R1 and R2 to complete the task? (Choose two)
Answer: BC
A. switch(config-line)#IIdp port-description
B. switch(config)#IIdp port-description
C. switch(config-if)#IIdp port-description
D. switch#IIdp port-description
Answer: B
Answer: C
A. management
B. protected frame
C. control
D. action
Answer: A
Explanation:
Reference: https://en.wikipedia.org/wiki/802.11_Frame_Types
If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?
Answer: B
Answer: C
Explanation:
The “ipv6 address autoconfig” command causes the device to perform IPv6 stateless address autoconfiguration to discover prefixes on the link and then to add
the EUI-64 based addresses to theinterface.Addresses are configured depending on the prefixes received in Router Advertisement (RA)messages.The device will
listen for RA messages which are transmitted periodically from the router (DHCPServer).This RA message allows a host to create a global IPv6 address from:+ Its
interface identifier (EUI- 64 address)+ Link Prefix (obtained via RA)Note: Global address is the combination of Link Prefix and EUI-64 address
Answer: B
A. Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor
B. The hypervisor can virtualize physical components including CP
C. memory, and storage
D. Each hypervisor can support a single virtual machine and a single software switch
E. The hypervisor communicates on Layer 3 without the need for additional resources
Answer: B
A. TCP is a connectionless protocol that does not provide reliable delivery of data, UDP is a connection-oriented protocol that uses sequencing to provide reliable
delivery.
B. TCP does not guarantee delivery or error checking to ensure that there is no corruption of data UDP provides message acknowledgement and retransmits data
if lost.
C. TCP provides flow control to avoid overwhelming a receiver by sending too many packets at once, UDP sends packets to the receiver in a continuous stream
Answer: C
A. TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
B. TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.
C. TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
D. TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
Answer: A
Answer: C
Answer: D
Explanation:
We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the encryption is AES-256, not
AES-128.
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/67134- wpa2-config.html
A. worm
B. malware
C. DDoS
D. man-in-the-middle
Answer: D
Answer: B
Explanation:
If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same
VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.
What commands are needed to add a subinterface to Ethernet0/0 on R1 to allow for VLAN 20, with IP address 10.20.20.1/24?
Answer: B
A. local port ID
B. lowest path cost to the root bridge
C. lowest neighbor's bridge ID
D. lowest neighbor's port ID
Answer: B
What two conclusions should be made about this configuration? (Choose two )
Answer: CE
Explanation:
An engineer is configuring data and voice services to pass through the same port. The designated switch interface fastethernet0/1 must transmit packets using the
same priority for data when they are received from the access port of the IP phone. Which configuration must be used?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
Answer: D
Explanation:
From the output, we see R1 will use the entry “O 10.10.13.0/25 [110/4576] via 10.10.10.1, …” to reach host 10.10.13.10. This is a network route.Note: “B*
0.0.0.0/0…” is a default route.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. CDP
B. SNMP
C. SMTP
D. ARP
Answer: B
Explanation:
SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized
framework and a common language used for the monitoring and management of devices in a network.The SNMP framework has three parts:+ An SNMP
manager+ An SNMP agent+ A Management Information Base (MIB)The Management Information Base (MIB) is a virtual information storage area for network
management information, which consists of collections of managed objects.With SNMP, the network administrator can send commands to multiple routers to do
the backup
A router reserved these five routes from different routing information sources. Which two routes does the router install in its routing table? (Choose two)
Answer: CD
A. VTP
B. DTP
C. egress traffic
D. ingress traffic
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. It automatically provides a second authentication factor that is unknown to the original user.
B. It uses an internal firewall to protect the password repository from unauthorized access.
C. It protects against keystroke logging on a compromised device or web site.
D. It stores the password repository on the local workstation with built-in antivirus and anti- malware functionality
E. It encourages users to create stronger passwords.
Answer: CE
Answer: C
PC1 is trying to ping PC3 for the first time and sends out an ARP to S1 Which action is taken by S1?
Answer: B
A. WSA
B. Firepower
C. ASA
D. FireSIGHT
Answer: A
A. Control
B. Management
C. Data
D. application
Answer: C
Explanation:
Data plane—Handles all the data traffic. The basic functionality of a Cisco NX-OS device is to forward packets from one interface to another. The packets that are
not meant for the switch itself are called the transit packets. These packets are handled by the data plane
A. it uses the bandwidth and delay values of the path to calculate the route metric
B. it uses a default metric of 10 for all routes that are learned by the router
C. it uses a reference Bandwidth and the actual bandwidth of the connected link to calculate the route metric
D. it counts the number of hops between the receiving and destination routers and uses that value as the metric
Answer: A
Answer: C
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. autonomous
B. lightweight
C. bridge
D. mobility express
Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200- series/70278-lap-faq.html
A Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN) controller (WLC). APs are “lightweight,” which means that
they cannot act independently of a wireless LAN controller (WLC). The WLC manages the AP configurations and firmware. The APs are “zero touch” deployed,
and individual configuration of APs is not necessary.
R5 is the current DR on the network, and R4 is the BDR. Their interfaces are flapping, so a network engineer wants the OSPF network to elect a different DR and
BDR. Which set of configurations must the engineer implement?
A)
B)
C)
D)
A. Option
B. Option
C. Option
D. Option
Answer: D
Answer: D
What are two improvements provided by automation for network management in an SDN environment? (Choose two)
A. Data collection and analysis tools establish a baseline for the network
B. Artificial intelligence identifies and prevents potential design failures.
C. Machine learning minimizes the overall error rate when automating troubleshooting processes
D. New devices are onboarded with minimal effort
E. Proprietary Cisco APIs leverage multiple network management tools.
Answer: BE
A. Layer 2 forwarding
B. coordinating VTNs
C. tracking hosts
D. managing the topology
E. protecting against DDoS attacks
Answer: BD
A. infrastructure-as-a-service
B. platform-as-a-service
C. business process as service to support different types of service
D. software-as-a-service
Answer: D
Answer: B
Explanation:
JSON data is written as name/value pairs.A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a
value:“name”:”Mark”JSON can use arrays. Array values must be of type string, number, object, array, boolean or null..For
example:{“name”:”John”,“age”:30,“cars”:[ “Ford”, “BMW”, “Fiat” ]}
After the switch configuration the ping test fails between PC A and PC B Based on the output for switch 1. which error must be corrected?
Answer: A
Explanation:
From the output we see the native VLAN of Switch1 on Gi0/1 interface is VLAN 1 while that of Switch2 is VLAN 99 so there would be a native VLAN mismatch.
Refer to the exhibit Routers R1 and R2 have been configured with their respective LAN interfaces The two circuits are operational and reachable across WAN
Which command set
establishes failover redundancy if the primary circuit goes down?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
A. asychronous routing
B. single-homed branches
C. dual-homed branches
D. static routing
E. dynamic routing
Answer: AC
A. SNMP
B. DNS lookup
C. syslog
D. NTP
Answer: B
The loopback1 interface of the Atlanta router must reach the loopback3 interface of the Washington router. Which two static host routes must be configured on the
NEW York router? (Choose two)
Answer: AB
Answer: C
Explanation:
Usually no action is required when a route flaps so it generates the notification syslog level message (level 5).
A. The environment must be configured with one hypervisor that serves solely as a network manager to monitor SNMP traffic
B. It allows logical network devices to move traffic between virtual machines and the rest of the physical network
C. It allows multiple operating systems and applications to run independently on one physical server.
D. It allows a physical router to directly connect NICs from each virtual machine into the network
E. It requires that some servers, virtual machines and network gear reside on the Internet
Answer: BC
Answer: B
A. learning
B. forwarding
C. blocking
D. listening
Answer: B
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
* 1.- on R3
config terminal
ip route 192.168.1.1 255.255.255.255 209.165.200.229
end
copy running start
* 2.- on R2
config terminal
ip route 0.0.0.0 0.0.0.0 209.165.202.130
end
copy running start
* 3.- on R2
config terminal
ipv6 route ::/0 2001:db8:abcd::2 end
copy running start
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer as below configuration:
On SW1:
conf terminal vlan 15
exit
interface range eth0/0 - 1 channel-group 1 mode active exit
interface port-channel 1
switchport trunk encapsulation dot1q switchport mode trunk
switchport trunk native vlan 15 end
copy run start
on SW2:
conf terminal
vlan 15 exit
interface range eth0/0 - 1 channel-group 1 mode active exit
interface port-channel 1
switchport trunk encapsulation dot1q switchport mode trunk
switchport trunk native vlan 15 end
copy run start
Refer to the exhibit. After applying this configuration to router R1, a network engineer is verifying the implementation. If all links are operating normally, and the
engineer sends a series of packets from PC1 to PC3. how are the packets routed?
Answer: A
The image server and client A are running an application that transfers an extremely high volume of data between the two. An engineer is configuring a dedicated
circuit between R1 and R2. Which set of commands must the engineer apply to the routers so that only traffic between the image server and client A is forces to
use the new circuit?
Answer: D
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. ff02:0:0:0:0:0:0:1
B. 2004:31c:73d9:683e:255::
C. fffe:034:0dd:45d6:789e::
D. fe80:4433:034:0dd::2
Answer: D
A. FF00:1/12
B. 2001:db8:0234:ca3e::1/128
C. 2002:db84:3f37:ca98:be05:8/64
D. FE80::1/10
Answer: A
A. user training
B. user awareness
C. vulnerability verification
D. physical access control
Answer: D
A. AES256
B. AES
C. RC4
D. SHA
Answer: B
Answer: B
Answer: AB
An engineer must configure router R2 so it is elected as the DR on the WAN subnet. Which command sequence must be configured?
A)
B)
C)
D)
A. Option
B. Option
C. Option
D. Option
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Mastered
B. Not Mastered
Answer: A
Explanation:
An engineer must configure a floating static route on an external EIGRP network. The destination subnet is the /29 on the LAN Interface of R86. Which command
must be executed on R14?
A. ip route 10.80.65.0.255.255.248.0.10.73.65.66.1
B. ip route 10.80.65.0.255.255.255..240 fa0/1 89
C. ip route 10.80.65.0.255.255.248.0.10.73.65.66.171
D. ip route 10.80.65.0.0.0.224.10.80.65.0. 255
Answer: C
Answer: D
A. OS
B. hypervisor
C. CPU
D. physical enclosure
Answer: B
A. authorization
B. authentication
C. anti-replay
D. accounting
Answer: B
Answer: D
Answer: B
Refer lo the exhibit. What is the next-hop P address for R2 so that PC2 reaches the application server via ElGRP?
A. 192.168.30.1
B. 10.10 105
C. 10.10.10.6
D. 192.168.201
Answer: D
A. shaping
B. policing
C. CBWFQ
D. LLQ
Answer: B
A. Cisco DNA Center leverages SNMPv3 tor encrypted management, and traditional campus management uses SNMPv2.
B. Cisco DNA Center automates HTTPS for secure web access, and traditional campus management uses HTTP.
C. Cisco DNA Center leverages APIs, and traditional campus management requires manual data gathering.
D. Cisco DNA Center automates SSH access for encrypted entry, and SSH Is absent from traditional campus management.
Answer: B
Answer: A
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A packet sourced from 10.10.10.1 is destined for 10.10.8.14. What is the subnet mask of the destination route?
A. 255.255.254.0
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: B
A. 802.1x authentication
B. preshared key
C. TKIP/MIC encryption
D. small Wi-Fi application
Answer: A
The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?
A. 192.168.1.226
B. 192.168.1.100
C. 192.168.1.254
D. 192.168.1.253
Answer: D
B. usesTKIP
C. employs PKI to identify access points
D. protects against brute force attacks
Answer: D
Routers R1 and R2 are configured with RIP as the dynamic routing protocol. A network engineer must configure R1 with a floating static route to serve as a backup
route to network 192.168.23. Which command must the engineer configure on R1?
Answer: B
After configuring a new static route on the CPE. the engineer entered this series of commands to verify that the new configuration is operating normally When is
the static default route installed into the routing table?
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
* 1. BPDUs received are forwarded to the system module.
* 2. Frames received from the attached segment are processed.
* 3. Switched frames received from other ports are advanced.
* 4. The port in the forwarding state responds to network management messages.
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/layer2/503_n1_1/Cisco_n5k_layer2_config_gd_rel_503_N1_1_chapter9.html
Host A switch interface is configured in VLAN 2. Host D sends a unicast packet destined for the IP address of host A.
What does the switch do when it receives the frame from host D?
Answer: C
An administrator received a call from a branch office regarding poor application performance hosted at the headquarters. Ethernet 1 is connected between Router1
and the LAN switch. What identifies the issue?
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Answer: D
Answer: A
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: B
Wireless LAN access must be set up to force all clients from the NA WLAN to authenticate against the local database. The WLAN is configured for local EAP
authentication. The time that users access the network must not be limited. Which action completes this configuration?
Answer: C
A. default-router192.168.20.253
B. network 192.168.20.254 255.255.255.0 secondary
C. ip default-gateway 0.0.0.0 0.0.0.0 192.168.20.253
D. next-server 192.168.20.254
Answer: A
PC A is communicating with another device at IP address 10.227.225.255. Through which router does router Y route the traffic?
A. router A
B. router B
C. router C
D. router D
Answer: C
Answer: CE
A. Null0
B. VIan58
C. Vlan60
D. VIan59
Answer: B
Answer: CD
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: D
Explanation:
When deciding to implement automation, a network administrator should consider the benefits and challenges associated with automation. Option D highlights one
of the key reasons for implementing automation—manual changes often result in configuration errors and inconsistencies. Automating repetitive and error-prone
tasks can help improve the accuracy and reliability of network configurations.
Load-balanced traffic is coming in from the WAN destined to a host at 172.16.1.190. Which next-hop is used by the router to forward the request?
A. 192.168.7.4
B. 192.168.7.7
C. 192.168.7.35
D. 192.168.7.40
Answer: D
A. GigabitEthernet0
B. GigabitEthernet0/1
C. Null0
D. GigabitEthernet0/3
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: BE
Answer: A
Which entry is the longest prefix match for host IP address 192.168.10.5?
A. 1
B. 2
C. 3
D. 4
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
An engineer is checking the routing table in the main router to identify the path to a server on the network. Which route does the router use to reach the server at
192.168.2.2?
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Refer to the exhibit. An engineer is asked to confère router R1 so that it forms an OSPF single-area neighbor relationship with R2. Which command sequence
must be implemented to configure the router?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
A. site-to-site VPN
B. IDMVPN
C. IGETVPN
D. IPsec remote access
E. clientless VPN
Answer: BE
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: A
Answer: B
A. 255.255.248.0
B. 255.255.254.0
C. 255.255.255.192
D. 255.255.240.0
Answer: A
A. flexibility of design
B. simplicity of configurator
C. low cost
D. full-mesh capability
Answer: B
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
Answer: D
Answer: B
A network engineer executes the show ip route command on router D. What is the next hop to network 192.168 1 0/24 and why?
Answer: B
A. Alert
B. Error
C. Emergency
D. Critical
Answer: C
The primary route across Gi0/0 is configured on both routers. A secondary route must be configured to establish connectivity between the workstation networks.
Which command set must be configured to complete this task?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
When router R1 is sending traffic to IP address 10.56.192 1, which interface or next hop address does it use to route the packet?
A. 0.0.0.0.0/0
B. 10.56.0.1
C. 10.56.128.19
D. Vlan57
Answer: B
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C
SW1 supports connectivity for a lobby conference room and must be secured. The engineer must limit the connectivity from PCI lo ma SW1 and SW2 network.
The MAC addresses allowed must be Limited to two. Which configuration secures the conference room connectivity?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
A. one
B. three
C. six
D. nine
Answer: C
A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-Ghz clients connect? (Choose two.)
Answer: AB
Answer: BD
A. REMOVE
B. REDIRECT
C. OPOST
D. GET
E. UPOP
Answer: CD
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
Answer: D
A. client exclusion
B. passive client
C. DHCP address assignment
D. static IP tunneling
Answer: C
A. LAG
B. EtherChannel
C. trunk
D. access
Answer: C
Rooter R1 is added to the network and configured with tie 10 0 0 64/26 and 10.0.20.0/24 subnets However traffic destined for the LAN on R3 is not access. Which
command when
executed on R1 defines a tunic route to reach the R3 LAN?
A)
B)
C)
A. Option A
B. Option B
C. Option C
Answer: C
All VLANs are present in the VLAN database. Which command sequence must be applied
to complete the configuration?
A. Interface FastEthernet0/1 switchport trunk native vlan 10 switchport trunk allowed vlan 10,15
B. Interface FastEthernet0/1 switchport mode trunk switchport trunk allowed vlan 10,15
C. interface FastEthernet0/1 switchport mode access switchport voice vlan 10
D. Interface FastEthernet0/1 switchport trunk allowed vlan add 10 vlan 10 private-vlan isolated
Answer: C
An engineer is asked to insert the new VLAN into the existing trunk without modifying anything previously configured Which command accomplishes this task?
Answer: D
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Chart, bar chart Description automatically generated
A. authorized services
B. authenticator
C. username
D. password
Answer: D
* 200-301 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 200-301 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year