ExamGecko
Home / Cisco / 200-301 / List of questions
Ask Question

Cisco 200-301 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable What is the result of this configuration?

The link is in a down state.

The link is in a down state.

The link is in an error disables state

The link is in an error disables state

The link is becomes an access port.

The link is becomes an access port.

The link becomes a trunk port.

The link becomes a trunk port.

Suggested answer: D
asked 07/10/2024
Michael Ulrich
45 questions

Question 112

Report Export Collapse

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

2000::/3

2000::/3

2002::5

2002::5

FC00::/7

FC00::/7

FF02::1

FF02::1

FF02::2

FF02::2

Suggested answer: D, E
Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36sbook/ip6-multicast.htmlWhen an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) andsolicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate withall interfaces on the local link, and the solicited-nodes multicast group is required for link-layeraddress resolution. Routers also join a third multicast group, the all-routers group (FF02::2).

asked 07/10/2024
Jeff Fazio
50 questions

Question 113

Report Export Collapse

Which MAC address is recognized as a VRRP virtual address?

0000.5E00.010a

0000.5E00.010a

0005.3711.0975

0005.3711.0975

0000.0C07.AC99

0000.0C07.AC99

0007.C070/AB01

0007.C070/AB01

Suggested answer: A
Explanation:

With VRRP, the virtual router's MAC address is 0000.5E00.01xx , in which xx is the VRRP group.

asked 07/10/2024
Harry Meijer
50 questions

Question 114

Report Export Collapse

in Which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?

A spine switch and a leaf switch can be added with redundant connections between them

A spine switch and a leaf switch can be added with redundant connections between them

A spine switch can be added with at least 40 GB uplinks

A spine switch can be added with at least 40 GB uplinks

A leaf switch can be added with a single connection to a core spine switch.

A leaf switch can be added with a single connection to a core spine switch.

A leaf switch can be added with connections to every spine switch

A leaf switch can be added with connections to every spine switch

Suggested answer: D
Explanation:

Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency, nonblocking server-to-server connectivity.

Leaf (aggregation) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to the leaf switches.

Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf architecture, every leaf should connect to every spine in a full mesh.

Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to other spine switches.

asked 07/10/2024
Ahmed Dawoud
48 questions

Question 115

Report Export Collapse

Which type of wireless encryption is used for WPA2 in preshared key mode?

TKIP with RC4

TKIP with RC4

RC4

RC4

AES-128

AES-128

Most voted
(1)
Most voted

AES-256

AES-256

Suggested answer: D
Explanation:

We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the encryption is AES-256, not AES-128.

Cisco 200-301 image Question 15 explanation 109523 10072024004420000000

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/67134-wpa2-config.html

asked 07/10/2024
Ruben Dallibor
43 questions

Question 116

Report Export Collapse

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

It drops lower-priority packets before it drops higher-priority packets

It drops lower-priority packets before it drops higher-priority packets

It can identify different flows with a high level of granularity

It can identify different flows with a high level of granularity

It guarantees the delivery of high-priority packets

It guarantees the delivery of high-priority packets

It can mitigate congestion by preventing the queue from filling up

It can mitigate congestion by preventing the queue from filling up

it supports protocol discovery

it supports protocol discovery

Suggested answer: A, D
Explanation:

Weighted Random Early Detection (WRED) is just a congestion avoidance mechanism. WRED drops packets selectively based on IP precedence. Edge routers assign IP precedences to packets as they enter the network. When a packet arrives, the following events occur:

1. The average queue size is calculated.

2. If the average is less than the minimum queue threshold, the arriving packet is queued.

3. If the average is between the minimum queue threshold for that type of traffic and the maximum threshold for the interface, the packet is either dropped or queued, depending on the packet drop probability for that type of traffic.

4. If the average queue size is greater than the maximum threshold, the packet is dropped. WRED reduces the chances of tail drop (when the queue is full, the packet is dropped) by selectively dropping packets when the output interface begins to show signs of congestion (thus it can mitigate congestion by preventing the queue from filling up). By dropping some packets early rather than waiting until the queue is full, WRED avoids dropping large numbers of packets at once and minimizes the chances of global synchronization. Thus, WRED allows the transmission line to be used fully at all times.

WRED generally drops packets selectively based on IP precedence. Packets with a higher IP precedence are less likely to be dropped than packets with a lower precedence. Thus, the higher the priority of a packet, the higher the probability that the packet will be delivered

asked 07/10/2024
Misael E
43 questions

Question 117

Report Export Collapse

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

The floating static route must have a higher administrative distance than the primary route so it is used as a backup

The floating static route must have a higher administrative distance than the primary route so it is used as a backup

The administrative distance must be higher on the primary route so that the backup route becomes secondary.

The administrative distance must be higher on the primary route so that the backup route becomes secondary.

The floating static route must have a lower administrative distance than the primary route so it is used as a backup

The floating static route must have a lower administrative distance than the primary route so it is used as a backup

The default-information originate command must be configured for the route to be installed into the routing table

The default-information originate command must be configured for the route to be installed into the routing table

Suggested answer: A
asked 07/10/2024
Tristan Zerner
51 questions

Question 118

Report Export Collapse

Refer to the exhibit.

Cisco 200-301 image Question 18 109526 10072024004420000000

Which password must an engineer use to enter the enable mode?

adminadmin123

adminadmin123

default

default

testing 1234

testing 1234

cisco123

cisco123

Suggested answer: C
Explanation:

If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console, the console line password serves as the enable password for all VTY sessions -> The "enable secret" will be used first if available, then "enable password" and line password.

asked 07/10/2024
Baheilu Tekelu
42 questions

Question 119

Report Export Collapse

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

TCP uses synchronization packets, and UDP uses acknowledgment packets.

TCP uses synchronization packets, and UDP uses acknowledgment packets.

UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits

UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits

UDP provides reliable message transfer and TCP is a connectionless protocol

UDP provides reliable message transfer and TCP is a connectionless protocol

TCP uses the three-way handshake and UDP does not guarantee message delivery

TCP uses the three-way handshake and UDP does not guarantee message delivery

Suggested answer: D
asked 07/10/2024
Edwin Lebron
43 questions

Question 120

Report Export Collapse

Which mode allows access points to be managed by Cisco Wireless LAN Controllers?

autonomous

autonomous

lightweight

lightweight

bridge

bridge

mobility express

mobility express

Suggested answer: B
Explanation:

https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200-series/70278-lap-faq.htmlA Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN)controller (WLC). APs are "lightweight," which means that they cannot act independently of awireless LAN controller (WLC). The WLC manages the AP configurations and firmware. The APs are"zero touch" deployed, and individual configuration of APs is not necessary.

asked 07/10/2024
luis coco enriquez
42 questions
Total 987 questions
Go to page: of 99