Cisco 200-301 Practice Test - Questions Answers, Page 12

List of questions
Question 111

Two switches are connected and using Cisco Dynamic Trunking Protocol SW1 is set to Dynamic Desirable What is the result of this configuration?
The link is in a down state.
The link is in an error disables state
The link is becomes an access port.
The link becomes a trunk port.
Question 112

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)
2000::/3
2002::5
FC00::/7
FF02::1
FF02::2
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36sbook/ip6-multicast.htmlWhen an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) andsolicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate withall interfaces on the local link, and the solicited-nodes multicast group is required for link-layeraddress resolution. Routers also join a third multicast group, the all-routers group (FF02::2).
Question 113

Which MAC address is recognized as a VRRP virtual address?
0000.5E00.010a
0005.3711.0975
0000.0C07.AC99
0007.C070/AB01
With VRRP, the virtual router's MAC address is 0000.5E00.01xx , in which xx is the VRRP group.
Question 114

in Which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?
A spine switch and a leaf switch can be added with redundant connections between them
A spine switch can be added with at least 40 GB uplinks
A leaf switch can be added with a single connection to a core spine switch.
A leaf switch can be added with connections to every spine switch
Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency, nonblocking server-to-server connectivity.
Leaf (aggregation) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to the leaf switches.
Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf architecture, every leaf should connect to every spine in a full mesh.
Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to other spine switches.
Question 115

Which type of wireless encryption is used for WPA2 in preshared key mode?
TKIP with RC4
RC4
AES-128
AES-256
We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the encryption is AES-256, not AES-128.
https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/67134-wpa2-config.html
Question 116

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
It drops lower-priority packets before it drops higher-priority packets
It can identify different flows with a high level of granularity
It guarantees the delivery of high-priority packets
It can mitigate congestion by preventing the queue from filling up
it supports protocol discovery
Weighted Random Early Detection (WRED) is just a congestion avoidance mechanism. WRED drops packets selectively based on IP precedence. Edge routers assign IP precedences to packets as they enter the network. When a packet arrives, the following events occur:
1. The average queue size is calculated.
2. If the average is less than the minimum queue threshold, the arriving packet is queued.
3. If the average is between the minimum queue threshold for that type of traffic and the maximum threshold for the interface, the packet is either dropped or queued, depending on the packet drop probability for that type of traffic.
4. If the average queue size is greater than the maximum threshold, the packet is dropped. WRED reduces the chances of tail drop (when the queue is full, the packet is dropped) by selectively dropping packets when the output interface begins to show signs of congestion (thus it can mitigate congestion by preventing the queue from filling up). By dropping some packets early rather than waiting until the queue is full, WRED avoids dropping large numbers of packets at once and minimizes the chances of global synchronization. Thus, WRED allows the transmission line to be used fully at all times.
WRED generally drops packets selectively based on IP precedence. Packets with a higher IP precedence are less likely to be dropped than packets with a lower precedence. Thus, the higher the priority of a packet, the higher the probability that the packet will be delivered
Question 117

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?
The floating static route must have a higher administrative distance than the primary route so it is used as a backup
The administrative distance must be higher on the primary route so that the backup route becomes secondary.
The floating static route must have a lower administrative distance than the primary route so it is used as a backup
The default-information originate command must be configured for the route to be installed into the routing table
Question 118

Refer to the exhibit.
Which password must an engineer use to enter the enable mode?
adminadmin123
default
testing 1234
cisco123
If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console, the console line password serves as the enable password for all VTY sessions -> The "enable secret" will be used first if available, then "enable password" and line password.
Question 119

How do TCP and UDP differ in the way that they establish a connection between two endpoints?
TCP uses synchronization packets, and UDP uses acknowledgment packets.
UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits
UDP provides reliable message transfer and TCP is a connectionless protocol
TCP uses the three-way handshake and UDP does not guarantee message delivery
Question 120

Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
autonomous
lightweight
bridge
mobility express
https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200-series/70278-lap-faq.htmlA Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN)controller (WLC). APs are "lightweight," which means that they cannot act independently of awireless LAN controller (WLC). The WLC manages the AP configurations and firmware. The APs are"zero touch" deployed, and individual configuration of APs is not necessary.
Question