ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 12

Question list
Search
Search

When configuring IPv6 on an interface, which two IPv6 multicast groups are joined? (Choose two)

A.

2000::/3

A.

2000::/3

Answers
B.

2002::5

B.

2002::5

Answers
C.

FC00::/7

C.

FC00::/7

Answers
D.

FF02::1

D.

FF02::1

Answers
E.

FF02::2

E.

FF02::2

Answers
Suggested answer: D, E

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/xe-3s/ipv6-xe-36sbook/ip6-multicast.htmlWhen an interface is configured with IPv6 address, it automatically joins the all nodes (FF02::1) andsolicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate withall interfaces on the local link, and the solicited-nodes multicast group is required for link-layeraddress resolution. Routers also join a third multicast group, the all-routers group (FF02::2).

Which MAC address is recognized as a VRRP virtual address?

A.

0000.5E00.010a

A.

0000.5E00.010a

Answers
B.

0005.3711.0975

B.

0005.3711.0975

Answers
C.

0000.0C07.AC99

C.

0000.0C07.AC99

Answers
D.

0007.C070/AB01

D.

0007.C070/AB01

Answers
Suggested answer: A

Explanation:

With VRRP, the virtual router's MAC address is 0000.5E00.01xx , in which xx is the VRRP group.

in Which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required?

A.

A spine switch and a leaf switch can be added with redundant connections between them

A.

A spine switch and a leaf switch can be added with redundant connections between them

Answers
B.

A spine switch can be added with at least 40 GB uplinks

B.

A spine switch can be added with at least 40 GB uplinks

Answers
C.

A leaf switch can be added with a single connection to a core spine switch.

C.

A leaf switch can be added with a single connection to a core spine switch.

Answers
D.

A leaf switch can be added with connections to every spine switch

D.

A leaf switch can be added with connections to every spine switch

Answers
Suggested answer: D

Explanation:

Spine-leaf architecture is typically deployed as two layers: spines (such as an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide high-bandwidth, low-latency, nonblocking server-to-server connectivity.

Leaf (aggregation) switches are what provide devices access to the fabric (the network of spine and leaf switches) and are typically deployed at the top of the rack. Generally, devices connect to the leaf switches.

Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf architecture, every leaf should connect to every spine in a full mesh.

Spine (aggregation) switches are used to connect to all leaf switches and are typically deployed at the end or middle of the row. Spine switches do not connect to other spine switches.

Which type of wireless encryption is used for WPA2 in preshared key mode?

A.

TKIP with RC4

A.

TKIP with RC4

Answers
B.

RC4

B.

RC4

Answers
C.

AES-128

C.

AES-128

Answers
D.

AES-256

D.

AES-256

Answers
Suggested answer: D

Explanation:

We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the encryption is AES-256, not AES-128.

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/67134-wpa2-config.html

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

A.

It drops lower-priority packets before it drops higher-priority packets

A.

It drops lower-priority packets before it drops higher-priority packets

Answers
B.

It can identify different flows with a high level of granularity

B.

It can identify different flows with a high level of granularity

Answers
C.

It guarantees the delivery of high-priority packets

C.

It guarantees the delivery of high-priority packets

Answers
D.

It can mitigate congestion by preventing the queue from filling up

D.

It can mitigate congestion by preventing the queue from filling up

Answers
E.

it supports protocol discovery

E.

it supports protocol discovery

Answers
Suggested answer: A, D

Explanation:

Weighted Random Early Detection (WRED) is just a congestion avoidance mechanism. WRED drops packets selectively based on IP precedence. Edge routers assign IP precedences to packets as they enter the network. When a packet arrives, the following events occur:

1. The average queue size is calculated.

2. If the average is less than the minimum queue threshold, the arriving packet is queued.

3. If the average is between the minimum queue threshold for that type of traffic and the maximum threshold for the interface, the packet is either dropped or queued, depending on the packet drop probability for that type of traffic.

4. If the average queue size is greater than the maximum threshold, the packet is dropped. WRED reduces the chances of tail drop (when the queue is full, the packet is dropped) by selectively dropping packets when the output interface begins to show signs of congestion (thus it can mitigate congestion by preventing the queue from filling up). By dropping some packets early rather than waiting until the queue is full, WRED avoids dropping large numbers of packets at once and minimizes the chances of global synchronization. Thus, WRED allows the transmission line to be used fully at all times.

WRED generally drops packets selectively based on IP precedence. Packets with a higher IP precedence are less likely to be dropped than packets with a lower precedence. Thus, the higher the priority of a packet, the higher the probability that the packet will be delivered

When a floating static route is configured, which action ensures that the backup route is used when the primary route fails?

A.

The floating static route must have a higher administrative distance than the primary route so it is used as a backup

A.

The floating static route must have a higher administrative distance than the primary route so it is used as a backup

Answers
B.

The administrative distance must be higher on the primary route so that the backup route becomes secondary.

B.

The administrative distance must be higher on the primary route so that the backup route becomes secondary.

Answers
C.

The floating static route must have a lower administrative distance than the primary route so it is used as a backup

C.

The floating static route must have a lower administrative distance than the primary route so it is used as a backup

Answers
D.

The default-information originate command must be configured for the route to be installed into the routing table

D.

The default-information originate command must be configured for the route to be installed into the routing table

Answers
Suggested answer: A

Refer to the exhibit.

Which password must an engineer use to enter the enable mode?

A.

adminadmin123

A.

adminadmin123

Answers
B.

default

B.

default

Answers
C.

testing 1234

C.

testing 1234

Answers
D.

cisco123

D.

cisco123

Answers
Suggested answer: C

Explanation:

If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console, the console line password serves as the enable password for all VTY sessions -> The "enable secret" will be used first if available, then "enable password" and line password.

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

A.

TCP uses synchronization packets, and UDP uses acknowledgment packets.

A.

TCP uses synchronization packets, and UDP uses acknowledgment packets.

Answers
B.

UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits

B.

UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits

Answers
C.

UDP provides reliable message transfer and TCP is a connectionless protocol

C.

UDP provides reliable message transfer and TCP is a connectionless protocol

Answers
D.

TCP uses the three-way handshake and UDP does not guarantee message delivery

D.

TCP uses the three-way handshake and UDP does not guarantee message delivery

Answers
Suggested answer: D

Which mode allows access points to be managed by Cisco Wireless LAN Controllers?

A.

autonomous

A.

autonomous

Answers
B.

lightweight

B.

lightweight

Answers
C.

bridge

C.

bridge

Answers
D.

mobility express

D.

mobility express

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200-series/70278-lap-faq.htmlA Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN)controller (WLC). APs are "lightweight," which means that they cannot act independently of awireless LAN controller (WLC). The WLC manages the AP configurations and firmware. The APs are"zero touch" deployed, and individual configuration of APs is not necessary.

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?

A.

Bronze

A.

Bronze

Answers
B.

Platinum

B.

Platinum

Answers
C.

Silver

C.

Silver

Answers
D.

Gold

D.

Gold

Answers
Suggested answer: B

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lanwlan/81831-qos-wlc-lap.htmlCisco Unified Wireless Network solution WLANs support four levels of QoS: Platinum/Voice,Gold/Video, Silver/Best Effort (default), and Bronze/Background.

Total 967 questions
Go to page: of 97