ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 13

Question list
Search
Search

If a notice-level messaging is sent to a syslog server, which event has occurred?

A.

A network device has restarted

A.

A network device has restarted

Answers
B.

An ARP inspection has failed

B.

An ARP inspection has failed

Answers
C.

A routing instance has flapped

C.

A routing instance has flapped

Answers
D.

A debug operation is running

D.

A debug operation is running

Answers
Suggested answer: C

Explanation:

Usually no action is required when a route flaps so it generates the notification syslog level message (level 5).

What are two southbound APIs? (Choose two )

A.

OpenFlow

A.

OpenFlow

Answers
B.

NETCONF

B.

NETCONF

Answers
C.

Thrift

C.

Thrift

Answers
D.

CORBA

D.

CORBA

Answers
E.

DSC

E.

DSC

Answers
Suggested answer: A, B

Explanation:

OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements.

The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices.

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

A.

Physical access control

A.

Physical access control

Answers
B.

Social engineering attack

B.

Social engineering attack

Answers
C.

brute force attack

C.

brute force attack

Answers
D.

user awareness

D.

user awareness

Answers
Suggested answer: D

Explanation:

This is a training program which simulates an attack, not a real attack (as it says "The webpage that opens reports that it was safe") so we believed it should be called a "user awareness" program.

Therefore the best answer here should be "user awareness". This is the definition of "User awareness" from CCNA 200- 301 Offical Cert Guide Book:

"User awareness: All users should be made aware of the need for data confidentiality to protect corporate information, as well as their own credentials and personal information. They should also be made aware of potential threats, schemes to mislead, and proper procedures to report security incidents. " Note: Physical access control means infrastructure locations, such as network closets and data centers, should remain securely locked.

An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?

A.

The Layer 2 switch drops the received frame

A.

The Layer 2 switch drops the received frame

Answers
B.

The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.

B.

The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.

Answers
C.

The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.

C.

The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.

Answers
D.

The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table

D.

The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table

Answers
Suggested answer: B

Explanation:

If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.

Refer to the exhibit.

An engineer configured NAT translations and has verified that the configuration is correct.

Which IP address is the source IP?

A.

10.4.4.4

A.

10.4.4.4

Answers
B.

10.4.4.5

B.

10.4.4.5

Answers
C.

172.23.103.10

C.

172.23.103.10

Answers
D.

172.23.104.4

D.

172.23.104.4

Answers
Suggested answer: D

Explanation:

NAT is used to send a packet to the outside network, using a public IP address to make it routable.

The NAT logic is "inside-to-outside" FIRST and "outside-to-inside" THEN. This way, configuring NAT means "choosing a public IP address" for any outbound packet" IN THE FIRST PLACE, where "public IP address" translates to "inside global address". Among the given answers, the only inside global address is 172.123.104.4.

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

A.

CPU ACL

A.

CPU ACL

Answers
B.

TACACS

B.

TACACS

Answers
C.

Flex ACL

C.

Flex ACL

Answers
D.

RADIUS

D.

RADIUS

Answers
Suggested answer: A

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.html

Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?

A.

ipv6 address dhcp

A.

ipv6 address dhcp

Answers
B.

ipv6 address 2001:DB8:5:112::/64 eui-64

B.

ipv6 address 2001:DB8:5:112::/64 eui-64

Most voted
Answers (1)
Most voted
C.

ipv6 address autoconfig

C.

ipv6 address autoconfig

Answers
D.

ipv6 address 2001:DB8:5:112::2/64 link-local

D.

ipv6 address 2001:DB8:5:112::2/64 link-local

Answers
Suggested answer: C

Explanation:

The "ipv6 address autoconfig" command causes the device to perform IPv6 stateless address autoconfiguration to discover prefixes on the link and then to add the EUI-64 based addresses to the interface.

Addresses are configured depending on the prefixes received in Router Advertisement (RA) messages.

The device will listen for RA messages which are transmitted periodically from the router (DHCP Server).

This RA message allows a host to create a global IPv6 address from:

+ Its interface identifier (EUI-64 address)

+ Link Prefix (obtained via RA)

Note: Global address is the combination of Link Prefix and EUI-64 address

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch.

Which two steps will fulfill the request? (Choose two)

A.

Configure the ports in an EtherChannel.

A.

Configure the ports in an EtherChannel.

Answers
B.

Administratively shut down the ports

B.

Administratively shut down the ports

Answers
C.

Configure the port type as access and place in VLAN 99

C.

Configure the port type as access and place in VLAN 99

Answers
D.

Configure the ports as trunk ports

D.

Configure the ports as trunk ports

Answers
E.

Enable the Cisco Discovery Protocol

E.

Enable the Cisco Discovery Protocol

Answers
Suggested answer: B, C

Which output displays a JSON data representation?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

JSON data is written as name/value pairs.

A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:

"name":"Mark"

JSON can use arrays. Array values must be of type string, number, object, array, boolean or null.

For example:

{

"name":"John",

"age":30,

"cars":[ "Ford", "BMW", "Fiat" ]

}

JSON can have empty object like "taskId":{}

Total 967 questions
Go to page: of 97