Cisco 200-301 Practice Test - Questions Answers, Page 13

List of questions
Question 121

How do TCP and UDP differ in the way that they establish a connection between two endpoints?
TCP uses synchronization packets, and UDP uses acknowledgment packets.
UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bits
UDP provides reliable message transfer and TCP is a connectionless protocol
TCP uses the three-way handshake and UDP does not guarantee message delivery
Question 122

Which mode allows access points to be managed by Cisco Wireless LAN Controllers?
autonomous
lightweight
bridge
mobility express
https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200-series/70278-lap-faq.htmlA Lightweight Access Point (LAP) is an AP that is designed to be connected to a wireless LAN (WLAN)controller (WLC). APs are "lightweight," which means that they cannot act independently of awireless LAN controller (WLC). The WLC manages the AP configurations and firmware. The APs are"zero touch" deployed, and individual configuration of APs is not necessary.
Question 123

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
Bronze
Platinum
Silver
Gold
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lanwlan/81831-qos-wlc-lap.htmlCisco Unified Wireless Network solution WLANs support four levels of QoS: Platinum/Voice,Gold/Video, Silver/Best Effort (default), and Bronze/Background.
Question 124

If a notice-level messaging is sent to a syslog server, which event has occurred?
A network device has restarted
An ARP inspection has failed
A routing instance has flapped
A debug operation is running
Usually no action is required when a route flaps so it generates the notification syslog level message (level 5).
Question 125

What are two southbound APIs? (Choose two )
OpenFlow
NETCONF
Thrift
CORBA
DSC
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements.
The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices.
Question 126

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
Physical access control
Social engineering attack
brute force attack
user awareness
This is a training program which simulates an attack, not a real attack (as it says "The webpage that opens reports that it was safe") so we believed it should be called a "user awareness" program.
Therefore the best answer here should be "user awareness". This is the definition of "User awareness" from CCNA 200- 301 Offical Cert Guide Book:
"User awareness: All users should be made aware of the need for data confidentiality to protect corporate information, as well as their own credentials and personal information. They should also be made aware of potential threats, schemes to mislead, and proper procedures to report security incidents. " Note: Physical access control means infrastructure locations, such as network closets and data centers, should remain securely locked.
Question 127

An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?
Option A
Option B
Option C
Option D
Question 128

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
The Layer 2 switch drops the received frame
The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.
The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.
The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table
If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.
Question 129

Refer to the exhibit.
An engineer configured NAT translations and has verified that the configuration is correct.
Which IP address is the source IP?
10.4.4.4
10.4.4.5
172.23.103.10
172.23.104.4
NAT is used to send a packet to the outside network, using a public IP address to make it routable.
The NAT logic is "inside-to-outside" FIRST and "outside-to-inside" THEN. This way, configuring NAT means "choosing a public IP address" for any outbound packet" IN THE FIRST PLACE, where "public IP address" translates to "inside global address". Among the given answers, the only inside global address is 172.123.104.4.
Question 130

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?
CPU ACL
TACACS
Flex ACL
RADIUS
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.html
Question