Cisco 200-301 Practice Test - Questions Answers, Page 13

List of questions
Question 121

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?
Bronze
Platinum
Silver
Gold
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lanwlan/81831-qos-wlc-lap.htmlCisco Unified Wireless Network solution WLANs support four levels of QoS: Platinum/Voice,Gold/Video, Silver/Best Effort (default), and Bronze/Background.
Question 122

If a notice-level messaging is sent to a syslog server, which event has occurred?
A network device has restarted
An ARP inspection has failed
A routing instance has flapped
A debug operation is running
Usually no action is required when a route flaps so it generates the notification syslog level message (level 5).
Question 123

What are two southbound APIs? (Choose two )
OpenFlow
NETCONF
Thrift
CORBA
DSC
OpenFlow is a well-known southbound API. OpenFlow defines the way the SDN Controller should interact with the forwarding plane to make adjustments to the network, so it can better adapt to changing business requirements.
The Network Configuration Protocol (NetConf) uses Extensible Markup Language (XML) to install, manipulate and delete configuration to network devices.
Question 124

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
Physical access control
Social engineering attack
brute force attack
user awareness
This is a training program which simulates an attack, not a real attack (as it says "The webpage that opens reports that it was safe") so we believed it should be called a "user awareness" program.
Therefore the best answer here should be "user awareness". This is the definition of "User awareness" from CCNA 200- 301 Offical Cert Guide Book:
"User awareness: All users should be made aware of the need for data confidentiality to protect corporate information, as well as their own credentials and personal information. They should also be made aware of potential threats, schemes to mislead, and proper procedures to report security incidents. " Note: Physical access control means infrastructure locations, such as network closets and data centers, should remain securely locked.
Question 125

An engineer must configure a/30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria?
Option A
Option B
Option C
Option D
Question 126

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received?
The Layer 2 switch drops the received frame
The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN.
The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning.
The Layer 2 switch forwards the packet and adds the destination MAC address to its MAC address table
If the destination MAC address is not in the CAM table (unknown destination MAC address), the switch sends the frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.
Question 127

Refer to the exhibit.
An engineer configured NAT translations and has verified that the configuration is correct.
Which IP address is the source IP?
10.4.4.4
10.4.4.5
172.23.103.10
172.23.104.4
NAT is used to send a packet to the outside network, using a public IP address to make it routable.
The NAT logic is "inside-to-outside" FIRST and "outside-to-inside" THEN. This way, configuring NAT means "choosing a public IP address" for any outbound packet" IN THE FIRST PLACE, where "public IP address" translates to "inside global address". Among the given answers, the only inside global address is 172.123.104.4.
Question 128

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?
CPU ACL
TACACS
Flex ACL
RADIUS
Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.html
Question 129

Which command automatically generates an IPv6 address from a specified IPv6 prefix and MAC address of an interface?
ipv6 address dhcp
ipv6 address 2001:DB8:5:112::/64 eui-64
ipv6 address autoconfig
ipv6 address 2001:DB8:5:112::2/64 link-local
The "ipv6 address autoconfig" command causes the device to perform IPv6 stateless address autoconfiguration to discover prefixes on the link and then to add the EUI-64 based addresses to the interface.
Addresses are configured depending on the prefixes received in Router Advertisement (RA) messages.
The device will listen for RA messages which are transmitted periodically from the router (DHCP Server).
This RA message allows a host to create a global IPv6 address from:
+ Its interface identifier (EUI-64 address)
+ Link Prefix (obtained via RA)
Note: Global address is the combination of Link Prefix and EUI-64 address
Question 130

An engineer is asked to protect unused ports that are configured in the default VLAN on a switch.
Which two steps will fulfill the request? (Choose two)
Configure the ports in an EtherChannel.
Administratively shut down the ports
Configure the port type as access and place in VLAN 99
Configure the ports as trunk ports
Enable the Cisco Discovery Protocol
Question