ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 18

Question list
Search
Search

Refer to the exhibit.

Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

A.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

A.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

Answers
B.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

B.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

Answers
C.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

C.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

Answers
D.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

D.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

Answers
Suggested answer: B

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)

A.

It automatically provides a second authentication factor that is unknown to the original user.

A.

It automatically provides a second authentication factor that is unknown to the original user.

Answers
B.

It uses an internal firewall to protect the password repository from unauthorized access.

B.

It uses an internal firewall to protect the password repository from unauthorized access.

Answers
C.

It protects against keystroke logging on a compromised device or web site.

C.

It protects against keystroke logging on a compromised device or web site.

Answers
D.

It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality

D.

It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality

Answers
E.

It encourages users to create stronger passwords.

E.

It encourages users to create stronger passwords.

Answers
Suggested answer: C, E

Which technology is used to improve web traffic performance by proxy caching?

A.

WSA

A.

WSA

Answers
B.

Firepower

B.

Firepower

Answers
C.

ASA

C.

ASA

Answers
D.

FireSIGHT

D.

FireSIGHT

Answers
Suggested answer: A

Which type of attack can be mitigated by dynamic ARP inspection?

A.

worm

A.

worm

Answers
B.

malware

B.

malware

Answers
C.

DDoS

C.

DDoS

Answers
D.

man-in-the-middle

D.

man-in-the-middle

Answers
Suggested answer: D

What are two roles of Domain Name Services (DNS)? (Choose Two)

A.

builds a flat structure of DNS names for more efficient IP operations

A.

builds a flat structure of DNS names for more efficient IP operations

Answers
B.

encrypts network Traffic as it travels across a WAN by default

B.

encrypts network Traffic as it travels across a WAN by default

Answers
C.

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

C.

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

Answers
D.

enables applications to identify resources by name instead of IP address

D.

enables applications to identify resources by name instead of IP address

Answers
E.

allows a single host name to be shared across more than one IP address

E.

allows a single host name to be shared across more than one IP address

Answers
Suggested answer: D, E

How do TCP and UDP differ in the way they guarantee packet delivery?

A.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

A.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

Answers
B.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

B.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

Answers
C.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

C.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

Answers
D.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

D.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

Answers
Suggested answer: A

Refer to the exhibit.

What is the next hop address for traffic that is destined to host 10.0.1.5?

A.

10.0.1.3

A.

10.0.1.3

Answers
B.

10.0.1.50

B.

10.0.1.50

Answers
C.

10.0.1.4

C.

10.0.1.4

Answers
D.

Loopback D

D.

Loopback D

Answers
Suggested answer: B

What are two benefits of controller-based networking compared to traditional networking?

A.

controller-based increases network bandwidth usage, while traditional lightens the load on the network.

A.

controller-based increases network bandwidth usage, while traditional lightens the load on the network.

Answers
B.

controller-based inflates software costs, while traditional decreases individual licensing costs

B.

controller-based inflates software costs, while traditional decreases individual licensing costs

Answers
C.

Controller-based reduces network configuration complexity, while traditional increases the potential for errors

C.

Controller-based reduces network configuration complexity, while traditional increases the potential for errors

Answers
D.

Controller-based provides centralization of key IT functions. While traditional requires distributes management function

D.

Controller-based provides centralization of key IT functions. While traditional requires distributes management function

Answers
E.

controller-based allows for fewer network failure, while traditional increases failure rates.

E.

controller-based allows for fewer network failure, while traditional increases failure rates.

Answers
Suggested answer: C, D

Explanation:

Cisco DNA Center Device Management

3. Monitor the cloud for software update

5. Uses CLI templates to apply a consistent configuration to multiple devices at an individual location 6. Uses NetFlow to analyse potential security threats throughout the network and take appropriate action on that traffic Traditional device management 2. Manages device configuration on a per-device basis 4. Security is managed near the perimeter of the network with firewalls, VPNs, and IPS Implements changes via an SSH terminal

What mechanism carries multicast traffic between remote sites and supports encryption?

A.

ISATAP

A.

ISATAP

Answers
B.

GRE over iPsec

B.

GRE over iPsec

Answers
C.

iPsec over ISATAP

C.

iPsec over ISATAP

Answers
D.

GRE

D.

GRE

Answers
Suggested answer: B

Refer to the exhibit.

Which outcome is expected when PC_A sends data to PC_B?

A.

The switch rewrites the source and destination MAC addresses with its own.

A.

The switch rewrites the source and destination MAC addresses with its own.

Answers
B.

The source MAC address is changed.

B.

The source MAC address is changed.

Answers
C.

The source and destination MAC addresses remain the same.

C.

The source and destination MAC addresses remain the same.

Answers
D.

The destination MAC address is replaced with ffff.ffff.ffff.

D.

The destination MAC address is replaced with ffff.ffff.ffff.

Answers
Suggested answer: C
Total 967 questions
Go to page: of 97