Cisco 200-301 Practice Test - Questions Answers, Page 18

List of questions
Question 171

What occurs to frames during the process of frame flooding?
Frames are sent to every port on the switch in the same VLAN except from the originating port
Frames are sent to every port on the switch that has a matching entry in the MAC address table.
Frames are sent to all ports, including those that are assigned to other VLANs.
Frames are sent to every port on the switch in the same VLAN.
Question 172

Refer to the exhibit.
Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in
Question 173

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)
It automatically provides a second authentication factor that is unknown to the original user.
It uses an internal firewall to protect the password repository from unauthorized access.
It protects against keystroke logging on a compromised device or web site.
It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
It encourages users to create stronger passwords.
Question 174

Which technology is used to improve web traffic performance by proxy caching?
WSA
Firepower
ASA
FireSIGHT
Question 175

Which type of attack can be mitigated by dynamic ARP inspection?
worm
malware
DDoS
man-in-the-middle
Question 176

What are two roles of Domain Name Services (DNS)? (Choose Two)
builds a flat structure of DNS names for more efficient IP operations
encrypts network Traffic as it travels across a WAN by default
improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
enables applications to identify resources by name instead of IP address
allows a single host name to be shared across more than one IP address
Question 177

How do TCP and UDP differ in the way they guarantee packet delivery?
TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.
TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
Question 178

Refer to the exhibit.
What is the next hop address for traffic that is destined to host 10.0.1.5?
10.0.1.3
10.0.1.50
10.0.1.4
Loopback D
Question 179

What are two benefits of controller-based networking compared to traditional networking?
controller-based increases network bandwidth usage, while traditional lightens the load on the network.
controller-based inflates software costs, while traditional decreases individual licensing costs
Controller-based reduces network configuration complexity, while traditional increases the potential for errors
Controller-based provides centralization of key IT functions. While traditional requires distributes management function
controller-based allows for fewer network failure, while traditional increases failure rates.
Cisco DNA Center Device Management
3. Monitor the cloud for software update
5. Uses CLI templates to apply a consistent configuration to multiple devices at an individual location 6. Uses NetFlow to analyse potential security threats throughout the network and take appropriate action on that traffic Traditional device management 2. Manages device configuration on a per-device basis 4. Security is managed near the perimeter of the network with firewalls, VPNs, and IPS Implements changes via an SSH terminal
Question 180

What mechanism carries multicast traffic between remote sites and supports encryption?
ISATAP
GRE over iPsec
iPsec over ISATAP
GRE
Question