ExamGecko
Home / Cisco / 200-301 / List of questions
Ask Question

Cisco 200-301 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

What occurs to frames during the process of frame flooding?

Frames are sent to every port on the switch in the same VLAN except from the originating port

Frames are sent to every port on the switch in the same VLAN except from the originating port

Frames are sent to every port on the switch that has a matching entry in the MAC address table.

Frames are sent to every port on the switch that has a matching entry in the MAC address table.

Frames are sent to all ports, including those that are assigned to other VLANs.

Frames are sent to all ports, including those that are assigned to other VLANs.

Frames are sent to every port on the switch in the same VLAN.

Frames are sent to every port on the switch in the same VLAN.

Suggested answer: A
asked 07/10/2024
Colin Mabe
50 questions

Question 172

Report Export Collapse

Refer to the exhibit.

Cisco 200-301 image Question 72 109580 10072024004420000000

Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in

Suggested answer: B
asked 07/10/2024
DATA DYNAMICAL SOLUTIONS
42 questions

Question 173

Report Export Collapse

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)

It automatically provides a second authentication factor that is unknown to the original user.

It automatically provides a second authentication factor that is unknown to the original user.

It uses an internal firewall to protect the password repository from unauthorized access.

It uses an internal firewall to protect the password repository from unauthorized access.

It protects against keystroke logging on a compromised device or web site.

It protects against keystroke logging on a compromised device or web site.

It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality

It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality

It encourages users to create stronger passwords.

It encourages users to create stronger passwords.

Suggested answer: C, E
asked 07/10/2024
Lietuvis Kau
40 questions

Question 174

Report Export Collapse

Which technology is used to improve web traffic performance by proxy caching?

WSA

WSA

Firepower

Firepower

ASA

ASA

FireSIGHT

FireSIGHT

Suggested answer: A
asked 07/10/2024
Jeffrey Agnitsch
47 questions

Question 175

Report Export Collapse

Which type of attack can be mitigated by dynamic ARP inspection?

worm

worm

malware

malware

DDoS

DDoS

man-in-the-middle

man-in-the-middle

Suggested answer: D
asked 07/10/2024
Jordan Arribas Aranda
39 questions

Question 176

Report Export Collapse

What are two roles of Domain Name Services (DNS)? (Choose Two)

builds a flat structure of DNS names for more efficient IP operations

builds a flat structure of DNS names for more efficient IP operations

encrypts network Traffic as it travels across a WAN by default

encrypts network Traffic as it travels across a WAN by default

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)

enables applications to identify resources by name instead of IP address

enables applications to identify resources by name instead of IP address

allows a single host name to be shared across more than one IP address

allows a single host name to be shared across more than one IP address

Suggested answer: D, E
asked 07/10/2024
Vincent Dsouza
43 questions

Question 177

Report Export Collapse

How do TCP and UDP differ in the way they guarantee packet delivery?

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.

Suggested answer: A
asked 07/10/2024
Rua Tebas
46 questions

Question 178

Report Export Collapse

Refer to the exhibit.

Cisco 200-301 image Question 78 109586 10072024004420000000

What is the next hop address for traffic that is destined to host 10.0.1.5?

10.0.1.3

10.0.1.3

10.0.1.50

10.0.1.50

10.0.1.4

10.0.1.4

Loopback D

Loopback D

Suggested answer: B
asked 07/10/2024
Sharos Ramcharan
28 questions

Question 179

Report Export Collapse

What are two benefits of controller-based networking compared to traditional networking?

controller-based increases network bandwidth usage, while traditional lightens the load on the network.

controller-based increases network bandwidth usage, while traditional lightens the load on the network.

controller-based inflates software costs, while traditional decreases individual licensing costs

controller-based inflates software costs, while traditional decreases individual licensing costs

Controller-based reduces network configuration complexity, while traditional increases the potential for errors

Controller-based reduces network configuration complexity, while traditional increases the potential for errors

Controller-based provides centralization of key IT functions. While traditional requires distributes management function

Controller-based provides centralization of key IT functions. While traditional requires distributes management function

controller-based allows for fewer network failure, while traditional increases failure rates.

controller-based allows for fewer network failure, while traditional increases failure rates.

Suggested answer: C, D
Explanation:

Cisco DNA Center Device Management

3. Monitor the cloud for software update

5. Uses CLI templates to apply a consistent configuration to multiple devices at an individual location 6. Uses NetFlow to analyse potential security threats throughout the network and take appropriate action on that traffic Traditional device management 2. Manages device configuration on a per-device basis 4. Security is managed near the perimeter of the network with firewalls, VPNs, and IPS Implements changes via an SSH terminal

asked 07/10/2024
Srikrushna Patro
36 questions

Question 180

Report Export Collapse

What mechanism carries multicast traffic between remote sites and supports encryption?

ISATAP

ISATAP

GRE over iPsec

GRE over iPsec

iPsec over ISATAP

iPsec over ISATAP

GRE

GRE

Suggested answer: B
asked 07/10/2024
Kevin Intriago
37 questions
Total 987 questions
Go to page: of 99