Cisco 200-301 Practice Test - Questions Answers, Page 18
List of questions
Related questions
Refer to the exhibit.
Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in
In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)
It automatically provides a second authentication factor that is unknown to the original user.
It uses an internal firewall to protect the password repository from unauthorized access.
It protects against keystroke logging on a compromised device or web site.
It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
It encourages users to create stronger passwords.
Which technology is used to improve web traffic performance by proxy caching?
WSA
Firepower
ASA
FireSIGHT
Which type of attack can be mitigated by dynamic ARP inspection?
worm
malware
DDoS
man-in-the-middle
What are two roles of Domain Name Services (DNS)? (Choose Two)
builds a flat structure of DNS names for more efficient IP operations
encrypts network Traffic as it travels across a WAN by default
improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
enables applications to identify resources by name instead of IP address
allows a single host name to be shared across more than one IP address
How do TCP and UDP differ in the way they guarantee packet delivery?
TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.
TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
Refer to the exhibit.
What is the next hop address for traffic that is destined to host 10.0.1.5?
10.0.1.3
10.0.1.50
10.0.1.4
Loopback D
What are two benefits of controller-based networking compared to traditional networking?
controller-based increases network bandwidth usage, while traditional lightens the load on the network.
controller-based inflates software costs, while traditional decreases individual licensing costs
Controller-based reduces network configuration complexity, while traditional increases the potential for errors
Controller-based provides centralization of key IT functions. While traditional requires distributes management function
controller-based allows for fewer network failure, while traditional increases failure rates.
What mechanism carries multicast traffic between remote sites and supports encryption?
ISATAP
GRE over iPsec
iPsec over ISATAP
GRE
Refer to the exhibit.
Which outcome is expected when PC_A sends data to PC_B?
The switch rewrites the source and destination MAC addresses with its own.
The source MAC address is changed.
The source and destination MAC addresses remain the same.
The destination MAC address is replaced with ffff.ffff.ffff.
Question