Cisco 200-301 Practice Test - Questions Answers, Page 18

List of questions
Question 171

Refer to the exhibit.
If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1?
DHCP client
access point
router
PC
Question 172

What is the primary purpose of a First Hop Redundancy Protocol?
It allows directly connected neighbors to share configuration information.
It allows a router to use bridge priorities to create multiple loop-free paths to a single destination.
It reduces routing failures by allowing Layer 3 load balancing between OSPF neighbors that have the same link metric.
It reduces routing failures by allowing more than one router to represent itself, as the default gateway of a network.
Question 173

What occurs to frames during the process of frame flooding?
Frames are sent to every port on the switch in the same VLAN except from the originating port
Frames are sent to every port on the switch that has a matching entry in the MAC address table.
Frames are sent to all ports, including those that are assigned to other VLANs.
Frames are sent to every port on the switch in the same VLAN.
Question 174

Refer to the exhibit.
Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in
access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any line vty 0 15 ip access-group 100 in
Question 175

In which two ways does a password manager reduce the chance of a hacker stealing a users password? (Choose two.)
It automatically provides a second authentication factor that is unknown to the original user.
It uses an internal firewall to protect the password repository from unauthorized access.
It protects against keystroke logging on a compromised device or web site.
It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
It encourages users to create stronger passwords.
Question 176

Which technology is used to improve web traffic performance by proxy caching?
WSA
Firepower
ASA
FireSIGHT
Question 177

Which type of attack can be mitigated by dynamic ARP inspection?
worm
malware
DDoS
man-in-the-middle
Question 178

What are two roles of Domain Name Services (DNS)? (Choose Two)
builds a flat structure of DNS names for more efficient IP operations
encrypts network Traffic as it travels across a WAN by default
improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
enables applications to identify resources by name instead of IP address
allows a single host name to be shared across more than one IP address
Question 179

How do TCP and UDP differ in the way they guarantee packet delivery?
TCP uses checksum, acknowledgement, and retransmissions, and UDP uses checksums only.
TCP uses two-dimensional parity checks, checksums, and cyclic redundancy checks and UDP uses retransmissions only.
TCP uses checksum, parity checks, and retransmissions, and UDP uses acknowledgements only.
TCP uses retransmissions, acknowledgement and parity checks and UDP uses cyclic redundancy checks only.
Question 180

Refer to the exhibit.
What is the next hop address for traffic that is destined to host 10.0.1.5?
10.0.1.3
10.0.1.50
10.0.1.4
Loopback D
Question