Cisco 200-301 Practice Test - Questions Answers, Page 21
Related questions
Which function is performed by the collapsed core layer in a two-tier architecture?
enforcing routing policies
marking interesting traffic for data polices
attaching users to the edge of the network
applying security policies
What are two functions of a server on a network? (Choose two)
achieves redundancy by exclusively using virtual server clustering
runs applications that send and retrieve data for workstations that make requests
handles requests from multiple workstations at the same time
runs the same operating system in order to communicate with other servers
housed solely in a data center that is dedicated to a single client
Which state does the switch port move to when PortFast is enabled?
forwarding
listening
blocking
learning
A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?
switchport port-security violation access
switchport port-security violation protect
switchport port-security violation restrict
switchport port-security violation shutdown
In software defined architectures, which plane is distributed and responsible for traffic forwarding?
management plane
control plane
policy plane
data plane
When using Rapid PVST+, which command guarantees the switch is always the root bridge for VLAN 200?
spanning -tree vlan 200 priority 614440
spanning -tree vlan 200 priority 38572422
spanning -tree vlan 200 priority 0
spanning -tree vlan 200 root primary
Refer to the exhibit.
After the election process what is the root bridge in the HQ LAN?
Switch 1
Switch 2
Switch 3
Switch 4
Which CRUD operation modifies an existing table or view?
read
create
replace
update
An engineer must configure Interswitch VLAN communication between a Cisco switch and a thirdparty switch. Which action should be taken?
configure IEEE 802.1p
configure IEEE 802.1q
configure ISL
configure DSCP
What is a function of a remote access VPN?
used cryptographic tunneling to protect the privacy of data for multiple users simultaneously
used exclusively when a user is connected to a company's internal network
establishes a secure tunnel between two branch sites
allows the users to access company internal network resources through a secure tunnel
Question