ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 22

Question list
Search
Search

What is a DHCP client?

A.

a workstation that requests a domain name associated with its IP address

A.

a workstation that requests a domain name associated with its IP address

Answers
B.

a host that is configured to request an IP address automatically

B.

a host that is configured to request an IP address automatically

Answers
C.

a server that dynamically assigns IP addresses to hosts.

C.

a server that dynamically assigns IP addresses to hosts.

Answers
D.

a router that statically assigns IP addresses to hosts.

D.

a router that statically assigns IP addresses to hosts.

Answers
Suggested answer: B

Which two functions are performed by the core layer in a three-tier architecture? (Choose two)

A.

Provide uninterrupted forwarding service.

A.

Provide uninterrupted forwarding service.

Answers
B.

Police traffic that is sent to the edge of the network.

B.

Police traffic that is sent to the edge of the network.

Answers
C.

Provide direct connectivity for end user devices.

C.

Provide direct connectivity for end user devices.

Answers
D.

Ensure timely data transfer between layers.

D.

Ensure timely data transfer between layers.

Answers
E.

Inspect packets for malicious activity.

E.

Inspect packets for malicious activity.

Answers
Suggested answer: A, D

Explanation:

Cisco is very clear about the purpose of this layer. Its only role is to forward traffic, the fastest it can.

Here you don’t apply any policy, as you must try to reduce the load of the core so it can focus on routing.

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/campover.html#wp708831

Refer to the exhibit.

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255

A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255

Answers
B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22

B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22

Answers
C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22

C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22

Answers
D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255

D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255

Answers
Suggested answer: D

Explanation:

Note : Already a statement is there in last to allow SSH Traffic for network 10.20.1.0 0.0.0.127, but Second statement says deny ip any 10.20.1.0 0.0.0.255, so how it will work once it is denied. So the right answer is remove the --- no access-list 2699 deny ip any 10.20.1.0 0.0.0.255.

What is a practice that protects a network from VLAN hopping attacks?

A.

Enable dynamic ARP inspection

A.

Enable dynamic ARP inspection

Answers
B.

Configure an ACL to prevent traffic from changing VLANs

B.

Configure an ACL to prevent traffic from changing VLANs

Answers
C.

Change native VLAN to an unused VLAN ID

C.

Change native VLAN to an unused VLAN ID

Answers
D.

Implement port security on internet-facing VLANs

D.

Implement port security on internet-facing VLANs

Answers
Suggested answer: C

Refer to the exhibit.

If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?

A.

It load-balances traffic out of Fa0/1 and Fa0/2.

A.

It load-balances traffic out of Fa0/1 and Fa0/2.

Answers
B.

It is unreachable and discards the traffic.

B.

It is unreachable and discards the traffic.

Answers
C.

It sends packets out of interface FaO/2.

C.

It sends packets out of interface FaO/2.

Answers
D.

It sends packets out of interface Fa0/1.

D.

It sends packets out of interface Fa0/1.

Answers
Suggested answer: B

What is the purpose of traffic shaping?

A.

to mitigate delays over slow links

A.

to mitigate delays over slow links

Answers
B.

to provide fair queuing for buffered flows

B.

to provide fair queuing for buffered flows

Answers
C.

to limit the bandwidth that a flow can use to

C.

to limit the bandwidth that a flow can use to

Answers
D.

be a marking mechanism that identifies different flows

D.

be a marking mechanism that identifies different flows

Answers
Suggested answer: B

Explanation:

Traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over increments of time.

Where does the configuration reside when a helper address Is configured lo support DHCP?

A.

on the router closest to the server

A.

on the router closest to the server

Answers
B.

on the router closest to the client

B.

on the router closest to the client

Answers
C.

on every router along the path

C.

on every router along the path

Answers
D.

on the switch trunk interface

D.

on the switch trunk interface

Answers
Suggested answer: B

What facilitates a Telnet connection between devices by entering the device name?

A.

SNMP

A.

SNMP

Answers
B.

DNS lookup

B.

DNS lookup

Answers
C.

syslog

C.

syslog

Answers
D.

NTP

D.

NTP

Answers
Suggested answer: B

When implementing a router as a DHCP server, which two features must be configured'? (Choose two)

A.

relay agent information

A.

relay agent information

Answers
B.

database agent

B.

database agent

Answers
C.

address pool

C.

address pool

Answers
D.

smart-relay

D.

smart-relay

Answers
E.

manual bindings

E.

manual bindings

Answers
Suggested answer: C, E

What is a role of wireless controllers in an enterprise network?

A.

centralize the management of access points in an enterprise network

A.

centralize the management of access points in an enterprise network

Answers
B.

support standalone or controller-based architectures

B.

support standalone or controller-based architectures

Answers
C.

serve as the first line of defense in an enterprise network

C.

serve as the first line of defense in an enterprise network

Answers
D.

provide secure user logins to devices on the network.

D.

provide secure user logins to devices on the network.

Answers
Suggested answer: A
Total 967 questions
Go to page: of 97