ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 24

Question list
Search
Search

Which two WAN architecture options help a business improve scalability and reliability for the network? (Choose two.)

A.

asynchronous routing

A.

asynchronous routing

Answers
B.

single-homed branches

B.

single-homed branches

Answers
C.

dual-homed branches

C.

dual-homed branches

Answers
D.

static routing

D.

static routing

Answers
E.

dynamic routing

E.

dynamic routing

Answers
Suggested answer: A, C

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?

A.

intrusion detection

A.

intrusion detection

Answers
B.

user awareness

B.

user awareness

Answers
C.

physical access control

C.

physical access control

Answers
D.

network authorization

D.

network authorization

Answers
Suggested answer: C

Which device controls the forwarding of authentication requests for users when connecting to the network using a lightweight access point?

A.

TACACS server

A.

TACACS server

Answers
B.

wireless access point

B.

wireless access point

Answers
C.

RADIUS server

C.

RADIUS server

Answers
D.

wireless LAN controller

D.

wireless LAN controller

Answers
Suggested answer: D

What is a benefit of VRRP?

A.

It provides traffic load balancing to destinations that are more than two hops from the source.

A.

It provides traffic load balancing to destinations that are more than two hops from the source.

Answers
B.

It provides the default gateway redundancy on a LAN using two or more routers.

B.

It provides the default gateway redundancy on a LAN using two or more routers.

Answers
C.

It allows neighbors to share routing table information between each other.

C.

It allows neighbors to share routing table information between each other.

Answers
D.

It prevents loops in a Layer 2 LAN by forwarding all traffic to a root bridge, which then makes the final forwarding decision.

D.

It prevents loops in a Layer 2 LAN by forwarding all traffic to a root bridge, which then makes the final forwarding decision.

Answers
Suggested answer: B

Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)

A.

listening

A.

listening

Answers
B.

blocking

B.

blocking

Answers
C.

forwarding

C.

forwarding

Answers
D.

learning

D.

learning

Answers
E.

speaking

E.

speaking

Answers
Suggested answer: C, D

Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?

A.

ARP

A.

ARP

Answers
B.

DHCP

B.

DHCP

Answers
C.

CDP

C.

CDP

Answers
D.

DNS

D.

DNS

Answers
Suggested answer: B

Explanation:

https://www.geeksforgeeks.org/how-dhcp-server-dynamically-assigns-ip-address-to-ahost/#:~:text=DHCP%20is%20an%20abbreviation%20for,subnet%20mask%20and%20gateway%20address.

Which CRUD operation corresponds to the HTTP GET method?

A.

read

A.

read

Answers
B.

update

B.

update

Answers
C.

create

C.

create

Answers
D.

delete

D.

delete

Answers
Suggested answer: A

Explanation:

GET: This method retrieves the information identified by the request URI. In the context of the RESTful web services, this method is used to retrieve resources. This is the method used for read operations (the R in CRUD).

https://hub.packtpub.com/crud-operations-rest/

In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?

A.

There is limited unique address space, and traffic on the new subnet will stay local within the organization.

A.

There is limited unique address space, and traffic on the new subnet will stay local within the organization.

Answers
B.

The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.

B.

The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.

Answers
C.

Traffic on the subnet must traverse a site-to-site VPN to an outside organization.

C.

Traffic on the subnet must traverse a site-to-site VPN to an outside organization.

Answers
D.

The ISP requires the new subnet to be advertised to the internet for web services.

D.

The ISP requires the new subnet to be advertised to the internet for web services.

Answers
Suggested answer: A

Refer to the exhibit.

An access list is required to permit traffic from any host on interface G0/0 and deny traffic from interface G/0/1. Which access list must be applied?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

What is the maximum bandwidth of a T1 point-to-point connection?

A.

1.544 Mbps

A.

1.544 Mbps

Answers
B.

2.048 Mbps

B.

2.048 Mbps

Answers
C.

34.368 Mbps

C.

34.368 Mbps

Answers
D.

43.7 Mbps

D.

43.7 Mbps

Answers
Suggested answer: A

Explanation:

https://www.bsimplify.com/what-is-point-to-pointt1/#:~:text=A%20Point%20to%20Point%20T1,data%20speeds%20(1.54Mbps).

Point to Point T1

A Point to Point T1 service is a private data connection securely connecting two or more locations with T1 data speeds (1.54Mbps).

Total 967 questions
Go to page: of 97