ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 29

Question list
Search
Search

What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two.)

A.

serves as the network aggregation point

A.

serves as the network aggregation point

Answers
B.

provides a boundary between Layer 2 and Layer 3 communications

B.

provides a boundary between Layer 2 and Layer 3 communications

Answers
C.

designed to meet continuous, redundant uptime requirements

C.

designed to meet continuous, redundant uptime requirements

Answers
D.

is the backbone for the network topology

D.

is the backbone for the network topology

Answers
E.

physical connection point for a LAN printer

E.

physical connection point for a LAN printer

Answers
Suggested answer: B, C

What is the purpose of using First Hop Redundancy Protocol in a specific subnet?

A.

Filter traffic based on destination IP addressing

A.

Filter traffic based on destination IP addressing

Answers
B.

Sends the default route to the hosts on a network

B.

Sends the default route to the hosts on a network

Answers
C.

ensures a loop-free physical topology

C.

ensures a loop-free physical topology

Answers
D.

forwards multicast hello messages between routers

D.

forwards multicast hello messages between routers

Answers
Suggested answer: C

Which access layer threat-mitigation technique provides security based on identity?

A.

Dynamic ARP Inspection

A.

Dynamic ARP Inspection

Answers
B.

using a non-default native VLAN

B.

using a non-default native VLAN

Answers
C.

802.1x

C.

802.1x

Answers
D.

DHCP snooping

D.

DHCP snooping

Answers
Suggested answer: C

What must be considered when using 802.11a?

A.

It is compatible with 802.11b- and 802 11g-compliant wireless devices

A.

It is compatible with 802.11b- and 802 11g-compliant wireless devices

Answers
B.

It is used in place of 802 11b/g when many nonoverlapping channels are required

B.

It is used in place of 802 11b/g when many nonoverlapping channels are required

Answers
C.

It is susceptible to interference from 2 4 GHz devices such as microwave ovens.

C.

It is susceptible to interference from 2 4 GHz devices such as microwave ovens.

Answers
D.

It is chosen over 802 11b/g when a lower-cost solution is necessary

D.

It is chosen over 802 11b/g when a lower-cost solution is necessary

Answers
Suggested answer: B

When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original P packet?

A.

IPsec tunnel mode with AH

A.

IPsec tunnel mode with AH

Answers
B.

IPsec transport mode with AH

B.

IPsec transport mode with AH

Answers
C.

IPsec tunnel mode with ESP

C.

IPsec tunnel mode with ESP

Answers
D.

IPsec transport mode with ESP

D.

IPsec transport mode with ESP

Answers
Suggested answer: C

What does physical access control regulate?

A.

access to spec fie networks based on business function

A.

access to spec fie networks based on business function

Answers
B.

access to servers to prevent malicious activity

B.

access to servers to prevent malicious activity

Answers
C.

access :o computer networks and file systems

C.

access :o computer networks and file systems

Answers
D.

access to networking equipment and facilities

D.

access to networking equipment and facilities

Answers
Suggested answer: D

On workstations running Microsoft Windows, which protocol provides the default gateway for the device?

A.

DHCP

A.

DHCP

Answers
B.

STP

B.

STP

Answers
C.

SNMP

C.

SNMP

Answers
D.

DNS

D.

DNS

Answers
Suggested answer: A

How are VLAN hopping attacks mitigated?

A.

enable dynamic ARP inspection

A.

enable dynamic ARP inspection

Answers
B.

manually implement trunk ports and disable DTP

B.

manually implement trunk ports and disable DTP

Answers
C.

activate all ports and place in the default VLAN

C.

activate all ports and place in the default VLAN

Answers
D.

configure extended VLANs

D.

configure extended VLANs

Answers
Suggested answer: B

What is the role of a firewall in an enterprise network?

A.

Forwards packets based on stateless packet inspection

A.

Forwards packets based on stateless packet inspection

Answers
B.

Processes unauthorized packets and allows passage to less secure segments of the network

B.

Processes unauthorized packets and allows passage to less secure segments of the network

Answers
C.

determines which packets are allowed to cross from unsecured to secured networks

C.

determines which packets are allowed to cross from unsecured to secured networks

Answers
D.

explicitly denies all packets from entering an administrative domain

D.

explicitly denies all packets from entering an administrative domain

Answers
Suggested answer: C

What is a function of the Cisco DNA Center Overall Health Dashboard?

A.

It provides a summary of the top 10 global issues.

A.

It provides a summary of the top 10 global issues.

Answers
B.

It provides detailed activity logging for the 10 devices and users on the network.

B.

It provides detailed activity logging for the 10 devices and users on the network.

Answers
C.

It summarizes the operational status of each wireless devise on the network.

C.

It summarizes the operational status of each wireless devise on the network.

Answers
D.

It summarizes daily and weekly CPU usage for servers and workstations in the network.

D.

It summarizes daily and weekly CPU usage for servers and workstations in the network.

Answers
Suggested answer: A
Total 967 questions
Go to page: of 97