ExamGecko
Home / Cisco / 200-301 / List of questions
Ask Question

Cisco 200-301 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

DRAG DROP

Drag and drop the SNMP components from the left onto the descriptions on the right.


Cisco 200-301 image Question 21 110397 10072024124422000
Correct answer: Cisco 200-301 image answer Question 21 110397 10072024124422000
asked 07/10/2024
Carlos Roberto
56 questions

Question 22

Report Export Collapse

DRAG DROP

Cisco 200-301 image Question 22 110398 10072024004422000000

Refer to the exhibit. An engineer is configuring the router to provide static NAT for the webserver. Drag and drop the configuration commands from the left onto the letters that correspond to its position in the configuration on the fight.


Cisco 200-301 image Question 22 110398 10072024124422000
Correct answer: Cisco 200-301 image answer Question 22 110398 10072024124422000
asked 07/10/2024
Jason Hicks
49 questions

Question 23

Report Export Collapse

DRAG DROP

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.


Cisco 200-301 image Question 23 110399 10072024124422000
Correct answer: Cisco 200-301 image answer Question 23 110399 10072024124422000
Explanation:

Double-Tagging attack:

Cisco 200-301 image Question 23 explanation 110399 10072024004422000000

In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the native VLAN of the trunk port (VLAN 10 in this case), and the second matches the VLAN of a host it wants to attack (VLAN 20).

When the packet from the attacker reaches Switch A, Switch A only sees the first VLAN 10 and it matches with its native VLAN 10 so this VLAN tag is removed. Switch A forwards the frame out all links with the same native VLAN 10.

Switch B receives the frame with an tag of VLAN 20 so it removes this tag and forwards out to the Victim computer.

Note: This attack only works if the trunk (between two switches) has the same native VLAN as the attacker.

To mitigate this type of attack, you can use VLAN access control lists (VACLs, which applies to all traffic within a VLAN. We can use VACL to drop attacker traffic to specific victims/servers) or implement Private VLANs.

ARP attack (like ARP poisoning/spoofing) is a type of attack in which a malicious actor sends falsified ARP messages over a local area network as ARP allows a gratuitous reply from a host even if an ARP request was not received. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. This is an attack based on ARP which is at Layer 2. Dynamic ARP inspection (DAI) is a security feature that validates

ARP packets in a network which can be used to mitigate this type of attack.

asked 07/10/2024
Michael Thornton
48 questions

Question 24

Report Export Collapse

DRAG DROP

Drag and drop the AAA functions from the left onto the correct AAA services on the right.


Cisco 200-301 image Question 24 110400 10072024124422000
Correct answer: Cisco 200-301 image answer Question 24 110400 10072024124422000
asked 07/10/2024
Nestor Quintero
43 questions

Question 25

Report Export Collapse

DRAG DROP

Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right.


Cisco 200-301 image Question 25 110401 10072024124422000
Correct answer: Cisco 200-301 image answer Question 25 110401 10072024124422000
asked 07/10/2024
Maria Gervasi
47 questions

Question 26

Report Export Collapse

DRAG DROP

Drag and drop the attack-mitigation techniques from the left onto the types of attack that they mitigate on the right.


Cisco 200-301 image Question 26 110402 10072024124422000
Correct answer: Cisco 200-301 image answer Question 26 110402 10072024124422000
asked 07/10/2024
law ryan
35 questions

Question 27

Report Export Collapse

DRAG DROP

An engineer is configuring an encrypted password for the enable command on a router where the local user database has already been configured. Drag and drop the configuration commands from the left into the correct sequence on the right. Not all commands are used.


Cisco 200-301 image Question 27 110403 10072024124422000
Correct answer: Cisco 200-301 image answer Question 27 110403 10072024124422000
asked 07/10/2024
Ola Magnus Sundlisæter
38 questions

Question 28

Report Export Collapse

DRAG DROP

An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts, multicasts, and broadcasts are unable to flood the port. The port must be configured to permit only two random MAC addresses at a time.

Drag and drop the required configuration commands from the left onto the sequence on the right. Not all commands are used.


Cisco 200-301 image Question 28 110404 10072024124422000
Correct answer: Cisco 200-301 image answer Question 28 110404 10072024124422000
Explanation:

https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3se/consolidated_guide/b_consolidated_3850_3se_cg_chapter_01000000.html

asked 07/10/2024
om Kumar
46 questions

Question 29

Report Export Collapse

DRAG DROP

Drag and drop the AAA features from the left onto the corresponding AAA security services on the right. Not all options are used.

Cisco 200-301 image Question 29 110405 10072024124422000
Correct answer: Cisco 200-301 image answer Question 29 110405 10072024124422000
asked 07/10/2024
Siphiwe Soldat
39 questions

Question 30

Report Export Collapse

DRAG DROP

Drag and drop the descriptions from the left onto the configuration-management technologies on the right.


Cisco 200-301 image Question 30 110406 10072024124422000
Correct answer: Cisco 200-301 image answer Question 30 110406 10072024124422000
asked 07/10/2024
Katherin Aragon Calderon
36 questions
Total 987 questions
Go to page: of 99
Search