ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

If a switch port receives a new frame while it is actively transmitting a previous frame, how does it process the frames?

A.

The new frame is delivered first, the previous frame is dropped, and a retransmission request is sent.

A.

The new frame is delivered first, the previous frame is dropped, and a retransmission request is sent.

Answers
B.

The previous frame is delivered, the new frame is dropped, and a retransmission request is sent.

B.

The previous frame is delivered, the new frame is dropped, and a retransmission request is sent.

Answers
C.

The new frame is placed in a queue for transmission after the previous frame.

C.

The new frame is placed in a queue for transmission after the previous frame.

Answers
D.

The two frames are processed and delivered at the same time.

D.

The two frames are processed and delivered at the same time.

Answers
Suggested answer: B

A wireless administrator has configured a WLAN; however, the clients need access to a less congested 5-GHz network for their voice quality. What action must be taken to meet the requirement?

A.

enable AAA override

A.

enable AAA override

Answers
B.

enable RX-SOP

B.

enable RX-SOP

Answers
C.

enable DTIM

C.

enable DTIM

Answers
D.

enable Band Select

D.

enable Band Select

Answers
Suggested answer: D

Refer to the exhibit.

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Refer to the exhibit.

A network engineer must block access for all computers on VLAN 20 to the web server via HTTP Allother computers must be able to access the web server Which configuration when applied to switchA accomplishes this task?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?

A.

WEP

A.

WEP

Answers
B.

RC4

B.

RC4

Answers
C.

AES

C.

AES

Answers
D.

TKIP

D.

TKIP

Answers
Suggested answer: C

Explanation:

Many routers provide WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) as options. TKIP is actually an older encryption protocol introduced with WPA to replace the very-insecure WEP encryption at the time. TKIP is actually quite similar to WEP encryption. TKIP is no longer considered secure, and is now deprecated. In other words, you shouldn't be using it.

AES is a more secure encryption protocol introduced with WPA2 and it is currently the strongest encryption type for WPA2-PSK.

Refer to the exhibit.

An engineer configured the New York router with state routes that point to the Atlanta and Washington sites. When command must be configured on the Atlanta and Washington routers so that both sites are able to reach the loopback2 interface on the New York router?

A.

ipv6 route ::/0 Serial 0/0/1

A.

ipv6 route ::/0 Serial 0/0/1

Answers
B.

ipv6 route 0/0 Serial 0/0/0

B.

ipv6 route 0/0 Serial 0/0/0

Answers
C.

ipv6 route ::/0 Serial 0/0/0

C.

ipv6 route ::/0 Serial 0/0/0

Answers
D.

ip route 0.0.0.0.0.0.0.0 Serial 0/0/0

D.

ip route 0.0.0.0.0.0.0.0 Serial 0/0/0

Answers
E.

ipv6 route ::/0 2000::2

E.

ipv6 route ::/0 2000::2

Answers
Suggested answer: C

Which unified access point mode continues to serve wireless clients after losing connectivity to the Cisco Wireless LAN Controller?

A.

sniffer

A.

sniffer

Answers
B.

mesh

B.

mesh

Answers
C.

flexconnect

C.

flexconnect

Answers
D.

local

D.

local

Answers
Suggested answer: C

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/configguide/b_cg85/flexconnect.html

What is a difference between RADIUS and TACACS+?

A.

RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication

A.

RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication

Answers
B.

TACACS+ encrypts only password information and RADIUS encrypts the entire payload

B.

TACACS+ encrypts only password information and RADIUS encrypts the entire payload

Answers
C.

TACACS+ separates authentication and authorization, and RADIUS merges them

C.

TACACS+ separates authentication and authorization, and RADIUS merges them

Answers
D.

RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands

D.

RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands

Answers
Suggested answer: C

What Is a syslog facility?

A.

Host that is configured for the system to send log messages

A.

Host that is configured for the system to send log messages

Answers
B.

password that authenticates a Network Management System to receive log messages

B.

password that authenticates a Network Management System to receive log messages

Answers
C.

group of log messages associated with the configured severity level

C.

group of log messages associated with the configured severity level

Answers
D.

set of values that represent the processes that can generate a log message

D.

set of values that represent the processes that can generate a log message

Answers
Suggested answer: C

Explanation:

Cisco Community – Difference between logging level and logging facility Post by ahmednaas "The logging facility command basically tells the syslog server where to put the log message. You configure the syslog server with something like:

local7.debug /var/adm/local7.log Now, when you use the "logging facility local7" on your device, all messages with severity "debug" or greater should be saved in /var/adm/local7.log." Example: on a switch, any process (CDP, SNMP, etc.) can generate a log message. On a syslog server, the logging facility is the place where all received messages with the same priority level are stored.

What are two characteristics of a public cloud Implementation? (Choose two.)

A.

It is owned and maintained by one party, but it is shared among multiple organizations.

A.

It is owned and maintained by one party, but it is shared among multiple organizations.

Answers
B.

It enables an organization to fully customize how It deploys network resources.

B.

It enables an organization to fully customize how It deploys network resources.

Answers
C.

It provides services that are accessed over the Internet.

C.

It provides services that are accessed over the Internet.

Answers
D.

It Is a data center on the public Internet that maintains cloud services for only one company.

D.

It Is a data center on the public Internet that maintains cloud services for only one company.

Answers
E.

It supports network resources from a centralized third-party provider and privately-owned virtual resources

E.

It supports network resources from a centralized third-party provider and privately-owned virtual resources

Answers
Suggested answer: C, E

Explanation:

Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third party, and hosted either internally or externally.

Most public-cloud providers offer direct-connection services that allow customers to securely link their legacy data centers to their cloud-resident applications.

Total 967 questions
Go to page: of 97