ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 39

Question list
Search
Search

Which technology must be implemented to configure network device monitoring with the highest security?

A.

IP SLA

A.

IP SLA

Answers
B.

syslog

B.

syslog

Answers
C.

NetFlow

C.

NetFlow

Answers
D.

SNMPv3

D.

SNMPv3

Answers
Suggested answer: C

Refer to the exhibit.

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Which two actions influence the EIGRP route selection process? (Choose two)

A.

The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.

A.

The router calculates the reported distance by multiplying the delay on the exiting Interface by 256.

Answers
B.

The router calculates the best backup path to the destination route and assigns it as the feasible successor.

B.

The router calculates the best backup path to the destination route and assigns it as the feasible successor.

Answers
C.

The router calculates the feasible distance of all paths to the destination route

C.

The router calculates the feasible distance of all paths to the destination route

Answers
D.

The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link

D.

The advertised distance is calculated by a downstream neighbor to inform the local router of the bandwidth on the link

Answers
E.

The router must use the advertised distance as the metric for any given route

E.

The router must use the advertised distance as the metric for any given route

Answers
Suggested answer: B, C

Explanation:

The reported distance (or advertised distance) is the cost from the neighbor to the destination. It is calculated from the router advertising the route to the network. For example in the topology below, suppose router A & B are exchanging their routing tables for the first time. Router B says "Hey, the best metric (cost) from me to IOWA is 50 and the metric from you to IOWA is 90" and advertises it to router A.

Router A considers the first metric (50) as the Advertised distance. The second metric (90), which is from NEVADA to IOWA (through IDAHO), is called the Feasible distance.

The reported distance is calculated in the same way of calculating the metric. By default (K1 = 1, K2 = 0, K3 = 1, K4 = 0, K5 = 0), the metric is calculated as follows:

Which mode must be set for APs to communicate to a Wireless LAN Controller using the Control and Provisioning of Wireless Access Points (CAPWAP) protocol?

A.

bridge

A.

bridge

Answers
B.

route

B.

route

Answers
C.

autonomous

C.

autonomous

Answers
D.

lightweight

D.

lightweight

Answers
Suggested answer: D

Which configuration is needed to generate an RSA key for SSH on a router?

A.

Configure the version of SSH

A.

Configure the version of SSH

Answers
B.

Configure VTY access.

B.

Configure VTY access.

Answers
C.

Create a user with a password.

C.

Create a user with a password.

Answers
D.

Assign a DNS domain name

D.

Assign a DNS domain name

Answers
Suggested answer: D

What makes Cisco DNA Center different from traditional network management applications and their management of networks?

A.

It only supports auto-discovery of network elements in a greenfield deployment.

A.

It only supports auto-discovery of network elements in a greenfield deployment.

Answers
B.

It modular design allows someone to implement different versions to meet the specific needs of an organization

B.

It modular design allows someone to implement different versions to meet the specific needs of an organization

Answers
C.

IT abstracts policy from the actual device configuration

C.

IT abstracts policy from the actual device configuration

Answers
D.

It does not support high availability of management functions when operating in cluster mode

D.

It does not support high availability of management functions when operating in cluster mode

Answers
Suggested answer: C

Which two primary drivers support the need for network automation? (Choose two.)

A.

Eliminating training needs

A.

Eliminating training needs

Answers
B.

Increasing reliance on self-diagnostic and self-healing

B.

Increasing reliance on self-diagnostic and self-healing

Answers
C.

Policy-derived provisioning of resources

C.

Policy-derived provisioning of resources

Answers
D.

Providing a ship entry point for resource provisioning

D.

Providing a ship entry point for resource provisioning

Answers
E.

Reducing hardware footprint

E.

Reducing hardware footprint

Answers
Suggested answer: C, D

Using direct sequence spread spectrum, which three 2.4-GHz channels are used to limit collisions?

A.

1,6,11

A.

1,6,11

Answers
B.

1,5,10

B.

1,5,10

Answers
C.

1,2,3

C.

1,2,3

Answers
D.

5,6,7

D.

5,6,7

Answers
Suggested answer: A

Which port type supports the spanning-tree portfast command without additional configuration?

A.

access ports

A.

access ports

Answers
B.

Layer 3 main Interfaces

B.

Layer 3 main Interfaces

Answers
C.

Layer 3 suninterfaces

C.

Layer 3 suninterfaces

Answers
D.

trunk ports

D.

trunk ports

Answers
Suggested answer: A

Refer to the exhibit.

An administrator is tasked with configuring a voice VLAN. What is the expected outcome when a Cisco phone is connected to the GigabitEfriemet3/1/4 port on a switch?

A.

The phone and a workstation that is connected to the phone do not have VLAN connectivity

A.

The phone and a workstation that is connected to the phone do not have VLAN connectivity

Answers
B.

The phone and a workstation that is connected to the phone send and receive data in VLAN 50.

B.

The phone and a workstation that is connected to the phone send and receive data in VLAN 50.

Answers
C.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity

C.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone has no VLAN connectivity

Answers
D.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1

D.

The phone sends and receives data in VLAN 50, but a workstation connected to the phone sends and receives data in VLAN 1

Answers
Suggested answer: D
Total 967 questions
Go to page: of 97