ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 40

Question list
Search
Search

Refer to the exhibit.

Which route type is configured to reach the internet?

A.

host route

A.

host route

Answers
B.

default route

B.

default route

Answers
C.

floating static route

C.

floating static route

Answers
D.

network route

D.

network route

Answers
Suggested answer: B

An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?

A.

switch(config-line)#IIdp port-description

A.

switch(config-line)#IIdp port-description

Answers
B.

switch(config)#IIdp port-description

B.

switch(config)#IIdp port-description

Answers
C.

switch(config-if)#IIdp port-description

C.

switch(config-if)#IIdp port-description

Answers
D.

switch#IIdp port-description

D.

switch#IIdp port-description

Answers
Suggested answer: B

A user configured OSPF and advertised the Gigabit Ethernet interface in OSPF By default, which type of OSPF network does this interface belong to?

A.

point-to-multipoint

A.

point-to-multipoint

Answers
B.

point-to-point

B.

point-to-point

Answers
C.

broadcast

C.

broadcast

Answers
D.

nonbroadcast

D.

nonbroadcast

Answers
Suggested answer: C

Explanation:

https://www.oreilly.com/library/view/cisco-ios-cookbook/0596527225/ch08s15.htmlThe Broadcast network type is the default for an OSPF enabled ethernet interface (while PointtoPointis the default OSPF network type for Serial interface with HDLC and PPP encapsulation).

What benefit does controller-based networking provide versus traditional networking?

A.

moves from a two-tier to a three-tier network architecture to provide maximum redundancy

A.

moves from a two-tier to a three-tier network architecture to provide maximum redundancy

Answers
B.

provides an added layer of security to protect from DDoS attacks

B.

provides an added layer of security to protect from DDoS attacks

Answers
C.

allows configuration and monitoring of the network from one centralized port

C.

allows configuration and monitoring of the network from one centralized port

Answers
D.

combines control and data plane functionality on a single device to minimize latency

D.

combines control and data plane functionality on a single device to minimize latency

Answers
Suggested answer: C

What are two benefits of FHRPs? (Choose two.)

A.

They prevent (oops in the Layer 2 network.

A.

They prevent (oops in the Layer 2 network.

Answers
B.

They allow encrypted traffic.

B.

They allow encrypted traffic.

Answers
C.

They are able to bundle muftlple ports to increase bandwidth

C.

They are able to bundle muftlple ports to increase bandwidth

Answers
D.

They enable automatic failover of the default gateway.

D.

They enable automatic failover of the default gateway.

Answers
E.

They allow multiple devices lo serve as a single virtual gateway for clients in the network

E.

They allow multiple devices lo serve as a single virtual gateway for clients in the network

Answers
Suggested answer: D, E

Refer to the exhibit.

The entire contents of the MAC address table are shown. Sales-4 sends a data frame to Sales-1.

What does the switch do as it receives the frame from Sales-4?

A.

Perform a lookup in the MAC address table and discard the frame due to a missing entry.

A.

Perform a lookup in the MAC address table and discard the frame due to a missing entry.

Answers
B.

Insert the source MAC address and port into the forwarding table and forward the frame to Sales- 1.

B.

Insert the source MAC address and port into the forwarding table and forward the frame to Sales- 1.

Answers
C.

Map the Layer 2 MAC address to the Layer 3 IP address and forward the frame.

C.

Map the Layer 2 MAC address to the Layer 3 IP address and forward the frame.

Answers
D.

Flood the frame out of all ports except on the port where Sales-1 is connected.

D.

Flood the frame out of all ports except on the port where Sales-1 is connected.

Answers
Suggested answer: B

Explanation:

https://www.ciscopress.com/articles/article.asp?p=3089352&seqNum=6

How does CAPWAP communicate between an access point in local mode and a WLC?

A.

The access point must directly connect to the WLC using a copper cable

A.

The access point must directly connect to the WLC using a copper cable

Answers
B.

The access point must not be connected to the wired network, as it would create a loop

B.

The access point must not be connected to the wired network, as it would create a loop

Answers
C.

The access point must be connected to the same switch as the WLC

C.

The access point must be connected to the same switch as the WLC

Answers
D.

The access point has the ability to link to any switch in the network, assuming connectivity to the WLC

D.

The access point has the ability to link to any switch in the network, assuming connectivity to the WLC

Answers
Suggested answer: D

Where does wireless authentication happen?

A.

SSID

A.

SSID

Answers
B.

radio

B.

radio

Answers
C.

band

C.

band

Answers
D.

Layer 2

D.

Layer 2

Answers
Suggested answer: D

Refer to the exhibit. An engineer must add a subnet for a new office that will add 20 users to the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses?

A.

10.10.225.48 255.255.255.240

A.

10.10.225.48 255.255.255.240

Answers
B.

10.10.225.32 255.255.255.240

B.

10.10.225.32 255.255.255.240

Answers
C.

10.10.225.48 255.255.255.224

C.

10.10.225.48 255.255.255.224

Answers
D.

10.10.225.32 255.255.255.224

D.

10.10.225.32 255.255.255.224

Answers
Suggested answer: D

Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

A.

TKiP encryption

A.

TKiP encryption

Answers
B.

AES encryption

B.

AES encryption

Answers
C.

scrambled encryption key

C.

scrambled encryption key

Answers
D.

SAE encryption

D.

SAE encryption

Answers
Suggested answer: D
Total 967 questions
Go to page: of 97