ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 41

Question list
Search
Search

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?

A.

It allows the traffic to pass through unchanged

A.

It allows the traffic to pass through unchanged

Answers
B.

It drops the traffic

B.

It drops the traffic

Answers
C.

It tags the traffic with the default VLAN

C.

It tags the traffic with the default VLAN

Answers
D.

It tags the traffic with the native VLAN

D.

It tags the traffic with the native VLAN

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/vlan/configuration_guide/b_vlan_152ex_2960-x_cg/b_vlan_152ex_2960-x_cg_chapter_0110.pdfUntagged traffic from the device attached to the Cisco

IP Phone passes through the phoneunchanged, regardless of the trust state of the access port on the phone.

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?

A.

To pass client traffic two or more ports must be configured.

A.

To pass client traffic two or more ports must be configured.

Answers
B.

The EtherChannel must be configured in "mode active"

B.

The EtherChannel must be configured in "mode active"

Answers
C.

When enabled the WLC bandwidth drops to 500 Mbps

C.

When enabled the WLC bandwidth drops to 500 Mbps

Answers
D.

One functional physical port is needed to pass client traffic

D.

One functional physical port is needed to pass client traffic

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-2/configguide/b_cg82/b_cg82_chapter_010101011.html

Which set of action satisfy the requirement for multifactor authentication?

A.

The user swipes a key fob, then clicks through an email link

A.

The user swipes a key fob, then clicks through an email link

Answers
B.

The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device

B.

The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device

Answers
C.

The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen

C.

The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login screen

Answers
D.

The user enters a user name and password and then re-enters the credentials on a second screen

D.

The user enters a user name and password and then re-enters the credentials on a second screen

Answers
Suggested answer: B

Explanation:

This is an example of how two-factor authentication (2FA) works:

1. The user logs in to the website or service with their username and password.

2. The password is validated by an authentication server and, if correct, the user becomes eligible for the second factor.

3. The authentication server sends a unique code to the user's second-factor method (such as a smartphone app).

4. The user confirms their identity by providing the additional authentication for their second-factor method.

Refer to Exhibit.

Which configuration must be applied to the router that configures PAT to translate all addresses in VLAN 200 while allowing devices on VLAN 100 to use their own IP addresses?

A.

Router1(config)#access-list 99 permit 192.168.100.32 0.0.0.31

Router1(config)#ip nat inside source list 99 interface gi1/0/0 overload

Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

A.

Router1(config)#access-list 99 permit 192.168.100.32 0.0.0.31

Router1(config)#ip nat inside source list 99 interface gi1/0/0 overload

Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

Answers
B.

Router1(config)#access-list 99 permit 192.168.100.0 0.0.0.255

Router1(config)#ip nat inside source list 99 interface gi1/0/0 overload

Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

B.

Router1(config)#access-list 99 permit 192.168.100.0 0.0.0.255

Router1(config)#ip nat inside source list 99 interface gi1/0/0 overload

Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

Answers
C.

Router1(config)#access-list 99 permit 209.165.201.2 255.255.255.255Router1(config)#ip nat inside source list 99 interface gi1/0/0

overload Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

C.

Router1(config)#access-list 99 permit 209.165.201.2 255.255.255.255Router1(config)#ip nat inside source list 99 interface gi1/0/0

overload Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

Answers
D.

Router1(config)#access- list 99 permit 209.165.201.2 0.0.0.0

Router1(config)#ip nat inside source list 99 interface gi1/0/0 overload

Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

D.

Router1(config)#access- list 99 permit 209.165.201.2 0.0.0.0

Router1(config)#ip nat inside source list 99 interface gi1/0/0 overload

Router1(config)#interface gi2/0/1.200

Router1(config)#ip nat inside

Router1(config)#interface gi1/0/0

Router1(config)#ip nat outside

Answers
Suggested answer: A

Which two outcomes are predictable behaviors for HSRP? (Choose two)

A.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.

A.

The two routers share a virtual IP address that is used as the default gateway for devices on the LAN.

Answers
B.

The two routers negotiate one router as the active router and the other as the standby router

B.

The two routers negotiate one router as the active router and the other as the standby router

Answers
C.

Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.

C.

Each router has a different IP address both routers act as the default gateway on the LAN, and traffic is load balanced between them.

Answers
D.

The two routers synchronize configurations to provide consistent packet forwarding

D.

The two routers synchronize configurations to provide consistent packet forwarding

Answers
E.

The two routed share the same IP address, and default gateway traffic is load-balanced between them

E.

The two routed share the same IP address, and default gateway traffic is load-balanced between them

Answers
Suggested answer: A, B

How do traditional campus device management and Cisco DNA Center device management differ in regards to deployment?

A.

Cisco DNA Center device management can deploy a network more quickly than traditional campus device management

A.

Cisco DNA Center device management can deploy a network more quickly than traditional campus device management

Answers
B.

Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management

B.

Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management

Answers
C.

Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options

C.

Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options

Answers
D.

Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

D.

Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

Answers
Suggested answer: A

A corporate office uses four floors in a building

• Floor 1 has 24 users

• Floor 2 has 29 users

• Floor 3 has 28 users

•Floor 4 has 22 users

Which subnet summarizes and gives the most efficient distribution of IP addresses for the router configuration?

A.

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

A.

192.168.0.0/26 as summary and 192.168.0.0/29 for each floor

Answers
B.

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

B.

192.168.0.0.24 as summary and 192.168.0.0/28 for each floor

Answers
C.

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

C.

192.168.0.0/23 as summary and 192.168.0.0/25 for each floor

Answers
D.

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

D.

l92.168.0.0/25 as summary and 192.168.0.0/27 for each floor

Answers
Suggested answer: D

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

A.

Exchange

A.

Exchange

Answers
B.

2-way

B.

2-way

Answers
C.

Full

C.

Full

Answers
D.

Init

D.

Init

Answers
Suggested answer: C

What are two reasons for an engineer to configure a floating state route? (Choose two)

A.

to automatically route traffic on a secondary path when the primary path goes down

A.

to automatically route traffic on a secondary path when the primary path goes down

Answers
B.

to route traffic differently based on the source IP of the packet

B.

to route traffic differently based on the source IP of the packet

Answers
C.

to enable fallback static routing when the dynamic routing protocol fails

C.

to enable fallback static routing when the dynamic routing protocol fails

Answers
D.

to support load balancing via static routing

D.

to support load balancing via static routing

Answers
E.

to control the return path of traffic that is sent from the router

E.

to control the return path of traffic that is sent from the router

Answers
Suggested answer: A, C

The service password-encryption command is entered on a router. What is the effect of this configuration?

A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

Answers
B.

encrypts the password exchange when a VPN tunnel is established

B.

encrypts the password exchange when a VPN tunnel is established

Answers
C.

prevents network administrators from configuring clear-text passwords

C.

prevents network administrators from configuring clear-text passwords

Answers
D.

protects the VLAN database from unauthorized PC connections on the switch

D.

protects the VLAN database from unauthorized PC connections on the switch

Answers
Suggested answer: A
Total 967 questions
Go to page: of 97