ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 47

Question list
Search
Search

Which condition must be met before an NMS handles an SNMP trap from an agent?

A.

The NMS software must be loaded with the MIB associated with the trap.

A.

The NMS software must be loaded with the MIB associated with the trap.

Answers
B.

The NMS must be configured on the same router as the SNMP agent

B.

The NMS must be configured on the same router as the SNMP agent

Answers
C.

The NMS must receive a trap and an inform message from the SNMP agent within a configured interval

C.

The NMS must receive a trap and an inform message from the SNMP agent within a configured interval

Answers
D.

The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.

D.

The NMS must receive the same trap from two different SNMP agents to verify that it is reliable.

Answers
Suggested answer: A

Refer to the exhibit.

Router R1 Fa0/0 is unable ping router R3 Fa0/1.

Which action must be taken in router R1 to help resolve the configuration issue?

A.

set the default network as 20.20.20.0/24

A.

set the default network as 20.20.20.0/24

Answers
B.

set the default gateway as 20.20.20.2

B.

set the default gateway as 20.20.20.2

Answers
C.

configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network

C.

configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network

Answers
D.

configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network

D.

configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network

Answers
Suggested answer: D

How does a Cisco Unified Wireless network respond to Wi-Fi channel overlap?

A.

It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points

A.

It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points

Answers
B.

It allows the administrator to assign channels on a per-device or per-interface basis.

B.

It allows the administrator to assign channels on a per-device or per-interface basis.

Answers
C.

It segregates devices from different manufacturers onto different channels.

C.

It segregates devices from different manufacturers onto different channels.

Answers
D.

It analyzes client load and background noise and dynamically assigns a channel.

D.

It analyzes client load and background noise and dynamically assigns a channel.

Answers
Suggested answer: A

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

A.

IKEv2

A.

IKEv2

Answers
B.

IKEv1

B.

IKEv1

Answers
C.

IPsec

C.

IPsec

Answers
D.

MD5

D.

MD5

Answers
Suggested answer: C

Explanation:

A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. A site-to-site VPN means that two sites create a VPN tunnel by encrypting and sending data between two devices. One set of rules for creating a siteto-site VPN is defined by IPsec.

An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which configuration should be used?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

What is the primary function of a Layer 3 device?

A.

to analyze traffic and drop unauthorized traffic from the Internet

A.

to analyze traffic and drop unauthorized traffic from the Internet

Answers
B.

to transmit wireless traffic between hosts

B.

to transmit wireless traffic between hosts

Answers
C.

to pass traffic between different networks

C.

to pass traffic between different networks

Answers
D.

forward traffic within the same broadcast domain

D.

forward traffic within the same broadcast domain

Answers
Suggested answer: C

Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?

A.

20

A.

20

Answers
B.

90

B.

90

Answers
C.

110

C.

110

Answers
D.

115

D.

115

Answers
Suggested answer: B

Explanation:

The Administrative distance (AD) of EIGRP is 90 while the AD of OSPF is 110 so EIGRP route will be chosen to install into the routing table.

When the active router in an HSRP group fails, what router assumes the role and forwards packets?

A.

backup

A.

backup

Answers
B.

standby

B.

standby

Answers
C.

listening

C.

listening

Answers
D.

forwarding

D.

forwarding

Answers
Suggested answer: B

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two )

A.

Telnet

A.

Telnet

Answers
B.

SSH

B.

SSH

Answers
C.

HTTP

C.

HTTP

Answers
D.

HTTPS

D.

HTTPS

Answers
E.

TFTP

E.

TFTP

Answers
Suggested answer: A, C

Which action does the router take as rt forwards a packet through the network?

A.

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

A.

The router replaces the source and desinaoon labels wth the sending router uterface label as a source and the next hop router label as a desbnabon

Answers
B.

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

B.

The router encapsulates the source and destination IP addresses with the sending router P address as the source and the neighbor IP address as the destination

Answers
C.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

C.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

Answers
D.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

D.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmit transparently to the destination

Answers
Suggested answer: C
Total 967 questions
Go to page: of 97