ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 48

Question list
Search
Search

Which function is performed by DHCP snooping?

A.

propagates VLAN information between switches

A.

propagates VLAN information between switches

Answers
B.

listens to multicast traffic for packet forwarding

B.

listens to multicast traffic for packet forwarding

Answers
C.

provides DDoS mitigation

C.

provides DDoS mitigation

Answers
D.

rate-limits certain traffic

D.

rate-limits certain traffic

Answers
Suggested answer: D

When a client and server are not on the same physical network, which device is used to forward requests and replies between client and server for DHCP?

A.

DHCP relay agent

A.

DHCP relay agent

Answers
B.

DHCP server

B.

DHCP server

Answers
C.

DHCPDISCOVER

C.

DHCPDISCOVER

Answers
D.

DHCPOFFER

D.

DHCPOFFER

Answers
Suggested answer: A

What is a similarly between 1000BASE-LX and 1000BASE-T standards?

A.

Both use the same data-link header and trailer formats

A.

Both use the same data-link header and trailer formats

Answers
B.

Both cable types support LP connectors

B.

Both cable types support LP connectors

Answers
C.

Both cable types support Rj-45 connectors

C.

Both cable types support Rj-45 connectors

Answers
D.

Both support up to 550 meters between nodes

D.

Both support up to 550 meters between nodes

Answers
Suggested answer: A

Explanation:

"In computer networking, Gigabit Ethernet (GbE or 1 GigE) is the term applied to transmitting Ethernet frames at a rate of a gigabit per second." Both standards use Ethernet framing (same headers and trailers)

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user's smartphone being lost or stolen?

A.

The application requires an administrator password to reactivate after a configured Interval.

A.

The application requires an administrator password to reactivate after a configured Interval.

Answers
B.

The application requires the user to enter a PIN before it provides the second factor.

B.

The application requires the user to enter a PIN before it provides the second factor.

Answers
C.

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

C.

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

Answers
D.

The application verifies that the user is in a specific location before it provides the second factor.

D.

The application verifies that the user is in a specific location before it provides the second factor.

Answers
Suggested answer: B

Which protocol requires authentication to transfer a backup configuration file from a router to a remote server?

A.

DTP

A.

DTP

Answers
B.

FTP

B.

FTP

Answers
C.

SMTP

C.

SMTP

Answers
D.

TFTP

D.

TFTP

Answers
Suggested answer: B

Refer to the exhibit.

Which two commands were used to create port channel 10? (Choose two )

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
E.

Option E

E.

Option E

Answers
Suggested answer: A, C

Refer to the exhibit.

What is the effect of this configuration?

A.

The switch port interface trust state becomes untrusted

A.

The switch port interface trust state becomes untrusted

Answers
B.

The switch port remains administratively down until the interface is connected to another switch

B.

The switch port remains administratively down until the interface is connected to another switch

Answers
C.

Dynamic ARP inspection is disabled because the ARP ACL is missing

C.

Dynamic ARP inspection is disabled because the ARP ACL is missing

Answers
D.

The switch port remains down until it is configured to trust or untrust incoming packets

D.

The switch port remains down until it is configured to trust or untrust incoming packets

Answers
Suggested answer: A

Explanation:

Dynamic ARP inspection (DAI) is a security feature that validates ARP packets in a network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from certain man-in- the-middle attacks. After enabling DAI, all ports become untrusted ports.


An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link.

Which command should be used?

A.

switchport trunk allowed vlan 10

A.

switchport trunk allowed vlan 10

Answers
B.

switchport trunk native vlan 10

B.

switchport trunk native vlan 10

Answers
C.

switchport mode trunk

C.

switchport mode trunk

Answers
D.

switchport trunk encapsulation dot1q

D.

switchport trunk encapsulation dot1q

Answers
Suggested answer: B

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface.

Which two misconfigurations cause this behavior? (Choose two)

A.

The packets fail to match any permit statement

A.

The packets fail to match any permit statement

Answers
B.

A matching permit statement is too high in the access test

B.

A matching permit statement is too high in the access test

Answers
C.

A matching permit statement is too broadly defined

C.

A matching permit statement is too broadly defined

Answers
D.

The ACL is empty

D.

The ACL is empty

Answers
E.

A matching deny statement is too high in the access list

E.

A matching deny statement is too high in the access list

Answers
Suggested answer: B, C

Why does a switch flood a frame to all ports?

A.

The frame has zero destination MAC addresses.

A.

The frame has zero destination MAC addresses.

Answers
B.

The source MAC address of the frame is unknown

B.

The source MAC address of the frame is unknown

Answers
C.

The source and destination MAC addresses of the frame are the same

C.

The source and destination MAC addresses of the frame are the same

Answers
D.

The destination MAC address of the frame is unknown.

D.

The destination MAC address of the frame is unknown.

Answers
Suggested answer: D
Total 967 questions
Go to page: of 97