ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 51

Question list
Search
Search

Which type of organization should use a collapsed-core architecture?

A.

large and requires a flexible, scalable network design

A.

large and requires a flexible, scalable network design

Answers
B.

large and must minimize downtime when hardware fails

B.

large and must minimize downtime when hardware fails

Answers
C.

small and needs to reduce networking costs currently

C.

small and needs to reduce networking costs currently

Answers
D.

small but is expected to grow dramatically in the near future

D.

small but is expected to grow dramatically in the near future

Answers
Suggested answer: C

Explanation:

A collapsed-core architecture is a limited investment for a small company, and may be efficient and productive for a limited time.

What is a capability of FTP in network management operations?

A.

encrypts data before sending between data resources

A.

encrypts data before sending between data resources

Answers
B.

devices are directly connected and use UDP to pass file information

B.

devices are directly connected and use UDP to pass file information

Answers
C.

uses separate control and data connections to move files between server and client

C.

uses separate control and data connections to move files between server and client

Answers
D.

offers proprietary support at the session layer when transferring data

D.

offers proprietary support at the session layer when transferring data

Answers
Suggested answer: C

Explanation:

The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server.

Refer to the exhibit.

For security reasons, automatic neighbor discovery must be disabled on the R5 GiO/1 interface.

These tasks must be completed:

• Disable all neighbor discovery methods on R5 interface GiO/1.

• Permit neighbor discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

What is a function of a Layer 3 switch?

A.

move frames between endpoints limited to IP addresses

A.

move frames between endpoints limited to IP addresses

Answers
B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

Answers
C.

forward Ethernet frames between VLANs using only MAC addresses

C.

forward Ethernet frames between VLANs using only MAC addresses

Answers
D.

flood broadcast traffic within a VLAN

D.

flood broadcast traffic within a VLAN

Answers
Suggested answer: A

Which type of API allows SDN controllers to dynamically make changes to the network?

A.

northbound API

A.

northbound API

Answers
B.

REST API

B.

REST API

Answers
C.

SOAP API

C.

SOAP API

Answers
D.

southbound API

D.

southbound API

Answers
Suggested answer: D

Explanation:

Cisco overview doc for SDN here:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/VMDC/SDN/SDN.html

Topic 3, Exam Pool Feb 2022

Refer to the exhibit.

Which next-hop IP address does Routed use for packets destined to host 10 10.13.158?

A.

10.10.10.5

A.

10.10.10.5

Answers
B.

10.10.11.2

B.

10.10.11.2

Answers
C.

10.10.12.2

C.

10.10.12.2

Answers
D.

10.10.10.9

D.

10.10.10.9

Answers
Suggested answer: A

A Cisco engineer must configure a single switch interface to meet these requirements • accept untagged frames and place them in VLAN 20 • accept tagged frames in VLAN 30 when CDP detects a Cisco IP phone Which command set must the engineer apply?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Refer to the exhibit.

An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0'1 interface for the router to assign a unique 64-brt IPv6 address to Itself?

A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64

A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64

Answers
B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64

B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64

Answers
C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64

C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64

Answers
D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64

D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64

Answers
Suggested answer: A

Which WLC management connection type is vulnerable to man-in-the-middle attacks?

A.

SSH

A.

SSH

Answers
B.

HTTPS

B.

HTTPS

Answers
C.

Telnet

C.

Telnet

Answers
D.

console

D.

console

Answers
Suggested answer: C

Which action is taken by the data plane within a network device?

A.

forwards traffic to the next hop

A.

forwards traffic to the next hop

Answers
B.

constructs a routing table based on a routing protocol

B.

constructs a routing table based on a routing protocol

Answers
C.

provides CLI access to the network device

C.

provides CLI access to the network device

Answers
D.

looks up an egress interface in the forwarding information base

D.

looks up an egress interface in the forwarding information base

Answers
Suggested answer: A
Total 967 questions
Go to page: of 97