Cisco 200-301 Practice Test - Questions Answers, Page 57
List of questions
Related questions
Which field within the access-request packet is encrypted by RADIUS?
authorized services
authenticator
username
password
A network administrator is setting up a new IPv6 network using the 64-bit address 2001 0EB8 00C1 2200:0001 0000 0000 0331/64 To simplify the configuration the administrator has decided to compress the address Which IP address must the administrator configure?
ipv6 address 21:EB8:C1:2200:1::331/64
ipv6 address 2001:EB8:C1:22:1::331/64
ipv6 address 2001 :EB8:C 1:2200.1 ::331-64
ipv6 address 2001:EB8:C1:2200:1:0000:331/64
A network engineer is configuring a switch so that it is remotely reachable via SSH The engineer has already configured the host name on the router Which additional command must the engineer configure before entering the command to generate the RSA key?
password password
crypto key generate rsa modulus 1024
ip domain-name domain
ip ssh authentication-retries 2
Refer to the exhibit.
Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )
username CNAC secret R!41!4319115@
ip ssh version 2
line vty 0 4
crypto key generate rsa 1024
transport input ssh
A network engineer must configure two new subnets using the address block 10 70 128 0/19 to meet these requirements:
• The first subnet must support 24 hosts
• The second subnet must support 472 hosts
• Both subnets must use the longest subnet mask possible from the address block Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )
interface vlan 1234 ip address 10.70.159.1 255.255.254.0
interface vlan 1148 ip address 10.70.148.1 255.255.254.0
interface vlan 4722 ip address 10.70.133.17 255.255.255.192
interface vlan 3002 ip address 10.70.147.17 255.255.255.224
interface vlan 155 ip address 10.70.155.65 255.255.255.224
What is a function of Opportunistic Wireless Encryption in an environment?
offer compression
increase security by using a WEP connection
provide authentication
protect traffic on open networks
Refer to the exhibit.
Which two commands when used together create port channel 10? (Choose two.)
int range g0/0-1 channel-group 10 mode active
int range g0/0-1 chanm.l-group 10 mode desirable
int range g0/0-1 channel-group 10 mode passive
int range g0/0-1 channel-group 10 mode auto
int range g0/0-1 channel-group 10 mode on
Refer to the exhibit.
A static route must be configured on R14 to forward traffic for the 172 21 34 0/25 network that resides on R86 Which command must be used to fulfill the request?
ip route 172.21.34.0 255.255.255.192 10.73.65.65
ip route 172.21.34.0 255.255.255.0 10.73.65.65
ip route 172.21.34.0 255.255.128.0 10.73.65.64
ip route 172.21.34.0 255.255.255.128 10.73.65.66
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?
interface vlan 2000 ipv6 address ffc0:0000:aaaa::1234:2343/64
interface vlan 2000
Ipv6 address fc00:0000:aaaa:a15d:1234:2343:8aca/64
interface vlan 2000 ipv6 address fe80;0000:aaaa::1234:2343/64
interface vlan 2000 ipv6 address fd00::1234:2343/64
Refer to the exhibit.
Host A sent a data frame destined for host D
What does the switch do when it receives the frame from host A?
It drops the frame from the switch CAM table.
It floods the frame out of all ports except port Fa0/1.
It shuts down the port Fa0/1 and places it in err-disable mode.
It experiences a broadcast storm.
Question