ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 61

Question list
Search
Search

Refer to the exhibit.

An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

What is a zero-day exploit?

A.

It is when a new network vulnerability is discovered before a fix is available

A.

It is when a new network vulnerability is discovered before a fix is available

Answers
B.

It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.

B.

It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.

Answers
C.

It is when the network is saturated with malicious traffic that overloads resources and bandwidth

C.

It is when the network is saturated with malicious traffic that overloads resources and bandwidth

Answers
D.

It is when an attacker inserts malicious code into a SOL server.

D.

It is when an attacker inserts malicious code into a SOL server.

Answers
Suggested answer: A

Explanation:

https://www.kaspersky.com/resource-center/definitions/zero-day-exploit

A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)

A.

crypto key generate rsa general-keys modulus 1024

A.

crypto key generate rsa general-keys modulus 1024

Answers
B.

transport input all

B.

transport input all

Answers
C.

crypto key generate rsa usage-keys

C.

crypto key generate rsa usage-keys

Answers
D.

crypto key generate rsa modulus 2048

D.

crypto key generate rsa modulus 2048

Answers
E.

transport Input ssh

E.

transport Input ssh

Answers
Suggested answer: A, E

Which QoS queuing method discards or marks packets that exceed the desired bit rate of traffic flow?

A.

shaping

A.

shaping

Answers
B.

policing

B.

policing

Answers
C.

CBWFQ

C.

CBWFQ

Answers
D.

LLQ

D.

LLQ

Answers
Suggested answer: B

What is the role of disaggregation in controller-based networking?

A.

It divides the control-plane and data-plane functions.

A.

It divides the control-plane and data-plane functions.

Answers
B.

It summarizes the routes between the core and distribution layers of the network topology.

B.

It summarizes the routes between the core and distribution layers of the network topology.

Answers
C.

It enables a network topology to quickly adjust from a ring network to a star network

C.

It enables a network topology to quickly adjust from a ring network to a star network

Answers
D.

It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions.

D.

It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions.

Answers
Suggested answer: A

Refer to the exhibit.

What is the next hop for traffic entering R1 with a destination of 10.1.2 126?

A.

10.165 20.126

A.

10.165 20.126

Answers
B.

10.165.20.146

B.

10.165.20.146

Answers
C.

10.165.20.166

C.

10.165.20.166

Answers
D.

10.165 20.226

D.

10.165 20.226

Answers
Suggested answer: D

Refer to the exhibit.

The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?

A.

192.168.1.226

A.

192.168.1.226

Answers
B.

192.168.1.100

B.

192.168.1.100

Answers
C.

192.168.1.254

C.

192.168.1.254

Answers
D.

192.168.1.253

D.

192.168.1.253

Answers
Suggested answer: D

Why would VRRP be implemented when configuring a new subnet in a multivendor environment?

A.

when a gateway protocol is required that support more than two Cisco devices for redundancy

A.

when a gateway protocol is required that support more than two Cisco devices for redundancy

Answers
B.

to enable normal operations to continue after a member failure without requiring a change In a host ARP cache

B.

to enable normal operations to continue after a member failure without requiring a change In a host ARP cache

Answers
C.

to ensure that the spanning-tree forwarding path to the gateway is loop-free

C.

to ensure that the spanning-tree forwarding path to the gateway is loop-free

Answers
D.

to interoperate normally with all vendors and provide additional security features for Cisco devices

D.

to interoperate normally with all vendors and provide additional security features for Cisco devices

Answers
Suggested answer: A

An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?

A.

crypto key Import rsa pem

A.

crypto key Import rsa pem

Answers
B.

crypto key pubkey-chain rsa

B.

crypto key pubkey-chain rsa

Answers
C.

crypto key generate rsa

C.

crypto key generate rsa

Answers
D.

crypto key zeroize rsa

D.

crypto key zeroize rsa

Answers
Suggested answer: C

An engineer is configuring SSH version 2 exclusively on the R1 router. What is the minimum configuration required to permit remote management using the cryptographic protocol?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C
Total 967 questions
Go to page: of 97