Cisco 200-301 Practice Test - Questions Answers, Page 61
List of questions
Related questions
Refer to the exhibit.
An engineer has started to configure replacement switch SW1. To verify part of the configuration, the engineer issued the commands as shown and noticed that the entry for PC2 is missing. Which change must be applied to SW1 so that PC1 and PC2 communicate normally?
What is a zero-day exploit?
It is when a new network vulnerability is discovered before a fix is available
It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.
It is when the network is saturated with malicious traffic that overloads resources and bandwidth
It is when an attacker inserts malicious code into a SOL server.
A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)
crypto key generate rsa general-keys modulus 1024
transport input all
crypto key generate rsa usage-keys
crypto key generate rsa modulus 2048
transport Input ssh
Which QoS queuing method discards or marks packets that exceed the desired bit rate of traffic flow?
shaping
policing
CBWFQ
LLQ
What is the role of disaggregation in controller-based networking?
It divides the control-plane and data-plane functions.
It summarizes the routes between the core and distribution layers of the network topology.
It enables a network topology to quickly adjust from a ring network to a star network
It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions.
Refer to the exhibit.
What is the next hop for traffic entering R1 with a destination of 10.1.2 126?
10.165 20.126
10.165.20.146
10.165.20.166
10.165 20.226
Refer to the exhibit.
The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?
192.168.1.226
192.168.1.100
192.168.1.254
192.168.1.253
Why would VRRP be implemented when configuring a new subnet in a multivendor environment?
when a gateway protocol is required that support more than two Cisco devices for redundancy
to enable normal operations to continue after a member failure without requiring a change In a host ARP cache
to ensure that the spanning-tree forwarding path to the gateway is loop-free
to interoperate normally with all vendors and provide additional security features for Cisco devices
An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?
crypto key Import rsa pem
crypto key pubkey-chain rsa
crypto key generate rsa
crypto key zeroize rsa
An engineer is configuring SSH version 2 exclusively on the R1 router. What is the minimum configuration required to permit remote management using the cryptographic protocol?
Option A
Option B
Option C
Option D
Question