ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 62

Question list
Search
Search

List of questions

Search

After a recent security breach and a RADIUS failure, an engineer must secure the console port of each enterprise router with a local username and password. Which configuration must the engineer apply to accomplish this task?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Which REST method updates an object in the Cisco DNA Center Intent API?

A.

CHANGE

A.

CHANGE

Answers
B.

UPDATE

B.

UPDATE

Answers
C.

POST

C.

POST

Answers
D.

PUT

D.

PUT

Answers
Suggested answer: D

Explanation:

PUT is most-often utilized for **update** capabilities, PUT-ing to a known resource URI with the request body containing the newly-updated representation of the original resource.

However, PUT can also be used to create a resource in the case where the resource ID is chosen by the client instead of by the server. In other words, if the PUT is to a URI that contains the value of a non-existent resource ID. Again, the request body contains a resource representation. Many feel this is convoluted and confusing. Consequently, this method of creation should be used sparingly, if at all.

Alternatively, use POST to create new resources and provide the client-defined ID in the body representation—presumably to a URI that doesn't include the ID of the resource (see POST below).

On successful update, return 200 (or 204 if not returning any content in the body) from a PUT. If using PUT for create, return HTTP status 201 on successful creation. A body in the response is optional—providing one consumes more bandwidth. It is not necessary to return a link via a Location header in the creation case since the client already set the resource ID.

PUT is not a safe operation, in that it modifies (or creates) state on the server, but it is idempotent. In other words, if you create or update a resource using PUT and then make that same call again, the resource is still there and still has the same state as it did with the first call.

If, for instance, calling PUT on a resource increments a counter within the resource, the call is no longer idempotent. Sometimes that happens and it may be enough to document that the call is not idempotent. However, it's recommended to keep PUT requests idempotent. It is strongly recommended to use POST for non-idempotent requests.

Examples:

https://www.restapitutorial.com/lessons/httpmethods.html

Which two practices are recommended for an acceptable security posture in a network? (Choose two)

A.

Backup device configurations to encrypted USB drives for secure retrieval

A.

Backup device configurations to encrypted USB drives for secure retrieval

Answers
B.

maintain network equipment in a secure location

B.

maintain network equipment in a secure location

Answers
C.

Use a cryptographic keychain to authenticate to network devices

C.

Use a cryptographic keychain to authenticate to network devices

Answers
D.

Place internal email and file servers in a designated DMZ

D.

Place internal email and file servers in a designated DMZ

Answers
E.

Disable unused or unnecessary ports, interfaces and services

E.

Disable unused or unnecessary ports, interfaces and services

Answers
Suggested answer: C, E

An administrator must use the password complexity not manufacturer-name command to prevent users from adding "cisco" as a password. Which command must be issued before this command?

A.

Password complexity enable

A.

Password complexity enable

Answers
B.

confreg 0x2142

B.

confreg 0x2142

Answers
C.

Login authentication my-auth-list

C.

Login authentication my-auth-list

Answers
D.

service password-encryption

D.

service password-encryption

Answers
Suggested answer: A

An engineer is configuring router R1 with an IPv6 static route for prefix 2019:C15C:0CAF:E001::/64.

The next hop must be 2019:C15C:0CAF:E002::1 The route must be reachable via the R1 Gigabit 0/0 interface. Which command configures the designated route?

A.

R1(config)#ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1

A.

R1(config)#ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1

Answers
B.

R1(config-if)#ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1

B.

R1(config-if)#ipv6 route 2019:C15C:0CAF:E001::/64 2019:C15C:0CAF:E002::1

Answers
C.

R1(config-if)#ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet0/0

C.

R1(config-if)#ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet0/0

Answers
D.

R1(config)#ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet0/0

D.

R1(config)#ip route 2019:C15C:0CAF:E001::/64 GigabitEthernet0/0

Answers
Suggested answer: C

Refer to the exhibit.

What must be configured to enable 802.11w on the WLAN?

A.

Set PMF to Required.

A.

Set PMF to Required.

Answers
B.

Enable MAC Filtering.

B.

Enable MAC Filtering.

Answers
C.

Enable WPA Policy.

C.

Enable WPA Policy.

Answers
D.

Set Fast Transition to Enabled

D.

Set Fast Transition to Enabled

Answers
Suggested answer: A

Refer to the exhibit.

A network engineer configures the Cisco WLC to authenticate local wireless clients against a RADIUS server Which task must be performed to complete the process?

A.

Change the Server Status to Disabled

A.

Change the Server Status to Disabled

Answers
B.

Select Enable next to Management

B.

Select Enable next to Management

Answers
C.

Select Enable next to Network User

C.

Select Enable next to Network User

Answers
D.

Change the Support for CoA to Enabled.

D.

Change the Support for CoA to Enabled.

Answers
Suggested answer: C

What is a function of Cisco Advanced Malware Protection for a Next-Generation IPS?

A.

authorizing potentially compromised wireless traffic

A.

authorizing potentially compromised wireless traffic

Answers
B.

inspecting specific files and file types for malware

B.

inspecting specific files and file types for malware

Answers
C.

authenticating end users

C.

authenticating end users

Answers
D.

URL filtering

D.

URL filtering

Answers
Suggested answer: B

Explanation:

AMP gives you real-time blocking of malware and advanced sandboxing, that is backed up by world class global threat intelligence, to provide rapid detection, containment and removal of advanced malware

https://www.cisco.com/c/en/us/products/security/amp-appliances/index.html

Refer to the exhibit.

How many JSON objects are represented?

A.

1

A.

1

Answers
B.

2

B.

2

Answers
C.

3

C.

3

Answers
D.

4

D.

4

Answers
Suggested answer: D

Refer to the exhibit.

Router R1 must be configured to reach the 10.0.3.0/24 network from the 10.0.1.0/24 segment.

Which command must be used to configure the route?

A.

ip route 10.0.3.0 0.255255.255 10.0.4.2

A.

ip route 10.0.3.0 0.255255.255 10.0.4.2

Answers
B.

route add 10.0.3.0 mask 255.255.255.0 10.0.4.3

B.

route add 10.0.3.0 mask 255.255.255.0 10.0.4.3

Answers
C.

Ip route 10.0.3.0 255.255.255.0 10.0.4.3

C.

Ip route 10.0.3.0 255.255.255.0 10.0.4.3

Answers
D.

route add 10.0.3.0 0.255.255.255 10.0.4.2

D.

route add 10.0.3.0 0.255.255.255 10.0.4.2

Answers
Suggested answer: C
Total 967 questions
Go to page: of 97