Cisco 200-301 Practice Test - Questions Answers, Page 66
List of questions
Related questions
Refer to the exhibit.
Refer to the exhibit Routers R1 and R2 have been configured with their respective LAN interfaces The two circuits are operational and reachable across WAN Which command set establishes failover redundancy if the primary circuit goes down?
Option A
Option B
Option C
Option D
Refer to the exhibit.
Refer to the exhibit Router R1 Fa0/0 is unable to ping router R3 Fa0'1. Which action must be taken in router R1 to help resolve the configuration issue?
set the default network as 20.20.20.0/24
set the default gateway as 20.20.20.2
configure a static route with Fa0/1 as the egress interface to reach the 20.20.20.0/24 network
configure a static route with 10.10.10.2 as the next hop to reach the 20.20.20.0/24 network
Refer to the exhibit.
When router R1 is sending traffic to IP address 10.56.192 1, which interface or next hop address does it use to route the packet?
0.0.0.0.0/0
10.56.0.1
10.56.128.19
Vlan57
What is the difference between 1000BASE-LX/LH and 1000BASE-ZX interfaces?
1000BASE-ZX is supported on links up to 1000km, and 1000BASE-LX/LH operates over links up to 70 km.
1000BASE-LX/LH interoperates with multimode and single-mode fiber, and 10008ASE-ZX needs a conditioning patch cable with a multimode.
1000BASE-LX/LH is supported on links up to 10km, and 1000BASE-ZX operates over links up to 70 km
1000BASE-ZX interoperates with dual-rate 100M/1G 10Km SFP over multimode fiber, and 1000BASE-LX/LH supports only single-rate.
What is a benefit for external users who consume public cloud resources?
implemented over a dedicated WAN
located in the same data center as the users
all hosted on physical servers
accessed over the Internet
Refer to the exhibit.
Which prefix did router R1 learn from internal EIGRP?
192.168.10/24
192.168.3.0/24
192.168.2.0/24
172.16 1.0/24
An engineer is configuring switch SW1 to act an NTP server when all upstream NTP server connectivity fails. Which configuration must be used?
How does authentication differ from authorization?
Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.
Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access
Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network
Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.
When should an engineer implement a collapsed-core architecture?
for small networks with minimal need for growth
the access and distribution layers must be on the same device
for large networks that are connected to multiple remote sites
only when using VSS technology
Refer to the exhibit.
An OSPF neighbor relationship must be configured using these guidelines:
• R1 is only permitted to establish a neighbor with R2
• R1 will never participate in DR elections
• R1 will use a router-id of 101.1.1.
Which configuration must be used?
Question