ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 68

Question list
Search
Search

Refer to the exhibit.

An engineer must configure router R2 so it is elected as the DR on the WAN subnet. Which command sequence must be configured?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Refer to the exhibit.

What is represented by "R1" and "SW1" within the JSON output?

A.

key

A.

key

Answers
B.

array

B.

array

Answers
C.

value

C.

value

Answers
D.

object

D.

object

Answers
Suggested answer: C

Refer to the exhibit.

How many objects are present in the given JSON-encoded data?

A.

one

A.

one

Answers
B.

four

B.

four

Answers
C.

seven

C.

seven

Answers
D.

nine

D.

nine

Answers
Suggested answer: B

What are two examples of multifactor authentication? (Choose two.)

A.

single sign-on

A.

single sign-on

Answers
B.

unique user knowledge

B.

unique user knowledge

Answers
C.

passwords that expire

C.

passwords that expire

Answers
D.

soft tokens

D.

soft tokens

Answers
E.

shared password responsibility

E.

shared password responsibility

Answers
Suggested answer: B, D

Refer to the exhibit.

After configuring a new static route on the CPE. the engineer entered this series of commands to verify that the new configuration is operating normally When is the static default route installed into the routing table?

A.

when 203 0 113.1 is no longer reachable as a next hop

A.

when 203 0 113.1 is no longer reachable as a next hop

Answers
B.

when the default route learned over external BGP becomes invalid

B.

when the default route learned over external BGP becomes invalid

Answers
C.

when a route to 203.0 113 1 is learned via BGP

C.

when a route to 203.0 113 1 is learned via BGP

Answers
D.

when the default route over external BGP changes its next hop

D.

when the default route over external BGP changes its next hop

Answers
Suggested answer: A

How does encryption project the wireless network?

A.

via integrity checks to identify wireless forgery attacks in the frame

A.

via integrity checks to identify wireless forgery attacks in the frame

Answers
B.

via specific ciphers to detect and prevent zero-day network attacks

B.

via specific ciphers to detect and prevent zero-day network attacks

Answers
C.

via an algorithm to change wireless data so that only the access point and client understand it

C.

via an algorithm to change wireless data so that only the access point and client understand it

Answers
D.

via a policy to prevent unauthorized users from communicating on the wireless network

D.

via a policy to prevent unauthorized users from communicating on the wireless network

Answers
Suggested answer: C

Which action implements physical access control as part of the security program of an organization1?

A.

backing up syslogs at a remote location

A.

backing up syslogs at a remote location

Answers
B.

configuring a password for the console port

B.

configuring a password for the console port

Answers
C.

configuring enable passwords on network devices

C.

configuring enable passwords on network devices

Answers
D.

setting up IP cameras to monitor key infrastructure

D.

setting up IP cameras to monitor key infrastructure

Answers
Suggested answer: B

Why implement VRRP?

A.

to provide end users with a virtual gateway in a multivendor network

A.

to provide end users with a virtual gateway in a multivendor network

Answers
B.

to leverage a weighting scheme to provide uninterrupted service

B.

to leverage a weighting scheme to provide uninterrupted service

Answers
C.

to detect link failures without the overhead of Bidirectional Forwarding Detection

C.

to detect link failures without the overhead of Bidirectional Forwarding Detection

Answers
D.

to hand over to end users the autodiscovery of virtual gateways

D.

to hand over to end users the autodiscovery of virtual gateways

Answers
Suggested answer: A

A packet from a company s branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes: 172. 31.0 .0/16.72.31.0.0724. and 172.31 0 0/25. How does the router handle the packet?

A.

It sends the traffic via prefix 172.31.0.0/16

A.

It sends the traffic via prefix 172.31.0.0/16

Answers
B.

It sends the traffic via the default gateway 0.0.0.070.

B.

It sends the traffic via the default gateway 0.0.0.070.

Answers
C.

It sends the traffic via prefix 172.31.0.0/24

C.

It sends the traffic via prefix 172.31.0.0/24

Answers
D.

It sends the traffic via prefix 172.31.0.0/25

D.

It sends the traffic via prefix 172.31.0.0/25

Answers
Suggested answer: D

Refer to the exhibit.

An engineer must configure the interface that connects to PC 1 and secure it in a way that only PC1 is allowed to use the port No VLAN tagging can be used except for a voice VLAN. Which command sequence must be entered to configure the switch?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B
Total 967 questions
Go to page: of 97