ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 72

Question list
Search
Search

Which two protocols are used by an administrator for authentication and configuration on access points?

A.

Kerberos

A.

Kerberos

Answers
B.

802.1Q

B.

802.1Q

Answers
C.

802.1x

C.

802.1x

Answers
D.

TACACS+

D.

TACACS+

Answers
E.

RADIUS

E.

RADIUS

Answers
Suggested answer: D, E

What is a similarity OM3 and OM4 fiber optical cable?

A.

Both have a 62.5 micron core diameter.

A.

Both have a 62.5 micron core diameter.

Answers
B.

Both have a 50 micron core diameter.

B.

Both have a 50 micron core diameter.

Answers
C.

Both have a 100 micron core diameter.

C.

Both have a 100 micron core diameter.

Answers
D.

Both have a 9 micron core diameter.

D.

Both have a 9 micron core diameter.

Answers
Suggested answer: B

Why is TCP desired over UDP for application that require extensive error checking, such as HTTPS?

A.

UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet received.

A.

UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet received.

Answers
B.

UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.

B.

UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.

Answers
C.

UDP uses flow control mechanisms for the delivery of packets, and TCP uses congestion control for efficient packet delivery.

C.

UDP uses flow control mechanisms for the delivery of packets, and TCP uses congestion control for efficient packet delivery.

Answers
D.

UDP uses sequencing data tor packets to arrive in order, and TCP offers trie capability to receive packets in random order.

D.

UDP uses sequencing data tor packets to arrive in order, and TCP offers trie capability to receive packets in random order.

Answers
Suggested answer: A

Refer to the exhibit.

Which configuration for RTR-1 deniess SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

An engineer is configuring a switch port that is connected to a VoIP handset. Which command must the engineer configure to enable port security with a manually assigned MAC address of abod-bod on voice VLAN 4?

A.

switchport port-security mac-address abcd.abcd.abcd

A.

switchport port-security mac-address abcd.abcd.abcd

Answers
B.

switchport port-security mac-address abed.abed.abed vlan 4

B.

switchport port-security mac-address abed.abed.abed vlan 4

Answers
C.

switchport port-security mac-address sticky abcd.abcd.abcd vlan 4

C.

switchport port-security mac-address sticky abcd.abcd.abcd vlan 4

Answers
D.

switchport port-security mac-address abcd.abcd.abcd vlan voice

D.

switchport port-security mac-address abcd.abcd.abcd vlan voice

Answers
Suggested answer: A

Refer to the exhibit.

Which entry is the longest prefix match for host IP address 192.168.10.5?

A.

1

A.

1

Answers
B.

2

B.

2

Answers
C.

3

C.

3

Answers
D.

4

D.

4

Answers
Suggested answer: B

What is the function of northbound API?

A.

It upgrades software and restores files.

A.

It upgrades software and restores files.

Answers
B.

It relies on global provisioning and configuration.

B.

It relies on global provisioning and configuration.

Answers
C.

It supports distributed processing for configuration.

C.

It supports distributed processing for configuration.

Answers
D.

It provides a path between an SDN controller and network applications.

D.

It provides a path between an SDN controller and network applications.

Answers
Suggested answer: D

Which interface enables communication between a program on the controller and a program on the networking devices?

A.

northbound interface

A.

northbound interface

Answers
B.

software virtual interface

B.

software virtual interface

Answers
C.

southbound interface

C.

southbound interface

Answers
D.

tunnel Interface

D.

tunnel Interface

Answers
Suggested answer: B

Refer to the exhibit.

The loopback1 interface of the Atlanta router must reach the lookback3 interface of the Washington router.

A.

ipv6 route 2000::1/128 2012::2

A.

ipv6 route 2000::1/128 2012::2

Answers
B.

ipv6 route 2000::1/128 2012::1

B.

ipv6 route 2000::1/128 2012::1

Answers
C.

ipv6 route 2000:3 123 s0/0/0

C.

ipv6 route 2000:3 123 s0/0/0

Answers
D.

ipv6 route 2000::3/128 2023::3

D.

ipv6 route 2000::3/128 2023::3

Answers
E.

ipv6 route 2000::1/128 s0/0/1

E.

ipv6 route 2000::1/128 s0/0/1

Answers
Suggested answer: B, D

Refer to the exhibit.

Which action by the router when a packet is sourced from 10.10.10.2 and destined 10.10.10.16?

A.

It queues the packets waiting for the route to be learned.

A.

It queues the packets waiting for the route to be learned.

Answers
B.

It floods packets to all learned next hops.

B.

It floods packets to all learned next hops.

Answers
C.

It discards the packets.

C.

It discards the packets.

Answers
D.

It uses a route that is similar to the destination address.

D.

It uses a route that is similar to the destination address.

Answers
Suggested answer: D
Total 967 questions
Go to page: of 97