ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 79

Question list
Search
Search

List of questions

Search

What is the definition of backdoor malware?

A.

malicious code that is installed onto a computer to allow access by an unauthorized user

A.

malicious code that is installed onto a computer to allow access by an unauthorized user

Answers
B.

malicious code with the main purpose of downloading other malicious code

B.

malicious code with the main purpose of downloading other malicious code

Answers
C.

malicious program that is used to launch other malicious programs

C.

malicious program that is used to launch other malicious programs

Answers
D.

malicious code that infects a user machine and then uses that machine to send spam

D.

malicious code that infects a user machine and then uses that machine to send spam

Answers
Suggested answer: A

Refer to the exhibit.

The primary route across G0/0 is configured on both routers. A secondary route must be configured to establish connectivity between the workstation networks. Which command set must be configured to complete this task?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Refer to the exhibit.

Which two values does router R1 use to identify valid routes for the R3 loopback address 1.1.1.3/32?

(Choose two.)

A.

lowest cost to teach the next hop

A.

lowest cost to teach the next hop

Answers
B.

highest metric

B.

highest metric

Answers
C.

highest administrative distance

C.

highest administrative distance

Answers
D.

lowest metric

D.

lowest metric

Answers
E.

lowest administrative distance

E.

lowest administrative distance

Answers
Suggested answer: D, E

Refer to the exhibit.

An engineer is updating the management access configuration of switch SW1 to allow secured, encrypted remote configuration. Which two commands or command sequences must the engineer apply to the switch? (Choose two.)

A.

SW1(config)#enable secret ccnaTest123

A.

SW1(config)#enable secret ccnaTest123

Answers
B.

SW1(config)#username NEW secret R3mote123

B.

SW1(config)#username NEW secret R3mote123

Answers
C.

SW1(config)#line vty 0 15 SW1(config-line)#transport input ssh

C.

SW1(config)#line vty 0 15 SW1(config-line)#transport input ssh

Answers
D.

SW1(config)# crypto key generate rsa

D.

SW1(config)# crypto key generate rsa

Answers
E.

SW1(config)# interface f0/1 SW1(confif-if)# switchport mode trunk

E.

SW1(config)# interface f0/1 SW1(confif-if)# switchport mode trunk

Answers
Suggested answer: C, D

SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two.)

A.

Set the QoS level to silver or greater for voice traffic.

A.

Set the QoS level to silver or greater for voice traffic.

Answers
B.

Set the QoS level to platinum for voice traffic.

B.

Set the QoS level to platinum for voice traffic.

Answers
C.

Enable Media Session Snooping on re WLAN.

C.

Enable Media Session Snooping on re WLAN.

Answers
D.

Enable traffic shaping for the LAN interlace of the WLC.

D.

Enable traffic shaping for the LAN interlace of the WLC.

Answers
E.

Configure two different QoS rotes tor data and voice traffic.

E.

Configure two different QoS rotes tor data and voice traffic.

Answers
Suggested answer: D, E

What is a benefit of using private IPv4 addressing?

A.

Multiple companies can use the same addresses without conflicts.

A.

Multiple companies can use the same addresses without conflicts.

Answers
B.

Direct connectivity is provided to internal hosts from outside an enterprise network.

B.

Direct connectivity is provided to internal hosts from outside an enterprise network.

Answers
C.

Communication to the internet Is reachable without the use of NAT.

C.

Communication to the internet Is reachable without the use of NAT.

Answers
D.

All external hosts are provided with secure communication to the Internet.

D.

All external hosts are provided with secure communication to the Internet.

Answers
Suggested answer: A

Which cable type must be used to interconnect one switch using 1000 BASE-SX GBiC modules and another switch using 1000 BASE-SX SFP modules?

A.

LC to SC

A.

LC to SC

Answers
B.

SC t ST

B.

SC t ST

Answers
C.

SC to SC

C.

SC to SC

Answers
D.

LC to LC

D.

LC to LC

Answers
Suggested answer: D

Refer to the exhibit.

An engineer must configure a floating static route on an external EIGRP network. The destination subnet is the /29 on the LAN Interface of R86. Which command must be executed on R14?

A.

ip route 10.80.65.0.255.255.248.0.10.73.65.66.1

A.

ip route 10.80.65.0.255.255.248.0.10.73.65.66.1

Answers
B.

ip route 10.80.65.0.255.255.255..240 fa0/1 89

B.

ip route 10.80.65.0.255.255.255..240 fa0/1 89

Answers
C.

ip route 10.80.65.0.255.255.248.0.10.73.65.66.171

C.

ip route 10.80.65.0.255.255.248.0.10.73.65.66.171

Answers
D.

ip route 10.80.65.0.0.0.224.10.80.65.0. 255

D.

ip route 10.80.65.0.0.0.224.10.80.65.0. 255

Answers
Suggested answer: C

Which channel-group mode must be configured when multiple distribution interfaces connected to a WLC are bundled?

A.

Channel-group mode passive.

A.

Channel-group mode passive.

Answers
B.

Channel-group mode on.

B.

Channel-group mode on.

Answers
C.

Channel-group mode desirable.

C.

Channel-group mode desirable.

Answers
D.

Channel-group mode active.

D.

Channel-group mode active.

Answers
Suggested answer: B

Which two server types support dornas name to IP address resolution? (Choose two >

A.

ESX host

A.

ESX host

Answers
B.

resolver

B.

resolver

Answers
C.

web

C.

web

Answers
D.

file transfer

D.

file transfer

Answers
E.

authentication

E.

authentication

Answers
Suggested answer: A, C
Total 967 questions
Go to page: of 97