Cisco 200-301 Practice Test - Questions Answers, Page 79
List of questions
Related questions
What is the definition of backdoor malware?
malicious code that is installed onto a computer to allow access by an unauthorized user
malicious code with the main purpose of downloading other malicious code
malicious program that is used to launch other malicious programs
malicious code that infects a user machine and then uses that machine to send spam
Refer to the exhibit.
The primary route across G0/0 is configured on both routers. A secondary route must be configured to establish connectivity between the workstation networks. Which command set must be configured to complete this task?
Refer to the exhibit.
Which two values does router R1 use to identify valid routes for the R3 loopback address 1.1.1.3/32?
(Choose two.)
lowest cost to teach the next hop
highest metric
highest administrative distance
lowest metric
lowest administrative distance
Refer to the exhibit.
An engineer is updating the management access configuration of switch SW1 to allow secured, encrypted remote configuration. Which two commands or command sequences must the engineer apply to the switch? (Choose two.)
SW1(config)#enable secret ccnaTest123
SW1(config)#username NEW secret R3mote123
SW1(config)#line vty 0 15 SW1(config-line)#transport input ssh
SW1(config)# crypto key generate rsa
SW1(config)# interface f0/1 SW1(confif-if)# switchport mode trunk
SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two.)
Set the QoS level to silver or greater for voice traffic.
Set the QoS level to platinum for voice traffic.
Enable Media Session Snooping on re WLAN.
Enable traffic shaping for the LAN interlace of the WLC.
Configure two different QoS rotes tor data and voice traffic.
What is a benefit of using private IPv4 addressing?
Multiple companies can use the same addresses without conflicts.
Direct connectivity is provided to internal hosts from outside an enterprise network.
Communication to the internet Is reachable without the use of NAT.
All external hosts are provided with secure communication to the Internet.
Which cable type must be used to interconnect one switch using 1000 BASE-SX GBiC modules and another switch using 1000 BASE-SX SFP modules?
LC to SC
SC t ST
SC to SC
LC to LC
Refer to the exhibit.
An engineer must configure a floating static route on an external EIGRP network. The destination subnet is the /29 on the LAN Interface of R86. Which command must be executed on R14?
ip route 10.80.65.0.255.255.248.0.10.73.65.66.1
ip route 10.80.65.0.255.255.255..240 fa0/1 89
ip route 10.80.65.0.255.255.248.0.10.73.65.66.171
ip route 10.80.65.0.0.0.224.10.80.65.0. 255
Which channel-group mode must be configured when multiple distribution interfaces connected to a WLC are bundled?
Channel-group mode passive.
Channel-group mode on.
Channel-group mode desirable.
Channel-group mode active.
Which two server types support dornas name to IP address resolution? (Choose two >
ESX host
resolver
web
file transfer
authentication
Question