Cisco 200-301 Practice Test - Questions Answers, Page 82
List of questions
Related questions
When the LAG configuration is updated on a Cisco WLC which additional task must be performed when changes are complete?
Flush all MAC addresses from the WLC
Re-associate the WLC with the access point.
Re-enable the WLC interfaces
Reboot the WLC
Refer to the exhibit.
The image server and client A are running an application that transfers an extremely high volume of data between the two. An engineer is configuring a dedicated circuit between R1 and R2. Which set of commands must the engineer apply to the routers so that only traffic between the image server and client A is forces to use the new circuit?
R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.6
R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.5
R1(config)#ip route 10.10.13.10 255.255.255.128 10.10.10.6
R2(config)#lp route 192.168.0.100 255.255.255.0 10.10.10.5
R1(config)#ip route 10.10.13.10 255.255.255.252 10.10.10.6
R2(config)#tp route 192.168.0.100 255.255.255.252 10.10.10.5
R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.2
R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.1
What provides connection redundancy increased bandwidth and load sharing between a wireless LAN controller and a Layer 2 switch?
VLAN trunking
tunneling
first hop redundancy
link aggregation
By default, how long will the switch continue to know a workstation MAC address after the workstation stops sending traffic?
200 seconds
300 seconds
600 seconds
900 seconds
Refer to the exhibit.
Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?
Under Protected Management Frames, set the PMF option to Required.
Enable CCKM under Authentication Key Management.
Set the Fast Transition option and the WPA gtk-randomize State to disable.
Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management.
Which Cisco proprietary protocol ensures traffic recovers immediately, transparently, and automatically when edge devices or access circuits fail?
SLB
FHRP
VRRP
HSRP
What is a link-local all-nodes IPv6 multicast address?
ff02:0:0:0:0:0:0:1
2004:31c:73d9:683e:255::
fffe:034:0dd:45d6:789e::
fe80:4433:034:0dd::2
What is a characteristic of RSA?
It uses preshared keys for encryption
It requires both sides to have identical keys
It is a private-key encryption algorithm
It is a public-key cryptosystem
What is used as a solution for protecting an individual network endpoint from attack?
Router
Wireless controller
Anti software
Cisco DNA Center
What is the advantage of separating the control plane from the data plane within an SDN network?
decreases overall network complexity
limits data queries to the control plane
reduces cost
offloads the creation of virtual machines to the data plane
Question