ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 82

Question list
Search
Search

When the LAG configuration is updated on a Cisco WLC which additional task must be performed when changes are complete?

A.

Flush all MAC addresses from the WLC

A.

Flush all MAC addresses from the WLC

Answers
B.

Re-associate the WLC with the access point.

B.

Re-associate the WLC with the access point.

Answers
C.

Re-enable the WLC interfaces

C.

Re-enable the WLC interfaces

Answers
D.

Reboot the WLC

D.

Reboot the WLC

Answers
Suggested answer: C

Refer to the exhibit.

The image server and client A are running an application that transfers an extremely high volume of data between the two. An engineer is configuring a dedicated circuit between R1 and R2. Which set of commands must the engineer apply to the routers so that only traffic between the image server and client A is forces to use the new circuit?

A.

R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.6

R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.5

A.

R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.6

R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.5

Answers
B.

R1(config)#ip route 10.10.13.10 255.255.255.128 10.10.10.6

R2(config)#lp route 192.168.0.100 255.255.255.0 10.10.10.5

B.

R1(config)#ip route 10.10.13.10 255.255.255.128 10.10.10.6

R2(config)#lp route 192.168.0.100 255.255.255.0 10.10.10.5

Answers
C.

R1(config)#ip route 10.10.13.10 255.255.255.252 10.10.10.6

R2(config)#tp route 192.168.0.100 255.255.255.252 10.10.10.5

C.

R1(config)#ip route 10.10.13.10 255.255.255.252 10.10.10.6

R2(config)#tp route 192.168.0.100 255.255.255.252 10.10.10.5

Answers
D.

R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.2

R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.1

D.

R1(config)#ip route 10.10.13.10 255.255.255.255 10.10.10.2

R2(config)#ip route 192.168.0.100 255.255.255.255 10.10.10.1

Answers
Suggested answer: D

What provides connection redundancy increased bandwidth and load sharing between a wireless LAN controller and a Layer 2 switch?

A.

VLAN trunking

A.

VLAN trunking

Answers
B.

tunneling

B.

tunneling

Answers
C.

first hop redundancy

C.

first hop redundancy

Answers
D.

link aggregation

D.

link aggregation

Answers
Suggested answer: D

By default, how long will the switch continue to know a workstation MAC address after the workstation stops sending traffic?

A.

200 seconds

A.

200 seconds

Answers
B.

300 seconds

B.

300 seconds

Answers
C.

600 seconds

C.

600 seconds

Answers
D.

900 seconds

D.

900 seconds

Answers
Suggested answer: B

Refer to the exhibit.

Clients on the WLAN are required to use 802.11r. What action must be taken to meet the requirement?

A.

Under Protected Management Frames, set the PMF option to Required.

A.

Under Protected Management Frames, set the PMF option to Required.

Answers
B.

Enable CCKM under Authentication Key Management.

B.

Enable CCKM under Authentication Key Management.

Answers
C.

Set the Fast Transition option and the WPA gtk-randomize State to disable.

C.

Set the Fast Transition option and the WPA gtk-randomize State to disable.

Answers
D.

Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management.

D.

Set the Fast Transition option to Enable and enable FT 802.1X under Authentication Key Management.

Answers
Suggested answer: D

Which Cisco proprietary protocol ensures traffic recovers immediately, transparently, and automatically when edge devices or access circuits fail?

A.

SLB

A.

SLB

Answers
B.

FHRP

B.

FHRP

Answers
C.

VRRP

C.

VRRP

Answers
D.

HSRP

D.

HSRP

Answers
Suggested answer: D

What is a link-local all-nodes IPv6 multicast address?

A.

ff02:0:0:0:0:0:0:1

A.

ff02:0:0:0:0:0:0:1

Answers
B.

2004:31c:73d9:683e:255::

B.

2004:31c:73d9:683e:255::

Answers
C.

fffe:034:0dd:45d6:789e::

C.

fffe:034:0dd:45d6:789e::

Answers
D.

fe80:4433:034:0dd::2

D.

fe80:4433:034:0dd::2

Answers
Suggested answer: D

What is a characteristic of RSA?

A.

It uses preshared keys for encryption

A.

It uses preshared keys for encryption

Answers
B.

It requires both sides to have identical keys

B.

It requires both sides to have identical keys

Answers
C.

It is a private-key encryption algorithm

C.

It is a private-key encryption algorithm

Answers
D.

It is a public-key cryptosystem

D.

It is a public-key cryptosystem

Answers
Suggested answer: D

What is used as a solution for protecting an individual network endpoint from attack?

A.

Router

A.

Router

Answers
B.

Wireless controller

B.

Wireless controller

Answers
C.

Anti software

C.

Anti software

Answers
D.

Cisco DNA Center

D.

Cisco DNA Center

Answers
Suggested answer: C

What is the advantage of separating the control plane from the data plane within an SDN network?

A.

decreases overall network complexity

A.

decreases overall network complexity

Answers
B.

limits data queries to the control plane

B.

limits data queries to the control plane

Answers
C.

reduces cost

C.

reduces cost

Answers
D.

offloads the creation of virtual machines to the data plane

D.

offloads the creation of virtual machines to the data plane

Answers
Suggested answer: A
Total 967 questions
Go to page: of 97