ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 85

Question list
Search
Search

How do UTP and STP cables compare?

A.

STP cables are cheaper to procure and easier to install and UTP cables are more expensive and harder to install.

A.

STP cables are cheaper to procure and easier to install and UTP cables are more expensive and harder to install.

Answers
B.

UTP cables are less prone to crosstalk and interference and STP cables are more prone to crosstalk and interference.

B.

UTP cables are less prone to crosstalk and interference and STP cables are more prone to crosstalk and interference.

Answers
C.

UTP cables provide taster and more reliable data transfer rates and STP cables are slower and less reliable.

C.

UTP cables provide taster and more reliable data transfer rates and STP cables are slower and less reliable.

Answers
D.

STP cables are shielded and protect against electromagnetic interference and UTP lacks the same protection against electromagnetic interference.

D.

STP cables are shielded and protect against electromagnetic interference and UTP lacks the same protection against electromagnetic interference.

Answers
Suggested answer: D

How does MAC learning function on a switch?

A.

broadcasts frames to all ports without queueing

A.

broadcasts frames to all ports without queueing

Answers
B.

adds unknown source MAC addresses to the address table

B.

adds unknown source MAC addresses to the address table

Answers
C.

sends a retransmission request when a new frame is received

C.

sends a retransmission request when a new frame is received

Answers
D.

sends frames with unknown destinations to a multicast group

D.

sends frames with unknown destinations to a multicast group

Answers
Suggested answer: B

What are two advantages of implementing a controller-based architecture instead of a traditional network architecture? (Choose two.)

A.

It allows for seamless connectivity to virtual machines.

A.

It allows for seamless connectivity to virtual machines.

Answers
B.

It supports complex and high-scale IP addressing schemes.

B.

It supports complex and high-scale IP addressing schemes.

Answers
C.

It enables configuration task automation.

C.

It enables configuration task automation.

Answers
D.

It provides increased scalability and management options.

D.

It provides increased scalability and management options.

Answers
E.

It increases security against denial-of-service attacks.

E.

It increases security against denial-of-service attacks.

Answers
Suggested answer: C, D

Refer to Exhibit.

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

What is an enhancement implemented in WPA3?

A.

employs PKI and RADIUS to identify access points

A.

employs PKI and RADIUS to identify access points

Answers
B.

applies 802.1x authentication and AES-128 encryption

B.

applies 802.1x authentication and AES-128 encryption

Answers
C.

uses TKIP and per-packet keying

C.

uses TKIP and per-packet keying

Answers
D.

defends against deauthentication and disassociation attacks

D.

defends against deauthentication and disassociation attacks

Answers
Suggested answer: D

Refer to the exhibit.

A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:

• accommodates current configured VLANs

• expands the range to include VLAN 20

• allows for IEEE standard support for virtual LANs

Which configuration on the NewSwitch side of the link meets these requirements?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

A client experiences slow throughput from a server that is directly connected to the core switch in a data center. A network engineer finds minimal latency on connections to the server, but data transfers are unreliable, and the output of the show Interfaces counters errors command shows a high FCS-Err count on the interface that is connected to the server. What is the cause of the throughput issue?

A.

high bandwidth usage

A.

high bandwidth usage

Answers
B.

a physical cable fault

B.

a physical cable fault

Answers
C.

a speed mismatch

C.

a speed mismatch

Answers
D.

a cable that is too long

D.

a cable that is too long

Answers
Suggested answer: B

What is the purpose of classifying network traffic in QoS?

A.

services traffic according to its class

A.

services traffic according to its class

Answers
B.

identifies the type of traffic that will receive a particular treatment

B.

identifies the type of traffic that will receive a particular treatment

Answers
C.

writes the class identifier of a packet to a dedicated field in the packet header

C.

writes the class identifier of a packet to a dedicated field in the packet header

Answers
D.

configures traffic-matching rules on network devices

D.

configures traffic-matching rules on network devices

Answers
Suggested answer: B

Which two HTTP methods are suitable for actions performed by REST-based APIs? (Choose two.)

A.

REMOVE

A.

REMOVE

Answers
B.

REDIRECT

B.

REDIRECT

Answers
C.

OPOST

C.

OPOST

Answers
D.

GET

D.

GET

Answers
E.

UPOP

E.

UPOP

Answers
Suggested answer: C, D

Refer to the exhibit.

PC A is communicating with another device at IP address 10.227.225.255. Through which router does router Y route the traffic?

A.

router A

A.

router A

Answers
B.

router B

B.

router B

Answers
C.

router C

C.

router C

Answers
D.

router D

D.

router D

Answers
Suggested answer: D
Total 967 questions
Go to page: of 97