ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 91

Question list
Search
Search

Refer to the exhibit.

In which structure does the word 'warning' directly reside?

A.

array

A.

array

Answers
B.

object

B.

object

Answers
C.

Boolean

C.

Boolean

Answers
D.

string

D.

string

Answers
Suggested answer: A

Which components are contained within a virtual machine?

A.

physical resources, including the NIC, RAM, disk, and CPU

A.

physical resources, including the NIC, RAM, disk, and CPU

Answers
B.

configuration files backed by physical resources from the Hypervisor

B.

configuration files backed by physical resources from the Hypervisor

Answers
C.

applications running on the Hypervisor

C.

applications running on the Hypervisor

Answers
D.

processes running on the Hypervisor and a guest OS

D.

processes running on the Hypervisor and a guest OS

Answers
Suggested answer: B

Explanation:

A virtual machine is a software-based computer that runs on a physical host computer or a remote server. It has its own operating system, applications, and virtual hardware devices that are configured by the user. The virtual hardware devices are backed by the physical resources of the Hypervisor, which is a software layer that manages the virtual machines and allocates the CPU, memory, network, and storage resources to them. The configuration files of a virtual machine contain information such as the name, UUID, BIOS settings, hardware settings, and resource settings of the virtual machine.These files are stored on a datastore, which is a logical container for files and virtual disks12.

1: VMware vSphere 7.0 Documentation - Virtual Machine Configuration Files

2: Cisco CCNA Certification Guide - Chapter 10: Virtualization Fundamentals

Refer to the exhibit.

Packets are flowing from 192.168 10.1 to the destination at IP address 192.168.20 75. Which next hop will the router select for the packet?

A.

10.10101

A.

10.10101

Answers
B.

10.10.10.11

B.

10.10.10.11

Answers
C.

10.10.10.12

C.

10.10.10.12

Answers
D.

10.101014

D.

10.101014

Answers
Suggested answer: B

Explanation:

The router will select the next hop based on the longest prefix match in the routing table. The destination IP address 192.168.20.75 belongs to the network 192.168.0.0/19, which is a classless network created by subnetting the classful network 192.168.0.0/16. The routing table has two entries for the network 192.168.0.0/19, one with a metric of 219414 and another with a metric of 5.The router will choose the entry with the lower metric, which is 5, and forward the packet to the next hop 10.10.10.111.

Which interface IP address serves as the tunnel source for CAPWAP packets from the WLC to an AP?

A.

service

A.

service

Answers
B.

trunk

B.

trunk

Answers
C.

AP-manager

C.

AP-manager

Answers
D.

virtual AP connection

D.

virtual AP connection

Answers
Suggested answer: C

Explanation:

The AP-manager interface is used by the WLC to communicate with access points using CAPWAP packets2.The AP-manager interface has an IP address that serves as the tunnel source for CAPWAP packets from the WLC to an AP3.The service interface is used for out-of-band management of the WLC, such as Telnet and SSH4.The trunk interface is used to connect the WLC to a switch and carry multiple VLANs5.The virtual AP connection is not an interface, but a logical connection between an AP and a WLC that allows multiple SSIDs to be supported by a single AP6.

Which IPsec encryption mode is appropriate when the destination of a packet differs from the security termination point?

A.

tunnel

A.

tunnel

Answers
B.

transport

B.

transport

Answers
C.

aggressive

C.

aggressive

Answers
D.

main

D.

main

Answers
Suggested answer: B

Explanation:

IPsec encryption mode is the way IPsec secures the data packets that are sent over an IP network.There are two main modes of IPsec encryption: tunnel mode and transport mode1.Tunnel mode encrypts the entire IP packet, including the original header, and adds a new IP header with the source and destination addresses of the security gateways (routers, firewalls, or VPN servers) that perform the encryption and decryption2.Transport mode encrypts only the payload (data) of the IP packet, leaving the original header intact, and uses the original source and destination addresses of the endpoints that generate and consume the data3. Therefore, transport mode is appropriate when the destination of a packet differs from the security termination point, as it does not change the original IP header information. Tunnel mode is more suitable when the security termination point is also the destination of the packet, as it provides more protection for the original IP header information.

Refer to the exhibit.

Which per-hop QoS behavior is R1 applying to incoming packets?

A.

queuing

A.

queuing

Answers
B.

marking

B.

marking

Answers
C.

shaping

C.

shaping

Answers
D.

policing

D.

policing

Answers
Suggested answer: D

Explanation:

R1 is applying policing to incoming packets. Policing is a QoS mechanism that limits the rate of traffic flow by dropping or remarking packets that exceed the configured rate limit. In this case, R1 is applying policing to incoming packets on interface G0/0 and G0/1. The exhibit shows that R1 is configured to police traffic at a rate of AF31, AF21, and AF11. This means that R1 is limiting the rate of traffic flow for these three traffic classes .

: Cisco CCNA Certification Guide - Chapter 16: Quality of Service (QoS)

: Cisco IOS Quality of Service Solutions Configuration Guide - Configuring Class-Based Policing

What is the role of the root port in a switched network?

A.

It replaces the designated port when the designated port fails

A.

It replaces the designated port when the designated port fails

Answers
B.

It is the best path to the root from a nonroot switch.

B.

It is the best path to the root from a nonroot switch.

Answers
C.

It replaces the designated port when the root port fails.

C.

It replaces the designated port when the root port fails.

Answers
D.

It is administratively disabled until a failover occurs.

D.

It is administratively disabled until a failover occurs.

Answers
Suggested answer: B

Explanation:

The root port is the port on a nonroot switch that has the lowest cost to reach the root bridge in a switched network. The root bridge is the switch that is elected as the central point of the network by the spanning tree protocol (STP). The root port is responsible for forwarding traffic to the root bridge, and it is always in a forwarding state. The cost of a port is determined by the speed and bandwidth of the link, and the lower the cost, the better the path. If there are multiple paths to the root bridge with the same cost, the switch will choose the one with the lowest bridge ID as the tiebreaker. The root port does not replace or replace any designated port, which is the port that forwards traffic on a network segment.The root port is also not administratively disabled or enabled, but it is dynamically selected by STP1234.

1: Solved: STP: Root port vs. designated port - Cisco Community

2: Difference between Root Port and Designated Port - GeeksforGeeks

3: What is a Root Port - Snabay Networking

4: What is a Root Port - omnisecu.com

What is the temporary state that switch ports always enter immediately after the boot process when Rapid PVST+ is used?

A.

discarding

A.

discarding

Answers
B.

listening

B.

listening

Answers
C.

forwarding

C.

forwarding

Answers
D.

learning

D.

learning

Answers
Suggested answer: A

Explanation:

When Rapid PVST+ is used, switch ports always enter the blocking state immediately after the boot process 1. The blocking state is the first of the five possible port states in the Rapid PVST+ protocol. In this state, the port does not forward frames but listens to BPDUs to determine the location of the root bridge and the best path to reach it 12. After a port enters the blocking state, it transitions to the listening state and then to the learning state before finally entering the forwarding state. When Rapid PVST+ (Per-VLAN Spanning Tree Plus) is used, switch ports go through a specific state immediately after the boot process. This state is known as the 'discarding' state.

What does a switch search for in the CAM table when forwarding a frame?

A.

source MAC address and aging time

A.

source MAC address and aging time

Answers
B.

destination MAC address and flush time

B.

destination MAC address and flush time

Answers
C.

source MAC address and source port

C.

source MAC address and source port

Answers
D.

destination MAC address and destination port

D.

destination MAC address and destination port

Answers
Suggested answer: D

Explanation:

A switch searches for the destination MAC address and the destination port in the CAM table when forwarding a frame. The CAM table, or content addressable memory table, is a data structure that stores the MAC addresses of the devices connected to the switch ports and their associated VLANs. The switch uses the CAM table to make layer 2 forwarding decisions based on the destination MAC address of a frame. When a frame arrives at a switch port, the switch first learns the source MAC address and the source port of the frame and updates the CAM table accordingly. Then, the switch looks up the destination MAC address of the frame in the CAM table and finds the corresponding destination port. If there is a match, the switch forwards the frame out of that port only.If there is no match, the switch floods the frame out of all ports except the source port123.

1: Why is the CAM table in a switch called CAM table and not MAC table even though it holds MAC addresses?

2: ARP and CAM Table

3: The CAM Table or MAC address Table

What are two capabilities provided by VRRP within a LAN network? (Choose two.)

A.

dynamic routing updates

A.

dynamic routing updates

Answers
B.

bandwidth optimization

B.

bandwidth optimization

Answers
C.

granular QoS

C.

granular QoS

Answers
D.

load sharing

D.

load sharing

Answers
E.

redundancy

E.

redundancy

Answers
Suggested answer: A, C

Explanation:

Redundancy--- VRRP enables you to configure multiple routers as the default gateway router, which reduces the possibility of a single point of failure in a network.

Load Sharing---You can configure VRRP in such a way that traffic to and from LAN clients can be shared by multiple routers, thereby sharing the traffic load more equitably among available router

Total 967 questions
Go to page: of 97