ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 92

Question list
Search
Search

A wireless access point is needed and must meet these requirements:

* 'zero-touch' deployed and managed by a WLC

* process only real-time MAC functionality

* used in a split-MAC architecture. Which access point type must be used?

A.

autonomous

A.

autonomous

Answers
B.

lightweight

B.

lightweight

Answers
C.

mesh

C.

mesh

Answers
D.

cloud-based

D.

cloud-based

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/support/docs/wireless/aironet-1200-series/70278-lap-faq.html

What is used to identify spurious DHCP servers?

A.

DHCPREQUEST

A.

DHCPREQUEST

Answers
B.

DHCPDISCOVER

B.

DHCPDISCOVER

Answers
C.

DHCPACK

C.

DHCPACK

Answers
D.

DHCPOFFER

D.

DHCPOFFER

Answers
Suggested answer: D

Explanation:

DHCPOFFER is used to identify spurious DHCP servers. A spurious DHCP server is any device that is configured to act as a DHCP server without the network administrator's knowledge or permission. A spurious DHCP server can cause network problems by assigning incorrect or duplicate IP addresses to clients, or by redirecting traffic to malicious gateways.To prevent such attacks, the DHCP snooping feature can be enabled on switches to filter out invalid or unauthorized DHCP messages from untrusted sources1.

DHCP snooping works by intercepting and validating DHCP messages on a per-VLAN basis.The switch maintains a DHCP snooping binding database that contains information about the trusted hosts with leased IP addresses, such as MAC address, IP address, lease time, binding type, VLAN number, and interface information2. The switch also classifies its ports as trusted or untrusted. Trusted ports are those that connect to authorized DHCP servers or other trusted switches. Untrusted ports are those that connect to untrusted hosts or devices.The switch only allows DHCP messages from trusted ports, and drops any DHCP messages from untrusted ports that do not match the information in the binding database3.

The switch uses DHCPOFFER messages to identify spurious DHCP servers. A DHCPOFFER message is a response from a DHCP server to a client's request for an IP address.The message contains the offered IP address, subnet mask, default gateway, and other configuration parameters for the client4. When the switch receives a DHCPOFFER message from an untrusted port, it compares the source MAC address and the offered IP address with the binding database. If there is no match, the switch considers the message as coming from a spurious DHCP server and drops it.The switch also logs an error message and increments a counter for the number of dropped messages5.

1: Configuring DHCP Snooping - Cisco

2: Catalyst 6500 Release 12.2SX Software Configuration Guide - DHCP Snooping Binding Database

3: What is DHCP Snooping? - IONOS

4: Dynamic Host Configuration Protocol (DHCP) and Bootstrap Protocol (BOOTP) Parameters

5: Configuring DHCP Snooping - Cisco

What happens when a switch receives a frame with a destination MAC address that recently aged out?

A.

The switch references the MAC address aging table for historical addresses on the port that received the frame.

A.

The switch references the MAC address aging table for historical addresses on the port that received the frame.

Answers
B.

The switch floods the frame to all ports in all VLANs except the port that received the frame

B.

The switch floods the frame to all ports in all VLANs except the port that received the frame

Answers
C.

The switch drops the frame and learns the destination MAC address again from the port that received the frame

C.

The switch drops the frame and learns the destination MAC address again from the port that received the frame

Answers
D.

The switch floods the frame to all ports in the VLAN except the port that received the frame.

D.

The switch floods the frame to all ports in the VLAN except the port that received the frame.

Answers
Suggested answer: D

Refer to the exhibit.

IPv6 must be implemented on R1 to the ISP The uplink between R1 and the ISP must be configured with a manual assignment, and the LAN interface must be self-provisioned Both connections must use the applicable IPv6 networks Which two configurations must be applied to R1? (Choose two.)

A.

interface Gi0/1 ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA02:/127

A.

interface Gi0/1 ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA02:/127

Answers
B.

interface Gi0/0 ipv6 address 2001:db8:1:AFFF::/64 eui-64

B.

interface Gi0/0 ipv6 address 2001:db8:1:AFFF::/64 eui-64

Answers
C.

interface Gi0/1 ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA00:/127

C.

interface Gi0/1 ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA00:/127

Answers
D.

interface Gi0/0 ipv6 address 2001:db8:0:AFFF::/64 eui-64

D.

interface Gi0/0 ipv6 address 2001:db8:0:AFFF::/64 eui-64

Answers
E.

interface Gi0/0 ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA03;/127

E.

interface Gi0/0 ipv6 address 2001:db8:0F1B:FCCB:ACCE:FCED:ABCD:FA03;/127

Answers
Suggested answer: C, D

In which circumstance would a network architect decide to implement a global unicast subnet instead of a unique local unicast subnet?

A.

when the subnet must be available only within an organization

A.

when the subnet must be available only within an organization

Answers
B.

when the subnet does not need to be routable

B.

when the subnet does not need to be routable

Answers
C.

when the addresses on the subnet must be equivalent to private IPv4 addresses

C.

when the addresses on the subnet must be equivalent to private IPv4 addresses

Answers
D.

when the subnet must be routable over the internet

D.

when the subnet must be routable over the internet

Answers
Suggested answer: D

Which type of hypervisor operates without an underlying OS to host virtual machines?

A.

Type 1

A.

Type 1

Answers
B.

Type 2

B.

Type 2

Answers
C.

Type 3

C.

Type 3

Answers
D.

Type 12

D.

Type 12

Answers
Suggested answer: A

Refer to the exhibit.

What does the host do when using the IPv4 Preferred function?

A.

It continues to use a statically assigned IPv4 address

A.

It continues to use a statically assigned IPv4 address

Answers
B.

It forces the DNS server to provide the same IPv4 address at each renewal.

B.

It forces the DNS server to provide the same IPv4 address at each renewal.

Answers
C.

It requests the same IPv4 address when it renews its lease with the DHCP server.

C.

It requests the same IPv4 address when it renews its lease with the DHCP server.

Answers
D.

It prefers a pool of addresses when renewing the IPv4 host IP address

D.

It prefers a pool of addresses when renewing the IPv4 host IP address

Answers
Suggested answer: C

Which type of encryption does WPA1 use for data protection?

A.

AES

A.

AES

Answers
B.

TKIP

B.

TKIP

Answers
C.

PEAP

C.

PEAP

Answers
D.

EAP

D.

EAP

Answers
Suggested answer: B

Which two capabilities of Cisco DNA Center make it more extensible as compared to traditional campus device management? (Choose two.)

A.

REST APIs that allow for external applications to interact natively

A.

REST APIs that allow for external applications to interact natively

Answers
B.

adapters that support all families of Cisco IOS software

B.

adapters that support all families of Cisco IOS software

Answers
C.

SDKs that support interaction with third-party network equipment

C.

SDKs that support interaction with third-party network equipment

Answers
D.

customized versions for small, medium, and large enterprises

D.

customized versions for small, medium, and large enterprises

Answers
E.

modular design that is upgradable as needed

E.

modular design that is upgradable as needed

Answers
Suggested answer: A, C

Explanation:


Refer to the exhibit.

The SW1 and SW2 Gi0/0 ports have been preconfigured. An engineer is given these requirements:

* Allow all PCs to communicate with each other at Layer 3.

* Configure untagged traffic to use VLAN 5.

* Disable VLAN 1 from being used.

Which configuration set meets these requirements?

A.

SW1# interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 SW2# interface Gi0/1 switchport mode access switchport access vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 7,9,108

A.

SW1# interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 SW2# interface Gi0/1 switchport mode access switchport access vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 7,9,108

Answers
B.

SW1# interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5 interface Gi0/2 switchport mode access switchport trunk allowed vlan 7,9,108 SW2# interface Gi0/1 switchport mode access no switchport access vlan 1 switchport access vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 7,9,108 switchport trunk native vlan 5

B.

SW1# interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5 interface Gi0/2 switchport mode access switchport trunk allowed vlan 7,9,108 SW2# interface Gi0/1 switchport mode access no switchport access vlan 1 switchport access vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 7,9,108 switchport trunk native vlan 5

Answers
C.

SW#1 - interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 SW2# interface Gi0/1 switchport mode access switchport access vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5

C.

SW#1 - interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 SW2# interface Gi0/1 switchport mode access switchport access vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 5,7,9,108 switchport trunk native vlan 5

Answers
D.

SW1# interface Gi0/1 switchport mode trunk switchport trunk allowed vian 5,7,9,108 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 7,9,108 SW2# interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 5,7,9,108

D.

SW1# interface Gi0/1 switchport mode trunk switchport trunk allowed vian 5,7,9,108 interface Gi0/2 switchport mode trunk switchport trunk allowed vlan 7,9,108 SW2# interface Gi0/1 switchport mode trunk switchport trunk allowed vlan 7 interface Gi0/7 switchport mode trunk switchport trunk allowed vlan 5,7,9,108

Answers
Suggested answer: C
Total 967 questions
Go to page: of 97