ExamGecko
Home Home / Cisco / 200-301

Cisco 200-301 Practice Test - Questions Answers, Page 93

Question list
Search
Search

What should a network administrator consider when deciding to implement automation?

A.

Automated systems may have difficulty expanding network changes at scale.

A.

Automated systems may have difficulty expanding network changes at scale.

Answers
B.

Network automation typically is limited to the configuration and management of virtual devices within a network.

B.

Network automation typically is limited to the configuration and management of virtual devices within a network.

Answers
C.

Network automation typically increases enterprise management operating costs.

C.

Network automation typically increases enterprise management operating costs.

Answers
D.

Manual changes frequently lead to configuration errors and inconsistencies.

D.

Manual changes frequently lead to configuration errors and inconsistencies.

Answers
Suggested answer: D

Explanation:

When deciding to implement automation, a network administrator should consider the benefits and challenges associated with automation. Option D highlights one of the key reasons for implementing automation---manual changes often result in configuration errors and inconsistencies. Automating repetitive and error-prone tasks can help improve the accuracy and reliability of network configurations.

Which capability does TFTP provide?

A.

loads configuration files on systems without data storage devices

A.

loads configuration files on systems without data storage devices

Answers
B.

provides authentication for data communications over a private data network

B.

provides authentication for data communications over a private data network

Answers
C.

provides encryption mechanisms for file transfer across a WAN

C.

provides encryption mechanisms for file transfer across a WAN

Answers
D.

provides secure file access within the LAN

D.

provides secure file access within the LAN

Answers
Suggested answer: A

Explanation:

TFTP (Trivial File Transfer Protocol) is a simple file transfer protocol that is often used to transfer configuration files or firmware to network devices, such as routers or switches, during the boot process. TFTP is lightweight and lacks advanced features like authentication or encryption, making it suitable for basic file transfer operations in situations where security is not a primary concern. Therefore, option A accurately describes one of the primary capabilities of TFTP. It is commonly used to load configuration files onto systems, particularly those without extensive data storage devices, during the initialization or configuration process.

Refer to the exhibit.

Router R1 receives static routing updates from routers

A, B, C, and D The network engineer wants R1 to advertise static routes in OSPF area 1. Which nary address must be advertised in OSPF?

A.

10.1.40.0/25

A.

10.1.40.0/25

Answers
B.

10.1.40.0/24

B.

10.1.40.0/24

Answers
C.

10.1.40.0/23

C.

10.1.40.0/23

Answers
D.

10.1.41.0/25

D.

10.1.41.0/25

Answers
Suggested answer: C

A network architect is deciding whether to implement Cisco autonomous access points or lightweight access points. Which fact about firmware updates must the architect consider? Unlike lightweight access points, which require

A.

Unlike lightweight access points, which require redundant WLCs to support firmware upgrades, autonomous access points require only one WLC.

A.

Unlike lightweight access points, which require redundant WLCs to support firmware upgrades, autonomous access points require only one WLC.

Answers
B.

Unlike autonomous access points, lightweight access points store a complete copy of the current firmware for backup.

B.

Unlike autonomous access points, lightweight access points store a complete copy of the current firmware for backup.

Answers
C.

Unlike lightweight access points, autonomous access points can recover automatically from a corrupt firmware update.

C.

Unlike lightweight access points, autonomous access points can recover automatically from a corrupt firmware update.

Answers
D.

Unlike autonomous access points, lightweight access points require a WLC to implement remote firmware updates.

D.

Unlike autonomous access points, lightweight access points require a WLC to implement remote firmware updates.

Answers
Suggested answer: D

Refer to the exhibit.

What is the issue with the interface GigabitEthernet0/0/1?

A.

Port security

A.

Port security

Answers
B.

High throughput

B.

High throughput

Answers
C.

Cable disconnect

C.

Cable disconnect

Answers
D.

duplex mismatch

D.

duplex mismatch

Answers
Suggested answer: C

How does IPsec provide secure networking for applications within an organization?

A.

It takes advantage of FTP to secure file transfers between nodes on the network.

A.

It takes advantage of FTP to secure file transfers between nodes on the network.

Answers
B.

It provides GRE tunnels to transmit traffic securely between network nodes.

B.

It provides GRE tunnels to transmit traffic securely between network nodes.

Answers
C.

It enables sets of security associations between peers.

C.

It enables sets of security associations between peers.

Answers
D.

It leverages TFTP providing secure file transfers among peers on the network.

D.

It leverages TFTP providing secure file transfers among peers on the network.

Answers
Suggested answer: C

Explanation:

IPsec (Internet Protocol Security) is a protocol suite that provides secure communication over Internet Protocol (IP) networks. It achieves this by authenticating and encrypting each IP packet within a communication session. One of the key concepts in IPsec is the establishment of security associations (SAs) between peers. Security associations are the combination of algorithms and keys used to secure communication between two devices. They define the security parameters for the communication, including the encryption algorithm, integrity algorithm, and keying information. By establishing these security associations, IPsec ensures confidentiality, integrity, and authenticity of the data being transmitted between network nodes.

What are two functions of DHCP servers? (Choose two.)

A.

prevent users from assigning their own IP addresses to hosts

A.

prevent users from assigning their own IP addresses to hosts

Answers
B.

assign dynamic IP configurations to hosts in a network

B.

assign dynamic IP configurations to hosts in a network

Answers
C.

support centralized IP management

C.

support centralized IP management

Answers
D.

issue DHCPDISCOVER messages when added to the network

D.

issue DHCPDISCOVER messages when added to the network

Answers
E.

respond to client DHCPOFFER requests by issuing an IP address

E.

respond to client DHCPOFFER requests by issuing an IP address

Answers
Suggested answer: B, C

It work security team noticed that an increasing number of employees are becoming victims of phishing attacks. Which security program should be implemented to mitigate the problem?

A.

email system patches

A.

email system patches

Answers
B.

physical access control

B.

physical access control

Answers
C.

software firewall enabled on all PCs

C.

software firewall enabled on all PCs

Answers
D.

user awareness training

D.

user awareness training

Answers
Suggested answer: D

What does WPA3 provide in wireless networking?

A.

safeguards against brute force attacks with SAE

A.

safeguards against brute force attacks with SAE

Answers
B.

optional Protected Management Frame negotiation

B.

optional Protected Management Frame negotiation

Answers
C.

backward compatibility with WPAand WPA2

C.

backward compatibility with WPAand WPA2

Answers
D.

increased security and requirement of a complex configuration

D.

increased security and requirement of a complex configuration

Answers
Suggested answer: A

Explanation:

https://www.swascan.com/wi-fi-security/

What is the operating mode and role of a backup port on a shared LAN segment in Rapid PVST+?

A.

forwarding mode and provides the lowest-cost path to the root bridge for each VLAN

A.

forwarding mode and provides the lowest-cost path to the root bridge for each VLAN

Answers
B.

learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN

B.

learning mode and provides the shortest path toward the root bridge handling traffic away from the LAN

Answers
C.

blocking mode and provides an alternate path toward the designated bridge

C.

blocking mode and provides an alternate path toward the designated bridge

Answers
D.

listening mode and provides an alternate path toward the root bridge

D.

listening mode and provides an alternate path toward the root bridge

Answers
Suggested answer: C
Total 967 questions
Go to page: of 97