Cisco 200-301 Practice Test - Questions Answers, Page 98

List of questions
Question 971

A network administrator wants the syslog server to filter incoming messages into different files based on their Importance. Which filtering criteria must be used?
level
message body
process ID
facility
Question 972

Refer to the exhibit.
Refer to the exhibit. How will the device handle a packet destined to IP address 100.100.100.100?
If will choose the route with the longest match. O 100.100.100.100'32 (110/21) via 192.168.1.1. 00:05:57. EmernetO/1.
It will always prefer the static route over dynamic routes and choose the route S 100.100.0.0/16(1/0] via 192.168.4.1.
It will choose the route with the highest metric. D 100.100.100.0/24 (90/435200) via 192.168.2.1. 00:00:13. EthernetO/2.
It will choose the route with the lowest metric, R 100.0.0.0/8 [120/2] via 192.168.3.1. 00:00:13. EthernetO/3.
Question 973

An engineer must configure a core router with a floating static default route to the backup router at 10.200.0.2. Which command meets the requirements?
ip route 0.0.0.0 0.0.0.0 10.200.0.2 1
Ip route 0.0.0.0 0.0.0.0 10.200.0.2 floating
ip route 0.0.0.0 0.0.0.0 10.200.0.2
Ip route 0.0.0.0 0.0.0.0 10.200.0.2 10
Question 974

Refer to the exhibit.
Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks must the engineer perform to complete the process? (Choose two.)
Select the 802.1 x option for Auth Key Management.
Select the WPA Policy option.
Select the PSK option for Auth Key Management.
Select the AES option for Auth Key Management.
Select the AES (CCMP128) option for WPA2/WPA3 Encryption.
Question 975

Refer to the exhibit.
Refer to the exhibit. A network engineer updates the existing configuration on interface fastethernet1/1 switch SW1. It must establish an EtherChannel by using the same group designation with another vendor switch. Which configuration must be performed to complete the process?
interface port-channel 2 channel-group 2 mode desirable
interface fasteinernet 1/1 channel-group 2 mode active
interface fasteinernet 1/1 channel-group 2 mode on
interface port-channel 2 channel-group 2 mode auto
Question 976

A HCP pool has been created with the name CONTROL. The pool uses the next to last usable IP address as the default gateway for the DHCP clients. The server is located at 172.16 32.15. What is the step in the process for clients on the 192.168.52.0/24 subnet to reach the DHCP server?
ip forward-protocol udp 137
ip default-network 192.168.52.253
ip helper-address 172.16.32.15
ip default-gateway 192.168.52.253
DHCP and broadcasts: DHCP clients use broadcasts to find a DHCP server, but broadcasts are typically limited to the local subnet. Since the DHCP server (172.16.32.15) is on a different subnet than the clients (192.168.52.0/24), the clients' broadcast requests won't reach it.
ip helper-address: This command is used on a router (or layer 3 switch) to forward DHCP broadcasts to a specific IP address (the DHCP server) on a different subnet. This allows clients to discover and obtain IP address information from a DHCP server that is not on their local network.
Question 977

Refer to the exhibit. The user has connectivity to devices on network 192.168.3 0/24 but cannot reach users on the network 10.10.1.0724.
What is the first step to verify connectivity?
Is the internet reachable?
Is the default gateway reachable?
Is the DNS server reachable?
Question 978

Which CRUD operation corresponds to me HTTP GET method?
delete
create
update
read
Question 979

What is the main difference between traditional networks and controller-based networking?
Controller-based networks increase TCO for the company, and traditional networks require less investment.
Controller-based networks provide a framework for Innovation, and traditional networks create efficiency.
Controller-based networks are open for application requests, and traditional networks operate manually.
Controller-based networks are a closed ecosystem, and traditional networks take advantage of programmability.
Question 980

Which WLC management connection type is vulnerable to man-in-the-middIe attacks?
Telnet
console
HTTPS
SSH
Question