Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 10

Questions 181

Which command must be entered when a device is configured as an NTP server?

Options:
A.

ntp authenticate

B.

ntp server

C.

ntp peer

D.

ntp master

Cisco 200-301 Premium Access
Questions 182

Drag and drop to the characteristics of networking from the left onto the correct networking types on the right.

200-301 Question 182

Options:
Questions 183

Drag the descriptions of device management from the left onto the types of device management on the right.

200-301 Question 183

Options:
Questions 184

In software-defined architecture, which place handles switching for traffic through a Cisco router?

Options:
A.

Control

B.

Management

C.

Data

D.

application

Questions 185

Refer to the exhibit.

200-301 Question 185

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW1. PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

200-301 Question 185

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 186

Which PoE mode enables powered-device detection and guarantees power when the device is detected?

Options:
A.

dynamic

B.

static

C.

active

D.

auto

Questions 187

A network engineer is configuring a switch so that it is remotely reachable via SSH. The engineer has already configured the host name on the router. Which additional command must the engineer configure before entering the command to generate the RSA key?

Options:
A.

password password

B.

crypto key generate rsa modulus 1024

C.

ip domain-name domain

D.

ip ssh authentication-retries 2

Questions 188

What provides centralized control of authentication and roaming In an enterprise network?

Options:
A.

a lightweight access point

B.

a firewall

C.

a wireless LAN controller

D.

a LAN switch

Questions 189

Refer to the exhibit.

200-301 Question 189

Which switch becomes the root of a spanning tree for VLAN 20 if all links are of equal speed?

200-301 Question 189

Options:
A.

SW1

B.

SW2

C.

SW3

D.

SW4

Questions 190

An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?

Options:
A.

switchport trunk allowed vlan 10

B.

switchport trunk native vlan 10

C.

switchport mode trunk

D.

switchport trunk encapsulation dot1q

Questions 191

R1 as an NTP server must have:

• NTP authentication enabled

• NTP packets sourced from Interface loopback 0

• NTP stratum 2

• NTP packets only permitted to client IP 209.165.200.225

How should R1 be configured?

A)

200-301 Question 191

B)

200-301 Question 191

C)

200-301 Question 191

D)

200-301 Question 191

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 192

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

200-301 Question 192

Options:
Questions 193

Refer to the exhibit.

200-301 Question 193

The New York router is configured with static routes pointing to the Atlanta and Washington sites. Which two tasks must be performed so that the Serial0/0/0 interfaces on the Atlanta and Washington routers can reach one another?

(Choose two.)

Options:
A.

Configure the ipv6 route 2012::/126 2023::1 command on the Washington router.

B.

Configure the ipv6 route 2023::/126 2012::1 command on the Atlanta router.

C.

Configure the Ipv6 route 2012::/126 s0/0/0 command on the Atlanta router.

D.

Configure the ipv6 route 2023::/126 2012::2 command on the Atlanta router.

E.

Configure the ipv6 route 2012::/126 2023::2 command on the Washington router.

Questions 194

What is the difference between 1000BASE-LX/LH and 1000BASE-ZX interfaces?

Options:
A.

1000BASE-ZX is supported on links up to 1000km, and 1000BASE-LX/LH operates over links up to 70 km.

B.

1000BASE-LX/LH interoperates with multimode and single-mode fiber, and 10008ASE-ZX needs a conditioning patch cable with a multimode.

C.

1000BASE-LX/LH is supported on links up to 10km, and 1000BASE-ZX operates over links up to 70 km

D.

1000BASE-ZX interoperates with dual-rate 100M/1G 10Km SFP over multimode fiber, and 1000BASE-LX/LH supports only single-rate.

Questions 195

When should an engineer implement a collapsed-core architecture?

Options:
A.

for small networks with minimal need for growth

B.

the access and distribution layers must be on the same device

C.

for large networks that are connected to multiple remote sites

D.

only when using VSS technology

Questions 196

What is a function of a Layer 3 switch?

Options:
A.

move frames between endpoints limited to IP addresses

B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.

forward Ethernet frames between VLANs using only MAC addresses

D.

flood broadcast traffic within a VLAN

Questions 197

Refer to the exhibit.

200-301 Question 197

Which minimum configuration items are needed to enable Secure Shell version 2 access to R15?

A)

200-301 Question 197

B)

200-301 Question 197

C)

200-301 Question 197

D)

200-301 Question 197

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 198

Refer to the exhibit.

200-301 Question 198

Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?

Options:
A.

via next-hop 10.0.1.5

B.

via next-hop 10 0 1.4

C.

via next-hop 10.0 1.50

D.

via next-hop 10.0 1 100

Questions 199

Refer to the exhibit.

200-301 Question 199

What is a reason for poor performance on the network interface?

Options:
A.

The interface is receiving excessive broadcast traffic.

B.

The cable connection between the two devices is faulty.

C.

The interface is operating at a different speed than the connected device.

D.

The bandwidth setting of the interface is misconfigured

Questions 200

Which WLC management connection type is vulnerable to man-in-the-middle attacks?

Options:
A.

SSH

B.

HTTPS

C.

Telnet

D.

console