Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 11

Questions 201

What is one reason to implement LAG on a Cisco WLC?

Options:
A.

to increase security and encrypt management frames

B.

to provide link redundancy and load balancing

C.

to allow for stateful and link-state failover

D.

to enable connected switch ports to failover and use different VLANs

Cisco 200-301 Premium Access
Questions 202

Drag and drop the characteristics of networking from the left onto the networking types on the right.

200-301 Question 202

Options:
Questions 203

Which protocol uses the SSL?

Options:
A.

HTTP

B.

SSH

C.

HTTPS

D.

Telnet

Questions 204

Refer to the exhibit.

200-301 Question 204

Which prefix did router R1 learn from internal EIGRP?

Options:
A.

192.168.10/24

B.

192.168.3.0/24

C.

192.168.2.0/24

D.

172.16 1.0/24

Questions 205

Refer to the exhibit.

200-301 Question 205

The network administrator must prevent the switch Cat9K-2 IP address from being visible in LLDP without disabling the protocol. Which action must be taken must be taken to complete the task?

Options:
A.

Configure the no lldp tlv-select-management-address command globally on Cat9K-2

B.

Configure the no lldp transmit command on interface G1/0/21 in Cat9K-1

C.

Configure the no lldp receive command on interface G1/0/21 on Cat9K-1

D.

Configure the no lldp mac-phy-cfg command globally on Cat9K-2

Questions 206

Which action is taken by a switch port enabled for PoE power classification override?

Options:
A.

When a powered device begins drawing power from a PoE switch port a syslog messageage is generated

B.

As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused

C.

If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects

D.

Should a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled

Questions 207

An engineer must configure R1 for a new user account. The account must meet these requirements:

* It must be configured in the local database.

* The username is engineer.

* It must use the strongest password configurable. Which command must the engineer configure on the router?

Options:
A.

R1 (config)# username engineer2 algorithm-type scrypt secret test2021

B.

R1(config)# username engineer2 secret 5 password S1$b1Ju$kZbBS1Pyh4QzwXyZ

C.

R1(config)# username engineer2 privilege 1 password 7 test2021

D.

R1(config)# username englneer2 secret 4 S1Sb1Ju$kZbBS1Pyh4QzwXyZ

Questions 208

A network engineer must configure two new subnets using the address block 10.70.128.0/19 to meet these requirements:

• The first subnet must support 24 hosts

• The second subnet must support 472 hosts

• Both subnets must use the longest subnet mask possible from the address block

Which two configurations must be used to configure the new subnets and meet a requirement to use the first available address in each subnet for the router interfaces? (Choose two )

Options:
A.

interface vlan 1234ip address 10.70.159.1 255.255.254.0

B.

interface vlan 1148ip address 10.70.148.1 255.255.254.0

C.

interface vlan 4722ip address 10.70.133.17 255.255.255.192

D.

interface vlan 3002ip address 10.70.147.17 255.255.255.224

E.

interface vlan 155ip address 10.70.155.65 255.255.255.224

Questions 209

Drag and drop the statements about networking from the left onto the corresponding networking types on the right

200-301 Question 209

Options:
Questions 210

Refer to the exhibit.

200-301 Question 210

When router R1 is sending traffic to IP address 10.56.192.1, which interface or next hop address does it use to route the packet?

Options:
A.

0.0.0.0.0/0

B.

10.56.0.1

C.

10.56.128.19

D.

Vlan57

Questions 211

Which value is the unique identifier that an access point uses to establish and maintain wireless connectivity to wireless network devices?

Options:
A.

VLAN ID

B.

SSID

C.

RFID

D.

WLANID

Questions 212

An engineer is configuring switch SW1 to act an NTP server when all upstream NTP server connectivity fails. Which configuration must be used?

A)

200-301 Question 212

B)

200-301 Question 212

C)

200-301 Question 212

D)

200-301 Question 212

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 213

Which characteristic differentiates the concept of authentication from authorization and accounting?

Options:
A.

user-activity logging

B.

service limitations

C.

consumption-based billing

D.

identity verification

Questions 214

Which protocol is used for secure remote CLI access?

Options:
A.

HTTPS

B.

HTTP

C.

Telnet

D.

SSH

Questions 215

Which function is performed by DHCP snooping?

Options:
A.

propagates VLAN information between switches

B.

listens to multicast traffic for packet forwarding

C.

provides DDoS mitigation

D.

rate-limits certain traffic

Questions 216

Refer to the exhibit.

200-301 Question 216

The ntp server 192.168.0.3 command has been configured on router 1 to make it an NTP client of router 2. Which command must be configured on router 2 so that it operates in server-only mode and relies only on its internal clock?

Options:
A.

Router2(config)#ntp passive

B.

Router2(config)#ntp server 172.17.0.1

C.

Router2(config)#ntp master 4

D.

Router2(config)#ntp server 192.168.0.2

Questions 217

Which REST method updates an object in the Cisco DNA Center Intent API?

Options:
A.

CHANGE

B.

UPDATE

C.

POST

D.

PUT

Questions 218

Refer to the exhibit.

200-301 Question 218

The link between PC1 and the switch is up. but it is performing poorly. Which interface condition is causing the performance problem?

Options:
A.

There is a duplex mismatch on the interface

B.

There is an issue with the fiber on the switch interface.

C.

There is a speed mismatch on the interface.

D.

There is an interface type mismatch

Questions 219

What is a capability of FTP in network management operations?

Options:
A.

encrypts data before sending between data resources

B.

devices are directly connected and use UDP to pass file information

C.

uses separate control and data connections to move files between server and client

D.

offers proprietary support at the session layer when transferring data

Questions 220

What is an expected outcome when network management automation is deployed?

Options:
A.

A distributed management plane must be used.

B.

Software upgrades are performed from a central controller

C.

Complexity increases when new device configurations are added

D.

Custom applications are needed to configure network devices