Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 11

Questions 201

By default, how long will the switch continue to know a workstation MAC address after the workstation stops sending traffic?

Options:
A.

200 seconds

B.

300 seconds

C.

600 seconds

D.

900 seconds

Cisco 200-301 Premium Access
Questions 202

Refer to the exhibit.

200-301 Question 202

In which structure does the word "warning" directly reside?

Options:
A.

array

B.

object

C.

Boolean

D.

string

Questions 203

What is the function of "off-the-shell" switches in a controller-based network?

Options:
A.

providing a central view of the deployed network

B.

forwarding packets

C.

making routing decisions

D.

setting packet-handling policies

Questions 204

A network engineer must configure an access list on a new Cisco IOS router. The access list must deny HTTP traffic to network 10.125.128.32/27 from the 192.168.240.0/20 network, but it must allow the 192.168.240.0/20 network to reach the rest of the 10.0.0.0/8 network. Which configuration must the engineer apply?

A)

200-301 Question 204

B)

200-301 Question 204

C)

200-301 Question 204

D)

200-301 Question 204

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 205

Refer to the exhibit.

200-301 Question 205

The SW1 and SW2 Gi0/0 ports have been preconfigured. An engineer is given these requirements:

• Allow all PCs to communicate with each other at Layer 3.

• Configure untagged traffic to use VLAN 5.

• Disable VLAN 1 from being used.

Which configuration set meets these requirements?

Options:
A.

SW1#interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5interface Gi0/2switchport mode trunkswitchport trunk allowed vlan 5,7,9,108SW2#interface Gi0/1switchport mode accessswitchport access vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 7,9,108

B.

SW1#interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5interface Gi0/2switchport mode accessswitchport trunk allowed vlan 7,9,108SW2#interface Gi0/1switchport mode accessno switchport access vlan 1switchport access vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 7,9,108switchport trunk native vlan 5

C.

SW#1 -interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5interface Gi0/2switchport mode trunkswitchport trunk allowed vlan 5,7,9,108SW2#interface Gi0/1switchport mode accessswitchport access vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 5,7,9,108switchport trunk native vlan 5

D.

SW1#interface Gi0/1switchport mode trunkswitchport trunk allowed vian 5,7,9,108interface Gi0/2switchport mode trunkswitchport trunk allowed vlan 7,9,108SW2#interface Gi0/1switchport mode trunkswitchport trunk allowed vlan 7interface Gi0/7switchport mode trunkswitchport trunk allowed vlan 5,7,9,108

Questions 206

Refer to the exhibit.

200-301 Question 206

Which interface is chosen to forward traffic to the host at 192.168.0.55?

Options:
A.

GigabitEthernet0

B.

GigabitEthernet0/1

C.

Null0

D.

GigabitEthernet0/3

Questions 207

200-301 Question 207

Refer to the exhibit. An engineer is using the Cisco WLC GUI to configure a WLAN for WPA2 encryption with AES and preshared key Cisc0123456. After the engineer selects the WPA + WPA2 option from the Layer 2 Security drop-down list, which two tasks must they perform to complete the process? (Choose two.)

Options:
A.

Select the WPA2 Policy, AES, and TKIP check boxes.

B.

Select ASCII from the PSK Format drop-down list, enter the key, and leave the Auth Key Mgmt setting blank.

C.

Select PSK from the Auth Key Mgmt drop-down list, set the PSK Format to ASCII, and enter the key.

D.

Select the WPA2 Policy and AES check boxes.

Questions 208

Which Windows command is used instead of the route print command to display the contents of the IP routing table?

Options:
A.

netstat-n

B.

ipconfig

C.

ifconfig

D.

netstat-r

Questions 209

200-301 Question 209

200-301 Question 209

Connectivity between three routers has been established, and IP services must be configured jn the order presented to complete the implementation Tasks assigned include configuration of NAT, NTP, DHCP, and SSH services.

1. All traffic sent from R3 to the R1 Loopback address must be configured for NAT on R2. All source addresses must be translated from R3 to the IP address of Ethernet0/0 on R2, while using only a standard access list named NAT To verify, a ping must be successful to the R1 Loopback address sourced from R3. Do not use NVI NAT configuration.

2. Configure R1 as an NTP server and R2 as a client, not as a peer, using the IP address of the R1 Ethernet0/2 interface. Set the clock on the NTP server for midnight on January 1, 2019.

3. Configure R1 as a DHCP server for the network 10.1.3.0/24 in a pool named TEST. Using a single command, exclude addresses 1-10 from the range. Interface Ethernet0/2 on R3 must be issued the IP address of 10.1.3.11 via DHCP.

4. Configure SSH connectivity from R1 to R3, while excluding access via other remote connection protocols. Access for user root and password Cisco must be set on router R3 using RSA and 1024 bits. Verify connectivity using an SSH session from router R1 using a destination address of 10.1.3.11. Do NOT modify console access or line numbers to accomplish this task.

Options:
Questions 210

200-301 Question 210

Refer to the exhibit. A packet sourced from 10.10.10.1 is destined for 172.16.3.254. What is the subnet mask of the destination route?

Options:
A.

0.0.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.255

Questions 211

How does automation leverage data models to reduce the operational complexity of a managed network?

Options:
A.

Reduces the response time for specific requests to devices with many interfaces

B.

Categorizes traffic and provides insights

C.

Allows the controller to be vendor-agnostic

D.

Streamlines monitoring using SNMP and other polling tools

Questions 212

What is the difference between the TCP and UDP protocols?

Options:
A.

TCP ensures ordered, reliable data delivery, and UDP offers low latency and high throughput.

B.

TCP is used for transmitting data over the internet, and UDP is used for transmitting data over a local network.

C.

TCP manages multicast and broadcast data transfers, and UDP only handles unicast communications.

D.

TCP is used to ensure data integrity in a file transfer, and UDP is used to broadcast a message to multiple recipients.

Questions 213

What is the function of generative AI in network operations?

Options:
A.

It disables unused services.

B.

It deploys network firmware updates.

C.

It creates synthetic network configurations.

D.

It computes optimal data storage solutions.

Questions 214

What are two benefits of private IPv4 addressing? (Choose two.)

Options:
A.

provides external internet network connectivity

B.

provides unlimited address ranges

C.

propagates routing information to WAN links

D.

reuses addresses at multiple sites

E.

conserves globally unique address space

Questions 215

Which two principles must be considered when using per-hop behavior in QoS? (Choose two.)

Options:
A.

Policing is not supported on subinterfaces.

B.

Shaping and rate limiting have the same effect.

C.

Shaping drops excessive traffic without adding traffic delay.

D.

Shaping levels out traffic bursts by delaying excess traffic.

E.

Policing is performed in the inbound and outbound directions.

Questions 216

How is Al used to identify issues within network traffic?

Options:
A.

II exclusively predicts device malfunctions.

B.

It enhances data packet delivery speeds.

C.

It simplifies traffic route mapping.

D.

It analyzes patterns for anomaly detection.

Questions 217

What is a characteristic of private IPv4 addressing?

Options:
A.

alleviates the shortage of IPv4 addresses

B.

reduces the forwarding table on network routers

C.

enables secure connectivity over the internet

D.

used as the NAT outside global IP address

Questions 218

All physical cabling is in place. A company plans to deploy 32 new sites.

The sites will utilize both IPv4 and IPv6 networks.

1 . Subnet 172.25.0.0/16 to meet the subnet requirements and maximize

the number of hosts

Using the second subnet

• Assign the first usable IP address to e0/0 on Sw1O1

• Assign the last usable IP address to e0/0 on Sw102

2. Subnet to meet the subnet requirements and maximize

the number of hosts

c Using the second subnet

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on e0/0 on Sw101

• Assign an IPv6 GUA using a unique 64-Bit interface identifier

on eO/O on swi02

Guidelines

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.

• Refer to the Topology tab to access the device console(s) and perform the tasks.

• Console access is available for all required devices by clicking the device icon or using

the tab(s) above the console window.

• All necessary preconfigurations have been applied.

• Do not change the enable password or hostname for any device.

• Save your configurations to NVRAM before moving to the next item.

• Click Next at the bottom of the screen to submit this lab and move to the next question.

• When Next is clicked, the lab closes and cannot be reopened.

200-301 Question 218

Options:
Questions 219

200-301 Question 219

Refer to the exhibit. An LACP EtherChannel between two directly connected switches is in the configuration process.

Which command must be configured on switch SW2’s Gi0/1-2 interfaces to establish the channel to SW1?

Options:
A.

channel-group 1 mode desirable

B.

channel-group 1 mode on

C.

channel-group 1 mode auto

D.

channel-group 1 mode active

Questions 220

Which default condition must be considered when an encrypted mobility tunnel is used between two Cisco WLCs?

Options:
A.

TCP port 443 and UDP 21 are used.

B.

Control and data traffic encryption are enabled.

C.

The tunnel uses the IPsec protocol for encapsulation.

D.

The tunnel uses the EolP protocol to transmit data traffic.