Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 15

Questions 281

Refer to the exhibit.

200-301 Question 281

What is the prefix length for the route that router1 will use to reach host A?

Options:
A.

/25

B.

/27

C.

/28

D.

/29

Cisco 200-301 Premium Access
Questions 282

Which enhancement is implemented in WPA3?

Options:
A.

applies 802.1x authentication

B.

uses TKIP

C.

employs PKI to identify access points

D.

protects against brute force attacks

Questions 283

A packet from a company s branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes: 172.31.0.0/16, 172.31.0.0/24, and 172.31.0.0/25. How does the router handle the packet?

Options:
A.

It sends the traffic via prefix 172.31.0.0/16

B.

It sends the traffic via the default gateway 0.0.0.0/0.

C.

It sends the traffic via prefix 172.31.0.0/24

D.

It sends the traffic via prefix 172.31.0.0/25

Questions 284

Which two server types support domain name to IP address resolution? (Choose two >

Options:
A.

ESX host

B.

resolver

C.

web

D.

file transfer

E.

authentication

Questions 285

Refer to the exhibit.

200-301 Question 285

What does route 10.0.1.3/32 represent in the routing table?

Options:
A.

the 10.0.0.0 network

B.

a single destination address

C.

the source 10.0.1.100

D.

all hosts in the 10.0.1.0 subnet

Questions 286

Refer to the exhibit.

200-301 Question 286

The primary route across Gi0/0 is configured on both routers. A secondary route must be configuredd to establish connectivity between the workstation networks. Which command set must be configuredd to complete this task?

A)

200-301 Question 286

B)

200-301 Question 286

C)

200-301 Question 286

D)

200-301 Question 286

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 287

Which WPA mode uses PSK authentication?

Options:
A.

Local

B.

Client

C.

Enterprise

D.

Personal

Questions 288

Which two protocols are used by an administrator for authentication and configuration on access points?

Options:
A.

Kerberos

B.

802.1Q

C.

802.1x

D.

TACACS+

E.

RADIUS

Questions 289

Which interface enables communication between a program on the controller and a program on the networking devices?

Options:
A.

northbound interface

B.

software virtual interface

C.

southbound interface

D.

tunnel Interface

Questions 290

Refer to the exhibit.

200-301 Question 290

Wireless LAN access must be set up to force all clients from the NA WLAN to authenticate against the local database. The WLAN is configured for local EAP authentication. The time that users access the network must not be limited. Which action completes this configuration?

Options:
A.

Uncheck the Guest User check box

B.

Check the Guest User Role check box

C.

Set the Lifetime (seconds) value to 0

D.

Clear the Lifetime (seconds) value

Questions 291

Refer to the exhibit

.

200-301 Question 291

After configuring a new static route on the CPE. the engineer entered this series of commands to verify that the new configuration is operating normally When is the static default route installed into the routing table?

Options:
A.

when 203 0 113.1 is no longer reachable as a next hop B. when the default route learned over external BGP becomes invalid

B.

when a route to 203.0 113 1 is learned via BGP

C.

when the default route over external BGP changes its next hop

Questions 292

Refer to the exhibit.

200-301 Question 292

How does router R1 handle traffic to the 172.16.1.4/30 subnet?

Options:
A.

It sends all traffic over the path via 172.16.9.5 using 172.16.4.4 as a backup.

B.

It sends all traffic over the path via 10.0.1.100.

C.

It load-balances traffic over 172.16.9.5 and 172.16.4.4.

D.

It sends all traffic over the path via 172.16.4.4.

Questions 293

200-301 Question 293

A)

200-301 Question 293

B)

200-301 Question 293

C)

200-301 Question 293

D)

200-301 Question 293

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 294

Which remote access protocol provides unsecured remote CLI access?

Options:
A.

console

B.

Telnet

C.

Bash

D.

SSH

Questions 295

PC1 tries to send traffic to newly installed PC2. The PC2 MAC address is not listed in the MAC address table of the switch, so the switch sends the packet to all ports in the same VLAN Which switching concept does this describe?

Options:
A.

MAC address aging

B.

MAC address table

C.

frame flooding

D.

spanning-tree protocol

Questions 296

Which two features introduced in SNMPv2 provide the ability to retrieve large amounts of data in one request

Options:
A.

Get

B.

GetNext

C.

Set

D.

GetBulk

E.

Inform

Questions 297

By default, how long will the switch continue to know a workstation MAC address after the workstation stops sending traffic?

Options:
A.

200 seconds

B.

300 seconds

C.

600 seconds

D.

900 seconds

Questions 298

Refer to the exhibit.

200-301 Question 298

A multivendor network exists and the company is implementing VoIP over the network for the first time.

A)

200-301 Question 298

B)

200-301 Question 298

C)

200-301 Question 298

D)

200-301 Question 298

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 299

Drag and drop the characteristics of northbound APIs from the left onto any position on the right. Not all characteristics are used.

200-301 Question 299

Options:
Questions 300

Which advantage does the network assurance capability of Cisco DNA Center provide over traditional campus management?

Options:
A.

Cisco DNA Center correlates information from different management protocols to obtain insights, and traditional campus management requires manual analysis.

B.

Cisco DNA Center handles management tasks at the controller to reduce the load on infrastructure devices, and traditional campus management uses the data backbone.

C.

Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric and nonfabric devices, and traditional campus management uses CLI exclusively.

D.

Cisco DNA Center automatically compares security postures among network devices, and traditional campus management needs manual comparisons.