Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 2

Questions 21

An engineer is configuring NAT to translate the source subnet of 10.10.0.0/24 to any of three addresses 192.168.30.1, 192.168.3.2, 192.168.3.3 Which configuration should be used?

200-301 Question 21

200-301 Question 21

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Cisco 200-301 Premium Access
Questions 22

What is the same for both copper and fiber interfaces when using SFP modules?

Options:
A.

They support an inline optical attenuator to enhance signal strength

B.

They provide minimal interruption to services by being hot-swappable

C.

They offer reliable bandwidth up to 100 Mbps in half duplex mode

D.

They accommodate single-mode and multi-mode in a single module

Questions 23

What is a characteristic of private IPv4 addressing?

Options:
A.

traverse the Internet when an outbound ACL is applied

B.

issued by IANA in conjunction with an autonomous system number

C.

composed of up to 65.536 available addresses

D.

used without tracking or registration

Questions 24

What event has occurred if a router sends a notice level message to a syslog server?

Options:
A.

A TCP connection has been torn down

B.

An ICMP connection has been built

C.

An interface line has changed status

D.

A certificate has expired.

Questions 25

Refer to exhibit.

200-301 Question 25

Which statement explains the configuration error message that is received?

Options:
A.

It is a broadcast IP address

B.

The router does not support /28 mask.

C.

It belongs to a private IP address range.

D.

IT is a network IP address.

Questions 26

Which network action occurs within the data plane?

Options:
A.

compare the destination IP address to the IP routing table.

B.

run routing protocols (OSPF, EIGRP, RIP, BGP)

C.

make a configuration change from an incoming NETCONF RPC

D.

reply to an incoming ICMP echo request

Questions 27

Refer to the exhibit.

200-301 Question 27

A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?

Options:
A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255

B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22

C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22

D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255

Questions 28

What is recommended for the wireless infrastructure design of an organization?

Options:
A.

group access points together to increase throughput on a given channel

B.

configure the first three access points are configured to use Channels 1, 6, and 11

C.

include a least two access points on nonoverlapping channels to support load balancing

D.

assign physically adjacent access points to the same Wi-Fi channel

Questions 29

Which type of attack can be mitigated by dynamic ARP inspection?

Options:
A.

worm

B.

malware

C.

DDoS

D.

man-in-the-middle

Questions 30

Refer to the exhibit.

200-301 Question 30

Which configuration on RTR-1 denies SSH access from PC-1 to any RTR-1 interface and allows all other traffic?

Options:
A.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any

interface GigabitEthernet0/0 ip access-group 100 in

B.

access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any

line vty 0 15 ip access-group 100 in

C.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any

interface GigabitEthernet0/0 ip access-group 100 in

D.

access-list 100 deny tcp host 172.16.1.33 any eq 23 access-list 100 permit ip any any

line vty 0 15 ip access-group 100 in

Questions 31

Which function is performed by the collapsed core layer in a two-tier architecture?

Options:
A.

enforcing routing policies

B.

marking interesting traffic for data polices

C.

attaching users to the edge of the network

D.

applying security policies

Questions 32

What are two functions of a Layer 2 switch? (Choose two)

Options:
A.

acts as a central point for association and authentication servers

B.

selects the best route between networks on a WAN

C.

moves packets within a VLAN

D.

moves packets between different VLANs

E.

makes forwarding decisions based on the MAC address of a packet

Questions 33

Which action does the router take as it forwards a packet through the network?

Options:
A.

The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destination

B.

The router encapsulates the original packet and then includes a tag that identifies the source router MAC address and transmits it transparently to the destination

C.

The router encapsulates the source and destination IP addresses with the sending router IP address as the source and the neighbor IP address as the destination

D.

The router replaces the source and destination labels with the sending router interface label as a source and the next hop router label as a destination

Questions 34

Refer to the exhibit.

200-301 Question 34

Which type of configuration is represented in the output?

Options:
A.

Ansible

B.

JSON

C.

Chef

D.

Puppet

Questions 35

Which virtual MAC address is used by VRRP group 1?

Options:
A.

0050.0c05.ad81

B.

0007.c061.bc01

C.

0000.5E00.0101

D.

0500.3976.6401

Questions 36

Why was the RFC 1918 address space defined?

Options:
A.

conserve public IPv4 addressing

B.

preserve public IPv6 address space

C.

reduce instances of overlapping IP addresses

D.

support the NAT protocol

Questions 37

Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right

200-301 Question 37

Options:
Questions 38

Which two encoding methods are supported by REST APIs? (Choose two)

Options:
A.

YAML

B.

JSON

C.

EBCDIC

D.

SGML

E.

XML

Questions 39

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?

Options:
A.

platform-as-a-service

B.

software-as-a-service

C.

network-as-a-service

D.

infrastructure-as-a-service

Questions 40

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?

Options:
A.

SMTP

B.

SNMP

C.

TCP

D.

FTP