Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 2

Questions 21

Refer to the exhibit.

200-301 Question 21

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Options:
A.

passive

B.

mode on

C.

auto

D.

active

Cisco 200-301 Premium Access
Questions 22

An engineer must configure an OSPF neighbor relationship between router R1 and R3 The authentication configuration has been configured and the connecting interfaces are in the same 192.168 1.0/30 sublet. What are the next two steps to complete the configuration? (Choose two.)

Options:
A.

configure the hello and dead timers to match on both sides

B.

configure the same process ID for the router OSPF process

C.

configure the same router ID on both routing processes

D.

Configure the interfaces as OSPF active on both sides.

E.

configure both interfaces with the same area ID

Questions 23

Which configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?

Options:
A.

Ansible

B.

Python

C.

Puppet

D.

Chef

Questions 24

Refer to the exhibit.

200-301 Question 24

Which route does R1 select for traffic that is destined to 192 168.16.2?

Options:
A.

192.168.16.0/21

B.

192.168.16.0/24

C.

192.168 26.0/26

D.

192.168.16.0/27

Questions 25

Which command must be entered when a device is configured as an NTP server?

Options:
A.

ntp authenticate

B.

ntp server

C.

ntp peer

D.

ntp master

Questions 26

Refer to the exhibit.

200-301 Question 26

Which two prefixes are included in this routing table entry? (Choose two.)

Options:
A.

192.168.1.17

B.

192.168.1.61

C.

192.168.1.64

D.

192.168.1.127

E.

192.168.1.254

Questions 27

Refer to the exhibit.

200-301 Question 27

For security reasons, automatic neighbor discovery must be disabled on the R5 Gi0/1 interface. These tasks must be completed:

• Disable all neighbor discovery methods on R5 interface GiO/1.

• Permit neighbor discovery on R5 interface GiO/2.

• Verify there are no dynamically learned neighbors on R5 interface Gi0/1.

• Display the IP address of R6*s interface Gi0/2.

Which configuration must be used?

200-301 Question 27

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 28

The service password-encryption command is entered on a router. What is the effect of this configuration?

Options:
A.

restricts unauthorized users from viewing clear-text passwords in the running configuration

B.

encrypts the password exchange when a VPN tunnel is established

C.

prevents network administrators from configuring clear-text passwords

D.

protects the VLAN database from unauthorized PC connections on the switch

Questions 29

Refer to the exhibit.

200-301 Question 29

Router R1 is running three different routing protocols. Which route characteristic is used by the router to forward the packet that it receives for destination IP 172.16.32.1?

Options:
A.

longest prefix

B.

metric

C.

cost

D.

administrative distance

Questions 30

Refer to the exhibit.

200-301 Question 30

A packet is being sent across router R1 to host 172.163.3.14. To which destination does the router send the packet?

Options:
A.

207.165.200.246 via Serial0/1/0

B.

207.165.200.254 via Serial0/0/1

C.

207.165.200.254 via Serial0/0/0

D.

207.165.200.250 via Serial/0/0/0

Questions 31

Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right

200-301 Question 31

Options:
Questions 32

Refer to Exhibit.

200-301 Question 32

An engineer is configuring the NEW York router to reach the Lo1 interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down? (Choose two)

Options:
A.

ipv6 router 2000::1/128 2012::1

B.

ipv6 router 2000::1/128 2012::1 5

C.

ipv6 router 2000::1/128 2012::2

D.

ipv6 router 2000::1/128 2023::2 5

E.

ipv6 router 2000::1/128 2023::3 5

Questions 33

An engineer requires a scratch interface to actively attempt to establish a trunk link with a neighbor switch. What command must be configured?

Options:
A.

switchport mode trunk

B.

switchport mode dynamic desirable

C.

switchport mode dynamic auto

D.

switchport nonegotiate

Questions 34

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?

Options:
A.

To pass client traffic two or more ports must be configured.

B.

The EtherChannel must be configured in "mode active"

C.

When enabled the WLC bandwidth drops to 500 Mbps

D.

One functional physical port is needed to pass client traffic

Questions 35

An engineer must establish a trunk link between two switches. The neighboring switch is set to trunk or desirable mode. What action should be taken?

Options:
A.

configure switchport nonegotiate

B.

configure switchport mode dynamic desirable

C.

configure switchport mode dynamic auto

D.

configure switchport trunk dynamic desirable

Questions 36

If a switch port receives a new frame while it is actively transmitting a previous frame, how does it process the frames?

Options:
A.

The new frame is delivered first, the previous frame is dropped, and a retransmission request is sent.

B.

The previous frame is delivered, the new frame is dropped, and a retransmission request is sent.

C.

The new frame is placed in a queue for transmission after the previous frame.

D.

The two frames are processed and delivered at the same time.

Questions 37

Refer to the exhibit.

200-301 Question 37

An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right.

200-301 Question 37

Options:
Questions 38

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphone. How is the application secured in the case of a user’s smartphone being lost or stolen?

Options:
A.

The application requires an administrator password to reactivate after a configured Interval.

B.

The application requires the user to enter a PIN before it provides the second factor.

C.

The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

D.

The application verifies that the user is in a specific location before it provides the second factor.

Questions 39

An engineer must configure a WLAN using the strongest encryption type for WPA2- PSK. Which cipher fulfills the configuration requirement?

Options:
A.

WEP

B.

RC4

C.

AES

D.

TKIP

Questions 40

A device detects two stations transmitting frames at the same time. This condition occurs after the first 64 bytes of the frame is received interface counter increments?

Options:
A.

collision

B.

CRC

C.

runt

D.

late collision