Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 5

Questions 81

200-301 Question 81

Options:
Cisco 200-301 Premium Access
Questions 82

What is the function of "off-the-shell" switches in a controller-based network?

Options:
A.

providing a central view of the deployed network

B.

forwarding packets

C.

making routing decisions

D.

setting packet-handling policies

Questions 83

Refer to the exhibit.

200-301 Question 83

What is the subnet mask for route 172.16.4.0?

Options:
A.

255.255.248.0

B.

255.255.254.0

C.

255.255.255.192

D.

255.255.240.0

Questions 84

What are two functions of DHCP servers? (Choose two.)

Options:
A.

prevent users from assigning their own IP addresses to hosts

B.

assign dynamic IP configurations to hosts in a network

C.

support centralized IP management

D.

issue DHCPDISCOVER messages when added to the network

E.

respond to client DHCPOFFER requests by issuing an IP address

Questions 85

Refer to the exhibit.

200-301 Question 85

What is the subnet mask of the route to the 10.10.13.160 prefix?

Options:
A.

255.255.255.240

B.

255.255.255.128

C.

255.255.248.

D.

255.255.255.248

Questions 86

Which benefit does Cisco ONA Center provide over traditional campus management?

Options:
A.

Cisco DNA Center leverages SNMPv3 tor encrypted management, and traditional campus management uses SNMPv2.

B.

Cisco DNA Center automates HTTPS for secure web access, and traditional campus management uses HTTP.

C.

Cisco DNA Center leverages APIs, and traditional campus management requires manual data gathering.

D.

Cisco DNA Center automates SSH access for encrypted entry, and SSH Is absent from traditional campus management.

Questions 87

Which enhancements were implemented as part of WPA3?

Options:
A.

802.1x authentication and AES-128 encryption

B.

TKIP encryption improving WEP and per-packet keying

C.

AES-64 m personal mode and AES-128 in enterprise mode

D.

forward secrecy and SAE in personal mode for secure initial key exchange

Questions 88

Which two wireless security stewards use Counter Mode Cipher Block Chaining Message Authentication Code Protocol for encryption and data integrity'? (Choose two.)

Options:
A.

WPA2

B.

WPA3

C.

Wi-Fi 6

D.

WEP

E.

WPA

Questions 89

A client experiences slow throughput from a server that is directly connected to the core switch in a data center. A network engineer finds minimal latency on connections to the server, but data transfers are unreliable, and the output of the show Interfaces counters errors command shows a high FCS-Err count on the interface that is connected to the server. What is the cause of the throughput issue?

Options:
A.

high bandwidth usage

B.

a physical cable fault

C.

a speed mismatch

D.

a cable that is too long

Questions 90

Refer to the exhibit.

200-301 Question 90

Refer to the exhibit. The IPv6 address for the LAN segment on router R1 must be configured using the EUI-64 format. When configured which ipv6 address is produced by the router?

Options:
A.

2001:db8:1a44:41a4:C801:BEFF:FE4A:1

B.

2001:db8:1a44:41a4:C081:BFFF:FE4A:1

C.

2001:db8:1a44:41a4:4562:098F:FE36:1

D.

2001:db8:1a44:41a4:C800:BAFE:FF00:1

Questions 91

Which type of port is used to connect lo the wired network when an autonomous AP maps two VLANs to its WLANs?

Options:
A.

LAG

B.

EtherChannel

C.

trunk

D.

access

Questions 92

Drag and drop the SNMP components from the left onto the description on the right.

200-301 Question 92

Options:
Questions 93

Refer to the exhibit.

200-301 Question 93

Host A sent a data frame destined for host D

200-301 Question 93

What does the switch do when it receives the frame from host A?

Options:
A.

It drops the frame from the switch CAM table.

B.

It floods the frame out of all ports except port Fa0/1.

C.

It shuts down the port Fa0/1 and places it in err-disable mode.

D.

It experiences a broadcast storm.

Questions 94

Which WLC management connection type is vulnerable to man-in-the-middIe attacks?

Options:
A.

Telnet

B.

console

C.

HTTPS

D.

SSH

Questions 95

An engineer is configuring remote access to a router from IP subnet 10.139.58.0/28. The domain name, crypto keys, and SSH have been configured. Which configuration enables the traffic on the destination router?

A)

200-301 Question 95

B)

200-301 Question 95

C)

200-301 Question 95

D)

200-301 Question 95

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 96

Refer to the exhibit.

200-301 Question 96

Which two commands must be added to update the configuration of router R1 so that it accepts only encrypted connections? (Choose two )

Options:
A.

username CNAC secret R!41!4319115@

B.

ip ssh version 2

C.

line vty 0 4

D.

crypto key generate rsa 1024

E.

transport input ssh

Questions 97

Refer to the exhibit.

200-301 Question 97

An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0'1 interface for the router to assign a unique 64-brt IPv6 address to Itself?

Options:
A.

ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64

B.

ipv6 address 2001:DB8:0:1:C601:42FE:800F:7/64

C.

ipv6 address 2001 :DB8:0:1:FFFF:C601:420F:7/64

D.

iov6 address 2001 :DB8:0:1:FE80:C601:420F:7/64

Questions 98

Refer to the exhibit.

200-301 Question 98

Traffic that is flowing over interface TenGigabitEthernet0/0 experiences slow transfer speeds. What is the reason for the issue?

Options:
A.

heavy traffic congestion

B.

a duplex incompatibility

C.

a speed conflict

D.

queuing drops

Questions 99

Refer to the exhibit.

200-301 Question 99

What is a reason for poor performance on the network interface?

Options:
A.

The interface is receiving excessive broadcast traffic.

B.

The cable connection between the two devices is faulty.

C.

The interface is operating at a different speed than the connected device.

D.

The bandwidth setting of the interface is misconfigured

Questions 100

What is a function of a Next-Generation IPS?

Options:
A.

makes forwarding decisions based on learned MAC addresses

B.

serves as a controller within a controller-based network

C.

integrates with a RADIUS server to enforce Layer 2 device authentication rules

D.

correlates user activity with network events