Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 7

Questions 121

Refer to the exhibit.

200-301 Question 121

An engineer is required to verify that the network parameters are valid for the users wireless LAN connectivity on a /24 subnet. Drag and drop the values from the left onto the network parameters on the right. Not all values are used.

200-301 Question 121

Options:
Cisco 200-301 Premium Access
Questions 122

When an access point is seeking to join wireless LAN controller, which message is sent to the AP- Manager interface?

Options:
A.

Discovery response

B.

DHCP request

C.

DHCP discover

D.

Discovery request

Questions 123

Refer to the exhibit.

200-301 Question 123

The EtherChannel is configured with a speed of 1000 and duplex as full on both ends of channel group 1. What is the next step to configure the channel on switch A to respond to but not initiate LACP communication?

Options:
A.

interface range gigabitethernet0/0/0-15 channel-group 1 mode on

B.

interface range gigabitethernet0/0/0-15 channel-group 1 mode desirable

C.

interface port-channel 1 channel-group 1 mode auto

D.

interface port-channel 1 channel-group 1 mode passive

Questions 124

Which encryption method is used by WPA3?

Options:
A.

PSK

B.

TKIP

C.

SAE

D.

AES

Questions 125

Refer to the exhibit.

200-301 Question 125

Which types of JSON data is shown

Options:
A.

Object

B.

Sequence

C.

String

D.

boolean

Questions 126

What is an expected outcome when network management automation is deployed?

Options:
A.

A distributed management plane must be used.

B.

Software upgrades are performed from a central controller

C.

Complexity increases when new device configurations are added

D.

Custom applications are needed to configure network devices

Questions 127

What are two examples of multifactor authentication? (Choose two.)

Options:
A.

single sign-on

B.

unique user knowledge

C.

passwords that expire

D.

soft tokens

E.

shared password responsibility

Questions 128

Which physical component is distributed among multiple virtual machines running on the same hypervisor?

Options:
A.

external storage

B.

hardware resources

C.

network interfaces

D.

backplane network

Questions 129

What differentiates device management enabled by Cisco DNA Center from traditional campus device management?

Options:
A.

per-device

B.

centralized

C.

device-by-device hands-on

D.

CLI-oriented device

Questions 130

What causes a port to be placed in the err-disabled state?

Options:
A.

nothing plugged into the port

B.

link flapping

C.

shutdown command issued on the port

D.

latency

Questions 131

Which two components comprise part of a PKI? (Choose two.)

Options:
A.

preshared key that authenticates connections

B.

RSA token

C.

CA that grants certificates

D.

clear-text password that authenticates connections

E.

one or more CRLs

Questions 132

Refer to the exhibit.

200-301 Question 132

Web traffic is coming in from the WAN interface. Which route takes precedence when the router is processing traffic destined for the LAN network at 10 0.10.0/24?

Options:
A.

via next-hop 10.0.1.5

B.

via next-hop 10 0 1.4

C.

via next-hop 10.0 1.50

D.

via next-hop 10.0 1 100

Questions 133

Refer to the exhibit.

200-301 Question 133

Which action must be taken to ensure that router A is elected as the DR for OSPF area 0?

Options:
A.

Configure the OSPF priority on router A with the lowest value between the three routers.

B.

Configure router B and router C as OSPF neighbors of router A.

C.

Configure the router A interfaces with the highest OSPF priority value within the area.

D.

Configure router A with a fixed OSPF router ID

Questions 134

Refer to the exhibit.

200-301 Question 134

Which set of commands must be applied to the two switches to configure an LACP Layer 2 EtherChannel?

A)

200-301 Question 134

B)

200-301 Question 134

C)

200-301 Question 134

D)

200-301 Question 134

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 135

Refer to the exhibit.

200-301 Question 135

Which interface is chosen to forward traffic to the host at 192.168.0.55?

Options:
A.

GigabitEthernet0

B.

GigabitEthernet0/1

C.

Null0

D.

GigabitEthernet0/3

Questions 136

Refer to the exhibit.

200-301 Question 136

Router R14 is in the process of being configured. Which configuration must be used to establish a host route to PC 10?

Options:
A.

ip route 10.80.65.10 255.255.255.254 10.80.65.1

B.

ip route 10.8065.10 255.255.255.255 10.73.65.66

C.

ip route 1073.65.65 255.0.0.0 10.80.65.10

D.

ip route 10.73.65.66 0.0.0.255 10.80.65.10

Questions 137

Refer to the exhibit.

200-301 Question 137

SW_1 and SW_12 represent two companies that are merging. They use separate network vendors. The VLANs on both Sides have been migrated to share IP subnets. Which command sequence must be issued on both sides to join the two companies and pass all VLANs between the companies?

Options:
A.

switchport mode trunk

switchport trunk encapsulation dot1q

B.

switchport mode trunk

switchport trunk allowed vlan all

switchport dot1q ethertype 0800

C.

switchport mode dynamic desirable

switchport trunk allowed vlan all

switchport trunk native vlan 7

D.

switchport dynamic auto

switchport nonegotiate

Questions 138

Refer to the exhibit.

200-301 Question 138

A packet sourced from 10.10.10.32 is destined for the internet.

Options:
A.

0

B.

1

C.

2

D.

32

Questions 139

How does authentication differ from authorization?

Options:
A.

Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.

B.

Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access

C.

Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network

D.

Authentication is used to verify a person's identity, and authorization is used to create syslog messages for logins.

Questions 140

What is a link-local all-nodes IPv6 multicast address?

Options:
A.

ff02:0:0:0:0:0:0:1

B.

2004:31c:73d9:683e:255::

C.

fffe:034:0dd:45d6:789e::

D.

fe80:4433:034:0dd::2