Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 7

Questions 121

Which API is used in controller-based architectures to interact with edge devices?

Options:
A.

overlay

B.

northbound

C.

underlay

D.

southbound

Cisco 200-301 Premium Access
Questions 122

Which access layer threat-mitigation technique provides security based on identity?

Options:
A.

Dynamic ARP Inspection

B.

using a non-default native VLAN

C.

802.1x

D.

DHCP snooping

Questions 123

Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state?

Options:
A.

BPDUfilter

B.

PortFast

C.

Backbonefast

D.

BPDUguard

Questions 124

Which interface or port on the WLC is the default for in-band device administration and communications between the controller and access points?

Options:
A.

virtual interface

B.

management interface

C.

console port

D.

service port

Questions 125

Drag and drop each characteristic of device-management technologies from the left onto the deployment type on the right.

200-301 Question 125

Options:
Questions 126

What are two benefits for using private IPv4 addressing? (Choose two.)

Options:
A.

They alleviate the shortage of public IPv4 addresses.

B.

They supply redundancy in the case of failure.

C.

They offer Internet connectivity to endpoints on private networks.

D.

They allow for Internet access from IoT devices.

E.

They provide a layer of security from Internet threats.

Questions 127

What is the purpose of classifying network traffic in QoS?

Options:
A.

services traffic according to its class

B.

identifies the type of traffic that will receive a particular treatment

C.

writes the class identifier of a packet to a dedicated field in the packet header

D.

configures traffic-matching rules on network devices

Questions 128

Refer to the exhibit.

200-301 Question 128

A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these requirements:

• accommodates current configured VLANs

• expands the range to include VLAN 20

• allows for IEEE standard support for virtual LANs

Which configuration on the NewSwitch side of the link meets these requirements?

A)

200-301 Question 128

B)

200-301 Question 128

C)

200-301 Question 128

D)

200-301 Question 128

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 129

What is the purpose of configuring different levels of syslog for different devices on the network?

Options:
A.

to rate-limit messages for different seventy levels from each device

B.

to set the severity of syslog messages from each device

C.

to identify the source from which each syslog message originated

D.

to control the number of syslog messages from different devices that are stored locally

Questions 130

How do UTP and STP cables compare?

Options:
A.

STP cables are cheaper to procure and easier to install and UTP cables are more expensive and harder to install.

B.

UTP cables are less prone to crosstalk and interference and STP cables are more prone to crosstalk and interference.

C.

UTP cables provide taster and more reliable data transfer rates and STP cables are slower and less reliable.

D.

STP cables are shielded and protect against electromagnetic interference and UTP lacks the same protection against electromagnetic interference.

Questions 131

200-301 Question 131

Refer to the exhibit.

Which configuration is needed to configure a WLAN with WPA2 only and with a password that is 63 characters long?

Options:
A.

Disable WPA Policy and WPA Encryption and then enable PSK using ASCII.

B.

Enable PSK and FT PSK and then disable WPA Policy.

C.

Disable WPA Encryption and then enable FT PSK.

D.

Enable PSK using Hex format and then disable WPA Policy.

Questions 132

Which IPsec encryption mode is appropriate when the destination of a packet differs from the security termination point?

Options:
A.

tunnel

B.

transport

C.

aggressive

D.

main

Questions 133

What is the role of the root port in a switched network?

Options:
A.

It replaces the designated port when the designated port fails

B.

It is the best path to the root from a nonroot switch.

C.

It replaces the designated port when the root port fails.

D.

It is administratively disabled until a failover occurs.

Questions 134

R1 has learned route 192.168.12.0/24 via IS-IS, OSPF, RIP, and Internal EIGRP. Under normal operating conditions, which routing protocol's route will be installed in the routing table?

Options:
A.

IS-IS

B.

RIP

C.

OSPF

D.

Internal EIGRP

Questions 135

200-301 Question 135

Refer to the exhibit. What is represented by “R1” and “SW1” within the JSON output?

    object

Options:
A.

value

B.

key

C.

array

Questions 136

Refer to the exhibit.

200-301 Question 136

An engineer executed the script and added commands that were not necessary for SSH and now must remove the commands.

Options:
A.

metric

B.

cost

C.

longest prefix

D.

administrative distance

Questions 137

What is the role of disaggregation in controller-based networking?

Options:
A.

It divides the control-plane and data-plane functions.

B.

It summarizes the routes between the core and distribution layers of the network topology.

C.

It enables a network topology to quickly adjust from a ring network to a star network

D.

It streamlines traffic handling by assigning individual devices to perform either Layer 2 or Layer 3 functions.

Questions 138

200-301 Question 138

Refer to the exhibit. How does router R1 handle traffic to the 172.16.1.4/30 subnet?

Options:
A.

It sends all traffic over the path via 172.16.9.5 using 172.16.4.4 as a backup.

B.

It sends all traffic over the path via 172.16.4.4.

C.

It load-balances traffic over 172.16.9.5 and 172.16.4.4.

D.

It sends all traffic over the path via 10.0.1.100

Questions 139

What are two lacts that differentiate optical-fiber cabling from copper cabling? (Choose two.)

Options:
A.

It is less expensive when purchasing patch cables.

B.

It has a greater sensitivity to changes in temperature and moisture.

C.

It provides greater throughput options.

D.

It carries signals for longer distances.

E.

It carries electrical current further distances for PoE devices.

Questions 140

Which cipher is supported for wireless encryption only with the WPA2 standard?

Options:
A.

AES256

B.

AES

C.

RC4

D.

SHA