Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 8

Questions 141

Refer to the exhibit.

200-301 Question 141

Host A switch interface is configured in VLAN 2. Host D sends a unicast packet destined for the IP address of host A.

200-301 Question 141

What does the switch do when it receives the frame from host D?

Options:
A.

It creates a broadcast storm.

B.

It drops the frame from the MAC table of the switch.

C.

It shuts down the source port and places It In err-disable mode.

D.

It floods the frame out of every port except the source port.

Cisco 200-301 Premium Access
Questions 142

Refer to the exhibit.

200-301 Question 142

How many objects are present in the given JSON-encoded data?

Options:
A.

one

B.

four

C.

seven

D.

nine

Questions 143

Refer to the exhibit.

200-301 Question 143

Rapid PVST+ mode is on the same VLAN on each switch. Which switch becomes the root bridge and why?

Options:
A.

SW2, because its MAC address is the highest

B.

SW3, because its priority is the highest

C.

SW4, because its priority is highest and its MAC address is lower

D.

SW1, because its priority is the lowest and its MAC address is higher

Questions 144

Refer to the exhibit.

200-301 Question 144

What is represented beginning with line 1 and ending with line 5?

Options:
A.

value

B.

object

C.

key

D.

array

Questions 145

An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?

Options:
A.

crypto key Import rsa pem

B.

crypto key pubkey-chain rsa

C.

crypto key generate rsa

D.

crypto key zeroize rsa

Questions 146

Which two server types support dornas name to IP address resolution? (Choose two >

Options:
A.

ESX host

B.

resolver

C.

web

D.

file transfer

E.

authentication

Questions 147

Drag and drop the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right.

200-301 Question 147

Options:
Questions 148

Which IPv6 address range is suitable for anycast addresses for distributed services such DHCP or DNS?

Options:
A.

FF00:1/12

B.

2001:db8:0234:ca3e::1/128

C.

2002:db84:3f37:ca98:be05:8/64

D.

FE80::1/10

Questions 149

Drag and drop the characteristic from the left onto the IPv6 address type on the right.

200-301 Question 149

Options:
Questions 150

200-301 Question 150

Refer to the exhibit. An engineer must configure a static network route between two networks so that host A communicates with host B. Drag and drop the commands from the left onto the routers where they must be configured on the right. Not all commands are used.

200-301 Question 150

Options:
Questions 151

An engineer configures interface Gi1/0 on the company PE router to connect to an ISP Neighbor discovery is disabled

200-301 Question 151

Which action is necessary to complete the configuration if the ISP uses third-party network devices?

Options:
A.

Enable LLDP globally

B.

Disable autonegotiation

C.

Disable Cisco Discovery Protocol on the interface

D.

Enable LLDP-MED on the ISP device

Questions 152

What is a function of a Layer 3 switch?

Options:
A.

move frames between endpoints limited to IP addresses

B.

transmit broadcast traffic when operating in Layer 3 mode exclusively

C.

forward Ethernet frames between VLANs using only MAC addresses

D.

flood broadcast traffic within a VLAN

Questions 153

Refer to the exhibit.

200-301 Question 153

An administrator must configure interfaces Gi1/1 and Gi1/3 on switch SW11 PC-1 and PC-2 must be placed in the Data VLAN and Phone-1 must be placed in the Voice VLAN Which configuration meets these requirements?

200-301 Question 153

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 154

Which QoS tool is used to optimize voice traffic on a network that is primarily intended for data traffic?

Options:
A.

FIFO

B.

WFQ

C.

PQ

D.

WRED

Questions 155

Which technology must be implemented to configure network device monitoring with the highest security?

Options:
A.

IP SLA

B.

syslog

C.

NetFlow

D.

SNMPv3

Questions 156

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two )

Options:
A.

Telnet

B.

SSH

C.

HTTP

D.

HTTPS

E.

TFTP

Questions 157

Which type of API allows SDN controllers to dynamically make changes to the network?

Options:
A.

northbound API

B.

REST API

C.

SOAP API

D.

southbound API

Questions 158

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true?

Options:
A.

To pass client traffic two or more ports must be configured.

B.

The EtherChannel must be configured in "mode active"

C.

When enabled the WLC bandwidth drops to 500 Mbps

D.

One functional physical port is needed to pass client traffic

Questions 159

Refer to the exhibit.

200-301 Question 159

An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using a local username and password?

200-301 Question 159

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 160

Refer to the exhibit.

200-301 Question 160

An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:"% Connection refused by remote host" Without allowing Telnet access from PC-1, which action must be taken to permit the traffic?

Options:
A.

Add the access-list 10 permit any command to the configuration

B.

Remove the access-class 10 in command from line vty 0.4.

C.

Add the ip access-group 10 out command to interface g0/0.

D.

Remove the password command from line vty 0 4.