Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 200-301 Practice Exam with Questions & Answers | Set: 9

Questions 161

Refer to the exhibit.

200-301 Question 161

Which two commands were used to create port channel 10? (Choose two )

200-301 Question 161

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Cisco 200-301 Premium Access
Questions 162

Refer to the exhibit.

200-301 Question 162

A packet is being sent across router R1 to host 172.16.0.14. What is the destination route for the packet?

Options:
A.

209.165.200.254 via Serial0/0/1

B.

209.165.200.254 via Serial0/0/0

C.

209.165.200.246 via Serial0/1/0

D.

209.165.200.250 via Serial0/0/0

Questions 163

Refer to the exhibit.

200-301 Question 163

Which action is expected from SW1 when the untagged frame is received on the GigabitEthernet0/1 interface?

Options:
A.

The frame is processed in VLAN 5.

B.

The frame is processed in VLAN 11

C.

The frame is processed in VLAN 1

D.

The frame is dropped

Questions 164

Refer to the exhibit.

200-301 Question 164

If configuring a static default route on the router with the ip route 0.0.0.0 0.0.0.0 10.13.0.1 120 command how does the router respond?

Options:
A.

It ignores the new static route until the existing OSPF default route is removed

B.

It immediately replaces the existing OSPF route in the routing table with the newly configured static route

C.

It starts load-balancing traffic between the two default routes

D.

It starts sending traffic without a specific matching entry in the routing table to GigabitEthernet0/1

Questions 165

TION NO: 117

200-301 Question 165

Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the reason for the problem?

Options:
A.

The OSPF router IDs are mismatched.

B.

Router2 is using the default hello timer.

C.

The network statement on Router1 is misconfigured.

D.

The OSPF process IDs are mismatched.

Questions 166

What are two characteristics of an SSID? (Choose Two)

Options:
A.

It can be hidden or broadcast in a WLAN

B.

It uniquely identifies an access point in a WLAN

C.

It uniquely identifies a client in a WLAN

D.

It is at most 32 characters long.

E.

IT provides secured access to a WLAN

Questions 167

What are two benefits of using the PortFast feature? (Choose two )

Options:
A.

Enabled interfaces are automatically placed in listening state

B.

Enabled interfaces come up and move to the forwarding state immediately

C.

Enabled interfaces never generate topology change notifications.

D.

Enabled interfaces that move to the learning state generate switch topology change notifications

E.

Enabled interfaces wait 50 seconds before they move to the forwarding state

Questions 168

What are two facts that differentiate optical-fiber cabling from copper cabling? (Choose two.)

Options:
A.

It is less expensive when purchasing patch cables.

B.

It has a greater sensitivity to changes in temperature and moisture.

C.

It provides greater throughput options.

D.

It carries signals for longer distances.

E.

It carries electrical current further distances for PoE devices.

Questions 169

200-301 Question 169

Refer to the exhibit. A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration must meet these requirements:

• Create the username as CCUser.

• Create the password as NA!2Scc.

• Encrypt the user password.

What must be configured to meet the requirements?

Options:
A.

username CCUser privies 10 password NA!2Scc

B.

username CCUser password NA!2Scc enable password level 5 NA!2$cc

C.

username CCUser secret NA!2Scc

D.

username CCUser privilege 15 password NA!2Scc enable secret 0 NA!2$cc

Questions 170

200-301 Question 170

All physical cabling between the two switches is installed. Configure the network connectivity between the switches using the designated VLANs and interfaces.

1. Configure VLAN 100 named Compute and VLAN 200 named Telephony where required for each task.

2. Configure Ethernet0/1 on SW2 to use the existing VLAN named Available.

3. Configure the connection between the switches using access ports.

4. Configure Ethernet0/1 on SW1 using data and voice VLANs.

5. Configure Ethemet0/1 on SW2 so that the Cisco proprietary neighbor discovery protocol is turned off for the designated interface only.

200-301 Question 170

Options:
Questions 171

Which AP feature provides a captive portal for users to authenticate register and accept terms before accessing the internet?

Options:
A.

One-Click

B.

Hotspot

C.

Enhanced Bluetooth

D.

Whole Home

Questions 172

200-301 Question 172

Refer to the exhibit. An engineer just installed network 10.120.10.0/24. Which configuration must be applied to the R14 router to add the new network to its OSPF routing table?

Options:
A.

router ospf 100

network 10.120.10.0 255.255.255.0 area 0

B.

router ospf 120

network 10.120.10.0 255.255.255.0 area 0

ip route 10.120.10.0 255.255.255.0 fa0/1

C.

router ospf 100 area 0

network 10.120.10.0 0.0.0.255

Questions 173

Which authentication method requires the user to provide a physical attribute to authenticate successfully?

Options:
A.

password

B.

muftifactor

C.

biometric

D.

certificate

Questions 174

200-301 Question 174

Refer to the exhibit. An engineer is creating a secure preshared key based SSID using WPA2 for a wireless network running on 2.4 GHz and 5 GHz. Which two tasks must the engineer perform to complete the process? (Choose two.)

Options:
A.

Select the 802.1 x option for Auth Key Management.

B.

Select the WPA Policy option.

C.

Select the PSK option for Auth Key Management.

D.

Select the AES option for Auth Key Management.

E.

Select the AES (CCMP128) option for WPA2/WPA3 Encryption.

Questions 175

Which plane is centralized in software-defined networking?

Options:
A.

application

B.

services

C.

control

D.

data

Questions 176

Refer to the exhibit.

200-301 Question 176

If OSPF Is running on this network, how does Router2 handle traffic from Site B to 10.10.13.128/25 at Site A?

Options:
A.

It load-balances traffic out of Fa0/1 and Fa0/2.

B.

It is unreachable and discards the traffic.

C.

It sends packets out of interface FaO/2.

D.

It sends packets out of interface Fa0/1.

Questions 177

Drag and drop the SNMP components from the left onto the descriptions on the right.

200-301 Question 177

Options:
Questions 178

An email user has been lured into clicking a link in an email sent by their company's security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?

Options:
A.

Physical access control

B.

Social engineering attack

C.

brute force attack

D.

user awareness

Questions 179

Which two command sequences must you configure on switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two )

Options:
A.

interface GigabitEthernet0/0/1

channel-group 10 mode on

B.

interface GigabitEthernet0/0/1

channel-group 10 mode active

C.

interface GigabitEthernet0/0/1

channel-group 10 mode auto

D.

interface port-channel 10

switchport

switchport mode trunk

E.

interface port-channel 10

no switchport

ip address 172.16.0.1.255.255.255.0

Questions 180

Drag the IPv6 DNS record types from the left onto the description on the right.

200-301 Question 180

Options: