200-301 Practice Test Questions

864 Questions


Topic 1: Exam Pool A

   

desc about topic

Which CRUD operation corresponds to the HTTP GET method?


A.

read


B.

update


C.

create


D.

delete





A.
  

read



Explanation: GET: This method retrieves the information identified by the request URI. In
the context of the RESTful web services, this method is used to retrieve resources. This is
the method used for read operations (the R in CRUD).
https://hub.packtpub.com/crud-operations-rest/

Which type of wireless encryption is used for WPA2 in preshared key mode?


A.

TKIP with RC4


B.

RC4


C.

AES-128


D.

AES-256





D.
  

AES-256



Explanation:
We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the
WPA2 passphrase so we can deduce the encryption is AES-256, not AES-128.

What is the difference regarding reliability and communication type between TCP and
UDP?


A.

TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol


B.

TCP is not reliable and is a connection-oriented protocol; UDP is reliable and is a connectionless protocol


C.

TCP is not reliable and is a connectionless protocol; UDP is reliable and is a connectionoriented
protocol


D.

TCP is reliable and is a connectionless protocol; UDP is not reliable and is a connectionoriented
protocol





A.
  

TCP is reliable and is a connection-oriented protocol UDP is not reliable and is a connectionless protocol



A network administrator must enable DHCP services between two sites. What must be
configured for the router to pass DHCPDISCOVER messages on to the server?


A.

a DHCP Relay Agent


B.

DHCP Binding


C.

a DHCP Pool


D.

DHCP Snooping





A.
  

a DHCP Relay Agent



Drag and drop the AAA functions from the left onto the correct AAA services on the right 






Which access layer threat-mitigation technique provides security based on identity?


A.

Dynamic ARP Inspection


B.

using a non-default native VLAN


C.

802.1x


D.

DHCP snooping





C.
  

802.1x



Refer to the exhibit.

What is the result if Gig1/11 receives an STP BPDU?


A.

The port transitions to STP blocking


B.

The port transitions to the root port


C.

The port immediately transitions to STP forwarding.


D.

The port goes into error-disable state





D.
  

The port goes into error-disable state



in Which way does a spine and-leaf architecture allow for scalability in a network when
additional access ports are required?


A.

A spine switch and a leaf switch can be added with redundant connections between them


B.

A spine switch can be added with at least 40 GB uplinks


C.

A leaf switch can be added with a single connection to a core spine switch.


D.

A leaf switch can be added with connections to every spine switch





D.
  

A leaf switch can be added with connections to every spine switch



Explanation: Spine-leaf architecture is typically deployed as two layers: spines (such as
an aggregation layer), and leaves (such as an access layer). Spine-leaf topologies provide
high-bandwidth, low-latency, nonblocking server-to-server connectivity.
Leaf (aggregation) switches are what provide devices access to the fabric (the network of
spine and leaf switches) and are typically deployed at the top of the rack. Generally,
devices connect to the leaf switches.
Devices can include servers, Layer 4-7 services (firewalls and load balancers), and WAN
or Internet routers. Leaf switches do not connect to other leaf switches. In spine-and-leaf
architecture, every leaf should connect to every spine in a full mesh.
Spine (aggregation) switches are used to connect to all leaf switches and are typically
deployed at the end or middle of the row. Spine switches do not connect to other spine
switches.

Refer to exhibit.

Which statement explains the configuration error message that is received?


A.

It is a broadcast IP address


B.

The router does not support /28 mask.


C.

It belongs to a private IP address range.


D.

IT is a network IP address





A.
  

It is a broadcast IP address



Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two)


A.

OSPF area


B.

OSPF MD5 authentication key


C.

iPv6 address


D.

OSPf process ID


E.

OSPf stub flag





A.
  

OSPF area



D.
  

OSPf process ID



Which virtual MAC address is used by VRRP group 1?


A.

0050.0c05.ad81


B.

0007.c061.bc01


C.

0000.5E00.0101


D.

0500.3976.6401





C.
  

0000.5E00.0101



Explanation: The virtual router MAC address associated with a virtual router is an IEEE
802 MAC Address in the following format:
00-00-5E-00-01-{VRID} (in hex in internet standard bit-order)

Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol?


A.

on


B.

auto


C.

active


D.

desirable





A.
  

on



Explanation: The Static Persistence (or “on” mode) bundles the links unconditionally and
no negotiation protocol is used. In this mode, neither PAgP nor LACP packets are sent or
received.


Page 7 out of 72 Pages
Previous