200-301 Practice Test Questions

864 Questions


Topic 1: Exam Pool A

   

desc about topic

Refer to the exhibit.

How does the router manage traffic to 192.168.12.16?


A.

It selects the RIP route because it has the longest prefix inclusive of the destination
address.


B.

It chooses the OSPF route because it has the longest prefix inclusive of the destination address.


C.

it load-balances traffic between all three routes


D.

It chooses the EIGRP route because it has the lowest administrative distance





A.
  

It selects the RIP route because it has the longest prefix inclusive of the destination
address.



Which device performs stateful inspection of traffic?


A.

firewall


B.

switch


C.

access point


D.

wireless controller





A.
  

firewall



Refer to the exhibit.

What is the metric of the route to the 192.168.10.33/28 subnet?


A.

84


B.

110


C.

128


D.

192


E.

193





E.
  

193



Which spanning-tree enhancement avoids the learning and listening states and
immediately places ports in the forwarding state?


A.

BPDUfilter


B.

PortFast


C.

Backbonefast


D.

BPDUguard





B.
  

PortFast



Explanation: PortFast
Spanning Tree Portfast causes layer 2 switch interfaces to enter forwarding state
immediately, bypassing the listening and learning states. It should be used on ports connected directly to end hosts like servers or workstations. Note: If portfast isn’t enabled,
DHCP timeouts can occur while STP converges, causing more problems.
https://skminhaj.wordpress.com/2015/03/04/spanning-tree-stp-rstp-mst-enhancements/

Refer to the exhibit.

If OSPF Is running on this network, how does Router2 handle traffic from Site B to
10.10.13.128/25 at Site A?


A.

It load-balances traffic out of Fa0/1 and Fa0/2.


B.

It is unreachable and discards the traffic.


C.

It sends packets out of interface FaO/2.


D.

It sends packets out of interface Fa0/1.





B.
  

It is unreachable and discards the traffic.



Refer to the exhibit.

A network administrator must permit SSH access to remotely manage routers in a network.
The operations team resides on the 10.20.1.0/25 network. Which command will accomplish
this task?


A.

access-list 2699 permit udp 10.20.1.0 0.0.0.255


B.

no access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22


C.

access-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22


D.

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255





D.
  

no access-list 2699 deny ip any 10.20.1.0 0.0.0.255



Explanation: Note : Already a statement is there in last to allow SSH Traffic for network
10.20.1.0 0.0.0.127, but Second statement says deny ip any 10.20.1.0 0.0.0.255, so how it
will work once it is denied. So the right answer is remove the -- no access-list 2699 deny ip
any 10.20.1.0 0.0.0.255.

Drag and drop the WLAN components from the left onto the correct descriptions on the right.







Refer to the exhibit.

An extended ACL has been configured and applied to router R2 The configuration
failed to work as intended Which two
changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20 0 26 from the
10.0.10 0/26 subnet while still allowing all other traffic? (Choose
two )


A.

Add a "permit ip any any" statement to the begining of ACL 101 for allowed traffic.


B.

Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic


C.

The source and destination IPs must be swapped in ACL 101


D.

The ACL must be configured the Gi0/2 interface inbound on R1


E.

The ACL must be moved to the Gi0/1 interface outbound on R2





B.
  

Add a "permit ip any any" statement at the end of ACL 101 for allowed traffic



C.
  

The source and destination IPs must be swapped in ACL 101



How does HSRP provide first hop redundancy?


A.

It load-balances traffic by assigning the same metric value to more than one route to the
same destination m the IP routing table.


B.

It load-balances Layer 2 traffic along the path by flooding traffic out all interfaces
configured with the same VLAN.


C.

It forwards multiple packets to the same destination over different routed links n the data
path


D.

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as
the default gateway for hosts on a LAN





D.
  

It uses a shared virtual MAC and a virtual IP address to a group of routers that serve as
the default gateway for hosts on a LAN



What is a function of a remote access VPN?


A.

used cryptographic tunneling to protect the privacy of data for multiple users
simultaneously


B.

used exclusively when a user is connected to a company's internal network


C.

establishes a secure tunnel between two branch sites


D.

allows the users to access company internal network resources through a secure tunnel





D.
  

allows the users to access company internal network resources through a secure tunnel



An engineer is asked to protect unused ports that are configured in the default VLAN on a
switch.
Which two steps will fulfill the request? (Choose two)


A.

Configure the ports in an EtherChannel.


B.

Administratively shut down the ports


C.

Configure the port type as access and place in VLAN 99


D.

Configure the ports as trunk ports


E.

Enable the Cisco Discovery Protocol





B.
  

Administratively shut down the ports



C.
  

Configure the port type as access and place in VLAN 99



Which two events occur automatically when a device Is added to Cisco DNA Center? (Choose two. )


A.

The device Is assigned to the Global site.


B.

The device Is placed into the Unmanaged state.


C.

The device Is placed into the Provisioned state.


D.

The device Is placed into the Managed state.


E.

The device is assigned to the Local site.





A.
  

The device Is assigned to the Global site.



B.
  

The device Is placed into the Unmanaged state.




Page 8 out of 72 Pages
Previous